Module 03 — Connection Security
🌐 1. Network Threats at a Glance
Every time your device talks to the internet, it passes through multiple parties: local Wi-Fi, ISP/telco, backbone providers, the destination service, and sometimes monitoring or logging systems in between.
Connection security is about deciding who you are willing to trust with which pieces of information.
🕳️ 2. VPN: Encrypted Tunnel with a Trade-Off
Capabilities
- Encrypts traffic between your device and the VPN provider.
- Hides browsing content from local Wi-Fi and your ISP.
- Lets you appear to be in a different region.
Limitations
- The VPN provider can see your exit traffic and IP.
- Does not hide activity from the sites you log into.
- Does not automatically provide anonymity.
Good use-cases
- Shield device on untrusted hotel or café Wi-Fi.
- Reducing basic profiling by local network operators.
🧅 3. Tor: Anonymity-Focused Routing
Capabilities
- Multi-hop route through Tor relays, separating source from destination.
- Designed to resist simple IP-based tracking.
Limitations
- Slower and sometimes blocked by websites or services.
- Behaviour (logins, patterns, unique browser traits) can still reveal identity.
Good use-cases
- Shadow/Ghost workflows needing stronger IP separation.
- High-risk research where identity link is a primary concern.
📡 4. Telcos, SIMs & Location
- Mobile networks log which towers a device connects to over time.
- SIM registration data can tie activity to an individual or entity.
- Anonymous or minimally linked SIMs reduce direct identity linkage but not radio-level location information.
📶 5. NW750 & Faraday Use
- Privacy routers centralise hardened DNS and outbound rules.
- Faraday bags physically isolate devices during transit or storage — useful for border crossings and sensitive meetings.
- A Faraday bag is most effective when combined with good device lock and power-down practices.
🧬 6. Fingerprinting & Correlation
A “fingerprint” is a combination of traits: device model, language, time zone, fonts, browser quirks and more. Over time, repeated patterns can link different sessions together.
- Avoid mixing high-risk and personal logins on the same connection.
- Keep Shadow and Ghost behaviours simple and consistent to avoid creating unique patterns.