THE NSA KNOWS EVERYTHING!!!

The NSA has been getting a lot of coverage about it’s spying tactics. What does it know? Is it acting illegally? This is an American perspective about an American agency, so while this isn’t directed towards the rest of the world, it may be helpful to know.

LINKS USED IN THIS VIDEO:
http://www.zeit.de/datenschutz/malte-spitz-data-retention
http://immersion.media.mit.edu/viz#
http://www.buzzmachine.com
http://www.eff.org
http://www.fightforthefuture.org

Prevent Being Tracked Online!

With recent events regarding Edward Snowden and the NSA, it’s hard to tell who’s watching us and what is private. This video will show you some free tools to ensure that you aren’t being tracked.


Follow Tinkernut!

Google + http://goo.gl/1dmi1

Facebook http://www.facebook.com/tinkernut

Twitter http://www.twitter.com/tinkernut



Ghostery – http://www.ghostery.com/

“Do Not Track Me” – https://www.abine.com/dntdetail.php


Disposable E-mail Addresses – http://10minutemail.com/

Fake Phone Numbers – http://lifehacker.com/5994262/burner-brings-disposable-phone-numbers-to-android-for-private-calls-texts-and-more


Mailvelope – http://www.mailvelope.com/


CyberGhost – http://cyberghostvpn.com/

How To Make Your Own Encryption

****UPDATE: DOWNLOAD THE PROJECT FILES****

This video lays out the steps for creating a very simple encryption and decryption program using free tools. The programming language we will be using is VB Script.  See if you can decrypt this text:

wkjlue#vnrro#huxwxi#uxr\


The code below is for the encrypting program:

<—–Start copying below this line—–>
‘SIMPLE VB ENCRYPTION PROGRAM
‘Create a dialogue box that asks for the text to encode
set x = WScript.CreateObject(“WScript.Shell”)
mySecret = inputbox(“Enter text to be encoded”)
‘Reverse the submitted text
mySecret = StrReverse(mySecret)
‘Open up an instance of Notepad to print the results after waiting for 1 second
x.Run “%windir%\notepad”
wscript.sleep 1000
x.sendkeys encode(mySecret)’This function encodes the text by advancing each character 3 letters
function encode(s)
For i = 1 To Len(s)
newtxt = Mid(s, i, 1)
newtxt = Chr(Asc(newtxt)+3)
coded = coded & newtxt
Next
encode = coded
End Function
<—-Stop copying above this line——>
<—–Start copying below this line—–>
‘SIMPLE VB DECRYPTION PROGRAM
‘Create a dialogue box that asks for the text to encode
set x = WScript.CreateObject(“WScript.Shell”)
mySecret = inputbox(“Enter text to be encoded”)
‘Reverse the submitted text
mySecret = StrReverse(mySecret)
‘Open up an instance of Notepad to print the results after waiting for 1 second
x.Run “%windir%\notepad”
wscript.sleep 1000
x.sendkeys encode(mySecret)’This function encodes the text by advancing each character 3 letters
function encode(s)
For i = 1 To Len(s)
newtxt = Mid(s, i, 1)
newtxt = Chr(Asc(newtxt)-3)
coded = coded & newtxt
Next
encode = coded
End Function
<—-Stop copying above this line——>
<—–Start copying below this line—–>
–Applescript encryption program
set words_to_encrypt to “I want to encrypt sentences. Not just words!”
set multiplier to 5
set charList to {“a”, “b”, “c”, “d”, “e”, “f”, “g”, “h”, “i”, “j”, “k”, “l”, “m”, “n”, “o”, “p”, “q”, “r”, “s”, “t”, “u”, “v”, “w”, “x”, “y”, “z”,”A”, “B”, “C”, “D”, “E”, “F”, “G”, “H”, “I”, “J”, “K”, “L”, “M”, “N”, “O”, “P”, “Q”, “R”, “S”, “T”, “U”, “V”, “W”, “X”, “Y”, “Z”, “1”, “2”, “3”,”4″, “5”, “6”, “7”, “8”, “9”, “0”, ” “, “~”, “!”, “@”, “#”, “$”, “%”, “^”, “&”, “*”, “(“, “)”, “_”, “+”, “{“, “}”, “|”, “:”, “\””, “<“, “>”, “?”, “`”, “-“,”=”, “[“, “]”, “\\”, “;”, “‘”, “,”, “.”, “/”, “a”}considering case
–get a list of numbers for the words corresponding to the item numbers of the characters in charList
set p_letter_list to text items of words_to_encrypt
set p_num_list to {}
repeat with i from 1 to (count of p_letter_list)
set this_letter to item i of p_letter_list
repeat with j from 1 to count of charList
set this_char to item j of charList
if this_letter is this_char then
set end of p_num_list to j
exit repeat
end if
end repeat
end repeat
–encrypt the numbers
set modulus to count of charList
set c_num_list to {}
repeat with i from 1 to (count of p_num_list)
set p_num to item i of p_num_list
set c_num to ((p_num * multiplier) mod modulus)
set end of c_num_list to c_num
end repeat
–get the characters for the encrypted numbers corresponding to the characters in charList
set c_letter_list to {}
repeat with i from 1 to (count of c_num_list)
set this_item to item i of c_num_list
set end of c_letter_list to (item this_item of charList)
end repeat
–coerce the encrypted characters into a string
set c_string to c_letter_list as string
end considering
<—-Stop copying above this line——>

Hacking Tip: How To Use Proxies





Proxies are great for surfing the web anonymously. This video will show you how to set up them up and use them.

Proxify – http://proxify.com
HideMyAss – http://hidemyass.com
WhatIsMyIPAdress – http://whatismyipaddress.com
Foxy Proxy – https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard
Proxy Switchy – https://chrome.google.com/webstore/detail/caehdcpeofiiigpdhbabniblemipncjj
Tor Project – https://www.torproject.org
IP Hider – http://www.allanonymity.com/ip-hider-hide-ip-software
Tutorial on using IP Hider –

Firesheep is a hacking program that can steal the facebook and twitter accounts of anyone on a shared Wi-Fi connection. This video will show you how to protect yourself against that.

Firesheep – http://codebutler.github.com/firesheep
Idiocy – http://jonty.co.uk/idiocy
Fireshepard – http://notendur.hi.is/~gas15/FireShepherd
HTTPS Everywhere – https://www.eff.org/https-everywhere