{"id":2688,"date":"2024-11-26T19:18:54","date_gmt":"2024-11-27T00:18:54","guid":{"rendered":"http:\/\/sudlatnid.com\/?p=2688"},"modified":"2024-11-27T20:30:22","modified_gmt":"2024-11-28T01:30:22","slug":"diy-for-a-spy-cybersecurity-techniques-for-the-secret-agent","status":"publish","type":"post","link":"https:\/\/www.sudlatnid.com\/?p=2688","title":{"rendered":"DIY for a Spy: Cybersecurity Techniques for the Secret Agent"},"content":{"rendered":"<p id=\"85ba\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">Follow these simple steps to shield your privacy with a few essential tricks from the\u00a0<strong class=\"mc fv\">White Hats<\/strong>\u00a0and experts in Information Security.<\/p>\n<figure class=\"nb nc nd ne nf ng my mz paragraph-image\">\n<div class=\"nh ni ee nj bh nk\" tabindex=\"0\" role=\"button\">\n<div class=\"my mz na\"><picture><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/format:webp\/1*zYmVoSGIB2ZaeZXvWSkTXw.png 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/format:webp\/1*zYmVoSGIB2ZaeZXvWSkTXw.png 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/format:webp\/1*zYmVoSGIB2ZaeZXvWSkTXw.png 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/format:webp\/1*zYmVoSGIB2ZaeZXvWSkTXw.png 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/format:webp\/1*zYmVoSGIB2ZaeZXvWSkTXw.png 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/format:webp\/1*zYmVoSGIB2ZaeZXvWSkTXw.png 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/format:webp\/1*zYmVoSGIB2ZaeZXvWSkTXw.png 1400w\" type=\"image\/webp\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\" \/><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/1*zYmVoSGIB2ZaeZXvWSkTXw.png 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/1*zYmVoSGIB2ZaeZXvWSkTXw.png 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/1*zYmVoSGIB2ZaeZXvWSkTXw.png 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/1*zYmVoSGIB2ZaeZXvWSkTXw.png 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/1*zYmVoSGIB2ZaeZXvWSkTXw.png 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/1*zYmVoSGIB2ZaeZXvWSkTXw.png 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/1*zYmVoSGIB2ZaeZXvWSkTXw.png 1400w\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\" data-testid=\"og\" \/><img loading=\"lazy\" decoding=\"async\" class=\"bh li nl c\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/v2\/resize:fit:700\/1*zYmVoSGIB2ZaeZXvWSkTXw.png\" alt=\"\" width=\"700\" height=\"394\" \/><\/picture><\/div>\n<\/div><figcaption class=\"nm nn no my mz np nq bf b bg z dx\" data-selectable-paragraph=\"\"><a class=\"af nr\" href=\"https:\/\/labs.fedoraproject.org\/security\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">Fedora Security Lab<\/a>\u00a0distributive with a few simple tricks<\/figcaption><\/figure>\n<p id=\"a9c3\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">You are here, and I assume you have likely already read one of my previous articles,\u00a0<a class=\"af nr\" href=\"https:\/\/medium.com\/@dmytrosazonov\/no-such-agency-and-the-machine-adb66c1a557d\" rel=\"noopener\">\u2018No Such Agency\u2019 and \u2018The Machine\u2019<\/a>, where I explained the components of the\u00a0<strong class=\"mc fv\">global surveillance complex<\/strong>\u00a0known as\u00a0<strong class=\"mc fv\"><em class=\"ns\">The Machine<\/em><\/strong>. In subsequent articles, I delved into the simple approaches which can be used to create your own surveillance features for your private missions without constructing a complex infrastructure. I believe you have already tried them, at least out of curiosity.<\/p>\n<p id=\"96e4\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">In this article, I will guide you through the simple techniques to help you protect your computer during your most critical missions,\u00a0<em class=\"ns\">akin to those of a secret agent<\/em>, when\u00a0<em class=\"ns\">privacy<\/em>\u00a0is not just a word but a crucial necessity that can even save the life and keep you out of problems.<\/p>\n<h2 id=\"c7fc\" class=\"nt nu fu bf nv nw nx ny nz oa ob oc od ml oe of og mp oh oi oj mt ok ol om on bk\" data-selectable-paragraph=\"\">Why might you need a shield?<\/h2>\n<p id=\"b07c\" class=\"pw-post-body-paragraph ma mb fu mc b md oo mf mg mh op mj mk ml oq mn mo mp or mr ms mt os mv mw mx fn bk\" data-selectable-paragraph=\"\">The majority of techniques and tools available for\u00a0<a class=\"af nr\" href=\"https:\/\/medium.com\/@dmytrosazonov\/diy-for-a-spy-detecting-rule-breakers-with-face-recognition-ai-and-raspberry-pi-117424c48793\" rel=\"noopener\">surveillance on individuals in the office<\/a>,\u00a0<a class=\"af nr\" href=\"https:\/\/medium.com\/@dmytrosazonov\/diy-for-a-spy-uncovering-threats-in-nypd-conversations-with-openai-whisper-and-nltk-4f2607c64329\" rel=\"noopener\">police<\/a>,\u00a0<a class=\"af nr\" href=\"https:\/\/medium.com\/@dmytrosazonov\/diy-for-a-spy-uncovering-threats-in-nypd-conversations-with-openai-whisper-and-nltk-4f2607c64329\" rel=\"noopener\">emergency services<\/a>, or\u00a0<a class=\"af nr\" href=\"https:\/\/medium.com\/@dmytrosazonov\/diy-for-a-spy-real-time-aircraft-monitoring-without-ads-b-receiver-a6b7fa96253d\" rel=\"noopener\">even aircraft monitoring<\/a>\u00a0are entirely legal and require no additional permits.\u00a0<em class=\"ns\">However, there are situations where you may need to operate outside of legal boundaries abroad on behalf of your government or such federal contractor, or even for military purposes against your country\u2019s enemies<\/em>. In such cases, obtaining enhanced privacy and protection for the computer environment becomes crucial for your mission. It is essential to protect both yourself and the environment you operate in from the potential penetration and hacking.<\/p>\n<blockquote class=\"ot ou ov\">\n<p id=\"8790\" class=\"ma mb ns mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">Try to avoid violating the law while using these approaches, which\u00a0<strong class=\"mc fv\">have a dual nature<\/strong>\u00a0and can be employed on both sides:\u00a0<strong class=\"mc fv\">White and Black<\/strong>.<\/p>\n<\/blockquote>\n<p id=\"0f0b\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">In some cases, when you serve as a\u00a0<em class=\"ns\">lawyer for individuals involved in criminal<\/em>, shielding communications between you and your clients also becomes important and builds a defensive barrier from \u2018<em class=\"ns\">The<\/em>\u00a0<em class=\"ns\">Machine\u2019<\/em>.<\/p>\n<p id=\"0191\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\"><mark class=\"um un ao\">There are numerous other cases I could list, however, avoiding surveillance is not a simple task, and here is why.<\/mark><\/p>\n<h2 id=\"896b\" class=\"nt nu fu bf nv nw nx ny nz oa ob oc od ml oe of og mp oh oi oj mt ok ol om on bk\" data-selectable-paragraph=\"\">General note<\/h2>\n<p id=\"138e\" class=\"pw-post-body-paragraph ma mb fu mc b md oo mf mg mh op mj mk ml oq mn mo mp or mr ms mt os mv mw mx fn bk\" data-selectable-paragraph=\"\">The issue lies in the digital trail that devices create while operating and communicating with each other, even unintentionally. Every online action you undertake leaves a digital footprint, typically stored as data on the servers of your internet or service provider. This data can then be analyzed to understand user behavior and preferences.<\/p>\n<p id=\"007a\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">However, such a trail can compromise your security. As we\u2019ve learned from previous articles, systems like \u2018<em class=\"ns\">The Machine<\/em>\u2019 operate using a term called a\u00a0<strong class=\"mc fv\">Selector<\/strong>, which can search under various criteria, including all aspects of individual activities\/actions.<\/p>\n<p id=\"7727\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">For example: if a device with a certain MAC address was registered on a router or in the logs of an internet provider at a particular location, and later this device was implicated in criminal activities, the system could trace its trail based on the digital footprint. In many cases, it\u2019s not even necessary for the MAC address to appear in both locations. Simply having that device logged into such a router with another one that leads to your actual location can make it easy for the system to track you.<\/p>\n<p id=\"db28\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">It means that even if both your secured computer and your cell phone are connected to the same internet router at your home, your privacy and actual location could be compromised thereafter.<\/p>\n<p id=\"1840\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">The most effective way to evade tracking is operating from the designated location(s), or each time in a new one, for your special missions, ensuring that\u00a0<strong class=\"mc fv\">devices from your civilian life remain unconnected (switched off) in the dedicated network<\/strong>. Furthermore, avoid to connect your secured computer to your home network and let\u2019s explore the list of simple tricks I call the\u00a0<em class=\"ns\">Enhanced Security Module<\/em>, designed to shield your special warrior computer.<\/p>\n<p id=\"05f7\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">Also, I want to emphasize that you might need to implement all of these techniques just if you want to totally avoid tracking. However, employing any of these tricks individually will also boost privacy on any computer.<\/p>\n<h2 id=\"f733\" class=\"nt nu fu bf nv nw nx ny nz oa ob oc od ml oe of og mp oh oi oj mt ok ol om on bk\" data-selectable-paragraph=\"\">Warrior\u2019s Workstation<\/h2>\n<p id=\"ac0f\" class=\"pw-post-body-paragraph ma mb fu mc b md oo mf mg mh op mj mk ml oq mn mo mp or mr ms mt os mv mw mx fn bk\" data-selectable-paragraph=\"\">Let\u2019s think as a guy who wants to\u00a0<strong class=\"mc fv\">get hidden from the matrix<\/strong>, in our case from \u2018<em class=\"ns\">The Machine<\/em>\u2019 which is ubiquitous.<\/p>\n<blockquote class=\"ot ou ov\">\n<p id=\"a018\" class=\"ma mb ns mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">Unfortunately, no one can be told what the Matrix is. You have to see it for yourself. This is your last chance. After this, there is no turning back. You take the blue pill \u2014 the story ends, you wake up in your bed and believe whatever you want to believe. You take the red pill \u2014 you stay in Wonderland and I show you how deep the rabbit-hole goes.\u201d<\/p>\n<p id=\"435f\" class=\"ma mb ns mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">Morpheus, from \u2018The Matrix\u2019 film.<\/p>\n<\/blockquote>\n<p id=\"b931\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">Initially, when you\u2019ve just bought your computer, ensure to make the purchase with cash, avoiding credit cards or electronic payments.\u00a0<em class=\"ns\">Upon powering it on for the first time<\/em>, it\u2019s crucial to make adjustments in the BIOS to prevent making electronic trail. You will need to\u00a0<em class=\"ns\">deactivate internal components such as Bluetooth, Wi-Fi, LAN, and the video camera<\/em>, as illustrated on the picture below.<\/p>\n<figure class=\"nb nc nd ne nf ng my mz paragraph-image\">\n<div class=\"nh ni ee nj bh nk\" tabindex=\"0\" role=\"button\">\n<div class=\"my mz ow\"><picture><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/format:webp\/1*YV934RqgajXmiBm3rMvQyQ.png 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/format:webp\/1*YV934RqgajXmiBm3rMvQyQ.png 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/format:webp\/1*YV934RqgajXmiBm3rMvQyQ.png 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/format:webp\/1*YV934RqgajXmiBm3rMvQyQ.png 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/format:webp\/1*YV934RqgajXmiBm3rMvQyQ.png 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/format:webp\/1*YV934RqgajXmiBm3rMvQyQ.png 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/format:webp\/1*YV934RqgajXmiBm3rMvQyQ.png 1400w\" type=\"image\/webp\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\" \/><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/1*YV934RqgajXmiBm3rMvQyQ.png 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/1*YV934RqgajXmiBm3rMvQyQ.png 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/1*YV934RqgajXmiBm3rMvQyQ.png 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/1*YV934RqgajXmiBm3rMvQyQ.png 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/1*YV934RqgajXmiBm3rMvQyQ.png 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/1*YV934RqgajXmiBm3rMvQyQ.png 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/1*YV934RqgajXmiBm3rMvQyQ.png 1400w\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\" data-testid=\"og\" \/><img loading=\"lazy\" decoding=\"async\" class=\"bh li nl c\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/v2\/resize:fit:700\/1*YV934RqgajXmiBm3rMvQyQ.png\" alt=\"\" width=\"700\" height=\"359\" \/><\/picture><\/div>\n<\/div><figcaption class=\"nm nn no my mz np nq bf b bg z dx\" data-selectable-paragraph=\"\">BIOS changes in Buit-in Device Configuration<\/figcaption><\/figure>\n<p id=\"7c31\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">We will refrain from using these components. However, for establishing an internet connection, we will utilize a USB Wi-Fi device such as\u00a0<a class=\"af nr\" href=\"https:\/\/www.tp-link.com\/en\/home-networking\/adapter\/tl-wn823n\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">TP-LINK TL-WN823N<\/a>\u00a0and dispose it by burning if it\u2019s suspected of being tracked during the certain mission.