<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>How To Survive The Claire Perry Internet &#187; Security</title>
	<atom:link href="/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://survivetheclaireperryinter.net</link>
	<description></description>
	<lastBuildDate>Fri, 16 Oct 2015 09:30:30 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.8</generator>
	<item>
		<title>Introducing ASafe.Space</title>
		<link>https://survivetheclaireperryinter.net/2015/01/12/introducing-asafe-space/</link>
		<comments>https://survivetheclaireperryinter.net/2015/01/12/introducing-asafe-space/#comments</comments>
		<pubDate>Mon, 12 Jan 2015 19:11:24 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Evasion]]></category>
		<category><![CDATA[Filter bypass]]></category>
		<category><![CDATA[Filter Evasion]]></category>
		<category><![CDATA[Surveillance Avoidance]]></category>
		<category><![CDATA[Technical Implementation]]></category>
		<category><![CDATA[Censorship]]></category>
		<category><![CDATA[David Cameron]]></category>
		<category><![CDATA[Evasion]]></category>
		<category><![CDATA[Mass Surveillance]]></category>
		<category><![CDATA[Proxy]]></category>
		<category><![CDATA[Safe Space]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[TOR]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=615</guid>
		<description><![CDATA[David Cameron recently said in a speech that he would deny potential Terrorists a safe space on the Internet to communicate; The obvious problem here is that everyone is a potential Terrorist so what David Cameron is actually promising that he intends to legislate against anyone having a means of communication that is secure from<br /><a class="moretag" href="/2015/01/12/introducing-asafe-space/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<p>David Cameron recently said in a speech that he would deny <em>potential</em> Terrorists a safe space on the Internet to communicate;</p>
<p><iframe src="https://embed.theguardian.com/embed/video/uk-news/video/2015/jan/12/david-cameron-spy-agencies-britain-video" width="560" height="315" frameborder="0" allowfullscreen></iframe></p>
<p>The obvious problem here is that <em>everyone</em> is a <em>potential</em> Terrorist so what David Cameron is actually promising that he intends to legislate against <em>anyone</em> having a means of communication that is secure from Government interference.</p>
<p>We&#8217;ve seen that GCHQ and the Police have abused <em>(or just plain broken)</em> laws in order to spy on Journalists, Lawyers and other innocents, the Government can not be trusted with these powers.</p>
<p>In response <a href="https://ASafe.Space">ASafe.Space</a> has been registered and will contain a few short guides on how to have a <a href="https://asafe.space/to/browse-the-internet/">safe space to browse the Internet</a>, <a href="https://asafe.space/to/communicate-over-instant-messaging/">communicate over Instant Messaging</a>, <a href="https://asafe.space/to/communicate-over-email/">Email</a> or <a href="https://asafe.space/to/communicate-with-pen-paper/">even Pen and Paper</a>.</p>
<p>Evading censorship and surveillance are one and the same, if the censor doesn&#8217;t know what you are saying or what you are reading they can&#8217;t stop you nor can they hold it against you.</p>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2015/01/12/introducing-asafe-space/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Installing TOR on Windows Securely</title>
		<link>https://survivetheclaireperryinter.net/2014/03/11/installing-tor-on-windows-securely/</link>
		<comments>https://survivetheclaireperryinter.net/2014/03/11/installing-tor-on-windows-securely/#comments</comments>
		<pubDate>Tue, 11 Mar 2014 21:46:57 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Evasion]]></category>
		<category><![CDATA[Filter bypass]]></category>
		<category><![CDATA[Filter Evasion]]></category>
		<category><![CDATA[Surveillance Avoidance]]></category>
		<category><![CDATA[Technical Implementation]]></category>
		<category><![CDATA[bypass bt filter]]></category>
		<category><![CDATA[Crypto]]></category>
		<category><![CDATA[GPG]]></category>
		<category><![CDATA[guarantee]]></category>
		<category><![CDATA[MD5]]></category>
		<category><![CDATA[PGP]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[sky broadband shield]]></category>
		<category><![CDATA[talktalk dns server]]></category>
		<category><![CDATA[talktalk homesafe]]></category>
		<category><![CDATA[TOR]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=235</guid>
