A WORD ABOUT OPSEC

inspired by There are some important things you know if you are a college student and about to put fliers up on campus

1) Sup Forums by default does not redirect you to https
2) if you're using the http site, your campus likely has a log of any particular thread you visited, and possibly even logs of if you posted to a thread / created a thread
3) if you're using https, they only know that you visited Sup Forums, but not whether you viewed any particular thread / board or if you created any posts

your campus can and will not hesitate to check their isp logs to see who was using the site in order to dox you, if the campus response is large enough.

people have gotten doxxed on campus even when they were using tor at the time, by cross-checking against which machines on campus were the ones using tor.

so play it smart. if you're going to post fliers (which i fully support), 1) make sure you're using https or a vpn, 2) be careful what you say here

stay safe, friendos

Other urls found in this thread:

grugq.github.io/
youtube.com/watch?v=9XaYdCdwiWU
rageuniversity.org/PRISONESCAPE/PRISON FIGHTING AND WEAPONS/index001.html
github.com/arakasi72/rtinst
github.com/JMSwag/OpenVPN-install
timesofindia.indiatimes.com/world/china/china-set-to-block-masood-azhar-ban-defying-us-india/articleshow/61328757.cms
wiki.archlinux.org/index.php/MAC_address_spoofing
sanctum.geek.nz/arabesque/series/gnu-linux-crypto/
twitter.com/NSFWRedditImage

bump

Do you have any suggestions for good VPN's?

nah, and Sup Forums blocks a lot of them, unfortunately. try Sup Forums

protip.

You can get a dedicated seedbox with your own personal VPN server tha nobody else can use.

up

Does anyone have any dumps of general opsec information? good practices ect.

btw, if two computers use same single wifi won't they have same IP address ?

basically everything the grugq has ever written grugq.github.io/

see also his brilliant talk here youtube.com/watch?v=9XaYdCdwiWU

probably although many sites could still tell them apart

www.murderkube.com

/k/ knowledge for practical scientific purposes

bump

Https Everywhere.
Good addon.

Can you put it on an ec2?

btw, if two pajeets shit on the same street won't they have the same IP address?

I heard Oprah has a free VPN, not sure if it actually works/worth the effort.

I dont know what that is CIA nigger. I remember your flag.

rageuniversity.org/PRISONESCAPE/PRISON FIGHTING AND WEAPONS/index001.html

It's not as good a resource as murdercube, not having been compiled by the gentlemen and scholars of /k/, but it has a couple files murdercube missed. Between the two it makes for a pretty comprehensive library.

How come I can't save your flag. It's rare.

Remember kids: VPN then TOR.

no

people really should watch the youtube i linked above

opsec is difficult. fortunately, you dont need freedom fighter level opsec for these types of shenanigans, but still. generally if you're thinking about opsec after the fact you're going to have a bad time

For residential service using IPv4 (almost certainly behind NAT), yes but you can still be browser fingerprinted unless you take precautions. Run NoScript.
Businesses, schools, etc; may have static IPs assigned to them in which case it would be a no.
For IPv6, no.
Yeah but I wouldn't, the problem with running your own VPN is that you don't get the plausible deniability of having your traffic mixed with other users. If you insist here's a good seedbox script: github.com/arakasi72/rtinst and one for OpenVPN: github.com/JMSwag/OpenVPN-install (doesn't work behind NAT)

Americans have been searching for an Ally against Islamic terror in Europe and ironically in middle east. Its not bad having us as ally against Islamic terror, so forgo your levity please. Even the Chinese are standing up against you timesofindia.indiatimes.com/world/china/china-set-to-block-masood-azhar-ban-defying-us-india/articleshow/61328757.cms

Privateinternetacess.com

lookup resVPN... they host through a residential network so you won't be blocked on Sup Forums and most sites as long as you don't post stupid shit.

bump

But if you're tearing down and rebuilding it on a regular basis there won't be anything to trace. I doubt Amazon is archiving destroyed ec2s.

Just print the posters at home. Don't even think of printing them at the school. Use mobile data if you want to show off the fruits of your labor. Don't put any near security cameras

No. That's the point of subnetting

poo

bump, good info

>Sup Forums by default does not redirect you to https

A lot of IT departments have HTTPS Everywhere installed in the browser already, mostly for the staff's own safety.

If you must use a campus computer, use a public one and steal someone else's credentials. This will set a precedent that people are being framed.

>German level propaganda tactics
Place razor blades under each flier so they cannot be easily removed. Rust them so people can't take them to use.

Learn about changing your MAC address too. If

wiki.archlinux.org/index.php/MAC_address_spoofing

Here is a ten part series that covers crypto topics and command line tools

sanctum.geek.nz/arabesque/series/gnu-linux-crypto/

take out the yellow ink cartridge and print grayscale to avoid tracking
Use a typewriter for propaganda if possible
Buy a second hand printer cash
Use a disposable shitposting rig
If you’re worried about security cameras, put a rock in your shoe to change your gait, use a wig rather than a mask, glasses can be tossed away after use.
Use the tactics of the negro: wear two T-shirt’s in contrasting colors. Dump one after your actions. Black over white works well. Black over blue doesn’t.

Install the browser extension https-everywhere, it will default every site to using https

as long as you are using https you are good, OP is right, I would not browse Sup Forums on http at my campus

>https everywhere

yep this

This is excellent. Thank-you