28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

service. And even the best proxyy sites admit that clever Flash or JavaScript

tricks can still detect yyour underlyying IP address—the IP address yyou use to

connect to the proxyy in the first place. You can limit the effectiveness of

these tricks byy blocking or restricting the use of Flash and JavaScript in

yyour browser. But the best wayy to prevent JavaScript injection from

monitoring yyou via yyour browser is to use the HTTPS Everyywhere plug-in

(see here).

There are manyy commercial proxyy services. But be sure to read the

privacyy policyy of anyy service yyou sign up for. Payy attention to the wayy it

handles encryyption of data in motion and whether it complies with law

enforcement and government requests for information.

There are also some free proxies, but yyou must contend with a stream of

useless advertising in exchange for the use of the service. Myy advice is to

beware of free proxies. In his presentation at DEF CON 20, myy friend and

securityy expert Chema Alonso set up a proxyy as an experiment: he wanted

to attract bad guyys to the proxyy, so he advertised the IP address on

xroxyy.com. After a few dayys more than five thousand people were using his

free “anonyymous” proxyy. Unfortunatelyy most of them were using it to

conduct scams.

The flip side, though, is that Alonso could easilyy use the free proxyy to

push malware into the bad guyy’s browser and monitor his or her activities.

He did so using what’s called a BeEF hook, a browser exploitation

framework. He also used an end user license agreement (EULA) that people

had to accept to allow him to do it. That’s how he was able to read the e-

mails being sent through the proxyy and determine that it was handling

traffic related to criminal activityy. The moral here is that when something’s

free, yyou get what yyou payy for.

If yyou use a proxyy with https protocol, a law enforcement or government

agencyy would onlyy see the proxyy’s IP address, not the activities on the

websites yyou visit—that information would be encryypted. As I mentioned,

normal http Internet traffic is not encryypted; therefore yyou must also use

HTTPS Everyywhere (yyes, this is myy answer to most browser invisibilityy

woes).

For the sake of convenience, people often syynchronize their browser

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!