		<description><![CDATA[As mentioned on our Top Ways to Avoid Filters page the Onion Router Project (better known as TOR) excels at bypassing censorship technologies such as the Sky Broadband Shield, the TalkTalk filters, BT Parental Controls and even the Great Firewall of Cameron China whilst at the same time offering almost perfect anonymity. TOR is an excellent choice<br /><a class="moretag" href="/2014/03/11/installing-tor-on-windows-securely/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<p>As mentioned on our <a href="/top-ways-to-evade-filters/">Top Ways to Avoid Filters</a> page the Onion Router Project <em>(better known as TOR) </em>excels at bypassing censorship technologies such as the Sky Broadband Shield, the TalkTalk filters, BT Parental Controls and even the Great Firewall of <del>Cameron</del> China whilst at the same time offering <em>almost</em> perfect anonymity.</p>
<p>TOR is an excellent choice for any would-be whistle blower, political journalist, privacy advocate, vulnerable adult or any other person who wants/needs unrestricted Internet access.</p>
<p>TOR is no more a tool for criminals than a kitchen knife or a car, much like encryption the more it is used by normal people for normal day-to-day tasks the better the protection for everyone by making it more expensive for nation states to perform blanket surveillance and Internet filtering.</p>
<p>This post will show you how to download and install the TOR client <em>(which is easy)</em> whilst also ensuring it&#8217;s the real deal and hasn&#8217;t been interfered with by your ISP or other malicious actors.</p>
<h2>Downloading</h2>
<p>The best place to download TOR is from the projects own website here: <a href="https://www.torproject.org/download/download-easy.html.en">https://www.torproject.org/download/download-easy.html.en</a> <em>(note the http<strong>s</strong>)</em>. You should also do whatever is necessary to acquire the signature file which can be found by following the link labelled <strong>sig</strong> <em>(underlined in red below) </em>on the download page.</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/05/sig.jpg"><img class="aligncenter size-full wp-image-281" alt="sig" src="/wp-content/uploads/2014/05/sig.jpg" width="549" height="277" /></a></p>
<p>&nbsp;</p>
<p>The download is also available on this website by clicking <a href="/wp-content/uploads/torbrowser-install-3.6.1_en-US.exe">here</a> and the signature for this download is reproduced below.</p>
<pre>-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAABCAAGBQJTaXIZAAoJEEFvBhBj/uZZEJsIAKD2Ny/oXZheHd3xkgk9t906
a3Xayel0Mxp7Yj6dEvoDKTvvkyvmN1PC4K7oFjovaFP29SekDSRvMYnRlLnDaEHD
QZoPs7bFpf1qoRukZgMr9Q9B4rsy4Q9hr8iNcV1OeVawiGf8aQ/9XIp3TDErb80w
0tKnK4JI0a8FDKumc5GFTNQNZo9G2r46puSu4hLkckbz8zZa4FqVIjOpiyG65ri4
VdujXmpObLYEL/lAfg6xoCIF8VzM9eb1jBj+ISCxt0r2bpD8/iBizEvNRjzWIQUe
krqEuPpzYNiGLzXvczMTULs4lo7s6jGDR44ztijnwm87JdJCtFIrrh/+8QKe82Q=
=h2XC
-----END PGP SIGNATURE-----</pre>
<p>At this point you could just install TOR and trust that everything is OK but in this day and age you should really make sure.</p>
<h2>Verifying the Download</h2>
<p>At this point you should go off and read about GnuPG on <a href="https://en.wikipedia.org/wiki/GNU_Privacy_Guard">Wikipedia</a> and consider reading the <a href="https://www.gnupg.org/documentation/manuals/gnupg/">GnuPG manual</a> so you fully understand why we&#8217;re about to do what we are going to do.</p>
<p>As we&#8217;re on Windows <em>(you should consider trying Linux even if it&#8217;s only on a live boot CD/USB)</em> we need to install GPG4WIN which can be downloaded here: <a href="http://gpg4win.org/download.html">http://gpg4win.org/download.html</a>. Pay close attention to the SHA1 checksum you will need that shortly.</p>
<p>Secondarily download and install the Microsoft File Checksum Integrity Verifier from, here: <a href="https://www.microsoft.com/en-gb/download/details.aspx?id=11533">https://www.microsoft.com/en-gb/download/details.aspx?id=11533</a></p>
<p>Luckily the Microsoft download will be signed and certified by a certificate already embedded in the OS so go ahead and install it, you should see that the publisher is &#8220;Microsoft Corporation&#8221; and if you click the blue text you should see a confirmation that the Digital Signature is OK;</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/03/file_integrity_certificate.jpg"><img class="aligncenter size-medium wp-image-284" alt="file_integrity_certificate" src="/wp-content/uploads/2014/03/file_integrity_certificate-300x177.jpg" width="300" height="177" /></a></p>
<p>&nbsp;</p>
<p>Once extracted to a useful location <em>(preferably the same place you downloaded the GPG4WIN installer to)</em> execute the following command;</p>
<pre class="shell">fciv.exe -sha1 gpg4win-2.2.1.exe</pre>
<p>This will generate the SHA1 hash you noted earlier in a manner similar to that below, if the two hashes do not match <strong>exactly</strong> then something is wrong.</p>
<pre>//
// File Checksum Integrity Verifier version 2.05.
//
6fe64e06950561f2183caace409f42be0a45abdf gpg4win-2.2.1.exe</pre>
<p>Now <em>(assuming that the hashes match)</em> we need to install GPG4Win, for added security you can ensure that the certificate is also genuine for the installer by clicking <strong>More Details</strong> then <strong>Show information about this publishers certificate</strong>. The default GPG4Win installs options should suffice;</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/03/gpg4win.jpg"><img class="aligncenter size-full wp-image-285" alt="gpg4win" src="/wp-content/uploads/2014/03/gpg4win.jpg" width="513" height="399" /></a></p>
<p>&nbsp;</p>
<p>Once installed load up the GNU Privacy Assistant or GPA from the All Programs &gt; Gpg4Win section of the start menu. GPA allows you to import the public keys of the TOR developers who signed the TOR installer to guarantee that it is genuine and hasn&#8217;t been tampered with.</p>
<p>All the signing keys can be found on this page; <a href="https://www.torproject.org/docs/signing-keys.html.en">https://www.torproject.org/docs/signing-keys.html.en</a> if you are unable to reach that page then the key we want is from a developer named Erinn Clark whose key can be identified as 0x63FEE659.</p>
<p>To install her key select <strong>Server</strong> then <strong>Retrieve Keys</strong> from the GPA menu</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/03/key_import.jpg"><img class="aligncenter size-full wp-image-287" alt="key_import" src="/wp-content/uploads/2014/03/key_import.jpg" width="696" height="638" /></a></p>
<p>In the popup box that appears type or paste 0x63FEE659 then click <strong>OK</strong>.</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/03/retreive_key.jpg"><img class="aligncenter size-full wp-image-288" alt="retreive_key" src="/wp-content/uploads/2014/03/retreive_key.jpg" width="229" height="152" /></a>You should then be told that one 1 public key has been read and imported!</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/03/imported.jpg"><img class="aligncenter size-full wp-image-289" alt="imported" src="/wp-content/uploads/2014/03/imported.jpg" width="231" height="203" /></a></p>
<p>Select Erinn&#8217;s key from the list and look at the details, ensure that the fingerprint matches the one on <a href="https://www.torproject.org/docs/signing-keys.html.en">https://www.torproject.org/docs/signing-keys.html.en</a> or if you can&#8217;t reach that page this;</p>
<pre>8738 A680 B84B 3031 A630  F2DB 416F 0610 63FE E659</pre>
<p>If it does right click on her key and select <strong>Sign Key</strong>, this indicates that you trust this key for encryption and importantly for our purposes any signatures made.</p>
<p>You&#8217;re now ready to confirm if the TOR download is safe to install. Navigate to the location where you saved the TOR executable and the signature file, right click on the installer and navigate to <strong>More GpgEx Options</strong> then click <strong>Verify</strong>.</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/03/verify.jpg"><img class="aligncenter size-full wp-image-290" alt="verify" src="/wp-content/uploads/2014/03/verify.jpg" width="649" height="588" /></a></p>
<p>&nbsp;</p>
<p>In the window that pops up click <strong>Decrypt / Verify</strong>, if all has been succesful you will see a green notice confirming that the signature passes.</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/03/signature_success.jpg"><img class="aligncenter size-full wp-image-291" alt="signature_success" src="/wp-content/uploads/2014/03/signature_success.jpg" width="656" height="518" /></a></p>
<p>You can now install TOR safe in the knowledge that the download has not been tampered with by malicious criminals or the surveillance state. Once installed you will now be able to evade any form of Government or ISP filtering.</p>
<p>Remember if you are using TOR to protect yourself as part of a whistle blowing exercise there are <a href="https://www.torproject.org/download/download-easy.html.en#warning">several warnings to take heed of </a>to ensure that you do not jeopardise the work you&#8217;ve put in so far.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2014/03/11/installing-tor-on-windows-securely/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Building a SOCKS5 Proxy with a Digital Ocean Server to Bypass UK Internet Filters</title>
		<link>https://survivetheclaireperryinter.net/2014/01/10/building-a-socks5-proxy-with-a-digital-ocean-server/</link>
		<comments>https://survivetheclaireperryinter.net/2014/01/10/building-a-socks5-proxy-with-a-digital-ocean-server/#comments</comments>
		<pubDate>Fri, 10 Jan 2014 07:05:14 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Evasion]]></category>
		<category><![CDATA[Filter bypass]]></category>
		<category><![CDATA[Filter Evasion]]></category>
		<category><![CDATA[Surveillance Avoidance]]></category>
		<category><![CDATA[Block]]></category>
		<category><![CDATA[BT]]></category>
		<category><![CDATA[Bypass]]></category>
		<category><![CDATA[bypass bt filter]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[Evasion]]></category>
		<category><![CDATA[Filter]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[not free]]></category>
		<category><![CDATA[Proxy DNS Query]]></category>
		<category><![CDATA[proxy resolve dns]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Sky]]></category>
		<category><![CDATA[sky broadband shield]]></category>
		<category><![CDATA[socks list proxy]]></category>
		<category><![CDATA[TalkTalk]]></category>
		<category><![CDATA[talktalk dns server]]></category>
		<category><![CDATA[talktalk homesafe]]></category>
		<category><![CDATA[Virgin]]></category>
		<category><![CDATA[webproxy]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=125</guid>
		<description><![CDATA[If you don&#8217;t currently run Linux on your desktop I would strongly suggest it. Try Fedora or Ubuntu. If you don&#8217;t want to run Linux permanently but do want to try this method then a Live Boot CD of Fedora or Ubuntu (or any other Linux OS of your choice)  would be an ideal method.<br /><a class="moretag" href="/2014/01/10/building-a-socks5-proxy-with-a-digital-ocean-server/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<div class="alert bluth red"><button type="button" class="close" data-dismiss="alert">&times;</button>This article is for use on a Linux/Mac computer <em>(desktop / laptop etc)</em>. A Windows guide will be available at a later date.</div>
<p>If you don&#8217;t currently run Linux on your desktop I would strongly suggest it. Try <a href="https://fedoraproject.org/en_GB/get-fedora">Fedora</a> or <a href="http://www.ubuntu.com/">Ubuntu</a>. If you don&#8217;t want to run Linux permanently but do want to try this method then a <a href="https://en.wikipedia.org/wiki/Live_CD">Live Boot CD</a> of Fedora or Ubuntu <em>(or any other Linux OS of your choice)</em>  would be an ideal method.</p>
<p>Servers in datacenters are extremely unlikely to experience filtering so by tunnelling your connection through to a server you can browse the Internet without worrying if your connection is being restricted or surveilled.</p>
<p>IMAGE</p>
<h2>Signing up with Digital Ocean</h2>
<p>Navigate to <a href="https://www.digitalocean.com/">www.DigitalOcean.com</a> and click the Signup button at the top of the page. Enter an email address and a password. You may want to use an anonymous email provider such as Hushmail.com to protect your privacy and a strong password you&#8217;ve not used anywhere else. <strong>Important:</strong> The email address must be real as your server password will be emailed to you.</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/01/signup.jpg"><img class="aligncenter size-medium wp-image-128" alt="signup" src="/wp-content/uploads/2014/01/signup-300x241.jpg" width="300" height="241" /></a>Once logged in you&#8217;ll have access to the initial control panel;<a class="lightbox" href="/wp-content/uploads/2014/01/logged_in.png"><img class="aligncenter size-medium wp-image-129" alt="logged_in" src="/wp-content/uploads/2014/01/logged_in-300x166.png" width="300" height="166" /></a></p>
