Jump to content


Photo

Adventures in Paranoia


  • Please log in to reply
1 reply to this topic

#1 BIG POPPA

BIG POPPA

    Duke of Errrrl

  • Patron
  • PipPipPipPipPip
  • 25122 posts

Posted 13 June 2019 - 03:58 PM

I say paranoia, because that's what most people think of. But maybe one or two points may help you with your network. Hopefully this works. I used open office to format. Hopefully that translates over to BBS.

 

Google has been completely banned and blocked from my network.

>Gmail ported to private, encrypted email. New set of keys for new emails.

> Google Drives are now self-hosted

> Google calendars ported to private secure calendar

>Google voice – dropped

>Youtube  - dropped

 

Self Hosting:

                >Piwigo: Picture/album viewer

                >Wallabag: Read it later capture – much like Pocket

                >Nextcloud: Similar to Dropbox, onedrive

                >Searx: Private search engine

                >Transmission: BitTorrent client

                >Firefox Sync Server: Keeps your settings, info, etc “in house”

                >Home Assistant: Open source home automation

                >NetData: Network Monitor

                >PeerTube: Video

                >Pi-hole: DNS Ad Blocker

                >pfSense : Hardened Firewall

                >Syncthing: Keeps files sync’d

                >Grafana: Provides front end control oanel

                >Sickbeard: Auto media downloader

                >Airsonic: Media Server

 

Hardening Firefox:

Enter "about:config" in the firefox address bar and press enter.

Press the button "I'll be careful, I promise!"

 

privacy.firstparty.isolate = true

    A result of the Tor Uplift effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.)

privacy.resistFingerprinting = true

    A result of the Tor Uplift effort, this preference makes Firefox more resistant to browser fingerprinting.

privacy.trackingprotection.fingerprinting.enabled = true

    Blocks Fingerprinting

privacy.trackingprotection.cryptomining.enabled = true

    Blocks CryptoMining

privacy.trackingprotection.enabled = true

    This is Mozilla's new built-in tracking protection. It uses Disconnect.me filter list, which is redundant if you are already using uBlock Origin 3rd party filters, therefore you should set it to false if you are using the add-on functionalities.

browser.cache.offline.enable = false

    Disables offline cache.

browser.safebrowsing.malware.enabled = false

    Disable Google Safe Browsing malware checks. Security risk, but privacy improvement.

browser.safebrowsing.phishing.enabled = false

    Disable Google Safe Browsing and phishing protection. Security risk, but privacy improvement.

browser.send_pings = false

    The attribute would be useful for letting websites track visitors' clicks.

browser.sessionstore.max_tabs_undo = 0

    Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -> History -> Recently Closed Tabs.

browser.urlbar.speculativeConnect.enabled = false

    Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to. Source

dom.battery.enabled = false

    The battery status of your device could be tracked.

dom.event.clipboardevents.enabled = false

    Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected.

geo.enabled = false

    Disables geolocation.

media.eme.enabled = false

    Disables playback of DRM-controlled HTML5 content, which, if enabled, automatically downloads the Widevine Content Decryption Module provided by Google Inc. DRM-controlled content that requires the Adobe Flash or Microsoft Silverlight NPAPI plugins will still play, if installed and enabled in Firefox.

media.gmp-widevinecdm.enabled = false

    Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content. Details

media.navigator.enabled = false

    Websites can track the microphone and camera status of your device.

network.cookie.cookieBehavior = 1

    Disable cookies

        0 = Accept all cookies by default

        1 = Only accept from the originating site (block third-party cookies)

        2 = Block all cookies by default

network.cookie.lifetimePolicy = 2

    cookies are deleted at the end of the session

        0 = Accept cookies normally

        1 = Prompt for each cookie

        2 = Accept for current session only

        3 = Accept for N days

network.http.referer.trimmingPolicy = 2

    Send only the scheme, host, and port in the Referer header

        0 = Send the full URL in the Referer header

        1 = Send the URL without its query string in the Referer header

        2 = Send only the scheme, host, and port in the Referer header

network.http.referer.XOriginPolicy = 2

    Only send Referer header when the full hostnames match. (Note: if you notice significant breakage, you might try 1 combined with an XOriginTrimmingPolicy tweak below.) Source

