• 0 Posts
  • 84 Comments
Joined 6 months ago
cake
Cake day: December 30th, 2023

help-circle













  • You might start googling things like “OSINT handbook” or “OPSEC guide” and see what people put together to protect yourself from data-mining, fingerprinting, and various other ways to protect your personal information.

    Open Source Intelligence (OSINT) is the practice of using freely-available resources to collect information on something/somebody. Learning about the tools used to perform OSINT searches is a good first step to determine which databases you may want to scrub yourself from.

    Operations Security (OPSEC) is a military term that involves the security and protection of any data – classified or unclassified – that could potentially be used against you. OPSEC sounds exactly what you’re looking for, but I mention both terms because looking at potential attacks from both a red team (attacker) and blue team (defender) is a good practice to make sure you’re not missing any vulnerabilities (in other words, even if your only goal is defense, it is beneficial to think like an attacker and visualize how you would attack yourself).

    One such result of a search shows John Troony’s Opsec for the Paranoid gist.

    Some example of people-finder sites like LexisNexus from his document would be:

    ## People-Finder Sites
    
    - 	BeenVerified: http://www.beenverified.com/
    - 	DOBSearch: https://www.dobsearch.com/
    - 	Intelius: http://www.intelius.com/
    - 	LexisNexis: http://www.lexisnexis.com/en-us/products/public-records​.page
    - 	Spokeo: http://www.spokeo.com/WhitePages: http://www.whitepages.com/
    - 	WhitePages: http://www.whitepages.com/
    

    But the nearby sections in that document may be of use to you, like “Opt out of Data Mining”.

    OSINT/OPSEC is a giant rabbit hole you can go down, and you can get as paranoid as you want – scrubbing social media sites or poisoning the well of sites that collect data indiscriminately and don’t let you remove it, all the way to the ultra-paranoid burner phones and entire false identities (as long as you hopefully stay within the bounds of what is legal in your country or at least keep your laws in mind when you do step outside of the law). If you are interested in stuff like that, you might start looking at things like The Hitchhiker’s Guide to Online Anonymity.


  • The POSIX standard is more portable. If you are writing scripts for your system, you can use the full features in the main man pages. If you are writing code that you want to run on other Linux systems, maybe with reduced feature sets like a tiny embedded computer or alternates to gnu tools like alpine linux, or even other unixes like the BSDs, you will have a better time if you limit yourself to POSIX-compatible features and options – any POSIX-compatible Unix-like implementation should be able to run POSIX-compliant code.

    This is also why many shell scripts will call #!/bin/sh instead of #!/bin/bash – sh is more likely to be available on tinier systems than bash.

    If you are just writing scripts and commands for your own purposes, or you know they will only be used on full-feature distributions, it’s often simpler and more comfortable to use all of the advanced features available on your system.