-----BEGIN PGP SIGNED MESSAGE-----
Security and Encryption FAQ Revision 17.8
by Doctor Who
"No one shall be subjected to arbitrary interference with his privacy,
family, home or correspondence, nor to attacks upon his honour and reputation.
Everyone has the right to the protection of the law against such interference or
attacks."
Article 12 Universal Declaration of Human Rights
Disclaimer and justification for this FAQ.
Many countries operate a legal system designed to suppress individual freedom.
Such countries often do not obey basic human rights. The law in these countries
may be based on guilty until proven innocent. My intention in offering this FAQ,
is to legally challenge these threats
to our freedom. It is not my intention to promote any illegal act, but
to offer people the option of freedom of choice. How they use that freedom is
entirely down to the individual.
This revision contains some major changes, particularly on the choice of
encryption programs. DriveCrypt Plus Pack version 2 whole disk/drive encryption
with access only by a pre-boot password is now the preferred choice, with
BestCrypt version 7 my second choice.
The FAQ has 2 main Sections.
Part 1 concentrates on passive security. It is intended to be useful to both
posters and lurkers.
Part 2 is to maximize your privacy whilst online, particularly for Email and
Usenet posting.
As in previous versions, I have assumed three security levels:
Level 1. For those who wish to protect their files from unauthorized
access. These users are not too concerned at being found with encrypted data on
their computer.
Level 2. For those who not only wish to hide their private data, but
to hide the fact that they have such data. This might be an essential
requirement for anyone who lives in an inquisitorial police state where human
rights are dubious.
Level 3. For those who not only need all that is offered by level 2, but
additionally wish to protect themselves from hackers whilst online and snoopers
who may try and compromize either their software or add substitute software that
could compromize their privacy.
Part 1 explains the 3 security levels and offers help in achieving them.
1. How does encryption work?
Essentially the plaintext is combined with a mathematical algorithm (a set of
rules for processing data) such that the original text cannot be deduced from
the output file, hence the data is now in encrypted form. To enable the process
to be secure, a key (called the passphrase) is combined with this algorithm.
Obviously the process must be reversible, but only with the aid of the correct
key. Without the key, the process should be extremely difficult. The mathematics
of the encryption should be openly available for peer review. At first sight
this may appear to compromize the encryption, but this is far from the case.
Peer review ensures that there are no "back doors" or crypto
weaknesses within the program. Although the algorithm is understood, it is the
combination of its use with the passphrase that ensures secrecy. Thus the
passphrase is critical to the security of the data.
2. I want my Hard Drive and my Email to be secure, how can I achieve this?
You need Pretty Good Privacy (PGP) for your Email and DriveCrypt Plus Pack and/or
BestCrypt for your hard drive encrypted files.
PGP is here: http://freepages.computers.rootsweb.com/~irfaiad/
DriveCrypt Plus Pack is here: http://www.drivecrypt.com
BestCrypt is here: http://www.jetico.com/
DriveCrypt Plus Pack (henceforth referrred to as DCPP) is Win2000/NT/XP
compliant but not yet compliant with Win98 or earlier. Version 1.0 had some bugs
which all seem to have been resolved in this new release, version 2. Regrettably,
no source code is available.
BestCrypt is Win95/98/NT/2000/XP and Linux compatible. But again the source code
is only released for the algorithms, not the Windows interface.
If the existence of the source code is important to you, I suggest using PGP
version 6.5.8ckt and Scramdisk with Win98. The Win98 version of Scramdisk is the
last one with freely available source code. Officially Scramdisk has now been
superceded by DriveCrypt. Unfortunately the
source code for DriveCrypt is undisclosed. If you want Scramdisk it is
here:
http://www.samsimpson.com/scramdisk.php
3. What is the difference between these encryption Programs?
PGP uses a system of encryption called public key cryptography. Two different
keys are used. One key is secret and the other is made public.
Anybody sending you mail simply encrypts their message to you with your public
key. They can get this key either directly from you or from a
public key server. It is analogous to someone sending you a box and a
self locking padlock for you to send them secret papers, when only they have the
key to open the box.
The public key is obviously not secret - in fact it should be spread far and
wide so that anybody can find it if they wish to send you encrypted Email. The
easiest way to ensure this is by submitting it to a public key server.
The only way to decrypt this incoming message is with your secret key. It is
impossible to decrypt using the same key as was used to encrypt the message,
your public key. Thus it is called asymmetrical encryption. It is a one way
system of encryption, requiring the
corresponding (secret) key to decrypt. PGP is simplicity itself to
install and use. It even offers to send your newly generated public key to the
key server.
For your normal hard drive encryption, you will need a symmetrical type of
encryption program. This means the same key is used for both encryption and
decryption. DCPP and BestCrypt are of this type and especially good because they
are "On-The-Fly" (OTF) programs. This means that the program will only
decrypt on an as needed basis into RAM memory. More about this later in the FAQ.
One question often asked by newbies is whether the passphrase is stored
somewhere within the encrypted file. No. The passphrase is passed
through a hash, such as SHA1. This is a one-way encryption. It is the hash
output that is stored within the encrypted container. The program will compare
this hash with the hash it produces from your passphrase that you type in to
mount (open) the container. If they are identical, the program will use your
passphrase to decrypt the key that the program generated to encrypt the disk or
container. Only then will the disk or container be decipherable. It is
impossible to derive this key unless the correct passphrase is input. There are
no shortcuts. Importantly, it is impossible to derive the passphrase from the
hash output because it is a one way action only.
4. I have Windows, am I safe?
Definitely NOT.
In previous versions I have suggested work-arounds to help minimize the inherent
security weaknesses within the Windows operating system.
I have now concluded this is a sheer waste of time. Whatever you do,
Windows will tell the world. It keeps records of so much of your
activity it seems the only solution is the complete encryption of your whole
drive. Even using so-called washing programs, little is to be gained. If
security is important to you, there is only one solution: encrypt your whole
drive.
This is so important, I will repeat it: If security is important to
you, there is only one solution: encrypt your whole drive.
A program I recommend to test this out for yourself is WinHex. It reads your
drive and shows both the hexadecimal and the text equivalent of each sector. It
makes fascinating reading. You will see snippets of long deleted or the ends of
overwritten files, perhaps from the Windows swapfile. Hints of text that will
ensure any snooper could accurately deduce your computer habits. In fact the
program is so successful at this, it is also sold as a forensic tool for disk
analysis. If you wish to write to disk and use it for forensic analysis both
full and specialist icenses are required. The evaluation version is good enough
to prove the necessity of encryption - if you need any persuading.
WinHex is available here: http://www.winhex.com/winhex/order.html.
If you have Windows Media Player, go to View -> Options -> Player and
uncheck "Allow Internet sites to uniquely identify Your player" It
appears that Microsoft have done it again. The default is for this box to be
checked. Any Web site could theoretically get your id from within your Windows
registry with this checked. MS claim it is to help identify users when they
download copyrighted music. But anybody could be using this crack for their own
purposes, so protect yourself by unchecking it.
5. Which program do you recommend for this whole drive encryption?
DriveCrypt Plus Pack (DCPP). It is truly simple to install and use. One thing to
watch, however, is that you ensure that energy saving is disabled on your
computer. I had a major crash which trashed my hard drive completely and only
happened after I had enabled it. This allowed the drives to run down after 30
minutes. It may be a coincidence, but since returning to "always on",
there have been no further problems despite many hours of encrypting and
decrypting of several large drives. It encrypts the whole partition. So if you
want to keep part of your drive in plaintext you will need to divide your hard
drive into independent partitions or have two separate hard drives. Unlike its
namesake DriveCrypt, it does not destroy the data within the partition it
encrypts. This is obviously necessary as its main advantage is to encrypt your C
drive.