        0 = Send Referer in all cases

        1 = Send Referer to same eTLD sites

        2 = Send Referer only when the full hostnames match

network.http.referer.XOriginTrimmingPolicy = 2

    When sending Referer across origins, only send scheme, host, and port in the Referer header of cross-origin requests. Source

        0 = Send full url in Referer

        1 = Send url without query string in Referer

        2 = Only send scheme, host, and port in Referer

webgl.disabled = true

    WebGL is a potential security risk. Source

browser.sessionstore.privacy_level = 2

    This preference controls when to store extra information about a session: contents of forms, scrollbar positions, cookies, and POST data. Details

        0 = Store extra session data for any site. (Default starting with Firefox 4.)

        1 = Store extra session data for unencrypted (non-HTTPS) sites only.

        2 = Never store extra session data.

extensions.pocket.enabled = false

    Disables Pocket completely.

network.IDN_show_punycode = true

    Not rendering IDNs as their Punycode equivalent leaves you open to phishing attacks that can be very difficult to notice.

extensions.blocklist.url = https://blocklists.s...locklist/3/ / /

Limit the amount of identifiable information sent when requesting the Mozilla harmful extension blocklist.

Optionally, the blocklist can be disabled entirely by setting extensions.blocklist.enabled to false for increased privacy, but decreased security.

 

Operating Systems:

                >Windows 10 1903 is a privacy nightmare. It is not possible at this point to fully extricate  all privacy breaches, telemetry and other concerns. I do recommend Win10Privacy (https://www.winpriva...e/english-home/) one of the few “fixers” for W10 that I would say comes close with no lint.

                >Mint, Ubuntu, Debian, Arch (For advanced users), Qubes.

                >Tails, Knoppix, Puppy Linux live mode distro

 

Browsers

                >Firefox in hardened mode. Also run in “private window” mode. You might as well. Private Mode doesn’t make you anonymous in your browsing. It just doesn’t save cookies, etc. Also set FF to auto dump cookies. This saves installation of “cookie killer” plugins.

                >Brave: An interesting concept. I’m not exactly sold on it yet, but it’s good for beginners.

                >Tor Browser

 

Browser plugins - configure:

                >A word of caution. Don’t go overboard on browser plugins. You should be able to achieve the same or better by getting “Under the hood” in FF and hardening it. Reason being, you don’t want your browser fingerprint to be “unique”. Check fingerprint at https://panopticlick.eff.org/

                >Check WebRTC  leaks etc: https://ipleak.net

                >FireFox hardened settings for WebRTC:

                               

                                  media.peerconnection.turn.disable = true

                      media.peerconnection.use_document_iceservers = false

                                  media.peerconnection.video.enabled = false

                                  media.peerconnection.identity.timeout = 1

 

                > uBlock Origin, HTTPS Everywhere, Decentraleyes, uMatrix, NoScript

 

Mobile Phones / OS:

                >The next phone you buy should be compatible with a third-party OS such as

LineageOS, GrapheneOS. Baring that, you should de-auth and uninstall or disable any google products such as Play Store, etc. Use F-Droid for Apps.

 

>AntiVirus: ClamAV although I hear Avast is giving out discounts to Republican voters.

 

Network: pfSense, Pi-hole, DOH, VPN

 

Software: FOSS, OpenSource

 

 

warrant-canary.jpg


  • 0

#2 Dave

Dave

    Grammaraticus of Titty Money

  • Patron
  • PipPipPipPipPip
  • 29743 posts
  • LocationLugnar Island

Posted 13 June 2019 - 04:00 PM

Now they'll just peep in your window
  • 0


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users