Concise Overview of Jolly Rogers Security Thread

Talk anything about anonymity
User avatar
ethical hacker
Posts: 62
Joined: Thu Feb 29, 2024 10:48 pm

Concise Overview of Jolly Rogers Security Thread

Postby ethical hacker » Fri Mar 01, 2024 12:52 am

If you are not acquainted with the "Jolly Rogers", now is an opportune moment to acquaint yourself with it. The original PDF spans over 110 pages; however, rest assured, I have compiled a summary encapsulating all pertinent aspects:

- To become a proficient and esteemed hacker, it is advantageous to possess a solid academic foundation, extensive professional IT expertise, a profound understanding of computer security, and up-to-date certifications such as GIAC, CEH, A+, among others.

- To enhance your online security and maintain anonymity, it is advisable to utilise a USB or CD to run an OS such as Tails on your computer, thereby ensuring a higher level of safety by isolating it from your primary hard drive. It is imperative to activate HTTPS-only mode and refrain from disclosing personal information on normal websites or the Deep Web. Moreover, it is prudent not to use identical usernames across forums, websites, and social media platforms, and to avoid incorporating personal details, such as a sibling's name, in passwords.
When navigating online, always employ TOR for added privacy. Instead of directly inputting information into blank spaces within a Deep Web browser, consider using a notepad to compose content and then copy and paste it accordingly.
Regarding PGP key management within the Tails OS environment, locate the icon resembling a clipboard in the top right corner. Click on this icon and select "manage keys." Subsequently, proceed to the "File" tab, create a new PGP Key, ensuring to input your online pseudonym rather than your actual name. Advance to the key options section, confirming that the encryption type is RSA with a key strength of 4096 bits. Upon completing these steps, generate your key by clicking "create." Subsequently, access your personal PGP public key, right-click on it to copy and paste it wherever necessary.
For optimal security measures, designate a separate drive for storing keys and ensure they are kept physically detached from your primary PC. To manage the private key effectively, access its properties, navigate to the details tab, and export the complete key for safekeeping.

- To ensure the irretrievability of files and prevent their recovery using forensic tools by feds, it is recommended to shred files by overwriting them meticulously, ideally 3 to 7 times, with each overwrite dedicated to a single file.

- To achieve a heightened level of anonymity and security when commencing a Tor session within Tails or any OS, it is imperative to commence by deactivating JavaScript. Proceed by navigating to the 'about:config' tab and subsequently adjusting the settings by setting "browser.urlbar.filter.javascript" to false and disabling "javascript.enabled" as well.

- To access various websites, it is advisable to employ multiple logins. Within Tails, one can securely store all login credentials, including passwords and usernames, using KeePassX. It is recommended to refrain from utilizing personal nicknames or locations in this context. Vigilance in maintaining accurate spelling and refined writing is paramount.

- Please be cautious when utilizing your computing apparatus, as it is quite simple to correlate your timezone based on the time you access the internet. It is imperative that you pay close attention to the hours you post information on forums.

- To prevent the disclosure of additional metadata such as geolocation coordinates in photographs, it is advisable to capture images in the PNG format, as it does not retain EXIF data.

- When you are arrested, you must engage a solicitor well in advance, with fees amounting to approximately $50,000. Additionally, you should seek reimbursement for the bond paid and refrain from speaking until your solicitor is present.

- You should exclusively utilise a VPN for each specific activity. For instance, if my Nord VPN is designated for accessing the Deep Web, I refrain from connecting it to my personal computer or other activities such as navigation, school-related tasks, and the like. It is advisable to select a distinct VPN for each activity and ascertain whether the VPN retains logs of your online actions.

- It is recommended to abstain from using Google and opt for DuckDuckGo instead. When selecting a VPN, it is advisable to choose one that aligns with OpenVPN providers rather than PPTP for enhanced security and privacy measures.

- You may establish a VPN connection via TOR using Tor Expert and Tortilla on a Windows virtual machine. Subsequently, initiate the Windows virtual machine with reduced memory allocation compared to my current configuration. Following this, install the VPN within the virtual machine and proceed to connect the Tor browser bundle for an additional layer of security.

- When utilizing TOR, refrain from searching for any content related to Google as cookies can track your activity. Therefore, consistently clear cookies and adopt a new identity within Tor to prevent cookie tracking.

- You should always consider disabling the "online" feature when logging into accounts to avoid leaving a trace. It is advisable to consistently deactivate this option online.

- It is imperative that you refrain from disclosing your activities or accomplishments as a hacker on social media platforms.

- To ensure the authenticity of your downloads, it is imperative to exclusively procure official software from their designated sources.
In order to ascertain the integrity of the Windows GnuPG tool you have acquired, it is recommended to inspect the PGP associated with each downloaded software and cross-reference it with the developer's public PGP key available online.
Furthermore, an alternative application known as Kleopatra facilitates the importation of complete keys through its management interface. This functionality serves the purpose of retrieving certificates from servers. Subsequently, this process enables the verification of our downloads without compromising the security of your digital fingerprint.

- Verifying signed messages with signatures and signing your own messages. Compare the keys with the Tails clipboard section and only sign messages if you are a moderator or administrator. If not, it is advisable not to sign them. However, it is prudent to be aware of this in case you suspect that the accounts of moderators have been compromised.

