Becoming Virtually Untraceable- “eps10_F0rm4t C:\*.*_W!pE.py”

Credit: Amino Apps

How Government Overreach Affects Your Data Privacy

Seal of the NSA
Website domains targeted by the Shadow Brokers group following the 2016 NSA hacking exploits leak

Featured Privacy Tactics, Techniques, & Procedures

Credit: IBM

Data Virtualization

Credit: TAILS operating system

Privacy Enhancing Technologies

  • Randomized host IP addresses
  • Using pseudonyms/aliases online
  • Using shared accounts or credentials to randomize usage
  • Data obfuscation techniques that make it harder for algorithms or bots to trace identities
  • Limited disclosure technology
  • Data transaction logs that users of services can check to see what data of theirs was collected, the time/date, etc.

Spotlight Data Privacy Issues

A cell phone tower disguised as a palm tree. Aesthetics or covert camouflage?

Google referred to the minor detail having been omitted as “an error on our part.”

Low-Tech Security: Evasion and Anonymity Tips

  • birth certificates (for you and your family)
  • marriage (and divorce) certificates
  • immunization and/or other medical records
  • diplomas/degrees/awards
  • precious, irreplaceable photos and/or video media as well as photos/videos of your valuables in case they are lost/stolen/destroyed because the insurance company will ask for them
  • tax statements and supporting documentation (takes us less space digitally)
  • legal documents like living trusts, powers of attorney, and wills
  • passports
  • drivers license, social security, or other types of ID cards (e.g., military, VA card)
  • scans of the front/back of all your wallet credit cards in case it is ever lost or stolen, you can easily call the company and replace them
  • other important financial/banking documents (most of this type of stuff is available electronically now for download)
  • a laptop computer
  • backup batteries to charge your laptop/phone
  • a smartphone that can also serve as a Wi-Fi hotspot
  • Cash and credit cards (only paying with credit cards is safer than using debit cards online); not every merchant accepts Apple Pay, Google Pay, or Samsung Pay
  • firearms and ammunition
  • non-perishable food and water (bottles with water filters for use in lakes/rivers/streams)
  • medicine
  • extra clothing and all-purpose (tennis) shoes

Additional Privacy Resources

--

--

--

the salty chronicles of one bumbling infosec engineer’s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Exorde ambassador program.

{UPDATE} Grand Defense Hack Free Resources Generator

MoonSwap has completed 16BURNs

An error occurred while loading the troubleshooter? Here are the Fixes

How to create a MetaMask Wallet & Claim your Lost Boys NFT

{UPDATE} Mystery of the Ancients: Dolch Hack Free Resources Generator

TryHackMe Writeup— Vulnet: Internal

The Lab Finance: Migration from V1 to V2 LP’s

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
꧁𓊈𒆜🆉3🆁🅾🆃🆁🆄🆂🆃𒆜𓊉꧂

꧁𓊈𒆜🆉3🆁🅾🆃🆁🆄🆂🆃𒆜𓊉꧂

the salty chronicles of one bumbling infosec engineer’s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

More from Medium

Questioning the Wisdom of Equipping Adversaries with Free Offensive Security Tools

Stealing Passwords From Clipboard

When thinking of phishing, you might think of ‘Winning the Nigeran lottery’ or ‘Paying a small…