<p>Click get started which will take you to the billing page, you can either use a credit card<em> (you may want to use an anonymous Visa / Mastercard, search online for keywords such as prepaid, anonymous etc)</em> or PayPal.</p>
<p>Once your payment is processed and cleared <em>(check <a href="https://cloud.digitalocean.com/billing">billing</a> for tracking your pre-paid balance if using PayPal) </em> or refresh the <a href="https://cloud.digitalocean.com/droplets">droplets</a> page to see the below;<a class="lightbox" href="/wp-content/uploads/2014/01/paid.jpg"><img class="aligncenter size-medium wp-image-130" alt="paid" src="/wp-content/uploads/2014/01/paid-300x175.jpg" width="300" height="175" /></a></p>
<p>Click <strong>Create Droplet</strong>!</p>
<p>Choose a friendly name for the server <em>(aka Droplet)</em>, this name is not important feel free to use how-to.survivetheclaireperryinter.net if you want to. Leave the Size option alone <em>(or if a larger size is selected change to to 512Mb/20Gb/1Tb as this is only $5 / £3 a month).</em> For lower latency and a reduced chance of NSA eavesdropping choose an Amsterdam datacenter <em>(not necessary but recommended)</em>.<a class="lightbox" href="/wp-content/uploads/2014/01/details1.jpg"><img class="aligncenter size-medium wp-image-131" alt="details1" src="/wp-content/uploads/2014/01/details1-286x300.jpg" width="286" height="300" /></a></p>
<p>Scroll down for more settings. For the purposes of this tutorial choose CentOS and then the latest CentOS version <em>(currently 6.4)</em> then click <strong>Create Droplet</strong>. <a class="lightbox" href="/wp-content/uploads/2014/01/details2.jpg"><img class="aligncenter size-medium wp-image-133" alt="details2" src="/wp-content/uploads/2014/01/details2-300x265.jpg" width="300" height="265" /></a></p>
<p>After a few seconds of watching the following screen your server will be created and you should have received an email with your root password.<a class="lightbox" href="/wp-content/uploads/2014/01/building.jpg"><img class="aligncenter size-medium wp-image-134" alt="building" src="/wp-content/uploads/2014/01/building-300x54.jpg" width="300" height="54" /></a></p>
<p>Behold your new server, make note of the IP address at the top near the word active. In this case the IP address is <strong>95.85.54.190</strong><a class="lightbox" href="/wp-content/uploads/2014/01/complete.jpg"><img class="aligncenter size-medium wp-image-135" alt="complete" src="/wp-content/uploads/2014/01/complete-300x102.jpg" width="300" height="102" /></a>Check your inbox and you should have an email with the IP address, the user name <em>(root)</em> and your password. It&#8217;s very important you don&#8217;t write a blog post and publish your username and password because bad things will happen to your server<a class="lightbox" href="/wp-content/uploads/2014/01/email.jpg"><img class="aligncenter size-medium wp-image-136" alt="email" src="/wp-content/uploads/2014/01/email-300x197.jpg" width="300" height="197" /></a></p>
<p>&nbsp;</p>
<p>Now we&#8217;re ready to create a proxy.</p>
<h2>Testing the Proxy / Tunnel</h2>
<p>Assuming you are logged into your Linux computer load up a terminal.<a class="lightbox" href="/wp-content/uploads/2014/01/terminal_1.png"><img class="aligncenter size-medium wp-image-137" alt="terminal_1" src="/wp-content/uploads/2014/01/terminal_1-300x215.png" width="300" height="215" /></a>Type the following;</p>
<pre class="bash">ssh -D 8080 root@95.85.54.190</pre>
<p> Replace the IP address with your own. You&#8217;ll be informed that the authenticity of the host can&#8217;t be established which is true because you don&#8217;t know what the RSA key fingerprint is. You can choose to accept it and continue or be paranoid and bail. If you chose to continue you will be prompted for you password that was sent by email.<a class="lightbox" href="/wp-content/uploads/2014/01/terminal_2.png"><img class="aligncenter size-medium wp-image-142" alt="terminal_2" src="/wp-content/uploads/2014/01/terminal_2-300x215.png" width="300" height="215" /></a></p>
