Advertisement
Guest User

Anonymous - An Introductory Guide to Safety during Social Instability

a guest
Feb 17th, 2011
5,100
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 16.12 KB | None | 0 0
  1. Anonymous - An Introductory Guide to Safety during Social Instability
  2.  
  3. --------------------------------------------------------------------------------------------------------------
  4. Foreword [fwd1]
  5. --------------------------------------------------------------------------------------------------------------
  6.  
  7. Political activists, dissidents, and even nonpartisan bystanders caught in social instability are often fearful for their protection and protection of their families. Citizens may face harsh and even violent opposition by authorities and security forces in such situations. This guide is designed to introduce the reader to the mentality needed to stay safe during unrest and protests - both online and offline. It furthermore aims to assist in continued communications during periods of internet and phone line restrictions.
  8.  
  9. --------------------------------------------------------------------------------------------------------------
  10. Index [ind2]
  11. --------------------------------------------------------------------------------------------------------------
  12.  
  13. *Foreward [fwd1]
  14. *Index [ind2]
  15. *Introduction [idn3]
  16. *Personal Safety [prs4]
  17. ---Physical Safety [phy5]
  18. ---Internet Safety [int6]
  19. *Internet Security [isc7]
  20. ---VPNs [vpn8]
  21. ---I2P [i2p9]
  22. ---Proxies [prx0]
  23. ---Tor Onion Router [tor1]
  24. *Communications [cmm2]
  25. *Additional Information [add3]
  26. ---Temporary Emails [eml4]
  27. ---Firefox Plugins [ffx5]
  28. ---Care Package [pkg6]
  29.  
  30. ------------------------------------------------------
  31.  
  32. To skip between sections of this article, use the search function on your computer [Windows: Ctrl-F / Macintosh: Command-F] and type in the four character code listed after the section in the index listing. For example, to jump to the foreword on Windows, you would press Ctrl-F and type "fwd1" [without the quotations].
  33.  
  34. --------------------------------------------------------------------------------------------------------------
  35. *** Introduction [idn3] ***
  36. --------------------------------------------------------------------------------------------------------------
  37.  
  38. The first section of this article will focus on personal safety. Personal safety can be spoken of in two different spheres: Physical Safety and Internet Safety. It is important to remember that these two spheres overlap: a lapse of internet safety could lead to physical identification. However, by keeping in mind a few important rules you can drastically reduce the chance of being singled out and identified.
  39.  
  40. The second section of this article will go into specifics regarding technology that can be used to communicate anonymously, maintain secrecy, and protest effectively.
  41.  
  42. --------------------------------------------------------------------------------------------------------------
  43. *** Personal Safety [prs4] ***
  44. --------------------------------------------------------------------------------------------------------------
  45.  
  46. --------------------------------------------------------------------------------------------------------------
  47. Physical Safety [phy5]
  48. --------------------------------------------------------------------------------------------------------------
  49.  
  50. The key to physical safety is to act normal so as not to draw undue attention to yourself and to not reveal identifying information to anyone. Important steps in achieving this can be separated into two lists: The Do List, and The Do Not List. These steps are especially important if you are an activist, as this puts you at more of a risk to start with.
  51.  
  52. The Do List:
  53. -----------------------------------
  54. +Blend in with crowds
  55. +Disperse into streams of people
  56. +Keep a low profile
  57. +Keep up to date on the news, especially protest rallying points and security checkpoints or roadblocks
  58. +Look for signs of plainclothes police in your presence
  59. +Cover anything that could be used to identify you such as tattoos or scars
  60. +If you come into contact with anonymous materials or protest guides, try to get them to protesters - they contain key safety information.
  61.  
  62.  
  63. Additional Do's for Protesters:
  64. -----------------------------------
  65. +Establish secure means to communicate with other protesters
  66. +Plan your protest point, escape plan, and regrouping point before attending a protest
  67. +Make backup plans - not just one, but many
  68. +Search for communications by Anonymous and Telecomix - read "Communications"
  69. +Try to obtain Anonymous' Riot Guide for homemade gas mask instructions, advanced coordination strategies, etc.
  70.  
  71. The Do Not List:
  72. -----------------------------------
  73. +Do not trust anyone to be who they say they are
  74. +Do not give any personal information that could be used to identify you to anyone
  75. +Do not mention anything about relationships, family, or relatives
  76. +Do not mention ties to activist groups
  77. +Do not mention the group Anonymous to anyone you do not know
  78. +Do not mention anything about your past - education, employment, etc.
  79.  
  80.  
  81. --------------------------------------------------------------------------------------------------------------
  82. Internet Safety [int6]
  83. --------------------------------------------------------------------------------------------------------------
  84.  
  85. Any use of the internet could potentially be used to physically locate you. It is important not to reveal information on the internet. If you are doing anything controversial online - such as discussing protests or blogging - you must be sure to conceal your IP. Please refer to the section on "Internet Security."
  86.  
