This page is currently undergoing revisions. If you can’t find what you are looking for, try here.
This section is covers many aspects of exploring the interwebz more securely – for hacking (offensive) information see Project|Inception.
Obviously one of the main priorities of any Anonymous is to be, well… anonymous
CryptoParty Handbook - a good basic start on a lot of elements of being anonymous online.
Electronic Frontier Foundation (EFF) - Surveillance Self-Defense site to educate the American public about the law and technology of government surveillance in the United States, providing the information and tools necessary to evaluate the threat of surveillance and take appropriate steps to defend against it.
Excellent discussion of why and how to implement the practices of real life as well as online Security Culture. If these guidelines were followed rigorously, very few arrests would result.
Security Culture for Activists by the Ruckus Society is another useful guide.
livediscs (no installation)
- This is a huge file, almost 700 MB so download it from a fast connection or torrent it
- doesn’t leave significant traces of what you are doing (logs, etc) on your computer
- uses Tor in a way that your computer cannot connect to the internet without going through the Tor network (more secure) so DO NOT USE FOR D/DOS
- this can be installed on a CD or USB stick and used from any computer
- supported by EFF – Electronic Freedom Foundation
- EQIAB is an Anonymous liveCD that has many useful tools and can be used from a USB stick – works somewhat similarly to Tails but has different software and tools, including some that can get you arrested if you use them, like the LOIC lazor. So be careful.
- Read information! This file downloads as a 141 MB .png image file, but to use it you have to change the extension to .zip and unzip it as usual
- Chat room: http://en.irc2go.com/webchat/?net=Cryto&room=Earthquakeinabox
- NOTE! this download contains the LOIC DDoS tool (aka Low Orbit Ion Cannon “lazor”) and other stress testing software that probably will trigger your antivirus program, so if you have trouble getting it to install, disconnect from the Internet and temporarily disable your AV software. Do NOT allow Windows to send a report! (you probably shouldn’t be using Windoze anyway)
Update - this software download was removed by SourceForge until the issues are resolved, primarily the lack of source code. Some have said this AnonOs software has viruses, backdoors, trojans, or adds you to a botnet. *Use with caution
- Annonaceae is a high-anonymity liveCD. It has TOR, a MAC address randomizer, a hard disk/RAM wiper, a encryption suite, and many other goodies. This is totally legit, no hack tools or whatever. TARGET AUDIENCE: Anyone who cares about their anonymity.
- Cherimoya, based on Annonaceae, is designed to be a complete kit for Anonymous. It’s goals are a high degree of anonymity, security “auditing” programs, and easy tools for making flyers and videos. Cherimoya’s goal is to replace as much of Windows as possible. TARGET AUDIENCE: Anonymous, especially during raids.
- Atemoya (AH-TEH-MOYA) is a virtual machine OS, that can power a headless, decentralized content distribution system. See more here: Atemoya
The Portable Security section contains ‘portable’ versions of a few important Security in-a-box tools. These versions are meant to be extracted directly onto a USB memory stick so that you can use them from any computer. Given that portable tools are not installed on a local computer, their existence and use may remain undetected. However, keep in mind that your external device or USB memory stick, and portable tools are only as safe as the computer you are using, and may risk being exposed to adware, malware, spyware and viruses.
- Portable Spybot
- Portable KeePass
- Portable TrueCrypt – makes your data unreadable or even invisible (encrypt drive, make hidden volumes, etc)
- Portable Recuva
- Portable Eraser – cleans drives of data
- Portable CCleaner – cleans drives
- Portable Pidgin and OTR – best Instant Messaging and much more, encrypted and very versatile
- Portable gpg4usb
- Portable VaultletSuite
- Portable Thunderbird with GPG and Enigmail – encrypted email
- Portable Firefox – best privacy-oriented browser
- Portable Tor – Internet traffic anonymizing network
CypherCat – Telecomix Crypto Munitions Bureau – multi-language videos and links << highly dependable
- Glossaire crypto -Chiffrement - Hachage -Synthèse
- Logiciels -Chat - Chiffrement - Mails - Plug-in - Réseaux - VOIP
- Android -BDD - Chiffrement - Dépôts - GPS - Mails - Navigateur - Réseaux - Photos/Vidéos - Systèmes - VOIP
- Ressources -Ressources - Vidéos
- Manifesto -Indépendance - Cypherpunk - Cryptoanarchist
- Get a computer that you can use exclusively for anon work. It can be an old one from Craigslist or one you were going to recycle.