All your computer activities will be totally secure as everything you do is from
within an encrypted drive. You can choose which partition you wish to encrypt,
you can also choose which key to use. On setting up DCPP you have the option of
creating a keyfile and of then generating
any number of keys to use. It is very flexible. The encrypted drive
need not necessarily be your bootable drive, although this is obviously the main
intention of the program.
In fact this is essential if you wish to tame Windows from shouting to the world
your computer habits.
If you live outside the United States and in a country which does not have the
equivalent of the 5th Amendment, you will need to use a little subtlety to
ensure your security. More on this later in the FAQ.
It is important to remember that DCPP is an OTF type of program. The drive will
remain encrypted at all times. Any necessary decryption is done into RAM memory
only. Thus a crash close will not leave any evidence of your activities.
Likewise, there is now no need to worry about the swap file or all the other
weaknesses of the Windows operating system.
A further major advantage over previously recommended encryption programs is
that the passphrase is input at Bios level, before Windows is loaded.
The importance of this is difficult to over-emphasize.
This means it is impossible for any software key-logging program that may be on
your computer to detect your passphrase. Such programs are sometimes picked up
on the Net or arrive via Email and could circumvent all your efforts at security.
I am sure someone will mention that there are hardware password logging devices
which of course could grab your passphrase when you start up. However, common
sense local site security
should minimize this risk. Despite this slight risk, a Bios level
passphrase is just about the Holy Grail of security - very difficult to
intercept and snoop. DCPP goes even further by very deliberately operating at a
reduced speed at the passphrase prompt to ensure it is very time consuming for
someone to try and test for your passphrase. In fact it gets worse for a
would-be snooper, they only get three attempts at inputting the passphrase and
the system stops, requiring a re-start to get back to the passphrase prompt
screen. An excellent design indeed!
DCPP is authored by a very well respected crypto expert who also authored
Scramdisk. He has an intuitive knowledge of what privacy is all about.
6. Are there other OTF programs?
Yes, there are several. I recommend DCPP only because I have had some personal
experience with it. Another similar program you may wish to investigate is
SafeBoot Solo. I have had no experience with it and so can only recommend
DriveCrypt. But try it for yourself. Both allow Bios input of the passphrase
with the consequential advantage of whole drive security. SafeBoot Solo has the
significant advantage of being a whole lot cheaper than DCPP. I was fortunate in
buying version 1.0 at a very special price and was offered the updated version
2.0 for free.
Others, such as ScramDisk and BestCrypt only encrypt data files, not the Windows
operating system. Scramdisk does allow you to input the passphrase via its Red
Screen mode which is far superior to the BestCrypt one. BestCrypt only allows
you to use some keyboard filtering, the nature of which is not specified.
However, BestCrypt has the unique advantage of allowing you to generate a hidden
container inside the normal encrypted one. This might be very important to
someone who needs good plausible deniability.
SafeBoot Solo may be less friendly as far as plausible deniability is concerned,
judging from the info at their site. I may be misjudging it, but it appears that
the encrypted disk can be recovered using a Repair Kit floppy.
Of these programs, however, only Scramdisk has published the source code.
Regrettably for commercial reasons none of the others are truly
open and transparent. If you insist on sighting the source code then I
suggest you use the 3.01r2 version of Scramdisk together with Windows 98.
Personally, and I emphasize this is my opinion only, I trust the author of DCPP
not to have put any back doors into his program and therefore enjoy the benefit
of inputting my passphrase at Bios level. But please do not blame me if I am
mistaken!
7. How difficult is it to break one of these programs?
Very difficult, in fact for all practical purposes, it is considered impossible.
In most cases, the weakest link will be your passphrase.
Always make it long. Remember, every extra character you enter makes a
dictionary search for the right phrase twice as long. The present version of
DCPP ultimately limits your key length to 160 bits. This is extremely strong
indeed. The sun will burn out into a white dwarf long before any snooper has
cracked that length of key.
Each keyboard character roughly equates to 8 bits, and is represented on the
drive as two hexadecimal characters. This suggests a 20 character passphrase is
equal strength to the encryption. In practice, probably not. Few people can
remember a truly random 20 character passphrase. So most people use a less than
random one. This means it should be longer to help compensate for this lack of
randomness.
You should also use at least part of both lines of the passphrase input screen
with DCPP.
8. Why?
Because any passphrase cracker cannot find the correct key until it has
exhausted a key search as wide as the last character you enter. A strong hint
that you should make sure the last character of your passphrase is well along
the bottom line! For higher security you should spread it around on both lines.
This is a distinct security improvement over the usual straight line entry that
is typical of other programs, including BestCrypt.
Be sure that if any serious snooper wants to view your secret data, they will
find a way without wasting their time attempting a brute force attack upon your
DCPP container. In some countries rubber hose cryptography may be the rule.
Anybody living in such a country needs level 2 security at the very least. In
some "civilized" countries there are more sinister methods, such as
tempest or the use of a trojan which require level 3 security (see later in FAQ).
Fortunately, tempest and trojan attacks are far less likely to succeed against
DCPP than all the other programs. Hence my strong and enthusiastic support for
this program.
Note: Various hacks of DCPP (and probably likewise SafeBoot) have been
published on Usenet. Such wonderful free offers may seem excellent
value in comparison to paying huge sums of money to the program makers of DCPP
and SafeBoot. But consider, how can you possibly be sure they have not been
tampered with. What if the snoops are behind some of
these rip off hacks? What a great way to catch the naive and gullible
user who thought he was getting a freebie bargain.
Of course I might be wrong about this, but nobody will ever know until it is put
to the test, and then it might be too late. If your freedom depends on security,
don't take shortcuts that might lead you to lose it.
One thing to point out: Securstar (the author's of DCPP) operate a very tiresome
and convoluted system of program registration. Their paranoia is such that after
first registering, they only offer a temporary key to allow access after the 30
day trial period. You then must wait around 90 days before they send you the
permanent key by Email. Not very useful if you should happen to want to change
your Email address during that time. A pity, because apart from this it is an
excellent program.
9. What about simple file by file encryption?
I like Kremlin. I have set it up to run in the background. It allows you to
shred files as well as encrypt/decrypt. It can be set via the options menu to by
default, overwrite existing decrypted files or to wipe the plaintext file after
it is encrypted. Very easy to use.
Kremlin is here: http://www.kremlinencrypt.com/
You could also use the Windows version of PGP. It comes with PGP Tools, which
will allow you to encrypt any file on your computer. Of course this is
unneccessary for all files within your DCPP drive. But you may need it for files
outside this drive. Only do this on the assumption of a level 1 security. I
suspect the International version offered by Kremlin is a crippled version to
get around the export restrictions of strong cryptography.
10. How can I encrypt files on a floppy?
Use either Kremlin or PGP Tools. PGP Tools comes with PGP and will encrypt any
floppy. But ensure you wipe the original file before closing.
11. Does using Encryption slow things up?
Negligibly on any modern computer. However on my system DCPP is slower than
BestCrypt, perhaps because BestCrypt is only affecting data, whereas DCPP
affects both the operating system and the data.
12. Do I need a PGP passphrase if I store my keyrings within my encrypted drive?
It is good security practice to use a passphrase, but for level 3 security it is
essential because level 3 security is intended to ensure your secret data are
safe if attempts are made to hack into your
computer whilst online. Although DCPP is an OTF program I am old
fashioned as well as paranoid, so I strongly advise using a passphrase for your
PGP keyring.
13. I use Mac, OS2, Linux, (fill in your choice), what about me?
Use either BestCrypt, or PGPDisk.
PGPDisk http://www.nai.com/default_pgp.asp,
There may well be others, but I know nothing about them.
14. How can I ensure I do not leave traces of unwanted plaintext files on my
system?
One vital point that must be adhered to at all costs is to disable the Windows
hibernation (power saving) feature. Windows will dump everything that is in RAM
memory onto the boot drive by-passing the DCPP drivers. Because it by-passes the
DCPP drivers, it means it writes in plaintext everything including the keyfile
data which unlocks your most secret partition!
So whatever else you do, disable the power saving features!
In the past I suggested either Evidence Eliminator (what a compromising
name!) or Windows Washer to help clean out extraneous information. With DCPP
this sort of program is less necessary against a snooper than for protecting
yourself whilst surfing the Net. Such a program will ensure your cookie files
are cleaned up and get rid of bloat off your drive.
I suggest that to minimize drawing attention to yourself that Windows Washer is
a more acceptable program name to be found on your system rather than Evidence
Eliminator, assuming you choose to install it also onto your plaintext drive.
Further, Evidence Eliminator spend far too much of their time spamming Usenet to
enhance their sales. I dislike such action and if for no other, refuse now to
use the program.
Windows Washer is here: http://www.webroot.com
15. What programs do I put in my newly Encrypted Drive?
In previous versions of this FAQ I was wary that some programs might
write critical info to your C drive. However, this is far less of a
security risk with it being encrypted. Nevertheless, for what it's worth, here
are my choices for these programs:
(A) Agent (or FreeAgent) for the newsreader.
Agent is here: http://www.forteinc.com
(B) For your Email I have 3 different recommendations:
i. Agent, as mentioned above
ii. Quicksilver, available here: http://quicksilver.skuz.net/
111. JBN2, here: Http://members.tripod.com/~l4795/jbn/index.html
Agent is simple and very easy to use. It can be used in conjunction with a
remote host server for posting anonymously (see later in FAQ). The latest
version also supports reading of yEnc coded files.
Quicksilver is recommended for secure Email and Usenet posting. It now also
supports Nym creation. It is an excellent program for both anonymous Email and
posting anonymously to Usenet. It is still in beta testing mode. Most
importantly, Quicksilver is very easy to learn to use. It uses the Mixmaster
remailers for posting. These are considered far more secure than the earlier
Cypherpunk remailers. Quicksilver comes with Mixmaster and will install
Mixmaster on first use, if required. However, it will only automatically decrypt
messages that are received via its Inbox addressed to one of your Nyms that were
created
using Quicksilver. It seems it is impossible to decrypt by pasting
a message into its Inbox, received via another program.
JBN is very thorough, but much more complicated than Quicksilver. This might be
the choice of the hardened enthusiast. Because of this, it also requires the
most maintenance to keep abreast of the ever changing remailers. Quicksilver
will normally choose the remailers for you which does make things far easier, as
the choice is done automatically for each uploading session. It is also very
easy to keep abreast of these remailers which are always changing. You simply
click on Update and it does it for you. Painless.
All three of these programs will also work with PGP. Agent will
require you to copy and paste, but the other two have built-in support and work
seamlessly with PGP. I particularly commend Quicksilver for its intuitive ease
of use. This makes NYM maintenance much simpler.
(C) For browsing use whatever you choose.
I used to warn against using MS Explorer, but now the beast has been tamed by
encrypting your C drive, but for extra sefety disable Active-X
(D) Use ACDSee as your viewer. If you use the cache facility, make certain that
you set it up within your encrypted drive. Fortunately it should do this by
default. This allows easy previewing of thumbprints and click and zoom to
examine image quality. I prefer the
earlier version 2.4. Less bloat.
ACDSee is here: http://go.acdnet.com
Two alternatives are:
Thumbs Plus, at http://www.cerious.com and
VuePro, at: http://www.hamrick.com
Each of these 3 programs has some advantage over the others. Choose
whichever best suits your needs.
(E) Many files are compressed. I recommend obtaining a copy of WinZip from here:
http://www.winzip.com. Or do a search for PKzip which is freeware.
(F) Any person who browses the Net should ensure they have a good virus
detector. There are many to choose from, some are freeware, others are shareware
or commercial ware. I now use AVG, which is free for non-commercial use. It
allows updates via the Net and is especially easy to use.
Get AVG here: www.grisoft.com
(G) Get a firewall. I recommend Zonealarm.
Get it here: http://www.zonelabs.com/store/content/home.jsp
Note: Just because your drive is encrypted does not relieve you of the necessity
of protecting yourself whilst online. So take care to cover your tracks.
16. How do I do this?
Never surf naked. Always, always use a proxy. If you are not sure how to go
about this, an easy answer is to use The Anonymizer.
The Anonymizer is here: www.anonymizer.com
Well worth a visit. You can choose either to use the freebie version or pay for
something a little faster and more secure.
If you prefer to do it the hard way, try this link:
http://www.samair.ru/proxy/
They have a listing of active proxies. But you will need to set it up yourself.
I find them too much bother and use the Anonymizer because it suits my needs.
All of the above is sufficient for a level 1 security.
Level 2. This is for those who not only wish to hide their private
data, but wish to hide the fact that they have such data or can offer an
incontestable reason for their inability to disclose the contents of such files.
This means plausible deniability.
17. What more must I do to achieve level 2 Security?
For level 2, it is essential that you can show plausible deniability for all
files that might contain encrypted data. The purpose is to be able to justify
every file on your system.
18. How do I achieve this higher level of security?
In a previous version of this FAQ, I mistakenly gave some misleading info at
this point. My sincere apologies. In an effort to help with future plausible
deniability, I was trying to hint at the method in place of explaining it in
detail, but regrettably this caused some to completely misunderstand the method.
So what follows is I trust, rather more straight forward.
First of all, you cannot hide the fact that you have an encrypted drive. I have
seen many posts from people claiming all sorts of elaborate ruses to hide their
DCPP drive using a combinations of different operating
systems, etc. It wont work. Any competent snoop can easily prove
you have encryption on your computer. It is difficult to justify several
gigabytes of randomn data occupying a whole drive, unless it is encrypted. Of
course if you live in a free country with a Constituion similar to the United
States with its 5th Amendment, you should be able to just sit back, fold your
arms and let the snoops do their worst - which with a good passphrase will not
be much at all!
For the rest of the world, the trick is to be able to show that this drive
cannot be decrypted because the key has been destroyed.
With DCPP, a key is generated by the program before you can encrypt a drive. The
key ID is displayed in the keyring when the program is run. Normally a
passphrase is required to open the program, but in some countries simply
refusing to open the program is itself an offence. Claiming you have
"forgotten" the passphrase may not be sufficient to save you. However,
if it can be shown that the key needed to decrypt an encrypted drive is deleted
or missing, then it becomes much more difficult to prove you are not complying
with the law.
