Guide to Anonymity Author: Leo Gurr Leo Gurr Table of context Prologue.........
Guide to Anonymity Author: Leo Gurr Leo Gurr Table of context Prologue..................................................................................3 Chapter 1 – Browsing on the internet..................................8 IP addresses Intro.....................................................................................8 VPNs........................................................................................................9 Tor..........................................................................................................11 Hiding Tor............................................................................................12 Hidden services....................................................................................12 Youtube in Tor......................................................................................13 General Browsing..................................................................................13 Acounts General....................................................................................14 Anonymous Accounts............................................................................14 Personal Information............................................................................15 IP addresses..........................................................................................15 Signing up for Anonymous Accounts..................................................15 Anonymous Temporary Emails.............................................................16 Anonymous Permanent Emails..............................................................16 Social Engineering/Corrlation Attacks..................................................17 Bust on Tor...........................................................................................17 Changing Identites...............................................................................18 Public WiFi............................................................................................18 Central Idea...........................................................................................19 2 - Complete Guide to Anonymity Leo Gurr Chapter 2 – Security............................................................20 Fingerprints............................................................................................20 OS intro..................................................................................................21 Non-Linux OS’s.....................................................................................21 Phones....................................................................................................22 Linux History.........................................................................................22 TAILS....................................................................................................23 Veracrypt..............................................................................................24 Whonix Intro..........................................................................................25 VMs......................................................................................................25 Qubes...................................................................................................26 Whonix..................................................................................................27 Whonix Gateway for other Vms.........................................................28 Seperating OS’s.....................................................................................29 Linux Commands...................................................................................30 Data encryption......................................................................................30 Chapter 3 – Communication...............................................32 PGP Intro...............................................................................................32 HTTPS.................................................................................................35 GnuPG...................................................................................................35 GnuPG Instructions.............................................................................36 Trust.......................................................................................................40 3 - Complete Guide to Anonymity Leo Gurr Chapter 4 – Buying anonymously......................................41 Crytography Intro..................................................................................41 Crytocurrency Intro...............................................................................42 Bitcoins Intro.........................................................................................42 Bitcoins Wallets.....................................................................................43 Hot vs Cold (Liquid vs Frozen) Wallets..............................................45 Generating Frozen Wallets...................................................................47 Imporance of Bitcoins............................................................................48 Bitcoin Blockchain................................................................................48 Anonymous Bitcoins.............................................................................49 Bisq......................................................................................................49 Tumbler/Blenders.................................................................................50 Receiving goods.....................................................................................52 Location for Goods..............................................................................53 Warning about llegal Items..................................................................53 Epilogue................................................................................55 Key For diagrams in this paper: blue boxes represent objects that are connected to the internet (such as your computer), black boxes represent objects that are not connected to the internet, red outlines mean objects that are dangerous or disposable, and other colors represent different operating systems. 4 - Complete Guide to Anonymity Leo Gurr Prologue To be explicitly clear, I am not affiliated or sponsored by the group Anonymous. Before I begin this guide, I want to say that there is a real difference between anonymity and privacy on the internet. Privacy is the idea that people should not be able to relate data to you. Example, you do not mind that people know your email address, or that you have a youtube account, but you do not want people knowing what you do with it. Anonymity is the idea that you do not want people relating an identity with you. Example, you do not care that people know that Anonymous43217890 said ugly things, you just do not want people to know you are Anonymous43217890. I am writing this guide specifically toward people who need anonymity. I am not saying that privacy and anonymity never overlap. If you are interested in privacy, you will find most of this guide useful. Most people who want anonymity are people who are doing something they are not “supposed” to be doing something. This could mean you are a: journalist, whistleblower, criminal, hacker, or anyone else I can not think of. The goal of this guide is to help people evade