Security and Encryption FAQ - Revision 20.2

  • Thread starter Thread starter future
  • Start date Start date
F

future

Guest
Security and Encryption FAQ - Revision 20.2

by Doctor Who


"No one shall be subjected to arbitrary interference with his privacy,
family, home or correspondence, nor to attacks upon his honour and
reputation. Everyone has the right to the protection of the law
against such interference or attacks."

Article 12 Universal Declaration of Human Rights


This FAQ/Tutorial is offered in good faith and is intended to be an
encapsulation of my knowledge and experiences gained over the many
years that I have been a computer/Net user. There are many roads to
security and privacy on the Net, this is just one that I have
personally pursued and can recommend from experiences gained.

There are countless reasons why someone may need the reassurance of
anonymity. The most obvious is as a protection against an over-bearing
Government. Many people reside in countries where human rights are
dubious and they need anonymity to raise public awareness and publish
these abuses to the world at large. This FAQ is to help such people.
Privacy and anonymity are very important principles associated with
both freedom of speech and democracy.


"Anonymity is a shield from the tyranny of the majority... It thus
exemplifies the purpose behind the Bill of Rights, and of the First
Amendment in particular: to protect unpopular individuals from
retaliation - and their ideas from suppression - at the hand of an
intolerant society."

Justice Stevens, McIntyre v. Ohio Elections Commission, 1996


This is a follow-on to the major revision 20. This latest revision
now includes a method for achieving a high level of anonymity for your
Email using Quicksilver.

It is assumed that plausible deniability is an essential requirement to
the reader and the FAQ is slanted with this in mind.

Part 1 offers an overview approach to achieve security and anonymity.
It is intended for the less knowledgeable user, perhaps someone new to
computers and especially the Internet.

This first part can be skipped by the more knowledgeable user.

Part 2. In the second part will be the practical implementations of
some of the programs mentioned in Part 1. In some cases this will
include detailed setup instructions to help achieve the goal of true
computer and Internet privacy and anonymity.

Links to the various programs mentioned are at the end of Part 2.



Part 1


1. How does encryption work?

Essentially the plaintext is combined with a mathematical algorithm
(a set of rules for processing data) such that the original text cannot
be deduced from the output file, hence the data is now in encrypted
form. To enable the process to be secure, a key is combined with this
algorithm. The key is protected by a passphrase. Obviously the
process must be reversible, but only with the aid of the correct key.
Without the key, the process should be extremely difficult. The
mathematics of the encryption should be openly available for peer
review. At first sight this may appear to compromize the encryption,
but this is far from the case. Peer review ensures that there are no
"back doors" or crypto weaknesses within the program. Although the
algorithm is understood, it is the combination of its use with the
passphrase that ensures secrecy.

Thus the passphrase is critical to the security of the data.



2. I want my Hard Drive and my Email to be secure, how can I achieve
this?

You need PGP (Pretty Good Privacy) for your Email and DCPP (DriveCrypt
Plus Pack) version 3.0 or TrueCrypt version 2.1 for your hard drive
encrypted files.

Both DCPP and TrueCrypt are known as OTF (On-The-Fly) type programs.
OTF means the encrypted data is only decrypted into RAM (Random Access
Memory) and remains at all times encrypted on the drive. Thus a crash
close will not leaves packets of plaintext on your drive. A very
important feature.

PGP is available for all versions of Windows, Linux, Unix, Mac and
others. The source code is available for compiling your own version
should you wish.

DCPP is Win2000/NT/XP compliant but not compliant with Win98 or
earlier. Regrettably, no source code is available. It has two unique
advantages over other encryption programs. 1. It is a whole boot drive
encryption program. 2. It offers a form of very good plausible
deniability. More on this later in the FAQ.

TrueCrypt is a new, free and open source program of great promise.

As with DCPP it does not display any file header info to help a snooper
identify the file's purpose. The header is encrypted and just shows as
random garbage. It also allows encryption of a whole partition or
drive and again does not display any info to help an attacker. The
source code is freely available so it means anyone with the ability can
compile the same program. The importance of this cannot be too
strongly stressed. It means the risk of a hidden back-door is
virtually eliminated.

Securstar the owners of DCPP also offer another program somewhat
analogous to Truecrypt. It has the disadvantage of being closed source
and not free, but offers the option of a hidden container within the
outer encrypted container (or partition). It is called somewhat
ambiguously, DriveCrypt.

DCPP, DriveCrypt and TrueCrypt have an additional crucial feature, they
all offer strong plausible deniability - see later in the FAQ.

If the sighting of the source code is important to you, I suggest using
PGP and TrueCrypt.

Note 1: PGP, although excellent to ensure your Email privacy, does
nothing for anonymity. The difference is crucial.

I will assume that anonymity is also very high on your list of needs
and so will concentrate on that issue further down the FAQ.



3. What is the difference between these encryption programs?

One of the difficulties before asymmetrical key encryption was
discovered was how to get the key to the person wanting to send you an
encrypted message. In the past trusted couriers were used to get these
secret keys to a distant location, maybe an overseas embassy. Nowadays
this is unneccessary because of the discovery of what is called public
key cryptography. Two different keys are used. One key is secret and
the other is made public. The most widespread program of this type for
home and private use is PGP, invented by Phil Zimmerman. In fact it
has become the de facto standard on the Net. This program is ideal for
Email.

Anybody sending you mail simply encrypts their message to you with your
PGP public key. It is analogous to someone sending you a box and a
self locking padlock for you to send them secret papers, when only they
have the key to open the box.

The public key is obviously not secret - in fact it may be spread far
and wide so that anybody can find it if they wish to send you encrypted
Email. The easiest way to ensure this is by submitting it to a public
key server. Despite this facility, some prefer not to share their key,
except within a small closed group. Your choice.

The only way to decrypt this incoming message is with your secret key.
It is impossible to decrypt using the same key as was used to encrypt
the message, the public key. Thus it is called asymmetrical encryption.
It is a one way system of encryption, requiring the corresponding secret
key to decrypt. PGP is simplicity itself to install and use. It even
offers to send your newly generated public key to a key server.

Another very important advantage of PGP is it allows the option of a
digital signature. This is the digital equivalent of someone signing
a letter. Only this signature is very difficult to forge, unlike a
paper and ink signature. This proves both the authenticity of a message
and that it has not been tampered with.

For your normal hard drive encryption, you will need a symmetrical type
of encryption program. This means the same key is used for both
encryption and decryption. DCPP and TrueCrypt are of this type and
especially good because they are OTF (On-The-Fly) type programs.

Both DCPP, DriveCrypt and TrueCrypt use the passphrase to encrypt a
randomly created key. In DCPP this is stored encrypted in the keystore
and in DriveCrypt and TrueCrypt it is encrypted within the header and
the plaintext of the key is the device used to encrypt (and decrypt)
the contents of the disk on an as needed basis into RAM memory.

One question often asked by newbies is whether the passphrase is stored
somewhere within the encrypted file. No. The passphrase is passed
through a hash, such as SHA-1. It is the hash output that is stored
within the headers of the encrypted container. The program will
compare this hash with the hash it produces from your passphrase that
you type in to mount (open) the container. If they are identical, the
program will use your passphrase to decrypt the key that the program
generated to encrypt the disk or container. It is this key that will
then be used to decrypt the disk or container on the fly.

Hashing is a one way action only; it is impossible to derive the key
from the hash output. The hashing process is simply a way of checking
that the correct passphrase has been input. If the program was somehow
altered to force it to use an incorrect passphrase, the output would be
garbage.



4. I have Windows, am I safe?

Windows is a closed source operating system which is a law to itself.
Each new update that is released by Microsoft seems to need more
updates to fix the security holes discovered in the first releases of
the update. It has been an ongoing process over many years with no
end in sight.

These weaknesses can manifest themselves as security holes when on the
Net. A further problem with this operating system is its seeming
determination to write to your hard disk all sorts of information that
may be hidden from your view in all sorts of places that could be found
by a forensic examination of your computer.

This is a two fold problem. Firstly, the problem of Windows having
the potential of security holes that might be exploited by snoops and
hackers using the Net and a different security problem of writing all
sorts of information to sometimes hidden folders that might not be
obvious by a cursory check by you, but easily found by a forensic
examination.