  87. The Do List
  88. ---------------------------------
  89. +Keep in mind that any interaction you have online may be seen by others
  90. +Think about actions before you make them - do not say anything that you may regret, as it could be recorded
  91. +Create unique and secure usernames and passwords - Use letters, numbers, and special characters
  92. +Use a VPN if at all possible - see "Internet Security"
  93. +Delete your history, cookies, and cache after each internet session
  94. +Use Private Mode browsing whenever possible
  95. +Try using clients like Firefox instead of Internet Explorer
  96. +Use temporary or throw away e-mail accounts to create facebook accounts, etc. See [eml4]
  97. +Use Firefox plugins for added security. See [ffx5]
  98.  
  99. The Do Not List
  100. -------------------------------
  101. +Do not use any or all of your actual name in account and usernames
  102. +Do not mention anything that could be personally identifying - see "Physical Safety" [phy5]
  103. +Do not mention time zones
  104. +Do not mention physical characteristics or abilities
  105. +Do not mention relationships, family, or relatives
  106. +Do not connect/disconnect from services such as Twitter and Facebook all at once - stagger your access so they can't be connected
  107.  
  108. --------------------------------------------------------------------------------------------------------------
  109. *** Internet Security [isc7] ***
  110. --------------------------------------------------------------------------------------------------------------
  111. Each online device has an 'IP Address.' An IP can be used to help physically locate an individual. For this reason, it is important to hide your IP. There are many ways of doing this. You should use as many layers of security as possible at any given time to increase your protection. Prepare internet security methods ahead of time in case internet restrictions are enforced suddenly. The three primary methods that will be discussed in this article are VPNs, I2P, and proxies.
  112.  
  113. --------------------------------------------------------------------------------------------------------------
  114. Virtual Private Networks [vpn8]
  115. --------------------------------------------------------------------------------------------------------------
  116. A Virtual Private Network, or VPN, is a method of securing information communicated over the internet. When choosing a VPN service, try to pick a service from a country that will not easily hand over your private information. For example, services from Iceland or Sweden would be much safer than a service from the USA. Also try to find a service that does not keep user logs or payment information [if using a paid service].
  117.  
  118. Guides to installing the OpenVPN client:
  119. -----------------------------------------------------------
  120. * Windows: http://www.vpntunnel.se/howto/installationguideVPNtunnelclient.pdf
  121. * Linux (Debian flavoured): http://www.vpntunnel.se/howto/linux.pdf
  122. * Mac: http://www.vpntunnel.se/howto/mac.txt
  123.  
  124. Free VPN Services [Not Recommended]:
  125. ------------------------------------------------------------
  126. * http://cyberghostvpn.com
  127. * http://hotspotshield.com
  128. * http://proxpn.com
  129. * https://anonymityonline.org
  130.  
  131. Commercial VPN Services [Recommended]:
  132. -------------------------------------------------------------
  133. * http://www.swissvpn.net
  134. * http://perfect-privacy.com
  135. * https://www.ipredator.se
  136. * http://www.anonine.se
  137. * https://www.vpntunnel.se
  138.  
  139. Free VPN Downloads [Not Recommended]:
  140. -------------------------------------------------------------
  141. *Windows: HotspotShield - http://hotspotshield.com
  142. UltraVPN - https://www.ultravpn.fr/download/ultravpn-install.exe
  143. *Mac: Ultra VPN - https://www.ultravpn.fr/download/ultravpn.dmg
  144. *Linux: UltraVPN - https://www.ultravpn.fr/forum/index.php?topic=204.0
  145.  
  146. --------------------------------------------------------------------------------------------------------------
  147. I2P [i2p9]
  148. --------------------------------------------------------------------------------------------------------------
  149. I2P is an anonymizing network that supports many secure applications. We recommend using pchat to connect to anonops.ru and joining channels such as #anonops and #oplibya .
  150.  
  151. I2P Websites
  152. --------------------
  153. * http://geti2p.net
  154. * http://i2p2.de
  155.  
  156. I2P Tutorial for Windows Video
  157. --------------------------------------------
  158. * https://www.youtube.com/watch?v=5J3nh1DoRMw
  159.  
  160. I2P Tutorial for Linux Video
  161. --------------------------------------------
  162. * https://www.youtube.com/watch?v=QeRN2G9VW5E
  163.  
  164. Active I2P sites
  165. -------------------------
  166. * http://inr.i2p
  167.  
  168. I2P Port Usage
  169. -------------------------
  170. * http://www.i2p2.de/faq#ports
  171. * See also your router's configuration.
  172.  
  173. I2P Installation and Running on Linux
  174. ----------------------------------------------------
  175. * Download and extract the installation files, no need for separate install (such as apt-get install).
  176. * Run the router from /i2p folder with <tt>sudo sh i2prouter start</tt>. In seconds, I2P should open a Konqueror-browser page of I2P-main console.
  177. * Configure your bandwith settings. You might also consider opening some ports on your firewall for optimising the use of your bandwith.
  178.  
  179. Portable I2P (Windows Only)
  180. -----------------------------------------
  181. * http://portable-i2p.blogspot.com
  182. -Contains I2P, several plugins, preconfigured browser, preconfigured IRC client and messenger.
