Tunisian ciphers

In Tunisia, it has been reported, that the government hijacks Facebook accounts, e-mails and possibly other sensitive information.

This is indeed very dangerous, and here are a few security tips along the way. They may or may not work, but for sure they will keep your browser more secure not to get hijacked in the future.

1. Get the Firefox.

2. There is a Greasemonkey script, which deletes the last attempt at phishing accounts from your computer. Reports however indicate that the attack is no longer in use by the government. To install anyways, follow these instructions. (You will need to install the Greasemonkey addon and restart Firefox).

3. To prevent future attacks, they may be rough, it is good to secure the Firefox browser a bit more. Since encrypted web traffic has been switched off at times, you may be able to increase security with the https-everywhere add-on. If it detects a site that uses encryption, for example Twitter, it will choose https://twitter.com version instead of the unencrypted one. This is generally a recommended add-on which I use everyday. The more we encrypt, the more secure the internet becomes.

4. If future hijacking code is written in javascript, the NoScript addon may prevent or at least warn if there is an attack. By default it blocks all javascripts on a site, and you only allow the ones you trust. It comes very handy to all of interweb, and it makes surfing a lot more pleasurable and faster.

Oh, and these measures I use everyday, and they are recommended also for average users.

Take it easy and good luck.

By the way, concerning the mirror tutorial in the previous post, I also set up a Tor hidden service on hsctwsqfsl7ejbh7.onion/tnvideos/. By accessing that one over the Tor network, your traffic will be end-to-end encrypted, and you will barely leave any traces. But keep in mind it will be very slow. Go to Torproject.org to get the Tor software.

4 reaktioner till “Tunisian ciphers”


E-postadressen publiceras inte. Obligatoriska fält är märkta *

Time limit is exhausted. Please reload CAPTCHA.