Log in

View Full Version : DIY: Be Secure and Anonymous Online



AnonymousOne
27th June 2011, 05:18
As technology continues to advance more and more actions of ours will be organized online. In fact there are many anti-capitalist and anarchist groups that act only online. It is of the utmost necessity in that case that we be secure and anonymous as we undertake actions in Cyberspace.

You can never be truly Anonymous online. There is always a path that can be traced from where you were/are and your target/destination. That path can be straight forward or it can be complex. Your goal is to make it difficult to be tracked. You can use seven, eight, fifty, a hundred, whatever number of proxies and still be traced.

I ask that you read this as it being a work in progress, if you would like feel free to ask questions and I will answer them to the best of my ability. My goal is to make you secure and anonymous online.

The Bare Necessities:

First: NEVER, EVER DO ANY WORK FROM HOME ONLINE.

You want to avoid being traced to a location that you live at. Get out of your house, and go to any place with free wi-fi, or paid wi-fi. Just get away from your house and use someone else's location. That will prevent the FBI from knocking on your door, and instead on McDonald's door. This is one of the only ways to ensure that you will be safe if they trace you all the way back (which can be done).

Second: Use an Anonymizer

There are multiple services that can be used from Tor, to JonDo, to I2P, to Ultrasurf. However for this guide I will only break down two of the most popular, Tor and Ultrasurf.

Ultrasurf:

Benefits: This is a proxy service that also encrypts your internet, it is portable, easy to use and gets you around most blocks and ensures that you are anonymous.

Costs: The maker of Ultrasurf, the Ultrareach Corp., is in part financed by the United States Government. The French security firm Reflet found that the program contained trojans and backdoors that would allow the U.S to trace where you had been. Modified versions of Ultrasurf have been a critical way that Syria's security forces have cracked down on dissidents.

Overall: Not a recommended tool unless you simply want to get around censored websites at work or school that are non-political in nature. If you attempt to use it for security as an activist would be foolish.

Tor:

Benefits: Free, anonymous, sends your traffic through a relay making it more difficult for people to track where you've been. It also has the benefit of choosing certain endpoints. In general I recommend Russia, as Russia does not honor foreign requests for server logs.

Costs: Slower than Ultrasurf, takes a bit more work to set up to fully ensure you're anonymous.

Overall: Probably my first recommendation for an anonymizer.

Third: Spoof the MAC Address:

Before we get into the details let's begin with a simple analogy:


On a local area network, computers exchange
their MAC addresses to identify each other. What is the difference, or
commonality, between a MAC address and an IP address? They both identify
where a frame came from, and where it is heading. However, an IP address can
be easily assigned, and frequently are, to other machines. A MAC address is a
hardware address, and it supposed to be permanent, following the NIC card
wherever it goes. It is like the MAC address is the address for a house, to receive
the postal service mail, and the IP address is like the telephone number. The
“street address” (MAC address) and the “telephone number” (IP address) are
both bound to the same house (computer on the network), but the telephone can
be switched to another home, but the street address will remain the same. Every
computer hooked up to a network uses a NIC card, and is used for identifying
itself on the network.

There is a utility you can download which automatically randomly changes your MAC Address. This utility is called "MadMacs" for PC computers, and is incredibly helpful for remaining anonymous online. There is also the following command for Linux, simply enter this in the command line:

openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//'

That becomes your random MAC Address, take the output from that and enter the following:

sudo ifconfig en1 ether ""

With the "" being the randomly generated MAC Address

So, now you're at a random public location, they don't know your Physical Address, you're buried deep in the TOR network and your IP is different and even if they trace it all the way back they end up at McDonalds. Now we're feeling more secure.




Fourth: Secure your Email

If you are like the average user your email is either:

@yahoo
@gmail
@hotmail
@live

Now, all of these emails are owend by U.S corporations who would most likely fold under pressure. Email contents are not very secure.

So the first thing you do is you create an account with Hushmail. It's biggest focus is privacy and security which is your goal. Do not be afraid to set up multiple accounts. Every website I'm registered with I have a unique hushmail account for.

Is it a hassle? Yes. But it also helps keep me from being tracked.

