>I am under attack
>My computer has been compromised
>Some one's tracking me online
>What do?
Use a Linux based distro (or any other obscure OS) as your primary host, preferably not ubuntu itself. If you insist on windows (not recommended), use their enterprise edition, turn off their telemetry, use a peerblock and use DWS (Destroy windows spying).
Encrypt your storgage
Use a secure DNS + DNScrypt. Optionally buy a private VPN
Always connect through a hardware firewall enabled router, keep your firewall on every devices activated
Optionally change your ISP, (change your default gateway)
Also
ALWAYS install a software from an official software repo, authenticate checksum of software (most package managers already do that)
Use HTTPS everywhere+Privacy Badger+uBlock Origin in your browser. Use uMatrix for maximum privacy
Don't use flash
Use a hardware password manager, change your login details
Don't use an antivirus
Use private tracker, download only trusted seed. Use a seedbox
Get an obscure phone (nokia n9 or something)
Never login to google/whatsapp/facebook/twitter or anything
Clean up your digital footpring if possible
Access your emails through a secure email client
Run windows applications only within a NETWORKLESS virtual machine
Always trust and prefer a free and open source software.
Don't put much of your personal data on your phone.
Also understand if a government security agency is after you, you have almost no chance fighting them. You probably have put enough personal data in the internet. Furthermore they have backdoors implanted everywhere and they may use it if you are that important to them.
Hi, /g/
Since I am new here please add your privacy recommendations to the list. Please recommend me some good offline portable password management device
>>53316244
Call FBI or tell your parole officer.
>>53316244
>Use a Linux based distro (or any other obscure OS) as your primary host
Linux and other freetard (besides maybe OpenBSD) operating systems have more exploits than Windows does, faggot. The only time Windows is worse is then the big bad gubbermint is after you, and you're completely fucking boned anyways if that happens.
>>53316330
Windows, as far as I know, has more known vulnerabilities than any other OSes.
I might be wrong though. Most of the softwares people install do not go through checksum authentication. Most of the exploits are written specifically for windows. This is why obscurity is important, I think.
>>53316395
>more known vulnerabilities than any other OSes
Fully updated Windows is very secure. There are LOADS of exploits popping up for Linux because the codebase is so fucking shitty. glibc bug, shellshock, these are vulnerabilities that affect literally 99% of Linux installs when they are found, and the vast majority of Linux installs never get updates. I have embedded devices on the network at my work that use fucking Linux 2.6.something, where all the workstations that use Windows are running Windows 7 with every important update installed as soon as it's available. Linux "MIGHT" be more secure if you're an autist and tweak grsecurity 100% of the way and install updates as soon as they appear, but for the most part Windows has far better security these days.
>>53316669
There are loads of exploits popping up because people actually read the fucking source intending to discover and disclose flaws.
Meanwhile, in windows land, chinks and russians are poking and peeking at a low-level and only disclosing flaws they find to their ill-intentioned friends.
WHY DOES GNU HAVE SO MANY BUGS? Because it is popular and constantly evaluated.
WHY DOES OBSCURE HIPSTER MINIMALIST SHIT WRITTEN IN PURE C HAVE SO FEW DESPITE BEING WRITTEN IN PURE C BY A BUNCH OF THIRD YEAR CS STUDENTS? Because nobody fucking reads the source except the five retard developers.
>>53316707
>people actually read the fucking source intending to discover and disclose flaws
If you want to have le open sores face then you need to account for the fucking 20 year old shellshock bugs that permeate the freetarded projects.
>>53316772
Shellshock:
The bug was 20 years old, the exploit wasn't - unless I am missing something obvious. There if you actually follow my list you probably won't have a problem unless someone has physical access to your computer
>>53316244
Add to the list:
Wear tinfoil hat at all times
>>53316826
>The bug was 20 years old, the exploit wasn't
Just because know one knows if it was exploited or not doesn't mean it wasn't.
>>53316826
The bug wasn't even a serious bug. It was made a bug by people deliberately using the UNIX shell for things you should, as a rule, use a proper language for. Multiple shells, including proprietary ones, have odd parsing bugs because it's made very clear that they are for user-domain hacks instead of system software like DNS.
Lock analogy:
Sergeant Retard first class secures area 51 with a cheap padlock because it's "traditional gate locking fare"
Area 51 gets busted into by a bunch of alien rights activists
A bunch of morons go around screaming that cheap padlocks should never be used ever and that master lock, the company that made the cheap padlock, should be deprived of all public trust even though they make much better locks that can stand up to bolt cutters
>>53316842
Trying hard to fit in?
