Personal > Blogs

Personal blogs.

<1234567...57>
No user evaluation yet
Aaron Marchers private website / blog about security, networking, linux, ...!
You need to login to report a site Details
Last check 2017-09-03 05:05 UTC Online (1 sec)
No user evaluation yet
Please do not report any file link (URL) listed here as malicious to any site besides EurAsia, failure to comply can result in blocked user account. To find out why we added this warning, read
You need to login to report a site Details
Last check 2017-07-02 23:20 UTC Online (1 sec)
No user evaluation yet
Privacy and anonymity have been reduced to the point of non-existence in recent years (Thanks Obama). Our personal, private information is stockpiled and sold to the highest bidder like so much inventory at a warehouse. National Security Letters are written to make countless requests for records from our search engines, libraries, and book stores with no court oversight. Email and especially searchable data is practically unprotected from anyone who might ask to have it. All our electronic communications are tapped. Massive governmental data mining schemes are being built to record everything we publish on the web. In many workplaces, employers spy on and control their employees' Internet access, and this practice is widely considered to be acceptable.

These are dark times. The Fourth Amendment has all but disappeared, thanks to the Wars on Drugs, Porn, and Terror. Any practicing trial lawyer will tell you that you can no longer rely on unreasonable search to be the basis for excluding evidence, especially for digital evidence in the hands of a third party. Likewise the First Amendment has been shredded with exceptions and provisos, and is only truly available to those with the money to fight costly (and usually frivolous) court battles against large corporations. In short, you can say what you want so long as it doesn't affect corporate profits.

How we got to a legal state where all this activity is the accepted norm, I'm not quite sure. It seems to stem from an underlying assumption that our function at work and at home is that of a diligent slave - a single unit of economic output under the direct watch and total control of our superiors at all times; that we should accept this surveillance because we should have nothing to hide from our benevolent overlords who are watching us merely to protect us from evil.

I believe this view is wrong. Moreover, I believe it is time to reverse the tide. This document seeks to provide the means to protect your right to privacy, freedom of speech, and anonymous net access even under the most draconian of conditions - including, but not limited to, both private and criminal investigation (which happens far more often to innocent people than one might like to think). "So what are you saying? That I can dodge bullets?" "No.. What I am trying to tell you is that when you're ready, you won't have to."
You need to login to report a site Details
Last check 2017-07-03 17:25 UTC Online (1 sec)
No user evaluation yet
You need to login to report a site Details
Last check 2017-09-15 16:45 UTC Online (1 sec)
No user evaluation yet
Home
About
No Ads, No Tracking, No JavaScript

This website does not have any adverts, tracking or other internet annoyances.
It's also 100% JavaScript free.
You need to login to report a site Details
Last check 2017-07-04 21:10 UTC Online (1 sec)
No user evaluation yet
Windows
TrueCrypt

WARNING: As of 28 May 2014, TrueCrypt is no longer maintained by its developers, which might have security implications. However, TrueCrypt version 7.1a is generally still considered safe. [1]

Step 1: Get TrueCrypt
Step 2: Install TrueCrypt
Step 3: In Truecrypt select the “Create Volume” option
Step 4: Follow the instructions of the "TrueCrypt Volume Creation Wizard"
Step 5: Select a drive letter in the main TrueCrypt window
Step 6: Select your TrueCrypt container or drive using the "Select File..." and "Select Device..." button
Step 7: Click the "Mount" button and enter your password. A new drive will now pop up in "My Computer"
Step 8: Store your sensitive files on that drive
Step 9: Click the "Unmount" button to unmount the drive

For additional security, encrypt your bootdrive with TrueCrypt.
You need to login to report a site Details
Last check 2017-07-06 02:05 UTC Online (1 sec)
No user evaluation yet
Firefox and SELinux

Update: it seems that updating the confined version of Firefox doesn't work. To work around this, temporarily disable SELinux before updating. Once the update process finished, you'll need to reset the file contexts on the files by running the command "restorecon -F -R -v ~/firefox-strict". Without doing this, Firefox will run unconfined after the update!

This guide has been written to help people out there creating a safe Firefox installation which is only allowed to browse through Tor. This means no other network traffic (eg. DNS requests, direct HTTP or FTP requests) is permitted to be sent from the process preventing any kind of data leakage possible by abusing the process (eg. memory leaks, buffer overflows, bugs in the code etc). This greatly increases the protection of your anonymity as it prevents all attempts to send your real IP address and other sensitive data to 3rd parties (like in the case of the recent FH attack where IP and MAC addresses and hostnames have been sent to a clearnet server).

Note that if you dedicated your system to the risky or illegal activities you do (eg. you use a VM inside your normal system or have a dual-boot setup), a better way to defend yourself is to simply block all outbound connections using a firewall and then configure your system to use the SOCKS proxy of Tor to connect to HTTP hosts on the internet. Otherwise, if you share your system between different activities and use a RHEL-based Linux distribution, you may follow this guide to make your browsing sessions more secure.

First of all, SELinux is a pretty hard-to-understand thing, so I won't go into technical details too much. Basically, think about SELinux as an additional security layer on top of the usual POSIX rights set on files, directories and other filesystem objects. POSIX rights are provided to grant read/write/execute/browse privileges for the owner user, the owner group and "everybody else" which means anyone having a user account on the system. SELinux extends this security scheme by creating application domains which are strictly separated from each other, applications from different domains cannot access each other's resources. All processes run in their confined security contexts (domains) which ensures they only have access to resources they really need access to.

To strengthen the security of the browser, I created a policy package for firefox which permits only connections to the SOCKS proxy of Tor. The steps below describe how to install and use the package:
You need to login to report a site Details
Last check 2017-07-06 02:10 UTC Online (1 sec)
No user evaluation yet
How Crucial to the Success of Nazi Germany was Charismatic Leadership?
Historical Pamphlets Series: No. 27
You need to login to report a site Details
Last check 2017-07-11 01:30 UTC Online (1 sec)
No user evaluation yet
german stories
You need to login to report a site Details
Last check 2017-07-11 02:45 UTC Online (1 sec)
No user evaluation yet
A little bit about me: I am a Spiritual Satanist and have been for about two years now. This board will mainly be for people who are interested in and want to learn about Satanism. Opposing views are always welcome. What fun would it be if it were purely a circle jerk? Right.
You need to login to report a site Details
Last check 2017-07-02 19:20 UTC Online (1 sec)
<1234567...57>