You are on page 1of 46

Unredacted Magazine

Issue 002
June 2022
UnredactedMagazine.com

Fun with Radio Receivers


Monitoring distant radio signals for fun and OSINT

The Linux Lifestyle


Transitioning to Pop!_OS as a daily Linux operating system

Offense & Defense


Updates, anecdotes, stories, questions, and letters from readers
UNREDACTED
ISSUE 002 Image: Jackson David
IN THIS ISSUE
5 From the Editor
6 Maintaining Multiple Google Voice Numbers
9 Bypassing Privacy Invasions of State Parks
10 Anonymous in Tijuana
12 The Linux Lifestyle: Switching to Pop!_OS
17 How Did Amazon’s Cameras ID Me?
20 When 2FA Harms More Than Helps
21 Choosing the Right Wireless Provider
24 The OSINT Corner
26 Eulogy for the iPod Touch
27 The Home Address Dilemma and Form I-9
28 Fun With Radio Receivers
30 Reader Q&A
33 OSINT Book: Ubuntu Updates
34 Letters From Readers
36 Android Sanitization Package Names
37 My Secret Little Digital World
39 Wi-Fi Geolocation Concerns
41 Can Decentralized Identity Give You Greater Control of Your Online Identity?
43 Privacy-themed Puzzles
44 Final Thoughts
44 Affiliate Links

UNREDACTED is published free of any charge to the reader, and this file may be publicly shared in its entirety. All issues are available for free
download at UNREDACTEDmagazine.com. Contact details are also available at this site.

The contents of this publication are copyright © 2022 by UNREDACTEDmagazine.com, and are published via a Creative Commons Attribution-
NonCommercial-NoDerivatives 4.0 International license. You may share it for free as long as you keep the entire file intact. Commercial use is
prohibited.

Cover Design by Anonymous Reader. Layout by Astropost. Special thanks to everyone who helped make this happen. You know who you are.
4 Image: Jan Huber
FROM THE EDITOR
By Michael Bazzell submissions to various hacker zines We also saw a substantial increase
many years ago were all declined. The in politically charged submissions.
Well, we made it to a second issue. I sixth attempt finally got through. Even The balance was almost equal of the
truly mean it when I say “Whew, what worse, one of my articles for this issue left blaming the right and the right
a relief”. Launching any new product did not make the cut (my staff can, and blaming the left. Our desire is to keep
is always a gamble. We estimate that should, be brutally honest). this publication politically unbiased and
over 30,000 copies of issue 001 were eliminate anything which focuses solely
downloaded directly from our site Several people submitted links on politics. There are plenty of other
within the first two weeks, and countless to their various blog posts asking places online where you can scratch
additional copies have been archived us to select one for the magazine. that itch.
and shared all over the internet. Since While I didn’t state it clearly before,
we do not host any analytics on our we are looking for new and unique Finally, we are introducing two new
site, this is a rough guess based on content. There is no need to re-publish sections to each issue. The first is “The
bandwidth usage of that otherwise something already available. We want Linux Lifestyle“ which will walk through
minimal HTML-only website and the this publication to contain new content an ideal Linux build using Pop!_OS
temporary access data within cPanel. unavailable anywhere else. We updated which we can rely on every day for all
I am thrilled with the response and our submission guidelines to reflect of our computing needs. I will explain
interest, and excited to keep pushing this. This magazine is definitely a work every tweak and customization which
new content. in progress as we figure things out. may motivate others to make the switch
to Linux. As I find new applications
This month’s layout will appear a bit We had to make a few difficult useful to the privacy, security, and
different. Nick over at Astropost has decisions. Well, difficult for me at OSINT landscape, you will see it here
volunteered to create a more polished least. This month, the majority of the first.
and professional document, and we are submissions were what we have since
grateful for the assist. labeled “preaching to the choir”. These The second section is “Fun With
were mostly well-written articles about Radio Receivers”, where I discuss the
Many people have asked how we the reasons we all care about privacy. many ways to monitor radio signals for
select articles for publication from those While these were great pieces, we hobby or OSINT. Both of these sections
which have been submitted. In the first decided we simply can’t publish all of will appear every month and cover many
issue, we just published anything we them. Reading 100 pages about why details of the ever-expanding realm.
found interesting. As more options are we all agree that privacy is important Both categories were in my head when
coming in, we must be more selective. doesn’t take us as far as reading about I began considering this publication,
I have three staff members who help new techniques or unique situations. but I wanted to get the first issue out
me go through email and pluck out Therefore, we plan to limit each issue before committing to this task. User
interesting items. All four of us have to only one article which fits this submissions for each are welcome.
an equal say in what gets published. scope. That was hard for me because
We assign a numerical score (1-10) I wanted to simply publish everything Again, thank you for being here. We
to each entry and the highest scorers we received, even if that meant a 40 have a lot to do, but I look forward to
that month get published. We keep GB PDF with 1,000 pages. My wise staff the journey.
it simple for now. If your submission talked me away from that, and we will
~MB
was not selected, please do not be continue to focus on the submissions
offended. Consider polishing it up which teach us all something new.
and re-submitting. FWIW, my first five

FROM THE EDITOR


5
Image: Brett Jordan

MAINTAINING MULTIPLE
GOOGLE VOICE NUMBERS
By Michael Bazzell not reclaim numbers that have been The short answer here is a dedicated
ported into Google Voice or made Firefox browser, only used for Google
Theoretically, assume that I have permanent. Voice, with isolated containers for
dozens, if not hundreds, of Google each account. The long answer is more
Voice numbers. Maybe I have taught This is not completely accurate. complicated.
live OSINT courses since 1999 and part If you own a Google Voice number
of every course was a live demo for which was not used within 90 days, On my primary Linux computer, I have
creating a new Google Voice number you have probably received a warning standard Firefox as my daily browser. I
while using hotel phone lines and library from Google telling you to make calls have also installed Firefox Beta as an
fax machines as verification numbers. or send text messages to keep the isolated browser which is never used
Also assume that I have maintained all number active. While Google indicates for anything but Google accounts.
of those numbers over the years and incoming calls and text messages Before attempting any login, I installed
I can use any of them when needed. reset the clock, they do not. I have the Firefox Multi-Account Containers
Again, this is all theoretical, as this tested this thoroughly. I have a Google add-on and created a new container
would violate Google’s terms of service. Voice number which receives a spam for each Google account. I labeled the
Now, assume I have a conundrum. How call every day and at least one spam container as the Google Voice number
do I keep them organized and active? message every week. If I do not place associated with the account. I also set
outgoing calls or texts within 90 days, I the Google Voice login page as the
There are a few concerns if you start get the dreaded email telling me I must default home page for every container.
to possess multiple Google Voice use the number or lose it. Therefore, I installed uBlock Origin with the default
numbers. The first is suspension of incoming communication does not settings to block some of Google’s
the account. If you ever log in from a qualify as active use of the account. data collection. Once I configured, let’s
suspicious network or device, Google say all 112 numbers, I was ready to start
is known to suspend your account until Next, there is the issue of organization attaching the accounts.
you provide proof of your identity. of all of these numbers. It is one thing
Since you probably created the account to store them all within your password One must be careful here. If you
in an alias name, verification could be manager (I do), but how should we start logging into numerous accounts
difficult, if not impossible. Next, you access each number? Is clearing from the same IP address and browser
risk loss of the number due to lack of browser cache enough to eliminate characteristics, this will result in an
use. Google states: all evidence of usage? Finally, there account suspension. Therefore, take it
is a concern about contamination. If I slow. If you have previously accessed
Google may reclaim your Google download the Google Voice app onto a Google account from behind a VPN,
Voice number (if you have one) if you my mobile device and log in and out of there is little harm in repeating this
have not placed or answered calls, numerous accounts, I just told Google process. When I set up my system, I
or sent or opened text messages that they all belong to me. Let’s address logged into only two accounts per day
for a period of 3 months. We will each of these issues while I present my within the specified containers. I then
desired solution. waited until the next day when my

UNREDACTED MAGAZINE / JUNE 2022


6
home firewall had issued me a new VPN copy over cache from one browser my number in 30 days if it is not used.
IP address to enter two more. to another, but that could look more I open the Firefox Beta browser, open
suspicious. For me, having them all the container for that number, and
I had a couple of difficult accounts within a browser on my laptop is immediately see my account. I make
which did not allow me to log in behind sufficient. I never recommend installing a return call to the last spammer that
a VPN due to “suspicious” behavior. any Google product, especially the called me and then send a text message
A trip to a library allowed me to use Voice app, onto any mobile device. I response to the latest scam message.
their public Wi-Fi without a VPN to only access these numbers through a That meets the requirement to keep
make Google less suspicious of my browser container. the account active another 90 days.
login attempt. It took some time,
but today I have every Google Voice Is this a perfect privacy solution? Is this as simple as I would like? No.
account credentialed within one sole- No. Google can still use browser However, it is not that difficult. I don’t
use browser isolated within a single fingerprinting to possibly determine need to log into the account because
container for each account. In the that these accounts are being accessed the session credentialing has been
bottom right-hand corner of this page on the same machine. However, saved in the container and Google
is an image showing an example with Google probably has enough data at does not see that activity as suspicious
false data. this point to do this anyway. I am sure because I am connecting from a
that something within my usage over “trusted” machine. This all takes some
One huge benefit to this is that you the past decade could tell their systems time to create, but the final product is
can elect to allow your browser to store that these accounts could all belong to easy to use. I can open a container with
all of your session data and never wipe the same person. a specific number I want to use and
it out. On my primary Firefox browser, I make a call within seconds.
have it set to wipe everything out every I never use these for anything
time it is closed. This keeps my sessions sensitive or tied to an alias which It is important to never open all
clean without additional tracking by must be isolated from my real containers at once or any containers
websites. With this new protocol, we which you do not need to use. If you
life. I rely on MySudo for that.
want the opposite. I do NOT want my do this, Google sees that activity and
browser to wipe out anything ever. Now comes the issue of number their systems might suspend all of your
I want it to keep all session cookies recycling. Just because the accounts accounts. I make sure to close each
and cache every time it is closed, so I have an active (but dormant) tab when I am done. That way, when I
make sure that is how my settings are credentialed login, it does not prevent open the browser next time, there are
configured. Google from trying to terminate your no active sessions loaded. I only see
accounts for lack of usage. I have every the Google Voice login page from a
This way, even if you have not non-container window. As long as you
Google Voice account set up to forward
accessed a specific Google account do not execute a container, Google is
email, voicemail, and text messages
for a long time, opening that container not being notified that you opened the
to a unique SimpleLogin masked
should present you with your account browser for any specific account. Your
forwarding account. This adds another
already logged in. If you have been mileage may vary here. Please only take
layer of similarity to each account, but I
logged out due to time, logging in this as one option of many. Please send
am fine with that. The emails all forward
tells Google that the device is trusted in any modifications you find useful.
to a dedicated email account which is
because of the stored data. It bypasses
part of my paid ProtonMail package.
many of Google’s security checks since
About once a week, I get the email
the account has been accessed on
from Google saying they will reclaim
this device in the past. This is much
different than logging into a Google
account from a clean machine, which
always causes scrutiny.

If desired, you could replicate this with


a secondary Firefox app on your mobile
device, such as Firefox Beta or Nightly.
However, I do not recommend this for
two reasons. First, Google is known
to flag multiple accounts connecting
from a mobile device with the same IP
address within a short amount of time,
even through a browser. Second, the
task of creating profiles and entering
the data is a burden. You could try to

MAINTAINING MULTIPLE GOOGLE VOICE NUMBERS


7
The World’s Only All-in-One
Privacy App

Sudos act as digital


firewalls to eliminate
data trails.

Call, Text, Email, Browse, Shop and Pay


Privately and Securely

Create digital identities,


or Sudos, for different situations. Research
Jackie Russell
Travel
Jackie Russell
House Hunting
Jackie Russell

jackierussell@sudomail.com jackierussell02@sudomail.com jackierussell03@sudomail.com

Sign up without an email, phone number or password | MySudo.com/bazzell


BYPASSING PRIVACY
INVASIONS OF STATE PARKS
By Anonymous valid license number. What state was told her that I had lost it and Katie said
she checking? Does she have access to to just bring in the number (I did lose
I live by a beautiful state park which the local DMV? Does she have access my license when I was 17). The worker
requires a fee for entry. Maybe I have to EVERY DMV? This seemed weird so I proceeded to complete a digital form
said too much. For a while I was buying told her I would come back. Apparently on her computer and asked for my
a daily pass with cash when I arrived I was not prepared. I couldn’t believe I name, address, email address, and cell
at a self-service kiosk. Since I go so would need to provide so much detail phone number. My first name, middle
much, I decided to buy an annual pass and allow an image of me (and my DL) name, CMRA address, burner email,
this year to save money and support to be insecurely stored until a data leak and MySudo VoIP number passed
the institution. I grabbed $50 in cash exposed it to the world. I just wanted a all scrutiny. I was then asked for my
and went to the main office to buy my park pass! driver’s license number. I said “Can I
sticker. There was someone in front of read you a Florida number?” and she
me and watching his experience turned While at home I did some research. typed the number in. Notice I didn’t say
out to be very helpful in my demand for I knew I needed a valid driver’s license here is “MY” license number. Only if I
privacy. He was also purchasing a yearly number and vehicle plate number. I could read “A” license number. Since
pass. The worker demanded his driver’s knew I didn’t want my real information the number I created would be for a
license, vehicle registration card, email on the record, that I didn’t want them person 121 years of age, I felt safe with
address, and cell phone number. Wow. to scan my license, and that I wanted giving that out. Her system accepted
That seemed surprising for a cash to be allowed to use whatever pass I the number and we moved on.
purchase. He handed over his license bought without scrutiny. I had provided
and the worker typed in various details only my first and middle name which I paid the $50 and she said that she
from it. She then laid it on a small flat are both very common. I needed a DL needed my license plate to be printed
scanner and collected a photocopy number which would pass whatever on the pass. I was ready for this. I said
of the front including all details and verification check they were doing. I “OK, the digits in my plate are G76E01”.
his picture. He walked away with his went to the Data Design Group website This was true but I accidentally reversed
sticker. Then it was my turn. at ddginc-usa.com. I clicked the Florida two of the numbers. If a ranger ever
Driver’s License Generator in the tools compares my true plate to the sticker
When I asked for an annual pass I was section. I entered my first name, no it will look like a typo. This way my
asked for my license. I told her I didn’t middle initial, and my middle name actual registration is not in their system
bring it with me and she said it was within the last name field. I entered for abuse or breach/leak. I was issued
mandatory. She began an entry with my my real day and month of birth but a my sticker and I left. There was no
details to “get me in the system” and year of 1901. This generated a license fraud. I technically did not ever lie. I
asked my name. I provided my true first number similar to S530-420-01-001-0. I paid the money. I supported the park.
and middle name which she probably was ready to try the purchase again but I also refrained from providing my full
assumed was first and last. Since this with more confidence. unique name, an image of my face, and
was technically a government entity a unique identifier which could be used
I didn’t want to lie. She then asked if I arrived at the state park the next for identity theft. I used a sticker shield
I knew my license number. I didn’t day and saw a different employee for the pass which allows me to remove
but thought I would try something working. I walked up and said that I it from my windshield whenever I leave
else. I said “my number is” and then had talked with Katie yesterday about the park. When did it become this hard
I provided a VoIP telephone number I buying a park pass but I didn’t have to buy a park pass with cash?
own. I didn’t say it was my DL, I only all of the details she needed, but I
said it was my number. Still being was back to complete the purchase. I
somewhat “honest”. provided my first and middle name but
they could not find me in the system.
Then something surprised me. She It seems Katie did not save what she
said that the number I gave was not a entered. I was asked for my license but

BYPASSING PRIVACY INVASION OF STATE PARKS


9
Image: Barbara Zandoval

ANONYMOUS IN TIJUANA
By AnoninTJ the border of the United States and as crossing without comment or questions
such offer interesting possibilities as far or having to produce documentation.
As a longtime listener of the Privacy, as privacy and anonymity are concerned. And I look like a gringo. This is not an
Security, & OSINT Show, it’s kinda Before we get into the weeds, so to everyday occurrence however. If you
obvious that there’d be a significant speak, one of the more interesting don’t have or can’t get the required
portion of the readership of this new aspects of the city and the country in legal documents and just have to enter
publication who’d be interested in general is that corruption is rampant. the country, try the Otay crossing, and
anonymity. If you’re in that category As in omnipresent. It’s everywhere that discreetly and well-placed note of
or just want a good read, allow me to and anyone who has the opportunity legal tender mentioned above could
tell you about some of my experiences participates. Depending on just how very well get you in. Or you might be
in Tijuana, Mexico. A note before we socially and/or legally unacceptable able to just waltz right in like you own
continue. Nothing you are about to you want to be, a discreetly and well the place. Leaving, though, could be
read should be considered as legal placed 500 peso note will turn most another thing entirely, so think things
and/or professional advice. Or maybe heads for the amount of time necessary through. Do the OSINT.
even taken seriously. to not notice something.
Before arriving, it’s good to know
Tijuana is a large, third world city in I have personally experienced some Spanish. Many years ago when I
a large third world country. It and the walking through the border checkpoint crossed the border for the first time, I
country’s borders are back to back with and into Mexico at the Otay border knew two words of the local language.