- Use one of the wipe programs like DBAN to thoroughly clean your hard drive seven times minimum (each wipe removes only one letter of every filename, so do the math :)
- Proceed to MasterPirate’s guide #2 below.
- Care Package + MacPack w/ Sekrit Handbook / Download
- full text with links (no download necessary): http://remainanonymous.org/irc/
- This is copied/linked from >> http://www.cyberguerrilla.info/?p=3322. Later on in the guide, installation of Linux Ubuntu is explained, so this reference is just for those starting out from Windows.
Table of Contents:
- Obtaining Tor Browser
- Using and Testing Tor Browser for the first time
- Securing Your Hard Drive
- Setting up TrueCrypt, Encrypted Hidden Volumes
- Testing TrueCrypt Volumes
- Securing your Hard Disk
- Temporarily Securing Your Disk, Shredding Free Space
- Installing VirtualBox
- Installing a Firewall
- Firewall Configuration
- Installing Ubuntu
- Ubuntu Initial Setup
- Installing Guest Additions
- Installing IRC (Optional)
- Installing Torchat (Optional)
- Creating TOR-Only Internet Environment
- General Daily Usage
Security-in-a-box – tools and tactics for digital security (same tools as above, but the install versions)
- How-to Booklet
- 1. How to protect your computer from malware and hackers
- 2. How to protect your information from physical threats
- 3. How to create and maintain secure passwords
- 4. How to protect the sensitive files on your computer
- 5. How to recover from information loss
- 6. How to destroy sensitive information
- 7. How to keep your Internet communication private
- 8. How to remain anonymous and bypass censorship on the Internet
- 9. How to use mobile phones as securely as possible
- 10. How to protect yourself and your data when using social networking sites
- Hands-on Guides (these are really helpful)
TOR and I2P
Anonymizing networks or darknets are not the same as using a VPN but can serve the same purpose to protect your anonymity on the internet.
Warning about Tor, make sure it’s the most recent version and ideally, don’t use it alone for anything but low-risk activities. For anything else, or if you live in a high-risk area, use a VPN or proxy in addition to Tor.
ALSO, PLEASE :DO::NOT::NOT::NOT::USE::TOR::OR::I2P: TO D/DOS WEBSITES!!!
*Not only is it ineffective, it is potentially harmful to the network*
TOR is useful for anonymously surfing the internet: http://www.torproject.org where you can download versions for the following operating systems: Mac, Windows, Linux, a USB version, and TorChat.
- OnionCat - allows users to anonymously access Internet services. Its architecture guarantees that the real IP of users cannot be revealed in any way. Tor also provides so-called Hidden Services. Those are services which are hidden within the Tor network. This means that not only the user stays anonymous but also the service (destination). Hidden services have several benefits but unfortunately they are not very user-friendly and they have some protocol restrictions. OnionCat manages to build a complete IP transparent VPN based on those hidden services, provides a simple well-known interface and has the potential to create an anonymous global network which could evolve to a feature- and information-rich network like we know the plain Internet today.
- Installing Torchat on BackTrack 5R1
I2P is a darknet or invisible internet (not accessible from the usual internet normally) on which you can anonymously set up and connect to I2P IRCS, some non-i2p IRCs, email, torrent, websites & forums. It can be used on the same computer with Tor for surfing the (outfacing) regular internet. Getting on i2p seems hard but it is worth the small amount of trouble. Download the multiplatform open-source software – works on Mac, Windows or Linux. Instructions for use and technical info can be found on their site.
- GarlicCat - use Tor with I2P
While both a Proxy and VPN service will re-route your internet traffic and change your IP, they function slightly differently.
Think of a Proxy as a Web Filter. The proxy settings are applied to your internet browser whether you’re using MSIE, Chrome, Safari, Firefox, etc. When browsing the internet through a proxy server, all benefits with that server are used, for example, (Security, Speed, and Geographic Location). The proxy will only secure traffic via the internet browser using the proxy server settings.
Unlike a Proxy, a VPN service provider (Virtual Private Network) encrypts all of your traffic, replacing your ISP and routing ALL traffic through the VPN server, including all programs and applications. The VPN can be easily connected or disconnected with the click of a button.
In conclusion, a proxy server is completely browser based, and is not as compatible with certain web pages that use non-browser technology such as: Comedy Central, Zatoo, Fox OD, and Sky Player. However, a VPN will work with ALL internet based services, but will offer less choice on which applications will get run through your ISP, as with the VPN, everything is routed through that server when connected.
This site consistently has reliable proxies: http://spys.ru/en/
virtual private network – VPN
A VPN (Virtual Private Network) sends your internet traffic through a circuitous route to the destination and back, so that your traffic gets mixed in with lots of other traffic, making it more difficult to tell where it’s coming from. Because the company controls the trafficking, the Terms of Service are critical to how well your privacy/anonymity are handled. Many companies will comply with subpoenas for records. A bad VPN is possibly worse than not using one at all.
Many VPN services are free. These companies sell your data (generally) to pay for the service. So don’t use them for anything that could get you in trouble.
Which VPN Providers Really Take Anonymity Seriously? << Must-read article
Only use a VPN provider that DOES NOT KEEP LOGS. Links to sign up are included in the article as well as VPN providers to avoid. Companies are subject to the laws of the country in which they are based.
The following are companies that responded to requests for information about logging and responded favorably. You should read the full article carefully, and choose your VPN provider even more carefully, we recommend using one of these:
- P2P Supporting VPN providers:
- General VPN providers:
From being a niche product used by the few, in the past few years VPN services have hit the big time. These days more and more Internet users see running a privacy enhancing service as a requirement rather than just a luxury. Today we take a look at a few tips and tricks that can enhance the security of any VPN.
While simple to set up and use out of the box, it may comes as a surprise that the security of VPN anonymity services can be improved. Of course, when things run absolutely to plan there’s little to worry about, but there are occasions where there may be a hiccup or where an extra level of security is needed.
Securing your privacy when your VPN fails
Ok, so you’ve purchased your VPN subscription, enabled the service, and you’re enjoying your new found levels of privacy. Then – disaster strikes. While you were away from your machine somehow and for some unknown reason your VPN disconnected and now snoopers have a clear view of your IP address.
Fortunately, there are solutions.
“To protect against the event of VPN failure/disconnection, disable any internet access that does not tunnel through your VPN service provider,” Andrew from PrivateInternetAccesstold TorrentFreak. “This can be achieved using specific Firewall rules (Ubuntu) or bychanging TCP/IP routes.
But of course, not everyone wants to spend time with these manual configurations that could potentially cause problems if they’re not done properly. So, TorrentFreak spoke with the creators of two free pieces of software that do the job more easily.
“VPNetMon continuously watches the IP addresses of your PC. If the IP address of your VPN is not detected anymore, VPNetMon closes specified programs instantly. The program reacts so quickly that a new connection through your real IP will not be established by these applications,” creator Felix told TorrentFreak.
VPNetMon (Windows) can be downloaded here.
“VPNCheck helps you to feel safe if your VPN connection breaks, this is done by shutting down your main network connection or programs of your choice and showing a notification box,” Jonathan from Guavi.com told TorrentFreak. “Basically it constantly looks for a change in your VPN network adapter. You can connect to either PPTP or L2TP with VPNCheck.”
VPNCheck (Windows/Linux) can be downloaded here.
Stop DNS Leaks
When using a VPN service one might expect that all of the user’s traffic will go through the privacy network, but on rare occasions a phenomenon known as “DNS leakage” might occur. This means that rather than using the DNS servers provided by the VPN operator, it’s possible that the user’s default DNS servers will be used instead or otherwise become visible.
“A DNS leak may happen whenever a DNS query ‘bypasses’ the routing table and gateway pushed by the OpenVPN server. The trigger on Windows systems may be as simple as a slight delay in the answer from the VPN DNS, or the VPN DNS unable to resolve some name,” explains Paolo from AirVPN.
A tool for checking for leaks can be found at DNSLeakTest.com and a solution for fixing any problems can be found here. Alternatively, anyone using the pro version of VPNCheck will have this feature built in.
Double up your security for extra sensitive data transfers
What if you don’t have 100% trust in your VPN provider and worry that even they might snoop on your communications? Admittedly it’s a very unusual hypothetical situation, but one with an interesting solution.
“If you don’t trust your VPN provider 100%, use two VPNs,” explains Felix from VPNetMon. “This way you are tunneling your already encrypted connection through another tunnel.”
