Presentation by dr.kaos at Interz0ne IV, Atlanta GA, March 12, 2005
This talk discussed the process of hardening and reconfiguring a host to ensure that all ingress traffic is silently dropped/denied, and that all egress traffic is transparently encrypted and/or anonymized — optimally both — from a machine to its final destination.
Through this process, a host machine can be introduced to an arbitrary network (hotel broadband, WiFi hotspot, client network, etc.) without leaving any discernible fingerprints or telltale footprints. The talk focused primarily on Linux and BSD systems (incl. Mac OS X), though there was some limited discussion about acomplishing the same goals, to the greatest degree possible, on Windows as well.
Download the Presentation as a PDF