Resistance

This blog is a mirrior site of resistanceindia.blogspot.com

Archive for the ‘Internet Security’ Category

How to browse the Internet anonymously from home ,office or any other place

Posted by Indian Vanguard on April 13, 2007

Many mice surf the web under the illusion that their actions are private and
anonymous
.Unfortunately, it isn’t so. Every time you visit a site for a piece
of cheese
, you leave a calling card that reveals where you’re coming from,
what kind of computer you have, and other details. And many cats keep
logs of all your visits, so that they can catch you!
From http://anonymouse.org/

This problem can be overcome by using proxies.

List of Website that offer free web proxies

A very important resource on Internet Privacy.
Do click on the link below for those who are interested in
these matters in detail.

http://dmoz.org/Computers/Security/Internet/Privacy/

Browse the Web using TOR

Tor: anonymity onli

Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.

Tor aims to defend against traffic analysis, a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security. Communications are bounced around a distributed network of servers called onion routers, protecting you from websites that build profiles of your interests, local eavesdroppers that read your data or learn what sites you visit, and even the onion routers themselves.

Install TOR button into your Mozilla Firefox browser

https://addons.mozilla.org/en-US/firefox/addon/2275

TOR official website

How TOR works

Posted in Internet Security | Leave a Comment »

How to create a backup for you blog and get around any future bans

Posted by Indian Vanguard on April 13, 2007

Courtesy: Naxal Revolution

Considering the high levels of paranoia and elevated sense of madness within the establishment it seems extremely likely that they are going to do something in desperation ,it is hence highly recommended you back up your blog and create mirror sites to withstand any such attacks.

If you follow the steps outlined in this post
Your blog is virtually indestructible as long as your physical existence is sustained.And it shall rise again and again like the phoenix.

This procedure is for those who have a blog on blogger.com

1.Go to wordpress.com and sign up for an account and create a new blog.

2.Click on Manage——> And then click on Import

WordPress will guide you through the rest of the procedure.

And Voila ! your blog is set up on wordpress.com

Mirror Site of Resistance India on WordPress.com

https://resistanceindia.wordpress.com/

Repeat this procedure once or twice a month to keep updating your
archives.

All it takes is 10 minutes of you time.

This Blog EXIM policy can be repeated again and again until you
have as many blogs as you desire.

In the event of a ban/block/deletion you can keep jumping from one
platform to another , one address to another.

How to save your blog to your Hardrive

Once you have your blog setup on wordpress.com

You can save your entire blog in xml format onto your hardrive.

To do this go to your dashboard and
click on Manage——> And then click on Export

Here you will get the option to save your entire blog onto your hardrive.

I just saved mine and it was only 6 MB.


Create copies of this file , write them onto a CD or tuck
them away in some online storage account or you could
use it to setup a blog on blogspot !

Posted in Internet Security | Leave a Comment »

Internet Security Week

Posted by Indian Vanguard on April 12, 2007

Naxal Revolution

Reactionary governments have shown themselves willing to attack and intimidate people who aren’t even radicals and who are just researching social and political movements. They are also willing to repress or monitor people for other reasons. Repression is a real threat in some circumstances, and Naxalrevolution takes this seriously for the sake of the people who visit this site and other sites for different reasons.

Maintaining anonymity and practicing secure behaiviour makes it more difficult for agents and officials, often violating civil rights and breaking laws, to identify people interested in revolutionary knowledge.

It also makes things harder for right-wing activists, vigilantes and other groups to ruin the lives of people interested in revolutionary education.

As a part of Internet Security week the below posts will guide you on how to adopt some of the best internet security practices and how to secure your means of communication

For any doubts or clarifications please leave a request in the comments section.

Credits: I would like to thank irtr from whom I first heard about these security practices and riseup for the detailed information and good work that they are doing.

After reading the below posts.Naxalrevolution strongly recommends that you sign up for a new email account at either

Hushmail.com

or

Riseup.net
Please see to it that you adhere to their terms and conditions.
Full list of email providers is given in the below posts.

and use it for communicating with your friends and with us.
We will shortly be announcing our new email id.