If you wish to protect yourself from these potential weaknesses you need
to first of all have an effective firewall and an effective anti-virus
program. That will hopefully help to minimize the threats from outside.
That is only the start. You also need to replace your Windows Internet
Explorer browser for something a lot more secure. I like FireFox or
Mozilla. Even these need strengthening by the use of specialist
programs. More about that later in the FAQ.

Secondly, you are well advised to encrypt your whole drive to protect
yourself from what Windows will write to your hard drive. There are
so-called wipe and cleaner programs to remove cookies and many other
files that Windows will save to your hard drive for future reference.
But at the end of the day, the only truly effective counter measure
against these potential weaknesses is to encrypt your whole boot drive.

In some countries, even this might not be enough. Such countries can
force you to hand over your passphrases to these encrypted drives on
pain of imprisonment. As more and more judicial systems seem to be
leaning ever closer to this sort of injustice (injustice because the
culprit is being forced to self-incriminate himself which is in direct
violation of Article 5 of the Bill of Rights. The right to refuse to
be a witness against oneself.)

Because of these encroachments on our liberty I propose a method of
plausible deniability. This means you can justify all your files and
folders that are on your computer.



5. Which program do you recommend for this whole drive encryption?

Unfortunately, there is at present no modern whole boot drive
encryption program with open source which also allows a hidden
operating system accessible on boot. Of the many different boot drive
encryption programs, I like DCPP. It is truly simple to install. The
new and vastly improved key registration process is helpful. But best
of all it offers truly excellent plausible deniability for its
presence on your system.

It encrypts the whole partition. So if you want to keep part of your
drive in plaintext you will need to divide your hard drive into
independent partitions or have two separate hard drives. Unlike both
DriveCrypt and TrueCrypt, it does not destroy the data within the
partition it encrypts. This is obviously essential as its main
advantage is its ability to encrypt your boot drive.

A further major advantage over previously recommended encryption
programs is that the passphrase is input at Bios level, before Windows
is loaded.

The importance of this is difficult to over-emphasize.

This means it is impossible for any software key-logging program that
may be on your computer to detect your passphrase. Such programs are
sometimes picked up on the Net or arrive via Email and could circumvent
all your efforts at security. It is even conceivable that a snooper or
hacker could steal your passphrase as you type it in, if this is done
whilst the operating system is running. I am sure someone will mention
that there are hardware keyboard logging devices which of course could
grab your passphrase when you start up.

However, common sense local site security should minimize this risk.

A Bios level input of the passphrase in conjunction with whole boot
drive encryption is just about the Holy Grail of security - without
a hardware keyboard logging device, very difficult to intercept and
snoop.



6. Are there other OTF programs?

Yes, there are several. But so far as I know only DCPP operates from
boot and includes the opportunity of creating a second (hidden) boot
operating system.

Others, such as TrueCrypt only encrypt data files, not the Windows
operating system.

TrueCrypt also offers strong plausible deniability because it allows
you to encrypt a partition that appears to be unused and without a
drive letter. The method of ensuring this is simply explained in the
manual that accompanies TrueCrypt. The author must be congratulated
for doing an excellent job of this program.

It is important to note that just simply publishing the source code
does not guarantee safety. It just means the author is allowing his
program to be subjected to peer review. Hopefully many will take the
trouble to go through the code and compile it for themselves.



7. How difficult is it to break one of these programs?

Very difficult, in fact for all practical purposes, it is considered
impossible. In most cases, the weakest link will be your passphrase,
or being compromized by a key-logger through not having good security
on your desktop.

Your passphrase should be long. Remember, every extra character you
enter makes a dictionary search for the right phrase twice as long.
Each time a bit is added it doubles the number crunching time to
crack into the program.

Each keyboard character roughly equates to 8 bits, and is represented
on the drive as two hexadecimal characters. This suggests a 20
character passphrase is equal strength to the encryption. In practice,
probably not. Remember a keyboard has around 96 different combinations
of key strokes, thus multiplying this number by itself 20 times is a
hugely large combination, ensuring a high probability of defeat at
guessing a passphrase. But few people can remember a truly random 20
character passphrase. So most people use a less than random one. This
means it should be longer to help compensate for this lack of entropy.

You should also use at least part of both lines of the passphrase
input screen with DCPP. If you like, two passphrases.



8. Why?

Because any passphrase cracker cannot find the correct key until it
has exhausted a key search as wide as the last character you enter. A
strong hint that you should make sure the last character of your
passphrase is well along the bottom line! For higher security you
should spread it around on both lines.

Although TrueCrypt has a single line entry it will accept a long
passphrase of at least 57 characters from my simple tests.

Be sure that if any serious snooper wants to view your secret data,
they will find a way without wasting their time attempting a brute
force attack upon your DCPP or TrueCrypt container. In some countries
rubber hose cryptography may be the rule. In some "civilized"
countries there are more sinister methods, such as tempest or the use
of a trojan (see later in FAQ).

Fortunately, tempest and trojan attacks are far less likely to succeed
against DCPP than all the other programs. Hence my strong and
enthusiastic support for this program.



9. What about simple file by file encryption?

I recommend either PGP Tools which comes free with PGP or Kremlin. Of
course this is not necessary for files within your encrypted drive.
But is essential to clear files off your computer that are outside your
encrypted drive.

PGP Tools is a long winded process just to encrypt a single file, as it
asks you to first choose a key before entering the passphrase. Kremlin
is quicker because it allows you to right click on the file to be
encrypted, a password box opens and that is it. It also similarly
allows you to wipe any file by right clicking. This can also be done by
PGP. Another recommended program to erase individual files is Eraser.



10. How can I encrypt files on a floppy?

Use either TrueCrypt, DCPP, PGP Tools or Kremlin.



11. Does using Encryption slow things up?

Negligibly on any modern computer. The length of your passphrase is
immaterial to the speed of decryption. But different encryption
algorithms vary significantly. One of the fastest is Twofish and
probably the slowest is 3DES (triple DES). This applies only to
symmetrical encryption programs. PGP uses RSA generated keys, which
in turn are used to encrypt/decrypt a randomly generated session key.
The RSA key is very slow, but as it is only used to encrypt/decrypt the
128 bit CAST5 or IDEA session key its slowness is not noticed.



12. Do I need a PGP passphrase if I store my keyrings within my
encrypted drive?

Definitely. Just because you have encrypted your drive does not relieve
you of the necessity of protecting yourself whilst online.



13. I use Mac, OS2, Linux, (fill in your choice), what about me?

Use either BestCrypt (by Jetico - do a Google search) or PGPDisk.

There are others, but I know nothing about them.



14. How can I ensure I do not leave traces of unwanted plaintext
files on my system?

If you are using DCPP this should not be a problem. But one thing
that needs addressing is the possibility of Windows dumping your
keyfile data which is held in RAM memory only, onto the encrypted
drive. To avoid this catastrophe you must disable the Windows
hibernation (power saving) feature. When Windows goes into
hibernation it will dump everything that is in RAM memory onto the
boot drive by-passing the DCPP drivers. By-passing these drivers
means it writes everything to disk in plaintext including the keyfile
data, which unlocks your most secret partition. This will defeat the
whole purpose of having encryption.

Although your whole drive will be encrypted I would still install a
program to clean out bloat and cookies. My recommendation for this is
Windows Washer.

To wipe unused space on your drive I recommend Zapempty. Although a
Dos based program, it runs easily even within Win XP. This is a part
of a zipped file of wipe utilities called Wipeutil.zip Extract
Zapempty onto the drive you wish to clean up and double click on it.
I recommend keeping copies in the root of every partition on your
computer.



15. What programs do I put in my newly Encrypted Drive?

In previous versions of this FAQ I was wary that some programs might
write critical data to your boot drive. However, this is far less of
a security risk with it being encrypted. What is far more important now
is that these programs do not leak private information whilst you are on
the Net. For what it is worth, here are some I recommend:

For your Web browsing I strongly recommend FireFox or Mozilla as the
browser. Anything other than Microsoft Internet Explorer.