- You should utilize TORCHAT across all your devices for enhanced message security. However, for personal matters, it is advisable to employ PGP encryption. Exercise caution with your Linux RAM as an attacker could potentially overwhelm your PC's memory. Therefore, only disclose your Torchat ID to individuals whom you trust implicitly.

- To ensure the utmost security in Bitcoin transactions, one should consider reputable online exchanges such as MT Gox, BTC-E, BitStamp, and CoinBase. Additionally, platforms like LocalBitcoins.com and Craiglist offer avenues for trading. For those inclined to mine using Tor services, it is imperative to exercise caution.
When conducting payments, employing a mixer or tumbler is advisable. Services such as BitcoinFog, SendShared, and ShareCoin can facilitate secure transactions.

- It is advisable to refrain from viewing YouTube videos infrequently or those pertaining to hacking topics using your authentic account and genuine IP address. It is preferable to utilise a VPN alongside an incognito account on a secure browser such as DuckDuckGo.
Exercise caution prior to accessing any links, considering the information that the website may ascertain about your online presence.

- Always ensure to cover the camera and disconnect the microphone from your laptops. For PC desktops, simply unplug the camera and microphone when not in use, and only activate them when absolutely necessary.

- Never open emails from individuals whom you do not trust. It is advisable to routinely format the hard drive to ensure it remains free of any concealed viruses. Additionally, flashing the BIOS is the initial process that initiates upon powering up your personal computer. In the event of a virus infecting your PC, no antivirus software can effectively eliminate it; the necessary course of action would be to flash the BIOS and install new firmware.

- You may conduct surveillance using antennas, which receive electromagnetic waves emitted by various electronic devices, such as wireless and wired keyboards or mice, within a 20-meter radius, enabling individuals to clandestinely monitor your keystrokes.
Investing in automated timers that control switches could be advantageous to create the illusion of occupancy at all times.
To reduce electromagnetic fields (EMF), consider employing curtains, clothing, and drapes to shield against device emissions, and consistently opt for wired connections.

- Be aware with JavaScript, can disclose your browser plug-ins, time zone, and fonts in use. Most browsers will transmit your user agent, which can be altered using extensions.

- Never leave your computer unattended in the presence of any individual, be it a child, spouse, parent, or others. Refrain from informing your family members and acquaintances of your absence; instead, kindly instruct them not to interact with your personal computer and ensure that it remains password-protected.

- TrueCrypt cannot guarantee that RAM is devoid of sensitive data. Hence, following each session working with a TrueCrypt volume or operating system, it is imperative to power down the computer (or hibernate if the hibernation file is encrypted). Subsequently, it is advised to keep the device powered off for a minimum of several minutes, with a longer duration being preferable, before reactivating it.

- When concluding your work session, it is imperative to power off your personal computer. It is advisable to ensure that your computer is equipped with DDR3 or DDR4 RAM. Avoid storing any sensitive information on an encrypted system volume. Before leaving, disconnect your PC; in the case of a laptop, remove the battery promptly for a swift shutdown. Additionally, contemplate securing your computer by either installing a lock on its case or bolting it to the floor. Some individuals have even proposed the idea of soldering the RAM onto the motherboard to prevent its removal.

- If one frequently handles cash, it is advisable to acquire currency detection pens and a black light to scrutinize banknotes for concealed insignias. Conducting a brief online search will provide guidance on the specific features to inspect in the currency utilized within your nation.
The tools suitable for identifying counterfeit currency encompass pens from reputable brands such as Dri-mark and Sharpie, ultraviolet lights combined with magnifiers, and magnetic testing devices.

- Utilizing obsf4 would present a more effective strategy to obfuscate your traffic, particularly when facing adversaries like the NSA or other law enforcement agencies.
Establishing your own obfuscated bridge or, ideally, procuring several VPS and configuring them as obsf4 proxies would be a prudent course of action.

- It is imperative to consistently back up your drives on a daily basis. In the event that you possess an unencrypted drive, a viable solution is to execute a data recovery program such as testdisk. To proceed, access your terminal and input the following command upon boot up:

Code: Select all

sudo apt-get install testdisk

However, in the scenario where your drives are encrypted, the retrieval of your data is unattainable due to key damage. It is advisable to store your backups on USB or MicroSD devices, keeping one copy at home and another at your workplace or in your vehicle. This precaution is essential in the unfortunate event of a fire destroying your residence along with all backups.
Furthermore, it is recommended that whenever you modify an email address or a unique password, you diligently archive this information in your backups as well.

- Electrum presents itself as a user-friendly Bitcoin client. It serves to safeguard your coins against potential loss due to backup errors or computer malfunctions. This is achieved through the ability to restore your wallet using a confidential phrase, which can be transcribed onto paper or committed to memory.

- Amass a wealth of information, therefore, kindly power down your personal computer when not in active use, ensure to encrypt all data meticulously, refrain from disclosing your passwords to any individual, avoid leaving any trace of the contents stored on your drives in plain sight (such as notes or diary entries), and steadfastly deny the existence of any data on your drives to online acquaintances, even when using a pseudonym, as such information could potentially be utilised against you in a legal setting. Maintain a stance of denial at all times.

Return to “Discussions about anonymity”