• Fur Affinity Forums are governed by Fur Affinity's Rules and Policies. Links and additional information can be accessed in the Site Information Forum.

What have you furs been doing to protect yourself from corperate and government surveillance

Personally, I have rooted my Galaxy S8 and installed Lineage OS. I try to not use Google or Facebook apps. Although I do still need to use the Google Play store. I use NewPipe to watch YouTube videos

I also use Linux on both my laptop and gaming PC. I pretty much only use web apps for things like Discord. But I have the telegram desktop app since I think they can be trusted to some extent (Discord cannot). I use Firefox with UBlock Origin blocking all 3rd party content.

What have you furs been doing to protect yourself?
 

Kellan Meig'h

Kilted Luthier
I use a hardware router based on FreeBSD Linux to protect the house. Just looking at the logs for my firewall, I see some very interesting attempts to circumvent the password, once they figure out where to click on the blank login screen for a login. The admin name is arcane, as it should always be but the password is a 20 character mess of upper and lower case, numbers and some very obscure symbols. When I'm out and about, I always VPN on my Android based phone. I won't use an Apple phone because they have ZERO security in actual use.
 

Foxy Emy

Polygenic DID System. Life is wild.
I make a LARGE paper trail just so that there is enough put there that I can slip what I want under the radar without suspicion.

I don't really have anything I NEED to hide, but I encrypt crap on principle. Sometimes it is something with absolutely nothing personal or sensitive, but I encrypt it just so waste the time of anyone trying to spy on me.

Seriously, the easiest way to avoid surveillance is to avoid making anomalies that would cause them to bother looking into it.
 
D

Deleted member 82554

Guest
I do what most rational people do: flip the bird to every street cam or CCTV camera I come across and load all my digital devices with some of the most depraved shit known to man.
 

Foxy Emy

Polygenic DID System. Life is wild.
Personally, I have rooted my Galaxy S8 and installed Lineage OS. I try to not use Google or Facebook apps. Although I do still need to use the Google Play store. I use NewPipe to watch YouTube videos

I also use Linux on both my laptop and gaming PC. I pretty much only use web apps for things like Discord. But I have the telegram desktop app since I think they can be trusted to some extent (Discord cannot). I use Firefox with UBlock Origin blocking all 3rd party content.

What have you furs been doing to protect yourself?

Rooting phone: bad idea for privacy unless you find a way to make it signals it sends out look exactly like your standard phone which means Google apps and all.

If you don't want your location to be tracked, get a film (as in camera film) bag. Turn your phone off and place it in the bag. It will block all outgoing signals.

However, suddenly vanishing also looks suspicious and will lead to probing into where you where and who you were near when you vanished and when you came back on. So, only do this at home and do not take the phone back out until you are back at home. That way, it looks like a dead battery or something.

If you really want to hide stuff, though, opensource software is not enough. You need opensource hardware on top of that.

Like I said, the easiest way to do things is to make enough of a paper trail that it doesn't even look like you are trying to hide stuff.
 

hologrammaton

『RBT.EXE』
i wish the nsa person happy ________ on holidays on my phone calls because their job is quite possibly the most tedious thing ever

i also ask for recipes and driving directions

no jokes that's just what i do
 

Kellan Meig'h

Kilted Luthier
Odd that it might be mentioned. I have a friend that runs a "Honey Pot" at home. He gets hits from China, North Korea, Taiwan, Japan, Russia, Georgia, Poland, all over the place. They merrily download the HDD that's full of very malicious warez and such. When hackers get pi$$ed off, they take it down only to be back up and running later that day from an image backup.
 

rekcerW

Well-Known Member
I use a hardware router based on FreeBSD Linux to protect the house. Just looking at the logs for my firewall, I see some very interesting attempts to circumvent the password, once they figure out where to click on the blank login screen for a login. The admin name is arcane, as it should always be but the password is a 20 character mess of upper and lower case, numbers and some very obscure symbols. When I'm out and about, I always VPN on my Android based phone. I won't use an Apple phone because they have ZERO security in actual use.
I was damn near floored the first time I ever checked my logs within a week of leasing a server. It was non-fucking-stop. Trying to maintain a blacklist was pretty much useless. Any half-ass common piece of software that was existing in the public domain was subjected to continual targeting. Most hits originated from Russia.

It was mind-blowing, they were trying for any kind of exploit, even versions that were relatively recent and not outdated by much were subject to attacks for stuff that was patched out within a month prior. I wish I was savvier on how that shit operates, but it feels like there are swarms of botnets that scour the web looking for hits on known exploits. Lots came from the same address blocks, and they weren't just aimlessly targeting anything, they were all going after things that were on the server. It's actually pretty fucking scary.

Talk about being disheartened as an aspiring developer, what the fuck happens if somebody digs something out of the thing you've poured your time and patience over and it finds its way into that kind of shit before you can react to it?
 

