119 lines
3.8 KiB
Markdown
119 lines
3.8 KiB
Markdown
|
|
## Connecting to the internet
|
|
|
|
Let's now talk about the possible dangers of connecting your hardware into the internet.
|
|
|
|
![](/img/danger-internet.jpg)
|
|
|
|
--
|
|
|
|
|
|
|
|
### How do we connect?
|
|
|
|
- Wifi? Change the default password
|
|
- Disable the WPS/smart connect on your router
|
|
- Public wifi? Stay safe
|
|
- On your phone? Disable the wifi if you are not using it
|
|
- Prefer cables ALWAYS
|
|
|
|
notes: i dispositivi wifi broadcastano i MAC ai router se non impostati per
|
|
non farlo (esempio metro di londra)
|
|
https://tfl.gov.uk/corporate/publications-and-reports/wifi-data-collection
|
|
|
|
--
|
|
|
|
## Browsing the web
|
|
|
|
- use firefox, always
|
|
- use firefox containers
|
|
- check the address bar: does the web address make sense?
|
|
- avoid google, use alternative search engines
|
|
- check that you are not logged in automatically by Google, Microsoft and Apple
|
|
- remove advertisements from webpages
|
|
- Incognito mode: not what you would think it is
|
|
|
|
Question: what is the difference between the web and the internet?
|
|
<!-- .element: class="fragment" -->
|
|
|
|
--
|
|
|
|
## Useful Firefox extensions
|
|
|
|
- [uBlock Origin](https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/): remove ads
|
|
- [LocalCDN](https://addons.mozilla.org/en-US/firefox/addon/localcdn-fork-of-decentraleyes/): avoid unnecessary 3rd party requests
|
|
- [Multi Account Containers](https://addons.mozilla.org/en-US/firefox/addon/multi-account-containers/): filter webpages and accounts into groups
|
|
- [ClearURLs](https://addons.mozilla.org/en-US/firefox/addon/clearurls/): removes useless tracking elements from URLs
|
|
|
|
--
|
|
|
|
|
|
## Domain Name System
|
|
|
|
The DNS is the address book of the internet! When you want to connect to **lezzo.org**:
|
|
1. Your computer asks a DNS resolver how to reach **lezzo.org**
|
|
2. The DNS resolver replies with an IP address: 81.56.155.125
|
|
3. The IP address is used to route your request to the server
|
|
4. You can now communicate with the server
|
|
|
|
--
|
|
|
|
## Change your DNS
|
|
|
|
By default, most computers are configured to use the DNS server provided by their Internet Service Provider (ISP), which means your ISP knows which website you visit
|
|
<br>
|
|
<br>
|
|
Change your DNS to an alternative server, depending on your threat model
|
|
|
|
--
|
|
|
|
## Virtual Private Network
|
|
|
|
A VPN private tunnel for your internet connection.
|
|
|
|
- Normally, your internet traffic goes directly from your device to websites/services
|
|
- This means your ISP can see your online activities
|
|
|
|
With a VPN:
|
|
|
|
- Your device connects to a VPN server first before going to the internet
|
|
- This hides your real internet address and location to the ISP
|
|
|
|
--
|
|
|
|
## Why
|
|
|
|
- You need to access geo-blocked services
|
|
- You want to keep something private from your ISP
|
|
- You want to protect **some** of your activities on public WiFi networks
|
|
|
|
Question: when should you avoid a VPN?
|
|
<!-- .element: class="fragment" -->
|
|
|
|
--
|
|
|
|
## TOR
|
|
|
|
- TOR stands for The Onion Router
|
|
- It's a FOSS tool that enables anonymous communication
|
|
- It directs Internet traffic through a free, worldwide, volunteer overlay network
|
|
- It conceals a user's location and usage from anyone conducting network surveillance or traffic analysis
|
|
- The name derives from the method of layered encryption used (like the layers of an onion)
|
|
|
|
--
|
|
|
|
## How TOR works
|
|
|
|
- TOR uses a system of virtual tunnels to route your traffic
|
|
- It randomly selects a path through the TOR network, called a circuit
|
|
- Each node in the circuit knows only the IP address of the node before and after it
|
|
- The data is encrypted and re-encrypted multiple times as it passes through the nodes
|
|
- The final node (exit node) decrypts the data and sends it to its destination
|
|
- This makes it difficult for an observer to trace the origin of the data
|
|
--
|
|
|
|
## When to use TOR
|
|
- When you want to contribute to the network
|
|
- When you need to hide your IP from multiple parties
|
|
- When you want to access the .onion network
|
|
- When you value anonimity as well as security
|