explicitClick to confirm you are 18+

Basic Anonymity in Action

Professor PopulistJan 12, 2021, 8:27:02 PM
thumb_up10thumb_downmore_vert

Here are some simple tips for staying anon:

---Browsing---

Beginner: TOR Browser
Advanced: Whonix
Advanced: TAILS

Note: Whonix & TAILS also come preloaded with a number of other privacy-focused tools for both beginner and advanced users. The Professor highly recommends!

Also be sure to change your search engine from Google. DuckDuckGo is a good alternative. These should help if you don't know how:

8 Ways to Change Your Browser's Default Search Engine
Change Your Default Search Engine in Microsoft Edge

---Email---

ProtonMail

---VPN---

Everyone has their own opinion on what's the "best" one so this is a good article to get some ideas: Which VPN Providers Really Take Anonymity Seriously in 2020? In addition, some people prefer to use a VPN service located outside the jurisdiction of the so-called 5-Eyes countries (US, UK, Canada, Australia, and New Zealand) so if that includes you then check this one out: 5 Best Non-US Based VPN Services in 2020

Pay anonymously if possible!

---Know Your Anonymity Modes!---

The four primary modes are outlined below.

Mode 1: Anonymous User; Any Recipient

Scenario: Posting messages anonymously in a message board, mailing list, comment field, forum and so on; e.g. Whistleblowers, activists, bloggers and similar users.

  • The user is anonymous.
  • The real IP address / location stays hidden.
  • Location privacy: The user's location remains secret.

Mode 2: User Knows Recipient; Both Use Tor

Scenario: The sender and recipient know each other and both use Tor. Communication occurs without any third party being aware of this activity or having knowledge that the the sender and recipient are communicating with each other.

  • The user is not anonymous.
  • The user's real IP address / location stays hidden.
  • Location privacy: The user's location remains secret.

Mode 3: User Non-anonymous and Using Tor; Any Recipient

Scenario: Logging in with a real name into any service like webmail, Twitter, Facebook and others. The user is obviously not anonymous. As soon as the real name is used for the account login, the website knows the user's identity. Tor can not provide anonymity in these circumstances.

  • The user is not anonymous.
  • The user's real IP address / location stays hidden.
  • Location privacy. The user's location remains secret.

Mode 4: User Non-anonymous; Any Recipient

Scenario: Normal browsing without Tor.

  • The user is not anonymous.
  • The user's real IP address / location is revealed.
  • The user's location is revealed.

DO NOT mix modes.

---Additional Reading---

The Importance of Anonymity
Tips on Remaining Anonymous
Data Collection Techniques
Internet Corporations & Privacy Concerns
Surveillance Capabilities

---Final Note---

If you do something to attract the focused stare of any major government none of the above is likely to be enough to protect you. Be aware. Be prepared.

Any questions? Just ask!

---CREDITS---

  • Whonix.org
  • @buzzbeurling