EvilZone

Hacking and Security => Anonymity and Privacy => : lucid February 26, 2013, 12:41:43 AM

: The Art of Anonymity
: lucid February 26, 2013, 12:41:43 AM
                                      The Art of Anonymity
___________________________________________________________________________________________________

// This tutorial created by lucid.
// None of that "I collaborated a bunch of sources I found online!" shit.
// This tutorial for educational purposes only  (http://evilzone.org/Smileys/default/wink.gif)

::In This Tutorial
- Browser Security
- Local Net Security
- Encryption/Logs
- Virtualization Software/liveUSB
- IP Address

::What You Will Need
- A brain
- A computer
- The ability to read
- Wireshark (not absolutely necessary)
- Linux. There's already plenty of Windows tutorials out there.
- No Jews Allowed...
- Ok fine Jews

::Let's Get Started!

First of all, I realize that there are already a few anonymity tutorials in our wonderful Anonymity section. However, I realized today that they are incredibly generic and are practically duplicates of the hundreds of other generic tutorials out there littering the net. So, I decided to write one that is a little bit more inclusive. I would also like to add that there is not one tutorial out there that will provide you with absolutely all the information you will need to be 100% anonymous. In fact, I don't think that you even can be 100% anonymous. Keep that in mind, and always be paranoid.

::Browser Security

Chaining 35 proxies won't do you any good if you overlook other aspects of being anonymous. As far as I'm concerned there's a few keys points to browser security.

User Agent:

If you don't already know what this is then you should probably come back to this tutorial later in life. But just in case:

"The term was coined in the early days of the Internet when users needed tool to help navigate the Internet.  Back then, the Internet was (an actually still is) completely text-based, and to navigate the text, text commands needed to be typed into a keyboard.  Soon tools were developed to be the users 'agent', acting on the user's behalf so that the user didn't have to understand the cryptic commands in order to retrieve information.  Today, nearly everyone uses a web browser as their user agent." - http://whatsmyuseragent.com/WhatsAUserAgent (http://whatsmyuseragent.com/WhatsAUserAgent)

Obviously this can be indentifying, specially if you have a rather unique one. In older versions of Firefox you were able to go into the about:config and permanently edit your user agent. I don't think you can do that now. So instead, I would recommend getting an add-on to take care of this. There are plenty of them, but my favorite one is Override User Agent (https://addons.mozilla.org/en-us/firefox/addon/override-user-agent/) because it seems to have the most choices. Everything from Safari to Opera to Internet Explorer to Mozilla to Mobile user agents. Shit, you can even make it appear as though you are a Google Bot. Too easy.

You can do this in most major browsers and it will almost always come in the form of an add-on.

Something that was brought to my attention by proxx is that a network admin could potentially discover that you are being dishonest about your user agent via the TTL values of the packets. TTL stands for 'Time to Live' and is responsible for limiting the number of hops of a packet. This prevents the packets from floating around for eternity to explain it in a mundane way. So, an example would be that you are using a Windows user agent and spoofed it to be a Linux user agent. It would be possible for the net admin to analyze the TTL value and determine that it was changed and when.

A link provided by proxx might help to explain some of this: http://www.binbert.com/blog/2009/12/default-time-to-live-ttl-values/ (http://www.binbert.com/blog/2009/12/default-time-to-live-ttl-values/)

It would be a safe bet to keep your windows user agents windows, and your linux user agents linux. You can easily spoof the TTL values in linux, perhaps using iptables.

Referer Url:

This one seems to be rather overlooked. This is an HTTP header field that can be used to track your path from page to page. This one is also a simple fix. At least in Firefox. All you have to do is, once again, go to the about:config and search for network.http.sendRefererHeader. Once you've found it just set it to a value of 0. That takes care of that. You can also use the add on RefControl.

In Chrome you can check this out:

https://chrome.google.com/webstore/detail/referer-control/hnkcfpcejkafcihlgbojoidoihckciin?hl=en (https://chrome.google.com/webstore/detail/referer-control/hnkcfpcejkafcihlgbojoidoihckciin?hl=en)

If you are using Internet Explorer then..... Well then you should just go away.

Cookies:

Cookies are used to track your web activities. Don't think that just because you are using Tor you are safe from this. As usual there is a plethora of add-ons that you can use. You can also set your browser to not accept cookies from sites, however, you may find that you won't be able to access certain sites if you do this. At least make sure that you remove cookies when you are done with you session. This can be done in Firefox > Prefs > Privacy > Show Cookies >  Remove All Cookies. Obviously that's for firefox. In Chrome I think it's something like, Chrome > Tools > Clear Browsing Data. For Opera it would be Settings > Preferences > Advanced > Cookies.

For those of you who don't know there is such a thing as long-term cookies. Otherwise known as LSO's(Local Shared Objects). These are flash cookies. As far as I know they aren't removed when you do the cookie removing steps I mentioned above. You can handle these by getting the add-on called BetterPrivacy (https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/).

I hope I don't have to tell you guys to clear your history or use Private Browsing. Oh! and one more note that I'm not going to make a title for. Be aware of the Desktop and Web Browser extensions you are using. For example, weather monitoring extensions could be very bad because they may transmit zip codes or address information to get local weather reports. Many people overlook this. Hiding your IP won't matter if you overlook this.

Other good add-ons:

Adblock Plus (http://adblockplus.org/en/firefox) - Can be used for Firefox, Chrome, Opera and Android

HTTPS Everywhere (https://www.eff.org/https-everywhere) - Encrypts your communications with over 1000 websites. Unless you're taters I'm sure most of you are already using this.

Ghostery (http://www.ghostery.com/) - See what's tracking you on a site to site basis. Block them if you wish

TrackMeNot (http://cs.nyu.edu/trackmenot/) - I really like this one. This one spoofs your searches. For example, currently it looks like I'm browsing for: dogs

When instead I might be browsing: How to be a terrorist

No Script (http://noscript.net/) - Oh come on.


Startpage:

Also, for those of you who don't like Google for obvious reasons, check out Startpage (https://startpage.com/). It sends your searches to their own server before actually sending it out to the web to help hide who's searching. It's alot like Ixquick except that it yields better results. They don't log your IP.

::Local Net Security

If you aren't worried about your local network identifying your machine then I wouldn't worry about this section. Still, it's good to know.

MAC Address:

Your MAC address is a 48bit hardware identifying address which is part of your network card. Everyone has one and they are all unique. Again, this doesn't cross router boundaries so there are many situations when spoofing this doesn't matter. There are a few ways to spoof this. This first way being manually. The basic syntax for this is:

ip link set wlan0 down < to bring down the interface temporarily, otherwise it won't work
ip link set wlan0 hw ether ff:ff:ff:ff:ff:ff < don't use that one idiot

Snayler reminded me that in Debian based systems you can run:

ifconfig wlan0 down <to bring down the interface
ifconfig wlan0 hw ether ff:ff:ff:ff:ff:ff

Then you have to reconfigure the interface. Simply running ip link set wlan0 up(or ifconfig wlan0 up) won't work.

The easier way is just to do this with macchanger.

:
macchanger --help
Code: Usage: macchanger [options] device

  -h,  --help                   Print this help
  -V,  --version                Print version and exit
  -s,  --show                   Print the MAC address and exit
  -e,  --endding                Don't change the vendor bytes
  -a,  --another                Set random vendor MAC of the same kind
  -A                            Set random vendor MAC of any kind
  -r,  --random                 Set fully random MAC
  -l,  --list[=keyword]         Print known vendors
  -m,  --mac=XX:XX:XX:XX:XX:XX  Set the MAC XX:XX:XX:XX:XX:XX

Generally I prefer to do macchanger -r wlan0. Don't forget to run ip link set wlan0 down first. If you want to run this at startup you could write a little bash script and symlink it.

:
ln -s /etc/init.d/script.sh /etc/rcX.d/K10script.sh

For those systemd users I created a tutorial not too long ago on exactly how to do this here (http://evilzone.org/tutorials/mac-spoofing-with-systemd/).

