This document provides methods for staying anonymous online, including using web proxies, VPNs, and the Tor network. It explains how to configure browsers and devices to route traffic through these anonymity tools, preventing others from tracking online activities. Basic safety tips are also outlined, such as using secure connections, strong unique passwords for all accounts, and avoiding sharing too much personal information publicly.
This document provides methods for staying anonymous online, including using web proxies, VPNs, and the Tor network. It explains how to configure browsers and devices to route traffic through these anonymity tools, preventing others from tracking online activities. Basic safety tips are also outlined, such as using secure connections, strong unique passwords for all accounts, and avoiding sharing too much personal information publicly.
This document provides methods for staying anonymous online, including using web proxies, VPNs, and the Tor network. It explains how to configure browsers and devices to route traffic through these anonymity tools, preventing others from tracking online activities. Basic safety tips are also outlined, such as using secure connections, strong unique passwords for all accounts, and avoiding sharing too much personal information publicly.
This document provides methods for staying anonymous online, including using web proxies, VPNs, and the Tor network. It explains how to configure browsers and devices to route traffic through these anonymity tools, preventing others from tracking online activities. Basic safety tips are also outlined, such as using secure connections, strong unique passwords for all accounts, and avoiding sharing too much personal information publicly.
Title: Anonymity guide - How to be safe on the web
Author : Daisuke Dan
Date : March 18, 2014 # Summary #
1) Introduction
2) Methods
3) Explanations
4) Preventions
5) Conclusion
1) Introduction
There are many reasons to go anonymous online - preventing tracking from authoritarian regimes in certain countries, maintaining privacy from companies who track online usage, or simply a desire to remain anonymous. Some people want to avoid company or school tracking. In this paper you will learn how to be safe and use some methods to be anonyme.
2) Methods Web Proxies: Web proxies is browsing anonymously via another site: - http://goproxy.nl/ - http://www.hidemyass.com/ - http://www.kproxy.com/
Proxies: Proxies are used mainly for security purposes and IP Address, it may be also used to: - speed up the loading of web pages - open blocked sites - bypass IP controls
VPNs: It enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network, while benefiting from the functionality, security and management policies of the private network. A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryptions.
Web Browsing: - Pirate Browser http://piratebrowser.com/ (Based on Tor network)
- Tor Network https://www.torproject.org/ 3) Explanations
# How to use a Proxy: You can configure your browser to use some proxy server. To do so first of all go to hidemyass.com and note down a highly anonymous IP. Now you need to configure your browser to use this IP. Follow these navigations according to the browser you are using: For Mozilla: - Click on Tools, then options. Under the Advance tab select Network click Settings select Manual proxy configuration and Enter the IP noted from the proxy list.
For Chrome: - Click on Customize and control button then click on options, select Under the hood and click on Change Proxy Settings the Internet option dialog box will appear, click on LAN Settings tick Use proxy server for LAN and enter the IP that you noted from IP-list as mentioned above.
For Internet Explorer: Haha, he sucks! Internet explorer serves to download Firefox \(^_^)/
# How to use TOR: Tor stands for "The Onion Router." To keep things basic, the TOR network keeps you anonymous by sending the data sent out from your computer through multiple "computers," or relays around the globe before going to it's intended location. This makes it impossible (if used right) to track where the information came from.
Once you have set up and configured your Tor Browser bundle, you are done. Yep, that's it. You can now use Tor like you would normally use any other browser and feel much safer and secure about keeping your identity private. You will realize that web pages load a little slower than normally, but this is because of the encryption process and the time it takes for your packets of data to get sent and received. This slight increase in loading times is definitely worth the amount of privacy and anonymity you get in return. You can click on "Settings" to configure yout network:
# How to configure your browser: A lot of addons offers the possibility to setup proxies in your settings, here is a list of free addons for FireFox:
User agent switcher: - https://addons.mozilla.org/en-us/firefox/addon/user-agent-switcher/
"Internet explorer has encountered a problem and needs to close, We are sorry for the inconvenience. [Send Error Report] [Don't Send] [Uninstall this bullshit]"
To test your protection, an useful website is available to see if your proxy works or not: http:// test.anonymity.com/
# How do hackers stay anonymous: Hacker/crackers who perform criminal activities and still they manage to flee away, usually implement highly sophisticated combination of techniques. They use the options that are discussed above but in addition they implement some other methods too, to achieve maximum anonymity. Few of those issues are
[+] Virtual OS: Virtual machine is a guest operating system running on the top of host operating system. virtual OS is used to attain high anonymity as usage of guest OS allows user to easily get rid of log file, and gives flexibility to manipulate the MAC address. The most popular virtual machines are VMware and Virtual Box.
[+] Spoofing MAC address: Every Network interface card has a unique MAC address assigned to it, which is used by forensic to trace hacker. Hence spoofing of MAC address makes it hard to trace a hacker. Mac address can be spoofed manually or by using some software like this.
[+] TORs live CD: Use of live cd is another good option that can be used to add to the anonymity.Tors live cd named as tails can be downloaded from TOR website. All the connections in tails goes through TORs networks and it leaves no evidence of whatever youve done.
4) Preventions This part gives general advice on safely using email,web...etc because they can easily breach your privacy! Banking, shopping, and interacting online is the ease with which other people can now steal your information. To stay safe on the internet, use the following strategies.
Your connection: - Always check for secure transaction info. The best companies will have many security devices in place. You may see a gold lock at the bottom of the page to indicate a secure site. When giving any bank details or other information, make sure the connection is secure (URLs like this begin with https:// instead of http://) and the site is trustworthy. - Make sure you are using (and regularly updating) an anti-virus program, an anti-spyware program, and a firewall. - Use different passwords for every site
Your identity: - Keep your eyes peeled for online scams. - Do not give out your full name, address, or phone number to anyone online that you don't trust or know in person. - Block or ignore unwanted users. - Keep your primary email address private. - Use a fake name. - When you change, really change! (name, adress, language, email, social network...) - Dont use lazy passwords. - Watch what you "say" online.
Downloading: - Never open e-mail attachments from strangers unless you can trust them and have security settings on your computer. - Dont click on pop-up messages - Dont follow links in unexpected emails - Only download files or software from sites that have been rated/verified by trusted sources.
How your anonymity can be breached? - IP adress - Cookies - Browser fingerprint - Spyware - PC history (in case of a computer forensic investigation) 5) Conclusion
Using the Internet, you never will be able to protect your privacy 100%. But by choosing your provider wisely you can achieve enough privacy to protect yourself from spying investigators and even from governments. If used these techniques in proper combination, very high anonymity can be achieved Hope you've enjoyed the paper! Cordially, Daisuke Dan. PenTester, Researcher. The Hackers Bay.