Note: An assumption is being made here that the presence of encryption is not in
itself an offence. If it is, then you must use Scramdisk in Traveller mode. This
implies running Scramdisk from a floppy. To understand how to do this, please
read the Scramdisk documentation that comes with the program.
Assuming encryption is legal (which is the case in most civilised
countries) then you will need to be able to dual boot your computer.
This means having two entirely separate operating systems. They need not be
different types. You can choose to use, for example, two separate Windows XP
systems. Each would have to be on different partitions on your hard drive. Or
you could have two separate hard drives and use the first partition on each.
Whichever route you choose, the operating systems must be set up by Windows to
be dual bootable. It took me about 10 minutes of studying the Windows 2000 Pro
manual to understand how to install dual boot Win 2000 Pro.
When you have it set up correctly, you will be offered a choice of Windows
operating systems on boot.
19. OK, I have dual boot, now what?
Install DCPP onto both drives. You should use the first partition (the default)
as your normal plaintext drive. The second drive is the one you will need to
encrypt with DCPP. However, it is useful to have previously installed DCPP onto
the plaintext drive as part of the ploy to enable plausible deniability - see
further on.
If you choose to encrypt both drives, it is essential to use different keys.
Before any encryption can be accomplished, it is mandatory that you check that
DCPP is supported by your operating system. To do this you must first install
Boot Authenticity from the relevant screen in the DCPP window. This is not the
same thing as encrypting the drive. You could choose to use Boot Authenticity
alone as a very strong boot sequence protection for your computer. But this
would be using only half of DCPP's capabilities. It would not by itself protect
your data as there would be other means to access the drive by forensics.
Immediately after installing Boot Authenticity and before you re-boot you must
create an Emergency Repair (ER) disk as recommended by the program. This is to
ensure that if it all turns sour and your computer cannot boot, you can restore
your boot table back to its original state. Test your system boots from both the
normal hard drive startup and with the boot floppy (ER) disk.
Assuming everything works, you can now encrypt your chosen drive.
It is absolutely essential that the key used to encrypt your drive is a
unique key, not being used by your system for any other drive. I
strongly recommend that you create a unique keyring just for this one key to
ensure it is not misplaced or confused with any other key on your system. Give
this keyring a unique name, e.g Secret or Hidden.
Test that everything works as it should by booting into both drives, also test
that you are able to boot using the ER disk - very important this.
Now comes the tricky bit. Firstly, boot into your encrypted drive and locate the
file named "Backup" that is within your DriveCrypt folder. This is
normally to be found within "Program Files", unless you chose to
install it into a different folder. Copy "Backup" to the same folder
in your plaintext drive. You then re-boot into your normal plaintext drive,
which will now, of course, be the boot drive. Naturally, you will have had to
enter your DCPP passphrase to boot up. Because your encrypted drive is not now
the boot drive, DCPP will allow you to remove Boot Authenticity off your
computer. DCPP needs the file "Backup" to do this, thus the reason for
copying it across.
But most importantly, do NOT now update your ER disk, despite the prompt from
DCPP to do just that.
This is essential to what follows!
Next time you boot, no passphrase will be required and you will be shown the two
drives, but only one will be bootable. If you perversely attempt to boot into
your encrypted drive, Windows will tell you it cannot load the OS. At first
sight this might appear that you have lost all your data!
To access your encrypted drive, you must use the ER disk. What is considered by
DCPP as a last resort access to your computer instead now becomes your secret
key to accessing your encrypted drive.
It is imperative that the key you have used be invisible from within your
plaintext drive. If it is visible, DCPP will display the key ID of your
encrypted drive and the snoops will be able to persuade you that as the key is
present, no excuses about forgotten passphrases will wash.
However, no key will pose a problem for them. No key means decryption is
impossible.
When booting with the ER disk, naturally if the wrong passphrase is used you
cannot boot. With the right passphrase you are offered the choice of both drives
and can boot into either drive. Make certain you make a backup of this ER disk
and store off-site. This way, if you are unlucky and the boot floppy dies on
you, you still have access.
I have to repeat that it is essential that your keyring, as displayed when
booting into your normal drive does not display the encrypted drive's key.
This cannot be over-emphasized.
20. Why?
If a key is available DCPP will reveal the key fingerprint of that
drive. If no key is available then it is axiomatic that it will be
impossible to decrypt that drive. This is absolutely true. The ER disk only
allows OTF decryption for each session. No information resides on the ER disk to
help identify its purpose. Even WinHex cannot read it. Windows tells you it is
unformatted. This is because the raw data on the disk is not in any recognized
file format.
In some countries, the United Kingdom is one such, LEA can force you to reveal
the contents of any encrypted drive on pain of up to two years in prison. No 5th
Amendment there! Worse, far worse, you cannot tell the world of your plight on
pain of five years in prison. So in the case of authoritarian interference with
your right to privacy you have no hope of exposing them to the critical gaze of
world-wide publicity.
This is about the same level of human rights as is exercised by the government
of Zimbabwe!
If no matching key can be identified on your keyring and the passphrase you
supply cannot open the encrypted drive, but does show some other encrypted drive
to prove it is a genuine passphrase, then they now have to prove you are lying.
With full cooperation from you regarding the other drive(s), they certainly
cannot claim you are being uncooperative.
Your defence is you encrypted the drive as an experiment and stupidly deleted
the key. You are still learning how to use the program, so
mistakes will be made. Never mind, you intend re-formatting the drive
when you eventually get around to it. Windows will offer to do this if
you click on it from within the "My Computer" screen.
By using a benign floppy, perhaps one that looks as if it has seen better days,
it will be far less obviously a target.
With the key destroyed I am sure SecureStar, the owners of DCPP, will be happy
to confirm that it is impossible to decrypt the data.
Note: This is general information only. Some users might prefer to try other,
perhaps even more ingenious ways to get around this problem. I am deliberately
leaving the alternatives unspoken. Each may choose the system that best suits
their security needs.
If you feel this is not sufficent as a form of plausible deniability for your
circumstances, then I can only suggest you use the hidden container feature of
BestCrypt. Whereas this is an excellent form of plausible deniability, without
DCPP it does mean your are at the mercy of the
Windows operating system. Perhaps if you used Linux and BestCrypt you
may be safer.
21. What if encryption is illegal in my country?
In that case, I suggest using the stego feature of either DriveCrypt or
Scramdisk. But ensure you create your own WAV file, by making your own
recording. Once the stego encrypted file is created within the WAV file, make
sure to wipe the original recording to prevent forensic analysis showing their
low level data are not identical. Of course, you will need to install DriveCrypt
or Scramdisk in traveller mode. This
means running it off a floppy. But you will still need to hide the
floppy effectively in the case of a search. I am sorry I cannot help you here.
It must be down to your own initiative.
Note the difference between this scenario and the previous one using a boot
floppy. The DriveCrypt/Scramdisk floppy will plainly display the
program, thus incriminating you. Where encryption is legal, an ER disk
does not incriminate you thus less of a need to try and hide it away.
22. Are there any other precautions I should take?
Make copies of all your PGP keys, a text file of all your passwords and program
registration codes, copies of INI files for critical programs, secret Bank
Account numbers and most importantly the key for your secret encrypted drive
plus anything else that is so critical your life would be inconvenienced if it
were lost. These individual files should all be stored in a folder called
"Safe" on your encrypted drive.
One very important point to remember is to ensure you do not keep a copy of this
FAQ in plaintext. If you are going to rely on any variation of the ploys
suggested earlier, the less ammunition you offer the better.
This must mean keeping this FAQ within your secret drive.
Remember the best security services never disclose anything of their abilities,
you must do the same.
The above is sufficient for Level 2 security.
23. I need Level 3 Security, how do I achieve this?
This is for those who wish to protect themselves from hackers whilst online and
snoopers who may try and compromize either their software or add substitute
software that could reveal their secret passphrases.
24. What are these threats?
They are known as Tempest and Trojan attacks.
25. What is a Tempest attack?
Tempest is an acronym for Transient ElectroMagnetic Pulse Emanation
Surveillance. This is the science of monitoring at a distance electronic signals
carried on wires or displayed on a monitor. Although of only slight significance
to the average user, it is of enormous importance to serious cryptography
snoopers. To minimize a tempest attack you should screen all the cables between
your computer and your accessories, particularly your monitor. A non CRT monitor
screen such as those used by laptops offers a considerable reduction in radiated
emissions and is recommended.
26. I have decided to use DCPP, am I at risk?
Far less than if you were using any other program. But do not use the same
passphrase to open any other encrypted partitions after you have
loaded Windows. Keep your boot passphrase totally unique and you will
be far safer than if using any other program.
27. What about BestCrypt??
It does not offer the same facility, but it does offer some protection. On the
Menu bar, click on Key Generators -> SHA-1.. and ensure "Use Keyboard
Filter" is checked.
Two unique advantages of BestCrypt are it allows hidden containers to be created
and it can optionally encrypt the Windows swapfile. Both options are easy to
implement and truly effective.
28. What is a Trojan?
A trojan (from the Greek Trojan Horse), is a hidden program that monitors your
key-strokes and then either copies them to a secret folder for later recovery or
ftp's them to a server when you next go online. This may be done without your
knowledge. Such a trojan may be secretly placed on your computer or picked up on
your travels on the Net. It might be sent by someone hacking into your computer
whilst you are online.
The United States Government has openly admitted it will be employing such
techniques. They call it Magic Lantern. It was originally promulgated as a
counter-terrorism weapon. But who knows how it will be used in practice.
In view of these changed tactics, it is mandatory that these possible
attacks be countered. Thus my insistence that only DCPP can give the
level of security to ensure you enjoy some peace of mind.
Nevertheless, whilst your encrypted drive is mounted you should take precautions
against a trojan copying any data and sending it out to some unknown site.
29. How do I do this?
First of all you must have a truly effective firewall. It is not sufficient for
a firewall to simply monitor downloaded data, but to also monitor all attempts
by programs within your computer that may try and send data out. The only
firewall that I know of that ensures total protection against such attacks is
Zonealarm. This firewall very cleverly makes an encrypted hash of each program
to ensure that a re-named or modified version of a previously acceptable program
cannot squeeze through and "phone home".
ZoneAlarm is here: www.zonelabs.com/zonealarmnews.htm
To understand how important this is, visit Steve Gibson's site.
Steve's site: http://grc.com/
Go to the "Test my Shields" and "Probe my Ports" pages.
You can test ZoneAlarm for yourself. I strongly urge all users concerned with
their privacy to run this test.
Steve's site is also a mine of other useful information and well worth a visit.
30. How will I know when a trojan has modified an acceptable program?
Zonealarm will pop up a screen asking if this program is allowed to access the
Net. If it is one of your regular programs, be very wary and always initially
say NO until you can check why this program is not now acceptable to Zonealarm.
If it is a strange program, then obviously say, NO and investigate.
31. How important is the passphrase?
Critically important. It is almost certainly the weakest link in the encryption
chain with most home/amateur users. I provide links at the end of the FAQ, some
of these should either help directly or give further links about how to create
an effective passphrase.
For the newbies: never choose a single word, no matter how unusual you think it
is. A passphrase must be that, a phrase, a series of words, characters and
punctuation intermixed. One method that I believe would help is to deliberately
mis-spell common words in a phrase. Scruggle in place of struggle, matrificent
in place of magnificent. These could be the start of a longer phrase. Taking
this a step further, invent words that are pronounceable but totally meaningless
for example, alamissis or grafexion. I recommend a minimum of eight words, but
do not use either of those two.
32. How can I prevent someone using my computer when I am away?
In the past I had no truly effective answer, but if you are using DCPP, you have
nothing to fear. Nobody accessing you computer will have any access to your
encrypted drive in your absence. Even the presence of an ER disk is no help to
them without the passphrase.
However, if you are truly paranoid (and who isn't?) I would guard against
someone adding a hardware keyboard logger. These can be very small
and easily disguised as an RF trap on the keyboard lead. Obviously,
this is far more likely if your computer is also used by others or can be
accessed by others in your absence.
The most likely scenario for this to happen would be if your computer was
impounded for forensic examination and later returned to you apparently
unharmed. In such circumstances I would definitely not input any
passphrase at all until a very thorough check has been undertaken. In fact I
would never use it again! I advise buying a new machine and transfer the drive
across. Of course to access this drive you will need the appropriate boot disk.
This suggests it would be wise to keep one copy off site.
33. Anything else?
Use a Bios password. Although it can be bypassed by resetting the
Bios, the fact it has been reset should be obvious by either there not being a
call for the Bios password on boot or it is different and you cannot then
startup. Also, ensure you have set a Windows startup password and a screen-saver
password. Make a short cut on your desk top to the screen saver, then open its
properties box and put in a single key shortcut, example F10.
This ensures you have the option of a single keystroke blanking of your screen
in an emergency.
Part 2 of 2.
This second part concentrates on security whilst online.
There are countless reasons why someone may need the reassurance of anonymity.
The most obvious is as a protection against an over-bearing Government. Many
people reside in countries where human rights are dubious and they need
anonymity to raise public awareness and publish
these abuses to the world at large. This part 2 is for those people
and for the many others who can help by creating smoke.
34. I subscribe to various news groups and receive Email that I want to keep
private, am I safe?
Whilst you are online anyone could be monitoring your account. If you live in
the British Isles be aware that all ISP's are required to keep logs of your
online activities, including which Web sites you visit.
Shortly this will be reinforced by MI5 who will be monitoring all Net activity
24 hours a day! The information will be archived eventually
for up to seven years! All Email headers will likewise be stored for
the same length of time.
35. Can anything be done to prevent my ISP (or the authorities) doing this?
There are several things you can do. First of all subscribe anonymously to an
independent News Provider - more about how to achieve this later in the FAQ.
Avoid using the default news provided by your ISP. Apart from usually only
containing a small fraction of all the newsgroups and articles that are posted
daily, your ISP is probably logging all the groups you subscribe to. You also
need to protect yourself from snoopers whilst online. Both of these aims can be
realized by encrypting the data-stream between your desktop and a remote host
server.
There are several methods of doing this. One is to use SSL proxies. This can be
very complicated and relies on expert knowledge for the best results.
If this is your choice, take a look here:
http://www.jestrix.net/tuts/sslsocks.html#intro
If simplicity is your goal, I suggest SSH and port forwarding. This is
easier to implement if you are new to privacy issues. Of course with experience
you can combine both, but that is beyond this FAQ.
36. I live in the United States why do I need to bother?
You don't need to. But your privacy and security are enhanced if you do,
particularly if you wish to ensure best possible privacy of posting
to Usenet. Also, it is quite likely that many routes around the globe,
even across the States may be routed through London. The Web is literally just
that, a web. Thus American Email, news postings, etc are just as liable to be
read by MI5 and who knows what they will do with this information.
Do not underestimate the British MI5/6. They are spending 2 billion Dollars
(plus cost over-runs) on re-building GCHQ at Chelmsford in anticipation of all
this increased snooping. An additional concern must be the United States' stated
intention to snoop using whatever means they can. TIA aka Total (now changed to
Terrorist) Information Awareness is one project that is having money poured into
its research. This involves combining many supposedly independent stores of
private information to track and define a citizens intentions. Naturally, this
must involve their computer habits.
If this makes you feel slightly uneasy, as well it should, then I recommend
implementing some of the suggestions within this FAQ.
37. Ok, you've convinced me, how do I go about this?
Assuming you want simplicity, then I recommend you use the SSH encryption
protocol. SSH is a form of encryption that ensures that everything that leaves
your desktop is encrypted. To do this you will need to subscribe to at least
one, but preferably two remote servers. To be truly effective the administrators
of these servers must be prepared to periodically review their security policies
and specifically to replace their RSA/DSA keys. Sadly, this has not been done in
the past with those that I have mentioned in previous versions of this FAQ.
However, I have now stumbled upon one whose administrator has promised
faithfully to replace his keys on a monthly basis. This is vastly better than
trusting to luck that nobody has hacked into their site.
In previous versions of this FAQ I have suggested using Cyberpass.net, but I am
very concerned that they have ignored repeated requests from me regarding their
security standards. They have only once in the past 7 years changed their DSA
key. If they have ever been served with a writ to hand over that key, or had
their site hacked (which I do know has happened at least once) then all
subsequent traffic through them becomes transparent if monitored. Their refusal
to answer my requests on whether this has ever happened alarms me to such an
extent that I cannot recommend any more.
You have been warned!
After searching, I have found what may be the answer, Privacy.Li, who are based
in the Principality of Liechtenstein. Liechtenstein is a European country best
known for its secrecy surrounding its banking facilities. This suggests it might
be very useful for routing anonymous connections to the Internet. Better yet,
Privacy.Li accept anonymous payments in either E-Gold or DMT/ALTA. Both of these
are truly anonymous Internet banking systems. I advise investigating both and
choose whichever best suits your needs. DMT/ALTA uses very secure encryption
protocols to ensure secrecy of both your account and your transactions.
Privacy is here: http://privacy.li/
E-Gold is here: http://www.e-gold.com/
DMT/ALTA is here: https://196.40.46.24/ or https://213.132.35.90/ (they change
ip's frequently)
Privacy.Li offer far more than is openly displayed on their Website. They offer
an SSH encrypted connection with port forwarding through either of their own
servers. One server is in The Netherlands and the other is in Hong Kong. Both
well outside the control of either the American or British snoops. The cost of
connection is very reasonable, around 100 Euros/US Dollars per year per server.
By paying in E-Gold or via DMT/ALTA it is a truly anonymous sign-up. I strongly
recommend them if your needs are for total privacy. Contact them yourself and
negotiate direct. See also their site for more info. As stated above they
deliberately do not display their full range of services, as this might
compromise your security.
One important point, Privacy.Li will not tolerate abusive spamming or other
obviously offensive use of their facilities. They will disconnect such spammers
without warning or refund.
Contact via Email: webmaster@privacy.li
You can also use them to register a Domain name anonymously, or get them to
host your Domain on an associates site, I suggest Alpina1.net. To see
what Alpina1 have to offer, go here: http://alpina1.net
It is difficult to over-estimate the significance of this service. They promise
to replace their RSA key every month or so and to Email the key fingerprint to
every subscriber. This is excellent security and should offer a level of
security way above that previously on offer from Cyberpass.
In case anyone is suspicious of this strong recommendation, let me state I have
absolutely no connection with Privacy.Li other than as a very satisfied
customer.
38. OK, this sounds interesting, but how does SSH work?
SSH uses a protocol called port forwarding. This means that it tunnels the
necessary ports for Web browsing (port 80), Email send and receive (ports 25 and
110), Usenet (port 119) through an encrypted tunnel (port 22). Any adversary
attempting to read your data passing in either direction can only know that a/
it is encrypted and b/ it is passing through port 22 on your computer. They
cannot even determine whether you are Web browsing or sending Email.
Note: This is not strictly true. I have heard a spokesman for the
British Government claim that even encrypted traffic can give information of the
type of traffic being passed. But the big idea is that they cannot read that
traffic!
The method is simple but very secure. Your desktop SSH program (called the
client) asks for a connection to the remote host server. The host replies with
its DSA public key. Your desktop checks this key against previous connections
and alerts you if it is different, which might suggest someone was intercepting
your traffic. Your desktop has meanwhile generated a random session key which is
never shown to you. The host's public key is used to encrypt this session key.
The host is able to decrypt it using its secret key. Now using the session key
to encrypt everything that passes between you and the host, it will ask
you for your user id and password. Henceforth all further data are
exchanged encrypted with the session key.
Each time you start the program prior to logging on, a new session key
will be generated. I am reasonably certain that this session key is
not saved by the host server. I have been told that the SSH protocol calls for
the session key to be held in RAM memory only and to be irretrivably lost after
the connection is closed. This means that even if the encrypted data is
recorded, without the session key it will be forever lost. This is why it is so
important that the site admin replace their key periodically. With Cyberpass
anything recorded from years back could be decrypted by serving a writ on them
and obtaining their secret key. This would unlock the session key that was
initially exchanged
between you and Cyberpass. Thus the snoops could come knocking years
after you had forgotten all about that data exchange.
The only caveat here is the assumption that the remote SSH server's RSA or DSA
key (whichever type they use) has not been compromised. Thus the essential need
to use a server that is not easily accessible to snoops.
SSH is available in various implementations and commercial programs. The one I
recommend now is Putty. Putty is a simple program which does
not need an install as it is an Exe type of program. Just click and run.
Putty is free and is available here:
http://www.tucows.com/preview/195286.html or here:
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
The source code is available for inspection
There are many other commercial versions, such as F-Secure.
F-Secure is here: F-Secure: http://www.f-secure.com/
39. Where does the data go after passing through the remote host?
It then goes out onto the Web or to the News Provider totally anonymously. All
your postings and downloads will always be totally private.
40. Is the data encrypted after it leaves the remote server?
Not unless you are using an additional remote host. If you are
careful and limit your time online to say a 1 hour limit, breaking offand
re-connecting you will always generate a new session key. This will make hacking
attempts far more difficult.
41. How do I get onto Usenet?
You must subscribe anonymously to a dedicated and independent news provider such
as Astraweb, Newsfeeds or Altopia. You will need to modify Agent to ensure it
routes data through the encrypted connection.
To find a News Provider that suits your needs, try here:
http://www.exit109.com/~jeremy/news/providers/
Privacy.Li have told me they are prepared to act as a proxy to allow anyone to
sign up with whichever News Provider they wish to use. Obviously you must pay
Privacy.Li in either E-Gold or DMT/ALTA to ensure you are anonymous to them. You
are then doubly anonymous to the News Provider or whatever service provider to
which you have subscribed. It probably does not need mentioning, but credit and
debit cards leave a trail directly to your front door and are utterly useless
from a privacy point of view.
Privacy.Li will surcharge the cost by between 12% over and above the actual
signing up cost.
If you wish to subscribe to a News Provider directly (more bother and only then
has just one level of anonymity) then you could send cash to Astralabs and
possibly others. I know that Astralabs will accept direct cash payments for
their services. If this is your choice, then send your cash her:
Astra Labs Limited
80 Raffles Place
#16-20 UOB Plaza 2
Singapore
048624
IMPORTANT: all cheques/money orders should be made payable to "Astra Labs
Limited" But sending a cheque would defeat the whole purpose.
42. OK, I've signed up, how do I configure Agent and Putty to access Usenet?
In Agent go to Options -> User and System Profile -> System and put
"localhost" in the line for News Server and again for Email Server.
Click OK.
Go to Options -> User and System Profile -> User and under News Server
Login, put your given username and your password. Check "Login with a
Username and Password" and "Remember Password between sessions".
Click OK.
When you sign up with Privacy.Li they will send you a detailed FAQ on how to set
up Putty. It is simplicity itself to configure.
You are now ready to tunnel through to whichever News Provider you signed with.
Likewise, you can browse the Net, visiting sites with complete anonymity.
43. How strong (safe) is this SSH encryption?
Very strong and safe. You may have a choice of algorithms, or You will have to
use whatever algorithms are supported by the host server. 3DES is a popular
choice. Do not allow DES as it is now considered a poor choice. One more thing,
SSH has largely been replaced by the more secure SSH2. Fortunately Privacy.Li
uses SSH2.
Just as a reassurance, both their servers are off shore. One is in The
Netherlands and the other is in Hong Kong. You can choose either or both.
44. Should I run these encrypted programs from within my encrypted drive?
Yes, provided you are using dual boot with DCPP.
45. Can I post graphics anonymously to Usenet with this system?
Absolutely. If you choose to use Agent, it will always use your News Provider as
the posting host. This is why I recommended you subscribe anonymously to this
news provider. Nothing can then be traced back.
If you use Quicksilver it will always use one of the mail2news gateways. These
are intended to be hard anonymous, but it does not yet support the SSH option.
Attempts to put "localhost" into the proxy settings
causes an error on my system. Despite this, Quicksilver can be the
more secure method of sending and receiving Email and for posting to Usenet
where you have only a single layer of anonymity. But the remailer network does
not readily accept large files, such as graphics. This is not a problem as you
can use Agent, provided you are double-layered anonymous.
46. Why Quicksilver, what about Private Idaho or Jack B. Nymble?
I found Private Idaho far too buggy and not as intuitive as Quicksilver. I have
also used Jack B. Nymble. It is very sophisticated, but I prefer the elegant
simplicity of Quicksilver. This is my choice, others are free to assess the
alternatives and choose accordingly.
47. Is there another, simpler way?
Email can be sent (and received) by Yahoo or Hotmail. But I treat
these as soft anonymous. Don't use them for anything critical unless
you can access them via SSH and your anonymously signed for remote host.
Stronger anonymity is by using a paid for service such as that offered by
Privacy.Li or Hushmail.
There are also several freebie remote hosts. My experiences suggest they are
less reliable and frequently down. By all means experiment and use whatever
suits you best. To access Usenet you will need to find an NNTP host proxy, which
are far less common.
Warning: Using a freebie remote host may mask your true IP address, but
that only helps to prevent a back-trace. If you live in a country which
monitors your Net activities, (e.g. the United Kingdom), any snoop will know
which site you are accessing and if so minded, could monitor the
datastream. An SSH connection however encrypts this datastream and most
importantly, thus hides both the datastream and your destination host server IP
from these prying eyes.
In simple terms, you need SSH and a truly anonymously signed up remote host
server if you want true Net privacy.
48. Are there any other suggestions?
Immediately you finish a posting session, break the connection. Close Putty.
This ensures new session keys are generated when you log in again over the new
link. Never stay online whilst posting for longer than 1 hour maximum. There is
nothing to stop you re-connecting as soon as you have dropped the connection,
just do not stay online continuously.
Always post at different times, do not create a regular pattern of postings at
specific times and days of the week. If possible, use different ISP's to log
onto the Net. By all memans use a freebie ISP if available in your area. Be
aware that these freebies invariably log your telephone number and connection
times. But then so do the others to a varying extent.
It is vital and axiomatic that all your secret data must always and at all times
remain within your encrypted drive. There is very little point at all in going
to all this bother and then printing out the data or saving it onto a plaintext
drive. Always assume you are about to be raided!
Always back up your data onto CDROM or DVD using secure encryption. BestCrypt is
an excellent choice here with its hidden container facility.
49. Surely all this is totally over the top for the majority of users?
It is certainly over the top for 99 per cent of users for 99 per cent of the
time. If, however, you are the one in a hundredth and you do not much like the
idea of being at risk for 1 per cent of the time, then no, it is not over the
top at all.
In any case, using these tactics helps create smoke which in turn helps protect
those who really do need all the protection and security they can get.
Remember this FAQ is intended to help many different people. Some may be living
in deprived conditions, in countries where human rights abuses are a daily fact
of life.
Privacy and anonymity are very important principles associated with both freedom
of speech and democracy.
"Anonymity is a shield from the tyranny of the majority... It thus
exemplifies the purpose behind the Bill of Rights, and of the First Amendment in
particular: to protect unpopular individuals from retaliation - and their ideas
from suppression - at the hand of an intolerant society."
Justice Stevens, McIntyre v. Ohio Elections Commission, 1996
If a Supreme Court Judge deems it a person's right, who would argue?
50. Can I use IRC/ICQ/Yahoo/MSM in this way?
No. But you can use a program called Trillian. There is now a Pro version which
will allow an encrypted conversation between a group and even allows file
exchange (I believe). I have only used the beta version, text only. It appears
to do all they claim for it. Both parties need to be using Trillian for the
encryption to be effective. You can use it as a stand alone, but it will not
then support encryption.
Trillian is here: http://www.trillian.cc
If your intention is to seek to correspond with others to exchange contentious
or illegal material, be aware that encryption alone may not be sufficient. In
those circumstance it might be a very good idea to ensure you understand how to
use a proxy before connecting.
I regret I cannot offer any help in this matter, as I have no experience of
using IRC or Yahoo.
51. Can I be anonymous as far as other Web sites are concerned?
Yes, by either using the Anonymizer browser plug-in or by setting up MSIE or
Netscape to use your remote host as a proxy. I recommend using your remote host
with the SSH protocol.
There is also a new system that is becoming available called Freenet. Read all
about Freenet here: http://freenet.sourceforge.net/
If you do choose to use it, be aware it is still in its infancy and some care
needs to be taken, particularly with regard to the choice of Browser. Under no
circumstances use MS Internet Explorer! The site gives more information
regarding browsers, read it carefully. At present it does not appear to support
an SSH tunnel. Pity. I am very old-fashioned and prefer the SSH option for the
present. But by all memans experiment.
52. Lastly, what do you say to the charge that this FAQ may be useful to
criminals?
I did take time to have a re-think after the events of 9/11. However, on balance
I believe it is still the right thing to do. Like gun control, if we ban weapons
only the police and criminals will have them. Banning encryption or anonymity is
not going to make criminals stop using encryption or attempting to be anonymous.
It is almost laughable for anyone to be so naive as to believe that passing any
law would make the least difference to a criminal.
I believe that the individual should be allowed to choose, not the Government on
his behalf.
Who benefits the most if Governments are allowed to reduce our freedom
of choice? The Government or us?
Those that give up a little freedom to gain a little security will lose both.
Therefore:
a. always use encryption, whatever else you do.
b. always post via your encrypted and anonymous remote host to your
anonymouly subscribed News Provider.
c. never ask of anyone nor give anyone online, your true Email
address.
d. never DL any file with .exe, .com or .bat extension from a dubious
source. If you do, don't run it.
e. for your own protection, never offer to trade any illegal material,
nor ever respond to those seeking it, even anonymously.
f. never use your Credit/Debit Card to sign up to any contentious
Web site.
My key fingerprint: F463 7DCB C8BD 1924 F34B 8171 C958 C5BB
My user id: 0x14A606A7
- - - - - - - - - - - - - - - - - - - - - -----BEGIN PGP PUBLIC KEY
BLOCK-----
Military Build - Ver 6.5.8mil
mQENAza3VwsAAAEIAJoghtgM5IW0CmQOocBDJPUSDAlkaPkP4LVN/6I6U1qYXYSX
slRiXL6R8/L5LiYGjc8+jkK0MbpTh7W4WiT35L31kX2EU/MSNlpawvpwTvaye8cz
Kbwupsi7qtxVEETM11ucSuxtG8ShOwiYrMUqOmP93hf9h78gNzD/qGOYGV994Adt
MHRZ4lPlQnknxoDszHxCDcS83jlo4mD1xhuvLQ1thXFkGBl9Bw/lSWDxcu0gssZB
necFTSkFtJbnu3gHp6DVE9CO/ZxhXDGHAmC/jLfB5QH59Zbbw4fFgQ7tw2gUAgiS
kvv0RS55TB9n7JiDwc+Mk0OlYavdZOh5cRSmBqcABRG0JURvY3RvciBXaG8gPGRv
Y3Rvcl93aG9AbnltLmFsaWFzLm5ldD6JARUDBRA2t1cLZOh5cRSmBqcBAb87B/46
wEezqswaPz8NIA0/XYULXPKse11aCgRL7MIQPO1CRdqjbFnWi1wU2AnAkCtCLia+
lhulNrLJxMUvHgOQc4oC+nlUntBE9f8hHg0VwvQJ/4kO29UeVf0iwr+drZjRJooR
oR1C1UDDr199eeKJ3+m2pO7j1DBxv4tWQAYsJmZQQqlNRLzsmHJyTI/ZN03UREAZ
Qr4k6EjD1lScWg9MfueITgiMdbeV3MmCpf7mnlahvlN/S31CeEfoY2OpcRYVXNQb
it9N8cPM+2KZEdl/FW7yVPgd6BCGFFgPcRiqLC7c1F6qBPUpbdYf/pvd3/lhRJR9
IY35xfmdHWM8Rk+ivIPD
=0l2S
- - - - - - - - - - - - - - - - - - - - - -----END PGP PUBLIC KEY BLOCK-----
This ends the FAQ.
Items specifically mentioned or recommended in the FAQ:
PGP: http://freepages.computers.rootsweb.com/~irfaiad/
DCPP: http://www.drivecrypt.com
BestCrypt: http://www.jetico.com/
Scramdisk: http://www.samsimpson.com/scramdisk.php
Kremlin: http://www.winhex.com/winhex/order.html
WinHex: http://www.winhex.com/winhex/order.html.
Windows Washer: http://www.webroot.com
Agent: http://www.forteinc.com
ACDSee: http://www.acdsystems.com/english/products/acdsee/index
Thumbs Plus: http://www.cerious.com
VuePro: http://www.hamrick.com
WinZip: http://www.winzip.com
AVG here: www.grisoft.com
Zonealarm: www.zonelabs.com/zonealarmnews.htm
Steve's site: http://grc.com/
SSL Proxy info: http://www.jestrix.net/tuts/sslsocks.html#intro
Privacy is here: http://privacy.li/
E-Gold is here: http://www.e-gold.com/
DMT/ALTA is here: https://196.40.46.24/ or https://213.132.35.90/ (they change
ip's frequently)
Quicksilver, available here: http://quicksilver.skuz.net/
Jack B. Nymble: http://www.skuz.net/potatoware/jbn/index.html
The Anonymizer: http://www.anonymizer.com
Privacy.Li: http://www.privacy.li/index.htm
A Proxy site listing: http://www.samair.ru/proxy/
Putty.exe:
http://www.tucows.com/preview/195286.html or here:
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
F-Secure: http://www.f-secure.com/
News Providers: http://www.exit109.com/~jeremy/news/providers/
Freenet: http://freenet.sourceforge.net/
Scorch and Scour: http://www.bonaventura.free-online.co.uk/
Trillian: www.trillian.cc
Mixmaster (required by Quicksilver and Jack B. Nymble):
Download site: http://www.thur.de/ulf/mix/
(comes ready to install with Quicksilver - just run
Quicksilver for the first time)
Nym remailers:
nym.alias.net, home page: http://www.lcs.mit.edu/research/anonymous.html
Anon.efga.org, home page: http://anon.efga.org/
In case you need convincing:
http://www.gn.apc.org/duncan/stoa_cover.htm
Useful programs:
Partition Magic: http://www.powerquest.com/
Some anonymity sites:
http://www.worldnet-news.com/software.htm
http://www.skuz.net/potatoware/index.html
http://www.skuz.net/potatoware/jbn/index.html
http://packetderm.cotse.com/
http://www.cotse.com/refs.htm
http://freeyellow.com/members3/fantan/pgp.html
http://www.all-nettools.com/privacy/
http://Privacy.net/
http://www.geocities.com/CapeCanaveral/3969/gotcha.html
http://www.junkbusters.com/ht/en/links.html
http://www.skuz.net/potatoware/privacy.txt
Other additional useful sites:
Beginner's Guide to PGP:
http://www.stack.nl/~galactus/remailers/bg2pgp.txt
PGP for beginners: http://axion.physics.ubc.ca/pgp-begin.html#index
FAQ for PGP Dummies: http://www.skuz.net/pgp4dummies/
The PGP FAQ: http://www.cryptography.org/getpgp.txt
The SSH home page: http://www.ssh.com/products/ssh/
Anonymous Posting: http://www.skuz.net/Thanatop/contents.htm
Anonymity Info: http://www.dnai.com/~wussery/pgp.html
Nym Creation: http://www.stack.nl/~galactus/remailers/nym.html
General info: http://www.stack.nl/~galactus/remailers/index-pgp.html
Revision 17.8
-----BEGIN PGP SIGNATURE-----
Version: 6.5.8ckt http://www.ipgpp.com/
iQEVAwUBQBBoE2ToeXEUpganAQGXxgf/SvgIo7PTaPk+aJ5zTV444V5LxfMZH7md
EC9Ej7uO/psLBhDnPsWcczPc2toPnBlF3PCaT6ZSd2GH5VOCGcPSarq94qzNcWJJ
QQpiKQj1V6baTeUnMU8jWfJbMFzYcydnnOka0WMgX0M1YbCmFcQ3/G57bY6FYQ1z
uvxNgffPbMDmc1Mpw0PCxFSsCQu/sHBCy/y+yg/n/F73/mpNqzVGsgOiK474Rdy5
JFeTo3wXLKQggTZvK0A5PC3Acrw7p2H0uozybUgNryZVVljfBpw1aNC3qAOkHQvc
IYMn32W4YklbmRe4uYdvgLDO1K8Uje0GYfm3F5EnBiWiieSPxvB3Jw==
=Ulwl
-----END PGP SIGNATURE-----
|