In Windows this is easily achieved. First, simply set up at least two VPN accounts as normal (if you’d like an extra one for testing purposes you can get a free limited account fromVPNReactor). Then connect to one VPN, and when complete connect to another without disconnecting the first. Like magic, a tunnel through a tunnel.
Its also possible to VPN over TOR, but please please don’t use TOR for file-sharing traffic, it’s not designed for it.
“VPN over TOR gives several security advantages, for a performance price, above all partition of trust,” explains Paolo from AirVPN. “In case of betrayal of trust by one party, the anonymity layer is not compromised in any way.
Fix the PPTP / IPv6 security flaw
As revealed here on TorrentFreak in 2010, people using a PPTP VPN and IPv6 are vulnerable to a nasty security flaw which means that Windows and Ubuntu users could leak their real IP addresses. The following fix comes from Jonathan at VPNCheck.
For Windows Vista and above:
Open cmd prompt and type:
netsh interface teredo set state disabled.
For Ubuntu 10+:
Copy and paste all four lines into a terminal:
echo “#disable ipv6″ | sudo tee -a /etc/sysctl.conf
echo “net.ipv6.conf.all.disable_ipv6 = 1″ | sudo tee -a /etc/sysctl.conf
echo “net.ipv6.conf.default.disable_ipv6 = 1″ | sudo tee -a /etc/sysctl.conf
echo “net.ipv6.conf.lo.disable_ipv6 = 1″ | sudo tee -a /etc/sysctl.conf
Pay for your VPN with untrackable currency
“When anonymity is a factor, pay with an un-trackable currency,” explains Andrew from PrivateInternetAccess.
“For example, signup for an anonymous e-mail account using Tor and use a Bitcoin Mixer to send Bitcoins to a newly generated address in your local wallet. Alternatively, use theBitcoin-OTC to purchase Bitcoins ‘over the counter’ from a person, rather than an exchange.
“Then, use a patched Bitcoin client, such as coderrr’s anonymity patch to avoid linking the newly generated address to any of your pre-existing Bitcoin addresses.”
Only use VPN providers that take your privacy seriously
We’ve said this before but it’s worth repeating. VPN providers who heavily log are useful if all you’re concerned about is securely communicating with the Internet through an open public WiFi connection, but not beyond that. For a run down of providers who do not log any data which would enable a 3rd party to identify a user, see our previous article here.
Do you have a helpful security tip for VPN users? If so, feel free to add it to the comments below.
from Null Byte “the aspiring grey hat and security awareness playground”
Big name individual hackers and hacker groups everywhere in the news are getting caught and thrown in jail. Everytime I see something like this happen, I won’t lie, I get a little sad. Then I wonder, how are these guys getting caught? If a group like LulzSec, with all the fame and “1337-ness” can get caught, I think my hacker comrades are doing something wrong.
When members of LulzSec started getting captured, it was because proxy and VPN services complied to federal request and handed over the private information of its users. I think this is wrong for a number of reasons—foremost, people should be able to have their own privacy respected. Today’s Null Byte will be demonstrating one of the methods around this: Chaining VPNs.
A VPN allows you to connect to a remote network, and over all ports, encrypt and forward your traffic. This also changes your IP address. Chaining VPNs is a tricky task, though there is a simple and uncommon method I know of. Using multiple VPNs together has the huge perk of being completely anonymous.
How Does Chaining VPNs Work?
First, a person would connect to the VPN. Then, when connected to the first VPN, you chain to the second, and since a bunch of people share the same IP, the second VPN has no way of knowing who tunneled to it. An even better scenario is where you use an eastern VPN as your first, because our country has no jurisdiction to retrieve the logs from them, thus increasing your security.
However, to chain VPNs, the second VPN would need to know how the first VPN’s traffic was encrypted. This flaw makes it impossible to chain them in this method, unless you own both VPNs (not very likely).
So, how can we chain VPNs then? I’ll show you how by using a virtual machine!
Step 1 Install OpenVPN & a VirtualBox Computer
Text in bold is a terminal command.
- Change to the Downloads directory.
- Configure the installation../configure
- Compile and install.make && sudo make install
- Now we need to install VirtualBox. This will allow us to have a virtual operating systems running from within our computer. Download VirtualBox: Windows, Mac, Linux.
- Install a virtual machine of your choice for Windows or Linux and Mac, then install OpenVPN to it.