UNREDACTED MAGAZINE / JUNE 2022


10
Si and no. The intervening years Maps, Translate and a good search Mexican pesos. There might be places
have been an interesting survival and engine (Startpage) will be invaluable. that accept Bitcoin, although I’ve not
learning experience. In Tijuana itself If you’re a Reddit user, the r/Tijuana encountered them. Haven’t really
there’s a significant portion of the subreddit can offer helpful advice and looked though.
population that understands and can interesting reading, often in English.
speak at least a few common words Pro tip: learn as much Spanish as fast
of English. Google Translate can be Dr. Simi is an omnipresent pharmacy as possible. In fact, beyond providing
quite useful. Being open, friendly and chain with outlets throughout Tijuana safe drinking water, food and safe
non-assuming can be, and are, valuable and Mexico in general. Find one and shelter for yourself, learning the local
personality traits. acquire Loperamida, an anti-diarrhea dialect could be one of your highest
OTC med, and Paracetamol for priorities. About safe drinking water:
Due to being right next door to minor head and body aches. No ID or do not drink tap water, no matter
San Diego, a cross section of the prescription required. A supply of each where you are, unless there is no
population is quite diverse. Whatever should not set you back more than 50 other option. Bottled drinking water
you look like, there’s a good chance or 60 pesos. Not being bothered by is readily available and inexpensive.
that there’s others here who look like aches, pains or the need to defecate As well, alkaline water (agua alkalina)
you. It’s best to dress like and carry the every ten minutes will do a lot to ease is available. Look for it. You could also
accoutrements of the common person. your transition into third world society bring a Grayl Geopress and a couple
The people here are survivalists. If you and culture. extra cartridge replacements with you.
look like you’re an opportunity, you’ll This could be considered essential
be considered as such. It’s good to Find a low-end place to hunker down travel gear.
arrive with a single backpack that’s as and get busy searching for cheaper
small as possible and contains just the digs. If you’ve arrived in Tijuana without So, you are resourceful and can
essentials. Secure anything you can’t official documentation, listen up. While provide for yourself without being a
live without discreetly to your person. in the city itself, I’ve never been stopped burden or a nuisance. Congratulations
Anything else, and I mean anything, by anyone who presumed themselves and “Bienvenido a Mèxico“! Stay
that becomes necessary can be to be in a position of authority and curious, ask questions, be friendly and
acquired here. demanded that I produce ID or travel non-threatening. Be anonymous, safe
documentation. And I’ve been here a and well.
Please do not arrive in a motor vehicle. while.
This only increases the necessary legal
entry hassles and the effort required to If you intend to move further from and
get into the country. Also, traffic here beyond the city itself, this can become
can approach nightmare status. Driving a problem. A quite expensive and
here is an art form as opposed to the inconvenient problem quite quickly.
science of driving in the States. You’ve Hitchhiking/walking is a travel option to
been warned. What follows assumes possibly circumvent authority. Possibly.
that you intend to be here for an Consider moving beyond Tijuana very
extended and/or indefinite period of carefully. Do the OSINT.
time.
Gettin’ low on cash?? At the time
Whether you land in El Centro or of this writing, there’s a Bitcoin
Otay, move beyond there as soon as ATM somewhere (do the OSINT)
possible. 5Y10 offers discretion and in Tijuana that both sells and buys
non-touristy opportunities and many Bitcoin anonymously for U.S. dollars.
local transportation services have With U.S. dollars it’s possible to
routes from either of those landing anonymously exchange them for
areas to 5Y10. Lower-end places will MX pesos throughout the city. If you
often forgo an ID requirement or look need or want to work, there are gig
the other way for a few additional type opportunities that don’t require
pesos. documentation. You’ll find what you’re
looking for. Beggars and scammers are
It’s good to bring a carrier unlocked, quite common. If you go that route,
GSM compatible smartphone with you’ll have lots of competition.
you. Find an Oxxo store (they’re
omnipresent) or any place displaying a Oh, in Tijuana, cash is king. You don’t
Telcel sign, and get a Telcel SIM card need, and I wouldn’t recommend,
and a couple hundred pesos of air time. bringing credit or debit cards. Especially
No ID is required, just pesos. Google if you want to be anonymous. Use

ANONYMOUS IN TIJUANA
Image: Gabriel Heinzer

THE LINUX LIFESTYLE:


SWITCHING TO POP!_OS
By Michael Bazzell
The Linux Lifestyle is a new monthly column all about Linux. From new
useful apps to working through Linux frustrations, this section aims to
introduce others to a more secure operating system.

Every other April presents the perfect I now rely on two Linux systems. My minimal over the last two years. Both
opportunity to refresh my laptop and desktop is always at my home and is devices are clones of each other with
desktop computers. In April of even the system which I use over 90% of the the exact same OS, apps, and data. I
years (2020, 2022, etc.), we see the time. The desktop format allows me to synchronize documents weekly, and
release of a new Long Term Support easily add more internal storage, RAM, both contain fully encrypted discs.
(LTS) version of Ubuntu Linux. This April or peripherals. It also pushes me to be My desktop also does not possess a
we were given Ubuntu 22.04, which more intentional about my computer camera or internal microphone, which
includes support via software updates usage. I now avoid taking the laptop eliminates any accidental broadcasts.
for at least five years. I always take this from my home office into the living I find this comforting. I also rely on
opportunity to completely reinstall the area, as it encouraged me to always ethernet for my network access, and
operating system and all applications. do “one more thing” while watching a never need Wi-Fi enabled on the
This removes any outdated or movie or spending time which should desktop device. Win. Win. Win.
undesired data from applications which be away from a computer screen.
have since been removed and various Having a desktop helps me isolate work Typically, I would just download the
caches which have begun to clutter my and life more than a laptop always by latest Ubuntu LTS ISO file, wipe out my
system. It also allows me to jump right my side. machine, and reconfigure everything,
into the latest LTS release with a clean but this year is different. Instead, I am
slate and no software conflicts or less The desktop also allows me to really taking the plunge and using Pop!_OS
than optimal configurations. It is the “turn it off” when I am finished with as my operating system on both of my
equivalent to reformatting a Windows work, and gives me a sense of walking devices. Pop!_OS is based on Ubuntu,
or Mac machine when it gets slow, but away from the office. Closing a laptop and is also on the 22.04 LTS release. It
a bit more tied to a schedule instead lid does not give that same feeling is maintained by System76, who also
of a specific need. As a nerd, I look of closure for the day. I now reserve makes the computers I use every day,
forward to April every other year. the laptop for travel, which has been but is ideal for any hardware which

UNREDACTED MAGAZINE / JUNE 2022


12
supports Ubuntu. The following are my reinstalled from the recovery mode. Third, System76 devices are created
reasons for the switch. You can perform a fresh install specifically for use with Linux, which
without losing any user data. is important to me. I know that all
• Pop!_OS looks more polished and necessary drivers will be included and
professional. All of these tweaks When rebuilding my machines, I any hardware options are ready for Linux.
could be made manually to Ubuntu, began with the desktop. This way I I don’t worry about troubleshooting
but I prefer the overall “feel” of could work from my Lemur laptop while Wi-Fi, audio, or video issues when I
Pop!_OS. I configured everything for daily use on install a new Linux OS. Finally, support
the desktop. After the desktop was is available anytime I have issues. As I
• Pop!_OS is specifically designed functional, I could wipe out the laptop. was writing this, I placed an order for
with System76 hardware in mind. My chosen desktop is a System76 a new desktop device. I received live
Since I use their computers Thelio due to its small form factor and updates to the build status, and I sent
exclusively, it makes sense to go expandable storage (four 2.5” SATA a question about IME being disabled. I
this route. There is no need to find drives and M.2 NVMe port). A decent received a response within 30 minutes.
Wi-Fi drivers or worry about video configuration is less than $2,000 and is All of these features are a requirement
card conflicts. plenty of power for my needs. If you are for my personal computers, and those
a heavy gamer or you render long 4K of my clients.
• Ubuntu 22.04 forces Snap as a
videos every day, you will need more
package manager on users. This
power than I do. Always consider your Installing Pop!_OS is no different than
can take up more space for each
own specifications carefully before any most other Linux builds. Download the
installed application and software
purchase, and understand each option. ISO from their website (pop.system76.
execution times can seem slow.
com), flash it to a USB drive using a
If you reboot Ubuntu 22.04 In the interest of full disclosure, program such as Etcher, insert it into the
and launch Firefox (now a Snap System76 was a sponsor of my podcast computer, boot to the drive, and begin
package), you will see what I mean. in 2018 and is currently a sponsor of this the installation. If ordering through
I prefer APT (Advanced Packaging magazine. However, I have purchased System76, you can select Pop!_OS as
Tool) for Firefox, which is used by multiple System76 machines for myself the included OS. During installation,
Pop!_OS. One could remove Snap and my clients, and I have promoted select “Try or install Pop!_OS”, select
completely from Ubuntu, but I them for years within my books at no your language, perform a clean install,
prefer to simply use Pop!_OS. cost to them. This is because I prefer choose your disk, provide your details,
their systems over any other Linux- and restart the machine. Upon boot,
• Pop!_OS has a great
based computer providers for several customize your appearance options
implementation of tiling by
reasons. and you finally possess a Pop!_OS
default. This allows your windows
to automatically resize to fit your system ready to go.
First, they offer machines which
screen. I find it better than other have potentially invasive processor Now the fun begins. I have a very
third-party options, and even the software disabled before delivery. specific protocol when I reinstall an
macOS split screen ability. You Specifically, they apply a version of Intel operating system. I don’t play around
could replicate this within Ubuntu, Management Engine (IME) which does with anything until I have a few things in
but I find the default behavior in not have remote management parts place. The first is to apply all updates.
Pop!_OS to work best. enabled. The latest Intel processors This is easiest through the Pop!_
require IME to function, but System76 Shop. This will install pending system,
• Pop!_OS presents a more
eliminates the most invasive features. application, and driver updates.
minimal default installation with
Some laptops have IME disabled
less applications (and less bloat)
completely. Do your homework and Next is optional DNS configuration. In
than Ubuntu. I appreciate the
identify your threat model. I always the past, I have relied on OpenSnitch to
responsibility to install what I need.
prefer Intel processors since AMD’s block undesired outgoing connections
• The Pop!_OS software shop is equivalent, PSP, cannot be easily from my Linux laptop (after using Little
based on Flatpak instead of the disabled. Snitch on macOS for many years).
Ubuntu Snap option. I find this However, I no longer recommend this.
Second, many laptop models OpenSnitch has been quite buggy and
better suited to my needs (and the
include a completely open-source can severely slow down your system.
needs of my clients).
BIOS called coreboot which allows a It can also be quite an annoyance.
• Pop!_OS enables encryption by faster boot time within a more secure Furthermore, Linux does not share
default, and a recovery partition environment. Look for this feature in data about your usage in the same
is included in case something bad the specifications if it is important to way macOS and Windows does. Since I
happens. The existing operating you. I speak more about these options rely on open-source applications which
system can be repaired or on podcast episode 264. have been vetted by our community,

THE LINUX LIFESTYLE: SWITCHING TO POP!_OS


13
I simply don’t have a strong need for org, as expected. This is how I know to disable it, typing the following
OpenSnitch to block any suspicious that nothing suspicious is happening command within Terminal turns it off.
connections. Instead, I now rely on behind my back. I can also enable
NextDNS when necessary. I explain this “Blocklists” under the Privacy tab which nextdns stop
in great detail within my book Extreme will block known annoyances such as
When I install a new application, I re-
Privacy, but let’s go over the basics. ads, trackers, and analytics. I prefer the
enable the NextDNS logging capability
Energized Ultimate blocklist.
NextDNS (nextdns.io) conducts within their portal and monitor the
the DNS queries required in order to You can also block any individual logs to make sure there is nothing
navigate your internet traffic, but it also outgoing connection you desire. If which needs manually blocked. Once
includes filtering options. First, create you find that an installed application is I am satisfied, I disable logging within
a new free account at my.nextdns. sending telemetry to their servers about the NextDNS portal. I have yet to find
io/signup. Any masked email service your usage, you can add that domain an application I use in Linux which
should be accepted, and no payment to the “Denylist” in your NextDNS needs to be blocked, but I am picky
source is required. I used an alias name. portal. There are many options here to about my connections. You may feel
The free tier allows 300,000 monthly explore. different. You might require a software
queries at no cost. After registration, application which is sending telemetry
you should be taken to your user portal Your computer should now be to various servers. If you do, then
which should display your unique DNS blocking connections as you desire. you should keep this option active. If
addresses, similar to ”12a345.dns. I rebooted my machine and watched you see nothing suspicious, then you
nextdns.io”. You can now use this the log within NextDNS. The NextDNS might consider disabling it and using
address, or the other configuration utility launched on its own, hidden in the another DNS provider. There is no
options, to use their DNS service background, within my Linux system, harm in allowing NextDNS to always
and filtering options within Firefox or and I saw four connections. Two were to run in the background. Since I have a
Android devices. Within Linux, we must Pop!_OS servers checking for updates, home firewall running pfSense handling
configure a few more steps. In Terminal, and two were to Canonical servers, the my DNS traffic, I have less need for
I entered the following. creator of Ubuntu (the backbone of NextDNS on the machine itself, but
Pop!_OS), also checking for updates. I I like the filtering of various online
sh -c “$(curl -sL do not find either intrusive. If this had annoyances. Every situation is unique,
https://nextdns.io/install)” been a macOS operating system, I and you should know your options. Play
would have seen dozens of connections with this and see if it is appropriate for
This walked me through the sending various data to Apple and your setup.
installation process. When prompted iCloud servers, which would be stored
for my Configuration ID, I provided forever and associated to the Apple ID In summary, NextDNS is running in
the unique identifier from NextDNS, and serial number of my device. Linux the background of my machine at all
12a345. I answered “Y” to all questions does not do this. times. It conducts my DNS queries and
with the exception of “Setup as filters many unwanted connections as I
router?”, to which I answered “N”. Your computer should now be browse the internet. It is also there to
I then launched the service with the updated and blocking undesired investigate any suspicious activity from
following command in Terminal. outgoing connections. Remember that within applications.
the free tier allows 300,000 queries per
nextdns start month. If you find yourself exceeding Pop!_OS includes the non-Snap
that, you might consider a paid tier. version of Firefox. Ubuntu forces Snap
The service was then running on my for the installation and their app store,
computer, and NextDNS was providing You also might consider whether you
need DNS filtering at all. I think you will but Pop!_OS does not include Snap
the DNS query service. I can go back at all unless desired. I use Firefox as
to the NextDNS portal and make sure find that Pop!_OS is not sending your
data to servers in the way that Apple my daily browser, but I always make a
logging is enabled in the settings few adjustments. The first is to install
menu. If it is, I can click on the “Logs” and Microsoft do. If you are satisfied
that nothing on your system is sending the add-ons uBlock Origin and Firefox
tab and monitor the connections being Multi-Account Containers. I explain
sent from the computer. In my scenario, malicious data to third parties, you may
want to remove NextDNS. Simply enter more about each in my Extreme Privacy
I saw nothing. This is because my Pop!_ book, and most readers are probably
OS operating system is not calling the previous installation command and
choose “r” to remove it completely, if already familiar with them. Next, I tweak
home about my usage. If I were on a the default Firefox privacy settings with
macOS or Windows system, it would desired.
the following.
be full of calls back to those companies What do I do? I leave the NextDNS
sharing data about anything you do. utility installed and enabled. I allow • Click on the menu in the upper
When I opened the Pop!_Shop and NextDNS to serve as my DNS querying right and select “Settings”.
checked for updates, I saw a single and filtering service. If I ever need
connection attempt to apt.pop-os.

