Author Topic: Complete Anonymity  (Read 3160 times)

0 Members and 1 Guest are viewing this topic.

Offline DuhkLuhw

  • NULL
  • Posts: 2
  • Cookies: 0
    • View Profile
Complete Anonymity
« on: April 14, 2015, 07:35:20 pm »
Hi,

I need to maintain contact with someone through contacting their Gmail in a way that they know it is myself, but also while remaining absolutely anonymous at the same time. I was thinking of the below:

1. Access VPN
2. Access Tor
1. Create message with Privnote (reference unassociated email to receive "read receipt").
2. Paste Privnote message link into Cryptabyte's self-destructing message interface.
3. Forward Cryptabyte message to a Guerrilla Mail address.
4. Forward received Cryptabyte message to recipient's Gmail.
5. Request that recipient reply to a Tutanota.com email address.
6. (if not 5.) Request recipient send reply to alternate Guerilla Mail.

All these steps I would do behind A VPN, then accessing a Tor Browser. My Tutanota email was registered behind Tor & I only log onto it from behind Tor.

To my knowledge Privnote, Guerrilla Mail, and Tutanota cannot be subpoenaed. Privnote and GuerillaMail info does not stay on the servers long enough to be properly subpoenaed. Tutanota claims utmost privacy and I have read that they do not have access to user communication information & further more do not disclose information to US agencies under any circumstances.

I was told that Privnote had been taken down at some point by government agencies, so I will be looking for an alternative. Not sure which other counter-part service offers a "read receipt" though.

Would it do anything to further increase my anonymity to do all of this while also using wifi at a public outlet, such as a coffee shop?


I am using Windows 8 on a Lenovo laptop. These companies do not have any ability to monitor me under these circumstances, correct?


The purpose of this, is business communication. I do not personally know the recipient, and my trust of others is little.

If there is a better approach to this, please share your ideas with me. Thanks.

Offline d4rkcat

  • Knight
  • **
  • Posts: 287
  • Cookies: 115
  • He who controls the past controls the future. He who controls the present controls the past.
    • View Profile
    • Scripts
Re: Complete Anonymity
« Reply #1 on: April 14, 2015, 08:01:57 pm »
I don't know about all those web services you mentioned, but take a look into PGP.
With PGP you can sign and encrypt your emails, so that the recipent knows that only you could have sent it.
The anonymity side of it is just the ususal procedure, connecting to a VPN then connecting to the TOR network should be good enough, then create an new email address over that connection and create a PGP key for it.
Thunderbird with Enigmail addon is the easiest way to get started with PGP.

Edit: Also with PGP it doesn't really matter who see's the contents of the emails, because only the person with the private key can read them. No need to trust anyone but yourself and the friend who recieves the messages.
« Last Edit: April 14, 2015, 08:09:16 pm by d4rkcat »
Jabber (OTR required): thed4rkcat@einfachjabber.de    Email (PGP required): thed4rkcat@yandex.com    PGP Key: here and here     Blog

<sofldan> not asking for anyone to hold my hand uber space shuttle door gunner guy.


Offline DuhkLuhw

  • NULL
  • Posts: 2
  • Cookies: 0
    • View Profile
Re: Complete Anonymity
« Reply #2 on: April 15, 2015, 08:02:50 pm »
I have looked around some and I don't believe my original steps ensure absolute anonymity.

A Tor user can be located if they utilize a website that runs Javascript.

Tutanota is not a good solution either for email purposes apparently. The company is based out of Germany where the NSA supposedly runs most of it's operations out of & Germany is known to easily comply with government requests, especially that of the USA. I had read that Tutanota can decrypt user information if they are told and/or deem and account to be used for "illicit" purposes, so it appears to me Tutanota simply have open rights to access your info when they, or someone else wishes (with "proper" procedure). So much for encrypted email that they claim.....

Guerrilla Mail states to use Javascript on the front end of their website, so I know a user using just Tor can be tracked utilizing Guerrilla Mail.