Step 2 Chain the VPNs
Start up your virtual machine, and configure them both.
- For Windows users using the default VPN client, use this guide to connect to a VPN. Linux and Mac users, go here.
- Connect to VPN A with your host OS.
- Start up your virtual machine of choice, and connect to VPN B with it.
- Operate from within your virtual machine, and you will be safe from prying eyes. If you need to delete the virtual machine, make sure you securely delete it, and your information will be safe.
spoofing your MAC address
Each device (computer, printer) has a unique identification called a MAC address which is transmitted when you interact with the Internet. This ID can be spoofed, and should be changed regularly if you are engaging in activities that might result in the seizure of your equipment.
- Changing Your MAC Address In Window XP/Vista, Linux And Mac OS X
- How do I change my MAC address? Mac OS 10 and Windows XP (brief article)
- How to Change or Spoof MAC Address in Windows XP, Vista, Server 2003/2008, Mac OS X, Unix and Linux
Spoofing your MAC address on Windows 7 is pretty easy with MadMACS tool. If this doesn’t work, check for some other solutions below:
communications and creating anonymous accounts
After setting up anonymous browsing, social media and email accounts, create real-looking fake people on facebook, for example, that some of your fake accounts trace back to, so that if you do get d0xed, it’s not really you. Note: If you DO get d0xed, don’t “disappear” because that just confirms that it’s you. Do the opposite of what is expected.
If you have a mobile computer:
- Go to a public wifi spot to download and install Tor. Visit www.whatsmyip.org to check your current ip address. It should not say the same thing as it does when you don’t have tor running. That site has some other useful things, including password generators. Here is another site with a lot of useful information about ip addresses, mac addresses, email ip tracing and more.
- Sign up for a non-free VPN and pay for it with the most anonymous means possible. If you can, get an anonymous debit card or use Liberty Reserve or BitCoin. If you have to use a real name method of payment, choose your VPN carefully. We recommend CryptoCloud because they do not keep any logs. Consider the privacy laws of the country in which the VPN company is located (see below). One in a country which does not extradite to your country or have other legal reciprocity agreements is worth considering, so what is safest for each person is somewhat dependent on location. Once you have it installed, check your ip again to make sure you are actually using it properly.
If you do not have a mobile computer:
- Download the programs onto a USB drive from a public Internet cafe or somewhere else that won’t be traced to you.
- When ready to install on your desktop, first disconnect from the Internet before installing the programs. Once installed, check your ip with and without tor and/or the VPN running at www.whatsmyip.org. Do not connect to your new anonymous email or other accounts until you are sure your VPN or Tor is working correctly.
Take a look at the EPIC Electronic Privacy Information Center for info on snoop-proof emails, chatting, voip, surfing, encryption. Once you’ve decided what you’re going to set up then begin.
Off-the-Record (OTR) Messaging allows you to have private conversations over instant messaging by providing:
Encryption - No one else can read your instant messages.
Authentication - You are assured the correspondent is who you think it is.
Deniability - The messages you send do not have digital signatures that are checkable by a third party. Anyone can forge messages after a conversation to make them look like they came from you. However, during a conversation, your correspondent is assured the messages he sees are authentic and unmodified.
Perfect forward secrecy - If you lose control of your private keys, no previous conversation is compromised. OTR works with Pidgin and other clients.
3.0 About Pidgin and OTR
3.1 How to Configure the Pidgin-OTR Plugin
3.2 The First Step – How to Generate a Private Key and Display its Fingerprint
3.3 The Second Step – How to Authenticate a Messaging Session
3.4 The Third Step – How to Authenticate the Identity of Your Correspondent
- Download Pidgin for Windows, Mac, Ubuntu, or source code, and install it
- Open Pidgin, then choose Add Account. Instructions for making a new account on jabber.org or jabber.ccc.de: http://schoolofprivacy.eu/post/25180153194/how-to-set-up-a-jabber-xmpp-account
- Download OTR add-on and install
- In Pidgin, go to Tools > Plug-ins > Off-the-record messaging <- click that, you may need to restart Pidgin to see that option
- When you want to have an off-the-record conversation, choose that option in the menu of the chat window, also option to generate and use key to ensure identity of participants
Note: the OTR ONLY works for one-on-one chatting. If you are in a jabber chatroom, the conversation is NOT encrypted.
