Read How to be Anonymous Online Online
Authors: A. M. Eydie
Investigators are not always so lucky as to have a list of suspects from which to identify an author. This scenario was tested by a team of researchers who mined writeprints from an email database in which all emails were anonymous, and no suspects were given. The researchers extracted each email's writeprint. With that, they grouped the emails by their respective authors (example: suppose there were 100 emails, they determined 30 emails were by one author, 20 by another and 50 by a third). Once each author's emails were grouped, creating a larger body of work per author, a more accurate writeprint was extracted [2]. No further attempt was made to identify each author's true identity, but, one can only imagine what an entity with large resources and supercomputers scouring the web could do with the “more accurate” writeprints.
In another project, researchers extracted unknown authors writeprints from individual, anonymous blog posts. The writeprints were matched against a database of 100,000 non-anonymous blogs (2.4 million blog posts in total). With no further personal investigative work and strictly using open source software, the researchers were able to identify successfully the authors 7.5% of the time. When the researchers extracted an unknown authors writeprints using three anonymous blogs posts, the success rate grew to 25%. Even when writeprinting failed to match unknown authors to their non-anonymous blogs, the field of possibilities was often narrowed from 100,000 to 20 [3].
Given the previous research, let's play out a scenario that applies existing technology:
Realistically, the investigators are going to be more thorough. The scenario will probably go more like this:
Given this scenario, there is probably a much greater than 7.5% to 20% chance that the software correctly identifies Sam from the 900 employees. There is probably a near 100% chance that the writeprinting software can narrow the field to 20 suspects, of which Sam is included. From these 20 suspects, traditional investigative techniques can probably weed out Sam as the whistleblower.
This scenario might be hypothetical, but, it is not unrealistic.
You have an advantage over Sam in that you know writeprints exist. As such, you will not be naive when you send that letter exposing the toxic waste dump in Tumangang City. Moreover, since you are a genius, you can wear your leather writer gloves so your prints do not end up all over the net.
IMPORTANT
– You should not mask your writeprints in your daily life. You only mask them when you need to be anonymous. You do not want to alter your non-anonymous writeprints and end up with them matching your anonymous ones.
A few techniques you can apply to anonymize writing:
You do not necessarily need to follow all of these methods. You can pick and choose those that you feel best work for you
Applying the previous techniques can make you stand out as trying to hide your writeprints. Feel free to use them as a guide for faking your writeprints instead of following them exactly to obscure your writeprints
Above all else, writeprinting relies on your consistency as a writer. Fortunately, you can change your style anytime without too much hassle.
For fun, visit
http://www.textalyser.net
to have stuff writeprinted.
Think of Bitcoin as digital cash. Until recently, it served as a means for high-risk currency trading, gambling and drug dealing. It was popular for these transactions because it was unregulated, easily used internationally and could be traded for government-issued currencies on exchanges, the most famous being the now defunct Mt. Gox.
Here is a tiny history of Bitcoin. It was introduced to the world in 2009 via the white paper “Bitcoin: A Peer-to-Peer Electronic Cash System.” Just about nobody cared about Bitcoin until 2011 when the price of one Bitcoin went from $1 to $32 and back down to $2. After this first crash, financial nerds figured Bitcoin was just a cheap thrill that would soon fade away. After creeping up to $14 by the end of 2012, Bitcoin reached $1240 on December 4, 2013. Now, Bitcoin has scrutiny. Venture capitalists, FBI agents, and Academics are all over the technology, and, for various reasons, are dedicating resources to tracking and identifying users. The IRS and DEA showed that they are in the game by making the high profile arrests of Charlie Shrem, CEO of BitInstant and Robert Faiella, aka BTCKing, from the Silk Road on January 27th, 2014 (read a brief of the events at
https://howtobeanonymousonline.info/bitcoin/busted/
.
Before I go into why Bitcoin is not anonymous, I want to mention why Bitcoin is awesome:
While I am not going into all the details of Bitcoin’s inner workings, I am going to dispel the misconception that Bitcoin is anonymous. In fact, Bitcoin is the most public payment system in the world. Previously, it was considered “anonymous” because no entity cared enough to track transactions and identify users. Well, as I just mentioned, they care now.
Tracking Bitcoin is manageable for those with ample resources because every Bitcoin transaction is broadcast to the world through what is known as the Blockchain (visit
https://www.blockchain.info
to see). The Blockchain prevents a person from double spending a Bitcoin. Since every transaction is broadcast to the public, the “anonymity” comes from the fact that an individual's Bitcoin wallet address is publicly displayed instead of their actual identity. This is known as pseudonymity, not anonymity.
Here is a liberal scenario to help explain why this is a problem.
Let’s rework this scenario with a Bitcoin.
Using Bitcoins, Xavier, Yasmin and Zack thought they were on the “down-low” since all of their activity was done behind their computers using fake IP addresses and randomly generated "anonymous" Bitcoin wallet addresses. So wrong they are!
There are a number of ways to track Bitcoins along their transaction chain [7]. In fact, many stolen Bitcoins have never been used because there are no places to spend them without the risk of being identified. If they are traded on one of the major Bitcoin exchanges for government-issued currency, to be useful, the money must eventually be transferred to a bank. Subpoenaing an exchange would reveal where the money was transferred to or from. Subpoenaing the bank would identify who owned the account (Subpoenaing an exchange is one of the means the Feds used to identify BTCKing, from the Silk Road, as Robert M Faiella). If the Bitcoins were used to purchase physical goods, those physical goods would need to be physically delivered, exposing the receiver to the risk of identification or the goods to possible seizure. Selling a large quantity of Bitcoins in person is unrealistic since a well-informed person would not buy an enormous volume of Bitcoins from a mysterious seller knowing we now live in a world where the FBI can and has seized illegally obtained Bitcoins (read about Ross William Ulbricht).
Thank God for Bitcoin "laundry" services! They will scrub those dirty, traceable Bitcoin's clean... Right? Maybe?? Hopefully???
Nope.
Using a Bitcoin laundry service assumes two things; First, they will wash your Bitcoins. Second, you can trust them for anything else.
Washing a Bitcoin is no simple task. The laundry service needs to mix your Bitcoin with LOTS of other Bitcoins. Then, those mixed Bitcoins must be divvied up and sent through LOTS of separate transactions where, again, they are mixed with new Bitcoins and re-divvied up at every step. That must happen to the point where it is statistically impossible to prove the link from a fraction of the Bitcoin at the beginning of the process to a fraction of the Bitcoin at the end of the process. That just is not going to happen. In fact, researchers tested out some Bit-Laundry services. The results? The Bitcoins were stolen, or the same Bitcoins were returned [7]. I am no genius, but, I would say if you took your dirty shirt to the cleaners and it came back dirty, you got f-cked. If you took your dirty shirt to the cleaners and they stole it, you got double f-cked
.
Using a Bit-laundry service also brings us back to the third party trust issue. This entity could be tracking or sharing data, susceptible to subpoenas or under siege by Kim Jong-Un. Seriously, when is the last time you went to the cleaners, and it was not run by Koreans? I certainly can't remember.
So what the heck!
As with everything else cyber-related, there are computer geeks working on a solution. Last year, the John Hopkins University Department of Computer Science began developing Zerocoin, an add-on to Bitcoin to anonymize Bitcoin transactions. This year, the Zero
coin
developers joined another group of developers and renamed the project Zero
cash
.
Zerocash will make use of two new crypto-currencies, a new ‘Zerocoin’ and a yet-to-be-named ‘basecoin.’ Zerocoins will be anonymous, and the basecoins will not.