You are viewing a single comment's thread.

view the rest of the comments →

PizzagateBot ago

I'd also recommend using something to help mask the fingerprint of your browser like this- https://chrome.google.com/webstore/detail/user-agent-switcher-for-c/djflhoibgkdhkhhcedjiklpkjnoahfmg?hl=en-US

Can test your browser here - https://panopticlick.eff.org/ - Switching agent between sites should help further prevent tracking if you are concerned at that level.

And if you are using a VPN, don't forget about STUN server requests that can leak local/public IP when behind VPN - http://lifehacker.com/how-to-see-if-your-vpn-is-leaking-your-ip-address-and-1685180082 You can test it here - https://www.perfect-privacy.com/webrtc-leaktest/

The best would be to disconnect your HDD/SSD and just to boot to TAILS when you are doing PG research - https://tails.boum.org/ - and connect to your VPN/Proxy/Tor from there, and if you are really serious about compartmentalizing your work then I'd take a look at Qubes OS - https://www.qubes-os.org/

In any case, you could have all the best applications running and still can be compromised by clicking the wrong link.

Hell, with the NSA man on the side attacks you don't even need to click on anything - http://www.netresec.com/?page=Blog&month=2015-09&post=Covert-Man-on-the-Side-Attacks

0011011000111001 ago

Good post, thanks for sharing the good info.

Keep it flowing!