DHCP:

Many people are aware of the MAC address and that spoofing it might be a good idea. Not everyone considers this though. You dhcp client will often transmit some information when requesting an IP address. Much of the time this only includes your hostname and MAC address(which you now know how to spoof). Unless your hostname is:

twinkletits@hackingboxDumbassvilleOregon123herpderpLane

Then you should be fine.

Unfortunately, at least in the case of dhcpcd for you Gentoo and Arch users, it transmits a hell of alot more. It will transmit your hostname, dhcpcd version, kernel, OS and architecture. This is known as your vendor class id. Which is obviously very identifying. This can be taken care of by editing your /etc/dhcpcd.conf file.

So, for example instead of having your actual hostname and vendorclass id be transmitted you can change it to whatever you want. Now, here's where you might want Wireshark. Set your filter to bootp and send out a DHCP request.

Take a look at this DHCP Request packet.

(http://i.imgur.com/y7YsaA1.png)

Notice where it's highlighted and it says Vendor Class ID. That is extremely identifying information. As you can see I'm using Arch linux with Genuine Intel. You now know my exact kernel and dhcp version. Underneath you can see that my hostname is machine. However, when I append these lines to the bottom of /etc/dhcpcd.conf:

:
hostname imatransvestite
vendorclassid isc-dhclient-V3.1.3:Linux-2.6.32-45-generic-ubuntu:x86

And now we send out another dhcp request.

(http://i.imgur.com/qXyFpEh.png)

Take a look at my vendor class id and hostname now. Be aware there are alot of local services that may transmit your user and hostname. TCP ident lookups, FTP logins, perhaps telnet are examples. Generally it's a good idea to not have a unique or identifying user and hostname.

::Encryption/Logs

NOTE: This information up to the Paranoid Encryption category is largely taken from the Arch Wiki. However, it is not copy/paste.

There are a few kinds of encryption.

Stacked Encryption:

This is a when an encrypted filesystem is stacked on top of an existing filesystem. This causes all files written to the encrypted folder to be done so "on the fly" before being written to disk.

- eCryptfs

- EncFS

Block Device Encryption:

This, on the contrary, is written below the filesystem layer to make sure that everything written to a certain block device is encrypted.

- dm-crypt + LUKS

- Truecrypt

Example Encryption Schemes:

1. Simple Data Encryption -
Would include an encrypted folder in /home. Might be encrypted in EncFS or truecrypt.

2. Simple Data Encryption(external device) -
Would include an entire external device encrypted with Truecrypt.

3. Partial System Encryption -
Would include the home directories encrypted, perhaps with eCryptfs. SWAP and /tmp separate partitions encrypted with dm-crypt + LUKS.

4. System Encryption -
If using Truecrypt you can't do this in Linux.

5. Paranoid System Encryption -
A rather clever idea. The entire hard drive is encrypted with dm-crypt + LUKS, and the /boot partition is on a separate USB stick. You would have to be freshly installing to do this because I highly doubt that any of you set up your /boot partition to be on a separate USB stick. This way, you can't even boot the OS without the USB.

Be sure that anything sensitive you may have you NEVER put in an unencrypted area. I recommend always having at least an encrypted folder, if not an entire device, on an external drive. That way it is entirely off of your computer. I you accidentally happen to save something in an unencrypted area, don't think that deleting it is good enough. Every *nix should have a built in shredding command.

man shred
:
NAME
       shred - overwrite a file to hide its contents, and optionally delete it

SYNOPSIS
       shred [OPTION]... FILE...

DESCRIPTION
       Overwrite  the specified FILE(s) repeatedly, in order to make it harder

Usage: shred [OPTION]... FILE...
Overwrite the specified FILE(s) repeatedly, in order to make it harder
for even very expensive hardware probing to recover the data.

Mandatory arguments to long options are mandatory for short options too.
  -f, --force    change permissions to allow writing if necessary
  -n, --iterations=N  overwrite N times instead of the default (3)
      --random-source=FILE  get random bytes from FILE
  -s, --size=N   shred this many bytes (suffixes like K, M, G accepted)
  -u, --remove   truncate and remove file after overwriting
  -v, --verbose  show progress
  -x, --exact    do not round file sizes up to the next full block;
                   this is the default for non-regular files
  -z, --zero     add a final overwrite with zeros to hide shredding
      --help     display this help and exit
      --version  output version information and exit

I would recommend at least using the u and z flags. If you want to shred the contents of an entire directory you can run this command:

'find -type f -execdir shred -uvz '{}' \;'

Logs:

Logs can let someone know what you have been doing on your system. Some common places for logs and temporary data in Linux are:

/tmp
/var/tmp
/var/logs
/home (hidden files and folders)

I would be careful about what you go doing in these directories. Destroying certain files could do serious damage to your operating system. Something else I would watch out for is your swap partition. Data could be saved here if you happen to use swap. This data could be retrieved even though you may not be aware of it. If you have the RAM I would recommend not even making a swap partition. Alternatively, you could mount your RAM and swap as /tmpfs and they will be cleared at shutdown. You can easily do this in your /etc/fstab. Certain *nixes already have this as default.

If you are thorough(paranoid) enough, you could always write a bash script to run in place of your shutdown command. I don't know how many of you use the terminal to shutdown but if you don't you could always edit whatever shutdown button you use to run your script.

Here's an example script:
:
#! /bin/bash
# Truncate all files in /var/log
find /var/log -type f exec sh -c '> "{}"' \;

# Clear any other log files you deem necessary
cat /dev/null > ~/.cache/config/openbox/openbox.log
cat /dev/null > blahblah.txt
shutdown -h now

Then you can set your script to an alias:

:
alias shutdown='/path/to/bash/script/shutdown.sh'

And add that to your ~/.bashrc. This way all you have to do is open a terminal and run 'shutdown' and you clear all your logs before shutdown. Simple.

::Virtualization Software/liveUSB

To be quite honest, I wouldn't worry TOO much about logs. A better idea is to just not do anything illegal on your main OS. There are alternatives.

Virtualbox/VMware:

A good idea is to install some anonymity based OS(or any OS for that matter) in a virtualization software of your choosing. Doing this keeps alot of sensitive information such as logs and whatnot off of your main OS. Think of it as keeping all your dirty underwear in one tiny basket. I'm not going to teach you how to create a virtual machine here because, it's fucking easy. What I will say is that if you are going to do this you should do it the right way. My recommendation is to follow these steps:

1. Encrypt an external device. Preferably not a USB. You'll probably need something with more room.

2. Before you create the virtual machine, plug in your external and unlock it(since you encrypted it).

3. Set the path of the virtual machine in your settings to the path of the encrypted device. Doing so will make it so that the only way to access your virtual machine is if the device is plugged in and unlocked.

4. For extra security use a couple of keyfiles. Use a few jpegs or mp3 files on yet another external device. That is, if you're paranoid enough  (http://evilzone.org/Smileys/default/cool.gif) . Some good operating systems for doing this might be:

- Virtus (http://evilzone.org/operating-system/virtus-linux/)(although it runs on Ubuntu 11.10 so maybe not)
- Whonix (http://sourceforge.net/p/whonix/wiki/Home/#whonix-homepage)

Whonix is built specifically for Virtualization software. You can not install this on your actual computer. Due to the way it's built DNS leaks are impossible.

liveUSB:

Using virtualization software is good practice. However, it IS still on your actual computer. Yet a safer way would be to create a liveUSB. You can do this with UNetbootin, LinuxLive USB Creater(LiLi) or the dd command.

dd if=/path/to/iso of=/dev/sdX

Create it with no persistence. What is persistence you ask? Persistence is when any settings or modifications you make on a liveUSB stay, or, persist every time you start up the liveOS.