However, another solution if you don't want to create a new mail account is to encrypt certain messages that you send with your main email account. This can be done using the PGP system, or Pretty Good Protection. However, this can backfire as Governments and other entities will be more suspicious of your encrypted email and it may end up in them reading email they wouldn't have read otherwise.

So, be smart and at the very least have a separate email for contact with political organization.

Fifth: Securing the OS

We've secured your anonymity online. Your computer is essentially untraceable as long as you've done everything correctly. However, let's say your computer ends up in the wrong hands. If you have anything on your main OS, or on your Hard Drive you are incredibly screwed. You can format a hard drive seven times and the data can still be reliably recovered.

So what is the solution for the individual concerned about security?

The answer, is Tails:

Using Tails on a computer doesn't alter or depend on the operating system installed on it. So you can use it in the same way on yours, the computer of a friend or one at your local library. After removing your Tails CD or USB stick the computer can start again on its usual operating system.
Tails is configured with a special care to not use the computer's hard-disks, even if there is some swap space on it. The only storage space used by Tails is the RAM memory, which is automatically erased when the computer shuts down. So you won't leave any trace neither of the Tails system nor of what you did on the computer. That's why we call it "amnesic".

All internet connections automatically go through the tor system using Tails.

As I can not link, please go Google or search for "Tails + Tor" and burn the ISO to a DVD.

Changing Your Behavior Online:

Step One: Multiple Usernames

You would not believe just how easy it is to track someone down if they use the same username over and over again. I guarantee you if someone reuses a username frequently I can find you their name, phone number, address, facebook, emails, etc.

Of course you think, I'm on RevLeft it won't show my email, I'm totally safe. You are wrong.

Let's say you operate a blog or twitter, that you link to as your homepage. I can find an email from that. Or I can simply do a username search using http://www.pipl.com and from that I can find accounts associated with that username. Seriously, go try to track yourself down. You'll be surprised with just how much information you can find. I can check the accounts using some basic info that I can find from the information you give on RevLeft. If you say you're a Hoxhaist/Anti-Revisionist/Maoist-Marxist-Leninist I can use that and the info you give on the other profile to confirm identity.

In fact, the easiest way to prevent being tracked and found

Step Two: Multiple Emails

You don't need to connect everything to the same email. In fact this is one of the worst things you can do. It once again acts as a verification thing. If I can go on your FB, and I can see the same two emails listed I know I've tracked down the right person.

If you want to have a separating between your professional life and your political life, use multiple emails. Otherwise if you say, have a linkedin account where you outline where you've worked your name, where you went to college, when you were born, when you left college, where you went to work etc. I know what more about you than I should.

Where it gets even slicker is if I have your email, but not an address or location is I can send an email to you pretending to be whoever or say that I'm looking for something. If you respond, I get your IP Address, and if you're not using any kind of proxy I have your location.

Broletariat
27th June 2011, 05:28
I was under the impression you couldn't trace someone using Tor, I might be thinking freenet though, correct me if I'm wrong and elaborate your thoughts on freenet if you please.

xub3rn00dlex
27th June 2011, 05:31
I recall Anonymous releasing a nice .pdf file containing tons of info on how to secure your connection. I can try and locate it again if anyone wants.

Salyut
27th June 2011, 05:36
Learn to SSH tunnel and use PGP.

Also live distros booting off a USB key to defeat software keyloggers.

edit: and just to be safe - use on-screen keyboards for sensitive stuff and something like keepass.

Dumb
27th June 2011, 05:54
How useful is it, though, to work from a different location? My understanding is that while it's a slam-dunk to trace IP addresses, it's also quite easy (but a bit more work) to trace physical addresses - and, by association, the owner of the computer with that physical address.

Dumb
27th June 2011, 05:55
Learn to SSH tunnel and use PGP.

Also live distros booting off a USB key to defeat software keyloggers.

edit: and just to be safe - use on-screen keyboards for sensitive stuff and something like keepass.

English? :confused:

Decommissioner
27th June 2011, 06:21
English? :confused:


He's referring to a distrobution of linux that you can boot off of a cd or usb thumb drive without having to install the operating system onto the hard drive. Live distros can be useful for getting rid of viruses off windows machines as well (think of it as an advanced safe mode).

I believe ubuntu linux has a live boot option.

