TER General Board

Keeping the Hobby Separate: Set up a private "hobby box" within your current computer.
Blowing Chunks 2124 reads
posted

Setting up separate accounts on your computer is in fact the simplest way.  But this method goes a bit further in separation while giving you mobility that a physically separate computer can't. It resides privately within your account. You don't need a physically separate computer to keep a separate hobby PC. You can make one within your current laptop. All you need is a virtual instance running within your own PC to accomplish this. It's a good idea to keep the hobby separate from the real world as much as possible but you also probably want easy access to it too while on the go. If you use facebook, twitter, linked in, this makes it much harder to mix your personal accounts since you're in essence keeping it on a virtual separate computer where, aside from the ip, cookie crumbs and session histories are not mixed/intermingled.  

1. Download & Install Virtualpc or Virtualbox.  Mac users can use "Parallels" too but that might not be free.
2. Run it and create your new virtual computer of choice.  
3. Install whatever Operating System you like on that new virtual computer you just created.  

Curly's relative explains how. :) Step by Step.  

http://www.youtube.com/watch?v=rt8wrKBKrt0

That's it!  

If you have an extra copy of Windows 7 or windows XP laying around somewhere, that would likely be the easiest. If you don't have another Windows OS you can always try out any of the Linux OS out there, such as "LinuxMint", "Ubuntu", Fedora, etc. They aren't any harder to use than Windows and it's based on similar technology behind Android OS/Mac OS X, and they are free.  

PS: Another way to keep it all separate: Download one of the linux "LIVE" ISO files mentioned above, burn it onto a CD or USB drive, and boot from it. It's like having a separate OS and nothing personal is kept on the drive when you remove it. This is also a way to keep the hobby separate. Follow this video for instructions
http://www.youtube.com/watch?annotation_id=annotation_1808746809&feature=iv&src_vid=DrJgeuloNVU&v=iK0wln8NIkg

PPS: For the paranoid: in many linux os during installation there's an option where you can encrypt the whole virtual drive to some ridiculously high level of security

Snowden explains how to set up email encryption https://www.youtube.com/watch?v=9mvf8VwVjJY

Email encryption (1 hr video!) https://www.youtube.com/watch?v=OoGfkSLOKkE

More providers should do this so that clients can use it too.  It's USELESS unless BOTH parties use it.

First wave hit when the Internet became wide spread.  
This allowed us to go from the streets to the hotel rooms.  

And then when we were able to see reviews of escorts from sites like TER  
This allowed us some degree of seeking out quality and avoiding rip offs

But now we're seeing mysterious cell towers, NSA snooping,  etc which means hobby world needs to adapt yet again to the changes.  

Sure they want to eaves drop on terrorists but never assume that they aren't capable of reading our emails or tapping our hobby phones. Why make it easy for others to snoop in?

What do you think about the "Virtru" add on? Personally...its free so it won't completely ease my paranoia enough to introduce it into my email system, but I think its cool as far as getting the population as a whole to understand the privacy level of encryption.  

There are a few services out there that offer email encryption and if the recipient doesn't use it, they send them to a sort of portal or whatever where they can respond. I noticed an agency doing this after the affidavit was public for the latest (I believe it was the latest) bust and always wondered what it was about. I think of "shipping" when I think of internet traffic, so I just thought it was some unique way of throwing eavesdroppers off their trail, but now that I'm actually doing my own research on email encryption options I realize thats what they are doing. LOVE IT!

I'm a bit of a geek, so I have a little project that may take months to complete....but I'm trying to figure out a way to introduce this while not being so different that it scares my lovers off. Gotta make an incentive that keeps them entertained. Even though it is safer, change is a bit difficult to accept even if its better. So I have some work to do.  

Anyway, THANK YOU for sharing. If this were twitter, you would have a follower. If this were a blog, you would have a subscriber. :-D I need all of the resources I can get with life beyond the VPN. Speaking of VPN, even that requires careful consideration and sign up. My plans for the biz are not ambition to really need the level of security I am after, BUT I'm meticulously discrete and it will only translate to a better experience because it will boost my own confidence. The more secure, the more confident for me.

Are you trying to get laid or break into your local bank....

Jesus Fuckin' Christ.... Put down that bottle already... :D

I have used Virtual Box for ages, but its usually because some of the software that I have doesn't have a very good Mac option, and I hate to buy a Windows box just for that...

Nerrrrrrrrrrrrrrrddddddddddd Alert !!!

-- Modified on 9/6/2014 8:11:27 AM

For many years, Apple computers have shipped with Bootcamp included. We use this utility to install any other OS of choice and run the computer as dual-boot. Setup takes about 2 minutes, plus the other OS's natural installation time.

With their flash drives, MacAir & the new Macbooks boot rather fast, so its' just a case of issuing the restart command and holding down the option key ;-)

My MacAir runs Mavericks & Windows 7

I am aware of the bootcamp but never explored it.  With Virtual Box you can run multiple OS'

But I'm with you on virtualization.  So easy to tab between different OS's and not have to reboot into windows.  Nerd party at the Gamestop tomorrow.

Cowboy5555466 reads

I use it to access this site, BP, reviews and my hobby gmail. Very simple to install and gives you a satisfactory level of privacy and protection

client_number_9560 reads

Do NOT just grab the TOR bundle and blindly install, it has been compromised on many occasions.

http://www.wired.com/2014/08/operation_torpedo/

"When security researchers analyzed the code, they found a tiny Windows program hidden in a variable named “Magneto.” The code gathered the target’s MAC address and the Windows hostname, and then sent it to a server in Virginia in a way that exposed the user’s real IP address. In short, the program nullified the anonymity that the Tor browser was designed to enable"

Register Now!