Kellan Meig'h

Kilted Luthier
I was damn near floored the first time I ever checked my logs within a week of leasing a server. It was non-fucking-stop. Trying to maintain a blacklist was pretty much useless. Any half-ass common piece of software that was existing in the public domain was subjected to continual targeting. Most hits originated from Russia.

It was mind-blowing, they were trying for any kind of exploit, even versions that were relatively recent and not outdated by much were subject to attacks for stuff that was patched out within a month prior. I wish I was savvier on how that shit operates, but it feels like there are swarms of botnets that scour the web looking for hits on known exploits. Lots came from the same address blocks, and they weren't just aimlessly targeting anything, they were all going after things that were on the server. It's actually pretty fucking scary.

Talk about being disheartened as an aspiring developer, what the fuck happens if somebody digs something out of the thing you've poured your time and patience over and it finds its way into that kind of shit before you can react to it?
Looked at the logs yesterday to see why our Intarwebs was slow as cold molasses. We were getting about 100 to 300 hits ("Scrapes") an hour from "Scrape Bots", just three of them, all run by a South Korean firm. I did a bit of sleuthing, found their server, managed to change their root and user passwords for them. I added insult to injury by making Russian the default language and rebooting their server for them before I backed out. Learned those hacks working part time for a local ISP some years ago. There are reasons why you must change default passwords . . .

A number of times that ISP was attacked by Russian Script Kiddies, running the same one hundred or so scripts over and over, hoping some combination would work for them. When this would happen, the senior tech would redirect the hacking to a particular node that was a honey pot. Within ten minutes tops, all attacks would cease.. Cant imagine why. He was the one that taught me forced entry into a server so you could fix something at night without going to the server farm.

BOT Nets usually go after a full block, like 143.16.34.xxx, where the target is the last octal. It makes a focused attack, requiring only 255 IP addresses to be loaded for exploit.

I do suggest people use Google's DNS servers for better security and faster resolve time, though. Especially if you're on Comcast.
 

FooFoo4230

Well-Known Member
Best way to protect yourself from government surveillance: auto-targeting death rays
Best way to protect yourself from online government surveillance: Netscape Navigator. They’ll think you work for the government, because only the government would require people to use such an outdated browser.
 
R

Ruki-the-Zorua

Guest
What every good CEO does. Use the black market for my goods and or services, off the books deals, and anything strictly staying away from legal company regime. Business is a tough work, and doesn't play fair, so I won't either.

Don't tell anyone I told you this. Please. I'll give you a cookie.
 

hara-surya

Deviated Prevert
Reynold's heavy duty aluminum foil.

weirdalfoil_2322.jpg
 

hara-surya

Deviated Prevert
I use a hardware router based on FreeBSD Linux to protect the house. Just looking at the logs for my firewall, I see some very interesting attempts to circumvent the password, once they figure out where to click on the blank login screen for a login. The admin name is arcane, as it should always be but the password is a 20 character mess of upper and lower case, numbers and some very obscure symbols. When I'm out and about, I always VPN on my Android based phone. I won't use an Apple phone because they have ZERO security in actual use.

When you said "FreeBSD Linux" I got suspicious. (FreeBSD is not Linux.) But when you said Apple phones have "ZERO security" you lost any and all creditability. The FBI spent months trying to strongarm Apple to decrypt a phone they made because they couldn't. (Apple couldn't either, for that matter, by design.) When they found a third-party that could do it (and spent dump trucks of money getting access to the gear) the next iPhone model was designed to protect against that attack.

Meanwhile anything and everything you do with an Android phone is vacuumed up by Google for "ads" and handed over to any three-letter agency that asks.

And I say this as someone who used Nexus and Pixel devices for years, until buying an 2020 iPhone SE because the reasons I listed above.

I'm not saying they're perfect against a determined wealthy nation-state attacker, literally nothing is unless you encase it in concrete, but they're better than "race to the bottom quality, vacuum every bit of data for ads, 2 years of updates if you're lucky and more likely none" that you get with Android.
 
Last edited:

hara-surya

Deviated Prevert
(Snipped for brevity)

FreeBSD, BSD, Minix, Posix, and Linux all have their roots in Unix. If you had no Unix, the other systems/kernels would not exist.

Duh, but that's not what you said. You wrote "FreeBSD Linux." Linux is not UNIX and never has been. (There is a strict definition of UNIX that requires passing tests by the Open Group. Even if a Linux distro could pass it, they've never applied.)
 
D

Deleted member 111470

Guest
Nothing. I don't think I am capable of hiding myself from the government, or corporations. And I don't care to, it's not like I live in an oppressive regime where they're just waiting for me to order coca cola online so they can cut me to ribbons.
 

Kellan Meig'h

Kilted Luthier
Duh, but that's not what you said. You wrote "FreeBSD Linux." Linux is not UNIX and never has been. (There is a strict definition of UNIX that requires passing tests by the Open Group. Even if a Linux distro could pass it, they've never applied.)
Are you done nit-picking?

I'm pretty sure the older Redhat prior to 8 would have passed the test. Too many changes to the kernel in 8 and newer that would not have qualified.
 
Top