DCG 201 Hacking Guide For S*x Workers

Greetings! Welcome to the first of a series of Privacy & Security guides we are focusing on various special interest groups and demographics!

This guide has been a long time coming. As a member of the Electronic Frontier Alliance, a sub section of the EFF, we feel it’s our duty as hackers to protect well-to-do netizens and fight against censorship and intrusive software with equally invasive policies.

To that end, DCG 201 supports S*x Workers (yeah, the AI’s are so bad we have to write it like that) and support their fight against laws such as SESTA, FOSTA & Earn It. They have already been proven as failures and have caused un-measurable harm to the internet as a whole. Remember, all three of these laws were voted in non-partisan between Democrats and Republicans (no matter how hard right or hard left they leaned) and they are going to continue to exploit American’s unease with s*x workers to pass draconian laws that will destroy all walks of life on the internet.

To this end, we have put together this guide. When future guides come out there might be some cross over, because basic good privacy & security is just simply that good, but we are tailoring this to feedback we have received from go-go dancers, strippers, live streamers, phone hotlines and other s*x positive folk on how we can use our skills to help those in need in this community.

To that end, if you want to share this article, here is a TinyURL we created:

https://tinyurl.com/sexdcg

And here is a QR Code you can print, share and bring up on your phone to scan:

But first…

CLEARING UP CONFUSION ON WHAT HACKER MEANS

We can relate a ton to the s*x worker community because as hackers, we have a strange relationship with society. We are taught to be ashamed about our skills and curiosities but then big corporate interests want to use our talents to build and promote their stuff…once we are not useful in that, it’s back to the vilification.

The Adult Entertainment Industry is no different. It disheartens us that when malicious and awful people in our skill set wastes their talents to harm s*x workers than our community is blamed indiscriminately. To that end, we are treated and vilified in Adult Entertainment the way we see s*x workers are in “normal” society. Heck, we tried to have a live stream fundraiser online for sex workers and we were banned by Chaturbate for being to “extreme”.

We wanted to clear the air. There are awful people with our skill set out there. However, there are even more people like us who want to help. We often work behind the scenes so you don’t even notice us and we have done more to prevent sex trafficking than congress’ stupid laws ever did. See: Ped0hunting

For a short explanation on who and what we are, watch this video:

Now that we have that out of the way-

BASIC PRIVACY GUIDES BY S*X WORKERS FOR S*X WORKERS

First off, here is this amazing Twitter thread made by DeLaine:

If you want something more physical that explains it to you like you are 5, check out hacker ally & journalist Violet BlueThe Smart Girl’s Guide to Privacy: Practical Tips for Staying Safe Online”:

Sex Workers Outreach Project-USA is a national social justice network dedicated to the fundamental human rights of people involved in the sex trade and their communities, focusing on ending violence and stigma through education and advocacy:

Founded in August of 2017, BADASS is a nonprofit organization dedicated to providing support to victims of revenge porn/image abuse, and eradicating the practice through education, advocacy, and legislation. Their goal is to arm victims with the tools they need to become their own advocates for justice, and provide the resources they need to regain control of their images, empower themselves, and get justice:

The Women Of Sex Tech is pioneering community, research, & professional development for women & marginalized genders in sex technology:

The Effing Foundation for Sex-Positivity is a 501(c)(3) not-for-profit organization whose mission is to reduce sexual shame and normalize conversations around human sexuality by fostering sex-positive art and education:

And finally, Hacking//Hustling is a collective of sex workers, survivors, and accomplices working at the intersection of tech and social justice to interrupt state surveillance and violence facilitated by technology:

GREAT ONLINE BEGINNER FRIENDLY PRIVACY GUIDES:

GUIDES TO MAKE YOUR COMPUTER & PHONE MORE PRIVATE & SECURE:

SECURITY PROGRAMS FOR YOUR APPLE MAC COMPUTER:

Free Open Source Firewall:

Ransomeware (Holds Your Files For Ransome) Blocker:

https://objective-see.com/products/ransomwhere.html

Monitor Mic & Webcam:

Keylogger (Spies What You Type) Scanner:

https://objective-see.com/products/reikey.html

Prevents Evil Maid Attacks (Hacking USB/Firewire Ports):

https://objective-see.com/products/dnd.html

GREAT PHONE APPS:

Access The Google Pay Store Anonymously Without Logging In:

Self-Surveilance Tool Activated By Gestures & Sound:

Control App Permissions & Spying:

Encrypted Video Recording:

Mixes Fake Phone Contacts With Your Real Ones to Confuse Stalkers:

Checks & Rates Wi-Fi Hotspots for Privacy & Security:

Listen to Police & Emergency Service Radio & Alerts:

Password Manager & Generator, Point & Click, Android Version is KeePassXD

WHAT IS EXIF DATA?

EXIF is short for Exchangeable Image File, a format that is a standard for storing interchange information in digital photography image files using JPEG compression. This includes GPS information so you can easily see where the images were taken. If someone who knows about EXIF data can find it, they can find out where you took the photo, compromising your privacy.

Here are programs that can remove them.

Android:

iOS:

Images On Desktops, Export & Remove Exif & Other Data:

Video On Windows:

MESSAGING PLATFORMS:

Beginner:

Advance:

BURNER PHONES & ALTERNATIVE PHONE NUMBERS:

VPN:

WARNING: Using a VPN will not keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.

If you are looking for anonymity, you should use the Tor Browser instead of a VPN. (SEE BELOW)

If you’re looking for added security, you should always ensure you’re connecting to websites using encrypted DNS and HTTPS. A VPN is not a replacement for good security practices.

If you’re looking for additional privacy from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved.

Beginner:

Intermediate:

Advance:

USING TOR BROWSER:

Tor Browser is a web browser that works exactly like Firefox but is modified to work through the Tor Network. The Tor Network routes all your web browser traffic through Onion Routing which is better than a VPN. There is no-configuration, just download, connect and surf. You can also visit special .Onion websites that are even more secure, like DCG 201's!

Tor Brower for Windows, Mac, Linux & Android:

Tor Browser For iOS:

File Sharing:

OTHER BROWSERS:

Firefox:

Google Chrome Alternative:

Android Browser:

Privacy Browers for Android/iOS:

Mobile Browser Deletes All Tracing When Closed/On Demand:

BROWSER EXTNETIONS:

Blocks Ads, Trackers, ect:

Sets URL’s to HTTPS automatically making websites secure:

Track The Trackers:

Browser Spying Blocker:

Auto-Removes URL Memory:

Rates & Details Terms Of Services for Websites:

Auto-Deletes Tracking Cookies:

Blocks Trackers From Scanning Your Web Browsing:

Control Privacy Settings via Point-&-CLick:

Change Your User Agent, Go Incognetto:

Syncs Your Bookmarks Between Devices Using Encryption:

Bypass Paywalls For Public News:

HOW TO PICK LOCKS & ESCAPE RESTRAINTS:

Affordable Beginner Lockpicking Kit With Book Guide:

Covert Lockpick + Tention Tool All-In-One:

Wafter Lock Rake, Pointy Bypass & Handcuff Shim:

Abduction Bypass For Handcuffs:

Metal Detector Resistant Lockpicking Raking Tools:

Full Training Kitt with Lockpicks & Practice Locks, Femme Owned:

DOOR SECURITY:

Deadbolt Locking Strap:

Door Lockout Key System:

HOW NOT TO GET PICK-POCKETED:

DEFENSIVE & USEFUL TOOLS:

DATE R*PE DRUG SIDE EFFECTS & INFORMATION:

ALTERNATIVE PAYMENT SERVICES:

Keep up to date with this chart made by haddoxhaddox:

OnlyFans Alternative:

Another OnlyFans Alternative:

SESTA/FOSTA Reistant Fiat Billing/Payment System:

Patreon Alternative:

Cryptocurreny Payment For S*x Workers:

ALTERNATIVE CONTENT HOSTING/SHARING:

https://www.slixa.com/

Zoom Alternative:

Twitter Alternative:

YouTube Alternative:

SESTA/FOSTA Resistant Website Hosting:

Instagram Alternative:

HACKERS TALKING ABOUT S*X WORK:

S*x Work As An Artistic Practice in #COVID Times by Elle Peril @ HOPE:

Empathy, Equity & S*x Tech at the Margins by SX Noir & Kit Stubbs @ HOPE:

Hacking + Human Sexuality by The Woman Of S*x Tech & The Effing Foundation @ HOPE:

Shrek Jiggs & Toxic Trolls Fireside Chat by The BADASS Army @ DEF CON:

S*x Work After SESTA Fosta by Maggie Mayhem @ DEF CON:

S*x Workers Rights & Internet Freedom by Maggie Mayhem @ HOPE:

My Whores Manifesto (S*x Work In Germany ENG) by Undine de Rivière @ Chaos Computer Congress:

Hacking Sex: Toys, Tools, and Tips for Empowerment and Pleasure by Kit Stubbs @ HOPE:

IOT Fails Learning from S*x Toys How Not to Suck by RenderMan @ DEF CON China (TECHNICAL):

Pwn All The Mobile Porn Apps by Ben Actis @ BSides Las Vegas (TECHNICAL):

DCG 201 Online Meet Up — November 2020 — Back Orifice 2020:

::END OF LINE::

--

--

--

North East New Jersey DEFCON Group Chapter. Dirty Jersey Represent! We meet at Sub Culture once a month to hack on technology projects! www.defcon201.org

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
DCG 201

DCG 201

North East New Jersey DEFCON Group Chapter. Dirty Jersey Represent! We meet at Sub Culture once a month to hack on technology projects! www.defcon201.org

More from Medium

String methods in Ruby

Bringing back from the dead — An Arch Linux tale.

How I entered the CTF realm

Bedroom Pop rising vol. 1