UNREDACTED MAGAZINE / JUNE 2022


14
• In the “General” options, uncheck • In the Permissions menu, click Firefox, you should see two options.
“Recommend extensions as you “Settings” next to Location, One is already installed by default, which
browse” and “Recommend features Camera, Microphone, and I use as my daily browser. The second
as you browse”. This prevents some Notifications. Check the box titled option, which displays an “Install”
internet usage information from “Block new requests...” on each of button next to it, has additional options.
being sent to Firefox. these options. Click the entry (but not the install
button) to open the menu. Change
• In the Home options, change • Uncheck all options under “Firefox the drop-down menu from “flathub
“Homepage and new windows” Data Collection and Use”. (flatpack)” to “flathub-beta-flatpak”
and “New tabs” to “Blank page”. and click “Install”. If the drop-down is
This prevents Firefox from loading • Uncheck all options under
missing, just install this second version.
their own sites in new tabs. “Deceptive Content and Dangerous
You should now see two versions of
Software Protection”. This will
Firefox in your Application menu. They
• Disable all Firefox Home options. prevent Firefox from sharing
can run independently of each other
potential malicious site visits with
• In the Search options, change with true isolation, and Pop!_Shop will
third-party services.
the default search engine to keep them both updated.
DuckDuckGo and uncheck all • Select “Enable HTTPS-Only Mode
As we continue our Linux journey,
options under “Provide search in all windows”.
we will encounter various applications
suggestions”. This prevents queries
These are what I consider the which will require different forms of
from going directly to Google,
“staples” as far as browser hardening installation. We will address those as
and blocks the Google API from
is concerned. In future articles, I plan they are encountered.
offering search suggestions.
to dig deeper into ways we can further
At this point, I am ready to load all
• Click the “Privacy & Security” protect our online activity. There are
of my documents and personal data
menu option and select “Strict” many opinions on the perfect browser
onto my encrypted disk so that I can
protection. setup, so I will stop here for now. There
start using the machine daily. If you
is much more to discuss.
• Check the box titled “Delete have installed Linux Pop!_OS and made
cookies and site data when Firefox Next, I installed my desired these configurations described here,
is closed”. applications through the Pop!_Shop. you are ahead of the pack. You are
For me, this included KeePassXC, more private and secure than 95% of
• Uncheck the box titled “Show alerts Signal, Wire, Element, Atom, Standard all internet users by simply using Linux.
about passwords for breached Notes, Electrum, Kodi, Transmission, You are ready to follow along with this
websites”. VLC, GIMP, Tor Browser, FreeFileSync, new monthly column.
Audacity, Handbrake, Calibre, and
• Uncheck the box titled “Suggest Every year, Linux gets better and
others. Pop!_Shop will notify me
and generate strong passwords”. feels more mainstream. Switching to
when there are updates to these
Pop!_OS makes me no longer miss
• Uncheck the box titled “Autofill apps, or anything installed via APT.
macOS. It seems just as nice, if not
logins and passwords”. Some desired apps will not be present
better. Pop!_OS feels fast, snappy, and
within this shop. There will always be
well-designed. I know that I am making
• Uncheck the box titled “Ask to save scenarios where we need to install
better choices about my computing
logins and passwords for websites”. software manually. One example is
activities by leaving the Apple and
VeraCrypt. I installed it by downloading
• Change the History setting to Microsoft ecosystems. However, this is
the most recent Ubuntu GUI “.deb”
“Firefox will use custom settings for only the beginning.
file from the official website, right-
history”. clicking it, choosing “Open with Eddy”, As we navigate Linux together each
and clicking “Install” within the Eddy month through this series, I will explain
• Uncheck “Remember browsing and application. Eddy is a Debian package
download history” and “Remember how I rely solely on Linux every day.
installer included with Pop!_OS. Any There will be many customizations,
search and form history”. time you download an installable configurations, and installations as
• Check the box titled “Clear history “.deb” file, Eddy can install it to your we go. I promise to offer many new
when Firefox closes”. Do not check system properly. applications which will make your daily
the box titled “Always use private computer usage more efficient and
If you desire a beta version of Firefox,
browsing mode”, as this will break enjoyable. Eventually, you will forget
as previously explained useful with
Firefox Containers. all about Windows and macOS. For
Google Voice account isolation, you
more information about System76’s
• Uncheck “Browsing history” from only need to install a second version.
desktops and laptops, please visit
the “Address Bar” menu. Pop!_OS makes this easy. If you open
https://s76.co/System76Unredacted.
the Pop!_Shop application and search
See you next month!

THE LINUX LIFESTYLE: SWITCHING TO POP!_OS


15
T H E L I O D ES K TO P
CO M P U T E R S
Crafted with Intention in Denver, Colorado

W E LCO M E TO T H E L I O
The Thelio desktop line was born from the belief that humans are capable of anything.
We believed that we could make an open hardware desktop that’s powerful, compact,
quiet, beautiful, upgradeable, backed by lifetime support, and manufactured in the United
States—so we did. Powered by either AMD or Intel with a top of the line components,
the Thelio is made to help you unleash your potential. What will you make with it?

L E A R N MO R E : H T T PS :// S76.CO / SYST E M76T H E L I O


Image: Andrew Stickelman

HOW DID AMAZON’S


CAMERAS ID ME?
By Anonymous I would agree. But there are tens of a stop sign. An “Unknown Driver”
thousands of these vans on streets flag comes up with the alert and the
By now I am sure you have heard that every day. The AI camera system is just violation. We always believed that that
Amazon vans were recently equipped one of many privacy issues. These are was because whoever was driving was
with an AI camera system. But what potentially mobile wardriving machines not paired to the vehicle through the
have you heard exactly? Vice magazine with the ability to identify and log separate Amazon delivery app. While
complained a bit about privacy, but everything about you, down to your I’m sure the Amazon app can help
mostly focused on a loss of income for face. them make the association, it really just
drivers. Business Insider helped drivers meant that NetraDyne hadn’t learned
vent regarding the nuisance of being If you’re an Amazon Delivery to identify that face...yet.
on camera all day. CNBC tried to focus Associate, the process to start work
on the violation of privacy, but fell is pretty straightforward. You log into This was extraordinarily confusing.
short of fully grasping the nightmare “Flex”, the Amazon delivery app. Then How did it associate my face to my
these cameras pose. In order to fully you snap a picture of yourself and the name? At first, I contacted co-workers
understand the system, I took it upon van VIN number (usually a VIN number and asked them if they manually added
myself to test it, and maybe even fool converted to a QR code). This pairs my name to the system and to that
it. In the end, I learned that everything you to the vehicle, allegedly. And the violation. They didn’t. Did the system
Amazon told me about this system was camera system is there to record traffic itself know who I was just by being in
not true. And every concern I had was violations. But on a recent trip to take front of the camera? This would fly in
justified. a van to a mechanic, the NetraDyne AI the face of everything we were told.
camera was able to correctly identify When the system was installed, the first
While it’s easy to say “Amazon is me without me pairing to the vehicle. thing Amazon told the contractors was
a private company and it can ask We get alerts when mechanics take a that the system didn’t keep or store the
employees to be on camera all day” van for a test drive and roll through videos of your face; anyone concerned

HOW DID AMAZON’S CAMERAS ID ME?


17
with privacy could request the face to to violate every aspect of your privacy. on the delivery app. It just didn’t
be blurred. As time went on, I never The problem comes down to consent. matter. I asked around, and not a
was given the option to blur my face. If three households in a neighborhood single person—contractor or Amazon
And it turns out that the face would are active Amazon customers, does employee—could tell me why. But
be blurred only for contractors, and this give them permission to grab data something else was required now
not Amazon itself. While not optimal, daily from the remaining households? to complete deliveries. Bluetooth.
at the time I was happy to know that And what type of tech is onboard the However, Amazon still has the potential
they didn’t keep video recordings of vans? The most concerning aspects to capture Wi-Fi. As the camera system
my face. are specifically two pieces of tech. has the NVIDIA JTX1 module at its core,
The ability and functions are never and it has Wi-Fi. Maybe that explains
But I never trusted Amazon. There fully revealed by Amazon, even when this situation. Once the camera system
were too many times they had given us asked over the course of years. Those was installed, we no longer required
contradictory information. So, in order two pieces of onboard tech are the Wi-Fi to be active on the phones itself.
to test this, the daily selfie I snapped aforementioned Amazon delivery app
for the Amazon delivery app was rarely named “Flex” and the AI-powered The NetraDyne camera system
ever my own picture. I mostly wanted camera system NetraDyne. When comes stock with four cameras. Two
to see how long it would take for the NetraDyne was installed, everyone face sideways, one faces forward, and
AI camera to realize the selfie picture needed to sign consent forms, but the one faces the driver. According to the
didn’t match who was in the driver’s system captures much more than just spec sheet, it captures 360 degrees of
seat. I also didn’t want a daily picture the driver. video. And even though Amazon claims
of myself on file with them. It turned it doesn’t record anything other than
out to be a good way to test if they Do you ever get an email with traffic violations (for safety reasons), it
actually relied on that picture at all. For the photo of your package on your has onboard storage to hold up to 100
the delivery app selfie, I used images of doorstep? That’s courtesy of the hours of HD video. A recent update
people of different races and genders. Amazon Flex app. It grabs a current to NetraDyne seems to fly in the
I never received any sort of alert or flag picture of the front of your house, and face of Amazon’s claim. The FMCSA
for an unknown or mismatched driver. It assesses that it’s your house based on Crash Determination feature boasts
led me to believe that the selfie taken GPS...for your convenience, obviously. of having an “always on” feature and
within the app was never really used The first strange issue that I noticed is always recording, not just recording
for anything. You just needed to do it with the Flex app is that even though incidents. The system itself also has a
and it appeared as part of your profile it never used Wi-Fi, it was required to Bluetooth antenna, usually mounted on
on the app itself. It may be used for be on in order to use the app. The first the passenger side of the dashboard.
more than that, I just don’t know. But excuse I was given for that was that it The main reason for this is that it is
the NetraDyne system can’t possibly was used for GPS. Now, I know how supposed to record the amount of
be using that to identify me. If it did, it GPS works, and yes, Wi-Fi does aid in time spent out of the vehicle. When
would wonder why Salma Hayek is on accuracy, but our devices had offline I asked how it actually knows what
file and the person in their driver seat maps for our regions. Even using those, device I’m using, the answer was a
looks portly and bearded. the app itself wouldn’t allow you to turn bit strange. I was told that it’s just
off Wi-Fi. As an amateur wardriver and “looking for devices”, and it will be
Upon confronting the contractors Wigle enthusiast, my mind instantly able to tell which one is the Flex phone.
I work with, no one had an answer. realized that Amazon very well could I think that was the most accidentally
I started to believe that the system be interested in scraping router names true response I’ve ever received. Of
could’ve only identified me if it had and IDs. At first I had no proof they were course, what they said was technically
always been recording my face, pairing doing this. It wasn’t until I installed a accurate. If I ran the Bluetooth scanner
it to my name/employee ID, and was new router at home, received a delivery LightBlue all day while at work, I could
learning from it. Furthermore, it needed from Amazon, and was talking to the definitely go through the list of devices
to disregard the fake selfies I had taken. driver that I got my first inkling. The Flex I encountered and figure out which are
So the NetraDyne face videos were app wouldn’t allow him to complete the mine. Since Amazon has a huge part of
stored and associated with my name. delivery. It asked him if he was sure this their retail business in Bluetooth and Wi-
And my morning selfie didn’t matter at was the right place. And he needed to Fi connected devices, its plausible that
all. The camera system itself was able override the app to complete it. While they are scanning your neighborhood
to ID me regardless. not definitive, it helps the theory. It’s to figure what’s there.
entirely possible that the app has been
As of last year, CNBC reported that Amazon has an HD camera system
collecting the data on my Wi-Fi access
Amazon’s Prime delivery service has at capturing 360 degrees of all activity in
points and did not see that router this
least 30,000 vans. Unless you live in a your neighborhood. It has the ability to
time and triggered the error.
very rural area, you likely see at least detect faces and ID people and it could
one a day. The tech that these vans Then one day, for no real reason, be scanning for Wi-Fi and Bluetooth
are equipped with have the potential Wi-Fi no longer needed to be active

UNREDACTED MAGAZINE / JUNE 2022


18
all of the time. For at least the driver’s the faces wouldn’t be kept, I believed assumed ID and pick up at lockers,
faces, Amazon was not honest (vocally) them. I didn’t care that the agreement they’re still in your neighborhood
about recording, storing, or applying for the cameras didn’t load. I figured with surveillance tech. Your neighbors
the video and data to AI. it was a very typical EULA or ToS-style install their Ring doorbells and some
monstrosity. I got it to download weeks of your neighbors invite them into the
What about OCR? The confidential later. It’s a single page. It says the exact neighborhood to film you. Daily. If you
tear sheet from NetraDyne boasts the opposite of what we were told verbally. didn’t install a Ring doorbell and don’t
ability to read street signs. It reads In their defense, they claim to “promptly order from Amazon, too bad. They’re
speed limit signs and will then check delete” media after 30 days and claim going to be able to violate your privacy
your travel speed. Couldn’t Amazon they only store biometric strictly to whether you sign an agreement or not.
also just put an off-the-shelf open confirm the identity of a person. But I They may be telling the drivers that
source OCR on their back-end to wasn’t signed into anything. They had they will be careful with the info that
look for other interesting data points? no profile to compare it to. It saw a they collect about drivers, but they say
If I have a sign on my front lawn, will violation of speeding and decided to ID nothing, and don’t answer to anyone,
Amazon record that and associate it to me, which shouldn’t be possible if the about how they use the trove of data
my address? Who will that information system is operating how they claim it they collect every day from the cameras
go to? We don’t know, and we can’t rely operates. In their own words, it should alone. If I hop off of the MARTA
on Amazon to be completely honest act like this: incident happens, camera downtown, and an Amazon van rolls
with us. system looks at your face, compares by with cameras, I don’t expect privacy.
to your Amazon profile paired to the But that is much different than a van
While they verbally told us no video
vehicle. In my case, the most crucial coming down your dead end or private
of faces would be kept, they rushed
piece of info is missing. Except unlike road to serve a neighbor and being
everyone to sign a waiver for the
the mechanic, they actually did retain caught up in their digital surveillance.
NetraDyne system. Conveniently, the
my face and linked it to my name and It’s hard to know exactly what they are
actual waiver would never actually
ID all on their own. gathering, but at least we know what
open, but the page to agree to the
they are capable of collecting and can
terms worked just fine. I trusted that The real kicker here is that even if try to develop ideas to counteract their
Amazon would not lie directly to its you want nothing to do with Amazon, efforts.
contractors. When we were told that or even order from them under an

Cybersecurity MananagedTM

INDUSTRY LEADING TECHNOLOGY


AND A 24X7 SOC WORKING FOR YOU
Cyber threats are evolving rapidly. SMBs and Enterprise
businesses are looking to their Managed Service
Providers to provide them with cybersecurity solutions.
Our managed SOC is highly-skilled in the constantly
evolving threat landscape and will provide absolute
security for you and your clients.