For Usenet I recommend either Agent or Gravity or Xnews. These latter
two are free.

Agent is simple and very easy to use. The commercial version also
supports automatic decoding of yEnc coded files.

For your Email I have 2 different recommendations:

i. Agent, as mentioned above

ii. Quicksilver

Quicksilver is both open source and free.

Do not use Outlook or Outlook Express as they both suffer from the
usual Windows holes.

Use Quicksilver for both Email and light Usenet posting with strong
anonymity via the Mixmaster remailer system. When downloading
Quicksilver, remember to run update immediately after installation,
to download and install the Zipped files for News, Nym, POP and PGP
and Mixmaster. Quicksilver will offer to install all downloaded files
for you.

Both of these programs will also work with PGP. Agent will require
you to copy and paste, but Quicksilver has built-in support and works
seamlessly with PGP. I particularly commend Quicksilver for its
intuitive ease of use. This makes Nym maintenance much simpler.

I used to recommend JBN, but it is slowly becoming obsolescent. It is
not fully compatible with PGP versions 7 or later and does not support
SMTP (Simple Mail Transfer Protocol) authentication. But it is still
the favorite of many.

You must also have a virus checker and a firewall. For the virus
checker, I use Norton's. This will also find adware and spyware. For
the firewall I recommend Zonealarm.

Remember, just because your drive is encrypted does not relieve you
of an obligation to cover your tracks whilst Online.



16. How do I "cover my tracks"?

Never surf naked. Always, always use a proxy. There are now easy ways
to use a proxy. In the early days it was necessary to find and hand
select the proxies you wished to use. This was a laborious process
and needed expert knowledge of which programs to use to find and
exploit them. Some still prefer to do it this way. I call it rolling
your own. It has the distinct advantage of user choice and control
over each proxy to be used in a chain. However, this may offer
anonymity, but not necessarily privacy. Meaning no encryption. I like
privacy and anonymity, so I use other methods - see later in FAQ. The
suggested method also has the merit of ease of use and total
transparency once the programs are set up.



17. Earlier on you mentioned plausible deniability, what is it?

Plausible deniability is the ability to offer irrefutable justification
for every single file, folder, container, partition and drive that
might contain encrypted data. DCPP version 3.0 offers a world first
because it allows dual booting into either of two entirely separate
boot operating systems, each invisible to the other. One of these may
be called your honeypot operating system, meaning it contains encrypted
data that you are prepared to show under duress. The second (hidden)
operating system will contain your most secret data that you never
release. Its presence can only be known by correctly guessing the
second secret passphrase for that operating system. No other way
exists to prove there is a second operating system. Examination by
forensics of your first encrypted boot drive can only show the usual
random data that is associated with an encrypted drive. Nothing else.

This is excellent plausible deniability.



18. What if encryption is illegal in my country?

In that case, I suggest using the stego feature of DriveCrypt. But
ensure you create your own WAV file, by making your own recording.
Once the stego encrypted file is created within the WAV file, make sure
to wipe the original recording to prevent forensic analysis showing
their low level data are not identical.

Of course, you will need to install DriveCrypt in traveller mode. This
means running it off a floppy. But you will still need to hide the
floppy effectively in the case of a search. I am sorry I cannot help
you here. It must be down to your own initiative.



19. Are there any other precautions I should take?

Make copies of all your PGP keys, a text file of all your passwords and
program registration codes, copies of INI files for critical programs,
secret Bank Account numbers, plus anything else that is so critical
your life would be inconvenienced if it were lost. These individual
files should all be stored in a folder called "Safe" on your encrypted
drive. A copy of this folder should be stored on an encrypted CD,
preferably within the hidden part if using DriveCrypt 4.2 and stored
off-site.

If you are going to rely on any variation of the ploys suggested here,
then you should keep this FAQ within your hidden drive.

You need to take further precautions whilst you are online against
threats from hackers and snoops.



20. What are these threats?

They are known as Tempest and Trojan attacks.



21. What is a Tempest attack?

Tempest is an acronym for Transient ElectroMagnetic Pulse Emanation
Surveillance. This is the science of monitoring at a distance
electronic signals carried on wires or displayed on a monitor.
Although of only slight significance to the average user, it is of
enormous importance to serious cryptography snoopers. To minimize a
tempest attack you should screen all the cables between your computer
and your accessories, particularly your monitor. A flat screen (non
CRT) monitor offers a considerable reduction in radiated emissions and
is recommended.



22. What is a Trojan?

A trojan (from the Greek Trojan Horse), is a hidden program that
monitors your key-strokes and then either copies them to a secret
folder for later recovery or sends them to a server when you next go
online. This may be done without your knowledge. Such a trojan may be
secretly placed on your computer or picked up on your travels on the
Net. It might be sent by someone hacking into your computer whilst you
are online, or received by Email.

The United States Government has openly admitted it will be employing
such techniques. They call it Magic Lantern. It was originally
promulgated as a counter-terrorism weapon. But who knows how it will
be used in practice.

In view of these changed tactics, it is mandatory that these possible
attacks be countered. My suggestion is two-pronged. First use DCPP
to enjoy plausible deniability with whole boot drive encryption and
use specialist programs to thwart efforts by hackers and snoops to
break into your system whilst online.



23. How do I do this?

First of all you must have a truly effective firewall. It is not
sufficient for a firewall to simply monitor downloaded data, but to
also monitor all attempts by programs within your computer that may try
and send data out. I recommend Zonealarm. This firewall very cleverly
makes an encrypted hash of each program to ensure that a re-named or
modified version of a previously acceptable program cannot squeeze
through and "phone home". You also need a good anti-virus checker.

But that is but the start. You also need a Web browser that does not
leak information, plus a method of passing data across your ISP's
servers fully encrypted to prevent prying eyes from watching all that
you do on the Net. More about this later in the FAQ.



24. How will I know when a trojan has modified an acceptable
program?

Zonealarm will pop up a screen telling you a changed (or new) program
is trying to connect to the Net and do you wish to allow it. If it is
one of your regular programs, be very wary and always initially say NO
until you can check why this program is not now acceptable to Zonealarm.
If it is a strange program, then obviously say, NO and investigate.



25. What about TrueCrypt and DriveCrypt 4.2?

Both TrueCrypt and DriveCrypt 4.2 offer the prospect of excellent
plausible deniability. No header information and the ability to install
them on an unused partition, perhaps at the end of a large drive. The
passphrase is only held in RAM memory so much more difficult to
compromize. An examination of your drive will only show garbage. This
is certainly not the case with some encryption programs.

DriveCrypt 4.2 also allows the creation of a hidden container within an
existing encrypted container or partition. Excellent plausible
deniability. As with TrueCrypt the passphrase must be input after boot
when Windows is running.



26. How important is the passphrase?

Critically important. It is almost certainly the weakest link in the
encryption chain with most home/amateur users. I provide links at the
end of Part 2 of the FAQ. Some of these should either help directly or
give further links about how to create an effective passphrase.

For the newbies: never choose a single word, no matter how unusual you
think it is. A passphrase must be that, a phrase, a series of words,
characters and punctuation intermixed. One method that I believe would
help is to deliberately mis-spell common words in a phrase. Scruggle
in place of struggle, matrificent in place of magnificent. These could
be the start of a longer phrase. Taking this a step further, invent
words that are pronounceable but totally meaningless for example,
alamissis or grafexion. I recommend a minimum of eight words, but
obviously do not use either of those two. Use four (or more) on each
line with DCPP, together with a few figures.



27. How can I prevent someone using my computer when I am away?

With DCPP nobody can boot into your secret drive. So no problem.

However, if you are truly paranoid (and who isn't?) I would guard
against someone adding a hardware keyboard logger. These can be very
small and easily disguised as an RF trap on the keyboard lead.
Obviously, this is far more likely if your computer is also used by
others or can be accessed by others in your absence.



28. I use the Net for Web browsing, Usenet and Email, am I safe?

Whilst you are online anyone could be monitoring your account. They
do not need access to your computer to do this. They need only to
have access to your ISP. If you live in the British Isles be aware
that all ISP's are required to keep logs of your online activities,
including which Web sites you visit.

To minimize these risks you must encrypt the data passing across your
ISP's servers.

