underground security's journal picture

underground security

followFollow
🤴
Administrator: eZine
🕒
Created 21 Jul 2022
📄
3 Articles

Underground Security Paper no. 3: the dangers of metadata

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 21 Jul 2022
THE DANGERS OF METADATA BY: DIzzIE [antikopyright 2008] This is the third Underground Security Paper designed to further empower you to give yourself some semblance of electronic privacy. If you haven't done so, go read over USP no. 1: Encrypting your Instant Messaging Conversations (http://forum.rorta.net/showthread.php?t=576) and no. 2: Encrypting Email Communiques (http://forum.rorta.net/showthread.php?t=1273). What is metadata? To put it bluntly, metadata is hidden data that can fuck you over. Fuck you over real hard and rough like, savvy? Often defined as "data about data," metadata is information about a...

Underground Security Paper no. 2: Encrypting Email Communiques

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 21 Jul 2022
Encrypting Email Communiques v 1.0 By: DIzzIE [antikopyright 2007] This is the second Underground Security Paper designed to further empower you to give yourself some semblance of electronic privacy. If you haven't done so, go read over USP no. 1: Encrypting your Instant Messaging Conversations (http://forum.rorta.net/showthread.php?t=576). And yes, I'm well aware that there are a few other guides on encrypting emails already out there, but they are either outdated or don't mention all of the shit that I want to mention. So here we go, first we'll go over a few ways to encrypt emails if you have steady access ...

Underground Security Paper no. 1: Encrypting Instant Messaging Conversations

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 21 Jul 2022
Encrypting Instant Messaging Conversations v1.0 By : DIzzIE [antikopyright 2006] Whenever you talk online with your instant messaging (IM) client of choice, your conversations can be, and in all probability are, recorded, monitored, and read. Any data which travels over a network can be viewed using programs known as packet sniffers, with some specially crafted programs, such as IM Sniffer or AIM Sniff, designed exclusively to capture IM communications. No matter how pathetically dull your treacherous life is, chances are someone is bored enough to fuck with it. What will soon follow is a list of various programs and plugins which you ca...
loading
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT