- Joined
- 11 yrs. 6 mth. 26 days
- Messages
- 5,381
- Reaction score
- 18,380
- Age
- 45
- Wallet
- 11,590$
- [email protected]
"Security is just an illusion"
Table Of Contents
------------------
0x00- Introduction
0x01- Linux -Vs- Windows
0x02- Encryption & Secure Communications
0x03- Hiding Your IP
0x04- Your Browser -Vs- You
0x05- DNS & Wifi (Short)
0x06- Conclusion
------------------
[0x00]- Introduction
Hello and welcome again.. This time I made major modifications and correction on my old and outdated one. With the help of my brother sl1nk. Mainly in this paper I will talk about bit more advancded methods of anonymity and some that are very basic. But at the end of the day is up to you how much anonymity your looking for and what are you hiding from. To begin I would like to phrase something that many still don't know the definition of.. Thats is.
QuoteAnonymity- the state or quality of being anonymous
I wanted to phrase that definition because alot of people think that firing up TOR and connectiing to its servers, they are already anonymous. Thats incorrect if you seek pure anonymity then it will never be that easy. Its just like hacking you can just read a tutorial on SQLi and pwn Google.. Its take alot of research and pratice. So now that you have a clear mindset that anonymity is NOT easy to accomplish just get into the good stuff.
[0x01]- Linux Vs Windows
Ahh yes the great battle Linux verus Windows, Now in here i will be talking from my own point of view and personal experience. Don't hate for the things I say. To start... WINDOWS SUCKS!!. Just that simple, now let me explain why
If your seeking Anonymity and Security then just by moving to Windows you have lost everything you desire. Your making yourself extremely vulnerable everything you boot up Windows OS... Why is Windows so dangerous and makes you so vulnerable ?? The answer is simple. "Backdoored". The windows OS has been backdoored by there creators since the first windows operating system. But dont get so down us linux users are so safe after all seem like recent news found spyware on Ubuntu version 11.04 and up. So if your using any of those ethier recompile the source of ubuntu(by this i mean find the backdoor and remove then recomplie) and Windows users.. if you really want Anonymity then start looking into picking a Linux or Unix based OS, personally i like BSD (FreeBSD) and Unix 3, but Others like Fedora, Arch, RedHat, Ubuntu 10.10.down can work. So after all this you most likey know that all i will be talking in here today relates only to Linux/Unix System, Bye Bye Windows.
Ohh before anyone ask me on how windows can be modified to be safe or crap like that, there no way to modifiy windows its a private source code same like Mac OS X, If you truly can live without Windows try ReactOS, -http://www.reactos.org/ but its not very good :x OR there always VMware.
[0x02]- Encryption & Secure Communications
If your still reading this it means two things you like reading or you have decided to join the dark side and go to Linux
Now a very important thing to start with anonymity is within your own system and your ways you use to communicate. One thing you should understand is how Anonymity and Security are two differnet things, they are alike but they are fundamentally different. How? Because anonymtiy like stated above is the state of being anonymous and security is making a specifc things secure from being compromised. Take this human related example for insistance... We have a Spy and We have a Club Bouncer, the spies job is to be like a ninja and not be seem or caught and the bouncers job is to secure the club from any minors/intruders or any distrubance. There both different, Now the funny thing is they can both equally compromise eachother, if the spy(anonymity) is caught all his work was for nothing, and if the club bouncer(security) doesnt see or notice the spy get in then all his work and training was for nothing. Therefore in cyber related terms to be almost perfectly safe we need to have an equally amount of anonmity and security both at there strongest points. Well alright know you understand that lets get back to Encryption and Secure Communications.
-Encryption
Lets start with the basic encryption that i think everyone is aware of and that Hard Drive encryption. Since were using linux/unix based systems now all programs will have to do with those OS's. Alright so many may have there Hard Drive currently encrypted with a tool called TureCrypt, If you dont then skip these few sentences im going to write. If you do continue reading. TrueCrypt is mostly seen more on windows but its compatiable with Linux to. Truth is delete TrueCrypt right now its sucks and if your hidden any classified data/files in there or in there hidden containers they can easliy be unlocked and decrypted. and if Raid by the feds they got Master Keys for that so its just badnews. Now for ture encryption in linux systems us the following
-LVM2
LVM is suitable for:
Managing large hard disk farms by letting you add disks, replace disks, copy and share contents from one disk to another without disrupting service (hot swapping).
On small systems (like a desktop at home), instead of having to estimate at installation time how big a partition might need to be in the future, LVM allows you to resize your disk partitions easily as needed.
Making backups by taking "snapshots".
Creating single logical volumes of multiple physical volumes or entire hard disks (somewhat similar to RAID 0, but more similar to JBOD), allowing for dynamic volume resizing.
You can find it more info and installation here:
New Kali Linux has LVM install for setup when you first intsall it on your PC or etc.
-cryptsetup(LUKS)
Cryptsetup is also a hard drive encryption software for linux, I perosnally find it best and easiest to setup...
LUKS is the standard for Linux hard disk encryption. By providing a standard on-disk-format, it does not only facilitate compatibility among distributions, but also provides secure management of multiple user passwords. In contrast to existing solution, LUKS stores all setup necessary setup information in the partition header, enabling the user to transport or migrate his data seamlessly.
You can get it here:
You can encrypt your hard drive with those include a password and a tip i recommend is have a spare USB, wiht that USB you can make it a key for your decryption process, For example you encrypt your hard drive and set a password but besides that for a full decryption you would need password+USBkey.. Its just how I have it setup for more security on my system. Also you can do a memory flash and shadow partition on both your HD and USB so it hides it self and if more then 3-5 trys the whole system and usb will be wiped and rewritten with random data. So bruteforcing your system wont work. This is a big process and takes quite some time and knowledge, I wont explain here is to long of explanation.
Alright next for encryption is file /data encryption. Now that you have good awesome hard drive encrypted you need to encrypt your important data and files. Now by these i mean IMPORTANT or DANGEROUS files/data dont go and encrypt every single files in you get you hands on
.
Best and Uncrackable method of file/data encryption is OTP.
-OTP [One-Time Pad]
is a type of encryption which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit or character from a secret random key (or pad) of the same length as the plaintext, resulting in a ciphertext. If the key is truly random, as large as or greater than the plaintext, never reused in whole or part, and kept secret, the ciphertext will be impossible to decrypt or break without knowing the key. It has also been proven that any cipher with the perfect secrecy property must use keys with effectively the same requirements as OTP keys. However, practical problems have prevented one-time pads from being widely used.
-Secure Communications
Alright well secure communication is a tricky thing, its hard to master and hard to do sometimes.. as not everyone you talk to know how to use secure ways to communicate. To be anonymous in general mean you must be anonymous in the cyber world and somewhat anonymous in the real world. By this i mean your identity in the real world can easyly compromise your identity in the cyber world just by one phone call. Here are things that effect your identity
Now i will try my best to explain and tell you how to make a secure com, in each one that I listed above.
-SMS/CALL
This one is most likey the hardest one for everyone and myself. I mean becuase we all have friends, family, jobs etc.. we have to make phone calls and we have to text our girlfriends or boyfriends. Right? Well this is the sad part about achieving 100% anonymity, you must disapear from this world. but please !NOTE!, i do NOT recommend this, this process is to be taken if your being haunted down by the FBI/CIA/ANY GOV. Now if it comes down to this then here are my recommendations.
1) Get ride of all Credit/Debit Cards you Own ( They Have RFID Chips that the FEDS can easyly track you).
2)Use Cash ONLY
3)Burn your Phone(Personal) and Purchase Burners(Only for Important calls)
4)Put Money On PrePaid Cards If need to purchase Online
5)Sell/Quit any items that has records(Cars, Rent, ISP) sell to private buyers and Quit on Lapse
These are some i not gonna list all because the chances of this is very minor. But yea only way to have anonymity on the real world would be to become someone else, dont trust does apps or software that will spoof your calls or encrypt your SMS they are all backdoored and can easyly be access by the government if they have a warrent.