My suggestion is to use a combination of several programs. Each is
easily set up (see Part 2). Between them you will be secure and
anonymous. The best news, all these programs are free and open
source!



29. How is this achieved?

You need four main programs besides the news client such as Agent (my
favorite) and the Web browser such as FireFox (again my favorite) and
the Email client such as Quicksilver, (yes, another favorite).

These programs are: Stunnel, Freecap, Privoxy and Tor.

They are all very easy to use and really can be setup by a newbie if
you follow the setup instructions I offer in Part 2. The best part of
all is they are totally transparent to the user. Once setup there is
no maintenance or searching for proxies, etc. It is all automatic.



30. Tell me more about these programs?

Stunnel encrypts the data between you and your news server and is very
simple to use.

Freecap is also easy to setup and acts as the bridge between Stunnel
and Tor.

Tor is a connection-based low-latency (meaning fast) anonymous
communication system that protects TCP (Transmission Control Protocol)
streams for Usenet, web browsing, instant messaging, irc, ssh, etc.

In basic language Tor is a socks server that accepts and encrypts data
from any program that is "socksified", meaning set up to communicate
with it.

Tor is a new program and is still in Beta development mode. But it is
still a fully functioning Socks proxying system that offers the promise
of great anonymity and privacy. It is free and open source. It is
being improved almost on a daily basis. The latest version now has a
Windows install facility.

Tor will build automatically and transparently to the client (you) an
anonymous and encrypted route across the Net. It uses multiple layers
of encryption, each node only knowing the previous and next node, so
with several nodes your data becomes anonymised. The principle is like
an onion with many layers of encryption and anonymity. Thus it is
called onion routing. Where the data eventually emerges it is sent on
to its destination, perhaps a news server and ordinarily in the clear.
But by using Stunnel, the data will still be encrypted all the way into
the news server or the remailer, whichever you are using.

For Web browsing we need Privoxy. This again acts as a bridge between
your browser and Tor.

A web proxy is a service, based on a software such as Privoxy, that
clients (i.e. browsers) can use instead of connecting directly to the
web servers on the Internet. The clients then ask the proxy to fetch
the objects they need (web pages, images, movies etc) on their behalf,
and when the proxy has done so, it hands the results back to the client.

There are many reasons to use web proxies, such as security
(firewalling), efficiency (caching) and others, and there are just as
many different proxies to accommodate those needs.

Privoxy is a proxy that is solely focused on privacy protection and
junk elimination. Sitting between your browser(s) and the Internet, it
is in a perfect position to filter outbound personal information that
your browser is leaking, as well as inbound junk. It uses a variety of
techniques to do this, all of which are under your control via the
various configuration files and options.

Privoxy will bridge the connection between your browser and Tor the
Socks proxy host. It will minimize pop up ads, etc. But its main
advantage is it will help prevent information leakage from your desktop
to any third party trying to sniff your data. Used in conjunction with
Tor it ensures all your Web browsing is totally anonymous.

There is no need to close Privoxy if you wish to use your news client
or whatever. These programs are totally transparent to you once they
are running.

The best news is, these programs are much faster than the old hand
rolled system of choosing multiple proxies. In the previous version of
this FAQ I had recommended JAP. Tor in conjunction with Stunnel and
Privoxy is much faster. In fact it seems at least on a par with the
fastest SSH host service I have come across. But far superior in terms
of anonymity and especially so because it is free. The only service
you now need to sign up for anonymously is your news provider.

Full setup instructions for these programs are offered in Part 2.



31. Is the data encrypted after it leaves the remote server and Tor?

Yes, provided you are using Stunnel. The only precaution you must take
to ensure both privacy and anonymity, is to ensure you use Stunnel in
combination with FreeCap. More about this in Part 2.



32. How do I subscribe anonymously to a news provider?

Obviously never ever use a credit card. You can either send cash or
some may accept E-Gold. Privacy.Li offer a proxy service on your behalf
to sign you up themselves to your choice of news provider. They offer
their own service but at present it does not allow a secure (SSL)
connection right into the news server.

I believe there are now at least 4 news servers offering Stunnel
encrypted connections through port 563. These are: Easynews, Newscene,
Maganetnews, and Octanews. There are also remailers that accept a
Stunnel encrypted connection, which significantly improves your Email
security. More about this in Part 2.

Privacy.Li will act as a proxy, in this case meaning they will sign you
up anonymously to your choice of news povider, or indeed any other
service you wish. They accept many types of payment, including cash
and E-Gold.

E-Gold is not intended to be anonymous. But provided you sign up
using your choice of details and (most importantly) immediately disable
the security protocols which sense your IP address, you should be Ok.
If you don't you may find your access blocked. With anonymous access
from different IP addresses using Tor, it is very important to do this.



33. How do I create a secure/anonymous Email account with Quicksilver?

I recommend creating a Nym. To do this you should first of all finger
(download) a copy of the Nym help file. Quicksilver will do this for
you if you go to finger on the menu and input [email protected]. Read
it carefully before attempting to create your own Nym. Once you have
decided on your course of action, use the Quicksilver Nym Wizard to
help you create a Nym. It is quite involved because of the necessary
procedures that have to be negotiated with Nym.Alias.Net (often called
NAN). After sending in your create request, you will receive an
Email asking you to confirm receipt. This is to prove your reply
chain back to your normal Email address is working. After you have
sent the confirmation you should receive another Email telling you,
your Nym is alive and active.

Of course you can use Yahoo or Hotmail, but I consider them only soft
anonymous. But they can be hardened by socksifying your connection
using Privoxy and Tor. More about how to do this in Part 2.



34. Can you briefly summarise all the above?

You need PGP and Quicksilver for your Email and DCPP and/or Truecrypt
for encryption of your hard drive. These recommended Programs should
help you achieve a very high level of plausible deniability and privacy.

You need to be anonymous online. To achieve this you need to follow
the suggestions that follow in Part 2. Most importantly You must
subscribe anonymously to your choice of independent news provider.
_________________
 
35. What programs should I get?

There are seven programs recommended for security and anonymity:

DCPP, PGP, TrueCrypt, Stunnel, FreeCap, Privoxy and Tor.

And three others recommended for Email, Usenet and Web browsing:
Quicksilver, Agent and FireFox.

In all cases where there is a choice of download, ensure you download
the version that is compliant with your operating system, e.g. Windows
XP or whatever.



36. Should I just download them all right away?

It depends. If you are wanting to show reasons why all your
connections to your ISP are secure, then by all means download them
all and install them onto your Drive C. If not, wait until you have
created your secret hidden drive and only then install them onto that
drive. Meanwhile, you must download and install DCPP at this time.
Install DCPP onto your Drive C (and your Drive D when it is dual
bootable). Its presence need not arouse suspicion, provided you
follow the instructions further down the FAQ.

DCPP: http://www.drivecrypt.com



37. OK, I have downloaded and installed DCPP, what must I do next?

Create a second bootable drive on say, Drive D. You must immediately
defrag this drive, reasons later. Now install all your programs and
defrag after each one is installed. Finally restore all your data
from My Documents or wherever. This is your honeypot data that is
there to be discovered as backup data to your regular Drive C.

Do a final defrag before proceeding further.



38. How do I achieve maximum plausible deniability?

You must have two separate bootable drives. Drive C is your regular
drive, it need not be encrypted. Your second bootable Drive D is the
one we shall concentrate on.

Run DCPP on this Drive D. Install Boot authentication first. Before
re-booting create an Emergency Repair (ER) floppie disk.

Test both Boot Authentication and your floppie allow you to boot. Now
encrypt your Drive D. Immediately after this encryption process has
finished and before re-booting, update your ER disk. This is vital.

Next you use DCPP to clone your operating system. This is where some
care is required over the size of the passphrase. At this stage use a
relatively simple one of around 8 characters per line. Reasons follow.


39. So far, so good. What now?

The first encrypted drive (Drive D) is your honeypot encrypted
partition containing data you are prepared to reveal. The second
(hidden) boot partition is your truly secret one with a different
passphrase. Now you must encrypt that second cloned operating system.
As soon as it is done, update your ER disk. In fact I suggest making a
pair.

When booting you can input either passphrase and boot into either the
honeypot encrypted drive or the hidden operating system drive.

Clever, very clever. Superb plausible deniability.

Or is it?

What happens when an attacker finds that the dates of all the files in
the first partition have never been opened perhaps for months?

Read on.

My justification for this scenario is that Drive D is an encrypted
backup of my Drive C. It is encrypted to minimize the risk of it
being corrupted should my computer catch a virus. When dismounted
(closed), my encrypted drive will be shown by Windows to be unformatted.
As such, Windows will not normally write to it. Thus it offers a layer
of security that should I lose all of my Drive C, I can recover by
booting into my encrypted Drive D. I am not going to argue the fine
print here. This is my justification for having encrypted my Drive D.
If there are viruses which can cause Windows to format Drive D, so what?
I will argue I am ignorant of such things.

"Yes, the files do show I never use it. That is because I have never
yet had need to. It is there as an encrypted backup for the day when I
do need it. Being encrypted Windows cannot read or write to the drive
(unless it is mounted, of course). Thus the drive is a safe haven if I
am attacked by a nasty virus".

This is your explanation for this drive and the fact the file dates are
old.

If doubts are raised they are impossible to prove without correctly
guessing your second passphrase. Even if your attacker convinces
you he knows DCPP offers the possibility of a hidden partition there
is a plausible defence. See further on.

Of course after installing DCPP onto Drive D and creating a hidden
encrypted partition, there is no need to bother about encrypting
your Drive C. In fact I would go even further and suggest there is
no further need for Boot Authentication. This is needed to encrypt
Drive D, but can safely be removed from within Drive C after the event.
Of course, it is axiomatic that you first create and test one or better
several Emergency Repair (ER) disks to allow future access.

For security at least one of these should be stored offsite.



40. Is it as straight forward as this?

Not quite. After creating the first encrypted partition on your
second hard drive you have to avoid a couple of slight bugs. I am sure
that they will be addressed, but for now a little care is required.

After the first installation and encryption of your honeypot drive, you
can then create a clone of this drive within the same partition.
Naturally and essentially you choose another most secret passphrase.
This is where I found the first small bug. You must defrag your drive
completely before you proceed. I had two very large blocks of data
separated by around a gigabyte of disk space that windows considered
defragmented, despite my repeatedly telling Windows to defrag. But
DCPP told me there was insufficient space to clone the operating
system. This with over 50 Gigs of free space! This is what I have
learnt from Shaun Hollingsworth (the program's Author):

"Defragmentation is a problem. Last week I did some work on a
windows based "consolidation tool" and managed to move all the files
to the start of the drive, BUT windows 2000 and Windows XP, WILL NOT
allow any folder data to be moved!! Even the offical "diskkeeper"
style defragger won't allow this, and it DOES NOT SHOW any folder
data, in the white space area. My test machine, ended up with
nothing but folder data, at the end of the drive, yet it wouldn't
show up anything visible on DiskKeeper (XP standard defragger)."

This is a concern. To get around this, I re-formatted the second
drive and started over. Immediately after installing Windows I
defragged the drive. I did this after each program was added. By
this ruse, I managed to get Windows to tightly pack everything.
Actually not quite true, there were a few gaps, but thankfully DCPP
ignored these. From what Shaun has said, above, we know that Windows
can write folder data all over the place on your drive. These do not
necessarily show up when defragging, causing DCPP to (correctly)
report there is insufficient space to clone.

Shaun has suggested one work around is by using Norton's Ghost to
backup the to-be-encrypted partition and then to restore. He tells
me this will ensure all data are then packed together at the start
of the drive.

However, another little bug raised its head when I tried again to get
it to clone. I found that the password input screen DCPP displayed
before it would clone only allowed a shorter passphrase to be input.
There is no error as such, just that DCPP tells you it has found the
keystore but cannot open it because either it is corrupt or it is the
wrong passphrase.

Tests showed it was not a corrupt keystore, therefore the culprit
logically had to be the passphrase input screen, which indeed was
the cause of the problem. I expect that shortly this will be
addressed.

However, as long as this bug remains, it offers you the chance of
further plausible deniability. See further on.

As this passphrase was used to create the second (and secret) keystore
for the cloned operating system, I had to go back and create it over
with a shorter passphrase. I would strongly urge you not to store this
second keystore on your honeypot encrypted drive. I suggest creating
and storing it on a floppy. Later after creating/updating your ER
floppies, you should completely destroy the floppy. This ensures this
critical keystore was never put onto your honeypot drive.

Note: There is no requirement to keep a copy of this keyfile. If at
any future date you wish to decrypt this clone or the original you can
use the ER disk recovery tools to do so.

The finding of a second keystore on your honeypot drive will totally
destroy any attempt at plausible deniability. Or will it? On second
thoughts, perhaps not. You could create a false keystore, one with a
long (and different) passphrase to suggest you have been attempting to
create a hidden drive but had failed. You can prove this is feasible
because of the above bugs. Using a very long passphrase will prevent
the creation of the clone. If your are told this is a known bug
(perhaps from reading this FAQ), you act surprised and insist it is the
first you know of it. Who can prove otherwise?

After you have cloned your drive, it then needs to be encrypted.

This might sound a little strange as you have just cloned an encrypted
drive, but it makes sense if you think it through. This is essential.
Before doing so, change the shortened passphrase you used to create
this cloned drive to something far stronger, meaning far longer.

When booting you choose which passphrase to input. Either the honeypot
encrypted drive passphrase or more likely the hidden drive with your
ultra secret data within it. Or, you can just boot into your normal
plaintext Drive C for non critical use.

It is absolutely essential that no further data are added to your
honeypot drive at the risk of destroying altogether your hidden drive.
This is no idle threat. To (slightly) help in this regard, when
about to clone the operating system, you are offered a choice of
spacing between the two partitions, input at least 200 megabytes or
more for this gap space.

I would recommend that you initially test out both passphrases. But
use your honeypot passphrase just once to test it works ok. Never
again use it at all. Windows is a very pro-active operating system and
it will do things you may not be expecting. Things such as automatic
backing up of the registry, defragging, etc. Everyone must have
noticed how their drive can sometimes be very active when they are not
doing anything. This is Windows doing its thing. So mount once to
test, then forget all about it. But do not forget the first
passphrase, it may be your credibility lifeline.



41. Any more hints about this system?

You could remove Boot Authentication off your computer. Do this only
after creating a couple or more Emergency Repair (ER) disks. You can
now create a proper boot floppy or even an IMA file which can be used
with Nero to create a bootable CDROM.

I notice that Drive C is still required to boot either of these
encrypted partitions. So I recommend investing in significant
quantities of RAM and switching off the pagefile. Just in case
Windows decides it wants to write anything to your normal drive.



42. What about those other files: PGP, TrueCrypt, Stunnel, FreeCap,
Privoxy and Tor, Agent, FireFox and Quicksilver?

Obviously all future downloads should be into your hidden drive.

Get them here:

PGP: http://web.mit.edu/network/pgp.html

or: http://www.panta-rhei.dyndns.org/do...pgp658ckt08.zip

TrueCrypt: http://www.truecrypt.tk/

Stunnel is used for NNTP secure connections to your news provider.

Stunnel requires the executable file plus 2 others.

Stunnel: http://www.stunnel.org/download/binaries.html

stunnel-4.05.exe
stunnel-4.05.exe.asc (digital signature file optional but recommended)

OpenSSL Libraries (required files):

libssl32.dll
libeay32.dll

libssl32.dll.asc (optional)
libeay32.dll.asc (optional)

FreeCap: http://www.freecap.ru/eng/?p=index

Privoxy: http://www.privoxy.org/

Tor: http://www.freehaven.net/tor/


Not essential, but stronglyrecommended:

Agent: http://www.forteinc.com/main/homepage.php

FireFox: http://www.mozilla.org/products/firefox/

Quicksilver: http://www.quicksilvermail.net/



43. Where do I put these files?

PGP should be installed onto your hidden operating system. It may
offer to install onto your Drive C. Avoid that unless you want to
deliberately offer a sanitised version on your Drive C.

Actually there is good reason to install all of the above onto your
Drive C. this may sound alarming, but consider, their presence might
be deduced if any snoop has been monitoring your ISP data. It will
always pass across as encrypted data. If an examination of your hard
drive were to show the absence of such programs, how do you show how
you were doing it? The presence of these programs is not illegal at
all. On the contrary, there are very good and sensible reasons why you
want to avoid both spam and having your privacy invaded.

TrueCrypt should be installed only onto your hidden drive. This
program should not be openly displayed. Its presence is best kept
hidden. The plausible deniability it offers, if you choose to use it,
is strengthened by its absence from your system.

For the other files, create a new folder called Proxy. Open Proxy and
create the following sub-folders: FreeCap, Stunnel, Privoxy, Tor

Install by copying all of the downloaded files into their respective
folders. Ensure the library files for Stunnel are in the same
sub-folder. The latest version of Tor now includes a Windows
install. This means it now install the Torrc file in Documents and
Settings by default, so there should be no further error messages
about a missing configuration file.

Each program can then have shortcuts made and placed on your desktop,
or wherever you choose if different.



44. How do I configure Privoxy?

Privoxy is used for HTTP secure connections to the Web. It works in
conjunction with Tor. The config.txt file looks daunting, but you just
remove # from the beginning of any line to make that line active.

Scroll down to section 5.2 in config.txt

Copy and paste the following line:

forward-socks4a / 127.0.0.1:9050 .

Simply add it exactly as shown. The spacing and the period at the
end are important.

By default it will run on startup and minimize to the task bar.



45. How do I configure Stunnel?

Stunnel is required for an NNTP secure connection to Usenet.

Copy and paste the following in Notepad and save it to a file called
stunnel.conf in the Stunnel folder.

# config file for connecting to your secure news server
client = yes
[nntps]
accept = 119
connect = yournewsserver.com:563
# end of config file

Substitute the news server name given you by your news server after
signing up with them. Whatever it is, add a colon ( and 563 for
the port number, with no spaces.

This file does not exist until you create it. Stunnel cannot work
without its presence. You will just get some server error. This
might happen if you or Windows names it wrongly.

You may need to get Explorer to show extensions to known file types,
otherwise Windows may save the file as stunnel.conf.txt. If you are
not sure, go to Tools > Folder Options > View > uncheck "Hide
extensions to known file types". Click on Apply, Ok.

This is the only configuration you need for Stunnel.



46. How do I configure FreeCap?

FreeCap is easy. First of all go > File > Settings > Default Proxy.
Type 127.0.0.1 into the server window and 9050 into Port. Click OK.

With the program back at the opening screen, drag and drop the Stunnel
shortcut into the FreeCap open space. You will immediately see the
Stunnel icon position itself along the top of the screen. Good. You
have socksified Stunnel. That is all it takes. Whenever you run
Stunnel you must start it by clicking on it from within FreeCap.

Socksifying secures the program and ensures it routes data over an
encrypted connection socksified by FreeCap and into the Tor network.

Note: Some may experience problems with FreeCap. If you do, an
excellent free for non-commercial use alternative (but not open
source) is SocksCap. It is here:

http://www.socks.permeo.com/Downloa...nload/index.asp



47. How do I configure Tor?

Nothing to do. Just click on its shortcut and watch the green screen.
Wait a few seconds for it to create its onion route across the Net.
Once this is enabled it will display, "Tor has successfully opened a
circuit. Looks like its working."

Minimize the program and that is it for Tor.



48. How do I configure my Browser?

To ensure your browser chooses this route you must now go to its Proxy
settings Window. With FireFox this is > Tools > Options > Connection
Settings.

Input 127.0.0.1 into each line except Socks Host. Leave that line
completely clear. Input 8118 into the Port window for each line, but
again leave the Socks Host line clear. This is because Privoxy listens
for connections on port 8118 by default. Remember we have already
configured Privoxy with the line: forward-socks4a / 127.0.0.1:9050 .
This is telling Privoxy to pass on its connections to Tor which is
listening on Port 9050 by default.



49. How do I configure my news client?

You must now configure your news client by inputting 127.0.0.1 into the
window which asks for your news server name. If you have never used a
proxy prior to this, go to the screen displaying "News Server". In
Agent 1.91 this will be Options > User and System Profile > User.
Enter 127.0.0.1 for the server name. Click OK. The port is set in the
Agent.ini file to 119. But do not change that. Stunnel has already
been configured to listen on port 119 anyway and to forward through
port 563.

Note: Stunnel can only be used with a news provider that offers a
secure (NNTPS) connection by default on port 563. For other news
providers, I suggest omitting Stunnel and socksifying (by dragging and
dropping into FreeCap) the Agent shortcut. Not nearly as secure as
your data will not be encrypted after it leaves the Tor network on its
way to the News provider.

Each of these four programs, Stunnel, FreeCap (or SocksCap), Privoxy
and Tor accepts connections from either your Web browser, into Privoxy
and on to Tor, or from your News client into Stunnel, socksified by
FreeCap and on to Tor, again.

Many programs can be socksified. But it must always be the final one
in the chain, the one immediately prior to Tor that should be
socksified.



50. How do I test these are all working?

Let's check the Web first.

Start Privoxy (which by default starts with Windows).

Open your browser and input: http://p.p/

You should see the Privoxy main page with the following:

"This is Privoxy 3.0.3 on localhost (127.0.0.1), port 8118, enabled."

If you see that, be assured you have accessd via Privoxy.

If you see "p.p. could not be found, please check the name and try
again." You are definitely not accessing via Privoxy.

Go back through the above and check everything very carefully.

Note: This is an internal test, not via the Web. It just proves that
Privoxy was invoked to display that page from its own folder, which you
will see displayed if you click on "View and change the current
configuration"

You will then see a clear display of all the configuration settings.

Do not change anything unless you have a backup file and know what you
are doing.

Let's assume your Web browser is functioning as it should and you see
the p.p. page displaying the confirmatory message.

You should now test your news reader client.



51. How do I test my news connection is anonymous?

Open FreeCap and click on the Stunnel icon in the FreeCap
Window. It is imperative that Stunnel be started only from within
FreeCap and thus be socksified. Otherwise it will simply connect
directly with your news provider. Certainly it is a secure
(encrypted) connection but totally useless from an anonymity point of
view. If the news provider logs connections, you have just destroyed
your carefully built up anonymity for ever. The news provider will
have logged your true IP address! A painful lesson.

Without opening Tor at this stage, start your news client. As a small
precaution ensure you are in an appropriate newsgroup and attempt to
download its headers. You should see connecting to 127.0.0.1
displayed on the lower taskbar in Agent or wherever in the version you
are using, followed by error reported by Winsock driver. Good. This
proves Stunnel was attempting to connect to Tor, which is of course
offline, thus no connection was possible.

Now start Tor. Try again. Hopefully this time you will have more
success and it should connect to the news server and start downloading
headers.

Go to a multimedia goup and start to download a large file. While the
download is in progress, close Tor. You should see an immediate error
about connection to server closed unexpectedly. Good.

Re-start Tor. Re-establish the connection with the server and start
over. This time close FreeCap. Notice the download will continue.
Do not panic! It is still accessing via Tor. Prove this for yourself
by closing Tor and notice the download again stops immediately and
there is the same Winsock error. Good.

If you have got this far, you have succeeded in creating a secure and
truly anonymous network connection for both your browser and your
Usenet posting/downloading.




52. Can I post binaries anonymously to Usenet with this system?

Absolutely. If you choose to use Agent, it will always use your news
provider as the posting host. This is why I recommended you subscribe
anonymously to this news provider. Nothing can then be traced back.
If you are into heavy posting then you should use Power Post or
something similar that allows you to choose whole folders of files for
posting.

If you use Quicksilver for posting to Usenet it will always use one of
the mail2news gateways. All data from your desktop is encrypted
through to the first remailer and then on through the Mixmaster
remailers and onto Usenet. The one and only down side is that the
anonymous remailer network does not readily accept large files, such as
binaries. Do not try and post as attachments, better to write it into
the body of the message, if possible. But it is considered bad form to
use the remailer network for binaries. The remailer network is intended
for text files.