<p>Load up another terminal <em>(or a tab)</em> and type the following;</p>
<pre class="bash">curl --socks5-hostname 127.0.0.1:8080 http://wtfismyip.com/json</pre>
<p>You should see the following output indicating that your ISP is <strong>Digital Ocean</strong>.<a class="lightbox" href="/wp-content/uploads/2014/01/terminal_3.png"><img class="aligncenter size-medium wp-image-140" alt="terminal_3" src="/wp-content/uploads/2014/01/terminal_3-300x215.png" width="300" height="215" /></a></p>
<p>&nbsp;</p>
<p>You could immediately configure your browser etc to use these settings but you should try and be a bit more thorough.</p>
<h2>Configuring the Proxy / Tunnel for long term use</h2>
<p>Exit all of the terminals opened in the previous step which will close all tunnels and SSH sessions and we&#8217;ll get started on making this a little more secure.</p>
<p>First things first is to change the root password from the one that was emailed to you. Load up a terminal and ssh in;</p>
<pre class="bash">ssh <a href="mailto:root@95.85.54.190">root@95.85.54.190</a></pre>
<p>Once logged in change the password with the passwd command. Ensure you use a different password to anything else you have.<a class="lightbox" href="/wp-content/uploads/2014/01/terminal_4.png"><img class="aligncenter size-medium wp-image-147" alt="terminal_4" src="/wp-content/uploads/2014/01/terminal_4-300x215.png" width="300" height="215" /></a>The root user is the most powerful user on a Linux server and can delete anything and everything so you really don&#8217;t want to be using it for everyday tasks. For creating the tunnel we want to use a non-privileged user. To do this simply type the following <em>(feel free to replace the name tunnel with your name or anything, it&#8217;s just a username and isn&#8217;t important)</em>;</p>
<pre class="bash">useradd tunnel</pre>
<p>Now change the password for this user by passing the username to the passwd command used earlier, make sure you use a strong password and one that isn&#8217;t that same as any of your others;</p>
<pre class="bash">passwd tunnel</pre>
<p><a class="lightbox" href="/wp-content/uploads/2014/01/terminal_5.png"><img class="aligncenter size-medium wp-image-148" alt="terminal_5" src="/wp-content/uploads/2014/01/terminal_5-300x215.png" width="300" height="215" /></a></p>
<p>Load up a new tab on your local machine and try logging in as your new user;</p>
<pre class="bash">ssh tunnel@<a href="mailto:root@95.85.54.190">95.85.54.190</a></pre>
<p><a class="lightbox" href="/wp-content/uploads/2014/01/terminal_6.png"><img class="aligncenter size-medium wp-image-149" alt="terminal_6" src="/wp-content/uploads/2014/01/terminal_6-300x215.png" width="300" height="215" /></a></p>
<p>&nbsp;</p>
<p>You&#8217;re now ready to setup a tunnel/SOCKS proxy you can use with your browser.</p>
<p>Exit all your terminals again and this time issue the command;</p>
<pre class="bash">ssh -D 8080 tunnel@<a href="mailto:root@95.85.54.190">95.85.54.190</a></pre>
<p>In a new terminal check that the proxy is working by issuing the CURL command again;</p>
<pre class="bash">curl --socks5-hostname 127.0.0.1:8080 http://wtfismyip.com/json</pre>
<p>For this example I&#8217;m going to use Firefox but feel free to try it out with others. In the address bar type <strong>about:config</strong>, you&#8217;ll be presented with the following screen;</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/01/firefox_dragons.jpg"><img class="aligncenter size-medium wp-image-150" alt="firefox_dragons" src="/wp-content/uploads/2014/01/firefox_dragons-300x92.jpg" width="300" height="92" /></a></p>
<p>&nbsp;</p>
<p>Assuming you are going to be careful click the button.</p>
<p>In the Search bar at the top type <strong>proxy</strong>, then look for the strings <strong>network.proxy.socks</strong> and <strong>network.proxy.socks_port</strong>, type in the values from the command above (127.0.0.1 and 8080). If your ISP filters DNS then you may want to toggle <strong>network.proxy.socks_remote_dns</strong> too <em>(don&#8217;t forget to change your name servers!)</em>.</p>
