/d/OpSec

N/A subscribers

N/A


Plausible Deniability Protection for an .onion Service (SSH + USB + Physical intrusion detection, automatic mail notifications, emergency shutdowns)

by /u/nihilist1 · 0 votes · 2024-04-01 15:11:00

Hi all, check out my latest tutorial on how to protect your sensitive services running at home from a veracrypt hidden partition:

http://blog.nihilhfjmj55gfbleupwl2ub7lvbhq4kkoioatiopahfqwkcnglsawyd.onion/servers/physicalsecurity/index.html

any feedback is appreciated :) i'll update the tutorial accordingly if there are any obvious security flaws.

I cover how to detect if there is any movement in the room where the server is (using a cheap usb webcam), detecting if there is any ssh intrusion into the server, detecting if there is any usb change onto the server, and also explaining how the server runs an automatic emergency shutdown script in case if there is any intrusion whatsoever, to keep the volume hidden from an adversary.

In a future tutorial i'll cover the threat of an internet/power outage by explaining how to run endgame v3 for the .onion service.

sidenote: if you think some part of my tutorials doesn't make sense and is risky, make sure you tell me what you recommend instead so i can improve my tutorials accordingly

Comments (14)
/u/LondonKnives · N/A votes · 2nd April, 2024 - 14:05 · Link

I see the effort you put into your articles, the images and the diagrams... all very impressive. It must take a lot of time and effort. But some of the advice will be sending people straight behind bars. I've skimmed through a few of your articles and I'd like to address a few points. 1. At least read Veracrypt documentation before writing guides about how to use Veracrypt. Hidden Volumes are detectable on devices that utilize wear-leveling. 2. You recommend backing up files with hidden volumes to cloud but changing a few things in the hidden partition before. It won't work because AES and other algorithms are block ciphers. Block! The file is not entirely re-encrypted. Only some blocks are changed. If the cloud provider secretly keeps versions you will lose all plausible deniability after you upload the container second time. Read: Veracrypt /en/Security%20Requirements%20and%20Precautions.html 3. The entire "Shifting from a public to an Anonymous online persona". Do you seriously think that LE will go "Oh, he sold his website to an anonymous person using Whonix. Nothing to see here. Case closed." NO. You'd only get to present your fake little conversations in court. Likely by that time you're already fucked. 4. Hosting public Tor services from home. Tor is a good tool but it isn't magic. Be smart and don't host public (and legally questionable) services from your own network. Hidden Volume should be your last line of defense, something you hope will never be useful. Don't be like "ha ha come and take me down LE shits, I've got hidden volumes ready". I don't want to be discouraging but careless security measures ruin lives. Stay safe.

/u/nihilist1 · N/A votes · 2nd April, 2024 - 15:57 · Link

>1. At least read Veracrypt documentation before writing guides about how to use Veracrypt. Hidden Volumes are detectable on devices that utilize wear-leveling. yea i forgot to mention that detail, will note in my tutorials to not trust ssds for the same, and prefer HDDs >2. You recommend backing up files with hidden volumes to cloud but changing a few things in the hidden partition before. If the cloud provider secretly keeps versions you will lose all plausible deniability after you upload the container second time. I shoudl've already address this in the tutorial you mentioned, maybe badly formulated it http://blog.nihilhfjmj55gfbleupwl2ub7lvbhq4kkoioatiopahfqwkcnglsawyd.onion/servers/plausiblydeniabledataprotection/index.html "goal is that for each veracrypt hidden volume changes that occur, the content of the decoy partition must also change because otherwise it will reveal the existance of the hidden volume if the remote server keeps the previous versions of each file." meaning the decoy partition must justify the overall volume changes >3. The entire "Shifting from a public to an Anonymous online persona". agreed it's a preety incomplete tutorial i'll have to go back over and update. Why isn't just going through KYC-free services with tor and monero alone to simulate a "i've sold my services to someone else, since that date" enough to justify you no longer own the service ? of course as mentionned in there, idea is to operate the services only from the whonix VMs in the plausibly deniable partition, if you can't prove those VMs exist, then you can't prove that you are still the owner of the services right ? of course i'm assuming in this case that whoever does this is innocent until proven guilty. >4. Hosting public Tor services from home. Be smart and don't host public (and legally questionable) services from your own network. what do you recommend then ? hosting tor services from your friend's house ? trusting a cloud provider to run a sensitive service, (putting himself and his business at risk in the process) and to not snitch ? Of course i know how to acquire a server anonymously and use it anonymously, but i'm also looking at the longevity of the service here. would be interested in hearing what other threat vectors you identified when running an onion service from home.

/u/Hourglass · N/A votes · 1st April, 2024 - 16:01 · Link

Very nice post man!

/u/cocainehippy · N/A votes · 1st April, 2024 - 16:45 · Link

Interesting, quality post.

/u/Growler · N/A votes · 1st April, 2024 - 16:51 · Link

A very cool concept. Your blog is pretty interesting too. I wish I had enough technical understanding to give you some proper feedback.

/u/TheInfoMerchant · N/A votes · 1st April, 2024 - 17:26 · Link

Great tutorial and great blog all-around. Thanks for sharing your insights.

/u/eos · N/A votes · 1st April, 2024 - 19:46 · Link

(i like the image of lain on your main page :3)

/u/chrome · N/A votes · 1st April, 2024 - 20:07 · Link

Stellar writeup !

/u/MunchosMojitos · N/A votes · 1st April, 2024 - 20:37 · Link

Nice Yed graphs :-D Thanks for sharing!

/u/nihilist1 · N/A votes · 1st April, 2024 - 20:41 · Link

love yEd, minimalistic software, all that's needed to make simple or complex graphs

/u/EmpBomb · N/A votes · 2nd April, 2024 - 00:16 · Link

10/10 Very good tutorial Easy to understand even for someone who's not that tech-savvy.

/u/psychonut · N/A votes · 2nd April, 2024 - 01:05 · Link

This is a nice post, but why run servers at your home anyways? You're asking for trouble.

/u/nihilist1 · N/A votes · 2nd April, 2024 - 06:15 · Link

Care to elaborate what trouble there is exactly ? i could mention that the server should sit behind a pfsense router (open source router to avoid any ISP spying on the local network) as for why running a server at home, i mean who hasn't heard of cloud providers reporting to the authorities that some sensitive service is running on their rented server? I definitely would consider running some sensitive service at home rather than having to trust a cloud provider to keep a service hidden given that they will most likely comply with any request from authorities

/u/zuberdriver · N/A votes · 2nd April, 2024 - 01:53 · Link

I would not use email, if you wanted any sort of real time notifications your email client would have to be online permanently and email has some opsec risks. Also, the emergency shutdown, data should be wiped not just volume deletes. You may be reasonably safe with the encrypted volumes I do not know. Plus ssd drives, deleted data is still there but just marked as deleted? Use old fashioned wipeable hard disk drives though they take forever to wipe. I do feel a bit uncomfortable replying to this seeing a hostname Wonderland in the tutorial terminal.

/u/nihilist1 · N/A votes · 2nd April, 2024 - 06:12 · Link

>I would not use email, if you wanted any sort of real time notifications your email client would have to be online permanently and email has some opsec risks. should be online 24/7 if you use a remote mail server, care to elaborate what opsec risks are there exactly ? let's assume you use either of that smtp mailserver setup (as mentionned in the tutorial) : http://blog.nihilhfjmj55gfbleupwl2ub7lvbhq4kkoioatiopahfqwkcnglsawyd.onion/servers/mailprivate/index.html >Also, the emergency shutdown, data should be wiped not just volume deletes. the whole point is that it's only closing the veracrypt hidden volume, since at rest without having it opened, it should be impossible to prove that there is a hidden volume. Feel free to correct me if i'm wrong though, but so far i didn't find any articles detailing that it's possible to prove the existance of a veracrypt hidden volume > You may be reasonably safe with the encrypted volumes I do not know. Plus ssd drives, deleted data is still there but just marked as deleted? Use old fashioned wipeable hard disk drives though they take forever to wipe. True i should mention in the tutorial that HDDs are to be preferred, however again, i don't see the point of deleting any data if it's still impossible to prove the existance of a hidden VC volume at rest >I do feel a bit uncomfortable replying to this seeing a hostname Wonderland in the tutorial terminal. i don't see an issue, but i can change the hostname to something else if you want :)

/u/zuberdriver · N/A votes · 3rd April, 2024 - 22:15 · Link

About email, you could use a messaging protocol for real time alerts eg xmpp or SimpleX (smp-message) which would save having your own email setup. I missed your tutorial suggestion about using hdd's instead of ssd. My bad. I know how hidden volumes in veracrypt work and yes there is plausible deniability but should your server get raided, the elaborate security layers you implemented would suggest you have alot to hide. I hear your reason for running the server at home as you can't trust server providers to give them up to LEA and the servers have local access to anyone in the data center. My only suggestion might to distribute the server over several sites so you don't have a single point of failure <- something I have been thinking about how to implement but not got very far. Re. running your own router at home, definitely. I have been running my own ever since I hacked all the routers in my providers accessible subnet and printed warning messages on any printers I could find!

/u/2222222222222 · N/A votes · 2nd April, 2024 - 14:37 · Link

If you're running the onion from real estate tied to your identity or your associates' identities, you've already lost. For unattended systems, it's worth drilling/filling any ports and installing circuitry that destroys all memory/storage devices if something is plugged in.

/u/nihilist1 · N/A votes · 2nd April, 2024 - 16:01 · Link

>If you're running the onion from real estate tied to your identity or your associates' identities, you've already lost. what do you recommend in that case ? (same question for /u/LondonKnives) >For unattended systems, it's worth drilling/filling any ports and installing circuitry that destroys all memory/storage devices if something is plugged in. interesting idea, but sounds very complex to me, unless if you know of a simple way of implementing it

/u/Pneumonia · N/A votes · 1st April, 2024 - 17:07 · Link

Your link is unaccessible though or I'm missing something

/u/nihilist1 · N/A votes · 1st April, 2024 - 17:08 · Link

should be fine actually, maybe try with a new torbrowser identity/circuit ?

/u/Pneumonia · N/A votes · 1st April, 2024 - 17:18 · Link

Tried 2 times Edit: it's working now

/u/heapoverflow · N/A votes · 2nd April, 2024 - 07:04 · Link

Great post. Decided to check out the rest of your blog and I really enjoy it. Keep it up.