[hemmerling] Data Privacy - Encryption, Passwords, Trust

Related pages:

My personal Involvement

PGP Certificate

  • My first PGP certificate is of 1998-03-16, created with “PGPfreeware 5.0i” :-).

E-Mail Account Hacking & Implementation of Filter Rules to Forward all E-Mails to the Hacker

  • On March 15, 2023, my email account was hacked and the hacker created 2 filter rules :-(:
    1. Email priority is “normal” ⇒ Delete email immediately
    2. All new emails ⇒ Forward email to the hacker's E-Mail @ gmx.com.
  • Although I noticed that I had to reset my password on 2023-02-15, but that a hacker had logged in with the e-mail account password that was otherwise rarely used elsewhere, if at all, in order to simply create new filter rules, I had missed it. A new password wouldn't have changed anything :-(.
  • It wasn't until 2024-02-20 that I noticed that I only had new emails in the GMX spam folder, but no normal new emails, and that a test sending of emails to my account didn't result in this that they were in the normal email folder :-(.
  • So I just changed the password and deleted the filter rules :-).
  • I now noticed that I had also used the GMX password for (ex-eBay) Kleinanzeigen.de, and that Kleinanzeigen.de notified me of a change in the password by email on 2024-02-15. I was unable to reset my Kleinanzeigen.de password (?).

E-Mail & Password Leaks Database

Anonymous Surfing

Services

  • The free service Anonymouse - “Nur die VIP-Version von Anonymouse unterstützt verschlüsselte Verbindungen!” :-(.

Tools

  • Invisible Internet Project (I2P) - “The Invisible Internet Project (I2P) is a fully encrypted private network layer. It protects your activity and location”.
    • Download I2P for Windows.
      • “The default I2P installer requires Java to be installed” :-(.
      • “Easy Install Bundle For Windows (Beta). It is now possible to install all I2P components using a single package (No Java required)... This bundle can also be used to configure a Firefox Profile. It will not interfere with an existing I2P installation if one exists” :-).
  • Tor - “A free software and an open network that helps you defend against a form of network surveillance”-
    • “Tor Browser Bundle” for WinXP, Vista, Win7, Win8.
    • “Tor Expert Bundle” for Win98SE, W2k, WinXP, Vista, Win7, Win8.
      • C:\Documents and Settings\Administrator\Application Data\Tor” or C:\Documents and Settings\xxxxxx\Application Data\Tor” ( with “xxxxxx” = username ) respectively is the configuration directory.
    • The discontinued CHIP Online "Torbutton 1.4.6.3", just for legacy Firefox browsers :-).

Cookies

  • Aquamathe - Sample website with popup window “Die EU-Richtlinie 2009/136/EG (E-Privacy) regelt die Verwendung von Cookies. Durch die Nutzung dieser Website erklären Sie sich mit der Speicherung und dem Zugriff von Cookies auf Ihr Gerät einverstanden”.

Browser Plugins for Privacy

Plugins

Resources

Encryption

Tools

Keyservers used by OpenPGP

  1. pool.sks-keyservers.net → “pool.sks-keyservers.net”.
  2. subkeys.pgp.net → “subkeys.pgp.net”.
  3. sks.mit.edu → “sks.mit.edu”.

Resources

Authentication ( Username & Password )

Personal Unblocking Code ( PUC ) / Personal Unblocking Key ( PUK ) / SuperPIN vs. Personal Identification Number ( PIN )

Windows Password Recovery Tools

  • The OpenSource SourceForge "Ophcrack", SourceForge "Ophcrack". The software is booted from a CD/DVD.
    • I run it successfully on a WinXP PC with Pentium-1, 256 MB RAM, IDE harddisk, IDE CD-ROM, by selecting the configuration “Ophcrack Graphics Mode - low RAM” :-).
    • *Operation failed on a WinXP PC with Pentium-1, 128 MB RAM, by the error message: “Unpacking initramfs. . . <0> Kernel panic - no syncing: Out of memory and no killable processes”
  • The OpenSource PC Login Now. The software is booted from a CD/DVD.
    • Operation failed on a WinXP PC with Pentium-1, 256 MB RAM, by the error message: “Kernel panic - no syncing: Attempted to kill init!”
  • The commercial Kon-Boot & the outdated free Kon-Boot V2.0. Operation failed on a german WinXP PC with Pentium-1, 256 MB RAM, IDE harddisk, IDE CD-ROM, by the german WinXP error message:

Windows NT hat nicht genügend Erweiterungsspeicher gefunden. Zur Ausführung von Windows NT werden 7 MB Erweiterungsspeicher benötigt. Sie müssen evtl. Ihren Computer aufrüsten oder ein Konfigurationsprogramm des Herstellers ausführen.
Speichertabelle
00000000 - 0008E00

  • The OpenSource Offline NT Password & Registry Editor. The software is booted from a CD/DVD or a floppy disk. Operation failed on a WinXP PC with Pentium-1, 256 MB RAM, IDE harddisk, IDE CD-ROM by the error message: “Boot failed: please change disks and press a key to continue”.

Fast IDentity Online ( FIDO2 ) / Passkey / WebAuthn

SSH

Tools

  • SourceForge "OpenSSH for Windows", SourceForge "OpenSSH for Windows" - “Before starting the OpenSSH service you MUST edit the C:\Program Files (x86)\OpenSSH\etc\passwd file. If you don't do this, you will not be able to log in through the SSH server. Please read the readme.txt or quickstart.txt file for information regarding proper setup of the passwd file”.

Password Phrase

Resources

Trust Services

Free Trust Services

Commercial Trust Services

Special Services which check the "Trust" of E-Mail Servers

      • Sorry, your email was blocked. We are sorry you have reached this page because an email was blocked based on its originating IP address having a “poor” reputation. The “poor” reputation may have been caused by one of the following reasons:
        • Your email server contains a virus and has been sending out spam.
        • Your email server may be misconfigured.
        • Your PC may be infected with a virus or botnet software program.
        • Someone in your organization may have a PC infected with a virus or botnet program.
        • You may be utilizing a dynamic IP address which was previously utilized by a known spammer.
        • Your marketing department may be sending out bulk emails that do not comply with the CAN-SPAM Act.
        • You may have an insecure wireless network which is allowing unknown users to use your network to send spam.
        • In some rare cases, your recipient's Barracuda Spam Firewall may be misconfigured.

Zero Trust Security

  • Expert told me in 2024-03:
    • “Zero-trust network access” ( ZTNA ) and “Security Service Edge” ( SSE ) are the successors of VPN.
    • Problems but which can be solved: Server-initiated traffic, as standard with voice-over-IP telephony & video calls: A user connect to a server, but the server initiates it's own connection back to the client(s).
      • Example with a SIP phone call: A user asks the server to connect to another user, but the server itself initiates a data stream between both users.

Literature

Resources

Datenschutzverordnung

Data Privacy

Encryption

EU-US Privacy Shield ( 2016-07-12 - )

Passwords

Forums, Newsgroups

Appropriate OpenDirectory Directory Pages

 
en/dataprivacy.html.txt · Last modified: 2024/04/19 10:52 (external edit) · []
Recent changes RSS feed Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki