RetardoFrack

Anonymous Internet Connection

Sep 4th, 2013
1,140
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.17 KB | None | 0 0
  1. Anonymous Internet Connection
  2.  
  3. This is a quick tutorial on how to become anonymous on the internet. It is not exhaustive and is subject to change and revision as technology evolves. Never trust any one method of anonymity to completely protect you!
  4.  
  5. You will need a VPN account that does no logging and utilizes shared IPs. Torrentfreak has excellent reviews on VPNs. On their site, vpn-services-that-take-your-anonymity-seriously-2013-edition-130302/ addressees the latest reviews.
  6.  
  7. When you connect to a VPN, a secure connection is made to the VPN host. Traffic to and from the host is encrypted with state of the art encryption and is reasonably secure. Your ISP or anyone monitoring the traffic CAN see that you are connected to the VPN host, but they cannot see what you are sending or receiving.
  8.  
  9. The host makes a connection to your intended recipient and passes the message on. If the recipient is secure, the (IP anonymous) message is sent over a secure path, otherwise it is in the clear, but it is still anonymous.
  10.  
  11. If you are using Tor, the same protocol holds, except that the additional obfuscation occurs, making even more difficult to analyze the traffic. IF you are using a VPN that employs a static IP, you are susceptible to traffic analysis, and NSA does have the tech to do that, but that can take days, or weeks to do. Switching VPN servers, or changing Tor identities frequently, can make that very difficult, and shared IPs can further protect you. Most of the vulnerabilities of Tor were addressed before they were “revealed” as vulnerable, and the fault was not so much with Tor as with the Tor browser, which had flaws, and occurred in .onion sites.
  12.  
  13. Now, make no mistake. NSA relies on fear to intimidate people. That works to their benefit, but the internet obeys certain laws, and all users are subject to those constraints. What works for NSA works for everyone. However, the NSA resources are powerful, and they do have the means to do global, sophisticated traffic analysis. This why I recommend using a VPN that utilizes shared IPs to further shield you from that type of analysis
  14.  
  15. IF you are making a connection that requires a log in, that log in CAN point back to your true identity, so steps have to be taken to prevent that. To do this, get an anonymous email account that is accessed through the VPN. Never access this account other than through the VPN or it can point back to your true IP and reveal your identity.
  16.  
  17. Yahoo, hushmail and riseup offer free, anonymous email accounts that, if only accessed via VPN, will shield your true IP.
  18.  
  19. When on a VPN that uses shared IP technology, your computer cannot act as a server. That means NO unsolicited incoming message is possible. Since many people have the same IP, no unsolicited incoming messages could be routed to the appropriate client. It's just not possible with that technology, and that is one of the security protocols of this type of VPN.
  20.  
  21. Understand, if you EVER access a “secure” account w/o using the VPN, it is contaminated and can be used to reveal your identity. Once you get a VPN account, it's best to leave it active 24/7 and switch connection points regularly.
Add Comment
Please, Sign In to add comment