Posts Tagged Digital Tradecraft

Date: October 7th, 2013
Cate: Dossiers, Frontpage, Opinion
Comments Off on Tracking the Silk Road – Lessons for darknet services

Tracking the Silk Road – Lessons for darknet services

On Oct 2nd 2013, a person was arrested in San Francisco (CA USA) who allegedly operated the darknet marketplace website “The Silk Road”. Shortly after, the Silk Road went offline.

Within minutes discussions on the Internet sprung up with thousands of people trying to cope with their loss, trying to make sense of what happened. Several “official” documents (a criminal complaint and an indictment) were released shortly after which, in turn, lead to commentators rushing to explain what stupid mistakes DPR – the Silk Road operator – had committed. Now, after a few days have passed, I’d like to give analysis a try myself.

more))

Date: November 17th, 2012
Cate: Frontpage, HowTo

Full disk encryption with Ubuntu Linux

Ubuntu is one of the most popular Linux distributions and a good start for a secure and yet easy-to-use computing environment. In order to install it go to Ubuntu’s website to download the current release for your desktop or laptop computer and follow the installation guidelines there.

Setting up full disk encryption in Ubuntu

During the installation of Ubuntu check the “Encrypt the new Ubuntu installation for security” box in the graphical installer to activate full disk encryption (dm-crypt with the symmetric AES encryption algorithm  is then used for that purpose):

more))

Date: November 14th, 2012
Cate: Frontpage, Opinion

Spying on Petraeus, or how emails quickly become incriminating evidence [Updated 2012-11-15]

The current story of Gen. PETRAEUS and his affair BROADWELL shines a light at the possibilities of digital surveillance and tracing of crumbs of information. It can serve as an example and a warning against insufficient digital tradecraft. Though news reports about the exact order and nature of the events are imprecise, unreliable and contradictory, we are trying to put them together into a plausible series of events and give some background on techniques that were, or might have been, used to intrude on the privacy of both BROADWELL and PETRAEUS.
more))

Date: November 12th, 2012
Cate: Concepts, Frontpage
Comments Off on Anonymity – Online and Offline – Part II

Anonymity – Online and Offline – Part II

This article explores how much anonymity really exists online, and how anonymity is reduced by everyday technologies used in Internet communication (please check out Part I of this series for the theory behind anonymity).
Many people expect their actions online to be far removed from their physical identity which often leads them to behave in ways they would never dare when their name were connected to it. But how well founded is this belief in online anonymity?
more))

Date: November 11th, 2012
Cate: Frontpage, HowTo

How to choose a secure password

This article explains how to choose a secure password. For example, this is necessary to secure encrypted data or private keys against brute-force attacks. An introduction to encryption algorithms is given in the corresponding primer (brute-force attacks are also explained there).

You should never use the same password for multiple purposes. It is fine to use the build-in password manger of the Firefox web browser to store your website passwords, but only if they are secured properly (by using hard disk encryption with a strong password as described below and the master-password feature).

more))

Date: November 5th, 2012
Cate: Frontpage, HowTo

Libertopia Conference 2012 – Digital Tradecraft

The slides of Frank Braun’s talk “Digital Tradecraft” can be found here: Digital Tradecraft