How to be Invisible Online (and the hard truth about it)...
Anonymity in the US
In this section, the speaker discusses how being anonymous in the US is challenging due to the NSA's involvement in every transaction.
Being Anonymous in the US
- The NSA has access to every transaction, making it difficult to be anonymous.
Controlling Network Traffic
This section covers how controlling the final hop on a network controls traffic and how this relates to anonymity.
Control of Network Traffic
- Whoever controls the final hop on a network controls traffic.
- The Onion Reading Protocol is not as anonymous as people think because whoever controls exit nodes also controls traffic.
- The NSA knows that whoever controls the final hop on a network controls traffic.
Hacking Neighbors' Wi-Fi
This section discusses why young people want to hack their neighbors' Wi-Fi and whether using a neighbor's Wi-Fi can keep someone safe.
Hacking Neighbors' Wi-Fi
- Young people often want to hack their neighbors' Wi-Fi.
- Using a neighbor's IP address does not keep someone safe.
Misconceptions about Using Neighbor's Wi-Fi for Anonymity
This section addresses misconceptions about using a neighbor's Wi-Fi for anonymity.
Misconceptions about Using Neighbor's Wi-Fi for Anonymity
- Many people believe that using their neighbor's Wi-Fi will keep them safe because it shows their neighbor was on that website.
- Using a neighbor's Wi-Fi does not keep someone safe.
Investigator's Perspective on Using Neighbor's Wi-Fi
This section provides an investigator's perspective on using a neighbor's Wi-Fi.
Investigator's Perspective
- An investigator from the naval criminal investigation unit said that using a neighbor's Wi-Fi does not work because law enforcement will knock on doors of everyone within a few houses and find the person who committed the crime.
- The person who committed the crime is almost always right next door or in the same apartment building.
Introduction to Guest Speaker
In this section, David Bumble introduces Occupy The Web as his guest speaker.
Introduction to Guest Speaker
- David Bumble introduces Occupy The Web as his guest speaker.
How to Remain Anonymous on the Internet
This section covers how to remain anonymous on the internet.
Remaining Anonymous on the Internet
- Occupy The Web discusses how to remain anonymous on the internet.
Staying Anonymous on the Internet
In this section, the speaker discusses how difficult it is to stay anonymous from intelligence agencies and commercial interests. He explains that staying anonymous from the NSA in the US is particularly challenging because they have access to all internet traffic.
Staying Anonymous from Intelligence Agencies
- The NSA has access to all internet traffic in the US, making it difficult to stay anonymous.
- Other countries' intelligence agencies also have taps into local internet, making it hard to remain anonymous.
- Becoming a target of an intelligence agency makes it even harder to remain anonymous due to their advanced tools and legal sanction.
Staying Anonymous from Commercial Interests
- It's relatively easy to stay anonymous from commercial interests.
- Hiding your IP address alone won't keep you anonymous since there are other ways of tracing your identity.
VPNs and Anonymity
- Using a VPN does not guarantee anonymity.
Staying Anonymous Online
In this section, the speaker discusses the importance of anonymity online and how to achieve it.
Anonymity Measures
- VPNs, proxies, and Tor are good measures for hiding IP addresses. However, there are other ways of tracing users besides just their IP address.
- Intelligence agencies and law enforcement have resources to find individuals who want to remain anonymous. Most internet users give away their information to commercial interests like Facebook or Google.
Chrome Browser
- Google Chrome is a great browser but constantly sends personal information back to Google Headquarters. Wireshark can be used to see that Chrome is communicating everything the user does back to Google Headquarters.
- Artificial intelligence is used by companies like Google and Facebook to create a mind map of users based on their searches and anticipate their needs. Brave is a more anonymous browser than Chrome or Bing.
Cookies
- Cookies in browsers can identify users if they have been placed by companies like Google or Facebook. Turning off cookies in browser settings will save identity but make life less convenient as users will need to log into every website manually. Private browsing is recommended for anonymity online.
Understanding Cookies and IP Addresses
In this section, the speaker explains what cookies are and how they work. They also discuss IP addresses and their importance in maintaining anonymity on the internet.
Cookies
- Cookies are text files that contain information about a user's identity and interests.
- These cookies can be presented to other websites as a user traverses the internet.
- Cookies may include a user's username and password.
IP Addresses
- While IP addresses are important for identifying users, there are other issues that are equally important in terms of maintaining anonymity on the internet.
- Proxy chains is a tool that uses multiple proxies to hide your IP address.
- Tor is an effective proxy chain option for hiding your IP address.
Using Proxy Chains to Hide Your IP Address
In this section, the speaker demonstrates how to use proxy chains to hide your IP address.
Setting Up Proxy Chains
- Proxy chains is built into Kali Linux and other operating systems.
- The key to using proxy chains is setting up the configuration file in Linux.
- The configuration file for proxy chains can be found at /etc/proxychains4.
Configuring Proxy Chains
- The configuration file for proxy chains allows you to select proxies that will take your traffic through a proxy, hiding your IP address.
- There are different chain options available, including dynamic chain, strict chain, round robin chain, and random chain.
- The configuration file also includes variables such as the proxy list format and the chain length.
Using Tor as a Proxy Chain
- Tor is an effective option for using as a proxy chain to hide your IP address.
- To use Tor as a proxy chain, start it up after configuring the major settings in the configuration file.
Using Tor Network with Mozilla Firefox
In this section, the speaker demonstrates how to use the Tor Network with Mozilla Firefox to anonymize traffic.
Setting up Tor Network in Mozilla Firefox
- Open Mozilla Firefox and go to "Tools" > "Network".
- Select the "Tor Network" option from the list of proxies.
- Check your IP address by going to "What's my IP". The location should show as Amsterdam.
Drawbacks of Using Tor Network
- Refreshing may jump to another IP, but it can be slow compared to commercial proxies.
- NSA has nodes all around Washington DC that make using Tor faster.
- Whoever controls the final hop on the network controls the traffic.
Controlling Traffic on Tor Network
- Setting up a router on the Tor Network is easy enough.
- Whoever has control of the last exit node can compromise anonymity.
Troubleshooting IP Address Detection
In this section, the speaker troubleshoots issues with IP address detection and demonstrates how to use a tool called Anon-Surf to send all traffic through Tor for better anonymity.
Using Google to Detect IP Address
- The speaker experiences timeouts when trying to detect their IP address using Google.
- They attempt to detect their IP address again using the "What's my IP" search on Google.
- The IPv6 is detected but not the IPv4.
Using Anon-Surf for Better Anonymity
- The speaker shuts down Proxy Chains and installs Anon-Surf on Kali Linux.
- They run
sudo installer.shin the Kali-Anon-Surf directory and then start Anon-Surf withsudo surf start.
- All traffic is now redirected through Tor, providing better anonymity.
Safest Operating System and Phone Usage
In this section, the speaker discusses safe operating systems and phone usage for maintaining anonymity.
Using Kali Linux with Anon-Surf
- The speaker recommends using Kali Linux with Anon-Surf for better security.
- Pushing all traffic through Tor provides better anonymity.
Using a Burner Phone
- The speaker recommends using a burner phone instead of your actual phone when you need to remain anonymous.
- A burner phone can be purchased inexpensively and put on a pay-as-you-go contract paid in cash, making it difficult to trace back to your identity.
Tips for Buying a Burner Phone
- Do not travel with your regular phone when purchasing a burner phone as geolocation data from your regular phone can be used to trace you back to the purchase of the burner phone.
Staying Anonymous Online
In this section, the speaker provides tips on how to remain anonymous online.
Tips for Staying Anonymous
- Use a burner phone and avoid visiting the same websites or using the same browsers as your personal phone.
- Use two separate systems if possible, with different browsers, operating systems, and IP addresses to keep your activities separate.
- Create false profiles with fake information to throw off anyone trying to connect information back to you.
Recommended ISP for Anonymity
- Starlink is recommended because their IP addresses are not geo-located, making it harder to trace back to you.
- Using Starlink in combination with proxies, VPNs or Tor can add an extra layer of anonymity.
Benefits of Starlink
- Starlink allows for mobility and can be used anywhere by putting it in your vehicle or taking it with you while traveling.
- The dish is smart enough to find the closest satellite as you move around, making it difficult to geo-locate you when using public Wi-Fi like at Starbucks or train stations.
Staying Anonymous Online
In this section, the speaker discusses ways to stay anonymous online and the importance of using multiple layers of protection.
Using Multiple Layers of Protection
- It's important to use multiple layers of protection when trying to remain anonymous online.
- One layer could be using a VPN or Tor browser, but it's important to remember that these are not foolproof methods.
- Another layer could be using a virtual machine or dedicated physical machine running Linux. This creates an additional layer of protection.
Avoiding Traces on Microsoft Word
- Microsoft Word and other Microsoft products put globally unique IDs into documents, which can be used to trace them back to your computer. It's recommended not to use these products for sensitive information.
Using Burner Phones
- To remain truly anonymous, it's important to have a phone that isn't linked to any carrier or credit card. The best way is to buy a burner phone with cash and pay for service month-to-month with cash as well.
- If you have multiple phones, they should never be in the same location at the same time because they can be tied together and traced back to you.
VPN vs Tor
- There is always debate about whether VPN or Tor is better for staying anonymous online.
- The speaker recommends using both if possible, but ultimately it depends on what you're comfortable with and what works best for your situation.
VPNs, Proxies, and Staying Anonymous
In this section, the speaker discusses the use of VPNs and proxies for staying anonymous online. They caution that while VPNs are generally safe for average users, those involved in cyber warfare may need to take additional precautions.
Using a VPN
- A VPN can be a good option for staying anonymous online.
- However, users must trust the VPN developer with their information.
- If the VPN is hacked, all user information becomes available.
Proxies
- Proxies can also be used to stay anonymous online.
- However, free proxies should not be trusted as they may have malicious intent.
- Intelligence agencies often try to determine people's identities by tracking their proxy usage.
Commercial Proxies
- To stay safe when using a proxy, it is recommended to use a commercial proxy where you pay someone to keep you safe.
Extreme Measures
- For those whose lives depend on remaining anonymous (e.g. journalists or those involved in cyber warfare), extreme measures may be necessary.
- This could include using separate infrastructures and devices for normal use and anonymous activities.
- It is important that these two systems do not intersect in any way that could reveal your identity.
Secure Email Providers
In this section, the speaker recommends protonmail as a secure email provider for those looking to stay anonymous online.
Protonmail
- The speaker recommends protonmail as a secure email provider.
- Protonmail is the only one they feel comfortable recommending due to its security features.
Privacy Laws and Secure Communication
In this section, the speaker discusses privacy laws in Switzerland and the importance of using secure communication services to protect personal information.
Importance of Swiss Privacy Laws
- Switzerland has a long history of protecting people's privacy through special laws.
- Law enforcement is less likely to compromise personal data in Switzerland compared to other countries.
- ProtonMail is a secure email service based in Switzerland that offers more strict privacy protection than other nations.
Secure Communication Services
- ProtonMail is a reliable and trustworthy secure email service.
- Other secure communication services include Mailfence, Private-Mail, Non-Affiliated Google Mail, and Secure Mail.
- Hardened operating systems such as Cubes OS, Subgraph OS, and Hardened BSD are good choices for ensuring safe and secure communication.
Bitcoin Transactions and Anonymity Strategies
In this section, the speaker discusses the traceability of Bitcoin transactions and strategies for maintaining anonymity online.
Traceability of Bitcoin Transactions
- Contrary to popular belief, Bitcoin transactions are not untraceable.
- Some cryptocurrencies offer better anonymity than Bitcoin.
Anonymity Strategies
- Maintaining anonymity requires throwing up roadblocks to those trying to trace you.
- Anti-Forensics techniques can help keep information off your machine by cleaning files off your system and overwriting them.
- Running an operating system all in RAM from a flash drive is a good strategy for maintaining anonymity, but it's not 100% effective.
- Forensic investigators can still pull some information from RAM even after you've rebooted the system.
- Buying a separate laptop or device for running Linux is another strategy for maintaining anonymity online.
Remaining Anonymous Online
In this section, the speaker discusses how to remain anonymous online and highlights the importance of making it difficult for people to find you.
Tips for Remaining Anonymous
- It is difficult to remain anonymous from intelligence agencies, but easier from commercial interests or neighbors.
- Google tracks your information extensively, so using DuckDuckGo in Brave browser is recommended for safety.
- Use separate identities for different search engines and websites to avoid connecting them.
- Leave behind false information that leads to multiple identities to obscure and make it more difficult to find you.
Conclusion
The speaker emphasizes the importance of separating behavior when trying to be anonymous online. Technical solutions are not always enough, and leaving behind false information can help obscure your identity.