×

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

Search results

  1. TyperTech

    Daily Wisdom: Always plan on your OPSEC failing at some point, beacuse at some point, it will.

    It doesnt matter who you are, even Gods OPSEC eventually got rekt and people started catching him performing miracles. No good deed, you know? OPSEC BASIC FUNDAMENTALS: Use layers of OPSEC, and always KNOW that one day that your veil will be pierced. If that happens, and feds walk through your...
  2. TyperTech

    OpSec failure - Dont upload images with your fingerprints !

    Hackers are able to copy your fingerprints just by using our photos Millions of people take selfies posing in such various ways, like doing the sign of peace hand gesture. This is a very common thing and it has not caused problems for anyone, at least not until now, because many cybersecurity...
  3. TyperTech

    OpSec failure - Dont upload images with your fingerprints !

    Hackers are able to copy your fingerprints just by using our photos Millions of people take selfies posing in such various ways, like doing the sign of peace hand gesture. This is a very common thing and it has not caused problems for anyone, at least not until now, because many cybersecurity...
  4. TyperTech

    Drug dealer busted after picture of his hand holding cocaine showed fingerprints EncroChat

    A major drugs ring was cracked after one dealer inadvertently revealed his fingerprints in a photo sent to other members, a court has heard. Stephen Hart, 54, from Greenhill, Kent, showed off a large rock of cocaine in a picture shared via EncroChat, a dark web messaging service widely used by...
  5. TyperTech

    NSFWFORUM: Toolkit- Miscellaneous Notes on Computers and Opsec (Chapter 4)

    A Dreadful Toolkit- Miscellaneous Notes on Computers and Opsec (Chapter 4) by /u/AgentOrange230 • 3 years ago* in /d/OpSec Since there's money and shiny things on offer, I thought I'd try writing for the HunDREADs competition. It got a bit out of hand, so it's split over multiple articles. The...
  6. TyperTech

    NSFWFORUM Toolkit- Miscellaneous Notes on Computers and Opsec (Chapter 3, Part 3)

    Location > Location > Location- Continued The Dangers Lurking Up Front Every Time You Log On This is a continuation of Part 2, which is here⚠️. Bringing on the Browsers Even behind Tor or a VPN, one major hole can easily leak all the information an adversary dreams of: the browser. In its 30...
  7. TyperTech

    NSFWFORUM Toolkit- Miscellaneous Notes on Computers and Opsec (Chapter 3, Part 2)

    Location > Location > Location- Continued A Manual for Masters Mastering Staying Safe Online This is a continuation of Part 1, which started here⚠️. VPNs and Tor Privacy is important, but remember from Chapter 1 it's sometimes not enough. When anonymity or pseudonymity are important, it's...
  8. TyperTech

    A NSFWFORUM Toolkit- Miscellaneous Notes on Computers and Opsec (Chapter 3, Part 1)

    Location > Location > Location A Manual for Mastering Staying Safe Online If you're under about 35, a grumpy old hag has probably told you about the old days without the internet and how everybody was so much better back then. If you're not, you surely know a couple of old hags like that but...
  9. TyperTech

    A Dreadful Toolkit- Miscellaneous Notes on Computers and Opsec (Chapter 2, Part 2)

    Electric Sheep by Other Names- Continued Computers 102 for the Opsec Student This is a continuation of Part 1, which started here⚠️. Selecting your Set-Up There are several different choices you'll have to make before you put your constructed identities into cyberspace. It's convenient to...
  10. TyperTech

    A Dreadful Toolkit- Miscellaneous Notes on Computers and Opsec (Chapter 2, Part 1)

    Electric Sheep by Other Names Computers 101 for the Opsec Student It would be cruel to write a guide subtitled "Miscellaneous Notes on Computers and Opsec" without writing about computers and opsec, so- if you're following this guide in order from the index linked at the top of this post-...
  11. TyperTech

    A Dreadful Toolkit- Miscellaneous Notes on Computers and Opsec (Chapter 1, Part 2)

    You, Yourself, and the Meaning of Opsec- Continued A Not-Completely-Beginners' Guide to the Dreadful Art of Opsec This is a continuation of Part 1, which started here⚠️. The Traffic-Light System of Threats There isn't a simple way to group threats like there is for critical information...
  12. TyperTech

    A NSFWFORUM Toolkit- Miscellaneous Notes on Computers and Opsec (Chapter 1, Part 1)

    You, Yourself, and the Meaning of Opsec A Beginners' Guide to the NSFW Art of Opsec To start with, let's look at opsec in general. "With what?" I hear lots of you ask. Opsec is¹ The systematic and proven process by which potential adversaries can be denied information about capabilities...
  13. TyperTech

    How Tails Does What it Does

    How Tails does its job. Tails is a specialized live Linux Distro aimed at privacy and anonymity. It does this job by forcing all traffic to go through the Tor network. This is called ]Tor Enforcement. Thereby leaving no trace on local storage devices. (Unless the user explicitly requested...
  14. TyperTech

    100 Extreme Opsec Tips From Cybertoolbank | Special For NSFWFORUM

    Opsec Aka Operational Security Is The Most Important Thing To Keep In Mind When Doing Anything Online, Here Are 100 Opsec Tips From Cybertoolbank. Remember That In Most Of The Cases Extreme Privacy Plans Equal Good Opsec. Made By Cybertoolbank With Love 1. Always respond to people saying...
  15. TyperTech

    The Attack & Reconnaissance Engines

    Servers Shodan⚠️ - Search Engine for the Internet of Everything Censys Search⚠️ - Search Engine for every...
  16. TyperTech

    Top 3 things that will flag a package as suspcious

    Here is a list of things that will red flag a delivery: 1. buyer uses a fake name not associated with shipping address (out of sellers control but sellers should remind their customers). 2. Fake business or name associated with return address. 3. Package was shipped from a different zip code...
  17. TyperTech

    Pseudonym Management: Gleaning Wisdom from DPR's Oversights!

    When Dread Pirate Roberts was apprehended, his operational security (OPSEC) oversights became a topic of widespread discussion among the DN communities. In particular, his imprudent use of one pseudonym to allude to another pseudonym's email address inadvertently created a trail for...
  18. TyperTech

    Burner phone and regular phone OPSEC

    I don't know how to structure this, so I'll just write. Your phone has everything it needs to make a phone call, send an SMS, get an internet connection without a SIM card. It is uniquely identifiable, independent of the presence or absence of a SIM card or multiple SIM cards. Each and every...
  19. TyperTech

    OpSec Tips For Vendors That You Probably Havent Heard Yet

    Did you know that some police dogs are trained to sniff out hard drives, thumb drives and other tech gadgets? Well, most people dont. Keep reading to learn OpSec tips that you probably havent heard before. PRINT SHIPPING LABELS JUST BEFORE DROPPING OFF PACKAGES This is one ive only seen once...
  20. TyperTech

    Forced Decryption

    Ok, so the purpose of this is to share a little bit about what Ive learned about the issue of Courts recently issuing rulings compelling individuals to decrypt devices for the purposes of LE investigations. This deals with US law and US Constitutional rights, as many other countries do not have...
Top