PDA

View Full Version : Be Anonymous the Easy Way



zenstyle
12-15-2014, 03:54 PM
Nothing on the internet can give you 100% anonymity. However, there is one thing you can do to get you pretty close. Not to mention, you can use it on any computer at any time very simply. It requires using an entire operating system designed to send every scrap of information you communicate over Tor. The best Tor OS is Tails (The Amnesiac Incognito Live System (https://tails.boum.org/)). Tails can boot from a USB stick you carry around on your key chain, so no trace of your online session remains on any machine and anonymizes all information sent and received.
-Use it for an underground business
-Use it for an underground activist blog
To download the system to your USB stick, simply go here…
https://tails.boum.org/
After it is downloaded on to your USB, simply insert your stick (haha!) into any USB drive and boot up the computer and choose to ‘boot from USB’ when prompted. When done, Just shut it down…remove your stick…and your computer is back to normal.
The best part about this program is that it’s open source. That means it’s free and consistently updated. However, since I’m a big supporter of open source and privacy, I have to mention donate to the cause if you can. Viva La Free Markets my BOP brothers!!!

IRISHOAK
12-15-2014, 03:58 PM
GREAT POST!

benoit23
12-15-2014, 04:04 PM
Damn that sounds pretty sweet, but will want to do some more learning on it

kubes
12-15-2014, 04:19 PM
Tails is a linux distribution and it's one of the great things about linux. I have been using linux for years. It's a bit of a learning curve for the windows user but once you get it down it's much more secure. Unfortunately there are just some applications that will not run well unless you are running windows so most of my machines are set up with a dual boot configuration

benoit23
12-15-2014, 04:26 PM
Just something to think about here brothers, a response I got from digging into this more...

"These type of usb "anonymous" boots can have and most do have a back door for the programer to enter your system. It will send a small email notifying the programer/hacker that you are booted using their program and they then log onto your pc.....

Using a vpn that does not log your tracks with TOR you are VERY safe."

I know everyone will have their own opinions but just giving some varying opinions

kubes
12-15-2014, 04:47 PM
You are safe using tor but it can be seen that you are using it. Might give reason to watch you. Just saying it may make it look as though you are hiding something

wook
12-15-2014, 05:53 PM
You are safe using tor but it can be seen that you are using it. Might give reason to watch you. Just saying it may make it look as though you are hiding something

Very good point Kubes!

zenstyle
12-15-2014, 05:59 PM
Yeah...but we have a right to privacy. And if any one sees that we are using it...that is not enough for probable cause. Also, the boot backdoor is only used by someone who singles you out..and even then its limited as it can only be used if the user is online using it. Most people that get caught (e.g. Mr. Ross Ulbricht who used tails for years running Silk Road) got busted leaving crumbs across the net not using Tor. Also, VPN providers and various anon email providers get subpoenaed in court all the time for user information (e.g. Lavabit). Some like lavabit were nice enough to wipe the customer information before turning over their records. They are out of business today and that was the best anon email provider around. In reality, security is nothing but a feeling. Some things just give you a better sense of it than others. To each his own. All Tails does is give you an all in one place to practice your anonymity in a simple format. Feel free to check out their wiki, forums, and videos to see if its right for you. The best security you can have is common sense...just my two cents.

Love you brothers!!

Zen

zenstyle
12-15-2014, 06:08 PM
I would venture to say that TOR users say VPNs have too many holes; and VPN users say TOR has too many holes. As far as using a linux system goes, tails is extremely user friendly for those who are concerned with that. Nothing a little due diligence can't fix. Also, you can run it from a CD or an SD card. The reason it works so well is that 1000s if not more people are constantly working on it to make it better...the beauty of open source. Just update it once in awhile like any other software.

Zen

zenstyle
12-15-2014, 11:07 PM
One last thing I want to mention and I will leave this thread alone. You guys are absolutely right, VPNs do work best, especially if you are working from a single station at home. However, data is still stored on your computer. With tails, you don't have any data stored whatsoever. Plus, when you pull out the USB...you can always stomp on it and flush it down the toilet pretty easily. ;)

PS...I don't condone flushing anything down the toilet (except condoms) if the pipes go directly into your septic tank...peace!!

kubes
12-15-2014, 11:50 PM
One last thing I want to mention and I will leave this thread alone. You guys are absolutely right, VPNs do work best, especially if you are working from a single station at home. However, data is still stored on your computer. With tails, you don't have any data stored whatsoever. Plus, when you pull out the USB...you can always stomp on it and flush it down the toilet pretty easily. ;)

PS...I don't condone flushing anything down the toilet unless its shit or condoms...peace!!

Lol I agree and a live cd works as well. There is no trail left behind because everything during the session is stored in the existing ram.

PAiN
12-17-2014, 02:54 AM
Great post!

Thanks for the info guys!

gtlifter32
01-18-2015, 02:49 PM
Nothing on the internet can give you 100% anonymity. However, there is one thing you can do to get you pretty close. Not to mention, you can use it on any computer at any time very simply. It requires using an entire operating system designed to send every scrap of information you communicate over Tor. The best Tor OS is. Tails can boot from a USB stick you carry around on your key chain, so no trace of your online session remains on any machine and anonymizes all information sent and received.
-Use it for an underground business
-Use it for an underground activist blog
To download the system to your USB stick, simply go here…
After it is downloaded on to your USB, simply insert your stick (haha!) into any USB drive and boot up the computer and choose to ‘boot from USB’ when prompted. When done, Just shut it down…remove your stick…and your computer is back to normal.
The best part about this program is that it’s open source. That means it’s free and consistently updated. However, since I’m a big supporter of open source and privacy, I have to mention donate to the cause if you can. Viva La Free Markets my BOP brothers!!!

Nice I use portableapps.com and if you want to bunp it up a notch you can but a Kingston Digital 32GB Data Traveler Locker and USB 3.0 USB Drive with Automatic Data Security off Amazon for $32 and if offers and it offers whole disk hardware AES 256 encryption. So plug in, have to enter a password to see whats even on it and then go. Also VPN's are your friend, tunnle the same info through your own private vpn server for 55$ a year and not one does it give you a whole new IP but the host system your using is blind to what your accessing, even your ISP.


-GT