Category: Podcast

The Privacy, Security, & OSINT Show – Episode 176

EPISODE 176-Privacy Crash Course 03: Mobile Devices

This week I continue the privacy crash course with a detailed discussion about mobile devices. If you apply only one privacy strategy from this entire show toward your own daily habits, this should be it.

Support for this show comes directly from my new book Extreme Privacy-Second Edition. More details can be found at https://inteltechniques.com/books.html.


SHOW NOTES:

INTRO:

Mobile Device Scenario

PRIVACY CRASH COURSE 03: MOBILE DEVICES

Concerns

Hardware
Apple: iPhone SE (New version)
Android: Pixel 3a (https://amzn.to/31eRnc0)
LineageOS: https://lineageos.org/
GrapheneOS: https://grapheneos.org/

Apple/Google Accounts

Service
Mint: https://amzn.to/3fZBB91

Settings

Apps
Lockdown Firewall: https://lockdownhq.com/
NetGuard Firewall: https://www.netguard.me/
Firefox Focus: https://support.mozilla.org/en-US/kb/focus

Camera Stickers: https://amzn.to/2NqaW98
Mic Blocker (3.5mm): https://amzn.to/385fDyP
Mic Blocker (Lightening): https://amzn.to/3i1SSQK

VOIP
MySudo: https://mysudo.com/
Linphone: https://www.linphone.org/
Twilio: www.twilio.com/referral/9FGpxr

Faraday Bags: https://amzn.to/2B6XSTJ

Challenges

Extreme Privacy 2nd Edition: https://inteltechniques.com/book7.html


Data Removal Workbook: https://inteltechniques.com/data/workbook.pdf

Affiliate Links (products we use):
VPN Considerations: https://inteltechniques.com/vpn.html
ProtonMail: http://proton.go2cloud.org/aff_c?offer_id=15&aff_id=1519
ProtonVPN: https://proton.go2cloud.org/aff_c?offer_id=6&aff_id=1519
PIA VPN: https://www.privateinternetaccess.com/pages/buy-vpn/crimeinfo
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Fastmail: https://ref.fm/u14547153
Amazon (Extreme Privacy Book): https://amzn.to/2B5svbH


The Privacy, Security, & OSINT Show – Episode 175

EPISODE 175-Privacy Crash Course 02: Email & Messengers

This week I continue the Privacy Crash Course and we tackle truly secure email and instant messenger services.

Support for this show comes directly from my new book Extreme Privacy-Second Edition. More details can be found at https://inteltechniques.com/books.html.


SHOW NOTES:

INTRO:

Privacy Crash Course Introduction

PRIVACY CRASH COURSE 02: EMAIL & MESSENGERS

Protonmail: http://proton.go2cloud.org/aff_c?offer_id=15&aff_id=1519
Tutanota: https://tutanota.com/
Anonaddy: https://anonaddy.com/
Simple Login: https://simplelogin.io/
CheckTLS: https://www.checktls.com/
Signal: https://signal.org
Wickr: https://wickr.com/
Wire: https://wire.com/en/download/
MySudo: https://mysudo.com/
Session: https://getsession.org/
Book: Extreme Privacy-Second Edition


Data Removal Workbook: https://inteltechniques.com/data/workbook.pdf

Affiliate Links (products we use):
VPN Considerations: https://inteltechniques.com/vpn.html
ProtonMail: http://proton.go2cloud.org/aff_c?offer_id=15&aff_id=1519
ProtonVPN: https://proton.go2cloud.org/aff_c?offer_id=6&aff_id=1519
PIA VPN: https://www.privateinternetaccess.com/pages/buy-vpn/crimeinfo
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Fastmail: https://ref.fm/u14547153
Amazon (Extreme Privacy Book): https://amzn.to/2B5svbH


The Privacy, Security, & OSINT Show – Episode 174

EPISODE 174-Privacy Crash Course 01: Passwords & 2FA

This week I begin the Privacy Crash Course with a conversation around passwords and 2FA. Afterward, I have some thoughts about the recent concerns regarding Apple IDs and the Brave Browser.

Support for this show comes directly from my new book Extreme Privacy-Second Edition. More details can be found at https://inteltechniques.com/books.html.