This is the only encrypted multi-user chat so far. It is an instant messaging platform that lets you easily have private conversations with friends. Messages are encrypted before leaving your screen. Try it!
If you use a phone for anon work, get a cash phone with cash or an an anonymous store-activated debit card. Remember that your GPS location may still possibly be tracked.
Best phone VPN value with top security: Cryptocloud
- includes phone use for no charge with VPN service, about US$15/month
- VERY easy to use, takes about 30 seconds to set up
- compatible with all versions of Windows, Mac OS X, Linux, iPhone, iPad, iPod, Android and some Blackberry models
If you’ve got an Android or Apple phone you can use the WiTopia VPN service – $70 version for evaluation, takes about five minutes to get it going on phone or iPod Touch, according to their info, but its really expensive.
What is IRC? IRC or Internet Relay Chat is like a very early version of IM or TinyChat. The IRC might be on one server or multiple ones, it doesn’t require a fast connection to use, and it looks like a group chat on IM or TC.
You can access many IRCs via a weblink like Mibbit, using a FireFox add-on Chatzilla, or using a fully functional IRC “client” software program like XChat, IceChat, mIRC, etc. The Anonymous Sekrit Guide #1 has an excellent section on setting up and using IRC. It’s probably easiest to use the weblink first, then try Chatzilla or a client after you get used to IRC. Both methods can be used on smartphones using either the links or various apps like Linkinus (iPhone), Colloquy (Mac and iPhone) or Andchat (Android). Remember that unless you are using a VPN on your phone, your phone ip will be traceable.
IRC guide - somewhat advanced info for using irc more securely
Many IRCs, including AnonOps IRC, do not allow you to connect through the Tor network without the completing the following steps. Read the guide on Anonops.com. The instructions are for the mIRC client only. Presumably you can use other clients but if you decide to try using Tor, just get mIRC. Setting up and using a VPN is probably easier.
Why you might want to be anonymous on IRC - Most IRC channels are public, and include literally anyone (also using anonymity techniques) from CIA and Interpol operatives to any number of state-sponsored haxrs and everything between. Think how amusing it might be having your neighbors or employer reading about you being “a member of the Anonymous hacker collective” in your local newspaper – j/s.
connecting to IRC via a web based link
- use Mibbit or other web-based access if available, to get used to navigating IRC
connecting to IRC via an IRC client
Once you’re comfortable with IRC, download an IRC client (software for connecting to IRCs) like xChat, MIRC, Irssi, Pidgin…
Note: If you have any trouble with this, go to AnonOps IRC http://webchat.anonops.com
Navigation menu for the AnonOps client (IRC) tutorial
- Tech info and prerequisites
- Connecting to IRC using mIRCMore client explanations coming soon
There are many IRC “clients” but we recommend HexChat or it’s predecessor XChat-WDK because they are free and open-source. Also more secure (see above).
- Download and install the client
- Follow the specific set-up instructions (see Security Guide for specific information on common clients). Mainly this is just putting in your nick, user name, and password, as well as the irc “address” into the appropriate boxes, very easy.
HexChat is an IRC chat program, or “client” that allows you to join multiple IRC channels (chat rooms) at the same time, talk publicly, private one-on-one conversations etc.
HexChat is based on XChat, but unlike XChat it’s completely free for both Windows and Unix-like systems. Since XChat is open source, it’s perfectly legal. For more info, please read the Shareware Background.
Benefits of registering on IRC
When you log onto an IRC for the first time, you will be using an unregistered nickname. If you plan on becoming a regular user, it is advisable to register your nick. This is important for several reasons:
- It ensures that nobody can impersonate you.
- It grants you various abilities which non registered users do not have.
- (Most importantly) It allows you to use a vhost – this hides your location and ISP information from other users. Most IRCs also mask your IP from other users, though the IRC ops can still see it, so in that case, a vhost isn’t necessary. You can /whois yourself and see your own IP but others can’t.
IMPORTANT! It is recommended that you type all of these commands in the server window (the window that shows you logging in) NOT IN THE CHANNEL, so in case you mess up other people can’t see your password, etc.