Why security matters

Source : Riseup.net

Every email takes a perilous journey. A typical email might travel across twenty networks and be stored on five computers from the time it is composed to the time it is read. At every step of the way, the contents of the email might be monitored, archived, cataloged, and indexed. However, it is not the content of your email which is most interesting: typically, a spying organization is more concerned by whom you communicate with.

There are many ways in which this kind of mapping of people’s associations and habits is far worse than traditional eavesdropping. By cataloging our associations, a spying organization has an intimate picture of how our social movements are organized–a more detailed picture than even the social movements themselves are aware of. This is bad. Really bad. The US government, among others, has a long track record of doing whatever it can to subvert, imprison, kill, or squash social movements which it sees as a threat (black power, anti-war, civil rights, anti-slavery, native rights, organized labor, and so on). And now they have all the tools they need to do this with blinding precision.

We believe that communication free of eavesdropping and association mapping is necessary for a democratic society (should one ever happen to take root in the US). We must defend the right to free speech, but it is just as necessary to defend the right to private speech. Unfortunately, private communication is not possible if only a few people practice it: they will stand out and open themselves up to greater scrutiny. Therefore, we believe it is important for everyone to incorporate as many security measures in your email life as you are able.

Email is not secure

You should think of normal email as a postcard: anyone can read it, your letter carrier, your nosy neighbor, your house mates. All email, unless encrypted, is completely insecure. Email is actually much less secure than a postcard, because at least with a postcard you have a chance of recognizing the sender’s handwriting. With email, anyone can pretend to be anyone else. There is another way in which email is even less private than a postcard: the government does not have enough labor to read everyone’s postscards, but they probably have the capacity and ability to scan most email. Based on current research in datamining, it is likely that the government does not search email for particular words but rather looks for patterns of association and activity.

In the three cases below, evidence is well established that the US government conducts widespread and sweeping electronic survillence.

full-pipe monitoring

According to a former Justice Department attorney, it is common practice for the FBI to practice “full-pipe monitoring”. The process involves vacuuming up all traffic of an ISP and then later mining that data for whatever the FBI might find interesting. The story was first reported on January 30, 2007 by Declan McCullagh of CNET News.com.

AT&T

The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecom giant of violating the law and the privacy of its customers by collaborating with the National Security Agency (NSA) in its massive and illegal program to wiretap and data-mine Americans’ communications.

Because AT&T is one of the few providers of the internet backbone (a so called Tier 1 provider), even if you are not an AT&T customer is is likely that AT&T is the carrier for much of your interent traffic. It is very likely that other large internet and email providers have also worked out deals with the government. We only know about this one because of an internal whistleblower.

Carnivore

For legal domestic wiretaps, the U.S. government runs a program called Carnivore (also called DCS1000).

Carnivore is a ‘black box’ which some ISPs are required to install which allows law enforcement to do ‘legal’ wiretaps. However, no one knows how they work, they effectively give the government total control over monitoring anything on the ISP’s network, and there is much evidence that the government uses carnivore to gather more information than is legal.

As of January 2005, the FBI announced they are no longer using Carnivore/DCS1000 and are replacing it with a product developed by a third party. The purpose of the new system is exactly the same.

ECHELON

ECHELON is a spy program operated cooperatively with the governments of the United States, Canada, United Kingdom, Australia, and New Zealand. The goal is to monitor and analyze internet traffic on a wide scale. The EU Parliament has accused the U.S. of using Echelon for industrial espionage.

Call database

On May 10, USAToday broke the story that the NSA has a database designed to track every phone call ever made in the US. Although this applies to phone conversations, the fact that the government believes that this is legal means that they almost certainly think it is legal to track all the email communication within the US as well. And we know from the AT&T case that they have the capability to do so.

You can do something about it!

What a gloomy picture! Happily, there are many things you can do. These security pages will help outline some of the simple and not-so-simple changes you can make to your email behavior .

What a gloomy picture! Happily, there are many things you can do. These security pages will help outline some of the simple and not-so-simple changes you can make to your email behavior.

* Secure Connections: by using secure connections, you protect your login information and your data while is in transport to riseup.net.
* Secure Providers: when you send mail to and from secure email providers, you can protect the content of your communication and also the pattern of your associations.
* Public Key Encryption: although it is a little more work, public key encryption is the best way to keep the content of your communication private.

See the next page, Security Measures, for tips on these and other steps you can take. Remember: even if you don’t personally need privacy, practicing secure communication will ensure that others have the ability to freely organize and agitate.


 

Simple Measures for Email Security

Source : Riseup.net

Practice secure behavior!

These pages include a lot of fancy talk about encryption. Ultimately, however, all this wizbang cryto-alchemy will be totally useless if you have insecure behavior. A few simple practices will go a long way toward securing your communications:

  1. Logout: make sure that you always logout when using web-mail. This is very important, and very easy to do. This is particular important when using a public computer.
  2. Avoid public computers: this can be difficult. If you do use a public computer, consider changing your password often or using the virtual keyboard link (if you use riseup.net for your web-mail).
  3. Use good password practice: you should change your password periodically and use a password which is at least 6 characters and contains a combination of numbers, letters, and symbols. It is better to use a complicated password and write it down then to use a simple password and keep it only in your memory. Studies show that most people use passwords which are easy to guess or to crack, especially if you have some information about the interests of the person. You should never pick a password which is found in the dictionary (the same goes for “love” as well as “10v3” and other common ways of replacing letters with numbers).
  4. Be a privacy freak: don’t tell other people your password. Also, newer operating systems allow you to create multiple logins which keep user settings separate. You should enable this feature, and logout or “lock” the computer when not in use.

Use secure connections!

What are secure connections?

When you check your mail from the riseup.net server, you can use an encrypted connection, which adds a high level of security to all traffic between your computer and riseup.net. Secure connections are enabled for web-mail and for IMAP or POP mail clients. This method is useful for protecting your password and login. If you don’t use a secure connection, then your login and password are sent over the internet in a ‘cleartext’ form which can be easily intercepted. It is obvious why you might not want your password made public, but it may also be important to keep your login private in cases where you do not want your real identity tied to a particular email account.

How do I use secure connections?

In the web browser, if the location starts with https:// then you have a secure connection. Your web browser should also display a little padlock icon either in the location bar or in the bottom corner of the window.

The limits of secure connections

The problem with email is that takes a long and perilous journey. When you send a message, it first travels from your computer to the riseup.net mail server and then is delivered to the recipient’s mail server. Finally, the recipient logs on to check their email and the message is delivered to their computer. Using secure connections only protects your data as it travels from your computer to the the riseup.net servers (and vice versa). It does not make your email any more secure as it travels around the internet from mail server to mail server. To do this, see below.

Use secure email providers

What is StartTLS?

There are many governments and corporations which are sniffing general traffic on the internet. Even if you use a secure connection to check and send your email, the communication between mail servers is almost always insecure and out in the open. Fortunately, there is a solution! StartTLS is a fancy name for a very important idea: StartTLS allows mail servers to talk to each other in a secure way. If you and your friends use only email providers which use StartTLS, then all the mail traffic among you will be encrypted while in transport. If both sender and recipient also use secure connections while talking to the mail servers, then your communications are likely secure over its entire lifetime. We will repeat that because it is important: to gain any benefit from StartTLS, both sender and recipient must be using StartTLS enabled email providers. For mailing lists, the list provider and each and every list subscriber must use StartTLS.

Which email providers use StartTLS?

Currently, these tech collectives are known to use StartTLS:

Naxalrevolution strongly recommend that you and all your friends get email accounts with these tech collectives! Additionally, these email providers often have StartTLS enabled:

What are the advantages of StartTLS?

This combination of secure email providers and secure connections has many advantages:

  • It is very easy to use! No special software is needed. No special behavior is needed, other than to make sure you are using secure connections.
  • It prevents anyone from creating a map of whom you are communicating with and who is communicating with you (so long as both parties use StartTLS).
  • It ensures that your communication is pretty well protected.
  • It promotes the alternative mail providers which use StartTLS. The goal is to create a healthy ecology of activist providers–which can only happen if people show these providers strong support. Many of these alternative providers also also incorporate many other important security measures such as limited logging and encrypted storage.