The downside to creating a USB with no persistence is that everytime you decide to boot it up, any settings you may wish to have(such as many of the settings I mentioned in the tut so far) will have to be done every single time. However, the upsides I think outweigh the downsides. Basically, a liveUSB with no persistence is like booting into a fresh install of an operating system every time. So on those warm summer days where you feel like talking a relaxing walk to the public library, sitting down with a cool drink, and hacking the gibson, you can! Just pop in your liveUSB and hack away! Ok, don't really do that. But you get my point. This way when you are done you just yank the thing out and the next time you boot it up it will be like nothing ever happened on the liveUSB. If you are going to do anything really serious, this is a good option. Good operating systems for this might be:

- Privatix (http://www.mandalka.name/privatix/index.html.en)
- Liberte (http://dee.su/liberte)
- Tails (https://tails.boum.org/)

Really though you can use any operating system you want. These are just some examples of anonymity based operating systems.

::IP address

Ok ok fine. I'll talk about hiding your IP. I'm not going to go quite as in depth as I may have with the other sections of this tutorial because this is only one part of being anonymous that people get too hung up on. Not that it's not important. People seem to think this is all you have to do to be anonymous though, and they are wrong. But, it wouldn't be a complete anonymity tutorial without this part now would it?

Proxies:

Wikipedia says: "In computer networks (http://en.wikipedia.org/wiki/Computer_network), a proxy server is a server (http://en.wikipedia.org/wiki/Server_%28computing%29) (a computer system or an application) that acts as an intermediary for requests from clients (http://en.wikipedia.org/wiki/Client_%28computing%29) seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity. Today, most proxies are web proxies, facilitating access to content on the World Wide Web (http://en.wikipedia.org/wiki/World_Wide_Web)."

Ah yes. Proxies. Some of them log, and some of them don't, but how the hell do we know which ones do and don't? Hard to tell really. There are a few main different kinds of proxies.

- Transparent Proxies: Simply put, a transparent proxy is no good for doing anything illegal. You Ip address is logged and shown. Although these may have the advantage of being a bit faster.

- Anonymous Proxies: These hide your IP address. One downside is that anything you may connect to can probably tell that you are using a proxy. Which may cause problems for you in many cases.

- Elite Proxies: These hide your IP and may hide the fact that you are using a proxy at all. Which can be beneficial. These often times will be the slowest.

WARNING: Never assume that any proxy is not logging. Even if they say they aren't.

A good thing to look at is the country it is in. You should never use a proxy that is in the same country as you. If you've done something worth trying to track you down for, LE won't have any trouble doing so if you used a proxy in your country. What you want to do is figure out which countries have the best privacy laws. Or which ones have the worst so you can avoid them. As far as I know, Sweden has very good privacy laws. China or North Korea however, have shitty ones. The US isn't really the best for internet privacy either. So choose wisely.

Another thing to look at is the different kinds of protocols a proxy may use. The main kinds of proxies you will here about are SOCKS proxies and HTTP proxies.

SOCKS proxies are lower-level then HTTP proxies. SOCKS uses a network handshake to send information about a connection. The SOCKS proxy then opens a connection, perhaps through a firewall. HTTP Proxies are transported over TCP and forwards an HTTP request through and HTTP server. One simple way to look at it is that HTTP proxies are web-based(obviously), and SOCKS proxies are machine based. Rooting a multitude of SSH servers and chaining them would be an example of a SOCKS proxy topology.

Some SOCKS Servers include:

- Dante (http://www.inet.no/dante/)
- ss5 (http://ss5.sourceforge.net/)
- Nylon (http://monkey.org/%7Emarius/pages/?page=nylon)
- sSocks (http://ssocks.sourceforge.net/)

A simple Google search will yield you some up to the minute proxy lists.

VPNs:

Wikipedia says: "A virtual private network (VPN) extends a private network (http://en.wikipedia.org/wiki/Private_network) and the resources contained in the network across public networks like the Internet (http://en.wikipedia.org/wiki/Internet). It enables a host computer to send and receive data across shared or public networks as if it were a private network with all the functionality, security and management policies of the private network.[1] This is done by establishing a virtual point-to-point (http://en.wikipedia.org/wiki/Point-to-point_%28network_topology%29) connection through the use of dedicated connections, encryption, or a combination of the two."

There's a major difference between proxies and VPNs. That difference is anonymity vs. privacy. The best way I can explain this is that anonymity means that someone is sticking his dick in all of the birthday cakes, whereas privacy means that Timmy is in the room with all the birthday cakes, but no one knows what he's doing in there. Keep in mind:

proxy == anonymous(more or less)
VPN == private(Virtual PRIVATE Network)

Generally you can guess that the paid VPN's are going to be more reliable than the free ones, given that you aren't an idiot who paid for it with your personal credit card and your real name. Again, be aware of where the VPNs are located. So if you are in the US, maybe don't use openVPN for anything illegal. Their headquarters are located in California.

Tor:

I refuse to talk about Tor.

Proxy Chaining:

All I can say here is proxychains. It's a very useful tool and it's easy to use. With this tool you can chain proxy to proxy, proxy to VPN, proxy to VPN to Tor(if you want), proxy to proxy to proxy to proxy to proxy to VPN to proxy. But let's not get to excessive.

You will need to take a look at /etc/proxychains.conf. There isn't a manpage for it, all the directions you need are located in the config file. Basically what you do is add whatever proxies or VPNs you may want(make sure to note the IP and the port number) and you add them after this part:

:
[ProxyList]
# add proxy here ...
# meanwile
# defaults set to "tor"
socks4  127.0.0.1 9050

The proxies you add should be in this format:

:
type  host  port

So for example:

:
socks4 198.10.23.100 80

Then you run the proxychains program.

:
proxyresolv targethost.com

Other Techniques:

Evidentally one of the best ways to remain anonymous is to code your own proxy server, say a SOCKS server, and use other people's personal machines as proxies. This way you can be absolutely sure that they don't log. Or you can also look into 3proxy (http://evilzone.org/anonymity/3proxy-all-sorts-of-proxy-servers-%28http-https-ftp-socks45-msn-%29/) which was posted by ande quite awhile back. There is also Botnet proxies (http://threatmetrix.com/how-criminals-hide-behind-botnet-proxies/) if you feel like coding yourself a botnet if that's your thing. This is outside the scope of this tutorial however.

::Check Yourself Sites

http://whatsmyuseragent.com/ (http://whatsmyuseragent.com/)

http://www.whatsmyip.org/ (http://www.whatsmyip.org/)

http://www.dnsleaktest.com/ (http://www.dnsleaktest.com/)

::Anonymous Emailing


 - SilentSender (https://www.silentsender.com/)

 - Send Anonymous Email (http://www.sendanonymousemail.net/)

 - GuerrillaMail (https://www.guerrillamail.com/)

 - DeadFake (http://deadfake.com/Send.aspx)

 - Mailinator (http://www.mailinator.com/)

 - Melt Mail (https://meltmail.com/)

::Final Notes

This tutorial was inspired by all of the generic, useless, copy/paste anonymity tutorials out there. You know which ones I'm talking about. The ones that say:

"Here's a link to CyberGhost and what VPN's are, here's a proxy list, use Truecrypt, make sure to clean up with CCleaner, watch out for Viruses, here's some links to antiviruses. Full anonymous!"

To all those tutorials out there, thank you for motivating me to write this. This one's for you.

As I've said before, there is no one tutorial out there that will make you completely anonymous. Being completely anonymous is next to impossible. You can take as many precautions as you want but if the NSA is looking for you it doesn't matter how secure your Truecrypt password is and how many keyfiles you have. If you are important enough they won't really need to crack your password. They'll just beat it out of you. Besides many of the techniques I've outlined, being anonymous is common sense. Don't link you real email with you hacker identity. Don't talk about crimes you've commited. Use SSL with IRC. If you are going to do anything really serious, don't do it from home. Don't do it from your personal computer. Best of luck to all of you. Hope you gained something from this tutorial.