AnonymousOne
27th June 2011, 07:00
I was under the impression you couldn't trace someone using Tor, I might be thinking freenet though, correct me if I'm wrong and elaborate your thoughts on freenet if you please.

Sadly, it is a common misconception that Tor makes you untraceable. This is sadly not the case, in fact you can get a surprising amount of information from someone using Tor.

There are several different attacks that are used that can with fairly good accuracy. For example,

"The "bad apple attack" exploits Tor's design and takes advantage of insecure application use to associate the simultaneous usage of a secure application with the IP address of the Tor user in question. One method of attack depends on control of an exit node or hijacking tracker responses, while a secondary attack method is based in part on the statistical exploitation of distributed hash table tracking. The results presented in the bad apple attack research paper are based on an actual attack in the wild launched against the Tor network by the authors of the study. The attack targeted six exit nodes, lasted for 23 days, and revealed a total of 10,000 IP addresses of active Tor users."

There are other exploits but that is the most dangerous one. However you can avoid the "bad apple attack" by ensuring that your applications are secure. So be careful with what you use with Tor.

As for my opinion on Freenet, it's incredibly useful for sharing files and publishing information with a small group. However, the major problem is that it can't access the greater Internet. Which becomes a problem if you want your material to reach a bigger audience.


How useful is it, though, to work from a different location? My understanding is that while it's a slam-dunk to trace IP addresses, it's also quite easy (but a bit more work) to trace physical addresses - and, by association, the owner of the computer with that physical address.

It's incredibly useful. Let's say I sit down at McDonalds and DDoS a credit card company. Now, since I'm doing this I can not use a proxy or a VPN because if I do I end up crashing the proxy or VPN instead of the target. So I'm completely out in the open with my real IP Address. This would be a problem if I was at home because the ISP could track me down to my house and I would get nailed. If I'm at McDonalds they go to the McDonalds and try to get my MAC Address or Physical Address.

They can't do that very effectively if I'm spoofing my MAC Address which is easy to do on most systems these days as the MAC Address is no longer burned in.

If I had been at my house then it would just be game over because that's where the Government or whoever would look at first.

I hope that answers your question, I'll be adding a section on MAC Address spoofing and how to later on.


Learn to SSH tunnel and use PGP.

Also live distros booting off a USB key to defeat software keyloggers.

edit: and just to be safe - use on-screen keyboards for sensitive stuff and something like keepass.

I have to say I disagree with you on PGP, it's entirely useless if it's a government agency and in fact is probably harmful because it bring unwanted attention to what you're sending.

Using code, or sharing an email account is much more secure than PGP.

Bitter Ashes
27th June 2011, 20:58
thanks for this thread. We've recently had a new volunteer at our network explaining all this tor and ubuntu stuff to me. I'm getting it slowly. The information here is good stuff.

AnonymousOne
27th June 2011, 21:59
thanks for this thread. We've recently had a new volunteer at our network explaining all this tor and ubuntu stuff to me. I'm getting it slowly. The information here is good stuff.

No problem, if you have any ideas of what more I can add to make this more thorough please share them.

I just added two new sections. One is on spoofing the computer's physical address and the other is on securing your OS.

Salyut
28th June 2011, 00:58
No problem, if you have any ideas of what more I can add to make this more thorough please share them.

I just added two new sections. One is on spoofing the computer's physical address and the other is on securing your OS.

You should include a section on wardriving.

Broletariat
28th June 2011, 02:05
How do you feel about Trucrypt?

AnonymousOne
28th June 2011, 02:42
How do you feel about Trucrypt?

It's an insanely useful tool and should be done on files you need to have access to but want to avoid other people from having. However, if you do use TrueCrypt understand that it's weaker than using something like Tails which deletes everything after you turn off the computer.

If you use TrueCrypt you need to be prepared for that information to be discovered or be willing to go to jail for a very long time. There's a case of someone who is being held for contempt of court for refusing to reveal his TrueCrypt password. I can't link to the story, but it can be found if you google for "TrueCrypt contempt of court".

Broletariat
28th June 2011, 03:14
It's an insanely useful tool and should be done on files you need to have access to but want to avoid other people from having. However, if you do use TrueCrypt understand that it's weaker than using something like Tails which deletes everything after you turn off the computer.