<\/p>\n<p id=\"1df7\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">Firstly, install the operating system (<a class=\"af nr\" href=\"https:\/\/labs.fedoraproject.org\/en\/security\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">Fedora Security Lab<\/a>), using for instance, your micro SD card, prepared for installation with\u00a0<em class=\"ns\">Fedora Media Writer<\/em>. Then, you will configure our<strong class=\"mc fv\">\u00a0software tricks<\/strong>\u00a0to prevent tracking before initiating the Wi-Fi connection for the first time.<\/p>\n<p id=\"9909\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">Let\u2019s begin.<\/p>\n<h2 id=\"21cf\" class=\"nt nu fu bf nv nw nx ny nz oa ob oc od ml oe of og mp oh oi oj mt ok ol om on bk\" data-selectable-paragraph=\"\">Hide your MAC address<\/h2>\n<p id=\"0031\" class=\"pw-post-body-paragraph ma mb fu mc b md oo mf mg mh op mj mk ml oq mn mo mp or mr ms mt os mv mw mx fn bk\" data-selectable-paragraph=\"\">The\u00a0<em class=\"ns\">MAC address<\/em>\u00a0is a unique identifier assigned to all network interfaces. Since the MAC address is unique to each device, it can be used to track the device\u2019s movements and activities across different networks. We enhance our privacy by spoofing the actual MAC address.<\/p>\n<p id=\"32f0\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">To accomplish this, we will utilize the\u00a0<em class=\"ns\">systemd service<\/em>\u00a0on Linux. Go to the directory\u00a0<code class=\"cx ox oy oz pa b\">\/etc\/systemd\/system<\/code>\u00a0and proceed to create two files:\u00a0<code class=\"cx ox oy oz pa b\">hide_mac.sh<\/code>\u00a0and\u00a0<code class=\"cx ox oy oz pa b\">hide_mac.service<\/code>, as outlined below.<\/p>\n<p id=\"d7a9\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">The\u00a0<code class=\"cx ox oy oz pa b\">hide_mac.sh<\/code>\u00a0script utilizes the\u00a0<em class=\"ns\">macchanger<\/em>\u00a0program to update the MAC address with a new one. You can specify any desired MAC address within the\u00a0<code class=\"cx ox oy oz pa b\">mac_new\u00a0<\/code>variable.<\/p>\n<pre class=\"nb nc nd ne nf pb pa pc bp pd bb bk\"><span id=\"3074\" class=\"pe nu fu pa b bg pf pg l ph pi\" data-selectable-paragraph=\"\"><span class=\"hljs-meta\">#!\/bin\/bash<\/span>\r\n\r\nmac_new=<span class=\"hljs-string\">\"d0:57:7b:11:39:c2\"<\/span>\r\nnet_interface=<span class=\"hljs-string\">\"wlp2s0f3u2\"<\/span>\r\n\r\nsudo macchanger --mac=<span class=\"hljs-variable\">$mac_new<\/span> <span class=\"hljs-variable\">$net_interface<\/span><\/span><\/pre>\n<p id=\"7158\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">Don\u2019t forget to update the variable\u00a0<code class=\"cx ox oy oz pa b\">net_interface<\/code>\u00a0with the actual name of your Wi-Fi USB module, which you can find using the \u2018<em class=\"ns\">ifconfig<\/em>\u2019 command.<\/p>\n<p id=\"e715\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">The file\u00a0<code class=\"cx ox oy oz pa b\">hide_mac.service<\/code>\u00a0provides a declarative description of the service and should be placed in the same folder without any modifications.<\/p>\n<pre class=\"nb nc nd ne nf pb pa pc bp pd bb bk\"><span id=\"778c\" class=\"pe nu fu pa b bg pf pg l ph pi\" data-selectable-paragraph=\"\">[Unit]\r\nDescription=Hide MAC\r\n\r\n[Service]\r\nType=oneshot\r\nExecStart=\/etc\/systemd\/system\/hide_mac.sh\r\n\r\n[Install]\r\nWantedBy=multi-user.target<\/span><\/pre>\n<p id=\"1c6b\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">After you have finished creating these files, you have to execute the following commands in the\u00a0<em class=\"ns\">Linux console<\/em>.<\/p>\n<pre class=\"nb nc nd ne nf pb pa pc bp pd bb bk\"><span id=\"87ed\" class=\"pe nu fu pa b bg pf pg l ph pi\" data-selectable-paragraph=\"\">sudo systemctl <span class=\"hljs-built_in\">enable<\/span> hide_mac.service\r\nreboot<\/span><\/pre>\n<p id=\"d83f\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">After doing so, you should be able to see the\u00a0<em class=\"ns\">updated MAC address (d0:57:7b:11:39:c2)\u00a0<\/em>for your\u00a0<em class=\"ns\">network interface (wlp2s0f3u2)\u00a0<\/em>in \u2018<em class=\"ns\">ifconfig<\/em>\u2019, as shown on the screenshot bellow.<\/p>\n<figure class=\"nb nc nd ne nf ng my mz paragraph-image\">\n<div class=\"nh ni ee nj bh nk\" tabindex=\"0\" role=\"button\">\n<div class=\"my mz pj\"><picture><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/format:webp\/1*L5qdvuh5MAlL1BtRS1CElA.png 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/format:webp\/1*L5qdvuh5MAlL1BtRS1CElA.png 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/format:webp\/1*L5qdvuh5MAlL1BtRS1CElA.png 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/format:webp\/1*L5qdvuh5MAlL1BtRS1CElA.png 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/format:webp\/1*L5qdvuh5MAlL1BtRS1CElA.png 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/format:webp\/1*L5qdvuh5MAlL1BtRS1CElA.png 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/format:webp\/1*L5qdvuh5MAlL1BtRS1CElA.png 1400w\" type=\"image\/webp\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\" \/><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/1*L5qdvuh5MAlL1BtRS1CElA.png 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/1*L5qdvuh5MAlL1BtRS1CElA.png 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/1*L5qdvuh5MAlL1BtRS1CElA.png 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/1*L5qdvuh5MAlL1BtRS1CElA.png 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/1*L5qdvuh5MAlL1BtRS1CElA.png 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/1*L5qdvuh5MAlL1BtRS1CElA.png 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/1*L5qdvuh5MAlL1BtRS1CElA.png 1400w\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\" data-testid=\"og\" \/><img loading=\"lazy\" decoding=\"async\" class=\"bh li nl c\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/v2\/resize:fit:700\/1*L5qdvuh5MAlL1BtRS1CElA.png\" alt=\"\" width=\"700\" height=\"521\" \/><\/picture><\/div>\n<\/div><figcaption class=\"nm nn no my mz np nq bf b bg z dx\" data-selectable-paragraph=\"\">d0:57:7b:11:39:c2 as a\u00a0<strong class=\"bf nv\">new MAC address<\/strong>\u00a0for interface wlp2s0f3u2<\/figcaption><\/figure>\n<p id=\"826f\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">According to the service description in the file\u00a0<code class=\"cx ox oy oz pa b\">hide_mac.service<\/code>, changing the MAC address should occur each time the user\u00a0<em class=\"ns\">powers on the computer<\/em>. This is level zero in enhancing your security.