Only those, who are crazy enough to think they can change the economy, are the ones who do!
I think you heard about the war logs at Wikileaks, which are from the whistle blower Bradley Manning. He told this in a chat, but there was no proof that he really was it. Now they have this proof, because a forensic analysis of his MacBook recovered the deleted war logs data on his hard disk.
While the chat logs were encrypted, Johnson said that he was able to retrieve the MacBook’s login password from the hard drive and found that same password “TWink1492!!” was also used as the encryption key.
He made four mistakes:
1) Use a high encryption for important secret data.
2) Delete data without any tracks.
3) Don’t use the same password for everything.
4) Don’t chat with others about your abilities or intentions, if they know your real identity.
So I want to tell you some basics, how to handle secret data.
First of all don’t trust the encryption of Apple or Microsoft. It is very weak with back doors. Microsoft works together with the NSA. The NSA has a key to decrypt all your data without knowing your password. This encryption is only save against your neighbors but not against your government or hackers.
If you delete a file on your hard disk, only the handle to the file will be deleted. The file can be recovered. This could be easy depending on your file system. There are many freeware recovery programs in the internet.
-> If you want to be sure a file is completely deleted you have to overwrite the file with other data.
This shell command will overwrite the hole free disk space with random numbers:
cat /dev/urandom > delete
The command will stop, when the disk is full, then you have to delete the file “delete”.
It’s a good idea to do this with a new hard disk or when you are finished with your work. This makes a forensic analysis nearly impossible.
If you don’t encrypt your files but you delete everything then tracks can be left. The data is stored in blocks on the hard disk. If there are to many errors in one block the hard disk will mark this block and take another one. You can’t read or delete this marked block anymore. A forensic analysis can recover these marked blocks and maybe they find the secret data in it.
-> Always use passwords with capital and lower letters, numbers and special characters. Don’t use the same password for everything.
A virtual private network (VPN) is a secure way of connecting normally to another local network over the insecure Internet but can be used to surf in the web too. You need a VPN-Provider. Now think – if your VPN-Provider is free, then he is selling you. That means he is using your data for adds and looking what you are doing. This is not secure.
A VPN-Provider with a limited free contingent is CyberGhost: http://cyberghostvpn.com/en/surf-anonym.html
A very good secure non free VPN-Provider is Perfect Privacy: http://perfect-privacy.com
It is very important to hide your IP, when you are surfing. Your IP will be logged from the most servers and this log files can be checked by the FBI. So they can find out, which user made which posts.
You can see your IP here: http://whatismyipaddress.com
A very good secure and free proxy is the TOR Network. The easiest way for beginners to use TOR is the Linux distribution TAILS. Download it and burn a CD. Boot from this CD and you have an easy way to surf anonymously in the web.