______________________________________________________________________________________________________

- lucid
: Re: The Art of Anonymity
: geXXos February 26, 2013, 12:48:02 AM
lucid this is a great tutorial and very well written, well done man. rep +1

: Re: The Art of Anonymity
: Snayler February 26, 2013, 01:43:34 AM
I'm amazed... Simply the best tutorial on the matter I've seen. And your sense of humor kept me motivated to read it all. If you don't mind, here are some things to add:

- Bringing down an interface can be done with "ifconfig wlan0 down" on debian/debian-based systems.
- ifconfig can also change the MAC address, like so: "ifconfig wlan0 hw ether ff:ff:ff:ff:ff:ff".

Almost forgot, +1!
: Re: The Art of Anonymity
: lucid February 26, 2013, 01:48:26 AM
That's true about the ifconfig. I'm selfish though and in Arch linux ifconfig is depreciated. I forgot to consider other OS's. Thanks for the feedback guys  ;D

Snayler I added your bit about ifconfig in there.

EDIT: This may seem selfish but I would like to see the current stickied tutorial unstuck. I don't think that tutorial should be representing Evilzone's anonymous section. Not to be a dick it's just how I feel.

EDIT 2: Tutorial updated and errors fixed. Information added.
: Re: The Art of Anonymity
: dfzquery February 26, 2013, 08:47:26 AM
This was a great read!
Good stuff in here.

Thank you.
: Re: The Art of Anonymity
: EMOKDOOM February 26, 2013, 09:16:30 AM
Going to read this tomorrow - looks very thorough though. Can i ask was OS you're using? Slackware? Arch?
: Re: The Art of Anonymity
: rasenove February 26, 2013, 09:19:25 AM
Cant figure out where you found "art" in anonymity but this post surely deserves to be a sticki.
+1
: Re: The Art of Anonymity
: sn0w February 26, 2013, 12:56:15 PM
Enjoyed reading. You sure are a good writer and have good sense of humor.  +1
: Re: The Art of Anonymity
: lucid February 26, 2013, 05:24:12 PM
Going to read this tomorrow - looks very thorough though. Can i ask was OS you're using? Slackware? Arch?

Arch
: Re: The Art of Anonymity
: silenthunder February 26, 2013, 05:44:24 PM
Fucking beautiful tutorial lucid. Its gonna be between this and my sister to keep me anonymous. It's stupid, she just got her degree in computer forensics and shes working for a company that sells church steeples. I don't know anybody that knows networking better than her, and shes sitting behind voip taking phone calls.
: Re: The Art of Anonymity
: lucid February 26, 2013, 06:02:40 PM
Fucking beautiful tutorial lucid. Its gonna be between this and my sister to keep me anonymous. It's stupid, she just got her degree in computer forensics and shes working for a company that sells church steeples. I don't know anybody that knows networking better than her, and shes sitting behind voip taking phone calls.

Thanks, well hopefully this covers most of your needs. Besides local services and whatnot I think I covered most things. And local services aren't an issue if you just don't use them.   :P
: Re: [EvilTutorial] The Art of Anonymity
: Stackprotector February 27, 2013, 09:14:16 AM
Stickied for the time being, keep an open mind for all comments and tech updates. I also added "[EvilTutorial]" as a experiment for community tutorials so we can filter trash from good stuff.
We'll see how it goes :)
: Re: [EvilTutorial] The Art of Anonymity
: rapture February 27, 2013, 09:58:00 AM
Thanks for this, better guide than mine, which is very generic and a bit useless because of too much linking. I felt bad on mine too, I will try to improve it. plus 1 for you.
: Re: [EvilTutorial] The Art of Anonymity
: Corrupted_Fear February 27, 2013, 05:48:40 PM
Wonderful guide, its quite obvious your browser preference is firefox over chrome :P


for useragent examples:


http://www.user-agents.org/ (http://www.user-agents.org/)


for chrome plugins:


http://downloadsquad.switched.com/2010/11/01/15-google-chrome-extensions-for-better-privacy-control/ (http://downloadsquad.switched.com/2010/11/01/15-google-chrome-extensions-for-better-privacy-control/)
: Re: [EvilTutorial] The Art of Anonymity
: lucid February 27, 2013, 07:45:55 PM
Wonderful guide, its quite obvious your browser preference is firefox over chrome :P


for useragent examples:


http://www.user-agents.org/ (http://www.user-agents.org/)


for chrome plugins:


http://downloadsquad.switched.com/2010/11/01/15-google-chrome-extensions-for-better-privacy-control/ (http://downloadsquad.switched.com/2010/11/01/15-google-chrome-extensions-for-better-privacy-control/)

Yeah sorry about that.

@ rapture - No hard feelings.  ;D
: Re: [EvilTutorial] The Art of Anonymity
: vezzy February 28, 2013, 12:09:10 AM
Wonderful job. You could have also included some info on anonymity networks such as Freenet and I2P, but overall excellent.
: Re: [EvilTutorial] The Art of Anonymity
: parad0x February 28, 2013, 06:46:54 AM
Use
Self-Destructing cookies (https://addons.mozilla.org/en-US/firefox/addon/self-destructing-cookies/?src=search) - Cookies when you need them, not when others need them to track you - Gets rid of a site's cookies as soon as you close its tabs. Detects tracking attempts and blocks them, can help against CSRF attacks. Trustworthy services can be whitelisted.
: Re: [EvilTutorial] The Art of Anonymity
: TGavin March 01, 2013, 04:26:48 AM
Thanks for the great read! It was very insightful especially for a beginner like me who knows squat about anonymity and hacking. I'm hoping to stick around here and learn as much as possible. ;D Just a question, you say you don't want to speak about Tor in your post, is it bad or..? I'm using Tor with most of the add-ons you spoke of in the post.
: Re: [EvilTutorial] The Art of Anonymity
: lucid March 01, 2013, 04:30:47 AM
Thanks for the great read! It was very insightful especially for a beginner like me who knows squat about anonymity and hacking. I'm hoping to stick around here and learn as much as possible. ;D Just a question, you say you don't want to speak about Tor in your post, is it bad or..? I'm using Tor with most of the add-ons you spoke of in the post.

I don't like Tor because it's slow for one thing. Not to mention it's very easy to expose who a person is and what they are doing, it's easy to slip and leak some information about yourself. Plus the .onion net isn't as interesting as people make it out to be. Endnodes can sniff and hijack your session. It's no where near a perfect anonymity service. Don't ever use it for any serious hacks or anything like that.

It's alot safer if you use it inside of a VM though. Maybe set up a host/workstation VM and use SSH.
: Re: [EvilTutorial] The Art of Anonymity
: lucid March 01, 2013, 05:49:06 AM
Updated
: Re: [EvilTutorial] The Art of Anonymity
: TGavin March 03, 2013, 11:23:00 PM
I don't like Tor because it's slow for one thing. Not to mention it's very easy to expose who a person is and what they are doing, it's easy to slip and leak some information about yourself. Plus the .onion net isn't as interesting as people make it out to be. Endnodes can sniff and hijack your session. It's no where near a perfect anonymity service. Don't ever use it for any serious hacks or anything like that.

It's alot safer if you use it inside of a VM though. Maybe set up a host/workstation VM and use SSH.

