Anonymous Browsing
Section 3: OPSEC (Operational Security)
- Introduction to OPSEC
- Establishing Cover
- Identify Cross Contamination
- 10 Rules of OPSEC
- Authorship Recognition & Evasion Methods
- The Knock
- Case Studies of OPSEC Failures
Section 4: Live Operating Systems - Tails, Knoppix, Puppy Linux, Jondo Live, Tiny Core Linux
- Introduction to Live Operating System
- Knoppix, Puppy Linux, Jondo Live, Tiny core linux, Windows To Go
- Tails
- Tails Demo
Section 5: Virtual Private Networks (VPNs)
- Which VPN protocol is best to use? and why?
- VPN Weaknesses
- Can you trust VPN providers?
- VPNs & Domain Name System (DNS) Leaks
- Setting up an OpenVPN client in Windows, Mac, iPhone & Andriod
- Setting up an OpenVPN client on Linux
- Preventing VPN Leaks - Firewalls and kill switches
- Choosing the right VPN provider
- Setting up an OpenVPN server - The fast and easy way
- Setting an OpenVPN server - Home VPN
Section 6: Tor
- What is Tor?
- The Tor Network & Browser
- What should Tor be used for?
- Directory Authorities & Relays
- Tor Bridges
- Tor Pluggable Transport & Traffic Obfuscation
- Torrc Configuration File
- Running other applications through Tor
- Tor Weaknesses
- Conclusions on Tor and Mitigation to reduce risk
- Attacking Tor: How the NSA targets users' online anonymity
- Hidden services - The Tor darknet
- Finding Tor hidden services
- Other Tor Apps
Section 7: VPN & Tor Routers
- Introduction
- Custom Router Firmware for VPN & Tor Tunneling
- Off the self VPN & Tor Routers
- DIY Hardware Tor Routers
- Tor and VPN Gateway Virtual Machines
Section 8: Proxies - HTTP, HTTPS, SOCKS and Web
- Proxies - HTTP, HTTPS and SOCKS
- CGI proxies - Web proxy or web form proxy
Section 9: SSH Secure Shell
- Introduction & How to Login
- SSH Socks5 Proxy Tunneling with Dynamic Ports
- SSH Hardening
Section 10: I2P - The Invisible Internet Project
- I2P Introduction
- I2P Installing & Secure Configuration
- I2P Strengths & Weaknesses
Section 11: Other Privacy & Anonymous Services
- JonDonym
- Introduction
- Installing & Secure Configuraton
- Bullet Proof Hosting Services (BPHS)
Section 12: Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection
- Outbound Firewall Bypassing - The Fundermentals
- Outbound Bypassing
- Tunneling through HTTP proxies
- Port Sharing & Knocking
- Cloaking & Obfuscating
- Remote login - Virtual Network Computing (VNC) & Remote Desktop Protocol (RDP)
- Inbound Bypassing - Reverse shells, SSH remote tunneling & remote login
Section 13: Chaining/Nesting Privacy & Anonymous Services
- Strengths & Weaknesses: (User -> Tor -> SSH/VPN/JonDonym -> Internet
- Nested VPNs - Strengths & Weaknesses
- How to setup proxy chains
- How to setup - (User -> SSH -> Tor -> Internet)
- How to setup - (User -> Tor -> SSH/VPN/JonDonym -> Internet)
- With Transproxy
- With Whonix
- Setting up nested services (3+ hops)
Section 14: Off-site Internet Connections - Hotspots & Cafes
- Staying safe while on public wifi hotspots
- Finding public Wifi hotspots
- Boosting Wifi range
- How are Wifi users geo located?
Section 15: Mobile, Cell Phones & Cellular Networks
- Cellular Networks Weaknesses
- IMSI catchers
- Signalling System No7 (SS7)
- Mobile & Cell Phone Weaknesses
- How you are geo located when using a cellular network