• Academy
  • Proxy Shop
  • SMS Activation
  • Academy
  • Proxy Shop
  • SMS Activation
  • Theme
Telegramsupport@cyberyozh.com
AcademyProxy ShopSMS Activation
Telegramsupport@cyberyozh.com

Privacy PolicyCookie Policy

©2025 WebGears Services d.o.o. All rights reserved.

Course Interaction TipsShield, Mask, and Sword. Why We Teach Attacking.How to Follow the Publication of New MaterialsThe most important advice of the courseTest your online privacy and security.Help and answers to your questionsWhat do I learn from this course?The importance of donations
Cyber spyingDangerous searchTelemetryData leakagePrivacy violation and trackingMass surveillance systemsPhysical access and computer forensicsPeeping information on the screenMass hacking of devicesLoss of Digital DataCyber-warfare, cyber diversions and cyber terrorismPlanting digital evidenceDeanonymization and unicalizationDigital identity theft
How hackers get caught sdafasdfsaedfThe fatal mistakes of cybercriminals
Why should I need privacy and security on the Internet?
Virtual machine and virtual operating systemCreating a virtual machineSnapshots and virtual machine cloningWhy you shouldn’t use shared folders, shared clipboard and Drag’n’DropEncryption of virtual data on virtual machine VirtualBoxThe information VirtualBox stores about usersVirtual machines’ vulnerabilities. How hackers go beyond the virtual environment.
Creating a secure passwordThe secrets of a strong passwordA huge mistake or how exactly you should not keep passwordsSecure ways to store passwordsPassword Managers or Ross Ulbricht's Fatal MistakeMiniKeePass is a password manager for iOS (iPhone / iPad)KeePassXС. Setting up a password manager for macOS.Emergency erasure of saved passwords
Operating Systems. Choosing your path.iOS. First steps to protect your iPhone and iPad.The myth about the incredible security of macOSQubes OS. System for those who have something to protect.
History of encryption. Rivalry between encryption and special agencies.Encrypted file-hosted volumesA brief history of TrueCrypt. Unprovability of encrypted file-hosted volumes.Your TrueCrypt is spying on youInstalling and setting up basic security in TrueCryptHow to install and set up basic security in VeraCryptVeraCrypt. VeraCrypt vs TrueCrypt.Creating and using a secure encrypted file-hosted volume with TrueCrypt / VeraCryptEncryption of external data storage devices with TrueCrypt and VeraCryptSecrets of working safely with encrypted file-hosted volumes TrueCrypt and VeraCryptAES Crypt. A straightforward, cross-platform solution for file encryption.Encrypting files with AES Crypt on Windows and macOSEmergency destruction of encrypted file-hosted volumesThe methods of breaking encrypted file-hosted volumes and how to protect yourself from them
Comprehensive encryption of operating system or hard disk drive
Forensic analysis of activities on social networksGaffes in social media that turned fatal for the careers of their authors
Tails. A few tips before you start using this operating system.
Total surveillance: good or evil?
Test: check email for hacking resistanceDeanonimization of email ownerSending Anonymous EmailsProtect data from leakage at the email recipient level
Cross-device tracking. Deanonymization of users of Tor, VPN, proxy using sound beaconsWhat you can find out based on the photos on the network.Timing attack. How the special services deanonymize the users of messengersHow the FBI obtains authentic IP addresses of criminals using Tor, VPN or proxyDeanonymization of VPN and proxy users through the User agent and browser fingerprintsDeanonymization of Tor users through bait filesHow to get a Telegram-linked mobile numberDe-anonymization of users of messengers using P2P-connection
Browser history through the eyes of an IT security professionalSecurity professional’s point of view about browser cache
Cloud Storage Threats
How to check if you are not being spied on your mobile phoneCyber spying through computer repair centersCyber spying through wireless keyboards and mice. “MouseJack” attack.Tapping premises using speakers and acoustic systemsCyber espionage through smart TVsCyber espionage through monitor emanation analysisUniversal method of deleting programs for cyber espionageHacking, erasure and cyber espionage via USB cables.Cyber spying through mobile phone
The secret to a secure loginTwo-factor authentication
BadUSB. The deadliest threat there is no defense for.Hacking the computer via hotkeys / shortcut keysDangerous flash drives. What can USB connection lead to?
Data theft with an attack “web cache deception”The danger of capital letters or forever working phishing scheme
How do they figure you out by IP addressWhat blacklists are for and the consequences of having your IP address on a blacklist
General principles of secure communication in the networkDisrupting the continuity of correspondence. One-time-use note services.XMPP (Jabber). How do they communicate in darknet?Bitmessage. The most anonymous messenger.A trap for hackers: checking if someone is reading your correspondence.Encrypting your correspondence in a browser.Link substitution in messengersFour secrets of safe communication for hackers
The secrets of keeping your data concealedDisguise cryptocontainersThe 3 mistakes of Russel Knaggs, or 20 years of imprisonment for a “deleted“ email.Creation of double-bottom cryptocontainers
What is MAC address and how is it related to your anonymity?
Open and closed source codes. Errors and situational bugs.Audit of a list of installed programs and applications
Checking data leaks
Data collection by software
DeepWeb or the hidden internet of Tor
Intro to PGP
Here’s how you will go through the training course on detecting and removing malicious softwareSafe opening of short linksAttack drive-by download, or secret download.
Preventive measures in order to preclude identity theftHow to check if your identity has not been stolenHow to delete your personal data posted on the network
Firewire attackPractical examples of using forensic analysis of photos and videos
Anonymous DuckDuckGo Search Engine
Counter forensics (anti-computer forensics)Secret threat or files from messengers
Hiding data on imagesView, edit and delete image metadata at macOS
Choose a protocol for VPN. Compare OpenVPN, PPTP, L2TP/IPsec and IPsec IKEv2Choose a reliable VPN: TLS authentication, connection port and session keyChoose a secure VPN: encryption algorithm, key length and data authenticationHow hackers and security services hack VPN
The security problems of SMS messagesSMS messages that self-destruct. How to check if your SMS are being read.Sending anonymous SMS
Electromagnetic systems for wiping data on hard drivesEmergency data erasure of the computer. How hackers cheat forensics.Emergency erasure of mobile phone and tablet
Collaboration with technical writersUser Agreement

Planting digital evidence

In the middle of the summer of 2017 the popular VPN service HideMy.name in Russia was blocked by the decision of Medvedev district court of Yoshkar-Ola. The reason is the presence on the site of a book written in 1924 in the prison of Landsberg city by the former corporal of Austrian origin Adolf Hitler.

This is a great example of a threat... no, not of planting digital evidence, but the Internet censorship. In the case described the court found on the site something that had never been there, that is rather a threat to common sense and it has no direct relation to IT security. The VPN service allowed to bypass government blockages, it was popular with users and there were no official reasons for restricting access to it.

But sometimes it happens that law enforcement agencies especially in developing countries and malefactors plant digital evidence and they can plant it to anyone even to the highest ranking official.

There is no need to seek example for a long time: one day Czech President Milos Zeman being in his summer residence at Lama Castle discovered on his computer materials containing child pornography. Experts investigating the incident found that the files were downloaded by a hacker from the US IP-address.

Another example is already from the Russian realities. Konstantin, whose surname we are going to omit at his request, worked as a journalist in a provincial newspaper. Because of one journalistic investigation, he had a conflict with the main character of the article and with the editor, who strongly did not recommend publishing the material. Konstantin received a lot of blusters, one of which came true.

A colleague gave him password-protected archives with the investigation on the flash drive, only three files and a password to them. Two files opened successfully and they contained very interesting data, but the third password did not fit. A colleague said that he would look on later, maybe he confused the passwords a little bit.

But the next day Konstantin did not need a password, as some people in civilian met him at work, presented IDs, briefly reported about suspicions of possessing child pornography and asked to have a look at his working laptop. Konstantin gave access, because he had no pornography, especially children one.

However, the criminologist found the encrypted archives, somehow suspiciously simply picked up the passwords for them, and in the third one, that one where the password was not suitable, child pornography was found. Konstantin was arrested, he had a year of humiliation and court proceedings, dismissal from work, the collapse of his career, financial and family problems.

Mobile ProxiesResidential Proxies

But in the end Konstantin was acquitted. Probably no one planned to send him to prison, the task was to discredit and dismiss him. Do you think the case with Konstantin is single one?

In the network you can find many similar stories. For example, the coordinator of one of the headquarters of the opposition Alexei Navalny, Vladimir Dubovsky was arrested for 8 days for posting an extremist song on his social networking account.

According to the arrested, he did not post the song, it was probably posted by an employee of the Center for Countering Extremism, to whom he gave out data for accessing the social networking account upon official request.

One popular misconception

Through a feedback form, I got a question from a user whether law enforcement officers are able to upload files on their own containing law violations during a search for further criminal prosecution?

Of course they can, if you get full access to a computer, nothing prevents them from doing so, but any forensic examination, which is mandatory in a criminal case, will immediately determine how and when the file was placed on the computer, so such employees may face serious problems. Therefore, this is the way to plant digital evidence the smallest one to be afraid of.

How to protect yourself from planting digital evidence

Encrypt all your data

All external media, hard drives, operating system should be securely encrypted, and information should be stored strictly in the crypto containers.

Learn the secrets of safe working with cryptocontainers

Simply creating and starting to use crypto containers is not enough, even with a strong password. There are a number of important recommendations that you definitely need to get acquainted with. Create a truly strong password If you have a long and complex password, this is certainly good, but unfortunately, this is not enough. Get acquainted with these recommendations, they will be useful for you.

Configure emergency data erasure system

If the detractors still manage to gain access to your computer, an emergency data erasure system will help a lot. Panic Button will work in a logical bomb mode, deleting browser history, saved passwords, history of viewed documents, images, running programs and the valuable data you specified, after that it will send an alarm to the email addresses you specified and turn the

Get familiar with cryptographic hacking methods and hacking protection methods.

You need to be aware of the methods of hacking cryptocontainers and tools to prevent successful attacks on encrypted data. We talk about them in this chapter of the course.

Configure comprehensive security for all your devices.

The tips above were about planting evidence at physical access, but, as is the case with the Czech president and child pornography, data can be downloaded to you remotely.

In this case only the integrated security of all your devices can help you, we will teach you to set up the one in terms of this course.

Threats

Cyber-warfare, cyber diversions and cyber terrorism

Prev article

Next article

Threats

Deanonymization and unicalization

Group 1948760176.png