web stats

Be Anonymous and Control Your Privacy Online

Hai guise,

I was on Demonoid late last night downloading Newswipe and I came across these rather interesting files. I have to say that I do not take any credit for them, but would like to share them with you or those that cannot access Demonoid as they aren’t as half as L337 as me.

Anyway, here goes, slightly reformatted:

How to be Anonymous Online
  • Use Tor to mask your connections.
  • Use I2P to mask your connections.
  • Tor and I2P (as well as FreeNet) have a ‘hidden services’ darkweb type of service, it is best if you stay within that service rather than using an exit node to the public internet.

NEVER EVER BROWSE THE PUBLIC INTERNET WITH YOUR REAL MAC ADDRESS!

A. Learn how to change your real IP address (this can be done easily by changing your MAC address) (TIP: The reason why this can be done is because you are usually assigned an IP based on your MAC address, so if you change it, you will receive a new IP)
 

 

B. In Windows to change your MAC address you can use:

  • i. TMAC or
  • ii. Device Manager > Your Network Card Properties > Advanced > Network Address property

C. In Linux to change your MAC address you can do:

  • i. ifconfig eth0 down
  • ii. ifconfig eth0 hw ether <your new MAC address>
  • iii. ifconfig eth0 up

D. If you are using a router to access the Internet you will need to learn how to get into your routers configuration and change the MAC address (TIP: MAC address clone means to copy your computers MAC address). If your router doesn’t let you change your MAC address GET A NEW ONE!
 

 

  • When using IM or IRC, make sure you’re using them through I2P or Tor.
  • Use a proxy:
    a. Transparent proxy: Does not modify your connection (therefore the webserver knows the original IP)
    b. Anonymous proxy: Modifies your header information but informs the webserver that you are a behind a proxy (better than transparent)
    c. Highly Anonymous Proxy: Modifies your header information but does not inform the server you are behind a proxy
  • Use a web-based anonymizer/proxy
  • Use a VPN/VPS
  • If you are using Chrome, stop! Use SRWare Iron instead.
  • Any time you are behind an anonymizer service (Tor, I2P, Proxy, etc.) disable all plugins (Flash, Java especially) as they can be used to get your real IP
  • Use “throw away” email such as mailinator
  • Use an ad blocker in your browser (Adblock Plus for Firefox or Adblock for Chrome/Iron)
  • Once you’ve become anonymous you must test your anonymity by using tools such as: Panopticlick, BrowserSpy, and Decloak
  • Javascript can also be used to find your IP address or anything you have done to lead back to you. You could disable JavaScript or install the plugin NoScript.
  • When signing up for accounts do NOT use a unique alias. Do not use a ‘common’ password; use something that can be ‘thrown away’. Do not input ANY personal information.
  • To get around inputting personal information you can:
    a. Disable JavaScript (if the site is using JavaScript as a validator)
    b. Input a “narrow” character for required fields.
  • Avoid using Google; use Scroogle instead.

Security Rules.
  • Too good to be true, then it probably is!
  • Disable web browsers from using third party cookies.
  • TrueCrypt: Encrypt system partitions and external hard drive partitions.
  • Updates: Make sure all software has latest firmware and security updates.
  • Anti-Virus / Anti-Malware: Make sure that anti-virus is installed and used (Malwarebytes, Microsoft Security Essentials).
  • If you ever get Malware, make sure you are skilled in removing that Malware (check out BleepingComputer for more info)
  • Anonymity 1 (tor): Use the Tor network to use the internet anonymously.
  • Anonymity 2 (proxy): Use proxies to use the internet anonymously.
  • Anonymity 3 (mailinator): Use mailinator to create a “throw away” email address.
  • Anonymity 4 (name): Never use your real name.
  • Anonymity 5 (alias): Choose a common alias or a word (NOT a unique alias). This will make search engines retrieve information that is more ambiguous.
  • Anonymity 6 (email): Never use or create an email with your name in the settings, or with your name in the email address.
  • Anonymity 7 (forums and chatting): Use IRC, I2P, IM with TOR, or 4chan [RemadE edit – LOLWUT?] to chat on the internet.
  • P2P File Sharing 1 (encryption): Force encryption in connection settings.
  • P2P File Sharing 2 (protection): Use PeerBlock to block blacklisted IP’s.
  • Logs 1: Make sure any IM conversations you have are logged by you.
  • Logs 2: Watch what you say on an IM convo because it can be logged somewhere else.
  • Cache: Always delete your caches.
  • Firewall: Make sure that a firewall is used and properly configured.
  • Retiring Hard Drives: When retiring hard drives DBAN them.
  • Secure Deletion: To securely delete files from a HDD use secure deletion software (Eraser, CCLeaner, THC Secure Delete Tools).
  • Passwords 1: Use passwords that are at least 8 characters in length.
  • Passwords 2: Use passwords that combine numbers and symbols.
  • Passwords 3: Do not use a password that contains personal information.
  • Passwords 4 (default passwords 1): Change all default passwords.
  • Passwords 5 (default passwords 2): Keep a list of all default passwords.
  • Passwords 6: Use pass-phrases instead of passwords.
  • Passwords 7: Watch out for social engineering.
  • Passwords 8: If you have a pass key on your smart-phone; finger print smudges can reveal your password.
  • Social Network 1: Do not have your personal information linked to your profile.
  • Security Questions 1: Make sure that anything you post on the internet cannot be used to answer your security questions.
  • Security Questions 2: If at all possible attempt to create your own custom recovery questions.
  • Plugins/Addons: Disable plugins you do not need or use (especially in web browsers).
  • Services: Disable unused services in the Operating System.
  • Task Scheduling: Always check task schedulers for unwarranted schedules.
  • Leaks: Any information that one has should be leaked on the internet.
  • SPAM: Protect yourself from the various emails, popup scams, and so forth.
  • Frauds: Protect yourself from Auction Fraud: Shill Bidding (bidding on an item to drive price up), Bid Shielding (Very high bids to discourage other bidders), Bid siphoning (Luring bidders off legitimate sites to other websites because of some “benefit”).
  • Court Records and Criminal Checks: Check county court for court cases on people.
  • Sex Offender: Use the FBI’s sex offender registry to find sex offenders
  • Authenticity: Use hashing such as MD5/SHA-1 to verify files
  • Auditing: Enable security auditing within Operating Systems (Windows: Local Security Policy). Most definitely enable Account logon failures/success.
  • Don’t become a victim of pharming or phishing.
    Encryption: If you are using encryption (in any form: WiFi, SSL, etc.) make sure that it is actually strong and has not been cracked yet.

Source: Will be posted when Demonoid is back online/not being “maintained”.

Download this post, formatted etc so you can also share and stroke your e-penis!

Discuss http://www.totse.info/bbs/showthread.php?p=160371

Leave a Reply