Allright, I understand! Thanks for your input. In your opinion, though, what's the best way to be at least partially anonymous for free, that doesn't involve paying for Proxies or VPNs? Again pardon if my questions are rather dumb as I am quite new to all of this. :)
: Re: [EvilTutorial] The Art of Anonymity
: lucid March 03, 2013, 11:33:03 PM
Allright, I understand! Thanks for your input. In your opinion, though, what's the best way to be at least partially anonymous for free, that doesn't involve paying for Proxies or VPNs? Again pardon if my questions are rather dumb as I am quite new to all of this. :)

Well....that's kind of what I wrote the tutorial for.  :P Didn't you read it?
: Re: [EvilTutorial] The Art of Anonymity
: Deque March 10, 2013, 04:43:23 PM
A great tutorial. Why didn't I see it before?
I guess, because I don't read topics like that as you said yourself, they are almost all boring and exchangeable. I only saw it, because it was nominated for the EZine +1
: Re: [EvilTutorial] The Art of Anonymity
: lucid March 10, 2013, 08:35:54 PM
A great tutorial. Why didn't I see it before?
I guess, because I don't read topics like that as you said yourself, they are almost all boring and exchangeable. I only saw it, because it was nominated for the EZine +1

Oh it was? How touching.
: Re: [EvilTutorial] The Art of Anonymity
: TaZe7777 March 25, 2013, 11:47:34 PM
The silk road use "tor". (The silk road is the largest online drug market place)
: Re: [EvilTutorial] The Art of Anonymity
: proxx March 26, 2013, 06:49:43 AM
I don't like Tor because it's slow for one thing. Not to mention it's very easy to expose who a person is and what they are doing, it's easy to slip and leak some information about yourself. Plus the .onion net isn't as interesting as people make it out to be. Endnodes can sniff and hijack your session. It's no where near a perfect anonymity service. Don't ever use it for any serious hacks or anything like that.

It's alot safer if you use it inside of a VM though. Maybe set up a host/workstation VM and use SSH.

Why would you consider that 'a lot safer' , are you aiming at DNS leaks ?
Its weird that TOR still uses socks 4 by default, 4a fixes the problem to some extend.
But in that case its better to just use iptables to drop any leaking traffic.


And just a side note.
If you change your user agent from windows to linux or the other way around you must realize that the TTL must also be changed to match accordingly.
: Re: [EvilTutorial] The Art of Anonymity
: lucid March 26, 2013, 07:13:30 PM
, are you aiming at DNS leaks ?


Pretty much
: Re: [EvilTutorial] The Art of Anonymity
: lucid April 01, 2013, 05:09:18 AM
!UPDATED!

Update is located in the logs section. At least one more update to come.
: Re: [EvilTutorial] The Art of Anonymity
: lucid April 09, 2013, 01:45:55 AM
!UPDATED!

Update is located in the User Agent section. Credits go to proxx.
: Re: [EvilTutorial] The Art of Anonymity
: proxx April 10, 2013, 06:07:27 AM
Very well put lucid :)
: Re: [EvilTutorial] The Art of Anonymity
: omegaflare June 17, 2013, 05:23:30 AM
I want to add one more thing: cryptoheaven. It's a nice client-based email in Canada, all of the in-between communication in the middle is encrypted with AES 256. On top of that, you really don't have to register. Fake names, no email verification, and no IP-logging. And to further add icing to the cake: you can literally self-destruct your account on the whim of your finger.

http://cryptoheaven.com/

- I often use openVPN but with PhantomPeer - untraceable. And it doesn't reside in the US. Most people will pay via PayPal or CC. But to add anonymity - use bitcoin: US can't do jackshit about it.

- Yes, I often get DNS leak with freeVPN via openVPN. This is why I use PhantomPeer (pay in Bitcoin only).
- Bitmessages - untraceable because it's a decentralized email client. Use Proxies and/or Tor to add anonymity (Bitmessages will work with Tor).
- Mac Changer? Not a big fan of it. Useful, but not really.
- VMware: I put it inside my encrypted system drive (internally or externally, doesn't matter).  So if I see something went wrong, just delete the VM files. You're good to go.   
: Re: [EvilTutorial] The Art of Anonymity
: proxx June 17, 2013, 06:38:03 AM
- VMware: I put it inside my encrypted system drive (internally or externally, doesn't matter).  So if I see something went wrong, just delete the VM files. You're good to go.

Just deleting it is not gonna cut it.
Other than that I think your on the right path.
: Re: [EvilTutorial] The Art of Anonymity
: vezzy June 17, 2013, 07:32:10 PM
Shredding, on the other hand, probably will.
: Re: [EvilTutorial] The Art of Anonymity
: proxx June 17, 2013, 07:43:39 PM
Shredding, on the other hand, probably will.
Likely will yes, I believe bleachbit also has some nice functions related to this.
Overwriting x time with junk, now I think about it; thats not good for your drive :P
: Re: [EvilTutorial] The Art of Anonymity
: sandipanarnab June 19, 2013, 08:59:10 AM
Well I have to say it is really unique, I have? t seen such brilliant tutorial in any of the other forum. Lucid u are truly a genius.

Saecondly, I have got three questions:

1) Do I have to configure whonix in the same way as u have discussed here?  Because AFAIK Whonix is an anonymity based OS and it already protects one against IP leak and DNS lea

2) What should I do to spoof Vendor ID Windows ? Specially in latest versions? Can u refer me sucha good tutorial regarding windows?

3) If I use one or two VPN in my host OS and use Whonix along with it will it give me extra security?

I thank u in advance.apk
: Re: [EvilTutorial] The Art of Anonymity
: lucid June 19, 2013, 08:01:23 PM
1. Whonix is technically supposed to work out of the box. I'm sure a handful of these tweaks you could apply to whonix but at least you know you don't have to mess with the IP tweaks or anything like that.
 
2. http://support.microsoft.com/kb/240247. Try that. Keep in mind that you don't want to spoof you vendor class ID to something linux if you are using windows. For windows you are going to have to keep it as some kind of windows otherwise it will be quite obvious that you have spoofed it.

3. Not entirely sure what you mean by that last question. Want to clarify?
: Re: [EvilTutorial] The Art of Anonymity
: sandipanarnab June 21, 2013, 05:24:11 PM
1. Whonix is technically supposed to work out of the box. I'm sure a handful of these tweaks you could apply to whonix but at least you know you don't have to mess with the IP tweaks or anything like that.
 
2. http://support.microsoft.com/kb/240247 (http://support.microsoft.com/kb/240247). Try that. Keep in mind that you don't want to spoof you vendor class ID to something linux if you are using windows. For windows you are going to have to keep it as some kind of windows otherwise it will be quite obvious that you have spoofed it.

3. Not entirely sure what you mean by that last question. Want to clarify?




I wanted to know if I install a vpn client on host os will it give an extra layer of security to any virual os like whonix? Because I think all network connections through the host is untorrified, and it may leak DNS or IP. So do I need to configure the host as well for complete anonymity?
: Re: [EvilTutorial] The Art of Anonymity
: lucid June 21, 2013, 06:27:57 PM



I wanted to know if I install a vpn client on host os will it give an extra layer of security to any virual os like whonix? Because I think all network connections through the host is untorrified, and it may leak DNS or IP. So do I need to configure the host as well for complete anonymity?

 Well, you shouldn't have to as that's kind of the point of Whonix. I don't see any harm in trying and messing around with it a bit. That's the best way to learn.
: Re: [EvilTutorial] The Art of Anonymity
: bat July 02, 2013, 08:39:02 PM
nice post lucid!  if i could add on to your post...
there additional layers of anonymity to consider when trying to remain anonymous.  digital anonymity is pointless if it can be traced back to you physically.  here's my two cents on one of those layers in regards to using vpn/proxy/etc services that are fee-for-service types.  they mostly all claim to not keep your information and that it is destroyed immediately once payment is processed.
- 1st, most important step, if you plan on using any of the fee-for-service vpns, do not pay for the service with your own credit card!
  as lucid already said in his tut, even if the site claims they do not log or keep any information, never assume they are not storing or selling something on you somewhere.
- if you do plan on paying for a service, use a pre-paid one time use card.
- if you plan on purchasing a pre-paid card, again do not use your own credit card to do so, use cash or another previously purchased pre-paid card.
- if you plan on purchasing a pre-paid card in person, do not smile at the camera behind the counter!  reasonably disguise yourself (as not to draw too much attention), and if possible, find a place that does not have video surveilance behind the counter and/or parking lot.  definitely not a big name established chain with a video backup system with archives for months/years!
there are multiple layers of anonymity to consider well beyond lucid's tut and this quick "do this, not that".  any failure in those layers can be attributed to a = bust!  and your true identity is revealed... those 3-letter agency guys are pretty good, ya know.
how paranoid are you?!?! --that's the million $ question!  and only the most paranoid are the one's that have a chance in hell at staying anonymous.
: Re: [EvilTutorial] The Art of Anonymity
: Truth July 11, 2013, 12:53:53 PM
I have a problem... everytime i do ifconfig wlan0 down then I do macchanger -r wlan0 it changes the mac adress but then I cant access a webpage.. im guessing wlan0 is still down but I dont know how to bring it back up... :S
: Re: [EvilTutorial] The Art of Anonymity
: vezzy July 11, 2013, 01:01:11 PM
: (Bash)
ifconfig wlan0 up
Logic saves the day yet again.
: Re: [EvilTutorial] The Art of Anonymity
: proxx July 11, 2013, 02:03:13 PM
: (Bash)
ifconfig wlan0 up
Logic saves the day yet again.

