Menu Close

Tag: cybersecurity (page 2 of 2)

This website was archived on July 20, 2019. It is frozen in time on that date.
Exolymph creator Sonya Mann's active website is Sonya, Supposedly.

Keep Your Head Down

Reading about operational security has turned my mind toward privacy rights. Opsec tactics are concerned with shielding information from enemy access — mostly through rigorous, consistent caution. As the Animal Liberation Front put it in one of their direct action guides, “True security culture requires a clear head, a rational mind, and personal self-control.” The assumption made by savvy opsec practitioners is that all data will be compromised eventually. Therefore, they aim to minimize the inevitable consequences.

I used to disregard privacy. My attitude was a classic: “If you’re not doing anything wrong, then you have nothing to hide!” (a viewpoint refuted very well by Robin Doherty). The problem is that even people who are acting ethically can run afoul of the law or be persecuted by the authorities. Consider how the FBI treated civil rights activists in the 1960s. Current mass surveillance by the NSA and similar government bodies is equally worrisome, as is the treatment of whistleblowers like Chelsea Manning. I’m not naive enough to think that this behavior will stop. People do anything that they are physically or technically capable of doing in order to access power — especially state agents.

Portrait of Edward Snowden by John Meyer of The Spilt Ink; $130.79 on Etsy.

Portrait of Edward Snowden by John Meyer of The Spilt Ink; $130.79 on Etsy.

I’m still not convinced that privacy should be a guaranteed legal right, or if so, to what extent. The best way to restrict your own information is simply to be secretive — stay quiet and maintain the impression of insignificance. After all, the vast majority of day-to-day privacy compromises are self-inflicted, simply because most people don’t care. That’s how Facebook and other social networks manage to compile detailed dossiers on their users.

So, what’s the essential takeaway here? I’m not sure. It’s interesting to ponder the consequences of a post-privacy society, until you realize that we already live in one. The results are quite mundane. Feels normal, right?

Behavior Can Trump Encryption

Advice from Whonix’s guide to preserving internet anonymity via web opsec:

“Someone sent you an pdf by mail or gave you a link to a pdf? That sender/mailbox/account/key could be compromised and the pdf could be prepared to infect your system. Don’t open it with the default tool you were expected use […] by the creator. For example, don’t open a pdf with a pdf viewer.”

I’m less interested in this specific suggestion than the principle behind it. The bolded sentence hits on a key insight — when you can, subvert your enemy’s expectations. How would their perfect target behave? Adopt the opposite practices. Of course, this adds a lot of inconvenience to your life, so keep in mind whether your situation warrants elaborate identity-protection.

Photo by Shannon Kringen.

Photo by Shannon Kringen.

I also read through some of the Hacker News comments on Whonix’s how-to, and this one by user nikcub stood out as being particular savvy: “Your personas [should be] isolated and segregated. They share no information, hobbies, interests and at a tech level they don’t share connections, machines, browsers, apps.”

When you’re trying to stay anonymous, having access to high-tech tools is very helpful — donate to TOR! — but being careful and thinking through every step is even more crucial.

nikcub’s comment also recommended Underground Tradecraft (thegrugq’s Tumblr) so I fell into an opsec rabbit hole. Expect more on this topic soon.

© 2019 Exolymph. All rights reserved.

Theme by Anders Norén.