forked from DarthDomino/Personal-Safety-Manual
-
Notifications
You must be signed in to change notification settings - Fork 0
/
How24N00bs
483 lines (340 loc) · 25.9 KB
/
How24N00bs
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
Introduction: Off the Grid is for Everyone
==========================================
Ever been stalked by a hacker? Well I have, and I'm sure many others have too. But you wouldn't know that because there's
no How-To on how to get the hell out of that sticky situation. Until now.
Perhaps you were given this because something bad has happened.
The good news is that there’s help and (hopefully) you’re about to learn a bunch of cool stuff.
I’ve tried my best to make this as user-friendly and enjoyable to read as possible.
No matter what though, there’s going to be some sort of repityism, so focus, attention to detail and patience is required.
It is important to not skip anything as I’ve already weeded out the unnecessary.
However, there’s an unlimited amount of knowledge on how to keep you and your devices safe,
so I encourage you to get into your own Wiki hole on the subject.
I’ve provided some resources below to get you started.
Virtual Dumpster Fire
---------------------
In this case a literal dumpster fire would be much easier than this section.
Rule number one is to NOT GET FRUSTRATED.
Take the time to upload pictures from your hard drive to Instagram, save resumes to a USB, but make sure everything not
absolutely necessary gets deleted.
(No need to delete anything on the Hard Drive individually, as we will be doing a mass-reset).
If you see something and think, “That’s important, I should keep that,” that’s exactly what you need to be removing,
so leave it. Anything with any sort of personal information on it what-so-ever. If there’s any evidence that you like cats,
one of your passwords is associated to a cat you once had, and that cat is mentioned ONCE on the internet or hard drive,
you might as well have no password at all.
I’ve left out Social Media entirely, but the best advice is to burn it.
If you must post, Latergram everything by at least a day.
### Mac
* Sign out of iCloud and everything else possible. But especially iCloud.
* Turn off Find My Mac and Un-encrypt FireVault, if encrypted. These are all found easily in your System Preferences.
* If you have FireVault active, make sure you have a copy of your key before you deactivate it.
* Shut down the system.
* Hold down command and the R button, press the power button but don’t let go of command and R until you see
the Apple loading screen.
* Select the Disk Utility. > Continue
* Erase. It will ask you if you’d prefer the fastest or the most secure, scroll all the way to most secure.
It once took an infected Mac I had, 20 hours to completely erase, so make sure you’re plugged in and just walk away.
Go have a snack. It might be a while.
Once your Mac is squeaky clean create a NEW iCloud account and we’ll go over rebuilding and hardening in the next section.
### Windows
* Sign out of your Microsoft Account and everything else possible.
* If you’re tech savvy, install a fresh copy of your OS to a USB/External Hard Drive, plug it in, go in to Safe Mode on
Start-up and follow the instructions.
If you’re not particularly tech savvy, in Settings, there should be the option for Change PC Settings.
If you can’t find it, press the Windows Key and type “Change PC” and it should populate.
* Click “Update and Recovery” > “Recovery”
* Select “Remove Everything and Reinstall Windows”
* Proceed to follow the instructions.
If asked which you prefer, the fastest or the most secure, always select the most secure.
### Email
This is when patience begins to play a part. I recently went through an entire Gmail account, with a Google Number
attached to it (something I’ll cover in later sections).
It was like working on an assembly line (the same action over and over), but all in all the whole thing took me about an hour.
There’s a check box where you can select all emails. With Gmail you have to delete them page by page.
Once you’re finished deleting them, you must go into your trash, select them all page by page again
and click “Permanently Delete.”
Google Hangouts Chat streams must be deleted individually, which in all honesty is a nightmare, but important and necessary.
Leaving as small of a digital footprint as possible is smart no matter what you’ve got going on in your life.
### Mobile
These steps are relatively the same for iPhone and Android. Sign out, reset, delete everything.
You can contact Apple and they will delete your entire iCloud account, so you can create a new one and start fresh.
Rebuilding and Prevention
-------------------------
If you’ve made it this far, you’re hopefully already feeling more comfortable with your electronics.
There’s something freeing about having a clean slate. However, you’re not out of the woods, yet.
Did you know that if you leave your phone next to a radio on a Spanish channel over-night, when you wake up,
all of your ads will be in Spanish? So stick with me, kid and let’s knock this out.
### Security Questions
Make sure all of the answers to your security questions are WRONG.
Create a system for yourself, like "What is your mother's maiden name?" the answer would be "12" or "blonde."
You should be using LastPass (covered below in Passwords) and going through so many email addresses this should never be
much of a concern, anyway.
Create all new emails, create one for each of your payment apps, one for your iCloud, one for professional stuff,
one for family and friends.
Separate your accounts as much as possible so if one thing gets popped,
you don't have to run around trying to figure out what else is.
It's best practice to create ALL new emails and phone numbers every six months-year.
Drug dealers do this every single month, so do what you will with that information.
### Payment Apps
Your real name, transactions, (and sometimes your phone number, email/mailing address) are not private by default.
Create a separate username for your Venmo, CashApp and PayPal.
Put your hangouts number instead of your real number.
Virtual Addresses are available at places like PostScanMail.com.
You can also use a P.O. Box or simply a past address.
I don't have my actual address anywhere online, as all my bills are electronic, or even on my driver's license.
In fact, ESPECIALLY not on my driver's license.
Any profile/picture anywhere can be reverse Google image searched, so if that same image is on a profile with your real name,
you can easily be found.
If you get emails notifying you to verify your account, DO NOT IGNORE IT.
Only allow contacts to search you and crank up any other security/privacy settings you see, always.
### Mac
Once your Mac is so fresh and so clean, it’s EXTREMELY important to go through these next steps immediately,
or you may get infected again and have to do the last steps all over.
Which I’ve had to do and I really kicked myself for it.
Get a piece of duct-tape (I have a roll of Batman duct-tape just for this) and cover your Mac’s webcam.
Forget your webcam exists. Sorry ‘bout it. Trust me you don’t want it.
Turn off Bluetooth, WiFi, IPv6 and everything you can when you’re not using them. This goes for mobile, too.
When you first login, you’re going to create your Admin password.
Your Admin account is where you get to have all the super powers.
Like downloading and installing new tools and programs, fixing security settings and everything we’re going to do
in this section.
So next we’re going to create a Guest account that we’re actually going to live on and use every day (except right now).
This provides an extra step for a potential hacker to be able to get Admin privileges.
I won’t lie to you, it’s a very tiny step but it’s still a step.
There is no such thing as an impenetrable device.
If it’s working, it’s susceptible. So basically what we’re doing here is making it as annoying as possible for
someone to penetrate it in hopes they just say “Fuck it,” and go away.
Moving into System Preferences:
* Deselect “Allow Guests to connect to Shared Folders”
* Secure Users’ Home Folder Permissions
* In Spotlight settings, make sure that it does NOT have access to search the web. Deselect everything that would need
internet access.
If you’ve never used Spotlight, it’s a really fabulous tool (Command + Space Bar) used for finding things on your device.
If you can’t find what I’m talking about in your Settings, throw a keyword in there and it will most likely find it for you.
* Turn on FireVault and write the key on a piece of paper and lock it in a safe or hide it somewhere.
DO NOT PUT THIS KEY ON YOUR PHONE SO HELP ME.
* INSTALL MALWAREBYTES. It has a trial period but the service is free.
Once the trial (Real-Time Protection) ends, you can either delete and reinstall (resetting the trial) or purchase.
Be sure to do regular scans. Especially after updates.
* Make sure Firewall is ON. Sometimes your VPN (covered below) will turn your Firewall off.
Make sure if you ever disconnect from your VPN (to get into banks, Coinbase, etc) to immediately turn your Firewall back on.
It should do this automatically but safe to never assume anything.
* Enable Software Updates
* System Preferences > Security and Privacy > General > Unlock > Select “App Store” only.
If for some reason you want to download something not on the app store (like from your browser) if you open General again,
it will have a pop up. You will then be able to insert your Admin Username and Password from your Guest User account
so you don’t have to switch back and forth.
* Install "Little Snitch" and its little brother "Micro Snitch."
Little Snitch alerts you to every single connection coming and going to your Mac.
Really spend some time getting to know Little Snitch, it's your new best friend.
Google what certain daemons do, what connections to look out for. Guaranteed there's an article on each one, somewhere.
SERIOUSLY, don't be lazy with it, when it asks you how long the connection is allowed, NEVER say "Forever" unless it's
absolutely crucial to and you're SURE you know what it does.
Which should only be like three things, such as automatic updates.
Micro Snitch alerts you every single time your webcam or microphone is accessed.
If you're watching Netflix and it turns on, you've got problems.
