Security
| Noisebridge | About | Visit | 272 | Manual | Contact | Guilds | Stuff | Events | Projects | Meetings | Donate | E |
| Guilds (Volunteer) | Maintainers | Meta | Code | Electronics | Fabrication | Games | Sewing | Music | AI | Neuro | Philosophy | Funding | Art | Security | Ham | WGs | E |
| Security | DC415 | Bay Area Hackers' Association | OHSNAP | Crypto | SecureDrop | Locksport | Password manager | Aaron Swartz | Security Camera | Edit |
|
Security is a major area of interest to hackers of all stripes, be they creative hackers making stuff that they want to keep secure, or security hacker hackers specializing in securing by learning how to exploit security.
Recommended INFOSEC Security Measures[edit]There are a bunch of free things you can do to improve your computer security.
Recommended General Security:
Recommended OPSEC Measures[edit]OPSEC means keeping your mouth shut.
OPSEC For Freedom Fighters[edit]
Recommended SIGSEC Measures[edit]Remember that unencrypted calls can be eavesdropped on and telcos and ISPs are not guaranteed to work in emergencies.
Media[edit]
Hostile network[edit]The network at Noisebridge - like any public network - should be regarded as potentially hostile. This means that you should assume that any unencrypted communications over the network could be (and most likely are) monitored by others. Examples of vulnerable communications include POP3/IMAP email clients, most web browsing, IRC/AIM and similar chat protocols that are often not encrypted. While no issues have come up to date, and our code of conduct opposes malicious monitoring of others, it is wise to be aware of the potential. Stick to using SSL or secure tunnels or VPNs for anything that uses a password or that you otherwise wouldn't want other people to read. If you don't know how to protect your communications with encryption, many people at Noisebridge would be glad to help you out! Attempt at a Semi Decent Network Security Guide[edit]The most secure option you have is to set up an SSH tunnel to a remote server, and then use a proxy server like Polipo to forward all your HTTP through that server. Done properly, this will encrypt all your traffic without any further worries. If you do not have SSH access to a remote server, then you can use Tor or similar to encrypt your traffic without exposing it to the Noisebridge network.
Recommended Firefox Addons:
Recommended Chrome Extensions:
Further Reading: |