Now you're talking vulture capital capabilities, if you can answer these
questions
millions of dollars and users await your products, thanks to Edward
Snowden.
Consider asking the coach, pastor, BFF, mentor, online advisor (no
offense
Gadit but you fit the predator profile) to take you home to use
his/hers/trans
computer which will have the latest cloaking tools, including those
which
block, divert, trash, evade, deep six, anon-legionize, the most devilish
meddlers
promoting villainous affairs to advance their villainous careers, aka
kiddie porn
watchdogs tutored by natsec spooks. Prepare to be stripped naked in the
sauna,
like Jake Appelbaum, like beloved overseers of all stripes, phones into
the
lead-lined chest, to guard against you being a babe to entrap the beloved
wizened overseer (sorry Bart, no offense but you fit Jake's
profile).
Cpunk archivist popped up when this topic tripped its sensor to say hear
ye,
this is the 4,096th time the helpless kid bait has been set here.
Undercover
careers begin with tapping into online fora to test homebrewed
mousetraps,
the most common being a kid with troubled parents, next most Tempest
signals
being emanated by latest, most compulsive child bewitched by the awesome
freedom of personal devices, next ex-spies with unbelievable stuff to
shatter
the empire of those who know shit shoveling into into those whose diet is
limited to shinola.
If you advise the kid to stay away from personal devices connected to
the
rest of the world, that will get you a visit from connection authorities
accusing
you of treason. Show your credentials by yelling accessible
encryption.
At 01:17 PM 5/31/2015, you wrote:
On Sat, May 30, 2015 at 10:24
PM, Gadit Bielman
<
thetransintransgenic@gmail.com> wrote:
- Hi.
- I'm trying to help (probably badly, but..) a friend deal with parents
that they expect are spying on them.
- I know that in general, it's impossible to secure a computer that you
can't trust and don't necessarily have administrator privileges
to.
- But their parents are not exactly the NSA -- any spying that's
happening is almost definitely some sort of product, plus basic things
like maybe looking through their history. (I don't know much about
they're situation -- maybe they know more, so
well-if-you-know-they-do-this-then-you-could-do-this type advice would
still be helpful.)
- Would antivirus be able to detect spy-on-your-kids products? Would
they be able to scan their computer with like Immunet or something, even
if they didn't have administrator privileges?
- Tor would probably help -- unless the monitoring was looking at the
RAM or something for website names, which would be way overkill on a
commercial product, no? Or (more likely) if it was taking screenshots at
regular intervals, which would also break running a VM or something. (Is
there any way to detect taking screenshots?)
- I know probably the best thing would be running TAILS as a LiveCD --
the problem with that is that it's REALLY obvious
over-the-shoulder.
- Um, thoughts about any of those?
- Any other things about parents as a threat model in general?
- I know this is pretty far from what is usually discussed on here, but
I'm really interested in what you think/it would potentially help a lot
of people.
Okay so I've gotten a few responses to this, so just to clear a few
things up:
-- I don't know this person IRL -- I'm giving them advice over online, so
can't look at their computer, give them anything, etc.
-- I don't know what spyware program is being used, that is one of the
"can someone/how can someone do this" questions I am
asking
And one major thing, which forgive me for getting kind of annoyed but
literally everyone has either directly suggested this or ignored the
issue:
Parents monitoring/spying on their kids is VERY OFTEN part of an abusive
or nearly abusive relationship.
If "Just talk to them" was an option, I can GUARANTEE they
would already have taken it to the best of their ability.
"Just talk to them and install linux -winkyface-" is NOT a
workable answer.
Parents have a HUGE amount of coercive power and are NOT shy about using
it.Â
And for that matter, "wipe it and install linux" is really
unlikely to work either. Rubberhose Cryptoanalysis is in full play here
-- a PRIMARY goal is "hide it from your parents as much as
possible", because confiscating your computer for arbitrary periods
of time is ALWAYS AN OPTION. If they find something password protected,
they are totally capable of just saying "haha, stop playing around,
you're grounded and we're confiscating the computer until you stop being
unreasonable and give us the password".
Also, an arbitrary kid at home isn't gonna be able to just install Linux.
Linux requires you to /know what you're doing on Linux/, and these kids
have their hands full dealing will everything else their parents overbear
already.
Thought outline::
-- Find out or narrow down the ways their parent might be monitoring them
software-wise
---- Is there Spyware installed on the computer itself?
------ detecting: is there a list they can look through "My
Programs" to see if any matches? Would doing a full scan with a free
antivirus detect them as spyware, or would there be "this is a
commercial product for parents" exception to the lists?
------ assessing: if they can find which spyware is being use they can
just look up the capabilities. But if they can't? What capabilities do
most child-spyware products have? Is it possible to narrow down by
price-range for what they can afford?
---- Is there spyware running on the network? Traffic monitoring and
stuff?
------ That's harder to find, but using the Tor Browser should completely
negate that
---- bypassing softwarewise-things:
------ depends entirely on the capabilities. At the most simple, they can
be bypassed by just not using the normal browser. More complicated and I
can totally imagine a Superfish-like-thing monitoring all internet
traffic -- even HTTPS -- for keywords. Is constant screencapture a common
feature that we need to worry about?
-- Non-software-based things:
---- Manually looking through browser history: again, Tor Browser doesn't
keep history
---- Demanding access to email account: use one for
school/parent-friendly stuff, and create a secret one.
---- What else is there?
e.g.: Here's the parental controls/monitoring built into Windows 8:Â
http://windows.microsoft.com/en-us/windows-8/monitor-child-pc-activity
(For the specific case that I'm asking about, I don't think they have
Windows 8, but other versions of Windows probably have similar
capabilities)
And here's a top-ten comparison for child-spying software:Â
http://parental-software-review.toptenreviews.com/
Would that be able to track the websites visited by the Tor
Browser?
So specific questions to start:
What if any free antivirus, running with user permissions, would detect
commercial spy-on-your-child-ware?
If they're running a LiveCD/LiveUSB (you're right, probably USB --
faster, more common, easier to excuse for, and persistence), how well can
it be disguised as the original operating system? How much of that work
can be done by people who aren't the child, so that the child can have as
much of a plug-and-play experience as possible?
Besides actively taking screenshots, are there any other potential issues
for the Tor Browser? e.g. is looking at RAM (unlikely for a commercial
parent-spy software?), scanning throughout the entire filesystem looking
for bookmarks (Also seems over the top if the Tor Browser is kept in a
not-completely-obvious location?), other capabilities?
Again, I don't know them at all IRL, so I can't look at their machine,
help them install/inspect things, etc.
And in general, I think it would be really valuable if we can create
will-work-for-70+%-of-people tactics that a kid/teen online can take to
get around their parents, so it would be great if we mapped out more a
general threat model for parents, and possible responses to
that.
Thanks.