FORTIFY24X7.COM | (800) 989-2647 | INFO@FORTIFY24X7.COM


WHEN 2FA HARMS
MORE THAN HELPS
By Michael Bazzell she did request a temporary code, it Store these securely in your
would be received and displayed to the password manager in case you do
Last week, I had a friend of a client thief, potentially adding a new layer of not have access to your second
reach out to see if I could help with a exposure. Before I get to the solution factor.
unique situation. Her phone had been for this, let’s talk about ways to mitigate
stolen, and she could not access any this scenario. • For accounts which only support
of her accounts. I assumed this simply a phone number for 2FA, create
meant I would be purchasing a new • Always have a backup of your a VoIP number solely for this use.
device, setting up new cell access, and password manager database. If This could be a Google Voice
having a conversation about starting you use a local manager, such as number with strong hardware 2FA
over. It was not that simple. KeePassXC, this is easy. Simply security, which is preferred due to
duplicate the database file and their ability to accept short-code
The issue was that this person had store it securely. If you use a cloud- messaging.
done most of the right things. She used based option, such as Bitwarden,
a password manager, enabled two- export your database regularly. The solution for her issue was
factor authentication on everything, Having a local copy allows you to complicated. We contacted the
and even made sure that every access your credentials without the password manager to see what could
credential she has was unique and 2FA requirement. be done. As expected, they could
randomly generated. However, this all not help. Without the password and
required physical access to her device. • Never use 2FA with your true 2FA, they had no ability to access the
cellular number. That number is account (which is a good thing).
Her chosen password manager was tied to your SIM card. Theft or loss
cloud-based. While secure, she had no of the device renders this layer We contacted the cellular provider
access outside of the app. If she wanted practically useless. to obtain a new SIM card attached to
to log into her password manager from that account, but were told it would
another device, she had to either verify • If a service allows a hardware take up to 30 days. We could not wait
a temporary 2FA code sent to her cell device, such as a YubiKey, to be that long. We finally went to a major
number or verify from the app. She used for 2FA, choose that and cellular telephone kiosk and explained
had no access to the mobile password consider a backup device as a the situation, agreeing to purchase
manager app, which was installed only secondary unit. Store the backup a phone with provided service. The
on the device with her stored access key securely at home. sales representative was able to port
credential for easy access. The phone the number from the previous prepaid
was encrypted and locked, so there
• If hardware support is not available, carrier within an hour once my client
consider a software token through provided all information from the
was a small amount of relief there.
apps such as Authy. While Authy account (name, number, billing address,
The number on file with the password receives a ton of criticism for and email). That was the scariest part
manager was her true cellular number, their balance of convenience for me. Any adversary could have done
which she could not access. This over complexity, the ability to the same thing in her name. The final
number was associated with a prepaid synchronize your accounts across lesson here is to never rely on your true
account, and porting the number to a devices can save you from many cellular number for anything. It is best
new SIM card could be problematic. headaches. if you do not even know what it is.

Worse, her phone was set to display • Make sure you have backup access
notifications on the lock screen. If codes to any accounts which
demand 2FA upon login.

UNREDACTED MAGAZINE / JUNE 2022


20
Image: Tony Stoddard

CHOOSING THE RIGHT


WIRELESS PROVIDER
By Bobby Cyber and I would like to do the same for worthwhile to explain how the wireless
you. My goal is to provide you with market has changed since the wireless
I enjoy experimenting with the enough information to choose the revolution began in the 1990s. Readers
privacy and security technology and right network, provider, and plan for who never had a postpaid plan, or have
techniques. One of my favorite things you. Please note I specifically choose already replaced their postpaid plan
to experiment with is cellular services. the word “right” rather than “best”, with a prepaid plan, can skip ahead
The cellular services market is confusing because your decision will likely include to the “How To” guide on the next
and opaque. Even the words we use trade-offs between cost, coverage, and page. However, I think the history is
to describe these services (cellular, speed. interesting, and I provide examples of
mobile, wireless, etc.) can be unclear. how expensive complacency can be.
The market is also constantly changing. I suspect most readers to value
In my experience, experimentation is privacy above all else. I also suspect Postpaid plans were the norm in
the only way to determine how well a many readers will have knowledge of the early days, but they excluded
wireless provider will work for you. and opinions about what constitutes individuals with little or poor credit and
anonymous or private cellular services, those under the age of 18. A patent
The primary focus of my research so I will not explain that in depth. for prepaid mobile phones was filed
is price and privacy. Privacy seems to Suffice it to say, most prepaid providers in 1994. Early prepaid mobile phones
be the easy part. Choosing the most will allow users to create accounts were attractive to customers who were
cost-effective plan for your needs can and pay for services using “burner” denied postpaid plans due to lack of
be difficult. I have used my research email addresses, alias names, and any credit, but were more expensive than
to help friends and family members mailing addresses. Instead, I think it is postpaid plans.
save hundreds of dollars per year,

CHOOSING THE RIGHT WIRELESS PROVIDER


21
That history stigmatized prepaid customer used less than 5 GB per Step 2: Choose your services
mobile phones, but that began to month in a 12-month period, and only
Most plans include unlimited talk and
change in the early 2000s. A December once used more than 6 GB, so the
text and a monthly data allowance. For
3, 2009 New York Times article by carryover data was useless. Today, that
example, Tello currently offers plans
Jenna Wortham (‘Frugal is the new chic’ former Verizon customer is a satisfied
starting at $10 per month for 1 GB,
in mobile plans) said: Mint Mobile customer who has tried,
Boost Mobile currently offers plans
usually unsuccessfully, to convince
Any stigma attached to the phones - starting at $15 per month for 2 GB,
friends and family members to stop
they are a common prop in any show and Red Pocket Mobile currently offers
overpaying for mobile phone service.
or movie about gangs and spies - is plans starting at $20 per month for 3
The Verizon network is better than the
falling away as prices drop and the GB.
T-Mobile network used by Mint Mobile
quality of the phones rises. Prepaid in the places this customer lives and First, carefully consider whether 5G
carriers like MetroPCS, Virgin Mobile works, but the T-Mobile network is access is important to you. T-Mobile
and Sprint’s Boost Mobile division good enough that the customer is not has offered “mid-band” 5G since 2020
now offer sleeker models, better interested in paying more to access the using spectrum on the 2.5 GHz band it
coverage and more options, from Verizon network, even through a more acquired when it bought Sprint. AT&T
10-cent-a-minute calling cards cost-effective mobile virtual network and Verizon spent billions on “C-band”
that customers refill as needed, operator (MVNO) like US Mobile. frequencies (between 3.7 GHz to 4.2
to $50-a-month, flat-rate plans for
GHz) to expand 5G coverage in January
chatterboxes who want unlimited Another person I helped in 2020
2022. I will not attempt to explain the
calling, web browsing and text was paying Verizon nearly $250 per
differences between 4G, LTE, and 5G
messaging. month for four lines with unlimited
here other than to say I do not believe
talk, text, and data. This included
Nevertheless, many postpaid the reality matches the hype for most
$110 per month for the “new Verizon
customers were unaware of the benefits people. Not all providers and plans
Plan Unlimited” plan, $80 per month
of prepaid plans and stayed with their include 5G access, so read the fine
for four mobile devices to access the
postpaid plans. print if this is important to you.
shared data, and $45 per month for
Total Mobile Protection Multi-Device Second, consider whether you
The market changed rapidly,
(TMP MD). The plan was “protecting” need to use your smartphone as a
and some customers stayed with
an iPhone 8 Plus, iPhone 7 Plus, iPhone hotspot. This feature, also known as
discontinued postpaid plans, believing
7, and an iPad. I will not opine on the tethering, allows you to use your data
those plans would provide long-term
wisdom of insuring those devices. on other phones or devices. Wireless
benefits compared to the new plans
Suffice it to say, the $540 annual cost providers use words like “hotspot”
that replaced them. Switching plans or
is currently more than enough to pay and “tethering” interchangeably, but
providers seemed to mean forfeiting
for a newer device like an iPhone 11 or not all plans include this feature. Some
some advantage of being a long-term
iPhone SE (3rd generation). Today, that providers prohibit standalone hotspot
customer, and renewing contracts was
former Verizon customer is a satisfied devices but allow using smartphones
an easy way to get new “free” phones
US Mobile customer who pays less than as a hotspot. Hotspot data may be
from the carrier. At least one provider,
$50 per month for four smartphone provided at slower speeds and lower
Verizon, continued to charge postpaid
lines sharing 6 GB of data on the limits than smartphone data, so read
customers the same monthly rate, but
Verizon network. the fine print if this is important to you.
increased their monthly data allowance.
This effectively provided postpaid
Step 1: Choose your networks Step 3: Choose your providers
customers with more data than they
needed at the same price they were The most important aspect of finding Until recently, I might have
used to paying. If a customer did not the right wireless provider for you is recommended using Red Pocket
know any better, they would continue identifying the network (or networks) Mobile to test the networks, because
to pay for more data than they needed that work in the places you need it they offer low-cost plans on all three
rather than lowering their monthly cost. most. There are three major networks in major networks (GSMA = AT&T; CDMA
the U.S.: AT&T, T-Mobile, and Verizon. = Verizon; and GSMT = T-Mobile).
One of the people I helped in 2020 The only way to know for sure is to test
was paying Verizon nearly $95 per all three in the places you need it most. SIM cards can be ordered online or
month for one smartphone with 8 GB This can be accomplished by acquiring purchased in-person with cash. I have
of “shared” data, carryover data, and a SIM card for each network or using tested with them in the past. However,
unlimited talk and text. This included an eSIM. I will not comment on the recent customer service delays (hours,
$70 per month for the “new Verizon privacy implications of these choices. I not minutes), have me avoiding Red
Plan Large 8 GB”, and $20 per month encourage you to research your options Pocket Mobile. This may not be a
for one mobile device to access and make the best choice based on problem if you activate the SIM cards,
the “shared” data. On average, the your budget and threat model. use them for testing, and abandon

UNREDACTED MAGAZINE / JUNE 2022


22
them without the need for customer AT&T PREPAID Unlimited plan ($50 using three new 5G devices. However,
service. However, I encourage you to per month plus taxes and fees with this is likely financially unfeasible and
test with the provider you might use AutoPay) includes 5G access, and 5G practically difficult without specialized
after testing, so I cannot currently mobile hotspot data is an additional $10 equipment. If you have no immediate
recommend Red Pocket Mobile. per month, so consider other providers plans to replace your mobile device,
if this is important to you. Until recently, consider using the one you already
TracFone Wireless Inc., a subsidiary I might have recommended using have. Otherwise, time testing to
of Verizon, includes several brands FreedomPop to test the AT&T network, coincide with replacement.
(Straight Talk, Tracfone Wireless, but Red Pocket Mobile bought
Simple Mobile, Total Wireless, SafeLink FreedomPop in 2019. The FreedomPop In addition to hardware, consider
Wireless, Walmart Family Mobile, app, website, and customer service are what software you need to test on your
NET10 Wireless, Page Plus, and nearly identical to Red Pocket Mobile, mobile device. At a minimum, prepare
GoSmart Mobile). Straight Talk and so I suspect FreedomPop is suffering to test firewall and VPN apps. Anything
Tracfone Wireless offer low-cost plans from the same customer service delays. you use to protect your privacy and
on all three major networks. SIM cards security from the network may reduce
can be ordered online or purchased Step 4: Choose your plans speed. This could include internet
in-person with cash. Both include 5G browser apps and configurations. Be
access, but Straight Talk provides more The amount of data you need prepared to test the VoIP and secure
plans that include hotspot data. depends on the amount of testing you messaging apps you rely on too.
need to do. For some users, places like
Mint Mobile is a great way to test the home, school, and/or work may suffice. Choose a speed test app to use for
T-Mobile network, but does not provide Frequent travelers may need more data your testing, and plan for recording
access to the AT&T or Verizon network. and/or time. your test results. Consider both the
US Mobile offers low-cost plans on privacy implications of your choice and
two of the major networks (Super LTE Consider a total budget of $100 the data it will provide. Do not rely on
= Verizon; and GSM LTE = T-Mobile). to test all three networks. AT&T will the app to keep records for you. Prepare
SIM cards can be ordered online or likely be the most expensive network to take your own notes, including the
purchased in-person with cash. All Mint if you avoid Red Pocket Mobile and date, time, and location of each test.
Mobile and US Mobile plans include FreedomPop. The AT&T PREPAID 15 Consider using a spreadsheet.
5G access. My experiences with both GB plan is currently the best value at
apps, websites, and customer service $40 per month. It includes 15 GB of Plan your testing times and locations
have been good. In February 2022, “high-speed” (4G LTE) data, standard- based on your needs, but plan to allow
US Mobile became one of the first definition streaming, mobile hotspot, for plenty of time for each test. Plan
virtual network operators to offer unlimited talk & text to Mexico and multiple tests with each SIM card, and
Two-Factor Authentication (2FA) to Canada, roaming data in Mexico and allow for time to restart the mobile
secure accounts. Mint Mobile does not Canada, and unlimited text to more device between SIM cards. It may
currently offer 2FA. than 230 countries. take a little time to connect to each
network. Consider testing in a location
All Mint Mobile plans include the For simplicity’s sake, consider using where you have internet access on a
hotspot feature at no extra charge. US US Mobile to test both the T-Mobile computer or another device, so you
Mobile custom plans also include the and Verizon networks. The US Mobile can contact support if you have any
hotspot feature. These plans are great Starter Kit includes both the GSM & problems during your tests. Make
for testing purposes. However, the Super LTE SIM cards for $3.99, but contingency plans. Planning will help
hotspot feature costs an additional $5 there are several ways to get them for you make the most of your testing time
per month with “Unlimited Bundles”, free, including using the promo code and help prevent the need to pay for
and $10 per month with the “Unlimited FREESIM. Choose the 18 GB for $25 another month.
All” plan, so I do not recommend these “bundled data” plan for each SIM card
plans for testing. US Mobile shared if you want to stay within the $100 Step 6: Test your networks
data plans, available only on the “Super budget.
Once you receive your SIM cards,
LTE” (Verizon network), also include 5G
Step 5: Prepare to test activate them and execute your testing
access and the mobile hotspot feature.
plan. If you are fortunate, one network
This is a great option if you like the While you are waiting for your SIM will be the clear winner. If not, you may
Verizon network and you need between cards to arrive, consider what mobile consider a dual SIM device that allows
two and ten lines after testing. device or devices you will use to test. you to switch between two different
Again, consider your options and make mobile networks, but that is project for
Last, but not least, AT&T PREPAID
the best choice based on your budget another day.
is also a good way to test the AT&T
and threat model. It might be ideal to
network if HD video and 5G access
simultaneously test all three networks
are not important to you. Only the

CHOOSING THE RIGHT WIRELESS PROVIDER


23
THE OSINT CORNER
By Jason Edison
Jason instructs live and online open source intelligence courses for IntelTechniques
in addition to working as a cyber-crime detective for a large U.S. police department.
Each issue will feature an OSINT tactic from the IntelTechniques online training.

