Welcome to ECCIE, become a part of the fastest growing adult community. Take a minute & sign up!

Welcome to ECCIE - Sign up today!

Become a part of one of the fastest growing adult communities online. We have something for you, whether you’re a male member seeking out new friends or a new lady on the scene looking to take advantage of our many opportunities to network, make new friends, or connect with people. Join today & take part in lively discussions, take advantage of all the great features that attract hundreds of new daily members!

Go Premium

Go Back   ECCIE Worldwide > General Interest > Security Matters
test
Security Matters Personal security is of the utmost priority. Discussions regarding every aspect of personal security within the hobby can be found here.

Most Favorited Images
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
Most Liked Images
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
Top Reviewers
cockalatte 649
MoneyManMatt 490
Jon Bon 400
Still Looking 399
samcruz 399
Harley Diablo 377
honest_abe 362
DFW_Ladies_Man 313
Chung Tran 288
lupegarland 287
nicemusic 285
Starscream66 282
You&Me 281
George Spelvin 270
sharkman29 256
Top Posters
DallasRain70830
biomed163721
Yssup Rider61293
gman4453366
LexusLover51038
offshoredrilling48830
WTF48267
pyramider46370
bambino43221
The_Waco_Kid37425
CryptKicker37231
Mokoa36497
Chung Tran36100
Still Looking35944
Mojojo33117

Reply
 
Thread Tools
Old 03-10-2010, 01:35 AM   #1
Greyhound
Account Disabled
 
Join Date: Dec 31, 2009
Location: America
Posts: 109
Encounters: 10
Default Basic private setup

Being a computer geek, and super paranoid, I've fiddled around with some ideas until I think I've been able to come up with something that pretty much keeps me free and clear in the "computer tracking" dept. I just thought I'd share it here, so that others can take what they want from it and hopefully help them out.

Rule #1 : everything in cash. If you have to filter some out of the ATM every so often to get a pile together, then that's fine. Cash is king, and basically untraceable.

With the advent of pre-paid cell phones, there are also several services that provide pre-paid internet access. I know of several from Verizon (which seems to be the best quality, but that's just my opinion), T-Mobile, AT&T, and I think Sprint will have one soon, but don't quote me on that. Get a USB-based pre-paid internet modem like Verizon's MC760, and get the monthly package. I got mine from a corner multi-reseller and paid cash for it, giving a false name for the sales reciept. Initially it will have a 500mb transfer limit, but as long as you're not surfing YouTube or downloading MP3s, that will last you a while for basic email and website perusing. Just like cell phones, it can be refilled by buying a pre-paid card (with cash) and applying the balance to your account via phone/acct number.

So now you've got an unconnected IP address that does not have your name on it anywhere. Now for the actual computer tracks...

With this same USB modem, get a MicroSD card (4 gb is fairly standard and cheap) that plugs into it as added storage. If the modem you buy doesn't support MicroSD, then simply buy a seperate USB flash drive.

Www.portableapps.com has a host of applications that will run only off the USB drive, and will leave whatever computer you happen to be on virtually clean. I use FireFox Portable, with an encrypted RoboForm to remember all my passwords. The cache runs from the USB, so no "temp" files are left on the host machine. It's a bit slower, but it's worth the peace of mind. I've also got an encrypted lock on the drive, in case I lose it, all my info will be secured. All these apps run directly from the USB, so there's no trace on the host computer.

When it's all said and done, for good measure simply run CCleaner (again, save the program on your USB) to wipe away any leftovers.

That being said, the rest is common sense. NEVER browse hobby sites/info when you're on a work computer, even using this method. You never know what kind of monitoring is happening on a work computer. Someone could be watching everything on your screen from the other side of the building, and you'll never know. ONLY browse from a machine you feel/know is already relatively safe.

All in all, I've got less than $200 invested in my setup, and that's including the first month of internet service (at $50 + tax). Unless someone walks in on my while i'm in the middle of something, no one will be able to find anything on this computer, nor can my IP address be traced to me. They might be able to see which cell tower I'm running off of, but unless they invest in a full team to triangulate my position (and god help us all if they get that desperate to hunt down us sinners), then I'm less than a needle in a haystack.

As usual (well, not really, seeing as how this is the first post i've made like this), I make full disclaimer that the information included herein is to be used for educational purposes only, and not for any illegal or illicit activities. If you get busted, it's your own damn fault.

Really, this is just one man's idea of how to be safe in the dangerous underworld of computer paranoia.

Peace out.
Greyhound is offline   Quote
Old 03-10-2010, 02:12 AM   #2
EmilyHemingway
Pending Age Verification
 
User ID: 5956
Join Date: Jan 6, 2010
Location: Corpus Christi, Texas
Posts: 453
My ECCIE Reviews
Default

You're awesome, Greyhound. I hope you don't mind if I add a few things that are on my wish list for all hobbyists.