*Bangs forehead on table*
: Re: [EvilTutorial] The Art of Anonymity
: lucid July 11, 2013, 06:14:02 PM
You may also want to manually reset your internet connection if you are having problems depending on how you connect to the internet.
: Re: [EvilTutorial] The Art of Anonymity
: Truth July 12, 2013, 04:51:40 PM
: (Bash)
ifconfig wlan0 up
Logic saves the day yet again.

Gee i dunno.. maybe i tried that -.-... it doesnt work.
: Re: [EvilTutorial] The Art of Anonymity
: proxx July 12, 2013, 05:07:39 PM
Gee i dunno.. maybe i tried that -.-... it doesnt work.

In that case you should be clear what it is that doesnt work.
For example, can you ping ? is it associated ?
What do you use to connect?
Basic network debugging cmon.
: Re: [EvilTutorial] The Art of Anonymity
: lucid July 12, 2013, 07:37:13 PM
Gee i dunno.. maybe i tried that -.-... it doesnt work.

How do you connect to the internet?
: Re: [EvilTutorial] The Art of Anonymity
: Truth July 18, 2013, 09:40:38 PM
I connect using the wireless lan card... I cant get past the rooter.
: Re: [EvilTutorial] The Art of Anonymity
: lucid July 19, 2013, 12:32:53 AM
Uh...yeah. I'm sure you use your NIC to connect to the network. What I mean is do you use Network Manager, Wicd, manual connection... After you spoof your mac and bring up the interface, perhaps try to reissue dhcp to assign a new local IP. Since the network issues unique IP addresses based on unique MAC addresses, and since you just spoofed your unique MAC, you'll probably need to get a new IP since your new MAC hasn't been authenticated yet.
: Re: [EvilTutorial] The Art of Anonymity
: fox12345 September 07, 2013, 05:41:28 PM
 8) thanks my dear friend, it is really help full to my knowledge. so i have some problems with some anonymity topics.


# spoof the TTL values
how to spoof TTl values via backtrack? what are the best method to spoof the TTL values? I have no idea about that..


# HTTP header
how to edit HTTP header? are you talking about that? i have no idea....please give me some helpful information to hide my ID.


# MAC Address
are you think The Live USB OS is really spoof the our MAC? I think it is using the some encryption option and transport with our spoof MAC. but this is only my mind. it correct or wrong? "with Using wireshark
# Tor
why are you refuse to talk about Tor? it is not a secure browser?


please reply me.......
[size=78%] [/size]
: Re: [EvilTutorial] The Art of Anonymity
: vezzy September 07, 2013, 07:23:05 PM
# Tor
why are you refuse to talk about Tor? it is not a secure browser?

The feds fund 60% of its budget, it originated as DARPA technology, the exit nodes are best assumed as compromised, most Tor users use 1024-bit RSA/DH keys that the NSA can feasibly crack, the FBI recently made headlines for using a JavaScript exploit to infiltrate onion services, some protocols and poor browser configurations inadvertently leak information and so on.

It's pretty much time to leave Tor behind. While it may be useful for private casual browsing, anything more serious than that and you'll be sorry.
: Re: [EvilTutorial] The Art of Anonymity
: lucid September 08, 2013, 07:52:11 AM
# MAC Address
are you think The Live USB OS is really spoof the our MAC? I think it is using the some encryption option and transport with our spoof MAC. but this is only my mind. it correct or wrong? "with Using wireshark

I would explain this to you but I have no idea what the fuck you are talking about. Please use clearer english or Google translate and I'll try to help you out with this.

For the HTTP Headers you could always get an add-on.
: Re: [EvilTutorial] The Art of Anonymity
: lucid September 12, 2013, 04:52:34 AM
Lol you're going to need ten posts to give me that +1 sir. Thanks for the feeback I appreciate it.
: -
: SomeKid September 20, 2013, 02:06:49 AM
Thanks for the tutorial, quite informative for a nooblet.
: Re: [EvilTutorial] The Art of Anonymity
: Architect October 16, 2013, 05:28:36 AM
Very informative from a security standpoint, +1
: Re: [EvilTutorial] The Art of Anonymity
: JohnnyFeelgood November 01, 2013, 01:11:35 PM
Hmmm, nice and all that. But I was thinking slightly different.
If Google(NSA) has 100 people indexed. And they offer via via via TOR as super secret privacy alternative. After some time x number of people disappeared from Google, due too using TOR.
 
Who would be more prone for inspection by NSA? 
 
So, my "How to keep private" suggestion would be a scenario like this:
Get generic laptop, using default installation and keep it like mister avarage. Perhaps even get some infections, be a general computer user.
 
Get a USB and use that for your portable internet browser from within hidden truecrypt storage. And yes I would also use TOR just to prevent those snooping locals.
 
Now look for open hotspot. Start your laptop for some basic browsing using the default browser. You need some alibi anyway. Now, also plugin your USB and start using the portable webbrowser or other tools you might need.
 
Afterwards, remove the USB. Although by using hidden truecrypt storage even the USB can be in plain sight.

: Re: [EvilTutorial] The Art of Anonymity
: lucid November 03, 2013, 05:25:57 AM
I don't think anonymity in regards to the NSA really works like that..

And yes I would also use TOR just to prevent those snooping locals.

NO. Saying you would use Tor in order to prevent snooping is like saying you would take tequila shots and eat nothing but soup in order to prevent diarrhea.

It's better for everyone if we get used to the idea that Tor is pretty much useless for anything requiring any sort of real anonymity.

On the other hand though, you have a good idea about browsing and whatnot from a flashdrive. I did cover that in the tutorial..
: Re: [EvilTutorial] The Art of Anonymity
: GoldDust November 15, 2013, 09:57:35 AM
Great tutorial, Lucid. Thanks for the post. I know I should search, but would anyone be interested in an I2P tutorial?

-GD
: Re: [EvilTutorial] The Art of Anonymity
: RedBullAddicted November 15, 2013, 01:16:21 PM
Hi GoldDust,

I will give you the same reply I got when I started :) No one will beg for a tutorial. If you think you have something to share just do it. I am pretty sure ppl. will like it. So just go ahead and write whats on your mind.

Cheers,
RBA
: Re: [EvilTutorial] The Art of Anonymity
: Heisenburg November 21, 2013, 01:43:03 PM
 8)  Enjoyed~
Me used to write a script that randomize the MAC address of network interface.


But this is way more informative and detailed. Great tutorial.

: Re: [EvilTutorial] The Art of Anonymity
: lucid November 21, 2013, 08:31:09 PM
8)  Enjoyed~
Me used to write a script that randomize the MAC address of network interface.
Glad you got something out of it.  I had created a script awhile back which randomized MAC on startup before DHCP, effectively making it look as though a different client is requesting an IP everytime I connected to said network. Eventually, my router stopped giving me new IP addresses..... lmao.