<\/p>\n<p id=\"2017\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">Did you know that on an\u00a0<em class=\"ns\">iPhone<\/em>, the\u00a0<em class=\"ns\">actual MAC address<\/em>\u00a0is hidden by default? When the device connects to the Wi-Fi network, iOS generates a\u00a0<em class=\"ns\">random MAC address<\/em>, known as a\u00a0<strong class=\"mc fv\"><em class=\"ns\">private address<\/em><\/strong>, for each Wi-Fi network the device connects to. It appears that\u00a0<em class=\"ns\">iPhones<\/em>\u00a0are on the right side for enhancing the privacy and security of its customers.<\/p>\n<h2 id=\"b1a8\" class=\"nt nu fu bf nv nw nx ny nz oa ob oc od ml oe of og mp oh oi oj mt ok ol om on bk\" data-selectable-paragraph=\"\">Hide your DNS location<\/h2>\n<p id=\"d4bf\" class=\"pw-post-body-paragraph ma mb fu mc b md oo mf mg mh op mj mk ml oq mn mo mp or mr ms mt os mv mw mx fn bk\" data-selectable-paragraph=\"\">Hiding your DNS location is crucial for shielding your privacy. Avoid using your service provider\u2019s DNS servers, as they can potentially lead to DNS leaks. Instead, always configure your own list of DNS servers. By doing so, you prevent anyone from determining your provider\u2019s location and consequently, your own address.<\/p>\n<p id=\"85d9\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">To setup this, we will use the same as in the previous step\u00a0<em class=\"ns\">systemd service<\/em>\u00a0on Linux. Go again to the directory\u00a0<code class=\"cx ox oy oz pa b\">\/etc\/systemd\/system<\/code>\u00a0and proceed to create three files:\u00a0<code class=\"cx ox oy oz pa b\">hide_location.sh<\/code>,\u00a0<code class=\"cx ox oy oz pa b\">hide_location.service<\/code>and\u00a0<code class=\"cx ox oy oz pa b\">hide_location.timer<\/code>, as shown below.<\/p>\n<pre class=\"nb nc nd ne nf pb pa pc bp pd bb bk\"><span id=\"71c0\" class=\"pe nu fu pa b bg pf pg l ph pi\" data-selectable-paragraph=\"\"><span class=\"hljs-meta\">#!\/bin\/bash<\/span>\r\n\r\ndns_default=<span class=\"hljs-string\">\"192.168.0.1\"<\/span>\r\ndns_opendns=<span class=\"hljs-string\">\"208.67.222.222 208.67.220.220\"<\/span>\r\nnet_interface=<span class=\"hljs-string\">\"wlp2s0f3u2\"<\/span>\r\n\r\n<span class=\"hljs-keyword\">if<\/span> sudo resolvectl status | grep -q <span class=\"hljs-variable\">$dns_default<\/span>; <span class=\"hljs-keyword\">then<\/span>\r\n    sudo resolvectl dns <span class=\"hljs-variable\">$net_interface<\/span> <span class=\"hljs-variable\">$dns_opendns<\/span>\r\n<span class=\"hljs-keyword\">fi<\/span><\/span><\/pre>\n<p id=\"0c8f\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">As you may see in the listing above, the script checks if the\u00a0<em class=\"ns\">default DNS server<\/em>\u00a0is set up to your router\u2019s and in this case changes it to the list of\u00a0<em class=\"ns\">OpenDNS servers<\/em>, which are more secure.<\/p>\n<p id=\"4e6f\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">The file\u00a0<code class=\"cx ox oy oz pa b\">hide_location.service<\/code>\u00a0simply defines the service.<\/p>\n<pre class=\"nb nc nd ne nf pb pa pc bp pd bb bk\"><span id=\"8f72\" class=\"pe nu fu pa b bg pf pg l ph pi\" data-selectable-paragraph=\"\">[Unit]\r\nDescription=Hide location DNS\r\n\r\n[Service]\r\nType=oneshot\r\nExecStart=\/etc\/systemd\/system\/hide_location.sh<\/span><\/pre>\n<p id=\"1831\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">Besides of that, the file\u00a0<code class=\"cx ox oy oz pa b\">hide_location.timer<\/code>\u00a0specifies the conditions for launching the service. In our scenario, it triggers the service to start one minute after the computer boots up and then repeats every minute thereafter while you are using your workstation.<\/p>\n<p id=\"82c5\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">We may need it in case something goes wrong with your network interface and settings revert back to their initial state.<\/p>\n<pre class=\"nb nc nd ne nf pb pa pc bp pd bb bk\"><span id=\"abc8\" class=\"pe nu fu pa b bg pf pg l ph pi\" data-selectable-paragraph=\"\">[Unit]\r\nDescription=Hide location DNS timer\r\n\r\n[Timer]\r\nOnBootSec=1m\r\nOnUnitActiveSec=1m\r\nUnit=hide_location.service\r\n\r\n[Install]\r\nWantedBy=timers.target<\/span><\/pre>\n<p id=\"b525\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">After creating these three files, you need to initiate your timer by executing the following commands in the\u00a0<em class=\"ns\">Linux console<\/em>.<\/p>\n<pre class=\"nb nc nd ne nf pb pa pc bp pd bb bk\"><span id=\"0aa3\" class=\"pe nu fu pa b bg pf pg l ph pi\" data-selectable-paragraph=\"\">sudo systemctl <span class=\"hljs-built_in\">enable<\/span> hide_location.timer\r\nreboot<\/span><\/pre>\n<p id=\"ed6d\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">After rebooting, verify the changes by executing \u2018<em class=\"ns\">resolvectl status<\/em>\u2019 in the\u00a0<em class=\"ns\">Bash-terminal<\/em>\u00a0as shown on the picture below. If everything is ok, you will see that the\u00a0<em class=\"ns\">current DNS server<\/em>\u00a0matches one of the\u00a0<em class=\"ns\">OpenDNS servers<\/em>\u00a0<code class=\"cx ox oy oz pa b\">208.67.222.222<\/code>\u00a0instead of the default DNS\u00a0<code class=\"cx ox oy oz pa b\">192.168.0.1<\/code><\/p>\n<figure class=\"nb nc nd ne nf ng my mz paragraph-image\">\n<div class=\"nh ni ee nj bh nk\" tabindex=\"0\" role=\"button\">\n<div class=\"my mz pj\"><picture><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/format:webp\/1*NKrvdWFX2S0VOLDwu-NLvQ.png 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/format:webp\/1*NKrvdWFX2S0VOLDwu-NLvQ.png 