  183. -Before you can use anything on I2P, you have to start the I2P router from the portableapps tray icon-menu with the button ''I2P Launcher''.
  184.  
  185. Anonymous surfing with I2P
  186. ----------------------------------------
  187. * Go to your browser options or preferences (depending on your browser) -> ''network/connection settings''
  188. * Select ''manual proxy configuration''
  189. * In ''http'' insert 127.0.0.1 , for ''port'' insert 4444
  190. * In ''https'' insert 127.0.0.1 , for ''port'' insert 4445
  191.  
  192. Make sure that you have No Proxy set for ''localhost, 127.0.0.1'' so you'll be able to reach your I2P configuration page. To test your anonymity, go eg. to: cmyip.com.
  193.  
  194. --------------------------------------------------------------------------------------------------------------
  195. Proxies [prx0]
  196. --------------------------------------------------------------------------------------------------------------
  197.  
  198. Proxies are intermediary connections that may help hide your IP. They do not encrypt data. They may also help in accessing restricted web sites. Use them with VPN services to increase VPN security. See the following sites and [tor2]:
  199.  
  200. * http://www.freeproxies.org
  201. * http://www.socks24.org
  202. * http://www.samair.ru/proxy
  203.  
  204. --------------------------------------------------------------------------------------------------------------
  205. Tor Onion Router [tor1]
  206. --------------------------------------------------------------------------------------------------------------
  207. Tor is a proxy network that helps hide your IP. It does NOT encrypt data. There have been some claims of specific countries [such as Iran] circumventing Tor protection.
  208.  
  209. Download Tor
  210. ---------------------
  211. * https://www.torproject.org
  212.  
  213. Download TorButton for Firefox (Enable / Disable the Tor on the Browser)
  214. -------------------------------------------
  215. * https://www.torproject.org/torbutton
  216.  
  217. Tor is also included in the Anonymous care package [pkg6] .
  218.  
  219. --------------------------------------------------------------------------------------------------------------
  220. *** Communications [cmm2] ***
  221. --------------------------------------------------------------------------------------------------------------
  222. Anonymous encourages citizens of protesting countries to ask for assistance. This is best done using IRC to connect to #anonops. Please remember that it is safest to use a VPN [vpn8] or I2P [i2p9]. The IRC can be joined through a link at anonops.ru .
  223.  
  224. In the event of an internet shutdown, you can be sure that Anonymous and Telecomix will be trying diligently to restore communications. There are a number of things you can do to help.
  225.  
  226. *Try connecting to the internet at various locations - sometimes only certain ISPs shutdown while others remain operational
  227. *Try using dial-up connections if possible
  228. *Find ham radio owners and scan for communications by groups such as Telecomix - they may be able to provide you with directions for alternative internet connection methods.
  229. *Locate universities and businesses with fax machines - we often try to use these machines as one-way communication devices to provide updates, safety guides, and inspirational material.
  230.  
  231. --------------------------------------------------------------------------------------------------------------
  232. *** Additional Information [add3] ***
  233. --------------------------------------------------------------------------------------------------------------
  234.  
  235. --------------------------------------------------------------------------------------------------------------
  236. Temporary / Throwaway Email Accounts [eml4]
  237. --------------------------------------------------------------------------------------------------------------
  238.  
  239. E-mails can be set up quickly at the following sites:
  240. ----------------------------------------------------------------------
  241. * http://10minutemail.com
  242. * http://www.sofort-mail.de
  243. * http://www.trash-mail.com
  244. * http://www.guerrillamail.com
  245. * http://www.spam.la
  246.  
  247. An email provider with an emphasis on security can be found at: http://hushmail.com
  248.  
  249. --------------------------------------------------------------------------------------------------------------
  250. Useful Plugins / Extensions for Firefox [ffx5]
  251. --------------------------------------------------------------------------------------------------------------
  252. * BetterPrivacy - Removes persistent cookies from flash stuff
  253. * NoScript - blocks Javascript
  254. * Ghostery - Detects tracking pixels
  255. * GoogleSharing - GoogleProxy for locations where Google is censored
  256. * User Agent Switcher - Sends bogus browser identity to servers.
  257. * Optimize Google - Removes information Google uses to track searches
  258. * Outernet Explorer (MacOS) - Creates numerous searches to help prevent packet sniffing.
  259. * https://www.eff.org/https-everywhere - Automatically loads https on a site if available.
  260. * Scroogle SSL search (Google Anonymously): https://ssl.scroogle.org
  261.  
  262. --------------------------------------------------------------------------------------------------------------
  263. Anonymous Care Package [pkg6]
  264. --------------------------------------------------------------------------------------------------------------
  265. Anonymous provides an often updated care package that contains useful guides and software. The best way to access it is to join an IRC channel and ask for it. The IRC may be accessed at anonops.ru and channels such as #anonops [ /join #anonops ] may be of assistance. Please keep in mind security protocols such as the use of a VPN [vpn8] or I2P [i2p9] when accessing the IRC.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement