Becoming Virtually Untraceable — 12.0_Gh0st_Us3r.dll

Credit: The Mind Unleashed

Obligatory Privacy Rant

Debugging Privacy To Become Untraceable

Image from Mr. Robot Season 3.0_power-saver-mode.h (note that Orwell’s “1984” is spray-painted on wall)
  • He possesses a healthy amount of paranoia that somebody is always out to get him. This, though admittedly seems ridiculous, will keep a person safe 99% of the time because the mindset forces you to think about how to be untraceable.
  • He goes to great lengths to hide his vigilante hacker research by using digital steganography to secretly embed his files into .mp3 music albums (See: DeepSound) so if they are discovered, they won’t suspect hidden files are contained therein.
DeepSound Audio File Steg App
  • His Operational Security (OpSec) is strong, meaning he doesn’t have “loose lips that sink ships” as the saying used to go back in the old times. Don’t freely give out information to people you don’t know or trust.
  • Elliot knows how to remain anonymous online and is skilled in information gathering.
  • He has no social media profiles including Facebook.
  • He uses a piece of tape to cover his laptop webcam to prevent other hackers from spying on him.
  • He is not tied down with owning a lot of material possessions, which although has little to do with untraceability, has everything to do with living a portable, digital nomad type of lifestyle where you can pick up and go in a hurry if need be.

Satellites Are Spying On You Constantly

But So Is Social Media…

Featured Privacy Tactics, Techniques, & Procedures

The Privacy Forecast is Cloudy

Credit: Someecards
Tarriss GoDark Faraday Bags ($49.97 at time publishing) for phones, tablets, HDDs, other electronic devices

Importance of Data Redundancy

Low-Tech Security: Evasion and Anonymity Tip

Sample Batman Threat Model; credit: Sean Gallagher for Ars Technica

Additional Privacy Resources

--

--

--

the salty chronicles of one bumbling infosec engineer’s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How start-ups can utilise IT to compete with the big boys — Part 3: Security, Business Continuity &…

The Microsoft team has discovered a new malware for Microsoft Windows that is known to target the…

We are extremely delighted to announce our upcoming partnership with WasabiX, a cross-chain yield…

{UPDATE} Conceptis Kakuro Hack Free Resources Generator

Secret Network in the fight for privacy on Web 3

Engineering Security into Cloud Systems

The end of Privacy?

{UPDATE} francotirador moderna más allá de los bosques Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
꧁𓊈𒆜🆉3🆁🅾🆃🆁🆄🆂🆃𒆜𓊉꧂

꧁𓊈𒆜🆉3🆁🅾🆃🆁🆄🆂🆃𒆜𓊉꧂

the salty chronicles of one bumbling infosec engineer’s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

More from Medium

Back to Basics: Hardening Computers & Smartphones

I Have Nothing To Hide

18.5 million websites are ready to hack their visitors

How To Hack A Paywall