Month: January 2021

Security in the New Normal – AWA

Miguel asked me to write up something about using VPNs.  I’ve chosen to make it a bit broader.
The first thing to know about Internet security is that the Internet was not designed to be secure.  It was designed to share information.
If you are a person that is interested in security, you are interested in a number of different moving parts.
  1. Are my documents secure from being copied
  2. Are my credentials (password/user name) secure from being copied
  3. Are my online actions secure from being tracked?
  4. Are my personal details secure from being revealed by sites I visit.
As  designed, sending packets (smallest data block that gets transmitted on the net) are open.  Anybody that can intercept that packet can read what is in that packet.  Thus if you sent an email in 1990 time frame that said “The Libian’s are going to attack the power plant at 1837 on Nov 1st” anybody that was monitoring the network could read that.
The internet is built on a store and forward.  So each packet moves from one “computer” to the next.  At the next computer, the computer decides where to forward that packet to.  Today we have specialized computers called switches and routers to do this store and forward.
There is NOTHING to keep somebody from programming a router/switch on a network to forward all packets to a collection point.
The point of all of this is that everything sent over the net can be monitored and read.
We, the internet geeks started to fix this.  The first step was to protect particular types of communications.  So instead of sending our passwords and usernames on post cards (Packets) we did some math magic and exchanged magic tokens that could be copied but were useless to the person that copied them.
We created methods of encrypting documents and email.  But for the most part, it just didn’t work very well.
The biggest problem is that most users don’t have a clue how to manage secure information.  To often people use a password that is easy to guess or that they write down or a dozen other things.  They keep copies of secured documents in decrypted form.  All of which is bad.
So we created a new protocol for communicating which is called “end to end encryption”  What this means is that a data entity is encrypted before it goes on the net (wire) and can only be decrypted at the remote end.  The protocol we use for this at a user level is called “ssh”.  It was written by some very smart people that understood cryptography and there have been few security issues with it.
For the rest of the people, we got SSL.  This is the protocol used in web browsers and to fetch your email and a bunch of other things.  You see it if you have the lock in your browser window or you see “https” in a URL.
So now we have secure communications between us and somebody else on the net.  Good.
But what does this actually provide us?  Not enough.  The bad guy/government agent watching your internet traffic might not know exactly what you are viewing, but they will know what websites you are visiting.  So they can see that you are watching that porn video of two guys in rabbit suits doing… but they do know you were visiting the website where porn is served from.  They don’t know what you said or read on gunfreezone.net, but they do know you are visiting the site.
This article talks about what can be done with that “metadata”, who you are talking to:
A VPN is designed to solve the meta data issue.  So what happens is you fire up your computer and turn on your VPN.  Now all your traffic leaves from your computer, your office or house or local McDonalds and travels to a server somewhere on the net, all encrypted.  The spies don’t know what you said or who you are saying it to.
Once it gets to those servers, it is then sent repackaged and sent on to its destination.  The address on the packet not directly associated with you.  Now they don’t know what sites you are visiting.  Wowsers!
Except you are a stupid git and you log in and check your email while using your VPN.  There is now a log entry at your email service provider saying that at 2021-01-11 17:43:04 you pulled email to such and such IP address.
The bad guys, either legally or by other means get that log entry.  They now have the IP address you were using from your VPN and can track that IP address coming into  gunfreezone.org.  They know you visited GFZ.  VPN or not.
So you decide to go full out and install a Tor browser on your computer and use that instead.  Except the feds have put a tor server out there.  What they do is they watch for packet counts and sizes that match you.  As soon as they see that, they can start tracking the traffic back to your physical location.
There was a “dark web” sales site called The Silk Road.  Yeah, you could buy *THAT* there.  Yes, that too.  And that other thing as well.   It was a black market selling really black things.
The guy that designed it was really really careful.  He had a laptop dedicated to silk road administration.  He always used a VPN and Tor protocols.  He always connected via a public wifi and never used his own.  He was freaking careful.  And he was in a hurry one day and checked his email while using his silk road laptop.  That was all it took.  The feds arrested him shortly there after.  They had been tracking him.
Just this last month there was the single biggest transfer of money out of Bitcoin ever.  It turns out that the feds, after multiple years, finally got access to the dudes Bitcoin wallet and transferred out over a Billion Dollars in value.
TL;DR;  A VPN is a good thing to use.  But it isn’t going to help you.  It is stupid things that will get you.  Did you remember to shut down every single thing that connects to the internet while you were using the VPN?  Nope, then there is a record, somewhere, of the VPN being used by *you* to do something normal.  And that lets them know you were using that IP address right then.
And even if you do everything right, there is always a chance that somebody you are working with isn’t that careful and they will expose you.  Today they are talking about a hack of Parler over the last few days that exposed 70 Terabytes of data and exposed every single piece of information that Perler had.
Be safe out there, everything you say on the Internet is forever and everything you say can, at some point in time, be tracked back to you.
Thanks for reading,
AWA

When your star wants to kill a hit TV series

Disney tries to walk the fine line of not acquire the animosity of political groups as much as they can and that has served them well overall. And for that reason, I figure Mouse Country HQ is not very happy with this stupidity.

Your star actor behaves like a little bitch of the Empire and threatens a hit show, ain’t that a kick in the balls? Politicizing Star Wars was not a wise decision. Not even Mof Gideon is that stupid.


PS: Somebody pointed in Facebook that The Mandalorian can be replaced since he keeps the helmet on 95% of the times. As for the 2 first seasons? There is always DeepFake

The storming of the Capitol is the Democrat’s Reichstag fire

That is not an understatement.

Congressman Hank Johnson said on MSNBC, to the man that incited the Crown Height pogrom riots, that the storming of the Capitol was a race war and he and others would have been lynched.

Congresswoman Alexandria Ocasio-Cortez told ABC that half of Congress was about to be murdered.

https://twitter.com/Breaking911/status/1348379468834996226

“And so, if we allow insurrection against the United States with impunity, with no accountability, we are inviting it to happen again,” Ocasio-Cortez said on ABC’s This Week with George Stephanopoulos. “We came close to nearly half of the House dying on Wednesday.”

The media has latched onto the word insurrection.  A word not used to describe the annexation of territory by the CHAZ/CHOP or other autonomous zones created by Antifa, or the continuous seige of the Portland Federal Courthouse.

As I mentioned before, Congresswoman Cori Bush drafted a resolution to expel 138 Republican members of the House who challenged the certification of the Electoral College votes.

Senators Ted Cruz and John Hawley are being told to resign, with the accusation that their legal challenge incited an insurrection.

Pelosi announced she will impeach Trump again if Pence doesn’t have him removed by the 25th Amendment.

Biden himself called these people “domestic terrorists.”

We are watching in real time as social media and Big Tech is colluding in violation of every anti-trust law to kick Right Wing voices off the internet.

The Democrats are claiming that they could have been massacred to justify the largest crackdown on Americans since another Democrat signed Executive Order 9066.

When Senator Chuck Schumer said the the storming of the Capitol was like Pearl Harbor, he wasn’t lying.

We called it absurd to compare a riot to military attack that killed 2,335 Americans.  He meant in terms of the restrictions on civil liberties that was going to happen to the ground identified as the enemy.

They are going to push this to the breaking point in their crackdown on the Right.

What happened to Second City Blog?

Suddenly it is locked down, invitation only?

They have been a brutal spike on the Chicago PD’s White Shirts and the administration of Mayor Lori (Beetlejuice) Lightfoot. I would not be surprised if something was forced upon them in this Era of The Purge.

Don’t say “Lightfoot” three times, just in case.

Hat Tip Royko