### Windows
Once your PC is so fresh and so clean, it’s EXTREMELY important to go through these next steps immediately,
or you may get infected again and have to do the last steps all over. Which I’ve had to do and I really kicked myself for it.
Get a piece of duct-tape (I have a roll of Batman duct-tape just for this) and cover your PC’s webcam.
Forget your webcam exists. Sorry ‘bout it. Trust me you don’t want it.
When you first login, you’re going to create your Admin password. Your Admin account is where you get to have all the
super powers. Like downloading and installing new tools and programs, fixing security settings and everything we’re going to
do in this section.
There is no such thing as an impenetrable device. If it’s working, it’s susceptible.
So basically what we’re doing here is making it as annoying as possible for someone to penetrate it in hopes they just say
“Fuck it,” and go away.
* Turn off Bluetooth, WiFi, Airport, IPv6 and everything you can when you’re not using them. This goes for mobile, too.
Enable Windows Defender. Install Malware Bytes. When the Malware Bytes trial ends, double check and make sure that
Windows Defender’s Real Time Protection is on.
Real Time Protection is the only thing that expires with Malware Bytes so keep it installed and do regular scans, especially
after updates.
* Create a new Microsoft Account
* Activate Software Restriction Policy. This can be found using the Windows search bar, as will almost all of these.
* Uninstall all bloatware (apps or programs that you won’t use or need on your system that come with the fresh install like
Solitaire).
* Create User account that you will use on a daily basis. Admin accounts should only be used to alter settings and install
programs. Have a strong password for both.
* In Windows Administrative Tools > Services > Make sure that Microsoft Sign-in Assistant and Windows Update are running.
* Check for updates regularly.
* INSTALL MALWAREBYTES. It has a trial period but the service is free.
Once the trial (Real-Time Protection) ends, you can either delete and reinstall (resetting the trial) or purchase.
Be sure to do regular scans. Especially after updates.
### Mobile
If you’re on iPhone, you’re at a slghtly less risk because every app installed on an iPhone has to be approved/created by a
verified developer.
If you’re on Android, there should be a setting somewhere to only allow verified Microsoft developers.
However it’s usually pretty obvious if you look at reviews, ratings and amount of downloads.
When you download an app, you agree to the permissions instantly. Android’s are usually all together.
iPhone asks you individually sometimes.
* If you can help it, never allow any apps permission to turn on your microphone, or at least have it ask you every
single time it wants to turn it on. There is no setting for this for the phone app so no worries.
Only your VoIP if you decide to go that route… and you should.
* Private Internet Access is awesome for a mobile VPN, especially when traveling.
* Never give permissions to any app that you don’t absolutely have to, and if possible have it ask you every time.
This goes for access to your Contacts, Photos, Location, etc.
* Turn off Location Services.
* Turn off Find My iPhone.
* You can set Map applications to only allow your location when the app is being used.
### Passwords
You should always have strong passwords on every account, and each account should have a different password.
If your password is something you can remember off the top of your head, you’re using a bad password.
Do not leave passwords written anywhere near your desk on a sticky note.
If you MUST write down your password, such as your FireVault key, write it down and lock it in a safe.
You can get a safe or a lockbox cheap these days.
This might seem like an impossible task, not remembering a password but being unable to write it down.
LastPass is here to save the day and solve your problems. Create one, really good, complex password.
Remember it, and all the others will be randomly generated.
LastPass works in your Browser as a Chrome Extension, AND is available as an app! If you go to your vault,
you can view passwords saved for applications and things not available in your browser and it autofills so you never have to
type out another password again.
For iPhone in Settings > Passwords & Accounts > Wesite & App Passwords
As far as passwords for your devices, there’s only so much that you can do. Make sure that your admin and user passwords
are different, and if you have trouble thinking of more than one strong password, use LastPass and make sure the admin
password is the strongest.
Do not use real words. !f Y0u Mu$7 U$3 $0m37h!ng l!K3 7h!$ or complete, long setences including the spaces and punctuation.
Words you think are random have already been thought of by malicious hackers (wordlists are available freely) and are
definitely not random.
### Home WiFi Security
If you think there is any chance that your home network is compromised, contact your Internet Service Provider
(such as AT&T or Time Warner Cable) and ask for a new router. Tell them that you’re getting the error,
“Connected, No Internet,” that you’ve done a “power cycle” and for some reason
you still can’t get the internet to work.
