2015-07-23 at 11:24 PM UTC
I have a paid VPN whom i trust, based in germany which has strict data privacy laws. On top of that i use firefox and have a couple of security addons, like ZenMate, it's a web VPN which i can run ontop of my normal VPN it's handy for when i need to switch IP's with the click of a button. Of course i also use the addon HTTPS everywhere, NoScript and advanced add blocker. I should probably get something to block sites from extracting HTML5 canvas data as well. I use User Agent Switcher too.
What's more i don't keep cookies beyond sessions and have the addon World IP, it has a lot of feautures but what i like it most for is that it displays my apparent (VPN, Proxy, or real) IP in the top right corner of my browser so that i always know which IP i'm on and that i am protected, i use a program called DNSCrypt as well it turns regular DNS traffic into encrypted DNS traffic that is secure from eavesdropping and man-in-the-middle attacks.
For super serious business i use TOR of course and reroute all my TCP traffic through the TOR network. I have proxifier so that i can proxychain to hide the fact i am using TOR and add another layer of security.
I have a number of offensive security addons as well but we can have another thread for that.
So tell me about your setup?
2015-07-26 at 7:26 PM UTC
Pretty much just tor or tor+VPN in VM (the likelihood of the VM helping is so miniscule but ever since the magneto thing I guess it doesn't hurt), but day to day I don't do much on that front. The browser security model is pretty solid, javascript really doesn't represent a very meaningful security risk anymore. I have HTTPS everywhere but with the non-aggressive approach (where it will still put a HTTP request through if SSL isn't available).
2015-07-28 at 12:46 PM UTC
aldra
JIDF Controlled Opposition
not using your name or any real information in signups, blogs, social networking etc. is enough to stop most kidiots, but the sheer amount of information you have to provide if you have a decent job and any utilities, bills etc. means unless you completely obfuscate your connection details all the time, uncle leo will probably be able to eventually find you. I guess it's just a matter of making the effort unworthwhile (dunno if that's even a word). I honestly don't put all that much effort in anymore - it's become a lot more tiresome in the last 5-10 years due to spyware ('advertising initiatives') and data collectors being built into fucking everything popular, along with the proliferation of applications and services whose primary purpose is invisible to the user.
2015-11-04 at 3:41 PM UTC
I run Comodo Dragon, but I'm thinking of getting IceDragon for the sake of the add-ons like what you had considering they're Gecko based, and Dragon is Chromium based.
2015-11-04 at 10:25 PM UTC
Cash > Prepaid Smart Phone and Service Packs > Register with fake info > Root Phone > Tether Phone > TOR Only then can I let the communist Muslim in me shine.