View previous topic :: View next topic |
Author |
Message |
Fulgurance Veteran
Joined: 15 Feb 2017 Posts: 1201
|
Posted: Sun Feb 03, 2019 12:25 pm Post subject: How to mask OS and my browser on Web ? |
|
|
Hello, i have question. To enforce my confidentiality and security on Web, i search how it's possible to mask my OS and my Web Browser. Is it possible ?
And is it possible to encrypt my keyboard inputs ? |
|
Back to top |
|
|
system.shock n00b
Joined: 06 Jan 2019 Posts: 35
|
Posted: Sun Feb 03, 2019 3:15 pm Post subject: |
|
|
Is changing http header user-agent and turn off all javascript not enough? |
|
Back to top |
|
|
fedeliallalinea Administrator
Joined: 08 Mar 2003 Posts: 30946 Location: here
|
Posted: Sun Feb 03, 2019 3:31 pm Post subject: |
|
|
See here _________________ Questions are guaranteed in life; Answers aren't. |
|
Back to top |
|
|
Hu Administrator
Joined: 06 Mar 2007 Posts: 21691
|
Posted: Sun Feb 03, 2019 4:51 pm Post subject: |
|
|
You could set a firewall rule to block all outbound traffic to the http and https ports. This would prevent you from connecting to websites, which should mask your configuration quite effectively.
Could you explain why you want this? The request seems like an X-Y problem. |
|
Back to top |
|
|
Fulgurance Veteran
Joined: 15 Feb 2017 Posts: 1201
|
Posted: Mon Feb 04, 2019 10:41 am Post subject: |
|
|
It's just to learn more how to enforce security and how it's possible to do that.
How can i crypt my input ?
It's for example to escape to keystroke logging. |
|
Back to top |
|
|
Fulgurance Veteran
Joined: 15 Feb 2017 Posts: 1201
|
Posted: Tue Feb 05, 2019 5:22 pm Post subject: |
|
|
Nobody? |
|
Back to top |
|
|
timeBandit Bodhisattva
Joined: 31 Dec 2004 Posts: 2719 Location: here, there or in transit
|
Posted: Tue Feb 05, 2019 6:33 pm Post subject: |
|
|
Keystroke loggers record your...wait for it...key strokes. As in, which keys you press, one by one. So how is encrypting input, after you've typed it but before it is sent to a web application, supposed to defeat something that records which keys you press? Unless you can encrypt data in your head (or on an adjacent, physically disconnected machine) and key in the resulting ciphertext, encryption in this scenario is not quite like closing the barn door after the horse escapes. It's more like waiting until the horse is outside in plain view before trying to disguise it as a panda.
Apart from that, encryption at the client is useless without a partner to decrypt it at the server. Ignoring the intractable problem of encryption-key management, the vast majority of the Internet won't be able to decrypt your input--and if it could, interested parties would simply log the decrypted result. _________________ Plants are pithy, brooks tend to babble--I'm content to lie between them.
Super-short f.g.o checklist: Search first, strip comments, mark solved, help others. |
|
Back to top |
|
|
ct85711 Veteran
Joined: 27 Sep 2005 Posts: 1791
|
Posted: Tue Feb 05, 2019 7:35 pm Post subject: |
|
|
Pretty much, the main way to avoid key logging, is to use a virtual keyboard (have fun point and clicking each key). Doing a quick search, 2 possible examples would be florence, and possibly dasher (neither in the official tree), nor do I know how well they work. Either way, as others said, key loggers generally are client side or physical item (in between keyboard and system, or software logging as they come in). Physical side, you should easily be able to see and deal with. Software based, means your system is already compromised and you probably have more to worry about. Another possibility on a physical, could very be more of in a form of a camera recording what you are doing, in which case you can think of a solution on that.
Another possibility to avoid a key logger, is keeping your machine air-gapped (no outside communication, like no internet, usb, disk/cd, etc...). That option really kills the functionality of the system, to nearly being a large paper weight. (Its kinda hard to communicate any logged keys if it can't communicate anywhere.) |
|
Back to top |
|
|
|