Which is how I learned about DHCP starvation as an avenue for MITM.
: Re: [EvilTutorial] The Art of Anonymity
: Kanade November 25, 2013, 12:41:26 AM
Nice tutorial.
Just a few remarks,

You don't talk about tor, but this serious.

  "TOR IS REALLY SECURE"

we can not qualify  anything really "secured" because as says it the sentence:
   "  安全性は錯覚です。"
Simply because the information which are transmitted on between knots, is not coded.
Secondly, because firefox isn't perfect, 0day are here.

  "TOR isn't secure"

This sentence is partly true for some time.
Before, we could change the configurations of TOR for something a little secure, but some options were deactivated because of a friend. thus there are the least interesting
(https://www.torproject.org/docs/tor-manual.html.en)

Other thing, you do not have  speak about the WIFI security...

Hide SSID! This not secure because your homespot  emit still, but it will protect you from begginner.

Use WPA2! If you have a WEP encryption and you can not change security mod, buy a new homespot, your homespot it's too older.

If you have WPA2, this is not yet secured.
Your WPA key (in HEX)  is normally situated on 64 bits (8 chars), with wordlist attack/bruteforce, you crack it in last 4 hours.

WPA2 propose it:

- WPA2 - 160-bit - 20 Characters
- WPA2 - 504-bit - 63 Characters

Don't use buffer overflow of 0x41 in example, because in wordlist it's maybe probable to have this word.

Use special chars (#,@,$) etc...

Use this for calculate the nomber of possibility for crack ur WPA2:
2^n > n=(log(x)/log(2)*k)

N corresponds to the entropy of your password. The more he is raised, the more it will be necessary to make out a will of combinations. We divide generally the 2^n by 2, because we rarely test all the possibilities. Convert then this result in minutes, hours, days, years following the trial speed (x password/sec).

Change password of your homespot configuration, Because there are often passwords of the kind:

               [....]

Oh I forgot: Disable WPS (PIN Vulnerable, PBC adn NFC: Bullshit)

Sorry for my english and Enjoy,
Regards, Kanade.


: Re: [EvilTutorial] The Art of Anonymity
: lucid November 25, 2013, 07:53:23 AM
You seem like your are decently knowledgeable, if only I could understand your post better. Although I fail to see why this needs to be included in my tutorial about anonymity. If you would like to create a wifi security tutorial be my guest. Certainly it's good to secure your home network, but from an anonymity standpoint, it's better to just not do anything serious from home.
You don't talk about tor, but this serious.
It amazes me how people adamantly refuse to give up on Tor and move on. Tor is absolutely not necessary for privacy and anonymity, as there are many better options out there. It is flawed in that it's easy to track anyone who exits Tor, and it's heavily watched for obvious reasons. Certainly it has it's uses still, but you are a fool if you think you are even remotely safe on Tor. So please, can we stop insisting that we need to talk about Tor every time the topic of being anonymous is brought up? I've grown tired of hearing about it.

On another note, thanks for the feedback at least.
: Re: [EvilTutorial] The Art of Anonymity
: Kanade November 25, 2013, 08:38:07 PM
 
Although I fail to see why this needs to be included in my tutorial about anonymity. If you would like to create a wifi security tutorial be my guest. Certainly it's good to secure your home network, but from an anonymity standpoint, it's better to just not do anything serious from home.

What?
We imagine that your neighbor crack your WiFi, he can now make a MITM is thus, steal your private data (and know your activities) and... you are not anonymized.

Your neighbor does not have to know who you are.

It amazes me how people adamantly refuse to give up on Tor and move on
I did not say the opposite.

Tor used a secure principle before (except encryption) and with a good tor configuration, we were "anonymous". But due to this mail: http://i.imgur.com/qDTwIxc.png (http://i.imgur.com/qDTwIxc.png)

I contact you further to a configuration of your service(department), here we are, I shall wish i can choose my countries of connections, the problem it is that the function " AvoidCountries " does not work, her as others.


Blabla:

*
*
*

<Configuration>

Only the function "ExcludesNodes" is functional, impossible to relaunch the  TOR service

You will have understood him, I look for the anonymity and offshore countries

The tor configuration it's impossible.  (ADM have disabled all functions)
use I2P.

I also want to speak about "TrueCrypt"
      see more at: http://www.privacylover.com/encryption/analysis-is-there-a-backdoor-in-truecrypt-is-truecrypt-a-cia-honeypot/ (http://www.privacylover.com/encryption/analysis-is-there-a-backdoor-in-truecrypt-is-truecrypt-a-cia-honeypot/)
We do not really know to whom belongs this honeypot, ... big brother?
use    DiskCryptor
: Re: [EvilTutorial] The Art of Anonymity
: Snayler November 25, 2013, 09:26:13 PM

What?
We imagine that your neighbor crack your WiFi, he can now make a MITM is thus, steal your private data (and know your activities) and... you are not anonymized.
Even with your "WiFi" ("access point" would be the correct designation here)  secured and locked away, if you're using your home connection (the one your ISP assigned to you, the one with YOUR true name associated) you'll never be anonymous.
Securing your home connection has not much to do with anonymity, more with security.
: Re: [EvilTutorial] The Art of Anonymity
: Resistor November 27, 2013, 02:55:34 PM
You seem like your are decently knowledgeable, if only I could understand your post better. Although I fail to see why this needs to be included in my tutorial about anonymity. If you would like to create a wifi security tutorial be my guest. Certainly it's good to secure your home network, but from an anonymity standpoint, it's better to just not do anything serious from home.It amazes me how people adamantly refuse to give up on Tor and move on. Tor is absolutely not necessary for privacy and anonymity, as there are many better options out there. It is flawed in that it's easy to track anyone who exits Tor, and it's heavily watched for obvious reasons. Certainly it has it's uses still, but you are a fool if you think you are even remotely safe on Tor. So please, can we stop insisting that we need to talk about Tor every time the topic of being anonymous is brought up? I've grown tired of hearing about it.

On another note, thanks for the feedback at least.


It's nice to see people here are realistic and objective in regards to Tor. On other forums, people say it's completely safe and mock anyone that says otherwise, even in spite of presented evidence.

Is there a consensus on I2P's ability to keep users safe, secure, and anonymous?
: Re: [EvilTutorial] The Art of Anonymity
: lucid November 27, 2013, 09:39:43 PM
Is there a consensus on I2P's ability to keep users safe, secure, and anonymous?
Not yet. Not on this forum at least. I've honestly never used I2P either.
: Re: [EvilTutorial] The Art of Anonymity
: proxx November 29, 2013, 03:30:24 PM
Not yet. Not on this forum at least. I've honestly never used I2P either.

I2P is a very cool project, use it sometimes.
Major difference is that its an anonymous network and as apposed to TOR not meant as a proxy.
There is a 'deepweb' like TOR, but its idea is to use the network within, sometimes called a darknet.
The encryption and identity protection is higher rated.
Its pretty specialized and will probably not make it so main-stream which is perhaps a good thing.
Only poor side is it coding language :S
: Re: [EvilTutorial] The Art of Anonymity
: lucid December 19, 2013, 08:15:38 AM
It's coding language?
: Re: [EvilTutorial] The Art of Anonymity
: proxx December 19, 2013, 09:42:00 AM
Mainly java.

https://trac.i2p2.de/wiki/java

Would be far more resource efficient based on something else.
: Re: [EvilTutorial] The Art of Anonymity
: lucid December 20, 2013, 12:07:27 AM
Ah. Indeed.
: Re: The Art of Anonymity
: OT March 07, 2014, 07:20:53 AM
I don't like Tor because it's slow for one thing. Not to mention it's very easy to expose who a person is and what they are doing, it's easy to slip and leak some information about yourself. Plus the .onion net isn't as interesting as people make it out to be. Endnodes can sniff and hijack your session. It's no where near a perfect anonymity service. Don't ever use it for any serious hacks or anything like that.