>>53317061
I'm trying hard to fit out
>>53316867
Long time bugs have been in almost every software, anon
>>53317070
Then get out
>>53317084
I can't
>>53316244
Ok thanks dad
>>53317089
Here:
Smash that mf >>>/out/ link and post this picture because you finally figured it out
>>53317118
Try it out first
>>53316911
I kinda agree on this one
>Please recommend me some good offline portable password management device
Came here for this, pretty interesting tbqh
>>53316669
The sloppy nature of Windows' networking support code and protocol stacks also makes the system more vulnerable to Denial of Service attacks. A DoS attack is a form of computer vandalism or sabotage, with the intention to crash a system or otherwise render it unavailable. In a typical DoS attack a deliberately malformed network packet is sent to the target system, where it triggers a known flaw in the operating system to disrupt it. In the case of Windows, though, there are more ways to bring down a system. For example, the kernel routines in Windows 2000 and XP that process incoming IPsec (UDP port 500) packets are written so badly that sending a stream of regular IPsec packets to the server will cause it to bog down in a CPU overload. And of course Windows' IPsec filters cannot block a 500/udp packet stream.
Another way to render a system unavailable is a Distributed Denial of Service attack. A DDoS attack involves many networked systems that send network traffic to a single target system or network segment, which is then swamped with traffic and becomes unreachable. There's very little that can be done against DDoS attacks, and all platforms are equally vulnerable.
With all these DoS and DDoS vulnerabilities, it's a worrying development that Windows 2000 and XP provide new platforms to generate such attacks. The only real 'improvement' in Windows 2000's and XP's IP stacks is that for no good reason whatsoever, Microsoft has extended the control that an application has over the IP stack. This does not improve Windows' sub-standard networking performance, but it gives applications the option to build custom IP packets to generate incredibly malicious Internet traffic. This includes spoofed source IP addresses and SYN-flooding full scale Denial of Service (DoS) attacks. As if things weren't bad enough...
>>53317506
Don't forget the LAND attack.
>>53316330
>>53316669
>citation needed
>>53317176
anyone?
>>53317176
>>53319059
Doesn't exist. Tried KeePass + KeeFox but the UI just sucks ass.
>>53316244
>Also understand if a government security agency is after you, you have almost no chance fighting them.
Also this. I'm going back to apple the first chance I get. Sorry, but fuck all this OS "non-botnet" bs, apple's fighting my legal battles for me.
>tfw using win 10 with no fucks given
>>53316244
>Encrypt your storgage
>Use a secure DNS + DNScrypt. Optionally buy a private VPN
>Always connect through a hardware firewall enabled router, keep your firewall on every devices activated
>Optionally change your ISP, (change your default gateway)
>Also
>ALWAYS install a software from an official software repo, authenticate checksum of software (most package managers already do that)
>Use HTTPS everywhere+Privacy Badger+uBlock Origin in your browser. Use uMatrix for maximum privacy
>Don't use flash
>Use a hardware password manager, change your login details
>Don't use an antivirus
>Use private tracker, download only trusted seed. Use a seedbox
>Get an obscure phone (nokia n9 or something)
>Never login to google/whatsapp/facebook/twitter or anything
>Clean up your digital footpring if possible
>Access your emails through a secure email client
>Run windows applications only within a NETWORKLESS virtual machine
>Always trust and prefer a free and open source software.
>Don't put much of your personal data on your phone.
>Also understand if a government security agency is after you, you have almost no chance fighting them. You probably have put enough personal data in the internet. Furthermore they have backdoors implanted everywhere and they may use it if you are that important to them.
Don't use the internet or computers.
>>53319368
Yes please do that
>>53316284
/thread
>>53316284
/thread
If you're under attack, or suspect someone is cyber stalking you or attempting to compromise the security of your computer, that's as good as assault these days. Get people who can put these people away involved.
>>53316284
What if he lives outside the USA?
>>53316669
>glibc, shellshock
>affect 99% of linux installs
That's wrong, you fucking retard. Most linux installs are on smartphones (android) and other embedded devices, neither of which use glibc, bash
>the vast majority of linux installs never get updates
You do know security updates are backported to older kernel versions, right? Oh wait, of course you dont, because you're a dumbass
>>53321419
>android is linux
Embedded devices typically don't get kernel updates.
Baracuda firewall use it
>>53317176
An encrypted .txt file.
>>53321569
How is it better than iptables/ufw?
>>53320860
Contact your local cyber crime department
>>53316244
should of used windows 10 nerd LMAO
>>53319368
Kind of what I was thinking as well. Why bother even using a computer if you're so paranoid that you're going to do all of that crap and limit yourself to basically nothing? Sure, I block ads, run Peerblock, and do some of that other stuff to keep malware off my computer in the first place, but as far as my online footprint goes I'm already deeply entrenched in the botnet. And I don't really mind it.
>>53324461
Take your English classes seriously
>>53324583
Those are very rudimentary steps. anon. You don't know the half of it probably
>>53316669
>It's insecure because manufacturer is retarded and doesn't supply updates
You do realize windows isn't immune to this kind of stupidity, right? Most medical devices don't get updates either and run windows.
And the question was about desktop Linux.
>>53324816
Maybe rudimentary if you haven't touched a computer in the last 20 years and you haven't come to depend on them for your daily life.
>>53324947
So tell me, which things do you find not necessary?
>>53324593
what if he/she/it/? is ethnic?
that's a hate crime!
No one is going to mention that the USB key in the picture has the account number printed on it!? Really?