the adversaries that mean them harm. Something to note, I am going to assume anyone who could mean you harm is an adversary for the purposes of this paper. Something to understand is that this guide is not a "direct guide" or a "guide for dummies". Meaning, I am not going to give you a checklist of different things you should do to stay anonymous. Everyone has different needs. My goal is to present 5 - Complete Guide to Anonymity Leo Gurr different problems and present a few options with the pros and cons. In certain aspects I find critical for your anonymity, I will give detailed directions on what to do and how to use different tools. If I do not go into detail in this guide about a subject, I will try to post a link to someone who does. Also, something to note for this guide is the links I provide. It is never a good idea to trust links in a pdf file. So I would recommend copying and pasting the links into a web browser, rather than just directly clicking on the link. If possible, opening the links on a different computer or OS that is not used for anything other than open files. I am not saying that my links are malicious, just helping you take precautions. For the most part, my links only provide additional information to stay anonymous anyways. There are a lot of different ways that an adversary could try to take away your anonymity. The main ways an adversary might attack your anonymity is: tracking your data (IP address, social engineering, and correlation attacks), your security flaws, snooping on communication, and following money/item trails. My goal is to try and explain each one of these attacks, and the different options to avoid them. Nothing in this world is perfect. There is no such thing as a "silver bullet" when it comes to anonymity online. Also, this guide is not for everyone. I will go very far in detail about as many things as possible. I will try to teach on a "beginner" level, but that does not mean you can have no knowledge of computers or the internet in general. This guide is best for people who are between novice and expert. 6 - Complete Guide to Anonymity Leo Gurr Also, understand that something might be missing in this guide that is critical for your situation, it is important to always have good common sense. 7 - Complete Guide to Anonymity Leo Gurr Chapter 1 – Browsing the internet If you want to stay anonymous on the internet, know it was not built to be anonymous. As time has progressed, there has become a need to be anonymous on the internet. But, understand is that not everything you do online should be anonymous. For example, if you use a bank online you want the bank to know you are who you say you are. To fix this, you should have two separate worlds on the internet, your public world, and the private world. That is the first point I am going to make in this guide, you need to have separate identities. You private identity, your pseudo-identity, is one that should never be linked to you. The ways your pseudo-identity can be linked to you based on your internet usage is your IP address, browsing habits, and the accounts you make. [IP addresses Intro] One step to separate identities is to never have your "direct" data traced back to you on the internet for your private business. To understand how to stay anonymous on the internet, you need a basic understanding of how the internet works. You have most likely heard the term "IP address" thrown around a few times. Most people think it is this complicated thing that only hackers need to know. But this is not true. Everyone should have a basic understanding of how the internet works, and how IP addresses relate to you. Your IP address is a key aspect of making sure your internet works. Let's think of how you would send mail to your grandma's house. First, you write a letter, then you write your grandma's address on the card, then you write your return 8 - Complete Guide to Anonymity Leo Gurr address, and then you send it to the mailing company. The mailing company does its thing and the letter arrives at your grandma's house. Then your grandma wants to write you back a letter. Your grandma looks at the return address, writes the letter, writes your address down, then sends it to the mailing company. Again, the mailing company does its thing and the letter arrives at your house. If you had not written down your return address for your grandma to send you mail, then she would not know where to send the letter. [VPNs] This idea is extremely similar to how the internet works. For you to get data from a website, you have to have your IP address connected to the websites IP address. These addresses are how you and the website communicate. Now say you are doing something that an adversary might take interest in. It would be very easy for them to track you using only your IP address. Because you are directly giving up your IP address to the website. Now there are quite a few ways that you can "mask" your IP address from an adversary, but we are only going to look at VPNs and Tor for the purpose of this paper. VPN stands for Virtual Private Network, the goal of a VPN is to replace your public IP address with the public IP address of the VPN. So instead of your data being sent directly to a website, your data is first sent to the VPN and then to the 9 - Complete Guide to Anonymity You Mailing Office Grandma Your Address Grandma’s Address Leo Gurr website. Then the website sends the data to the VPN, then the VPN sends the data back to you. [VPN cons] Again, to most people, a VPN is good enough. But there are a few flaws with a VPN. A VPN has the ability to log everything you are doing. Even though an adversary is only able to see that traffic is flowing to and from the VPN in use, the VPN sees everything you are doing. If the adversary has enough power, they could uploads/Litterature/ guide-to-anonymity.pdf
Documents similaires
![](https://b3c3.c12.e2-4.dev/disserty/uploads/preview/Xkz81DeGGa3ucQuJO8NLTbj6LPMMAB5xjqN3yOT2OrGrwBfAJqUin6HjFSqGEf0GBiIAhlKqeXtEPzfO8K8fwkmm.png)
![](https://b3c3.c12.e2-4.dev/disserty/uploads/preview/EXjcS2llMsxQNau7V3QjAy9ClVRDZNddzI9zAECgGVPKRODm6RJMkKwWRpUv9cI7OMQKNtDkxFZDQpc6aKJX8hnn.png)
![](https://b3c3.c12.e2-4.dev/disserty/uploads/preview/UyLQNqLumeXhOwxkKvdfb0B5ureKomCweMWTFv23fvDvPH0SY7wC46fomegW9fX063ytyWeErflEVkyQDhntlFom.png)
![](https://b3c3.c12.e2-4.dev/disserty/uploads/preview/finSwdiAZK4li0J1R3HlFnanxuXJbIeK4IRt93FnGPi8lnnJgZ9LNWJiXf67EkapPL53JeGyqirHUWRG12nIXNww.png)
![](https://b3c3.c12.e2-4.dev/disserty/uploads/preview/PLGKSCeHP784XaWIk0lluplKysov8tpVCIhL3fjCnu5Jp20lAJNoHny7kXl6J4W55yg5pfkdgR2uMD7gCadwjT8J.png)
![](https://b3c3.c12.e2-4.dev/disserty/uploads/preview/MgT7937e90MWcpyXmctG6idqVEFuLdAq5QChmekUZqn0Rk75153iGDqG1FTMZwFp7frMt7LWp2ByfzyHu5xCipTV.png)
![](https://b3c3.c12.e2-4.dev/disserty/uploads/preview/eH5I34eeS6jyheFSMgRo6lEcZhDJfMkbEw1DiSJDB0IVA9pBnk5MznhfzVQQiJOdNcBKuo4qWTxRbztdcFO0CFRg.png)
![](https://b3c3.c12.e2-4.dev/disserty/uploads/preview/tnRjYX08aluyoVSXhqHGfFdXL30gXY1UyAbImV7FZIxmUQAUZ2JjBPAiekGpcQ0zgEx0wNWD2Shrl1ebe3ubtqNT.png)
![](https://b3c3.c12.e2-4.dev/disserty/uploads/preview/VapMVgyEXfRtQi9z5pi4hQTAWyfY6HUJgMPH3SUUA6BxzLAmXlnGQPC2fHKTuyEPd2fiPVBYbb8z6xVPfGRFxc1t.png)
![](https://b3c3.c12.e2-4.dev/disserty/uploads/preview/oqSWjMy7o6iBuhWmRSuODs29W4Swu5OGOgce6uNwIWXiqebA8QrweORUVF1tHRz5aXeS6RUu9ipgtBrsiffllYps.png)
-
26
-
0
-
0
Licence et utilisation
Gratuit pour un usage personnel Attribution requise- Détails
- Publié le Nov 05, 2021
- Catégorie Literature / Litté...
- Langue French
- Taille du fichier 0.2537MB