Care to provide a source or elaborate on the part where you said that it is very easy to expose a person and what they are doing, or that its easy to slip and leak some information? As far as I know this is untrue for normal use cases, the only leaks I know of are associated with people using bittorrent.

Endnodes can be sniffed if you're not using encryption, but if you're sending sensitive data unencrypted you have enough problems as it is.

It seems to me it would be alot closer to anonymity than say a VPN or proxy provider who could be logging you on their own or under order of the law.

The feds fund 60% of its budget, it originated as DARPA technology, the exit nodes are best assumed as compromised, most Tor users use 1024-bit RSA/DH keys that the NSA can feasibly crack, the FBI recently made headlines for using a JavaScript exploit to infiltrate onion services, some protocols and poor browser configurations inadvertently leak information and so on.

Tor being mostly funded by the feds doesn't make it compromised, neither does it originating as DARPA technology.  If you use an outdated version of the Tor browser bundle you are taking the chance of being exploited, just like if you're running any other outdated software. The outdated encryption was fixed a while ago, as people update that will correct itself.


I'm not saying Tor is a perfect solution to anonymity because I don't think there is one, I just think its the best solution for the majority of use cases. VPN's and proxies are vulnerable to the same problems and introduce new ones.
: Re: The Art of Anonymity
: lucid March 07, 2014, 02:50:18 PM
I'm not saying Tor is a perfect solution to anonymity because I don't think there is one, I just think its the best solution for the majority of use cases. VPN's and proxies are vulnerable to the same problems and introduce new ones.
No there certainly is not one you're right. Although anonymity is a lot more then just using either a VPN, a proxy, or Tor. The most effective ways are ways that are rarely talked about in public, or on the public internet. Every search you make on Google about being anonymous will tell you to use either a proxy, Tor, or a VPN. It would be silly to think that all the ways of being anonymous that exist could be found on Ask.com
: Re: The Art of Anonymity
: OT March 07, 2014, 04:02:30 PM
Have you seen The grugq's speech "OPSEC for hackers (https://www.youtube.com/watch?v=9XaYdCdwiWU)" at Hack in the Box 2013? It mat be of interest to you and others, there are slides (http://conference.hitb.org/hitbsecconf2012kul/materials/) to go along with it. He's an internet security researcher and lately has been focusing on OPSEC (from hackers to spies) and he runs a blog (http://grugq.github.io/) that focuses on OPSEC. I found it interesting, maybe someone else will too.
: Re: The Art of Anonymity
: lucid March 07, 2014, 07:17:12 PM
Thanks for that. Have a cookie.
: Re: The Art of Anonymity
: Waspnuts April 03, 2014, 02:12:37 AM
This article is a pretty good read. While I am still learning, this is all very interesting.
Thank you for the time you have put into this.
: Re: The Art of Anonymity
: Suspect May 31, 2014, 01:45:30 PM
Great tutorial, easy to follow even for a beginner like myself. Definitley going to be spending some time with it, thanks.
: Re: The Art of Anonymity
: 8478071360 September 04, 2014, 03:00:20 AM
All good stuff. Sometimes a great way to learn something is to try to do the opposite. Can you provide a tutorial on how NOT to be anonymous, so that every phreak knows you? Of course, I would want to post anonymously to become non-anonymous.  Sorry if that sounds seriously F'd up.
: Re: The Art of Anonymity
: RismaLove October 06, 2014, 01:10:35 PM
Anonymity is Be No Body and Make Who are you. nice tut lucid
, +1.
: Re: The Art of Anonymity
: Display March 30, 2015, 05:17:46 PM
This is great! there are more tricks to it than it seems but this guide covered it up a heck of a lot!!! Thanks!
: Re: The Art of Anonymity
: sh4d0w_w4tch April 03, 2015, 06:09:24 AM
You should create a second user on your computer when setting up an identity.  Obviously you don't want to be using the same SSH and PGP keys and you don't want to have all of your personal files alongside projects that are part of another identity.  This isn't for when you want to be anonymous from the government, you'll want more separation of identities for that.

Never interact with the online identities of your friends.  Even if it doesn't trace back to you, it will lead back to your friends and you could be eventually picked out.  Avoid any interaction with people your friends have interacted with online because it creates a link and your habits could be used to identify you.
: Re: The Art of Anonymity
: guccifer April 09, 2015, 09:22:56 AM
I haven't gone through all the replies, so f someone didn't specified that I will. You may want to add: "encryption over voice phone" as the first step...
: Re: The Art of Anonymity
: proxx April 25, 2015, 12:49:45 PM
Its nice and all that people like to say thanks , but we get it by now.
Lucid is not been around for ages.
: Re: The Art of Anonymity
: jamescc May 28, 2015, 11:43:29 PM
Being anonymous only means you have something to hide.  We have amazing spam filtering and OK with publicly releasing my email address.  It doesn't really matter.  I am not breaking the law and no spam bot can get through me spam filter.  It's foolproof.   

We are trialing the worlds best spam filters for large businesses (better than googles) for £9000 per install (1 domain)
james@codecreative.co.uk
: Re: The Art of Anonymity
: Syntax990 May 29, 2015, 12:15:44 AM
Being anonymous only means you have something to hide.

That there... That is why the human race is fucked.
: Re: The Art of Anonymity
: x0nic May 29, 2015, 03:05:25 PM
That there... That is why the human race is fucked.
That there.... That is why the human race has a slight chance of at least not being fucked as a whole.
Think positive! xP

Being anonymous only means you have something to hide.
If you really got nothing to hide (from whoever), you seriously are some boring fuck of a human being, lol.
Besides, you neither seem to understand the most simple and general ethical objections against broad surveillance, nor any other basic human right on privacy of the individual. So why don't you just fuck off and stop advertising your bullshit here?
: Re: The Art of Anonymity
: Muadib June 10, 2015, 02:44:23 PM
Years later, still picking up views........
It got me started and i'm off to the races..... ;D
: Re: The Art of Anonymity
: kokoTorEncrypt July 13, 2015, 12:21:59 PM
What about RDP (remote desktop protocol)? I think this is a good way to hide make you a shadow. - VPS with Windows / Linux (not PC). This is a good tutorial.
: Re: The Art of Anonymity
: sh4d0w_w4tch July 16, 2015, 06:48:03 PM
What about RDP (remote desktop protocol)? I think this is a good way to hide make you a shadow. - VPS with Windows / Linux (not PC). This is a good tutorial.

I think you're better off using a VM and some sort of anonymity tunneling like TOR or a VPN.  RDP is too slow and requires other measures on top of it.

Almost double posted.

I'll just leave this here.  https://www.youtube.com/watch?v=XYmfoovHj2Y

You can be anonymous to a limited extent from most people but total anonymity is impossible.
: Re: The Art of Anonymity
: Biokinetix October 03, 2015, 03:00:37 AM
Awesome thread and very, very informative unlike most other site's info on this topic. most people forget about all the various angles one need to cover with regards to anonimity and privacy. Big up to u for taking the time to write this.

Rep: +1
: Re: The Art of Anonymity
: rogue.hackz October 03, 2015, 10:01:45 AM
Nice tutorial, I liked that part where you discussed about dhcp and it does uniquely identify you on the network.

You've partially solved the problem by setting a static fake hostname & os but still when you connect to different networks under that same fake identity they can correlate or trace you back to that fake identity as it is static and not truly random.

It would be nice to have a script or dynamic config file to automatically randomise dhcp requests everytime you connect to a network and spoofing under the banner of different os not just linux. I'll do a bit of research and see if I can some up with something later.



: Re: The Art of Anonymity
: TarnaBar January 27, 2016, 04:15:04 PM
Great tutorial lucid , I knew some of these info allready but learned much more in these 5 minutes.

The last part is kinda funny, whoever is reading this tutorial doesn't probably need to worry about the NSA or about being so fucking important, because if he is THAT good he probably doesn't even need this info, but still it might help someone outhere  :P