-Email
Alright here we can work thing out without having your real identity compromised. First ALL free public emails such as Gmail,Yahoo,Hotmail etc are not SAFE!, If anything is suspicious they will turn you in to the feds quick. Now email service provider like TorMail, AnonymousSpeech, HushMail, PrivacyBox are secure and you can use to communicate secure, but still where aiming for 100% anonymity so a simple secure email provider isnt enough. To truly has anonymity we will use something called PGP[Pretty Good Privacy].
-PGP
Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, e-mails, files, directories and whole disk partitions to increase the security of e-mail communications. It was created by Phil Zimmermann in 1991.
With this plus a secure email provider we can be safe, what PGP does is encrypt the message your send to the other person and create a private and public key. You give that public key to the person your sending the message to and he/she uses that key to decrypt the message and vice versa.
-Webcam
Dont use this please, want to see someone, then meet in person like the old days.
-Social Networking
If you seek 100% anonymity, then this is your worse enemy. Dont get near this
Especially Facebook.
-Pictures
Picture carry EXIF Data that can give out valuable information sometimes, unles you encrypt your picture or remove EXIF data from it, it can be quite dangerous to your anonymity.
-IM(Instant Messaging)
Now IM is something alot of hackers use just as Skype, ICQ, Jabber, Etc
With this is quite dangerous if you do not know how to use carefully. If ypou configure Skype properly there may be a chance of anonymity, ICQ and Jabber have for anonymity and if well configured even more. But Overall Best is IRC
If it is kept private and allowed spoofed connection you should be safe to communicate IM, of course keeping a regualr comversation. There is also TorChat,CryptoCat,WASTE,ChatCrypt,Zfone.
-Other ways to secure communication
Some other ways i hvae used to communicate are
-Code
-Steganography
-Dead Drop
-Code
In code sometimes many people to bother to decrypt a line in a source code or maybe dont even notice it, so you send a message to your partner that look just like a script or something. but inside the code the a small encode line that is were you message beholds. You can do this in PHP with base64 or more advandced techniques.
-Steganography
Your hiding a message inside a image, this takes some knowledge and understanding of steganography. But it is very useful if used correctly.
-Dead Drop
This method is used in the real world, how this works is you get a everyday item just as rock, grass and you make a replicaof it (but fake) and try making it that its blends into the desire location and inside that fake rock or grass you have a message for the targeted person to pick up. Withou the averge person noticing it.
[0x03]- Hiding Your IP
Hiding your IP is somethign everyone think is as simple as clicking tor or opening a VPN service and BAM your IP is gone, Not excatly.. First let me explain why is isnt that easy.. for starters Tor and ANY VPN service are vulnerable and left trace.. Tor is highly vulnerbale and out friend "sl1nk" has proven it multiple time so no need to explain much.. juts know that the government and other hacker have control and even created fake exit nodes on tor that a regualr n00b will fall for and connect, ethiers is a honeypot or just plain badnews for you. And VPN all related on DNS, which is the worse enemy for your IP.. well there Flash as well.. you see DNS and Flash are the two biggest give aways for your real IP. They both are used to bypass a proxies/VPN/etc and show your real IP. So how we hide are IP? well there muliples ways.. one way is leaving Tor and going over to JonDo(https://anonymous-pr...t/en/jondo.html) JonDo acts like Tor but its encrypts eveything plus doesnt relay on exit nodes. Second would be using socks5(private)+tunneling(different box) see you spoof your ip with a good socks5+ tunneling(ssh)or hacked (RDP's) thro different boxs(computers) or if you are not a rookie you can make a botnet and infect thousands of computer making them your "zombies" and a few rooted servers plus your private list of socks5 and you should be a hard sucker to trace back too... Isnt any fancy programs or cool OS's you can try to actually hide your IP, truth is there is no such thing in completely hiding your IP Adress.. Its will alwsays be there the trick is how good and long can you hide for. Unless you have the magical "0.0.0.0" ip adress that few people have
*NOTE* Flash gives alway your IP no matter what VPN is hiding it*
There not much a big chapter for this section. becuase i am not going to lie to you and recommend you 100 programs that keep logs and just want money. Remeber were aiming for "Almost Perfect Anonymity".
[0x04]- Your Browser vs You
Your Browser well you can say this goes with Hiding your IP as well, Alright let me tell you how your browser is extremly important when it comes to anonymity, EVERYTHING you do is recored wether you believe me or not. First to start. If you plan on have close to 100% anonymity forget Chrome,FireFox,Safari,Opera forget them.. Now i use Chrome and FireFox cause I do need that much anonymity. But if you do here are my recommended lightweight browser. ALSO- DONT NOT KEEP ANY PASSWORDS IN YOUR BROWSER!!
Thats it there they are, there lgithweight and open source, no backdoors no nothing. Uzbl is kind of a pain to use but by far the safest.
If you still want to use the other browser then here some tips and addons for them. For one if your going to use one use FireFox..
- Firefox
Forsure disable Javascript or install NoScript, disable Cookies,History. And start private browser.
Here some addons you can install..NOTE the more addosn you have the more vulnerable you become, remember there all apps and services. << Logs
Addons
------
-CookieMonster
-IpFlood (Proxy Simulator)
-NoScripts
-Ghostery
-FlashBlock/AdBlock
And for Chrome just go Incognito really all i can tell you and maybe install Ghostery and HTTPS Everywhere, To be honest Chrome is backdoor so dont even waste your time if you seek anonymity.
Next is your search engines agen is Chrome is backdoored you Google dont keep logs on what your search, Of course if your searching cats or dogs google is fine but hacking or computer related thing keep private. there multiple ways to do a private search without google. there are few private search engines you can use to help you keep your privacy. BTW dont be fooled by "Encrypted" Google is just same thing with SSL.
Those are some you can try most private would be Ixquick in my opinion.
Next is encoding what your search for of course this if again your paraniod and need 100% anonymity. Dont have to do this if your hiding ponys and porn
Alright well this part easy is just encoding, you can encode your url with the following formats.
And again remember all this goes with hiding your IP, stated above ^^
[0x05]- DNS & WIFI (Short version)
Well Last but not least, This section im not going into advanded details nor big explaination becuase i'll be making a seperate paper explianing more in details. But DNS and your Wifi is big big way your digital identity can be compromised, especially by the government. So for Wifi is simple you have two options, Ethier 1) Encrypt Your Connection 2) Be a traveler and go to places with public wifi(fastfood,cafes,neighbors,comp store,etc) ohh and of course encrypt your connection while your there
For DNS is quite more complicated but im going to give you a more breif and easier way in this tutorial. On way to be more secure is changing your Primary DNS. Here some Secure DNS for you
, again not much details because imma be explaining this all in my next paper.
Your can check your DNS here - ...http://www.dnsleaktest.com/��
That will be all.
[
Table Of Contents
------------------
0x00- Introduction
0x01- Linux -Vs- Windows
0x02- Encryption & Secure Communications
0x03- Hiding Your IP
0x04- Your Browser -Vs- You
0x05- DNS & Wifi (Short)
0x06- Conclusion
------------------
[0x00]- Introduction
Hello and welcome again.. This time I made major modifications and correction on my old and outdated one. With the help of my brother sl1nk. Mainly in this paper I will talk about bit more advancded methods of anonymity and some that are very basic. But at the end of the day is up to you how much anonymity your looking for and what are you hiding from. To begin I would like to phrase something that many still don't know the definition of.. Thats is.
QuoteAnonymity- the state or quality of being anonymous
I wanted to phrase that definition because alot of people think that firing up TOR and connectiing to its servers, they are already anonymous. Thats incorrect if you seek pure anonymity then it will never be that easy. Its just like hacking you can just read a tutorial on SQLi and pwn Google.. Its take alot of research and pratice. So now that you have a clear mindset that anonymity is NOT easy to accomplish just get into the good stuff.
[0x01]- Linux Vs Windows
Ahh yes the great battle Linux verus Windows, Now in here i will be talking from my own point of view and personal experience. Don't hate for the things I say. To start... WINDOWS SUCKS!!. Just that simple, now let me explain why
If your seeking Anonymity and Security then just by moving to Windows you have lost everything you desire. Your making yourself extremely vulnerable everything you boot up Windows OS... Why is Windows so dangerous and makes you so vulnerable ?? The answer is simple. "Backdoored". The windows OS has been backdoored by there creators since the first windows operating system. But dont get so down us linux users are so safe after all seem like recent news found spyware on Ubuntu version 11.04 and up. So if your using any of those ethier recompile the source of ubuntu(by this i mean find the backdoor and remove then recomplie) and Windows users.. if you really want Anonymity then start looking into picking a Linux or Unix based OS, personally i like BSD (FreeBSD) and Unix 3, but Others like Fedora, Arch, RedHat, Ubuntu 10.10.down can work. So after all this you most likey know that all i will be talking in here today relates only to Linux/Unix System, Bye Bye Windows.
Ohh before anyone ask me on how windows can be modified to be safe or crap like that, there no way to modifiy windows its a private source code same like Mac OS X, If you truly can live without Windows try ReactOS, -http://www.reactos.org/ but its not very good :x OR there always VMware.
[0x02]- Encryption & Secure Communications
If your still reading this it means two things you like reading or you have decided to join the dark side and go to Linux
-Encryption
Lets start with the basic encryption that i think everyone is aware of and that Hard Drive encryption. Since were using linux/unix based systems now all programs will have to do with those OS's. Alright so many may have there Hard Drive currently encrypted with a tool called TureCrypt, If you dont then skip these few sentences im going to write. If you do continue reading. TrueCrypt is mostly seen more on windows but its compatiable with Linux to. Truth is delete TrueCrypt right now its sucks and if your hidden any classified data/files in there or in there hidden containers they can easliy be unlocked and decrypted. and if Raid by the feds they got Master Keys for that so its just badnews. Now for ture encryption in linux systems us the following
-LVM2
LVM is suitable for:
Managing large hard disk farms by letting you add disks, replace disks, copy and share contents from one disk to another without disrupting service (hot swapping).
On small systems (like a desktop at home), instead of having to estimate at installation time how big a partition might need to be in the future, LVM allows you to resize your disk partitions easily as needed.
Making backups by taking "snapshots".
Creating single logical volumes of multiple physical volumes or entire hard disks (somewhat similar to RAID 0, but more similar to JBOD), allowing for dynamic volume resizing.
You can find it more info and installation here:
New Kali Linux has LVM install for setup when you first intsall it on your PC or etc.
-cryptsetup(LUKS)
Cryptsetup is also a hard drive encryption software for linux, I perosnally find it best and easiest to setup...
LUKS is the standard for Linux hard disk encryption. By providing a standard on-disk-format, it does not only facilitate compatibility among distributions, but also provides secure management of multiple user passwords. In contrast to existing solution, LUKS stores all setup necessary setup information in the partition header, enabling the user to transport or migrate his data seamlessly.
You can get it here:
You can encrypt your hard drive with those include a password and a tip i recommend is have a spare USB, wiht that USB you can make it a key for your decryption process, For example you encrypt your hard drive and set a password but besides that for a full decryption you would need password+USBkey.. Its just how I have it setup for more security on my system. Also you can do a memory flash and shadow partition on both your HD and USB so it hides it self and if more then 3-5 trys the whole system and usb will be wiped and rewritten with random data. So bruteforcing your system wont work. This is a big process and takes quite some time and knowledge, I wont explain here is to long of explanation.
Alright next for encryption is file /data encryption. Now that you have good awesome hard drive encrypted you need to encrypt your important data and files. Now by these i mean IMPORTANT or DANGEROUS files/data dont go and encrypt every single files in you get you hands on
Best and Uncrackable method of file/data encryption is OTP.
-OTP [One-Time Pad]
is a type of encryption which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit or character from a secret random key (or pad) of the same length as the plaintext, resulting in a ciphertext. If the key is truly random, as large as or greater than the plaintext, never reused in whole or part, and kept secret, the ciphertext will be impossible to decrypt or break without knowing the key. It has also been proven that any cipher with the perfect secrecy property must use keys with effectively the same requirements as OTP keys. However, practical problems have prevented one-time pads from being widely used.
-Secure Communications
Alright well secure communication is a tricky thing, its hard to master and hard to do sometimes.. as not everyone you talk to know how to use secure ways to communicate. To be anonymous in general mean you must be anonymous in the cyber world and somewhat anonymous in the real world. By this i mean your identity in the real world can easyly compromise your identity in the cyber world just by one phone call. Here are things that effect your identity
Now i will try my best to explain and tell you how to make a secure com, in each one that I listed above.
-SMS/CALL
This one is most likey the hardest one for everyone and myself. I mean becuase we all have friends, family, jobs etc.. we have to make phone calls and we have to text our girlfriends or boyfriends. Right? Well this is the sad part about achieving 100% anonymity, you must disapear from this world. but please !NOTE!, i do NOT recommend this, this process is to be taken if your being haunted down by the FBI/CIA/ANY GOV. Now if it comes down to this then here are my recommendations.
1) Get ride of all Credit/Debit Cards you Own ( They Have RFID Chips that the FEDS can easyly track you).
2)Use Cash ONLY
3)Burn your Phone(Personal) and Purchase Burners(Only for Important calls)
4)Put Money On PrePaid Cards If need to purchase Online
5)Sell/Quit any items that has records(Cars, Rent, ISP) sell to private buyers and Quit on Lapse
These are some i not gonna list all because the chances of this is very minor. But yea only way to have anonymity on the real world would be to become someone else, dont trust does apps or software that will spoof your calls or encrypt your SMS they are all backdoored and can easyly be access by the government if they have a warrent.
Alright here we can work thing out without having your real identity compromised. First ALL free public emails such as Gmail,Yahoo,Hotmail etc are not SAFE!, If anything is suspicious they will turn you in to the feds quick. Now email service provider like TorMail, AnonymousSpeech, HushMail, PrivacyBox are secure and you can use to communicate secure, but still where aiming for 100% anonymity so a simple secure email provider isnt enough. To truly has anonymity we will use something called PGP[Pretty Good Privacy].
-PGP
Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, e-mails, files, directories and whole disk partitions to increase the security of e-mail communications. It was created by Phil Zimmermann in 1991.
With this plus a secure email provider we can be safe, what PGP does is encrypt the message your send to the other person and create a private and public key. You give that public key to the person your sending the message to and he/she uses that key to decrypt the message and vice versa.
-Webcam
Dont use this please, want to see someone, then meet in person like the old days.
-Social Networking
If you seek 100% anonymity, then this is your worse enemy. Dont get near this
Especially Facebook.
-Pictures
Picture carry EXIF Data that can give out valuable information sometimes, unles you encrypt your picture or remove EXIF data from it, it can be quite dangerous to your anonymity.
-IM(Instant Messaging)
Now IM is something alot of hackers use just as Skype, ICQ, Jabber, Etc
With this is quite dangerous if you do not know how to use carefully. If ypou configure Skype properly there may be a chance of anonymity, ICQ and Jabber have for anonymity and if well configured even more. But Overall Best is IRC
If it is kept private and allowed spoofed connection you should be safe to communicate IM, of course keeping a regualr comversation. There is also TorChat,CryptoCat,WASTE,ChatCrypt,Zfone.
-Other ways to secure communication
Some other ways i hvae used to communicate are
-Code
-Steganography
-Dead Drop
-Code
In code sometimes many people to bother to decrypt a line in a source code or maybe dont even notice it, so you send a message to your partner that look just like a script or something. but inside the code the a small encode line that is were you message beholds. You can do this in PHP with base64 or more advandced techniques.
-Steganography
Your hiding a message inside a image, this takes some knowledge and understanding of steganography. But it is very useful if used correctly.
-Dead Drop
This method is used in the real world, how this works is you get a everyday item just as rock, grass and you make a replicaof it (but fake) and try making it that its blends into the desire location and inside that fake rock or grass you have a message for the targeted person to pick up. Withou the averge person noticing it.
[0x03]- Hiding Your IP
Hiding your IP is somethign everyone think is as simple as clicking tor or opening a VPN service and BAM your IP is gone, Not excatly.. First let me explain why is isnt that easy.. for starters Tor and ANY VPN service are vulnerable and left trace.. Tor is highly vulnerbale and out friend "sl1nk" has proven it multiple time so no need to explain much.. juts know that the government and other hacker have control and even created fake exit nodes on tor that a regualr n00b will fall for and connect, ethiers is a honeypot or just plain badnews for you. And VPN all related on DNS, which is the worse enemy for your IP.. well there Flash as well.. you see DNS and Flash are the two biggest give aways for your real IP. They both are used to bypass a proxies/VPN/etc and show your real IP. So how we hide are IP? well there muliples ways.. one way is leaving Tor and going over to JonDo(https://anonymous-pr...t/en/jondo.html) JonDo acts like Tor but its encrypts eveything plus doesnt relay on exit nodes. Second would be using socks5(private)+tunneling(different box) see you spoof your ip with a good socks5+ tunneling(ssh)or hacked (RDP's) thro different boxs(computers) or if you are not a rookie you can make a botnet and infect thousands of computer making them your "zombies" and a few rooted servers plus your private list of socks5 and you should be a hard sucker to trace back too... Isnt any fancy programs or cool OS's you can try to actually hide your IP, truth is there is no such thing in completely hiding your IP Adress.. Its will alwsays be there the trick is how good and long can you hide for. Unless you have the magical "0.0.0.0" ip adress that few people have
There not much a big chapter for this section. becuase i am not going to lie to you and recommend you 100 programs that keep logs and just want money. Remeber were aiming for "Almost Perfect Anonymity".
[0x04]- Your Browser vs You
Your Browser well you can say this goes with Hiding your IP as well, Alright let me tell you how your browser is extremly important when it comes to anonymity, EVERYTHING you do is recored wether you believe me or not. First to start. If you plan on have close to 100% anonymity forget Chrome,FireFox,Safari,Opera forget them.. Now i use Chrome and FireFox cause I do need that much anonymity. But if you do here are my recommended lightweight browser. ALSO- DONT NOT KEEP ANY PASSWORDS IN YOUR BROWSER!!
Thats it there they are, there lgithweight and open source, no backdoors no nothing. Uzbl is kind of a pain to use but by far the safest.
If you still want to use the other browser then here some tips and addons for them. For one if your going to use one use FireFox..
- Firefox
Forsure disable Javascript or install NoScript, disable Cookies,History. And start private browser.
Here some addons you can install..NOTE the more addosn you have the more vulnerable you become, remember there all apps and services. << Logs
Addons
------
-CookieMonster
-IpFlood (Proxy Simulator)
-NoScripts
-Ghostery
-FlashBlock/AdBlock
And for Chrome just go Incognito really all i can tell you and maybe install Ghostery and HTTPS Everywhere, To be honest Chrome is backdoor so dont even waste your time if you seek anonymity.
Next is your search engines agen is Chrome is backdoored you Google dont keep logs on what your search, Of course if your searching cats or dogs google is fine but hacking or computer related thing keep private. there multiple ways to do a private search without google. there are few private search engines you can use to help you keep your privacy. BTW dont be fooled by "Encrypted" Google is just same thing with SSL.
Those are some you can try most private would be Ixquick in my opinion.
Next is encoding what your search for of course this if again your paraniod and need 100% anonymity. Dont have to do this if your hiding ponys and porn
Alright well this part easy is just encoding, you can encode your url with the following formats.
And again remember all this goes with hiding your IP, stated above ^^
[0x05]- DNS & WIFI (Short version)
Well Last but not least, This section im not going into advanded details nor big explaination becuase i'll be making a seperate paper explianing more in details. But DNS and your Wifi is big big way your digital identity can be compromised, especially by the government. So for Wifi is simple you have two options, Ethier 1) Encrypt Your Connection 2) Be a traveler and go to places with public wifi(fastfood,cafes,neighbors,comp store,etc) ohh and of course encrypt your connection while your there
For DNS is quite more complicated but im going to give you a more breif and easier way in this tutorial. On way to be more secure is changing your Primary DNS. Here some Secure DNS for you
Your can check your DNS here - ...http://www.dnsleaktest.com/��
That will be all.
[