- First time using a nick: to register your nick just type: /msg nickserv register yourpassword firstname.lastname@example.org
- Logging in again with a registered nick: to identify type: /msg nickserv identify yourpassword or just: /ns identify yourpassword
IRC user guide: http://www.ircbeginner.com/ircinfo/ircc-commands.html also lots of YT videos on specific IRC client setup
- many IRCs will use the same or very similar software so the commands are the same
- unless you have operator status (a symbol or colored dot in front of your nick) you cannot kick or ban anyone
- when you’re new on an IRC or channel, it’s best to observe (lurk moar) that is, don’t chat for a while to get the feel of it, some channels will get annoyed and ban you without warning for unintentional violations of their norms
- read the TOPIC (top of the page) and any included LINKS first, before asking questions and getting yelled at
- in the event you are kicked or banned for *no reason whatsoever* (lolkicks & b&s) don’t take it personally ::b& =love:: laughing at others’ expense is part of anon culture so #getoveritalready.
- DO NOT TRUST *ANYONE* EVER. Most exposures are the result of a “social engineering” attack (trusting someone then giving them information and/or access, or even just accepting material from them (emails, pdfs, image files, etc.) which have imbedded malware.DO NOT TRUST ANYONE, EVER. Not kidding.An estimated 75% of internet-related arrests are the result of social engineering attacks (trusting someone).
- DO NOT OPEN LINKS THAT PEOPLE POST IN THE CHANNEL. This is a very good way to get hacked.
- Set your IRC client to refuse DCC requests by default. Failure to do this is another good way to get hacked.
- Human nature <YOURS> is the oldest, EASIEST, MOST-DIFFICULT-TO-PATCH exploit.
- Now the fun part- the most common commands you need to know:in the server window type: /cs help or /ms help etc to get exhaustive lists of command syntax, most of which you will not need to use unless you are a channel operator
- /nick newnick changes your current nick to the new one
- /list lists all the non-hidden channels
- /join #channelname or simply /j #channelname
- /away you’re still there but people will know that you are afk = away from keyboard
- /back reverses /away, or alternatively sometimes just repeating /away will bring you back
- /ignore nick if you want a particular person’s chatting to be invisible to you
- /me does something
- /part disengages you from the #channel you are currently in
- /quit disengages you from the entire IRC (logs you off)
- on most IRCs you can use shorthand for the various functionsMaking a new #channel: on most IRC’s, if you are a registered user, you can form a #channel without asking permission, though it doesn’t hurt to ask, to be sure. To do so, type: #newchannelname then type /j #newchannelname to enter, like usual. You will probably eventually want to register it, though this isn’t immediately necessary. Once it’s registered (use /cs help for instructions) you will be the “owner” of that channel, unless you piss off an IRCop and they eliminate it (and possibly your nick along with it).
- /msg nickserv -> /ns
- /msg chanserv -> /cs
- /msg memoserv -> /ms
Remember that while IRC is a virtual “public space” the servers are owned and operated by people who are often working incredibly hard to keep them running and secure from attacks from any number of directions, so be respectful and appreciative. If a misunderstanding arises, try not to take things personally. You don’t know what kind of pressures might be going on behind the scenes so just be cool.
Firefox privacy/anonymity add-ons
Firefox is a good open-source browser to use and has many features which help to maintain your privacy and anonymity on the internet. We recommend NOT using Internet Explorer. If you are using Tor, the Vidalia bundle will automatically configure Firefox with security add-ons.
Adblock Plus This plugin blocks around 90% of internet services that attempt to track your web activity and then send you targetted ads. It’s crucial to use while browsing any aon websites or sites that have anon news articles, etc. http://goo.gl/fPmjm
BetterPrivacy This plugin is a tool to identify and remove cookies. It will also act as an optout from advertisement and other forms of web tracking. http://goo.gl/TL79Z
FoxyProxy An Addon to the default way to handle connecting to proxies, the FoxyProxy addon will allow you to have easier access to enabling your proxy tunnels, also has advanced features, such as setting up a list of domains that you will always want to use a proxy to connect to, and to do so automatically, while still using another connection for non-listed sites. http://goo.gl/VRiHT
Ghostery Another tool to help manage and mitigate tracking cookies, Ghostery features tools that will alert you when there are tracking cookies on the websites you visit. You can also view information about each tracker that is trying to harvest your browsing data, and even view the source code of said tracker and see exactly how the cookie is tracking you. Make sure you get Fanboy list and Easy list to stay updated (these can be selected during setup or in the options of the addon itself ) http://goo.gl/GoKQ1
HTTPS Everywhere A Firefox extension produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. It encrypts your communications with a number of major websites. http://goo.gl/fsKV