If you use TrueCrypt you need to be prepared for that information to be discovered or be willing to go to jail for a very long time. There's a case of someone who is being held for contempt of court for refusing to reveal his TrueCrypt password. I can't link to the story, but it can be found if you google for "TrueCrypt contempt of court".

Darn, fifth amendment pleading has already eroded away in terms of power then ehh?

AnonymousOne
28th June 2011, 03:20
Darn, fifth amendment pleading has already eroded away in terms of power then ehh?

Nope, courts view of passwords is the same as their view of keys to a house. It falls under the Fourth Amendment and so if they have the warrant they can demand the keys to your house, or in this case your truecrypt password.

Constitutional law should be something U.S activists study intensely.

Broletariat
28th June 2011, 07:14
So much for the right to remain silent.

tracher999
28th June 2011, 13:04
tnx 4 the usefull post man:cool:

The Man
28th June 2011, 21:01
I'm not going to travel to starbucks to go on to RevLeft..:laugh:

Decolonize The Left
28th June 2011, 21:31
I'm not going to travel to starbucks to go on to RevLeft..:laugh:

Hahahahahahahahahahahahah HAHAHAHAHAHA
HAHAHAHA HAHAHAHA

Oh jeez... that is funny.... wait.

Wait.

Whew.. crying from laughing so hard... Wow. Oh wow.

Lost my glasses... and my wallet... phew so funny.

Ok. Ok relax.

Alright.

Now, I think what the OP was trying to do was to provide information that may be useful to some people should they desire to have greater security while using the internet regardless of their personal business. This may be useful to some people who aren't familiar with Tor or other security measures one can take. You aren't required to follow any of the ideas provided in the thread if you don't want.

Wait... you don't care do you? You were just trolling... agh. Got me again!

- August

AnonymousOne
28th June 2011, 23:42
I'm not going to travel to starbucks to go on to RevLeft..:laugh:

RevLeft is srs business.

praxis1966
29th June 2011, 00:39
OP: I dunno if this would be a good place to do it (this being a thread on anonymizing yourself and all) or if you'll wanna do it in another thread, but at some point you might consider a discussion on packet sniffers and their purpose.

AnonymousOne
29th June 2011, 01:20
OP: I dunno if this would be a good place to do it (this being a thread on anonymizing yourself and all) or if you'll wanna do it in another thread, but at some point you might consider a discussion on packet sniffers and their purpose.

Yes, good idea. Thank you. I plan on hitting and adding several new sections and trying to reformat/reword earlier parts of it.

I've been fairly busy keeping up with Anon, work, etc.

praxis1966
29th June 2011, 05:43
Just one more thing and I'll let everybody get back to Hacktivism 101... Personally, I think every one of us should be running Tor even if we don't plan on actually doing anything shady with it. It allows, for instance, nodes behind the Great Firewall of China to access banned sites... Like RevLeft. :D

AnonymousOne
6th July 2011, 18:25
Updated: Added section on keeping your information secure. Basic steps/pre-cautions etc to preserve your anonymity and integrity of your identity.

praxis1966
18th July 2011, 18:33
Anybody here know how to IP tunnel/MAC spoof from behind a router? I have a home LAN in which my router's auto-assigned a private addressing scheme, so there's not actually direct contact between my machine and my ISP's DNS and DHCP servers... which pretty much renders the techniques discussed here moot.

In other words, I can run TOR on my desktop all day long, but my ISP will still know where the traffic's coming from because my router re-encapsulates all my packets with its own IP/MAC address when it shoots them into the WAN cloud.

I have a feeling that I may be kinda screwed when it comes to anonymizing because the router is ISP provided. It runs a shitbox browser based GUI that I hate given that I learned networking using Cisco's old CLI. Anyway, I may have been able to do it with my old router, a nifty little LinkSys that ran a Cisco NOS... making it much more configurable. Unfortunately, I left the damned thing in Florida when I moved to Cali.

EDIT: And yes, I realize that I could circumnavigate the router if I just patched my desktop directly into the POP. However, that's more of a workaround than a solution given that I'd either have to physically re-patch cables every time I wanted to use TOR et al or buy a hub to split the connection before it hit the router... Something I'm trying to avoid since I don't wanna spend any more money if I can help it.

crazyirish93
18th July 2011, 20:54
not to be a smart ass but i think rule number 1 is pretty much covers doing "stuff" from home

Dr Mindbender
18th July 2011, 22:13
Does the left wing even register on the radar enough for the authorities to care? In the UK at least, they are pre occupied firstly with Islamic extremism, and the Irish republican armed struggle a distant second.

