Read How to be Anonymous Online Online
Authors: A. M. Eydie
How to be Anonymous Online – A Quick Step-By-Step Manual
August 2015 Update
By A M Eydie
Copyright © A M Eydie
All Rights Reserved
2015
Table of Contents
WARNING, DISCLAIMER OR WHATEVER...
Section: Safe Updates and PGP Program Authentication
Section: PGP/GPG – Everything you want to know
Section: Email, Chatting, Messaging
Section: Writeprints – They will identify those other anonymous netizens... but not you
Section: Bitcoin is NOT Anonymous
The Great Flaw – You are not Stealth, You are Secure
BONUS – Creating a bootable microSD card that doubles as your phone's microSD card
The following works are cited in these instructions:
I know these instructions will be purchased by anonymity seekers of many levels. Here is where I am coming from in writing this guide and what you stand to gain.
First
, this guide is $4.99. There is something worth $4.99 in this for 95% of you. For beginners, you will be totally anonymous online in two hours (and that is giving you time for a cigarette break). For post-beginners, you will discover some little, yet important, detail(s), like a wrong setting in Tor, that will blow your cover if uncorrected. After all, Tor and Tails DO NOT come preconfigured for total anonymity (f.y.i., there is more to this guide than Tor). Remember, if you have one, single, tiny, little hole in your system, you are NOT anonymous. If you are a know-it-all anonymity expert hacker computer science grad student, you do not need this guide, so feel free to move on. Again, this guide is only $4.99. You probably earn that in 15 minutes at work. Amazon will even give you a refund if you think this whole thing is a total waste.
Second
, it is easy to be anonymous once you know how, but it is a pain in the ass when you don't. For $4.99, I will take the pain out of your ass. In the last ten years many anonymity "game changers," like Tor, Tails and Bitcoin, have come about… However, they have flaws. Tor and Tails need some modifications to be secure. Bitcoin is not anonymous in its current form. It does not even pretend to be anonymous. It is pseudonymous… This is a HUGE difference. I talk about why this matters and how Bitcoin can be anonymous in the near future with modifications YOU will make (and no, not "Bit-Laundry" services).
Third
, PGP Encryption is confusing. I break it down into short step-by-step instructions, saving hours of figuring it out yourself ($4.99 to save a few stressful hours of your life is a good deal).
Fourth
,
this is not a book you read these are instructions you follow
. If you are looking for a book to spend the day reading by the fire, do not buy these instructions. If you read these instructions in 30 minutes, and then complain that this 'book' merely says install Tails, you did not read this page, AND you did not follow the instructions. It will take you a couple hours to build a solid system.
If you want to spend $4.99 to do things the right way the first time instead of spending days searching Google and browsing forums trying to figure this stuff out yourself (and still leaving holes in your system), buy these instructions. If you build your kid a doll house, you do not want a book about doll houses, you just want instructions for building a doll house.
For $4.99, I am telling you what to do without asking you to subscribe to a proxy service, buy software or trust a third party.
Fifth
, I post all updates on my blog. I make updates often, and there is no reason you should have to buy a new copy to stay "in-the-know." As new technologies are developed, new shortcomings are discovered (like how your mega-strong encryption will be broke in 5 years), and spelling mistakes are corrected :/ I will share them with you.
I will show you that Bitcoin is NOT Anonymous and how that is about to change.
I will provide you with future updates.
I believe in the “Keep It Simple Stupid” methodology. This manual details exactly what you need to get what you want, no more, no less. I wrote this so you could be anonymous today instead of spending the next week reading everything you find on Google and, in the end, still not know how to implement the proper steps.
The problem I've seen in other books and online instructions is they give you a bunch of sources and programs for anonymity, but they do not tie all the loose ends together. For instance, you might buy anonymity software, but god knows what a totally unrelated program in Windows is still tracking and saving to your hard drive. Besides that, if you want to use a work computer, they certainly are not going to allow you to install anonymity software. Moreover, maybe, you do not want to encrypt your hard drive because that looks suspicious. You need to run straight from a DVD, Flash Drive or Micro SD card outside of Windows altogether. I will even show you how to boot with a flash drive on old computers that typically will not do so.
Let’s tie up those loose ends.
----------
Don't worry, we are going to work around these.
To my knowledge, as of August 1, 2015, no one following my instructions has faced an exploit. Since I update these instructions regularly to reflect changes in technology, weaknesses that develop will see rectification quickly and accordingly.
Unfortunately, everything has flaws, especially software. The most popular, and probably most secure, software for online anonymity is Tor. The most popular operating system for online anonymity is Tails. These are the heart and nervous system of these instructions. The strength of these programs comes from the ongoing development of each and their open code. When good guys find flaws, work to rectify them begins immediately. When bad guys find flaws, they may be exploited indefinitely.
If being anonymous online is a hobby, this is the way to go. If being anonymous online is a way to restrict corporate advertisers from tracking your online life, this is the way to go. If you hate the fact that some governments are collectively spying on you for no reason, this is a way to make a point that you are not blindly submitting and a way to complicate their efforts.
The great length that people must go to break these systems hints that they work well. However, if you want a foolproof, 100% certain way to avoid the prying eyes of every entity, there is no solution for you. There are organizations with thousands of people dedicated to tracking and watching you. If you want to use Tor to bad mouth Vladimir Putin, you should know that the Russian Ministry for Interior has a 3.9 million rubles reward for developing methods to identify you. If for nothing more than bragging rights, there are academics and hackers that simply want to be the first to publicize mistakes. In fact, a couple of researchers from Carnegie Mellon University gained a huge amount of attention for their attempts to de-anonymize Tor users in 2014.
These are advanced methods for protecting your anonymity. I take you through detailed steps, far more than you are likely to find in one place online, to authenticate your software. I think the sections on authenticating your system are the most overlooked, yet most valuable aspect of this guide. However, if you are looking for a way to evade every entity in existence, I do not know what to tell you.
Nothing I say, do, provide, link to or recommend is guaranteed to protect your anonymity. Whether it is tomorrow or thirty years from now, every security measure will eventually be compromised. That is the power of technology. Frankly, if you can sue me for it, I am telling you that I am not guaranteeing it; therefore, it is at your risk to follow or do anything that I write in this manual.
The first thing you need to do is gather your tools. By the end of this section, everything you need will be in place and ready to go.
If you are already comfortable and familiar with Tails you can skip to
Section: Safe Updates and PGP Program Authentication
.
Your Tool List:
Hardware
Software
Step 1
: On your Desktop, create a folder named
Toolbox.
Step 2:
Download your
Tools
If you need a .zip file extraction program, I use 7-zip (
http://sourceforge.net/projects/sevenzip
)