Never tell your ISP you were hacked or are in any way worried about your security.
They’ll ask questions there’s no correct answer to. Avoid it altogether.
If this explanation is too complicated for you, just say there’s dust in it.
Also, it’s best to get a new router from your ISP in person, just bring the old one with you.
* On your new router there will be a basic IP address. Something like 127.0.0.1 and a password.
Type the IP address into your browser (Chrome hopefully), your username will be admin.
* Enter the password on your router.
* If you are a gamer or have gamers in your household, there’s not much you can do, unfortunately.
Online gaming turns your router Firewall into Swiss cheese because of all the different ports that must be opened to play
with others, but are never closed.
This can become an issue so a port/router reset every few months helps dramatically.
If you are not a gamer or do not have gamers in your household, go to your Firewall settings and crank that ish up.
* Familiarize yourself with all the settings available. If for some reason you’re doing something one day and it doesn’t
work,you’ll need to be able to get in and out easily to mess with the Firewall Security levels.
* Disable IPv6 entirely.
* Disable anything else you’re not using, if you’re not sure what something is, Google it or ask me.
* Disable port 1900 UPnP. (This is a common thing you will need to revisit if something does not work).
### Browser Settings
Go to Windows Defender Security Center > App and Browser Control > Exploit Protection Settings to take a look.
Program Settings > Add program to customize. A good program to add would be your 3rd party browser.
Below are the settings for Chrome:
* Aribitary Code Guard: off
* Block low integrity images: on
* Block remote images: on
* Block untrusted fonts: on
* Code integrity guard: off
* Control flow guard: on
* Data execution prevention: on
* Disable extension points: on
* Disable Win32 system calls: off
* Do not allow child proceses: off
* Export address filtering: off
* Force randomization: off
* Import address filtering: off
* Randomize memorty locations; on
* Simulate execution: off
* Validate API invokation: off
* Validate exception chains: on
* Validate handle usage: on
* Validate heap integrity; on
* Validate image dependency integrity: on
* Validate stack integrity: off
### Alternative Phones
Google Hangouts and Google Voice are apps that work together to create a new phone number.
If you use this, each time you make a call, the person on the other end must press “1” in order to accept your call.
Anyone who is familiar with Hangouts will know this is not your real number.
If someone asks or gets offended, tell them you like that you can send texts easier (which comes in handy when you’re
copy/pasting) from the computer, which is true through your Gmail account.
In order to get a Google Hangouts number, it must be attached to a real number, so it is difficult to get multiple
without getting another burner phone anyway.
Your Google Hangouts and Google Voice should be under a NEW email address. Having an alternative number to give to
strangers is extremely useful and convenient.
If someone you don’t want to have your number gets ahold of it, you simply mute them or get a new Hangouts number.
Keep as little conversation streams ass possible going when it comes to texts. Delete your emails as they come in and
empty your trash when you do.
If you’re really in a mess, like your stalker is someone who works in law enforcement, take extra measures.
Forget Google. Google knows all.
Find yourself a gas station or convenience store with cameras that either don’t record, have no cameras,
or cameras that are not attached to the internet. Buy a pay-as-you-go phone with cash from said store and buy your minutes
there. You can then use this number to attach to Signal, the #1 encrypted messaging app if you still want to use your fancy
smart phone. Private Internet Access is an amazing VPN for mobile. Use it all the time unless you absolutely can’t,
such as when checking banking apps.
### Dealing with the Police
Police will automatically assume it’s a petty lover’s spat, because that’s what they see a hundred times a day.
Be adamant. Be honest and open. Advocate for yourself. Don’t be afraid to be compassionately aggressive.
It’s their job to hear you out but keep in mind, it is not their job to save you.
On a real note: try not to cry - no one wants to deal with the crying girl; you’re a bad bitch you got this.
The internet is still like the wild west in terms of regulation.
If done correctly, people can pretty much do and say whatever they want.
However, people mess up, even the pros. So be patient and wait for them to get sloppy, they always do.
The best thing you can do is keep your nose as clean as possible so that if things ever do go to court
(which I’m sorry to tell you is painful and unlikely), you can show that you are without a shred of doubt the sane one, here.
NEVER respond. No matter what crazy shit they say or do never say anything back because you have to show absolutely that
you did not encourage their behavior in any way, and retaliating will only hurt your case.
Also, if you don't give them any attention, they're likely to escalate and mess up sooner
(or get bored and go on to harrass someone else).
