Categories: Security News

How to stop government from spying on your torrents

With the recent developments regarding potential government spying, both in South Africa and abroad, the privacy conscious Internet user may be concerned about shielding their online activities from prying eyes.

The developments referred to above include revelations from documents leaked by Edward Snowden, which showed widespread surveillance of communications networks by the US National Security Agency.

This includes undersea cable systems, some of which are used by South African cable operators.

In South Africa, the Protection of State Information Bill, also called the “Secrecy Bill”, is waiting for Jacob Zuma’s signature. The President could send the Bill back to the National Assembly for further amendments as he has once before, but based on feedback from lawyers he could just as easily sign it into law.

The Southern African Federation Against Copyright Theft (Safact), which is spearheading the prosecution of the first person accused of Internet piracy in South Africa, also recently said that it is impossible to hide or stay anonymous on the Internet.

However, a South African security professional who wished to remain anonymous said that this is not true.

They said that depending on what you want to achieve, remaining anonymous can have varying degrees of difficulty.

Hiding from Safact when distributing torrents is certainly possible, the person said.

For the privacy-minded, the security professional provided the following general operational security (OPSEC) guidelines:

  1. Do not do anything sensitive from your home IP address. Get an anonymous “jump box”.
  2. Tor is great, but unless you have infinite patience, uploading or downloading anything over it will age you.
  3. Use cash, buy a disposable credit card (in South Africa, mall gift cards can work well) to buy a virtual private server from a provider such as Linode or Digital Ocean.
  4. Repeat step 3 to get a virtual private network account.
  5. If you are uploading a torrent don’t put any identifying information in the files or torrent itself. This includes performing “unique” tricks on the files or torrent. While taking credit for the upload is tempting, rather stay safe.

Along with the above advice, the person advised that those interested in learning more about operational security listen to a talk by The Grugq: Read more

Bohn Inc

Share
Published by
Bohn Inc

Recent Posts

50,000 Websites Hacked Through MailPoet WordPress Plugin Vulnerability

The users of WordPress, a free and open source blogging tool as well as content…

12 years ago

Media hackers behind E-toll billing problems: Minister

Minister of Transport Dipuo Peters has said that “some media houses” were responsible for “cyber…

12 years ago

After Takedown, GameOver Zeus Banking Trojan Returns Again

A month after the FBI and Europol took down the GameOver Zeus botnet by seizing…

12 years ago

Smart LED Lightbulbs Can be Hacked too; Vulnerability exposes Wi-Fi Passwords

Until now, we have seen how different smart home appliances such as refrigerators, TVs and…

12 years ago

How To Jailbreak iOS 7.1 And 7.1.1 Untethered Using ‘Pangu’ Jailbreak Tool

Quite Surprisingly, a team of Chinese hackers, Pangu have released an untethered jailbreak for iOS…

12 years ago

New Banking Malware with Network Sniffer Spreading Rapidly Worldwide

With online banking becoming routine for most users, it comes as no surprise that we…

12 years ago