<p>Finally change <strong>network.proxy.type</strong> to <strong>1</strong>.</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/01/firefox_about_config.png"><img class="aligncenter size-medium wp-image-151" alt="firefox_about_config" src="/wp-content/uploads/2014/01/firefox_about_config-300x216.png" width="300" height="216" /></a>To test, simply load up a new Firefox tab and attempt to access a blocked page.</p>
<p>So there you have it, an easy way to get past any Web filtering and as an added bonus since your traffic is encrypted between your computer and your server in Amsterdam neither your ISP nor the UK Government can monitor it.</p>
<div class="alert bluth yellow"><button type="button" class="close" data-dismiss="alert">&times;</button>Traffic egressing the server can still be tracked and recorded. With the right combination of warrants and traffic capture at the Digital Ocean datacenter coupled with your home ISP logs illegal activity can still be traced back to you! Only use this to method to bypass filters,</div>
<p>Upcoming articles include creating a dedicated Raspberry PI proxy for use with multiple devices <em>(phones, tablets, Windows PCs etc)</em> and setup guides for other server providers. Make sure you follow <a href="https://twitter.com/stcpi">@STCPI</a> on Twitter for updates!</p>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2014/01/10/building-a-socks5-proxy-with-a-digital-ocean-server/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>Censor Pages Allow Injection Attacks &amp; Arbitrary URLs</title>
		<link>https://survivetheclaireperryinter.net/2013/12/22/censor-pages-allow-injection-attacks-arbitrary-urls/</link>
		<comments>https://survivetheclaireperryinter.net/2013/12/22/censor-pages-allow-injection-attacks-arbitrary-urls/#comments</comments>
		<pubDate>Sun, 22 Dec 2013 02:32:42 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Reporting]]></category>
		<category><![CDATA[Overblocking]]></category>
		<category><![CDATA[Block]]></category>
		<category><![CDATA[BT]]></category>
		<category><![CDATA[Filter]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Sky]]></category>
		<category><![CDATA[TalkTalk]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=82</guid>
		<description><![CDATA[BT, Sky Broadband and Talk Talk have implemented opt-out Network level filtering for their customers. The thing is, as well as overblocking websites that should not be filtered the ISPs have poorly implementated their block pages. http://makeyourispblock.me/ was registered at 2am on the 22nd of December but due to the badly designed block pages it can be made<br /><a class="moretag" href="/2013/12/22/censor-pages-allow-injection-attacks-arbitrary-urls/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<p>BT, Sky Broadband and Talk Talk have implemented opt-out Network level filtering for their customers.</p>
<p>The thing is, as well as <a href="http://www.bbc.co.uk/news/uk-25430582">overblocking</a> websites that should not be filtered the ISPs have poorly implementated their block pages.</p>
<p>http://makeyourispblock.me/ was registered at 2am on the 22nd of December but due to the badly designed block pages it can be made to be shown as blocked.</p>
<p><a href="http://block.nb.sky.com/?domain=http%3A%2F%2Fmakeyourispblock.me%2F&amp;categories=.&amp;atch_user_blacklist=false">Sky Broadband Block Page</a><br />
<a href="http://blockpage.bt.com/pcstaticpage/blocked.html?policy=1&amp;view=1&amp;list=global_blacklist&amp;originalUrl=aHR0cDovL21ha2V5b3VyaXNwYmxvY2subWUv">BT Broadband Block Page</a><br />
<a href="https://www.talktalk.co.uk/notice/parental-controls?accessurl=aHR0cDovL21ha2V5b3VyaXNwYmxvY2subWUv&amp;urlclassname=b2Ygd2Vic2l0ZXMgbGlrZSBodHRwOi8vbWFrZXlvdXJpc3BibG9jay5tZS8gc2hvdWxkIGJlIGJhbm5lZCE%3D">Talk Talk Broadband Block Page</a></p>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2013/12/22/censor-pages-allow-injection-attacks-arbitrary-urls/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