In-person stalking is an entirely different matter. Security cameras, (possibly bodyguards) and having friends
mobile-track you (Glympse/Family Locator), are all part of your life now.
Every time they show up, do not engage with them, call the police. Run and film over your shoulder, if you have to.
Let’s say every single day at 6pm, they call you and leave you a voicemail threatening you, reciting your home address…
don’t panic. Keep the voicemail/save it to your camera roll if you want, call the non-emergency line every single day
at 6:01 pm, and make a police report. So if they ever do actually hurt you, you’ve already got a STACK of police reports to
back you up.
Collecting evidence and making a police report is your life line. Dates, specifics, screenshots/recordings, all of it.
Everything matters. Delete nothing, even after the police have it. They’re not as organized as you’d think.
Get your OWN binder to keep all of your print-out evidence and reports, organize them by date.
I refer back to paparazzi laws frequently when it comes to in-person stalking. It’s completely legal for someone to sit
outside your work and watch you, even take pictures of you walking down the street. You’re in a public place.
They can legally approach you, wave their hands around and speak wordsalad.
However if someone blocks your path, touches you, comes on/takes photos of private property or chases you in a vehicle,
THAT’S illegal. These are the things you hope they do, and when they do, have your phone/dashcam ready.
(Same goes for abusive relationships, if someone is screaming at you, whip that phone out queen).
If you have a dire, serious emergency and the police aren’t doing what they should, take it to social media.
@ the District Attorney's office and Chief of Police in your area, get other people involved.
The department really doesn’t like to look bad to the public, so Twitter actually does work for this.
Just ask Miss Kennedy Summers (Playmate of the Year 2014).
Closing
-------
*ALWAYS KEEP ALL DEVICES UP TO DATE*
Do regular Malware Scans
Check regularly for Application Updates on all devices
I highly recommend a VPN. If you’re just the average Joe and aren’t doing anything particularly sketchy,
TunnelBear is wonderful and costs $50/year. It works consistently on Mobile devices as well as Mac and Windows.
It’s also adorable. If you’re a little more daring and live life on the wild side, get Private Internet Access and pay
in bitcoin. :)
Use your VPN ALL THE TIME. 110% of the time.
Sometimes bank websites/apps won’t allow you to use one, so disable it for that sort of thing.
Never connect to public Wifi. The VPN will help but still not a brilliant idea if there’s heat.
If you have a tech savvy stalker, chances are they’re waiting for you to do that in the bushes outside somewhere.
When a Browser/Website asks for your location and a pop-up asking “Allow or Block”, ALWAYS block.
If asked if you want to send data to make the app better, say no. You don’t care, they’re selling your personal
information to advertisers anyway. If asked to send a Do Not Track request, disable it. It’s not what it sounds like.
A taser can also be useful, but it's a gamble. You're not relying on actually touching them with it, you're relying
on the loud sound and spark to startle them and scare them into fucking off. When you first get a taser, pop it off
periodically for funsies so you're not startled by it anymore.
Staying calm is key, stand your ground.
The flip side, is if they're not afraid of it, it's going to excite them and make them more aggressive.
Also any weapon you bring into a fight can be taken and used against you.
I don't recommend using one for these reasons but I carry one, so I thought I'd mention it.
You never know when a new stalker might just appear out of fucking nowhere.
Of course don't hesitate to reach out to me for assistance, I work for free.
Don't be afraid to find your local hacker group and ask them for help.
Crying is actually helpful here (just kidding. sorta).
There's bound to be a bad bitch or two in your city who knows this stuff all too well, and would be honored to help you.
Good hackers love to teach. So if you're a hacker who's stumbled on this, please be prepared to be there for them,
because there are MANY out there. Use this as a guide if you have to. You can make all the difference.
Be just paranoid enough. Remember that at the end of the day you’ve got a leg up that’s almost always unbeatable:
*You’re in the right. You’re doing the right thing.*
Though things seem dark, just wait because you’ll get to tell your side one day.
So stay calm, cool and collected because you’re going to win.
Either by letting it go, never dealing with it again, or sometimes even getting that mentally ill person the help they need.
Resources
---------
* https://discussions.apple.com/docs/DOC-2435
* http://hardenwindows10forsecurity.com/index.html
* https://www.lastpass.com/
* https://stackoverflow.com/
* https://github.com/
* https://www.hacksplaining.com/