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/format:webp\/1*NKrvdWFX2S0VOLDwu-NLvQ.png 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/format:webp\/1*NKrvdWFX2S0VOLDwu-NLvQ.png 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/format:webp\/1*NKrvdWFX2S0VOLDwu-NLvQ.png 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/format:webp\/1*NKrvdWFX2S0VOLDwu-NLvQ.png 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/format:webp\/1*NKrvdWFX2S0VOLDwu-NLvQ.png 1400w\" type=\"image\/webp\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\" \/><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/1*NKrvdWFX2S0VOLDwu-NLvQ.png 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/1*NKrvdWFX2S0VOLDwu-NLvQ.png 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/1*NKrvdWFX2S0VOLDwu-NLvQ.png 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/1*NKrvdWFX2S0VOLDwu-NLvQ.png 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/1*NKrvdWFX2S0VOLDwu-NLvQ.png 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/1*NKrvdWFX2S0VOLDwu-NLvQ.png 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/1*NKrvdWFX2S0VOLDwu-NLvQ.png 1400w\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\" data-testid=\"og\" \/><img loading=\"lazy\" decoding=\"async\" class=\"bh li nl c\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/v2\/resize:fit:700\/1*NKrvdWFX2S0VOLDwu-NLvQ.png\" alt=\"\" width=\"700\" height=\"521\" \/><\/picture><\/div>\n<\/div><figcaption class=\"nm nn no my mz np nq bf b bg z dx\" data-selectable-paragraph=\"\">DNS location is hidden and can\u2019t be determined in\u00a0<a class=\"af nr\" href=\"https:\/\/www.dnsleaktest.com\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">DNS Leak<\/a><\/figcaption><\/figure>\n<p id=\"7802\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">This is really cool and with this simple trick, you have just enhanced your privacy on the\u00a0<em class=\"ns\">warrior computer<\/em>. In fact, you are now prepared to conduct your\u00a0<strong class=\"mc fv\">DNS leak test<\/strong>. Simply navigate to the website\u00a0<a class=\"af nr\" href=\"https:\/\/www.dnsleaktest.com\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">dnsleaktest.com<\/a>\u00a0and follow check your DNS privacy by clicking on the \u2018<em class=\"ns\">Standard test<\/em>\u2019 option.<br \/>\nIt should lead to the foreign country, not to yours.<\/p>\n<p id=\"4938\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">But your IP is in trouble. Let\u2019s fix it now.<\/p>\n<h2 id=\"5bd7\" class=\"nt nu fu bf nv nw nx ny nz oa ob oc od ml oe of og mp oh oi oj mt ok ol om on bk\" data-selectable-paragraph=\"\">Use SSL-based OpenVPN<\/h2>\n<p id=\"91d9\" class=\"pw-post-body-paragraph ma mb fu mc b md oo mf mg mh op mj mk ml oq mn mo mp or mr ms mt os mv mw mx fn bk\" data-selectable-paragraph=\"\">As you are aware from the\u00a0<em class=\"ns\">DNS leak test<\/em>, we did in the previous chapter, your DNS is secure now. However, the same cannot be said for your actual\u00a0<em class=\"ns\">public IP address<\/em>, which is currently unsecured, as you have likely observed on the main page of the\u00a0<em class=\"ns\">DNS Leak Test website<\/em>.<\/p>\n<p id=\"3b12\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">Now, we are going to use a tunnel known as a VPN (Virtual Private Network). This creates a secure tunnel through which all your traffic passes. With this setup, nobody can determine your current location, and even your provider remains unaware of the destinations of the HTTP packages in your communications, as your traffic is encrypted.<\/p>\n<p id=\"d663\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">VPN over SSL (Secure Sockets Layer) works on port 443 which is used for HTTPS traffic and is encrypted using SSL\/TLS protocol. Using this configuration, VPN traffic can even bypass firewalls or other network restrictions that may be blocked by other VPN protocols.<\/p>\n<p id=\"b0c6\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">So that, we will use this third part as well adding\u00a0<em class=\"ns\">systemd service<\/em>\u00a0on Linux. As erlier, in the directory\u00a0<code class=\"cx ox oy oz pa b\">\/etc\/systemd\/system<\/code>\u00a0we have to create file\u00a0<code class=\"cx ox oy oz pa b\">open_vpn.sh<\/code>as shown below.<\/p>\n<pre class=\"nb nc nd ne nf pb pa pc bp pd bb bk\"><span id=\"80eb\" class=\"pe nu fu pa b bg pf pg l ph pi\" data-selectable-paragraph=\"\"><span class=\"hljs-meta\">#!\/bin\/bash<\/span>\r\n\r\nsystem_path=<span class=\"hljs-string\">\"\/etc\/systemd\/system\"<\/span>\r\n\r\nmac_address=<span class=\"hljs-string\">\"74:da:38:8b:a5:c2\"<\/span>\r\nping_server=<span class=\"hljs-string\">\"208.67.220.220\"<\/span>\r\ndns_default=<span class=\"hljs-string\">\"192.168.0.1\"<\/span>\r\n\r\n<span class=\"hljs-comment\"># Check if MAC is not hidden<\/span>\r\n<span class=\"hljs-keyword\">if<\/span> sudo ifconfig | grep -q <span class=\"hljs-variable\">$mac_address<\/span>; <span class=\"hljs-keyword\">then<\/span>\r\n    <span class=\"hljs-built_in\">exit<\/span> 1\r\n<span class=\"hljs-keyword\">fi<\/span>\r\n\r\n<span class=\"hljs-comment\"># Check ping to OpenDNS server<\/span>\r\n<span class=\"hljs-keyword\">if<\/span> ! sudo ping -c 4 <span class=\"hljs-variable\">$ping_server<\/span> &gt;\/dev\/null 2&gt;&amp;1; <span class=\"hljs-keyword\">then<\/span>\r\n    <span class=\"hljs-built_in\">exit<\/span> 1\r\n<span class=\"hljs-keyword\">fi<\/span>\r\n\r\n<span class=\"hljs-comment\"># Check if DNS is not secured<\/span>\r\n<span class=\"hljs-keyword\">if<\/span> sudo resolvectl status | grep -q <span class=\"hljs-variable\">$dns_default<\/span>; <span class=\"hljs-keyword\">then<\/span>\r\n    <span class=\"hljs-built_in\">exit<\/span> 1\r\n<span class=\"hljs-keyword\">fi<\/span>\r\n\r\n<span class=\"hljs-comment\"># Check if VPN connection is not established <\/span>\r\n<span class=\"hljs-keyword\">if<\/span> ! sudo ifconfig | grep -q <span class=\"hljs-string\">\"tun1\"<\/span>; <span class=\"hljs-keyword\">then<\/span>\r\n    vpn_config=$(<span class=\"hljs-built_in\">shuf<\/span> <span class=\"hljs-string\">\"<span class=\"hljs-variable\">$system_path<\/span>\/open_vpn.config\"<\/span> | <span class=\"hljs-built_in\">head<\/span> -n 1)\r\n    sudo openvpn --config <span class=\"hljs-string\">\"<span class=\"hljs-variable\">$system_path<\/span>\/<span class=\"hljs-variable\">$vpn_config<\/span>\"<\/span> --auth-user-pass <span class=\"hljs-string\">\"<span class=\"hljs-variable\">$system_path<\/span>\/vpnbook-password-tcp443.txt\"<\/span>\r\n<span class=\"hljs-keyword\">fi<\/span><\/span><\/pre>\n<p id=\"9e4a\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">As you may see from the listing above, initially, we verify whether the\u00a0<em class=\"ns\">MAC address<\/em>\u00a0has been hidden. Then, we confirm whether the\u00a0<em class=\"ns\">DNS leak<\/em>\u00a0has been resolved and the internet connection persists. After that, we examine if the\u00a0<em class=\"ns\">VPN tunnel (tun1)<\/em>\u00a0is not yet established. If it has not been established yet, we initiate the VPN connection by randomly selecting one of the\u00a0<em class=\"ns\">VPN configuration files<\/em>\u00a0listed in the\u00a0<code class=\"cx ox oy oz pa b\">open_vpn.config<\/code>\u00a0file.