mirror of
https://0xacab.org/optout/into-the-crypt.git
synced 2024-10-01 03:35:39 -04:00
Added android settings to restrict to LTE only
This commit is contained in:
parent
039a1909d6
commit
8bbc4716f7
13
README.md
13
README.md
@ -246,20 +246,17 @@ Code is a great complement to cryptographic ciphers. It has an incredibly easy i
|
|||||||
### Blending
|
### Blending
|
||||||
"Do not speak truth to power; they will hammer you." While this is more a statement from the perspective of dissident political discourse, it stands true in an anti-forensic threat model. Operating under the radar in your operations can stand to provide valuable protection. To say the least, having federal agents breathing down your neck is an undesirable position. The concept of blending is applied with the use of previously discussed TOR and mixnet traffic routing. Simply put, "anonymity loves company," and standing out in the vulnerable world of computing is ill-advised.
|
"Do not speak truth to power; they will hammer you." While this is more a statement from the perspective of dissident political discourse, it stands true in an anti-forensic threat model. Operating under the radar in your operations can stand to provide valuable protection. To say the least, having federal agents breathing down your neck is an undesirable position. The concept of blending is applied with the use of previously discussed TOR and mixnet traffic routing. Simply put, "anonymity loves company," and standing out in the vulnerable world of computing is ill-advised.
|
||||||
|
|
||||||
-weak maybe remove this portion
|
|
||||||
I've had a contact who surprised me to the degree in which he blended - less so digital, more so physical. He owned and operated many "side-hustles" that amassed a large amount of wealth. There was no intention of paying tithings or taxes to the state. His wealth remained in cryptocurrency wallets that had no tie back to him. Looking at the guy, you'd never know he owned several million dollars. He had a commercial driver's license (CDL), a worn-down truck, and a lower middle-class home. He would (typically) keep any mention of this lock-and-key. He had little to no risk of an audit while being able to work as little as he wanted and vacation as he saw fit. If he was to liquidate tens of thousands of dollars in cryptocurrency out of what appears to be thin air, buy a luxury vehicle, and a nice residency, he would be opening himself up to outside suspicion. The given anecdote is to show that blending in is not a difficult task. This is not to say you have to live minimalist or dedicate your appearance with a lower caste of society; this is one way of addressing his particular threat model.
|
|
||||||
|
|
||||||
Standard security mechanisms are inadequate for the purpose of anti-forensics. Nation-States and Advanced Persistent Threat (APT) groups do not play by the rules. All bets are on that no matter how hardened your system kernel is or how safe your OPSEC precautions may be, there is always a point of compromise. An unpatched vulnerability is waiting to be exploited against your system. If your device is emitting traffic, all bets are on that with enough resources, these groups will be able to decrypt the traffic. Maybe it won't be today, but it certainly will be in the not-so-distant future. If you are a target, chances are that you are already compromised. Use the masses as cover; open deviation is ill-advised.
|
Standard security mechanisms are inadequate for the purpose of anti-forensics. Nation-States and Advanced Persistent Threat (APT) groups do not play by the rules. All bets are on that no matter how hardened your system kernel is or how safe your OPSEC precautions may be, there is always a point of compromise. An unpatched vulnerability is waiting to be exploited against your system. If your device is emitting traffic, all bets are on that with enough resources, these groups will be able to decrypt the traffic. Maybe it won't be today, but it certainly will be in the not-so-distant future. If you are a target, chances are that you are already compromised. Use the masses as cover; open deviation is ill-advised.
|
||||||
|
|
||||||
- note:
|
- note:
|
||||||
Go into more detail about using the masses as cover. Also, distro hopping can be a useful method of keeping powerful attackers enough steps behind that they won't be able to compromise your system.
|
Go into more detail about using the masses as cover. Also, distro hopping can be a useful method of keeping powerful attackers enough steps behind that they won't be able to compromise your system.
|
||||||
A solid security strategy will likely be sufficient to keep government attackers away.
|
|
||||||
|
|
||||||
|
|
||||||
## Minimimal Attack Surface
|
## Minimimal Attack Surface
|
||||||
|
|
||||||
While living in the "end of trust," we must follow standard system hardening practices. These practices emphasize the reduction of software and hardware needed throughout the operation. There is no purpose of strong keys in cryptography if the underlying system operations have compromised you via keylogging and other variants of malware. You can create an intricate system of firewalls, intrusion prevention/detection systems (IPS/IDS), event log management to detect compromises, proxies, virtual private networks, TOR, I2P, but your must recognize the underlying fingerprint of these systems. Minimal architecture should not be limited to solely software and hardware, but also the signals being used; treat all signals as hostile. On mobile devices, consider the different Cellular protocols such as 3-5G variants and LTE. In times of unrest, the state has the power to disable and manipulate the protocols available for use. Most modern devices allow you to select settings such as LTE only or whitelist specific towers. You may go offline in times of unrest, but at least they aren't leveraging legacy protocols, potentially engaging in packet injection, and redirecting your device like a good puppet following dictates of its puppeteer.
|
While living in the "end of trust," we must follow standard system hardening practices. These practices emphasize the reduction of software and hardware needed throughout the operation. There is no purpose of strong keys in cryptography if the underlying system operations have compromised you via keylogging and other variants of malware. You can create an intricate system of firewalls, intrusion prevention/detection systems (IPS/IDS), event log management to detect compromises, proxies, virtual private networks, TOR, I2P, but your must recognize the underlying fingerprint of these systems. Minimal architecture should not be limited to solely software and hardware, but also the signals being used; treat all signals as hostile. On mobile devices, consider the different Cellular protocols such as 3-5G variants and LTE. In times of unrest, the state has the power to disable and manipulate the protocols available for use. Most modern devices allow you to select settings such as LTE only or whitelist specific towers. You may go offline in times of unrest, but at least they aren't leveraging legacy protocols, potentially engaging in packet injection, and redirecting your device like a good puppet following dictates of its puppeteer.
|
||||||
< insert settings here>
|
|
||||||
|
Limit the use of these Cellular protocols with the following setting alteration:
|
||||||
|
`Settings > Network & Internet > Mobile Network > Preferred Network Type > Select LTE Only`
|
||||||
|
|
||||||
Every introduced system creates a larger fingerprint and attack vector, ultimately leading to more trust in more systems and services. The most anonymizing and secure operations require minimal architecture and physical security.
|
Every introduced system creates a larger fingerprint and attack vector, ultimately leading to more trust in more systems and services. The most anonymizing and secure operations require minimal architecture and physical security.
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user