A user's ISP can determine that you have accessed Tor, then you can be located that way. Supposedly accessing a front-end VPN, then logging onto Tor blocks an ISP from being able to determine that you have accessed Tor, but an ISP can still see that you have accessed a VPN. I'm not sure if this would then allow a user's ISP to connect a user's VPN usage to that of their usage of the Tor browser? Would accessing a VPN, then> Tor, then> a VPN do anything to circumvent the above? You would want to purchase the back-end VPN with bitcoin or a counterpart to conceal identity of that VPN, if this is a feasible solution.

I am now considering using a small chain of Anonymous remailers like CypherPunk, and then at the end of the remail chain using a Mixmaster
remailer to reroute the response back to me via another return-chain of Anonymous remailers. I have not tested this, but this is what I am thinking if it's doable. Supposedly Anonymous remailers do not retain communication logs and I don't believe they can access your info anyways because they utilize PGP.

Any input on the above is appreciated. I am by no means a guru on any of this, I'm learning as I look into the above.
« Last Edit: April 15, 2015, 08:04:16 pm by DuhkLuhw »

Offline d4rkcat

  • Knight
  • **
  • Posts: 287
  • Cookies: 115
  • He who controls the past controls the future. He who controls the present controls the past.
    • View Profile
    • Scripts
Re: Complete Anonymity
« Reply #3 on: April 15, 2015, 08:55:49 pm »
You are overcomplicating this rediculously.
Have you ever heard of KISS (keep it simple stupid).
You are opening yourself up to all kind of attacks by trusting so many different layers.
Of course you dont use javascript on tor thats fucking obvious isnt it?
Just use the tor browser and you dont have to worry about any of that shit.
like I said before, it's very simple:

1. get on a paid VPN
2. get on tor browser
3. signup for a gmx.com email account over that connection
4. make a PGP key
5. use it.

KEEP IT SIMPLE STUPID

say it with me.  :)

EDIT: I just realised you are trying to hide from government agencies. That's crazy, nothing I or anyone else can say will help you do that. Good luck!
« Last Edit: April 15, 2015, 10:01:39 pm by d4rkcat »
Jabber (OTR required): thed4rkcat@einfachjabber.de    Email (PGP required): thed4rkcat@yandex.com    PGP Key: here and here     Blog

<sofldan> not asking for anyone to hold my hand uber space shuttle door gunner guy.


Offline sh4d0w_w4tch

  • Peasant
  • *
  • Posts: 73
  • Cookies: -1
  • Please do not feed the skids.
    • View Profile
    • 6c.nz
Re: Complete Anonymity
« Reply #4 on: April 17, 2015, 06:38:21 pm »
You cannot be completely anonymous.  If you want to be anonymous for everyone on the internet, follow these steps.

/* I forgot to add this.  Use a different user on your computer so you're not using your same keys and personally written software.  If somebody gets a payload on your computer they can find all your personal files that will probably have your name and if that fails they could get the names of wifi networks in your area and get your location. */

1) Buy prepaid cards (non reloadable) for everything.
2) Buy a cheap burner phone.  Make sure it is Android so you can use apps without needing to keep paying for plans.
3) Create a PayPal and maybe a Facebook account under your identity.  Some places that don't take prepaid cards allow PayPal.
4) Sign up for a VPN service.  If you use your own VPS, you will not be anonymous from your new identity.  This can make it easier to find your real identity.  A heavily used VPN service with many locations is best.  If you start outting transphobes under a VPN IP that you use all the time, anyone trying to dox you will know to look for die hard LGBT activists.
5) Never associate with any previous accounts, users, or web sites that you have had contact with.
6) Don't display any strong interests that you have or have shown under other identities.
7) Never use your real information on any account.  Even if your accounts get hacked or the provider is social engineered, you will not be found.
8) Use a VOIP number wherever possible.  It will save you money and reduce the chance that somebody can maliciously track your prepaid phone.

Not sure about this, but somebody might be able to find you by filing a lawsuit.  If you use a phone the cops could track its location
« Last Edit: April 17, 2015, 08:15:02 pm by sh4d0w_w4tch »
DeepCopy | Can you name a VPN provider that's like "hey use our services to hack government sites and spam the internet. Please Abuse our services"

+Polyphony | paging master hackers of evilzone: i am here to learn about your black hatted tools to hack different viruses like facebook, sql, php, and other ring zero exploits