What are the limitations of StartTLS?

However, there are some notable limitations:

  • Your computer is a weak link: your computer can be stolen, hacked into, have keylogging software or hardware installed.
  • It is difficult to verify: for a particular message to be secure, both the origin and destination mail providers must use StartTLS (and both the sender and recipient must use encrypted connections). Unfortunately, it is difficult to confirm that all of this happened. For this, you need public key encryption (see below).

Use public-key encryption

If you wish to keep the contents of your email private, and confirm the identity of people who send you email, you should download and install public-key encryption software. This option is only available if you have your own computer. Public-key encryption uses a combination of a private key and a public key. The private key is known only by you, while the public key is distributed far and wide. To send an encrypted message to someone, you encrypt the message with their public key. Only their private key will be able to decrypt your message and read it.

The universal standard for public-key encryption is Pretty Good Privacy (PGP) and GNU Privacy Guard (GPG). GPG is Free Software, while PGP is a proprietary product (although there are many freeware versions available). Both work interchangeably and are available as convenient add-ons to mail clients for Linux, Mac, and Windows. For information configuring your mail client to use public key encryption, see our mail client tutorial pages. In particular, see the tutorials for Apple Mail and Thunderbird. Otherwise, you should refer the to documentation which comes with your particular mail client. Although it provides the highest level of security, public-key encryption is still an adventure to use. To make your journey less scary, we suggest you keep these things in mind:

  • Be in it for the long haul: using public-key encryption takes a commitment to learning a lot of new skills and jargon. The widespread adoption of GPG is a long way off, so it may seem like a lot of work for not much benefit. However, we need early adopters who can help build a critical mass of GPG users.
  • Develop GPG buddies: although most your traffic might not be encrypted, if you find someone else who uses GPG try to make a practice of communicating using only GPG with that person.
  • Look for advocates: people who use GPG usually love to evangelize about it and help others to use it to. Find someone like this who can answer your questions and help you along.

Although you can hide the contents of email with public-key encryption, it does not hide who you are sending mail to and receiving mail from. This means that even with public key encryption there is a lot of personal information which is not secure. Why? Imagine that someone knew nothing of the content of your mail correspondence, but they knew who you sent mail to and received mail from and they knew how often and what the subject line was. This information can provide a picture of your associations, habits, contacts, interests and activities. The only way to keep your list of associations private is to to use an email provider which will establish a secure connection with other email providers. See Use secure email providers, above.

Security resources for activists


This above posts contains a quick overview of email security. For more in-depth information, check out these websites:

Related links

Electronic Privacy Information Center:

Electronic Frontier Foundation:

American Civil Liberties Union:

Center for Democracy and Technology:

Wikipedia:

News Articles

Posted in Internet Security | Leave a Comment »

Intelligence Bureau declares war on Pro-Maoist bloggers

Posted by Indian Vanguard on April 9, 2007

Two days ago a popular forum run by us on a social networking site was taken down by the Intelligence agencies.Clearly the popularity of the forum was what alarmed the agents and in a sense of panic they decided to ask the service provider to delete this discussion forum of ours

which had approximately 200 members.

The forum contained nothing illegal nor did it promote violence.It was a place for popular discussion on current events, politics , with CPM bashing occupying most of our time.

We now believe that the Intelligence bureau is now monitoring all blogs ,email ids and groups which may even be slighly pro-maoist.Not only are all bloggers being monitored but also those who visit such blogs and subscribe to them through email.

Naxalrevolution and Resistance india along with other pro-maoist bloggers condemns this unwarranted harassment and aggression on part of the Cyber Intelligence and has decided to initiate suitable steps to safe guard the security of bloggers,readers and blogs.

In view of this development it has been decided that from

April 10th to April 14th

we will be observing

Internet Security Week

on this blog.

All regular posting has been suspended and we will be posting articles about the internet and create awareness about basic internet security all through this week.Regular programming resumes next week.

Regards

Team Naxal Revolution

Posted in Announcement, Internet Security | Leave a Comment »