<\/p>\n<p id=\"fc90\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">The\u00a0<code class=\"cx ox oy oz pa b\">open_vpn.config<\/code>\u00a0file consist names for\u00a0<strong class=\"mc fv\">*.ovpn<\/strong>\u00a0files with OpenVPN settings as a plain text. In our case just a list of three files.<\/p>\n<p id=\"e21d\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">The files\u00a0<code class=\"cx ox oy oz pa b\">open_vpn.service<\/code>and\u00a0<code class=\"cx ox oy oz pa b\">open_vpn.timer<\/code>\u00a0share a similar structure to what we discussed in the previous trick with\u00a0<code class=\"cx ox oy oz pa b\">hide_location.timer<\/code>, and it is not necessary to explain that again.<\/p>\n<p id=\"91ee\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">However, I\u2019d like to describe a few another files available for download from the repository towards this article. The files\u00a0<code class=\"cx ox oy oz pa b\">vpnbook-de220-tcp443.ovpn<\/code>,\u00a0<code class=\"cx ox oy oz pa b\">vpnbook-fr231-tcp443.ovpn<\/code>, and\u00a0<code class=\"cx ox oy oz pa b\">vpnbook-uk68-tcp443.ovpn<\/code>\u00a0contain settings for the\u00a0<em class=\"ns\">OpenVPN program<\/em>. At the same time, the file\u00a0<code class=\"cx ox oy oz pa b\">vpnbook-password-tcp443.txt<\/code>includes the credentials for accessing the\u00a0<em class=\"ns\">VPN service<\/em>. I have downloaded all these files and credentials from the\u00a0<a class=\"af nr\" href=\"https:\/\/www.vpnbook.com\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">VPN Book<\/a>\u00a0website absolutely for free and you can do the same to update VPN settings to your own list, each time different.<\/p>\n<p id=\"3fde\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">As usually, after doing so, you need to initiate your VPN service timer by executing the following commands in the\u00a0<em class=\"ns\">Linux console<\/em>.<\/p>\n<pre class=\"nb nc nd ne nf pb pa pc bp pd bb bk\"><span id=\"8ef9\" class=\"pe nu fu pa b bg pf pg l ph pi\" data-selectable-paragraph=\"\">sudo systemctl <span class=\"hljs-built_in\">enable<\/span> open_vpn.timer\r\nreboot<\/span><\/pre>\n<p id=\"20dc\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">After rebooting, confirm the changes by running \u2018<em class=\"ns\">ifconfig<\/em>\u2019 command in the Bash terminal, as illustrated in the picture below. If everything is correct, you will see the presence of\u00a0<code class=\"cx ox oy oz pa b\">tun1<\/code>\u00a0in the list, indicating that the VPN connection is active.<\/p>\n<figure class=\"nb nc nd ne nf ng my mz paragraph-image\">\n<div class=\"nh ni ee nj bh nk\" tabindex=\"0\" role=\"button\">\n<div class=\"my mz pj\"><picture><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/format:webp\/1*tt-aFPzUH3CvL3pTQQ4ZeQ.png 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/format:webp\/1*tt-aFPzUH3CvL3pTQQ4ZeQ.png 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/format:webp\/1*tt-aFPzUH3CvL3pTQQ4ZeQ.png 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/format:webp\/1*tt-aFPzUH3CvL3pTQQ4ZeQ.png 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/format:webp\/1*tt-aFPzUH3CvL3pTQQ4ZeQ.png 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/format:webp\/1*tt-aFPzUH3CvL3pTQQ4ZeQ.png 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/format:webp\/1*tt-aFPzUH3CvL3pTQQ4ZeQ.png 1400w\" type=\"image\/webp\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\" \/><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/1*tt-aFPzUH3CvL3pTQQ4ZeQ.png 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/1*tt-aFPzUH3CvL3pTQQ4ZeQ.png 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/1*tt-aFPzUH3CvL3pTQQ4ZeQ.png 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/1*tt-aFPzUH3CvL3pTQQ4ZeQ.png 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/1*tt-aFPzUH3CvL3pTQQ4ZeQ.png 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/1*tt-aFPzUH3CvL3pTQQ4ZeQ.png 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/1*tt-aFPzUH3CvL3pTQQ4ZeQ.png 1400w\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\" data-testid=\"og\" \/><img loading=\"lazy\" decoding=\"async\" class=\"bh li nl c\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/v2\/resize:fit:700\/1*tt-aFPzUH3CvL3pTQQ4ZeQ.png\" alt=\"\" width=\"700\" height=\"521\" \/><\/picture><\/div>\n<\/div><figcaption class=\"nm nn no my mz np nq bf b bg z dx\" data-selectable-paragraph=\"\"><strong class=\"bf nv\">VPN (tun1)<\/strong>\u00a0is established<\/figcaption><\/figure>\n<p id=\"362d\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">Great, we have just finished the building of the third level of privacy on our warrior workstation, which is truly remarkable. However, what if, during the mission, something goes wrong, and some of the shields become compromised due to adversary actions, penetration, or active hacking?<\/p>\n<h2 id=\"8a60\" class=\"nt nu fu bf nv nw nx ny nz oa ob oc od ml oe of og mp oh oi oj mt ok ol om on bk\" data-selectable-paragraph=\"\">Establish your own Security Guard<\/h2>\n<p id=\"097e\" class=\"pw-post-body-paragraph ma mb fu mc b md oo mf mg mh op mj mk ml oq mn mo mp or mr ms mt os mv mw mx fn bk\" data-selectable-paragraph=\"\">As mentioned above, there is a possibility that the computer could be compromised during your mission. In such a scenario, it\u2019s crucial to be promptly alerted to mitigate the breach swiftly. To fix this issue, we will set up an additional\u00a0<em class=\"ns\">Linux service<\/em>\u00a0tasked with monitoring for breaches while you are working on the workstation.<\/p>\n<p id=\"fa7f\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">Let\u2019s continue, go to the directory\u00a0<code class=\"cx ox oy oz pa b\">\/etc\/systemd\/system<\/code>\u00a0as we did earlier and create there the following files.<\/p>\n<pre class=\"nb nc nd ne nf pb pa pc bp pd bb bk\"><span id=\"6445\" class=\"pe nu fu pa b bg pf pg l ph pi\" data-selectable-paragraph=\"\"><span class=\"hljs-meta\">#!\/bin\/bash<\/span>\r\n\r\nagent=<span class=\"hljs-string\">\"GUARD\"<\/span>\r\nmac_address=<span class=\"hljs-string\">\"74:da:38:8b:a5:c2\"<\/span>\r\nping_server=<span class=\"hljs-string\">\"208.67.220.220\"<\/span>\r\ndns_default=<span class=\"hljs-string\">\"192.168.0.1\"<\/span>\r\n\r\n<span class=\"hljs-function\"><span class=\"hljs-title\">send_message<\/span><\/span>()\r\n{\r\n   sudo -u under0 DISPLAY=:0 DBUS_SESSION_BUS_ADDRESS=unix:path=\/run\/user\/1000\/bus notify-send <span class=\"hljs-variable\">$agent<\/span> <span class=\"hljs-string\">\"<span class=\"hljs-variable\">$1<\/span>\"<\/span>\r\n}\r\n\r\n<span class=\"hljs-comment\"># Check if MAC is hidden<\/span>\r\n<span class=\"hljs-keyword\">if<\/span> sudo ifconfig | grep -q <span class=\"hljs-variable\">$mac_address<\/span>; <span class=\"hljs-keyword\">then<\/span>\r\n    send_message <span class=\"hljs-string\">\"MAC is not secured\"<\/span>\r\n<span class=\"hljs-keyword\">fi<\/span>\r\n\r\n<span class=\"hljs-comment\"># Check ping to OpenDNS server<\/span>\r\n<span class=\"hljs-keyword\">if<\/span> ! sudo ping -c 4 <span class=\"hljs-variable\">$ping_server<\/span> &gt;\/dev\/null 2&gt;&amp;1; <span class=\"hljs-keyword\">then<\/span>\r\n    send_message <span class=\"hljs-string\">\"Internet connection lost\"<\/span>\r\n<span class=\"hljs-keyword\">fi<\/span>\r\n\r\n<span class=\"hljs-comment\"># Check DNS<\/span>\r\n<span class=\"hljs-keyword\">if<\/span> sudo resolvectl status | grep -q <span class=\"hljs-variable\">$dns_default<\/span>; <span class=\"hljs-keyword\">then<\/span>\r\n    send_message <span class=\"hljs-string\">\"DNS is not secured\"<\/span>\r\n<span class=\"hljs-keyword\">fi<\/span>\r\n\r\n<span class=\"hljs-comment\"># Check if VPN connection is not established <\/span>\r\n<span class=\"hljs-keyword\">if<\/span> ! sudo ifconfig | grep -q <span class=\"hljs-string\">\"tun1\"<\/span>; <span class=\"hljs-keyword\">then<\/span>\r\n    send_message <span class=\"hljs-string\">\"VPN is not established\"<\/span>\r\n<span class=\"hljs-keyword\">fi<\/span><\/span><\/pre>\n<p id=\"69a7\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">Similar to the previous script, this one conducts checks on all aspects of security: whether the MAC address has been changed, whether the DNS leak has been resolved, whether the internet connection persists, and whether the VPN connection is established.<\/p>\n<p id=\"cdcb\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">If any of these conditions are not met, you will receive an\u00a0<em class=\"ns\">appropriate message<\/em>\u00a0in the top right corner of the desktop, as shown below.<\/p>\n<figure class=\"nb nc nd ne nf ng my mz paragraph-image\">\n<div class=\"nh ni ee nj bh nk\" tabindex=\"0\" role=\"button\">\n<div class=\"my mz na\"><picture><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/format:webp\/1*bsaH7fHzcpb4A7etNu49-g.png 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/format:webp\/1*bsaH7fHzcpb4A7etNu49-g.png 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/format:webp\/1*bsaH7fHzcpb4A7etNu49-g.png 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/format:webp\/1*bsaH7fHzcpb4A7etNu49-g.png 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/format:webp\/1*bsaH7fHzcpb4A7etNu49-g.png 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/format:webp\/1*bsaH7fHzcpb4A7etNu49-g.png 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/format:webp\/1*bsaH7fHzcpb4A7etNu49-g.png 1400w\" type=\"image\/webp\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\" \/><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/1*bsaH7fHzcpb4A7etNu49-g.png 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/1*bsaH7fHzcpb4A7etNu49-g.png 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/1*bsaH7fHzcpb4A7etNu49-g.png 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/1*bsaH7fHzcpb4A7etNu49-g.png 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/1*bsaH7fHzcpb4A7etNu49-g.png 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/1*bsaH7fHzcpb4A7etNu49-g.png 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/1*bsaH7fHzcpb4A7etNu49-g.png 1400w\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\" data-testid=\"og\" \/><img loading=\"lazy\" decoding=\"async\" class=\"bh li nl c\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/v2\/resize:fit:700\/1*bsaH7fHzcpb4A7etNu49-g.png\" alt=\"\" width=\"700\" height=\"394\" \/><\/picture><\/div>\n<\/div><figcaption class=\"nm nn no my mz np nq bf b bg z dx\" data-selectable-paragraph=\"\">Enhanced Security Guard is alerting you<\/figcaption><\/figure>\n<p id=\"97d6\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">Therefore, with this\u00a0<em class=\"ns\">Enhanced Security Guard<\/em>, which you can actually name as you prefer (place it in the variable\u00a0<code class=\"cx ox oy oz pa b\">agent<\/code>\u00a0when you have your idea), you are fully protected and shielded, as was intended.<\/p>\n<h2 id=\"4f41\" class=\"nt nu fu bf nv nw nx ny nz oa ob oc od ml oe of og mp oh oi oj mt ok ol om on bk\" data-selectable-paragraph=\"\">Fedora Linux Troubleshooting<\/h2>\n<p id=\"5176\" class=\"pw-post-body-paragraph ma mb fu mc b md oo mf mg mh op mj mk ml oq mn mo mp or mr ms mt os mv mw mx fn bk\" data-selectable-paragraph=\"\">In the latest\u00a0<em class=\"ns\">distributions of Linux<\/em>, you may encounter an issue where your services fail to function properly after being enabled. You can easily check the service status and health, as well as errors, by executing the following command\u00a0<code class=\"cx ox oy oz pa b\">sudo systemctl status hide_mac.service<\/code>.<\/p>\n<p id=\"f58c\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">In most cases, this issue arises from the\u00a0<em class=\"ns\">SELinux policy subsystem<\/em>. If you are the only user of the computer, you likely don\u2019t need this subsystem. Let\u2019s explore a hotfix for this problem.<\/p>\n<p id=\"58de\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">Go to\u00a0<em class=\"ns\">Bash-terminal<\/em>\u00a0and execute the following:<\/p>\n<pre class=\"nb nc nd ne nf pb pa pc bp pd bb bk\"><span id=\"277e\" class=\"pe nu fu pa b bg pf pg l ph pi\" data-selectable-paragraph=\"\">sudo nano \/etc\/selinux\/config\r\n\r\n<span class=\"hljs-comment\"># find the line that says SELINUX=enforcing and change it to SELINUX=disabled.<\/span>\r\n\r\n<span class=\"hljs-comment\"># save the modifications.<\/span>\r\n\r\nreboot<\/span><\/pre>\n<p id=\"a77a\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">After disabling\u00a0<code class=\"cx ox oy oz pa b\">SELINUX=disabled<\/code>, you will not encounter such problems, and your computer will be shielded and protected at the same time.<\/p>\n<h2 id=\"cacd\" class=\"nt nu fu bf nv nw nx ny nz oa ob oc od ml oe of og mp oh oi oj mt ok ol om on bk\" data-selectable-paragraph=\"\">What is next?<\/h2>\n<p id=\"2e99\" class=\"pw-post-body-paragraph ma mb fu mc b md oo mf mg mh op mj mk ml oq mn mo mp or mr ms mt os mv mw mx fn bk\" data-selectable-paragraph=\"\">The general tricks have been established across all the services we created above. However, I would like to offer a few additional recommendations to further enhance your privacy on any computer, regardless of whether you use these techniques or not.<\/p>\n<p id=\"d91a\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">Implementing these suggestions will boost your privacy. Take your time to at least learn about them:<\/p>\n<ul class=\"\">\n<li id=\"7383\" class=\"ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx pk pl pm bk\" data-selectable-paragraph=\"\"><a class=\"af nr\" href=\"https:\/\/duckduckgo.com\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><strong class=\"mc fv\">DuckDuckGo<\/strong><\/a>\u00a0is a search engine that does not track users\u2019 search history, nor does it profile users based on their search behavior.<\/li>\n<li id=\"abdc\" class=\"ma mb fu mc b md pn mf mg mh po mj mk ml pp mn mo mp pq mr ms mt pr mv mw mx pk pl pm bk\" data-selectable-paragraph=\"\">The\u00a0<a class=\"af nr\" href=\"https:\/\/www.torproject.org\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><strong class=\"mc fv\">Tor Browser<\/strong><\/a>\u00a0is a web browser specifically designed to conceal users\u2019 identities and browsing activities by routing internet traffic through a series of encrypted relays.<\/li>\n<li id=\"9754\" class=\"ma mb fu mc b md pn mf mg mh po mj mk ml pp mn mo mp pq mr ms mt pr mv mw mx pk pl pm bk\" data-selectable-paragraph=\"\"><strong class=\"mc fv\">Email encryption<\/strong>\u00a0can enhance the security of your communication, protecting it against eavesdropping and tampering. Even if intercepted, the encrypted email remains unreadable without the private key.<\/li>\n<li id=\"95d0\" class=\"ma mb fu mc b md pn mf mg mh po mj mk ml pp mn mo mp pq mr ms mt pr mv mw mx pk pl pm bk\" data-selectable-paragraph=\"\"><a class=\"af nr\" href=\"https:\/\/xmpp.org\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><strong class=\"mc fv\">XMPP<\/strong><\/a>\u00a0protocol involves using end-to-end encryption and secure authentication mechanisms to ensure that messages are transmitted securely and cannot be intercepted by unauthorized parties.<\/li>\n<\/ul>\n<p id=\"f104\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">In general, increasing your curiosity and exploring further options to shield your computer\u2019s privacy will help you protect yourself and what is more important your warrior missions.<\/p>\n<p id=\"6501\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">Remember to follow the law, at least in your country of residence, to avoid encountering in issues with law enforcement.<\/p>\n<h2 id=\"222c\" class=\"nt nu fu bf nv nw nx ny nz oa ob oc od ml oe of og mp oh oi oj mt ok ol om on bk\" data-selectable-paragraph=\"\">X-Files<\/h2>\n<p id=\"f6e2\" class=\"pw-post-body-paragraph ma mb fu mc b md oo mf mg mh op mj mk ml oq mn mo mp or mr ms mt os mv mw mx fn bk\" data-selectable-paragraph=\"\">I have uploaded all the scripts and\u00a0<em class=\"ns\">Linux-service<\/em>\u00a0declarations used in this article to the git repository.<\/p>\n<p id=\"b7b5\" class=\"pw-post-body-paragraph ma mb fu mc b md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx fn bk\" data-selectable-paragraph=\"\">GitHub:\u00a0<a class=\"af nr\" href=\"https:\/\/github.com\/under0tech\/enhanced_security_guard\" target=\"_blank\" rel=\"noopener ugc nofollow\">Linux workstation privacy shielding with Bash-scripts<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Follow these simple steps to shield your privacy with a few essential tricks from the\u00a0White Hats\u00a0and experts in Information Security. Fedora Security Lab\u00a0distributive with a few simple tricks You are here, and I assume you&hellip;<\/p>\n<p><a class=\"excerpt-readmore\" href=\"https:\/\/www.sudlatnid.com\/?p=2688\">Read More<\/a><\/p>\n","protected":false},"author":2,"featured_media":2693,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[7,8,16],"tags":[],"class_list":["post-2688","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-interesting","category-lifessecrets","category-tech-related","odd"],"jetpack_featured_media_url":"https:\/\/www.sudlatnid.com\/wp-content\/uploads\/2024\/11\/DIY-for-a-Spy-Cybersecurity-Techniques-for-the-Secret-Agent-Screenshot-2024-11-27-083900.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.sudlatnid.com\/index.php?rest_route=\/wp\/v2\/posts\/2688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sudlatnid.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sudlatnid.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sudlatnid.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sudlatnid.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2688"}],"version-history":[{"count":1,"href":"https:\/\/www.sudlatnid.com\/index.php?rest_route=\/wp\/v2\/posts\/2688\/revisions"}],"predecessor-version":[{"id":2689,"href":"https:\/\/www.sudlatnid.com\/index.php?rest_route=\/wp\/v2\/posts\/2688\/revisions\/2689"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sudlatnid.com\/index.php?rest_route=\/wp\/v2\/media\/2693"}],"wp:attachment":[{"href":"https:\/\/www.sudlatnid.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2688"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sudlatnid.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2688"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sudlatnid.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}