SHOW NOTES:

INTRO:

Privacy Crash Course Introduction

PRIVACY CRASH COURSE 01: PASSWORDS & 2FA

BitWarden: https://bitwarden.com/
KeePassXC: https://keepassxc.org/
KeePassXC Browser: https://addons.mozilla.org/en-US/firefox/addon/keepassxc-browser/
Yubikey: https://amzn.to/2HZlT0Z
OnlyKey: https://amzn.to/2CVUF7l
Authy: https://authy.com/

UPDATES:

https://inteltechniques.com/blog/2020/06/08/apple-id-creation-update/
https://www.coindesk.com/brave-browsers-affiliate-link-controversy-explained


Data Removal Workbook: https://inteltechniques.com/data/workbook.pdf

Affiliate Links (products we use):
VPN Considerations: https://inteltechniques.com/vpn.html
ProtonMail: http://proton.go2cloud.org/aff_c?offer_id=15&aff_id=1519
ProtonVPN: https://proton.go2cloud.org/aff_c?offer_id=6&aff_id=1519
PIA VPN: https://www.privateinternetaccess.com/pages/buy-vpn/crimeinfo
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Fastmail: https://ref.fm/u14547153
Amazon (Extreme Privacy Book): https://amzn.to/2B5svbH


Apple ID Creation Update

In my latest book, Extreme Privacy: Second Edition, I explained how I used the web version of the Apple ID creation process through a Safari browser in order to avoid providing a true cellular number. A few readers report that Apple is now demanding a cellular telephone number during any registration process. I have confirmed this once, but it does not always seem to be the case. They appear to accept a landline number but no VOIP options. I have modified page 19 of the new book with the following:

"I create new Apple accounts from within each phone through the prompts presented after initial boot. You can typically delay the Apple ID requirement during the first setup screen, but an account is required in order to download any apps. I provide a generic name, forwarding email account, hotel address, and secure password generated by my password manager (more details on all of this later). If forced to provide a telephone number, I supply the number assigned through the carrier to the device. This may seem reckless, but Apple collects this data from the device regardless. In a moment, I explain my preferred pre-paid cellular provider (Mint Mobile), which can be purchased without providing a true name. The SIM can be activated online if you are unable to install the app due to the lack of an Apple ID account. You will need internet access via Wi-Fi during both processes. I prefer to use public Wi-Fi without a VPN in order to avoid fraud triggers. Conducting all of the setup processes while connected to open Wi-Fi at an Apple store parking lot is ideal. If you plan to purchase apps, obtain a prepaid iTunes gift card with cash from a grocery store. This is usually not necessary because you should possess minimal applications and only those absolutely required."

Summary (iPhones): I now provide the cell number associated with the device to the Apple ID account, and allow it to be used for Apple's 2FA. It will be collected and attached to the Apple profile anyway. This is why an anonymous cell plan is so important. I never create an Apple ID for any Apple laptop/desktop computers. An account is not required unless you want to use the App Store, which I never recommend.

The following text was modified on page 50 in regard to Apple ID for non-phones:

"When you create an Apple ID through traditional methods such as the MacOS installation screen, Apple is very likely to demand a cellular telephone number as part of the process. They will also send a verification text to that number which must be entered to complete the registration. When registering online through their website, Apple usually offers an option to enter a landline number in lieu of a cell. This could be a direct line at a hotel, library, or other public building. A public number should only be used for an Apple laptop, desktop, or iPod Touch, and should never be used as part of Apple’s two-factor authentication. You should only use this method when you will never need to access to the number after the initial verification. I do not like that Apple is demanding telephone numbers in order to use their products, but it is the reality in which we live."

Summary (macOS): I encourage clients to avoid creating an Apple ID for any computer unless it is absolutely necessary in order to use a specific software application.

The Privacy, Security, & OSINT Show – Episode 173

EPISODE 173-Extreme Privacy II, Email Updates, & Account Hijacking

This week I discuss the tactics in my new book, Extreme Privacy (2nd Edition), dive into the latest offerings within email masking services, and explain a recent email hijacking threat I witnessed.

Support for this show comes directly from my new book Extreme Privacy-Second Edition. More details can be found at https://inteltechniques.com/books.html.


SHOW NOTES:

INTRO:

Email Account Hijacking

PRIVACY UPDATES:

Simple Login: https://simplelogin.io/

EXTREME PRIVACY-SECOND EDITION

https://inteltechniques.com/book7.html


Data Removal Workbook: https://inteltechniques.com/data/workbook.pdf

Affiliate Links (products we use):
VPN Considerations: https://inteltechniques.com/vpn.html
ProtonMail: http://proton.go2cloud.org/aff_c?offer_id=15&aff_id=1519
ProtonVPN: https://proton.go2cloud.org/aff_c?offer_id=6&aff_id=1519
PIA VPN: https://www.privateinternetaccess.com/pages/buy-vpn/crimeinfo
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Fastmail: https://ref.fm/u14547153
Amazon (Extreme Privacy Book): https://amzn.to/2B5svbH