Becoming Virtually Untraceable- “eps9.0_syst3m_da3m0n5.dat”

Rami Malek of the “Mr. Robot” TV series; credit: USA Network

Adopt an Adversarial Mindset to Avoid Victimization

Credit: Tale of Ronin

Why Adopting an Adversarial Mindset is Extremely Important

Parents need to be aware of the suicide challenge #MomoChallenge

Know Your Adversary

Transform Yourself Into a Fortress by Applying the Adversarial Mindset to Everyday Life

A statue of Saint Michael, the Archangel
  1. Look at your physical defenses: physical fitness; the 3G’s (gates, guns, guards) as in does your dwelling have security gates, bars on the windows? Does it have a home alarm system connected to a 24/7/365 home monitoring service that will notify the fire or police department should you suffer a disaster or home invasion? Do you have weapons? If so, do you know how to use them? When was the last time you practiced with these weapons? Do you understand the legal ramifications should you have to one day use these weapons in self-defense? When are you legally allowed to defend yourself, your property, your family/friends with respect to the local laws? Are you staying fit and strong, that is to say, are you capable of reasonably defending yourself from an assailant? Some people look at fitness as only being about physical and mental health, but it can always be a very critical factor in whether you will be able to defend yourself or your loved ones in a split second.
  2. Look at your mental defenses: are you leaving yourself open to attack? Do you often overshare with others the intimate details of your life? Do you believe in something greater than yourself? There’s a wise saying that says, “If you don’t stand for something, you’ll fall for anything.” Very true indeed, we all need internal fortitude to remain who we are and stand up to adversity in life. Take a little time for self-reflection each day. You can couple this time with something else that you enjoy doing such as working out, practicing martial arts, meditation, walking or around the neighborhood, or running trails, whatever your thing is. Just be yourself in this life, but be careful both in your physical actions and online in the digital world because there are predators and dangers everywhere. Though it may seem impossible with everything you have going on presently in your life, sometimes it’s good to slow down and take inventory of where you are in life and what your goals and motivations are. This will help you keep important aspects of your life in focus. Keeping a written or digital journal can help with this. Of course, there are apps for that also if you want to go that route. But you’re often better off devising your own system. There will always be demands in your personal and professional life that will test your nerves, stress you out, and sometimes this can degrade you to the point of leaving you vulnerable to attack. It might be wise to slow things down a bit and reflect for a moment on what’s really important. All of those work projects will still be there tomorrow morning.
  3. Look at your digital defenses: how much of an online presence do you have? Do you use social media and if so, do you use real names and post photos and videos of yourself and family/friends? Do you take the time to scrub your photos/videos of metadata before posting them online? If you’re a parent, do you consider the ramifications of posting pictures of your children on social networking sites considering mass surveillance, artificial intelligence, and facial recognition systems being employed? Does your email address contain your full or partial name? If so, why? Business or work emails often require the use of full or abbreviated employee name variations but your personal email address shouldn’t automatically identify you to others. Do you let smartphone apps access your geolocation, contacts, photos, and files? Have you not heard about the Facebook app sharing data with several other companies without your permission? Do you have a firewall turned on (e.g., Windows Defender or similar product) at home? Do you pay for a Virtual Private Network (VPN) service? Are you in the habit of throwing cyberstalkers off your trail by posting disinformation online? Do you use a different password for every site you have an account with? If not, you’re rolling the dice. This is one reason why password managers are great. You can have them generate incredibly long and complex passwords if you want, but remember that length is more important than complexity for password entropy. With password managers, you only need to remember really long passphrases (consider using a passphrase of 25+ characters) instead of a bazillion other short-length passwords. Don’t upload a picture of yourself and just have the generic silhouette for your photo.

What Does Adopting an Adversarial Mindset Have to do With Becoming Virtually Untraceable?

Threat Modeling

Example of a Network Threat Model; credit: joetheitguy.com
  1. What is it that requires protection?
  2. Who is likely to try to attack it?
  3. How might they try to attack it?
  4. What’s in it for an attacker?
  5. What security measures will you implement to prevent, detect, and respond to threats and vulnerabilities?

Featured Privacy Tactics, Techniques, & Procedures

“As a general rule, employees have little expectation of privacy while on company grounds or using company equipment, including company computers or vehicles,” said Matt C. Pinsker, adjunct professor of homeland security and criminal justice at Virginia Commonwealth University.

According to a survey conducted by Dtex Systems, “77 percent of employed Americans would be less concerned with their employer monitoring their digital activity on personal or work-issued devices they use to conduct work, as long as they are transparent about it and let them know up front.” — Business News Daily

Spotlight Data Privacy Issues

Apple’s FaceTime App Bug

Google Jumps Into Facebook’s Dumpster Fire & Apple Blocks Both

Credit: Adult Swim

As reported by Business Insider, the conversation according to SAI sources, went as follows.

Zuck: Yeah so if you ever need info about anyone at Harvard

Zuck: Just ask.

Zuck: I have over 4,000 emails, pictures, addresses, SNS

[Redacted Friend’s Name]: What? How’d you manage that one?

Zuck: People just submitted it.

Zuck: I don’t know why.

Zuck: They “trust me”

Zuck: Dumb fucks.

Low-Tech Security: Evasion and Anonymity Tip

***Trust No One. Verify Everything. Leave No Trace.***

Additional Privacy Resources

--

--

--

the salty chronicles of one bumbling infosec engineer’s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Lakhta manager is accused of forgery

Sikoba May 2020 — Update

You Got It Wrong. GDPR Is A Data Protection Problem More Than A Privacy One

Best Practice for Password Safety in eCommerce: Part 1

Hackers Stole My Website…And I Pulled Off A $30,000 Sting Operation To Get It Back

Worried about Whatsapp Policies? Have a Look at How BSNL Is Making a Joke Out of Your Privacy

1 Minute To Become A Better Developer (#10)

Let’s Talk About Digital Marketing & Analytics Ethics

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
꧁𓊈𒆜🆉3🆁🅾🆃🆁🆄🆂🆃𒆜𓊉꧂

꧁𓊈𒆜🆉3🆁🅾🆃🆁🆄🆂🆃𒆜𓊉꧂

the salty chronicles of one bumbling infosec engineer’s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

More from Medium

Sure, Sex is Great But Have You Heard About the Principle of Least Functionality?

Silent AirTags with no speakers are being used for stalking

How your laptop can be hacked at the Airport

Cybercriminals are shipping out ransomware-infected USB devices