Wipe your text messages regularly. After the appointment is done and went well, there is no need to keep a record of it lying around.

Wipe your inbox and PMs while you're at it.

Set your computer to clear history every day. Clear cookies and files every time you log off.

Don't bookmark hobby sites.

Empty your Recycle bin.

Flash drives are the greatest invention ever. If you listen to nothing else Greyhound said, get a flash drive.
EmilyHemingway is offline   Quote
Old 03-10-2010, 02:22 AM   #3
Tex9401
Moderator
 
Tex9401's Avatar
 
Join Date: Dec 20, 2009
Location: West Texas
Posts: 4,389
Encounters: 3
Default

http://www.newegg.com/Product/Produc...82E16820134988

http://www.micro-sd.us/10-493964-B00...der_Black.html

http://www.robotshop.com/microsd-usb-reader.html

Here are some links on microsd usb reader. Kingston's reader comes 16 gig card. Cool thing about sd and microsd card, that have physical locks on them. I used them out the field since viruses can autorun and regular jump drives don't have write protect and gotten viruses on them.
Tex9401 is offline   Quote
Old 03-10-2010, 04:45 AM   #4
Guest032514-1
Account Disabled
 
User ID: 3495
Join Date: Dec 31, 2009
Posts: 2,138
My ECCIE Reviews
Default

Very very very good tips. I run VirtualBox/Chrome OS on my card. Setting your computer to clean itself and run a cleaner (I use windows washer) as part of your computer's log off is huge.

This is some very very good advice. And since I do it - it doesn't take a rocket scientist.

An ounce of prevention.......
Guest032514-1 is offline   Quote
Old 03-10-2010, 12:38 PM   #5
guest041110
Account Disabled
 
Join Date: Mar 27, 2009
Location: Gone Fishing
Posts: 919
Encounters: 1
Thumbs up

Another way of thinking about this is to do what I have done in the past. Use VMWare and setup your own base machine that has all that you want in it like HD storage, browser of your choice, your favorites, OS of choice, etc. Once you start the VM machine, it runs in its own space within your host computer's OS. You can get infected by viruses galore and never worry about those translating to your host machine.

There will not necessarily be the disconnected nature described above unless you use that same setup on your host machine which will translate to your VM machine. That means you can have an awesomely hot host and many different VM's configured just like you like them.

Once they bite the dust due to virus or whatever, you delete the VM you are using and start fresh with a copy of the configuration you made of the base VM before you started. That way, you don't lose a thing.

Good thread by the way and thanks for posting this information.
guest041110 is offline   Quote
Old 03-11-2010, 08:39 AM   #6
AustinBusinessTraveler
Valued Poster
 
AustinBusinessTraveler's Avatar
 
Join Date: Dec 19, 2009
Location: On walkabout
Posts: 352
Encounters: 6
Default

Couple of thoughts. It's a good basic scenario and makes you much much harder to track than the next guy (which is always a good way to be). That said, I would still recommend looking into encrypted connections for providers and guys who want to be invisible.

The reason I mention this is that typically, people who use a "mobile" connection use it from their home almost exclusively. Since the signal gets bounced off multiple satellites and can be pinpointed, this defeats the purpose if you are seriously being investigated (not likely in our little world). As a real world example, this same signal tracking (albeit of a cell signal rather than a data signal) is how Pablo Escobar was tracked down.

How do you defeat that? Simple, be mobile with your signal... hell, just get out of the house once and a while. And turn off the signal when you aren't actively using it. That would make the "home" location look like just another of the many places you use the connection.

At the end of the day privacy / security is a balancing act of convenience and security / privacy.

As for the VM setup, it defeats the purpose of using portable apps. You use portable apps because they leave no tracks on your computer whatsoever. For example, Chrome portable (or far better would be to get Iron portable which is a more secure version of Chrome) leaves nothing on the USB once you are done.
AustinBusinessTraveler is offline   Quote
Old 03-11-2010, 06:14 PM   #7
GTO
Premium Access
 
Join Date: Dec 31, 2009
Location: Houston
Posts: 213
Encounters: 69
Default

ABT, do you know if the InPrivate option on Internet Explorer browsing will cover your tracks very well ?
GTO is offline   Quote
Old 03-11-2010, 10:00 PM   #8
AustinBusinessTraveler
Valued Poster
 
AustinBusinessTraveler's Avatar
 
Join Date: Dec 19, 2009
Location: On walkabout
Posts: 352
Encounters: 6
Default

GTO,

Define how you mean covering your tracks. It will limit what tracks are left on your computer itself (albeit not from a system admin if applicable). If you are talking about security to protect your identity on the other side of the internet (i.e. to prevent anyone from tracking remotely or from leaving tracks on the web), then this will not do anything for you.

From MS's own site, on what InPrivate will not do:

While InPrivate Browsing keeps other people who might be using your computer from seeing what you visited on the web, it does not prevent someone on your network—such as a network administrator or hacker—from seeing where you went.

InPrivate Browsing does not necessarily provide you with anonymity on the Internet. That means that websites might be able to identify you through your web address, and anything you do or enter on a website can be recorded by that website.

Any favorites or feeds that you add while using InPrivate Browsing are not going to be removed when you close your InPrivate Browsing session. Changes to Internet Explorer settings, such as adding a new home page, are also retained after you close your InPrivate Browsing session.


It has it's advantages for sure. That said, an encrypted drive (USB or just an SD card you leave in, using AES w/ 512 hashing as a minimum encryption) with a portable browser (Chrome, Iron, Firefox, etc) means that even if anyone decided to dig through the remnants of the drive there would be little to no chance of finding any information.

When it comes to protecting against leaving traces all over the web... that's a whole other section and, simply put, costs some money to make happen.
AustinBusinessTraveler is offline   Quote
Old 03-11-2010, 11:49 PM   #9
VitaMan
Premium Access
 
VitaMan's Avatar
 
Join Date: Feb 27, 2010
Location: houston
Posts: 10,561
Encounters: 71
Default

just a small point on the pre-paid phones.

even though disposable, when you get one at a phone store, you have to give ID -
so I don't know if that's a security point, but it does match you to the phone number. and also maybe you have to give the ID to be able to use credit card refills,
so they match names....

maybe this is avoidable by getting a pre-paid phone from a corner multi-reseller, and buying pre-paid cards with cash....
VitaMan is online now   Quote
Old 03-11-2010, 11:58 PM   #10
Greyhound
Account Disabled
 
Join Date: Dec 31, 2009
Location: America
Posts: 109
Encounters: 10
Default

Quote:
Originally Posted by VitaMan View Post
just a small point on the pre-paid phones.

even though disposable, when you get one at a phone store, you have to give ID -
...
maybe this is avoidable by getting a pre-paid phone from a corner multi-reseller, and buying pre-paid cards with cash....

I got a TracFone from Wal-Mart (that i don't normally go to) and paid cash, then buy re-fill cards at random locations (CVS, WalGreens, etc), also paying cash. I've never had to give an ID for it. When I activated the phone, I found a payphone next to a Stripes/Valero to call it in. Never gave anyone an ID or a real name. If they can track me, then they're investing WAY too much time and effort into a small-potatoes case.
Greyhound is offline   Quote
Old 03-12-2010, 02:20 AM   #11
Guest032514-1
Account Disabled
 
User ID: 3495
Join Date: Dec 31, 2009
Posts: 2,138
My ECCIE Reviews
Default

Quote:
Originally Posted by AustinBusinessTraveler View Post
For example, Chrome portable (or far better would be to get Iron portable which is a more secure version of Chrome) leaves nothing on the USB once you are done.
Are you talking Chrome OS or Chrome browser? I use both on a 8g card. Link to Iron? Thx..
Guest032514-1 is offline   Quote
Old 03-12-2010, 08:09 AM   #12
guest040711-1
Account Disabled
 
Join Date: Mar 26, 2009
Location: The Great State of Texas
Posts: 6,433
Encounters: 60
Default

Add Google Voice to the list, I use it to call and text about hobby issues, it shows my google voice number not my cell number I'm using for the connection.
guest040711-1 is offline   Quote
Old 03-12-2010, 10:22 AM   #13
ydnar22
Registered Member
 
Join Date: Feb 23, 2010
Location: kansas city
Posts: 26
Default

Google talk? Google keep records of everything. they more data on us than the FBI and CIA combined. And it Gets subpoenaed 20-30k time a year. Not a Safe bet by any means. Google makes there money by knowing what you want, so they track everything you do.

I may be just paranoid But i do not even surf the web from my Own Ip address. 3-5 other connections between me and any web server.
ydnar22 is offline   Quote
Old 03-12-2010, 02:34 PM   #14
guest040711-1
Account Disabled
 
Join Date: Mar 26, 2009
Location: The Great State of Texas
Posts: 6,433
Encounters: 60
Default

I think Google talk and Google Voice are two different things.
guest040711-1 is offline   Quote
Old 03-12-2010, 10:24 PM   #15
Guest032514-1
Account Disabled
 
User ID: 3495
Join Date: Dec 31, 2009
Posts: 2,138
My ECCIE Reviews
Default

I'm with SP. Love Voice.
Guest032514-1 is offline   Quote
Reply

Thread Tools


Similar Threads
Thread Thread Starter Forum Replies Last Post
private message pyro Coed Discussions - Houston 11 02-12-2010 02:39 AM

AMPReviews.net
Find Ladies
Hot Women

Powered by vBulletin®
Copyright © 2009 - 2016, ECCIE Worldwide, All Rights Reserved