To post binaries, use Agent or Power Post or similar and post via your
socksified Stunnel and Tor.

A warning: If you post illegal material, you may find your anonymous
account closed without warning and no possibility of any refund!



53. OK, I can now surf the Web and browse Usenet anonymously, but what
about Email?

I recommend Quicksilver. To socksify Quicksilver it is necessary to
ensure that the port you intend using is enabled in both Tor and the
SMTP remailer. There are presently no Tor exit servers with port 25
enabled, which is the default SMTP port. This is because of previous
abuse. So to sendmail using Tor we have to be a bit clever and use a
non-standard port for SMTP. This port needs to be one that is acceptable
to both the Tor exit server and to the chosen remailer. Actually this
is not strictly correct. It is possible to acces a hidden service on
Tor whilst using port 25, but I found some problems. So to keep things
as simple as possible here is my chosen solution. There may well be
several routes to achieving this. I offer the one that I have been
successful with. By all means experiment with other remailers and ports
if you wish.

First a couple of perhaps obvious things. The following is to enable
secure (encrypted) anonymous sending of Email via the Panta-rhei remailer
and to receive Email via the Banana-split remailer. It is possible to
use either for both purposes, but I prefer not to let my left hand know
what the right hand is doing, so I split them. For maximum security I
strongly recommend pointing your Nym reply block to a newsgroup, such as
alt.anonymous.messages. You can set up Quicksilver to download all the
messages in this group and to search through all these downloaded
messages for your chosen subject, which identifies your mail.

The reason for downloading all messages is to prevent analysis of your
downloading habits possibly identifying which messages are specifically
for you. By using the banana-split hidden service this is very difficult
anyway.

Quicksilver will then automatically decrypt these messages for you (after
you have input your passphrase).

This sounds daunting, but believe me it is not. Just a little effort
reading the Quicksilver help file/manual and you will be up and running
in no time at all.

Note: There are many services offering so-called anonymous Email. Be
very wary of them. Only the remailer network offers truly anonymous
sending and receiving Email. Even this service is fraught with likely
hazards if not used correctly. But at least you are in control and not
some unknown admin who may or may not have your best interests at heart.



54. Why is the remailer network so secure and anonymous?

Although not perfect (nothing is), it does offer a level of anonymity
well above and beyond what simple anonymous services (such as Hotmail)
offer. It uses the Mixmaster remailers and has protocols to ensure
your Email is very difficult to trace and decrypt. Remember, by using
Quicksilver in the following recommended way, you are not just using
Mixmaster, but also using Stunnel encryption which with SocksCap then
sends all data through the Tor network and then on to a hidden service.

And all this is before the message is sent on through the Mixmaster
remailer system!

Mixmaster is the type II remailer protocol and the most popular
implementation of it. Remailers provide protection against traffic
analysis and allow sending email anonymously or pseudonymously.

Mixmaster consists of both client and server installations and is
designed to run on several operating systems including but not limited
to *BSD, Linux and Microsoft Windows. It does not use PGP, but RSAREF
with its own keys and key formats.



55. How do I configure Quicksilver?

First of all you need to create a default template in Quicksilver.

Go > Templates > and choose any existing template. Copy and paste the
following:

Fcc: outbox
Host: www.panta-rhei.dyndns.org
From: [email protected]
Chain: panta,*,*; copies=2
To:
Subject:


Save this as a template, naming it Panta-sendmail or whatever.

Now go > Tools > News Accounts > New > put 127.0.0.1 into the News
Server box. Clear the Login ID and password boxes (unless you are
choosing to use your regular news provider, in which case you must
enter your user name in Login ID and your password in the Password
box). Click "New".

Enter the name of the news group, e.g. alt.anonymous.messages and
the subject line you chose when creating your reply block. If you
cannot remember it, go > Nym Wizard (the shades at top right on menu)
Modify an Existing Account > Next > > > until you reach the screen
displaying your reply block. Just copy and paste the subject line
into the correct window and your done!



56. How do I configure Stunnel?

As you have already configured Stunnel for your regular news provider
it is possible to use the same settings in Stunnel with Quicksilver
to receive the Email that your Nym has (hopefully) forwarded to
alt.anonymous.messages. Superior anonymity is achieved by using
a hidden service, such as that offered by Banana-split. This is also
a secure connection using Stunnel and ensures that your Nym is not
associated with your news provider user id. If this is your choice
you should create another folder called, say, Stunnel-2. Copy the
existing files in your existing Stunnel folder to Stunnel-2. Now
open this copy of stunnel.conf and copy and paste the following in
place of what is already there:


#Bananasplit/Panta configuration

client = yes

[BANANA_NNTPS_563]
accept = 119
connect = tyrndfbdb2x6g3vg.onion:563
delay = no

[Panta_TLS_MAIL]
accept = 25
connect = www.panta-rhei.dyndns.org:2507


Create a shortcut to stunnel.exe in the new Stunnel-2 folder. Drag
and drop this shortcut into the FreeCap window. To avoid confusing
these two Stunnel icons, I suggest right clicking on them and choose
"Modify" and re-naming them to something that will easily distinguish
between them, such as Meganetnews (if this was your regular news
provider) and Panta or Banana or whatever. When you want to use Usenet,
you choose the Meganetnews icon (or whatever you chose to name it).
When you wish to check or send Email, close the first Stunnel (by right
clicking on it on the taskbar) and open the second one. Easy.

If you wish to continue using your regular news provider, then simply
copy and past the following and add it to your existing stunnel.conf
file:


[Panta_TLS_MAIL]
accept = 25
connect = www.panta-rhei.dyndns.org:2507


This will allow secure and anonymous posting, avoiding your existing
ISP SMTP server altogether. In fact it should be impossible for your
ISP to even know you are sending or receiving Email. Better yet, even
Banana admin cannot know what you are doing, as you are contacting a
hidden service. But this is just the start of the journey your Email
will travel before it reaches its destination. True anonymity.

Note: You can use banana-split for Usenet posting and downloading, but
it offers just 24 groups! Thus best kept for your Email only.



57. In previous revisions you have recommended using SSH and a remote
host server, why not in this revision?

Because it is slower, less secure and costs money. There are free
host servers around, but why bother when there are the likes of Panta
and Banana?



58. Surely all this is totally over the top for the majority of users?

It is certainly over the top for 99 per cent of users for 99 per cent
of the time. If, however, you are the one in a hundredth and you do
not much like the idea of being at risk for 1 per cent of the time,
then no, it is not over the top at all.

In any case, using these tactics helps create smoke which in turn
helps protect those who really do need all the protection and security
they can get.

Remember this FAQ is intended to help many different people. Some
may be living in deprived conditions, in countries where human rights
abuses are a daily fact of life.



59. Can I use IRC/ICQ/Yahoo/MSM in this way?

No idea. I rarely use instant messaging and then only with a few
friends in plain vanilla. You can use a program called Trillian.
There is now a Pro version which will allow an encrypted conversation
between a group and even allows file exchange (I believe). I have
only used the beta version, text only. It appears to do all they
claim for it. Both parties need to be using Trillian for the
encryption to be effective. You can use it as a stand alone, but it
will not then support encryption.

Trillian is here: http://www.trillian.cc

It might be possible to socksify Trillian. If so, then yes this could
be a very useful way to be anonymous on IRC (Internet Relay Chat).

I am sure there are other ways to achieve this, but I am sorry this
is beyond this FAQ. My knowledge is limited because I have never
tried it myself.



60. Why not use MS Internet Explorer instead of FireFox?

MSIE is a dangerous program designed by MS to allow remote servers
access to your computer's registry. Although designed for use by MS to
allow easy updating of the Windows Operating System, this feature could
be used by any site to access your IP address, even your machine ID and
your personal registration details or worse, far worse, your saved
passphrases. This can be done even if you have logged onto a site
through a chain of proxies. In other words Microsoft Internet Explorer
is an absolute no-no as far as anonymity is concerned.

As alternatives, I have already mentioned FireFox and Mozilla.



61. What about backing up my Data?

Although not strictly relevant to a FAQ mainly concerned with
privacy, nevertheless, this is so important a few words are needed.

