Make Yourself Anonymous on the Web!

238,292

2,365

188

Intro: Make Yourself Anonymous on the Web!

"How can I travel and communicate over the Internet without being tracked or spied on by anyone?"

This tutorial is going to explain how you got to this!

There are a multitude of reasons for wanting privacy for communications on the Internet. I think it goes without saying that every human being has an inherent right to privacy. In our current technological state of surveillance, this right to privacy has been severely compromised. Google, the NSA, and GCHQ are all spying on our private communications.

Furthermore, I believe that we have a right to free communication and uncensored communication. Many nations and companies limit what sites its citizens and employees can visit and view. In some cases, if they do go to certain sites, they are immediately suspected of criminal or anti-government activities (often those two are conflated). In these cases, browsing the Internet anonymously can be a matter of life and death. We are going to do this using a proxy server, vpn, and encrypting our send data.

Step 1: Tor Browser

Tor browser is a browser that uses a vpn to show sites another public ip. Tor also encrypts your data. So lets start by downloading tor browser for your platform. So lets go to:

torproject.org


Click on download and select your platform. Save your file somewhere on your hard drive. Note: If you're using linux there's a easier way then downloading every thing from the site. If you're using linux skip to step 2. Select the right download link. And when its done downloading. Run the installer and follow every step. When that's done go into your map where all data is and open start tor browser. If you haven't got a vpn or proxie click the first option. Wait a second and boom! You got your tor browser. To check if its really working type in the search panel " my ip". If its different from your own ip, then its working.

Nice!

Step 2: Tor Browser for Linux

If you got linux, you've only got to type some simple lines in the terminal. It's as easy as copy and pasting some lines. because thats what you're going to do. you'll also need administrator rights to perform these steps.

So start by typing(copy and pasting) these lines of code:

sudo add-apt-repository ppa:webupd8team/tor-browser
sudo apt-get install tor-browser
sudo apt-get update


Nice! Now you should have the tor browser. Open it and select the first option if you aren't using any vpn or proxie. You're done! To check if its working type in the search panel " my ip ". And open a site called whatsmyip or something similar. If you're ip is different from your own ip, then its working. Nice!

Step 3: Adding a Vpn

What is a VPN?

A VPN or Virtual Private Network is a method used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. VPNs are most often used by corporations to protect sensitive data. However, using a personal VPN is increasingly becoming more popular for every citizen as more interactions that were previously face-to-face transition to the Internet. Privacy is increased with a VPN because the user’s initial IP address is replaced with one from the VPN provider. This method allows subscribers to attain an IP address from any gateway city the VPN service provides. For instance, you may live in San Francisco, but with a VPN, you can appear to live in Amsterdam, New York, or any number of gateway cities. It is also the best method to surf anonymously. And on top: You will bypass online blocks to access foreign content like a local. Get to websites back home when you’re abroad. And bypass government or workplace censorship of sites like Facebook, Gmail and Youtube. Plus, you can download torrents and use P2P programmes anonymously.

What Vpn to choose?

There are many choices when it comes to VPN providers. There are some
VPN providers who offer free service and there are some which charge for VPN service. Paid VPN provider IPVANISH is doing an excellent job compared to the free service providers, which are very unreliable, slow and not safe. IPVANISH offers robust gateways, proven security, free software, unmatched speed, unlimited bandwith, and the best of all: IT HAS NO TRAFFIC LOGS! Unlike other VPN companies do they NOT collect any data because of their no-log policy! And to stay completely and 100% anonymous, they even offer to pay via paysafecard (but they offer also the usual payment methods and even accept paypal). And on top of that do they not only offer the VPN software for Windows, Mac, Ubuntu, