Friday, April 12, 2019

Privacy: Being Less Exposed On The Internet

These are two ways to keep anyone from seeing or being able to track your e-mail communications. Know that I’m not giving any bad guys new ideas. These have been used by the bad guys already. Now good guys can use them.

Two people open 30 anonymous e-mail accounts with 30 different passwords. On the 1st of the month the first e-mail account is used, on the 2nd the second account is used and so on, until each account is used. This is very difficult to catch because there is no pattern of use. It’s very hard to monitor single use accounts.

Another method is to open an e-mail account and write a message but don’t send it. The other person can open the same account and read the message in Drafts and then delete it.
The e-mail has never been sent, and cannot be tracked.

Other Tips

E-mails sent from public computers like coffee houses and libraries make tracking e-mail even more difficult. Using language that doesn’t actually mention names of people or places has been in use ever since communication has been used.

Most of the following info is from Privacy.com
https://privacy.net/stay-anonymous-online/

February 19, 2018 By Dennis Anon

Use TOR. First and foremost, Tor Browser isn’t connected directly to the World Wide Web. All internet traffic, both incoming and outgoing, first goes through the Tor Network. An amazing grassroots achievement in its own right, the Tor Network is made up of thousands of relays, called nodes, located all over the world. All of these relays are operated by volunteers who support the Tor Project and keep it open to everyone, free of charge.
Every time I visit to a website, all the data that gets uploaded and downloaded in the process is encrypted and sent through a random sequence of nodes, making it next to impossible to trace back to my computer. This process is called onion routing, from which Tor’s name is derived The Onion Router.
Bridge
The most recent upgrade to Tor Browser made using and troubleshooting bridges much easier. To set up a Tor Bridge, do the following:
• Click the onion icon with a drop-down menu next to the URL bar
• Select Tor Network Settings
• Check “Tor is censored in my country” box
• Assuming you don’t have a particular bridge in mind, keep the default option to Select a built-in bridge
• Click the dropdown and select obsf4. You can try the other types if obsf4 doesn’t work
• Click OK
You are now connected to Tor through a bridge! Note that even if your connection isn’t blocked, your ISP might still know about the bridge you’re using.
Search Privately

Google’s business model depends on collecting as much information about its users as possible, and a big part of that includes keeping track of who searches for what. So long as you’re in the Tor browser, Google shouldn’t be able to identify you, but just in case, the Tor browser’s search bar uses DuckDuckGo instead of Google.
DuckDuckGo is a search engine that emphasizes privacy. It doesn’t gather data about who uses it or what they search for. It’s fully independent and the search results are usually the same as what you’d find on Google.

More Secure E-Mail

Mailinator can only receive email, not send it. It’s most useful for anonymously signing up for stuff. You can invent any email address you want so long as it ends with “@mailinator.com”. You don’t have to create the account in advance, and no registration is necessary. Let’s say you need an email address to create a bitcoin wallet. You could sign up using the email address sendbitcoinhere@mailinator.com. Then you can go to Mailinator and check that inbox to verify the account. All emails are part of the public record and deleted after roughly eight hours.
Reminder: Only access Mailinator from the Tor browser, otherwise the site could log your IP address or add a tracking cookie to your browser. You will have to deal with some annoying CAPTCHAs, but that’s the price of anonymity. (CAPTCHA is a verification you are human)

Guerilla Mail works in much the same way as Mailinator, but you can send and receive email. A randomized email address is created for you as soon as you open the site, and you can change it whenever you like. The email addresses are permanent, but the emails themselves are deleted after about an hour. For two-way communications, this is my preferred tool.

To be honest, for a determined, talented, or well financed organization, tracking you or finding who you are will happen. Most governments don’t need to spend the time and capitol it would take to break through some of these safeguards. If you want to be anonymous, stay off the internet. But these ideas will help you to be a little less exposed.

Semper Paratus
Check 6
Burn

1 comment:

  1. In the current era, the threat perception has changed a lot, and the requirements of proper torso protective clothing have evolved as per the surroundings. Now, the Body Armor is sought by security agencies; police teams; private citizens and body guards; special operation groups and military establishments.

    ReplyDelete