Create another encrypted container using DriveCrypt 4.2 on an
external hard drive. Open this partition and copy some innocuous
data from your normal plaintext drive. Now close this container and
create a hidden container, following the instructions in the
documentation that comes with DriveCrypt. Now copy all your secret
data across into this secret container. Restoring is just as simple.
Just open the secret container and copy into your DCPP partition.

TrueCrypt can be used by creating an encrypted partition at the end
of the drive. Follow the TrueCrypt help files on how to make this
part of the drive appear as unformatted and without a drive letter to
Windows. All your secret data can now be copied into this TrueCrypt
partition.



62. Lastly, what do you say to the charge that this FAQ may be
useful to criminals?

I did take time to have a re-think after the events of 9/11.
However, on balance I believe it is still the right thing to do.
Like gun control, if we ban weapons only the police and criminals
will have them. Banning encryption or anonymity is not going to
make criminals stop using encryption or attempting to be anonymous.

It is almost laughable for anyone to be so naive as to believe that
passing any law would make the least difference to a criminal. I
believe that the individual should be allowed to choose, not the
Government on his behalf.

Who benefits the most if Governments are allowed to reduce our
freedom of choice? The Government or us?

Those that give up a little freedom to gain a little security will
lose both.



This ends the FAQ.


Here is my PGP key and fingerprint:

- ----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 6.5.8ckt

mQENAza3VwsAAAEIAJoghtgM5IW0CmQOocBDJPUS
DAlkaPkP4LVN/6I6U1qYXYSX
slRiXL6R8/L5LiYGjc8+jkK0MbpTh7W4WiT35L31kX2EU/MSNlpawvpwTvaye8cz
Kbwupsi7qtxVEETM11ucSuxtG8ShOwiYrMUqOmP9
3hf9h78gNzD/qGOYGV994Adt
MHRZ4lPlQnknxoDszHxCDcS83jlo4mD1xhuvLQ1t
hXFkGBl9Bw/lSWDxcu0gssZB
necFTSkFtJbnu3gHp6DVE9CO/ZxhXDGHAmC/jLfB5QH59Zbbw4fFgQ7tw2gUAgiS
kvv0RS55TB9n7JiDwc+Mk0OlYavdZOh5cRSmBqcA
BRG0JURvY3RvciBXaG8gPGRv
Y3Rvcl93aG9AbnltLmFsaWFzLm5ldD6JARUDBRA2
t1cLZOh5cRSmBqcBAb87B/46
wEezqswaPz8NIA0/ XYULXPKse11aCgRL7MIQPO1CRdqjbFnWi1wU2AnA
kCtCLia+
lhulNrLJxMUvHgOQc4oC+nlUntBE9f8hHg0VwvQJ
/4kO29UeVf0iwr+drZjRJooR
oR1C1UDDr199eeKJ3+m2pO7j1DBxv4tWQAYsJmZQ
QqlNRLzsmHJyTI/ZN03UREAZ
Qr4k6EjD1lScWg9MfueITgiMdbeV3MmCpf7mnlah
vlN/S31CeEfoY2OpcRYVXNQb
it9N8cPM+2KZEdl/FW7yVPgd6BCGFFgPcRiqLC7c1F6qBPUpbdYf/pvd3/lhRJR9
IY35xfmdHWM8Rk+ivIPD
=0l2S
- ----END PGP PUBLIC KEY BLOCK-----


Fingerprint: F463 7DCB C8BD 1924 F34B 8171 C958 C5BB


To contact me, please post to news:alt.privacy with the subject
"Att: Doctor Who" (without the quotes) or send encrypted mail
to my Nym: [email protected]



Links to items specifically mentioned or recommended in the FAQ:


PGP: http://web.mit.edu/network/pgp.html

or: http://www.panta-rhei.dyndns.org/do...pgp658ckt08.zip

DCPP: http://www.drivecrypt.com

TrueCrypt: http://www.truecrypt.tk/

Putty: http://www.tucows.com/preview/195286.html

or here:

http://www.chiark.greenend.org.uk/~...y/download.html

Stunnel is used for NNTP secure connections to your news provider.

Stunnel requires the executive file plus 2 others.

Stunnel: http://www.stunnel.org/download/binaries.html

stunnel-4.05.exe
stunnel-4.05.exe.asc (digital signature file optional but recommended)

OpenSSL Libraries (required files):

libssl32.dll
libeay32.dll

libssl32.dll.asc (optional)
libeay32.dll.asc (optional)

Privoxy: http://www.privoxy.org/

Tor: http://www.freehaven.net/tor/

Quicksilver is here: http://quicksilver.skuz.net/

Mixmaster (required by Quicksilver and Jack B. Nymble):

Kremlin: http://kremlinencrypt.com/download.php

Wipeutil: http://short.stop.home.att.net/freesoft/filutil2.htm

Windows Washer is here: http://www.webroot.com

pecunix is here: www.pecunix.com

e-bullion: www.e-bullion.com

DMT/ALTA: https://213.132.35.90

E-Gold: http://www.e-gold.com

Privacy.Li: http://privacy.li

Agent is here: http://www.forteinc.com/main/homepage.php

Norton's A/V is here: http://www.symantec.com/index.htm

Zonealarm: htttp://www.zonelabs.com/store/content/home.jsp


Other links that might be of interest:


JAP: http://anon.inf.tu-dresden.de/desc/encr_jap_en.html

SSL Proxy info: http://www.jestrix.net/tuts/sslsocks.html#intro

WinHex: http://www.winhex.com/winhex/order.html.

ACDSee: http://www.acdsystems.com/english/products/acdsee/index

Thumbs Plus: http://www.cerious.com

VuePro: http://www.hamrick.com

A Proxy site listing: http://www.samair.ru/proxy/

News Providers: http://www.exit109.com/~jeremy/news/providers/

Freenet: http://freenet.sourceforge.net/

Trillian: www.trillian.cc


Nym remailers:

nym.alias.net, home page: Http://www.lcs.mit.edu/research/anonymous.html

Anon.efga.org, home page: http://anon.efga.org/


In case you need convincing:

http://www.gn.apc.org/duncan/stoa_cover.htm



Useful programs:

Partition Magic: http://www.powerquest.com/

FSRaid: http://www.fluidstudios.com/fsraid.html

HJSplit: http://www.freebyte.com/hjsplit/

Mastersplitter: http://www.tomasoft.com/mswin95.htm

PowerPost: http://www.cosmicwolf.com/

Quickpar: http://www.pbclements.co.uk/QuickPar/

SmartPar: http://www.smr-usenet.com/tutor/smartpar.shtml

WinAce: http://www.winace.com/

WinRAR is here: http://www.rararchiver.com/

YProxy is here: http://www.brawnylads.com/yproxy/

Media Player Classic: http://sourceforge.net/projects/guliverkli/


Some anonymity sites:

http://www.worldnet-news.com/software.htm

http://www.skuz.net/potatoware/index.html

http://www.skuz.net/potatoware/jbn/index.html

http://packetderm.cotse.com/

http://www.cotse.com/refs.htm

http://freeyellow.com/members3/fantan/pgp.html

http://www.all-nettools.com/privacy/

http://Privacy.net/

http://www.geocities.com/CapeCanaveral/3969/gotcha.html

http://www.junkbusters.com/ht/en/links.html

http://www.skuz.net/potatoware/privacy.txt


Other additional useful sites:

Beginner's Guide to PGP:

http://www.stack.nl/~galactus/remailers/bg2pgp.txt

PGP for beginners:

http://axion.physics.ubc.ca/pgp-begin.html#index

FAQ for PGP Dummies: http://www.skuz.net/pgp4dummies/

The PGP FAQ: http://www.cryptography.org/getpgp.txt

The SSH home page: http://www.ssh.com/products/ssh/

Anonymous Posting:

http://www.skuz.net/Thanatop/contents.htm

Anonymity Info: http://www.dnai.com/~wussery/pgp.html

Nym Creation:

http://www.stack.nl/~galactus/remailers/nym.html

General info:

http://www.stack.nl/~galactus/remailers/index-pgp.html
 
Thats a Kick-Ass thread bro !!!


Very nice and excellent detail !
 

Trending

Back
Top