I think its paranoia. As long as you arent into bomb making or terrorist shit they cant do anything.

praxis1966
19th July 2011, 02:34
not to be a smart ass but i think rule number 1 is pretty much covers doing "stuff" from home

True, which is why if I was going to be all sneaky-sneak-in-the-cookie-jar I wouldn't do it from home. I'd install Tor on a thumb drive and head to the nearest public library. However, there are reasons beyond simple hacking to anonymize yourself that aren't so high profile that you'd necessarily be paranoid enough to actually leave the house... Like avoiding DMCA notices. Besides, my laptop's on the fritz and I dunno how popular I'd be setting my desktop up in a fuckin' Starbucks.

Libertador
24th July 2011, 07:47
Hushmail has been accused of handing over six or seven cds worth of data to the FBI. Even if it is just hearsay I don't think I would trust them anymore.

I've found it to be true that one should treat email like it is an public letter. An email being sent it bounced around to so many different servers on the way to its final destination that it would be irresponsible to assume that it hasn't been recorded somewhere along the way. That said, encryption of emails may very well be more important than the email provider itself.

Animal Farm Pig
26th July 2011, 01:58
Good topic.

I was wondering if anyone had experience with iPredator (https://www.ipredator.se/?lang=en). It's from the Pirate Party and seems legit.

I've been couch surfing lately, but getting my own place and internet connection again soon. One thing that I want to set up is an open AP + iPredator + Tor. The basic idea is to have an open AP on a separate subnet. The open AP connects to the home server which is running a Tor. Use iptables to set up a transparent proxy to send all port 80 traffic through Tor. All traffic (tor and otherwise) goes through the tunnel to the iPredator vpn service in Sweden. Since the Tor traffic won't even be coming from my local IP as far as the internet is concerned, I could run an exit node for extra niceness.

Regarding email, just use PGP/GPG. GPG is quite easy to set up in Linux. PGP under windows is kind of a pain in the ass unless you pay for a license. Symantec does make available the PGP desktop source code for download. Removing all of the licensing bullshit requires finding the "#ifdef beta = false" in one of the headers, swapping it to "true", and then finding all the dependencies and building from source. One day, I'll get around to setting up the correct build environment.

Anyway, PGP your emails. Maybe it attracts attention, but your message is secure. Otherwise, your mail will be travelling across the internet in plain text and sitting on a server somewhere in plain text. You might as well be sending post cards.

If you're anonymizing your browsing through the use of Tor or proxies or whatever, I wouldn't worry to much about creating disposable accounts on yahoo, gmail, etc. Just remember to log out when you're done using them, don't accept cookies, etc.

If you really don't like the big services, you can easily rent some server space. The least expensive I've found is about $2.50/month for a linux virtual private server. Run your own mail server. Encrypt /home & /var and PGP your emails. Nobody is going to fuck with you.

I don't know if they're still making them, but in the past Hitachi offered a SKU of TravelStar 7K 2.5" hard drives with built-in hardware full disk encryption. It's a nice alternative or complement to TrueCrypt. I never tested it, but the manual said that after 5 consecutive mis-typed passwords the drive would wipe the encryption keys making your data permanently gone.

PC LOAD LETTER
27th July 2011, 05:54
In addition to the method mentioned in the OP for randomizing the MAC address on linux, there's a utility called "macchanger", which has a flag for setting a random MAC address (-r)

I use it on my laptop.

You still need to put the interface down before, then up after you set it. Etc.

El Rojo
1st August 2011, 18:32
Does the left wing even register on the radar enough for the authorities to care? In the UK at least, they are pre occupied firstly with Islamic extremism, and the Irish republican armed struggle a distant second

The Met has recently called for citizens to report any info relating to anarchists, just as would be done with muslim extreamists. also, activists HAVE been convicted on the basis of internet logs, looking at target buildings ect

another good email provider is riseup mail. someone with more computer know how than me will have to explain the ins and outs of how it works, but many experienced activists swear by it, and it is purpose built for revolutionaries