One of the benefits of working with to go back an hour later and find that it restrictions imposed by our employers.
and instructing a wide variety of teams, is no longer there. Sure, you can hope to One area that is often overlooked when
is the opportunity to identify common recover it using something like Google doing contract work is taking the time
mistakes and pitfalls which we tend cache, but that is an unnecessary roll of to clarify with clients any restrictions
to run into during our open source the dice. Best practice is to at least take due to their own policies and legal
intelligence work. The following are a screenshot of any key intelligence as constraints. If you are acting as their
some considerations and potential you discover it. Even better is saving agent, you likely are beholden to
issues that I see arise often, both with it in a forensically sound manner to additional restrictions and limitations.
new and experienced practitioners. preserve a page or post at the code We never want our actions to damage
level. the reputations or legal standing of
Issue: Rushing into the research phase ourselves, our employers, or our clients.
without taking the time to organize Issue: Using third-party tools or If there is any murkiness, consider
your investigation and environment. services which provide data, but for further research into applicable laws/
which you may have no understanding polices or if available consult with legal
Considerations: We always want to of where the data came from. counsel.
stop and take moment to identify the
key questions that need answering Considerations: The impact of this Issue: Wanting credit where credit is
and our overall mission goals. We scenario will depend on your mission not appropriate.
should also make sure our workstation, and final disposition of your case work.
accounts, and tools are all sufficient for If you are like me and much of your Considerations: One of the many
the task at hand. Are we preventing work ends in a court case, you will need odd things about working in the
cross contamination with other to be able to explain to a jury or other intelligence field is that if we are doing
investigations? Are we protecting our third party how the intelligence was our job correctly, we should be drawing
connection and workstation at a level recovered, and why we are confident very little attention to ourselves. This is
appropriate for the operational security that it is accurate. We need to properly counterintuitive to the current culture of
needs of our mission? Is this a long term source or provide attribution for our broadcasting successes on Twitter and
case that may warrant creating a new findings. Using free or paid tools which elsewhere. Almost all of the work we
virtual machine and new investigative “spit out” lists of data is not valuable do in truth belongs to others: clients,
accounts? These are all good questions unless you know where that data came victims, employers etc., and it is not our
to ask ourselves before diving in. from. This is even true with our own place to spike the football for internet
custom OSINT toolset, and why we points. This is ironically one of the tricky
Issue: Failure to capture key findings always encourage users to get under things about instructing tradecraft.
prior to them changing or disappearing. the hood and learn how those tools Most of my best examples of OSINT
work. work, I can never share with students.
Considerations: When you find that
This will also ring true to those of you
pivotal Twitter post or that incriminating Issue: Failure to understand and in the intelligence community, because,
image on a blog, we should consider abide by applicable policies and laws. in a world of “show us stats to prove
preserving it immediately so that we do
your worth”, we are a sub-sector that
not lose it if the target or the platform Considerations: We need to
really should be quiet most of the time
deletes or modifies the content. There understand not only the local, state,
and focused on getting out ahead of
is nothing worse than finding a case- and federal laws where we work, but
infrequent, but high impact, critical
breaking lead or piece of evidence, only also be aware of additional policies and
incidents.

UNREDACTED MAGAZINE / JUNE 2022


24
New 2022 Privacy & OSINT Books
Hardcover & Paperback

New & Updated Content

500+ Pages Each @ 8.5 x 11

Our Full Playbooks

Supports This Free Magazine

Order at IntelTechniques.com

OSINT & Privacy Video Training


90+ Hours of Video Training | Optional OSIP Certification

Register at IntelTechniques.net
Image: Sunil Ray

EULOGY FOR THE IPOD TOUCH


By Michael Bazzell connecting only through home Wi-Fi be followed at all times if you take your
(protected by VPN), and I never worried privacy seriously.
Last month, we lost the iPod Touch. about my location being exposed. This
Many readers will be surprised at my also served well for many of my clients 1. The device should be placed into
sadness over this news, but hardcore under extreme threats. airplane mode before you arrive
privacy enthusiasts will understand my home. This prevents your cellular
pain. The iPod Touch played a strong I stopped using an iPhone and iPod provider from documenting the
role during my privacy adventure. Touch in 2020. I could no longer accept location of the device overnight,
the constant telemetry being collected confirming where you sleep.
When I relied on an iPhone as my by Apple, even if they did not know my
daily mobile communications device, true location. I switched full-time to a 2. You must disable Wi-Fi and
I refused to allow it near my home. GrapheneOS device and never looked Bluetooth when you leave your
Apple’s iOS constantly collects data back. The iPod Touch was retired to the home. This prevents any wireless
about usage, including location, and closet of old devices, and I maintained beacons from collecting your
sends any details back to Apple’s a separate Pixel 4a in my home for device details, and any malicious
servers. Since the device possessed an access only via Wi-Fi. devices which could track your
active cellular connection, there was movements.
always a risk of exposing my home Many people have asked me if the
two-device lifestyle is still important Some people have asked me if I would
address. Since iOS resets cellular, Wi-
for those who have adopted the be stocking up on iPod Touch devices
Fi, and Bluetooth connections after
GrapheneOS mobile device. For rare before they completely disappear. I will
an update, airplane mode was never
cases, I do believe there is a benefit not. They served me well, but I have no
enough for me.
to two devices. However, for most more need for them in my life. As of
That is where the iPod Touch came in. people, I believe it is overkill. If you this writing, Apple is completely out of
It was a low-powered, fully-functioning, possess a GrapheneOS mobile device stock, and prices on used devices seem
iOS device, but without the cellular and the discipline to use it properly, I inflated. Life goes on.
connection. I could install all of my think having that device in your home
desired communications apps, each is fine. There are two rules which must

UNREDACTED MAGAZINE / JUNE 2022


26
THE HOME ADDRESS
DILEMMA AND FORM I-9
By Rob Hoffmann nomad status. Many government forms Remember: employers do not send
now specifically ask for a “physical” completed I-9 forms to the government.
My father often said, “Don’t lie about or “residential” address, and make it They keep them on file, and they
anything you can’t talk your way out of.” very clear that P.O. Boxes and CMRAs only show them to the government if
This is good advice, especially useful if (commercial mail receiving agencies) requested to do so (which is rare). If
you get audited by the IRS for a dodgy are not acceptable. the paper forms are locked in a drawer
tax deduction. If your attempt to justify somewhere, it’s likely that no one will
it seems plausible, they might make The biggest obstacle for many, with ever see the address on the form. In
you pay the extra tax, and possibly a respect to keeping one’s physical any case, this doesn’t seem to be a
late fee, but you probably won’t be address private, has been the dreaded reason for worry anymore. Here’s why:
accused of actually trying to defraud Form I-9, which is the document
the government. But an out-and-out lie you must fill out if you are to work https://www.uscis.gov/
might get you into trouble. for a company as an employee. This sites/default/files/docu-
document is how you attest citizenship ment/questions-and-answers/
I’d like to think the same applies or legal residential status in the U.S., FormI.9.Questions_and_An-
regarding the home address issue, swers111716.pdf
and thus the ability to legally work as an
which is perhaps the biggest concern employee. This form asks for a physical The above document from the U.S.
among privacy enthusiasts. address. The instructions to the now- Citizenship and Immigration Services,
outdated form say, “Do not provide a which is in Q&A form, states:
“How can I keep my physical post office box address (P.O. Box)”.
address private and not lie on [...] employees can enter their
government forms? What can I Instructions for Form I-9 now say, “If current residential or P.O. Box
get away with?” your residence does not have a physical address [...] Preparers, translators
address, enter a description of the and employers may not enter P.O.
The answer is: it’s tricky. The official location of your residence, such as “3 Boxes on Form I-9.
answer is to never lie on a government miles southwest of Anytown post office
form that you sign. Sometimes you near water tower.” So even living “in a The new I-9 form, though it still
might be able to get away with it if the van down by the river” (the address of asks for a physical address, no longer
address line says simply “Address”, motivational speaker Matt Foley, the contains the “no P.O. Box” language.
or “Street Address”, because then beloved Chris Farley SNL character), is
you can use a P.O. Box (no one would still acceptable. They really want you to Reportedly, the instructions changed
accuse you of pretending you actually put down your residential address. to protect people in confidentiality
live inside a P.O. Box!), or, in the second program (e.g. victims of stalking). It’s
case, the “street address version” of This is a deal-breaker, and it is why clear that the government does not
your P.O. Box, which a lot of U.S. Post being self-employed (or working for encourage non-residential addresses
Offices will assign you (if you rent a “fee” income instead of “salary” on the form, but it looks like they won’t
box) in order to receive packages from income), is the choice for many privacy bug you if you write your P.O. Box on
merchants or shipping companies (like enthusiasts. Unfortunately, many the form. (Do not, however, use the
FedEx) which will not ship to a P.O. Box. people who need to earn income (and “street address” version of that P.O.
If a form doesn’t specify what kind of that is most people) cannot choose Box, because the USPS, as a condition
address (or street address) it wants, how their payment is structured. of letting you use that address, states
you can very likely talk your way out that you are not allowed to claim that it
One important thing to note about I-9 is your “residential address”).
of being caught for not putting your forms, according to the U.S. Citizenship
residential address. and Immigration Services: https://www.lawlogix.com/
glitches-and-guidance-relat-
Unfortunately, the Patriot Act, which Form I-9 should be kept on file ing-to-the-new-form-i-9/
became law after 9/11, which intended for 3 years after the employee’s
to help thwart criminal and terrorist start date or 1 year after the This is great news for employed
activity, has made true privacy for law- termination date of that employee, people. I recently started a new
abiding citizens nearly impossible for whichever is longer, and you’ll make temporary job, and I put my P.O. Box in
all but the ultra-wealthy (who can find this calculation at the time your the address field of the I-9, and no one
a way around most any rule, it seems), employee leaves your employment. objected. Score +1 for privacy.
and people who are able to have official

THE HOME ADDRESS DILEMMA AND FORM I-9


27
FUN WITH
RADIO RECEIVERS
By Michael Bazzell made no sense to me. I knew my way conditions determine the length of
around the dial. One night, I started skywave transmissions. Sunlight is a
I have a thing for terrestrial radio searching for anything new which I had big factor in the ability to receive these
signals. It started when I was a child. not heard. Around 880 AM, I heard a transmissions.
I was given a portable AM/FM radio voice new to me. He was talking about
which I carried with me while I walked cities I had never heard of. After some During daylight hours, you typically
to school every day. I would listen to a time, I realized I was listening to a local can only hear AM radio stations close
man read the local news from my small radio show in Nebraska, several states to you. This is because you can mostly
town, and occasionally I would hear a away. How was this possible? hear the groundwave signals traveling
name I knew. It seemed magical. Some through the terrain because the sun is
stranger across town was talking into a I didn’t know it at the time, but I was creating a “D-layer” which energizes
microphone, and my battery-powered DXing. DXing is the search for distant the atmosphere. This layer absorbs
box was intercepting the signal, then radio signals. Listening to faraway radio skywave signals, preventing them from
creating an audio wave which I could on the AM band is only one small piece traveling a long distance. Therefore, if
hear. Today, that sounds ridiculous. of this hobby. In North America, most the groundwave cannot reach you, you
Back then, it was my internet. This was AM radio stations fall between 530 hear nothing.
a time before personal computers, cell kHz and 1710 kHz. Any functioning AM
radio should be able to pick up local When the sun sets, this layer breaks
phones, and any way to contact others
stations, but why did I hear Nebraska down. Skywave radio signals can
when not near a landline telephone.
at Midnight? now bounce around the atmosphere,
My grandfather had explained to me bumping into earth (and our radios).
how a radio wave works, so I had a very Let’s discuss the ways in which AM This is why a Nebraska radio station was
minimal understanding of the process. signals go from a radio station’s tower crystal clear in my St. Louis basement
That radio was always by my side and I to your radio. Once the AM radio at Midnight. When the sun rises, the
had memorized all of my local stations. I signal leaves their antenna, there are atmosphere changes and we are stuck
knew that 1120 AM was KMOX and they two components which make up that with local AM stations again. This is
had a call-in trivia show every Saturday signal. Groundwave signals travel why listening to medium wave (530-
night. 550 AM was KTRS and they had along the ground while skywave signal 1710 kHz), short wave (3,000-30,0000
a show about pets on Sundays. Of travel up toward the atmosphere. The kHz), and long wave (1-300 kHz) signals
course, 94.7 FM was KSHE “95”, which terrain dictates how far a groundwave is always best at night.
signal can travel, while atmospheric

UNREDACTED MAGAZINE / JUNE 2022


28
How far can the signal go? Well, that You will also need a radio which scan only these bands, push back. One
depends. I have been on an island in the supports an external antenna. While example of this is a nightly broadcast
Caribbean listening to broadcasts from you could use the embedded loop on 5085 kHz. It is an “oldies” style of
South America, Africa, and Europe. I antenna included with most units, music program available every night,
have been on the west coast listening you will be severely limited with your broadcasting from Tennessee through
to shows from China, Japan, and Cuba. listening options. 100 kilowatts of power. I often use this
I once camped in the Midwest and frequency as a test to see if my antenna
listened to a pirate radio station talking I currently rely on a Sangean ATS- is optimally placed. I have received this
about telephone hacking techniques. I 909X2 (https://amzn.to/3MYRwVC) broadcast as far west as Nevada. As
know, I was a nerdy kid. or a Tecsun PL880 (https://amzn. you may have noticed, it is outside of
to/397WoZW). I like the Sangean the common bands.
There is also the issue of wattage better, but those are getting hard
changes at night. Many stations are to find. Both have the desired range Some may wonder how they will
forced by the FCC to reduce their and external antenna capability. A ever find anything interesting to listen
power or cease operating at night, in portable wire antenna (https://amzn. to with so many possible frequencies.
order to avoid interference to other to/3KYWr7J) will bring in much more That is part of the fun. I find the rotary
AM stations. This allows other larger than the embedded loop, but not as tuning dial on the Sangean makes
stations blasting at 50,000 kilowatts to much as a true outdoor antenna. I have it easy to scroll through ranges of
break through over longer distances. As my Sangean connected to an outdoor frequencies quickly and efficiently. I
an example, none of my local stations sloper antenna, which I made from a also prefer a radio which allows direct
offer the show Coast to Coast AM. few hundred feet of wire and a 20’ pole. entry of a frequency, as I have many of
However, once my local stations power Maybe we can discuss that in a future my favorites memorized.
down, KFI 640 from Los Angeles can be article. After sunset, I can listen to radio
heard clearly. They offer Coast to Coast broadcasts from dozens of countries in What will you hear? A little bit of
nightly at 10 PM Pacific time. multiple languages. everything. The most common short
wave frequencies will broadcast an
I suspect you are wondering how any That brings us to short wave signals. assortment of music, news, religion,
of this is related to privacy, security, or If you possess a standard AM radio, foreign language, and the occasional
OSINT. Let’s reel this in. Radio signals you have reached the limits of your interesting amateur screaming about
are one of the last anonymous ways to DXing. If you have a short wave radio, the end of the world.
ingest information. They do not require there are endless opportunities. Many
a computer, internet access, IP address, short wave radios emphasize the use of For OSINT purposes, I am mostly
web traffic, cached files, website “bands”, which are defined ranges of interested in international news
cookies, or login credentials. They do frequencies which can be more active broadcasts, especially those from
not log your listening history or collect than others. Each band is associated countries which do not have a voice in
analytics about the shows you like. with a number followed by “meters”, my American papers. I also like to listen
There is no evidence of your activity. and the higher the number, the lower to the area around 27,000 kHz to hear
This is a rarity today. Furthermore, radio the frequency. The following are the my neighbor on his CB radio telling the
can be a great source of OSINT. I have bands with their designated ranges. world about his problems.
recently listened to signals from Russia
120 meters 2300-2495 kHz This initial article for this series is
and Ukraine, and BBC broadcasts
90 meters 3200-3400 kHz only the beginning, and sets the pace
being sent to those locations, through
75 meters 3900-4000 kHz for future issues. We have barely
long wave at 198 kHz. That information
60 meters 4750-4995 kHz scratched the surface. My plan is to
is much more interesting than what 49 meters 5900-6200 kHz present a monthly article discussing a
my local morning show anchors think 41 meters 7200-7450 kHz unique area of radio listening. Pending
about things. 31 meters 9400-9900 kHz topics include short wave stations, long
25 meters 11600-12100 kHz
At this point, I will assume you are wave broadcasts and beacons, pirate
22 meters 13570-13870 kHz
either interested in radio frequency stations, citizen bands, computer-
19 meters 15100-15800 kHz
monitoring, or you would have moved 16 meters 17480-17900 kHz controlled SDR’s, hardware reviews,
on to the next article. Let’s talk about 15 meters 18900-19020 kHz and even remote-controlled radios
specifics. The first consideration is 13 meters 21450-21850 kHz monitoring from other countries. There
hardware. What radio works best? 11 meters 25670-26100 kHz is a lot to this hobby. The bands are still
If you are serious about long-range very active.
listening, you will need a radio which To me, these ranges don’t mean
much. Plenty of the frequencies which I am always open to guest articles on
monitors the entire 1 kHz to 30,000
broadcast content interesting to me this topic. Are you a Ham or DXer? Tell
kHz spectrum. These are commonly
fall outside of these ranges. Therefore, us your story.
called short wave radios, which is a bit
misleading. if your short wave radio pushes you to

FUN WITH RADIO RECEIVERS


29
Image: Ludovic Migneault

READER Q&A
By UNREDACTED Staff
Do you have a question or need clarification about a privacy-related topic? Submit it to us for
publication consideration at UNREDACTEDmagazine.com. If you have questions, other people
are wondering the same thing! Please make sure your submissions are actual questions, and
not vague statements with a “?” at the end. Here are questions from last month.

Q: How do we know our emails to website. Email is broken, though. Never covers browser queries, and nothing
you are secure? What are you doing use it for anything vitally sensitive. from your OS, which is why a firewall
to protect contributors? is better. Cloudflare makes their money
Q: The Firefox browser gives the in other ways, and their DNS has been
A: You don’t. Any email you ever send
option (under Settings > Network audited by a third party. I currently
to anyone could be abused. However,
Settings) of sending the domain prefer NextDNS for DNS and filtering.
we do take your contributions and
privacy seriously. We host our email name to the DNS server using
with ProtonMail, which is encrypted at an encrypted HTTPS connection Q: My business would like me to
rest. No one but our staff can access (instead of a plain text one). Is start traveling again. How should I
your emails from within that account. this a suggested setting? Should get around at my location? Should
If you send email to us from your own it be done on a firewall instead? I rent a car or use Uber/Lyft? I have
ProtonMail account, then the entire According to the link above, Firefox been trying to figure out how to
conversation is encrypted within uses the services from a third party rent a car privately, but most places
their network and safe from external (i.e. Cloudfare). It seems these require a photo ID. I have thought
eyes. After every issue is released, we third parties need a way to profit about using Uber, but I’d rather not
permanently delete all email sent to from providing that service. Is download it, since it will basically
our staff email address. This way, we this another case where the user’s track my phone. Please let me know
can not be compelled to hand over information is the product? what you recommend.
any communication in the event a U.S. A: If you have a firewall with A: Rental cars will always (and should)
court order was received. You can read encrypted DNS, this might be overkill, demand your driver’s license. There is
more about our privacy policy on our but no harm in doing both. This only no such thing as anonymous car rental.

UNREDACTED MAGAZINE / JUNE 2022


30
However, what are you trying to hide? ready with an application-based VPN which is a key feature that is missing
If your home address is not on your DL, within it set to connect to a different from Focus. So why do you prefer
does letting the car company know server than their home VPN. They use Focus over Nightly?
your true identity fit within your scope? that for anything they do not want to
A: All fair points. Overall, I like
If you want to be more anonymous, associate with their real name. Two
FF Focus because it is extremely
Uber/Lyft are preferred. Aged accounts separate physical computers on the
minimalistic and wipes out all browsing
under an alias tend to work fine. same network would do little good.
history by simply closing the app. Also,
Creating a new account will be more
I use NextDNS for content filtering
strict about verification. Both record Q: When using tethering, should we which eliminates most of the need
your travel forever. I keep a secondary enable VPN apps both on phone and for uBlock Origin. That all being said,
Android profile with Lyft in an alias name laptop? I have Firefox, Firefox Focus, Firefox
installed. I switch to it when I need to
A: It depends. If you are tethering to Beta, and Firefox Nightly all on my
use the service and reboot the phone
a Mac and don’t want Apple to know mobile device. FF Focus is used for all
to the first profile after I am done. This
your true IP before your laptop VPN quick website visits or search queries.
is not 100% anonymous, but they do
kicks in, then yes. If you simply want to It is my default browser. It gets wiped
not know my true name. Payment is
protect your web traffic from knowing out on its own when the app closes or
through Privacy.com. I never use it near
your true IP, I would run the VPN on the I go “back” into an app which opened
my home.
laptop for better speed. a link. I like that. It takes 95% of my
web usage. The other “full” versions
Q: I can’t plant my flags at all, of FF are each used for a specific
Q: What will you do if VeraCrypt has
because I’m not sure if it’s really a purpose, such as keeping me logged
some issue? Any redundant options?
good idea to read my SSN over the into a specific service or site. I can then
phone (when I’m the one initiating A: I guess that depends on the create a home shortcut to that version
the call). Can you confirm for me, is “issue”. If they were found to be doing of FF, set the necessary service as the
it safe for me to read my SSN over nefarious things, I would rely more home page, and treat it as a single-use
the phone to plant my flag? heavily on my full-disk encryption to browser which stays logged in. Since I
protect my data. You can use LUKS use FF Focus for all browsing, the full
A: If you are calling a bank or other
encryption of an external disk within FF apps do not get hit with third-party
institution which already has your SSN,
Linux if needed. cookies or cache. They stay isolated.
I see little harm. I would rather say it
over the phone than email it or enter Each person is unique, and their mobile
it online. Most of our SSN’s can be Q: I am very frustrated. I have browser needs are equally as unique.
purchased for a few bucks, so I don’t several VoIP numbers through Twilio, Always do what works best for you.
see them as secret data today. but have constant issues making
them all work the way I want them Q: Regarding the article in issue
to. Do you have these issues? 001 on maintenance videos, this
Q: I’m going to perform a “digital
reboot” per the Extreme Privacy A: Absolutely. If you listen to my was written: “This displayed over
book. Would my real name be any podcast, you have heard me complain 1,000 videos beginning with my
more private if I used one computer about self-hosted VoIP, while other relative’s unique entry, including
(Linux) when using my real name times I praise the ability to eliminate ‘<LastModified>2022-04-
and used a second computer (Linux) middle-man services. Only those with 25T15:27:55.000Z’. I now know
only when using an alias? (i.e., Can adventure and patience should try to that this vehicle inspection occurred
devices be linked with names shown go the DIY route. If you need stability, on April 25 at 3:27 pm (in an
or entered on websites?) or hate fussing with ever-changing unknown time zone)”, Mr. Bazzell
technologies, just go with MySudo. stated “unknown time zone” yet it is
A: For most people, that is overkill.
I use MySudo numbers for calls more clearly marked Zulu (Z). Am I missing
I would rather see you practice
than anything else because they just something?
good OPSEC on one machine. If you
work. A: Zulu is a military name for UTC or
are conducting covert government
missions, then yes, you should isolate GMT, which is a global time at the Zero
your identities. If you are ordering Q: MB, you always recommend using Meridian. Knowing the date and time
Amazon in an alias while checking Firefox Focus on Android. To me, presented in this format does not tell
your true email, you can get by on one Firefox Nightly seems to make a lot you the local time zone from where the
machine with better habits, such as a more sense. With Nightly you have video was uploaded. Therefore, you
dedicated browser for personal, and access to about:config where you would not know the location (or the
other for alias, and a reliable VPN. If can fully harden it the same way as local time zone).
that seems reckless, you could dual- a desktop browser. Additionally, you
boot Linux with a secondary alias OS, can install add-ons like uBlock Origin
or use a VM. Many clients keep a VM and Privacy Badger. It also has tabs,

READER Q&A
31
Q: I own a small business that I holding the letter for me, and the hotel sense of the results) How is it
run out of my house in Missouri. address was published online without different from an analytics service
For my business name I must file a scrutiny. Long-stay hotels seem to work like Google Analytics?
“Registration of Fictitious Name” best.
A: That is a great question, especially
form. The state does not allow P.O.
since the term is mentioned here often.
Boxes in this form—physical address Q: For the person new to digital My definition would be the persistent
only (I have tried—they manually security and only familiar with collection and transmission of usage
review all submissions). The address Windows-based platforms, can you metrics and other data associated with
provided will appear in a publicly recommend a free or affordable a specific digital product or service to
searchable database/website. Any site or course to learn more about a third-party server. In other words, the
advice on how to keep my home DIY personal digital security, Linux constant analysis of your information
address off this publicly searchable etc.? Something that goes beyond while you use a product, such as MacOS
website? following the commands in your or Windows. In one example, Apple
Extreme Privacy book? collects data about every application
A: I can’t speak to your specific
situation or Missouri law, and I am not A: I would revisit the book (Extreme you launch from your mobile device or
providing legal advice, but I can share Privacy), as it is much more than computer, then analyzes your usage for
an anecdote. I once had to provide an “commands”. It is over 500 pages of their own benefit. Is Google Analytics
official physical (non-CMRA) address content to help with the very thing you telemetry? I guess it is in a way, but I
which would become public record. I are asking. The first four chapters (1/4 make an important distinction. It goes
booked a hotel room for one night and of the book) are dedicated to the tech back to the word “persistent”. Your
completed an online registration form side of things. If that doesn’t scratch Apple or Microsoft operating system
while there which required a “Current the itch, I would create some Linux is constantly collecting data. Google
physical address”. I provided the hotel VM’s and work through any issues. The Analytics can only collect data when
address and even the room number as internet can solve any problem you a website hosting the code is visited
to be completely transparent. I then find. (unless you use uBlock Origin to prevent
booked a second stay 30 days later and this). However, there are similarities
told them I may be receiving a package. Q: What is telemetry? (Yes, I which are open to interpretation.
When I arrived a month later, they were googled it and have trouble making

Cybersecurity MananagedTM REAL-TIME THREAT REAL-TIME THREAT


DETECTION RESPONSE

MDR | XDR | INCIDENT RESPONSE | PEN TESTING


VCISO | WEB3 & BLOCKCHAIN | MANAGED SIEM
PEN TESTING AND
HELPDESK | IDENTITY MANAGEMENT PROTECT YOUR ENTIRE
NETWORK VULNERABILITY SCANNING
DISINFO MANAGEMENT

REDUCE YOUR IT/SECURITY AFFORDABLE


WORKLOAD PRICING

FORTIFY24X7.COM | (800) 989-2647 | INFO@FORTIFY24X7.COM


OSINT BOOK:
UBUNTU UPDATES
By Michael Bazzell
If you have my OSINT book (Open Source Intelligence Techniques, 9th Edition),
and you are creating your first OSINT virtual machine, you may have noticed some
new issues. The book was written using Ubuntu 20.04 as the Linux operating This magazine serves as a compliment
system, and Ubuntu 22.04 has since been released in April. While the new to the weekly podcast, which can be
version of Ubuntu looks very similar to the previous LTS option, there is one huge found at IntelTechniques.com. Below
difference. Firefox is now included as a Snap package. The look and feel of Firefox are summaries of the episodes from last
is the same, but many things changed behind the scenes. month.

First, the steps in the book to download and apply a Firefox profile with 260-Google’s New Policy Change
customized add-ons, bookmarklets, and settings do not work as printed in the
book, because the path to the Firefox app has changed. Profiles must now be Discusses Google’s new data removal
copied to the following folder. policy, the first issue of UNREDACTED
Magazine, and numerous privacy &
/snap/firefox/common/.mozilla/firefox/*.default OSINT updates.

Next, the Firefox icon might be missing from your build because of this same 261-A Client Stops By
path change. Instead of adding a shortcut for “firefox.desktop“, you must now
specify “firefox_firefox.desktop“. A client stops by to discuss his recent
full privacy reboot, plus the latest news.
Finally, the search tools shortcut was broken by the 22.04 upgrade because
the Firefox Snap package now requires the path of a local file to be included 262-Brief Updates
within single quotation marks. The ‘tools.desktop’ shortcut file now includes
the following line. Provides brief updates to the show,
magazine, and latest privacy news.
Exec=firefox ’/home/osint/Desktop/tools/index.html’
263-Proton Changes & New Breach
These are all minor changes, and many people will never notice if they simply Lessons
follow the online steps. I modified the following details within the book login
portal on May 5th, 2022: Discusses the latest Proton changes
and some new breach data privacy
• Updated the ”linux.txt” Linux Steps file to reflect path changes for Firefox concerns (and investigation benefits).
in Ubuntu 22.04.

• Updated the ”linux.sh” automated installation script to reflect path


changes for Firefox in Ubuntu 22.04.

• Updated the ”linux.txt” Linux Steps VM Configuration instructions due to


a new slight change with VirtualBox and Guest Additions.

If you use the URL and credentials from your book, you will see these changes.
As long as you are following the updated online TXT files during your build
process, all should function normally. This is why it is always vital to check for
updates on the site while following the book.

OSINT BOOK: UBUNTU UPDATES


33
LETTERS
FROM READERS
By Michael Bazzell & UNREDACTED Staff
Do you have something to get off your chest or a quick tip which may benefit
readers? Submit it to us for publication consideration at UNREDACTEDmagazine.com.
Here are selected correspondence excerpts from last month.

“Dash Cam Stories“ by Anonymous: decided when you set up the Linphone fantastic since it makes you less visible
application, as in that URL you specify in public, and there is no prominent
I have another reason to own a dash
“us1” or “us2” or whatever. branding. Bring forth the Jason Bourne
cam. I live in a county which allows
in you. Initially, I didn’t notice this
drivers to sign a complaint against Editor’s Note: We tested this with ingenious design. The zippers can clip
drivers who have allegedly committed the original text and calls came through to a ring at the end to avoid accidentally
a traffic violation. An officer does not fine (without forcing to VM). We tested opening the bag. The lock mechanism
need to witness anything, and the fines this alternate option and it also worked is a minor feature that momentarily
are steep. Last week, I accidentally fine. We are not changing the tutorial becomes a deterrent for those looking
pulled out in front of a speeding driver. since it works as described and is the for easy prey in densely populated
They got mad and rode my tail. I refused official Twilio guidance, but we will regions. The “anti-slashing” fabric
to speed up and they could not pass. present your modification here in outperforms expectations. I wouldn’t
They called the Sheriff and said I was case others have issues. You may have rely on it as a defensive weapon, but
driving aggressively and “road raging”. something else unique going on. the material is sturdy enough that
The deputy pulled me over and allowed
I’ve let my dog play with it, and it has
the other driver to sign a complaint
“RFID Bag Review“ by Jun: survived. So if you’re a tourist in an area
against me. Before the paperwork was
Those who travel frequently are known for thieves slicing open bags as
finished, I convinced the deputy to
no stranger to the sales pitch of you walk, this would be a significant
look at my dash cam of the incident.
Radio Frequency Identification (RFID) bag to avoid such troubles.
He watched as I drove normally, and
then refused to allow the complaint. He blocking. Many RFID-blocking products
Overall, it was worth the purchase,
asked if I wanted to sign a complaint are available and are famous in wallets
significantly since I use it every day.
against the other party for filing a false and passport holders. On the other
The sling bag is small enough to
police report, but I declined. Going to hand, backpacks have never maintained
leave my keys, three SLNT wallets, my
court is not very privacy-friendly. their integrity, especially for Everyday
GrapheneOS device, wired earbuds,
Carry (EDC) enthusiasts. Target has
and flashlight at all times. I can leave
“Twilio Updates“ by John: a simple-looking sling bag that took
this next to my front door when I’m
me a few months to pull the trigger
I just went through and set up my home, then grab and go whenever I
to ultimately purchase: “AntiTheft
Twilio numbers and the code is almost need to run errands. If I know I’m out
RFID Sling Backpack Gray”. The RFID
right, but needs one change. With the the entire day, it’s big enough to fit
sales point on any sling bag has never
incoming calls bin, the sip URL address more stuff like a portable charger, USB
met anyone’s expectations from my
is wrong. You are not allowed to specify cables, and a portable gaming console.
experience. To my surprise, its other
a local server in the address. For Let’s say you want a minimalist and
features have made this specific sling
example, ”6666666666@6666666666. defensively practical bag. In that case,
bag my primary everyday bag.
sip.us1.twilio.com” should be: I believe this is an excellent first EDC
”6 6 6 6 6 6 6 6 6 6 @ 6 6 6 6 6 6 6 6 6 6 . s i p . As predicted, RFID-blocking is sling bag for a gray man’s lifestyle.
twilio.com”. With the previous one terrible, so don’t count on it. However,
it goes straight to voicemail (if that’s this sling bag has become the mainstay
set up). It seems the local server is of my EDC gear. A Plain Jane style is

UNREDACTED MAGAZINE / JUNE 2022


34
“OSINT Bookmarklet Update“ keyword and Google executes a site target’s contact list with “b” in their
by Anonymous: search as intended. I think this could be username will show up.
very useful to OSINTers.
I thought I’d share a bookmarklet 4. Cycle through all the letters of the
that I use daily, though not OSINT alphabet to to reveal every contact
related, but rather if you want to use “Skype OSINT“ by Mishaal Khan:
in the search field that says “1
Google to search for a string on the site When someone adds you on Skype, mutual connection”. Write them
you’re on, click this, and it essentially they have the potential to see your down.
performs a “site:thesiteyouareon. entire contact list. Here’s how:
com <string>” search on Google. 5. In under 10 minutes you will know
I’ve found it very useful, provided you 1. Create a new alias account on your target’s entire contact list
want to perform that kind of query, skype.com with an empty contact (unless they have thousands).
which, for me, happens almost daily, list (very important). You don’t
if not hourly. I call it “search.site”. The need to install Skype. This may be a feature of convenience
JavaScript code to paste in the URL for by Skype, but this is definitely a privacy
the bookmarklet is: 2. Search and add your target. They flaw. Mitigation? If you’re on Skype,
have to accept your invitation for don’t accept an invite from anyone you
javascript:Qr=prompt(​ this to work. don’t know and expect.
‘Search%20Site%20
for’,’’);if(Qr)location. 3. Now when you search for someone
“Puzzles“ by Anonymous:
href=’http://www.google.com/ in the search bar, e.g. you type
search?&q=site:’+encodeURI​ “a”, a dropdown of potential hits Your crossword puzzles are too easy
Component(window.location. will start to populate as you type. and are not fun. Make them more
hostname)+’+’+escape(Qr) On the top of that list, Skype will complicated for those of us who have
always have accounts that say “1 an education.
Editor’s Note: This works well. In
mutual connection”. Since you
Firefox, I chose the option to “Add” a Editor’s Note: We are all excited to
don’t have any other contacts, this
bookmark, copied and pasted the code, see your crossword puzzle contribution
means that the suggested user is
and saved it to my Bookmarks Toolbar for July! You are going to make it better,
in your target’s contact list. Type
as “SITE”. When I am on a target page right?
“b”, and any user that is in your
and click this button, I can enter any
ANDROID SANITIZATION
PACKAGE NAMES
By Anonymous Using the list command with a grep This leads to the solution that I have
query helps with this when part of the found: finding package names using
This is in the context of the Privacy, app’s label is included in its package the Aurora Store. Here’s how: open the
Security, & OSINT Show, Episode name. However, some applications Aurora Store. Open the menu in the
246-Android Sanitization, which can be have a different label and package upper left. Select “My apps & games”.
found here: name. One example I encountered Select the desired application, in this
on an old Pixel was the SIM Manager case the SIM Manager application.
https://inteltechniques.com/ app, which has the package name Open the kebab menu in the upper
blog/2022/01/14/the-priva-
“com.google.android.euicc“. This right. Select “Manual download”—we
cy-security-osint-show-epi-
package name cannot be located using will only be viewing this menu, and not
sode-246/
grep queries of “SIM”, “Manager”, or actually using the manual download
Android sanitization offers privacy “SIM Manager”. function. Under the manual download
enthusiasts a scalability of private menu, you will see the package name
Some APK hosting websites can help listed under the app label; in this case,
mobile device options. This is
with this problem by searching for the the package name is ”com.google.
exceedingly useful when helping friends
app label. However, some of the more android.euicc”.
and loved ones who are sympathetic to
obscure stock applications can’t be
privacy, but not ready to jump onto the
found on APK hosting sites. Another There are many advantages to
GrapheneOS train. However, the privacy
option is that there are also apps that, this technique. One is that it doesn’t
enthusiast can encounter some snags
once installed, can display package require the package name to match the
while sanitizing an Android device. One
names of other installed applications. app label. Another is that it accounts
difficulty I encountered when utilizing
However, if you have been following for obscure stock applications that
the Android Debugging Bridge (ADB)
the IntelTechniques privacy strategy, might not be listed by APK hosting
tools with an Android phone, was
you likely already have the tools you websites. Finally, it utilizes a tool that
that the uninstall command requires
need to fulfill this function installed we already use as part of the private
knowing the Android package name
on your Android device, negating the Android and custom ROM strategy,
of the application you want to uninstall
need to install an unvetted application. rather than relying on some new tool
(such as “com.android.vending“ for
that might not be compatible with our
the Google Store application).
threat model.

UNREDACTED MAGAZINE / JUNE 2022


36
Image: Jonathan

MY SECRET LITTLE DIGITAL WORLD


By Digitally Semi-Anonymous services and understanding how to want this”. She says “I don’t, but take
use them, I wanted to share with other my tag off of it”.
I want to share some content about people what I had learned and help
my continued privacy journey. I’m a others protect their digital life. I was I stop dead in my tracks, drop the
social guy by nature, I use social media, perplexed by the resistance. suitcase and slowly turn around with a
and I don’t take myself too seriously. I huge grin on my face. At that moment
generally listen to podcasts hosted by I was met with “What do I have to she knew exactly where the conversation
comedians, and wanted to listen to hide?”, “I have nothing to hide.” and was going. I very sarcastically asked,
something different. I started searching “You want me to download a what?”. why would YOU care if your name is on
for technology type podcasts and came Not my wife, friends or co-workers this? I’m throwing it into a dumpster at
across Darknet Diaries. The specific showed interest. I provided a very the landfill. She says I don’t want some
episode I listened to that caught my strong case for some basics like a creep seeing it and knowing where to
curiosity was on OSINT! I was hooked password manager, VPN, firewalls and find me. I walked up to her, put my
on the idea immediately. I had a feeling planting your flags. They would all say, arms around her and explained that this
of being a kid again, that thought of “Oh wow, my login credentials are feeling you have in this moment, is why
maybe seeing or finding something out there?! Oh well, what can I do...” I spent many hours removing our info
I wasn’t supposed to. Something I I quickly realized that this was a solo from all these people search websites.
knew of but others didn’t. So I started adventure. All the things I try to explain to you
googling all things OSINT, but I didn’t about my “secret little digital world”
really understand what I was looking I spoke with my wife on multiple as she calls it, is for our protection and
for. occasions about her digital privacy well-being.
and security, but she wasn’t having
I searched podcasts for OSINT. it. I have since made a small crack in This was the perfect moment to once
That’s when I found MB. This podcast that foundation of “I want no part of again pitch Bitwarden to her. She now
completely changed how I think, how this”. Just a few months back we were uses Bitwarden. She also has a daily
I manage my digital life, and I have throwing out some attic items we no routine of doing different puzzles on
learned so much. I will be forever longer needed. One specific item was her iPhone. I would cringe when I saw
grateful for what it, its guests and her old suitcase. I asked her if she this, because I know what’s happening
experiences, offer to us, the listeners. wanted to keep the decorative tag on in the background as its sucking up
I gravitated more towards the privacy it which had her name and address. everything she’s doing. One day we
& security side, but appreciate the She says no. As I’m walking it out to were talking, and she mentioned an
OSINT part as it justifies the privacy. my truck, she says “Wait, where are you item that kept popping up in ads
After trying out all the recommended going?”. I replied “You said you don’t that she had searched for, and she

MY SECRET LITTLE DIGITAL WORLD


37
was finding it annoying. Another officers. I was blown away. That was sign for this, alias has to sign for it”. I
opportunity presented itself, and I hit the moment I started taking my privacy paused like a deer in the headlights. I
her with the iOS firewall app Lockdown. journey more seriously than just a neat hadn’t fully thought this through and
I pitched it, she reluctantly downloaded new thing. I deleted that account, and was caught off guard. She stood there
it, but is still using it to date. I check a few months later I saw an article that smiling waiting to see my reaction. All
it now and again, and it blocks about talked about how Venmo was making I had was “Alias is sick with COVID and
10k-15k callbacks to the mother ship a some changes due to privacy concerns. asked me to sign for it”. I signed my
day, and is currently at 1.75 million total real name, as I have never written out
blocks. She turns it off for one puzzle I would like to share a few things that my alias name before, and it’s probably
app because Lockdown completely help me in my privacy journey, and it illegal. Don’t be caught off guard like
shuts it down, but she does turn it back may help you. My four social media apps I was.
on, something I would claim as a small are on an old Wi-Fi-only device that is
victory for our privacy. Whether she used only for that purpose. Nothing I’m a ProtonMail and Bitwarden
likes Bitwarden and Lockdown or not, else is searched for, logged into, it has subscriber. Another thing I do is I use
she is using these services. a different Apple ID, ProtonVPN and the same email address to log into
Lockdown with added custom domains these 2 accounts. That email address is
Every now and again we spoil to block. I’m not overly concerned not forwarded to, not used to sign in
ourselves at a nice steak house. They about what it might be collecting, but anywhere else on the internet or receive
require a credit card to hold the with Facebook specifically, most users email except from those services. So
reservation and charge you $100 if you use their real name. Shorten your name, the likelihood of that login credential
cancel within 24 hours of the reservation. use initials or change it just enough. being discovered or breached is very
In life, things happen. Maybe you get That way, if someone is trying to find low. Even so, both logins are protected
in a fender bender on the way or a flat you on Facebook, it’s less likely they with 2FA so I’m not overly concerned.
tire, or maybe you, or someone you’re will, as they are probably searching for My ProtonMail account has multiple
taking, becomes sick hours before your your real name. Also, go through every emails created and ready to go in
dinner reservation. From now on when setting in each account to reduce your the event I need to provide a new
we make a reservation, I explained exposure, and always use 2FA where address in an urgent situation. They
that we will be using a Privacy.com available. are currently disabled and have not
card to protect us from those fees if an entered the online world. I suggest
unforeseen circumstance pops up. My You also have the ability to change taking advantage of all the additional
hope is that she will see the value in it, your caller ID with your cellular carrier. free ProtonMail addresses they offer to
and when she does, I will be waiting When my caller ID pops up, it is not paid subscribers when they introduce a
in the shadows for my opportunity my real name, nor is it my alias. Some new @domain address.
to spring it on her to create her own telephone number search sites query
account. your cellular number to the legal name Being a delivery guy I hear store
used at sign up to do a credit pull. This patrons everyday giving their phone
The moment I realized how important is separate from your caller ID. You can numbers to store employees to
our digital privacy is, was when I received change this, but can’t leave it blank. My associate their account with the
an email from Venmo. I couldn’t even carrier (AT&T) doesn’t allow the use of purchase in order to get points or
remember setting up an account. I was special characters for a name, so I use a discounts. This community understands
curious, so I tried logging in, and due single initial for first & last name. They how dangerous this action could be.
to previously poor password recycling, are not my actual initials, so if a search You never know who is listening or what
I got in. I had never actually connected site queries my number through an API, a bad actor might do with the info you
it to a financial account, but created it shouldn’t be too revealing if this is a just gave out for everyone in earshot to
a profile. At the time, I think Venmo site you’re unable to completely opt hear. A very targeted phishing attack
made your profile public, and you out of. could be played out shortly after the
had to change it to private, otherwise purchase making it seem legit, and
anyone could see your transactions. My mailman threw me a curveball a then be taken to the cleaners or lose
Upon logging in, I saw all my contacts’ few weeks ago. She knows I get some access to online accounts. This is where
accounts and their transactions. I could bills in my alias name, many Amazon/ I use a screenshot of my account’s bar-
click away from one individual to the USPS packages are delivered to this code in my alias name that is saved in
next to the next and so on. I could mystery person she has never seen. my iOS Files app, because I, too, want
randomly search for people and saw Sometimes she asks if I have let “alias“ that discount, but without exposing my
way more than I thought I should see, out of the basement yet. I always tell info or having a privacy invasive app on
which included a friend of mine’s fiancé, her “And risk getting caught? No way!”. my device.
whose best friend was a local Chief I wasn’t home, and she left a sticker
of Police. I could keep clicking, and for a package my alias had to sign for. Be vigilant, be smart and be well.
noticed transactions to other police I met up with her down the street to get
my package. She says “Oh no, you can’t

UNREDACTED MAGAZINE / JUNE 2022


38
WI-FI GEOLOCATION
CONCERNS
By Privacy Mike not be identifying my location through of my devices, I see a list of a few dozen
those means. However, all modern of my neighbor’s Wi-Fi routers. But what
One day when auditing my online Xboxes have Wi-Fi network cards built I didn’t know was that Microsoft then
account security, I noticed Microsoft in. It’s how most people connect their collects the information about which
knew exactly where I lived, down to Xbox to the internet, and it’s how the nearby routers it “sees” and reports it
a few feet, within my large apartment wireless controllers communicate with back to Mr. Gates’ headquarters.
complex. For most, this would be the console.
an unsurprising finding. However, My neighbors likely do not run
I subscribe to most of the extreme First, a bit of background on how 24/7 firewalls, and thus Microsoft has
privacy techniques, and this caused Wi-Fi works. All Wi-Fi devices have a associated actual geographic locations
alarm. unique MAC address that identifies with my neighbor’s Wi-Fi router MAC
the device. No two devices have the addresses. Thus, by virtue of my Xbox
My home network uses a cable same MAC address, because different seeing signal strengths from these
modem attached to a Protectli firewall companies have different prefix codes, dozens of Wi-Fi routers, Microsoft can
that then attaches to a Wi-Fi router. and each company can ensure their estimate where my location is down to
My Protectli box runs pfSense which own devices that follow their prefix a few feet using trilateration methods.
creates an always-on VPN connection, code have a unique serial number.
with a kill switch preventing any traffic I dug into this further and learned
from leaving my network unless it’s on Wi-Fi devices are constantly looking that the various companies that send
that VPN. for other Wi-Fi devices. A Wi-Fi device cars with cameras around to map city
with nothing to talk to is useless. streets, such as Google Street View,
I don’t have any cell phones inside So the core tech relies on seeing all are not only collecting pictures of
my home. I use a prepaid phone, paid other devices around it for potential everything, but also “wardriving” MAC
in cash, that never leaves a faraday connections. addresses of every Wi-Fi router they
bag when within a few miles of my see, and log it along with the GPS
apartment. I don’t have any GPS I hardwire my Xbox to my router. But, location and signal strength of that
devices inside my home. I can’t “disable” Wi-Fi because it’s part router.
of how the wireless controllers work.
Yet, there it was, on my Xbox’s Even if I got a wired controller (and It’s not necessary to send cars around
Account Settings page. A picture of a good luck finding one in 2022), it’s likely to do this. Apple and Google have cell
map of my apartment complex, with a impossible to tell the Xbox operating phones with built-in GPS in 99.99% of
pin located exactly where I live, as the system to disable Wi-Fi completely. households. Even if you’re running a
last login location. full network VPN, the phone can see
And this is because Microsoft doesn’t your neighbor’s MAC addresses, as
This was a few years ago, and I want to let you disable Wi-Fi. Like all well as your own router MAC address,
struggled in figuring out how Microsoft of the big tech companies, Microsoft is and report it back along with the GPS
was doing this. No one was talking a data hog. It wants to know all of the stamp, giving away your true location.
about this, and even today few discuss things. Like, for example, what other
it. I uncovered the technique of Wi-Fi Wi-Fi devices exist in close proximity to This does not render always-on VPNs
beacon tracking. your Xbox. useless. There is still protection in the
form of websites you visit not knowing
My Xbox is not allowed to touch the What I figured out is that my Xbox your home location and preventing
internet without first going through a is seeing my neighbor’s Wi-Fi routers. your ISP from logging all of your web
VPN. This means Microsoft does not Of course, I know it “can” see them, traffic history. However, it does mean
know my home IP address, and could because anytime I enable Wi-Fi on any your geographic location is trivial to

WI-FI GEOLOCATION CONCERNS


39
determine if you live anywhere with see your home router MAC address home. I perform my own “wardriving”
neighbors’ Wi-Fi signals accessible in to make that permanent linkage to of a neighborhood that I would like
your home. the location. From that point forward, to pretend I live in, and document the
every time you connect a device to your MAC addresses of several routers in
Even if you don’t live in a populated router, then Apple, Google, Microsoft, one apartment complex of that place.
place, and you invite someone over to etc., will associate that device with your
your home who has a cell phone in their true location. I then install new firmware onto my
pocket, their phone will sniff your Wi- own routers and overwrite their MAC
Fi MAC address, “tag” it with the GPS Completely eliminating all Wi-Fi addresses with those of the routers I
coordinates of your home, and send would be the only true way to get rid identified during my wardriving effort.
that back to their database. The visitor of this threat. It’s a big commitment, I also name each router’s network the
doesn’t even need to have your Wi-Fi because not only do you have to same. When I turn my Xbox on, it will
password or connect to your Wi-Fi to hardwire ethernet cables everywhere “see” these five routers nearby and
do this. It will happen automatically and manually plug in devices each time report the network name and MAC
without your visitor’s knowledge, you want to connect to the internet, address back to Microsoft who checks
because Wi-Fi devices are constantly but you’d have to physically remove their database and estimates that I
sniffing and recording all of the other Wi-Fi network cards from every device live in an apartment complex that’s a
Wi-Fi devices they see. you have. hundred miles away from where I really
am.
I’ve come up with a few means to Back to the Xbox. It’s not enough for
reduce the threat. First, if you live in me to “tell” Xbox not to use Wi-Fi. I’d I considered doing this as an
a rural place without neighbors, then have to open the Xbox and physically experiment, seeing if Microsoft would
have a means to quickly disable Wi-Fi disconnect the Wi-Fi card. This likely be fooled, and presenting the results
in case you have a guest or a tradesman will require desoldering and may brick at a conference, however I value my
come to the house. Reduce the Wi-Fi the device if the startup routine checks privacy too much to do that, so if
signal strength and install a fence so it’s for functioning Wi-Fi during the boot anyone wants to build off my theory
not possible to sniff from cars driving cycle. and present it at DEF CON, go ahead.
past the home.
One method I have not tried, but
Even this won’t be a 100% solution, suspect will work, is living in a rural
because it only takes a single instance area and buying several different Wi-
of another person’s Wi-Fi device to Fi routers that I spread throughout my
CAN DECENTRALIZED IDENTITY GIVE
YOU GREATER CONTROL OF YOUR
ONLINE IDENTITY?
By Dr. Paul Ashley, as your mobile phone number, email to get a broader view of your behavior.
Anonyome Labs address, and credit card information. While it’s tempting to hit the social login
When I look into my own 1Password button to save the bother of creating
Over the past year or so, interest app, I see I have more than 200 yet another account and remembering
in decentralized identity (also called accounts that fit this model. or storing yet another username and
self-sovereign identity) has surged. password, when you do, you’re really
We’ve seen new decentralized identity The second type of IAM model trading your personal information for
blockchains created, decentralized implemented is also a centralized access and convenience. Unless you
identity companies acquired, and model, but is called federated. In carefully consider and agree to the
various real-world decentralized a federated model, you create an information that the third-party site is
identity-based projects progressed. account at a central site, such as asking to access from your social profile
Google, Facebook, Twitter, LinkedIn or (during the initial permissions process,
You might ask then, what is one of the other big sites. When you go which many people rush through), you
decentralized identity? Definitions vary, to other websites, you might be offered can easily expose your personal data,
but this is a good one: the option of doing a social login such including your gender, age, email
as “Login with Facebook”, where you address, phone number, relationship
Decentralized identity is an approach use your Facebook login to access the status, interests, and even your full
to identity and access management third-party site. This type of model list of connections. Almost everything
(IAM) that seeks ways to allow relies on sophisticated federation you’ve put into your social accounts
individuals to manage their own protocols such as OpenIDConnect. The could be available to the third-party
personally identifiable information (PII) advantage for you is convenience. site owner. This obviously has privacy
instead of using a central authority. and security implications.
An important goal of decentralized Decentralized identity flips these
identity is to create standards that will centralized IAM models on their head. So decentralized identity also flips
allow internet users to control which With decentralized identity technology, this broad-ranging data gathering on
applications and services can have instead of entering a username and its head. With decentralized identity
access to specific types of PII. password or doing a social login, you technology, you would initially disclose
would create your own identity in an one of your decentralized identifiers
Let’s break it down. This definition identity wallet. You would bring that (DIDs) to the service to set up a
has three important concepts: identity to the website or service and connection. This allows the service to
create a peer (also called a pairwise) identify you for subsequent accesses
1. Identity and access management connection with that service. The and authenticate you using public key
(IAM) advantage of creating the connection is cryptography. You no longer need a
2. User control of their personal that it allows for end-to-end encrypted password. You then negotiate with
information (PII) communication, strong authentication the service what additional personal
3. Standards and so on. information you consent to give to the
service. Technology called verifiable
Identity and access management Now let’s consider the second part
credentials (digital documents issued
(IAM) refers to the way you access an of the definition: user control of their
with digital signatures) makes this
online service, such as a website or personal information (PII). In my view,
possible.
social media site. The first type of IAM the two centralized IAM models are
model implemented, and the most designed to behave exactly opposite to Let’s now look at the third important
common, is centralized. We all know this goal. Those models encourage you concept in the definition: standards.
this approach, since it involves creating to disclose as much of your personal Arguably the most important goal of
an account on a service. Typically, when information as possible, and collect the decentralized identity community
you create an account you give the site even more by surveilling your activities is to define a set of standards to
a username, password, perhaps set up covertly. This is particularly bad with allow interoperability for users and
two-factor authentication (2FA), and social login, where you are actually services—essentially, an interoperable
give other personal information such helping the central site (e.g. Google) decentralized identity ecosystem.

CAN DECENTRALIZED IDENTITY GIVE YOU GREATER CONTROL OF YOUR ONLINE IDENTITY?
41
The standards being defined are mainnet blockchain.” If you were to A well-designed identity wallet
at standards bodies such as World provide that DID to a service or another shields you from the complex
Wide Web Consortium (W3C), user, it would be resolvable to an technical information I’ve described.
Linux Foundation (Hyperledger and address on the Sovrin mainnet where From your perspective, you create
TrustoverIP), and Decentralized Identity the DIDDoc could be returned. The your decentralized identity and
Foundation (DIF). DIDDoc contains your public key and take it out and use it. Complexities
an address where to reach you. around cryptography, endpoints, and
Now we have touched on the high blockchains are not that interesting to
level concepts, let’s dig a bit deeper into There is a lot to unpack in that the everyday user.
the decentralized identity technology. paragraph.
So, to answer the question we
Identity wallet Sovrin is a Hyperledger Indy- started with: can decentralized identity
based blockchain specifically built give you greater control of your online
As the user, your view into for decentralized identity. Being identity? Clearly yes.
decentralized identity is via an identity a permissioned blockchain, it is a
wallet. The wallet allows you to create network of validator nodes (twenty four I’ll leave it there for now. This is
your decentralized identities and for each of the three Sovrin networks: the first in a series of articles on
connections with other users and mainnet, staging, test). It is designed decentralized identity from Anonyome
services, and to receive, hold and to support decentralized identity- Labs. In future articles I’ll discuss:
present verifiable credentials (your based applications. Anonyome Labs
digitally signed digital documents). is one of the founding stewards of • Decentralized identity focused
Sovrin, meaning we have been running blockchains
First, you need to get an identity
a validator node on the Sovrin network
wallet. There are a few different ones • Decentralized identity verifiable
for over three years now. Think of a
out there; one example is the Lissi credentials
validator like a bitcoin miner.
wallet (lissi.id/mobile), which is a mobile
application purposely built to allow the • Identity (data) hub concept
A blockchain is used for decentralized
user to participate in a decentralized identity because it provides an anchor • Real world projects leveraging
identity world. for trust. Not only can you write your decentralized identity
DIDs to the blockchain, but other
The wallet is designed to hide much
parties, such as verifiable credential • The key decentralized identity
of the complexity of decentralized
issuers, can write credentials definitions standards, and more.
identity, but let’s cover some detail
and their own DIDs (unique identifiers)
here. When you create your first
as well. Because the blockchain is
decentralized identity, you are in fact
immutable (can never be altered, only
creating a private/public key pair
added to), there is no way for a hacker
(usually based on Elliptic Curves, e.g.
to modify the information on the
ec25519) and a unique identifier called
blockchain.
a DID. A DID is a simple text string
consisting of multiple parts: DIDDoc is also important. The DID
points to a location on a blockchain
did:indy:sovrin:7Tqg6BwSSWapx-
gUDm9KKgg so that a DIDDoc can be retrieved.
The DIDDoc gives the decentralized
The string above has this meaning: “I identity’s public key (for establishing
am creating my decentralized identity connections) and an address that can
following the Indy DID method, and be used to reach you as the user.
the identity is anchored on the Sovrin

Astropost

Want to support this free magazine? We'd love it if you


sponsored us by promoting your product or service with a
full-page, half-page, or quarter-page ad!

Don't have an ad design? Our partners at Astropost would

UNREDACTED
love to build you an awesome, magazine-ready ad!

Click this banner or go to UNREDACTEDmagazine.com for


details. THE PRIVACY, SECURITY, & OSINT MAGAZINE
PRIVACY-THEMED
PUZZLES
By Steve Holt

The answers to the crossword puzzle


can be found within the word search to
the right and on the following page.

Editor’s Note: We are always looking


for privacy-themed puzzles, including
crosswords, word finds, and anything
else you might create. Send us your
best submission for next month’s issue.

PRIVACY-THEMED PUZZLES
43
FINAL THOUGHTS CROSSWORD ANSWERS
19. Red
16. Dashcam
15. CTF
By Michael Bazzell 11. Engineering
I am already thinking about the July issue. While I have a few articles brewing
9. IoT
in my head, this magazine cannot be completed without you. Please send your
8. qwerty
contributions sooner rather than later if you would like to be published within
7. Phishing
the next issue. I sincerely thank everyone who contributed to this second release.
6. Anonymous
I look forward to seeing what you come up with next.
4. Backups
2. Alias
~MB 1. Genymotion
Down

20. HTTPS
18. Monterey
17. Ransomware
14. OPSEC
13. Linux
12. SIM
10. IntelTechniques
5. Data
3. Yubikey

AFFILIATE LINKS
Across

If you would like to support this free publication, please consider using the following affiliate links. If you plan to purchase
any of the items below, or other items from the vendor (such as Amazon), the following links provide a small financial
contribution to us without costing you anything extra. We see nothing about you or your order.

Extreme Privacy Book (Amazon): https://amzn.to/3D6aiXp


OSINT Book (Amazon): https://amzn.to/3zoMZpZ
ProtonVPN VPN Service: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519
PIA Dedicated IP VPN Service: https://www.privateinternetaccess.com/ThePSOSHOW
ProtonMail Encrypted Email: https://go.getproton.me/aff_c?offer_id=7&aff_id=1519
Fastmail Business Email: https://ref.fm/u14547153
SimpleLogin Masked Email: https://simplelogin.io/?slref=osint
Silent Pocket Faraday Bags: https://slnt.com/discount/IntelTechniques

UNREDACTED MAGAZINE / JUNE 2022


44
VARIANT DETECTED.
Websites and graphics.
For businesses who
respect privacy.
Be a variant.

Astropost is the official design partner for this issue


Astropost of UNREDACTED MAGAZINE. Need an ad designed
for the magazine? We’d love to help you out!
New 2022 Privacy & OSINT Books
Hardcover & Paperback

New & Updated Content

500+ Pages Each @ 8.5 x 11

Our Full Playbooks

Supports This Free Magazine

Order at IntelTechniques.com

OSINT & Privacy Video Training


90+ Hours of Video Training | Optional OSIP Certification

Register at IntelTechniques.net

You might also like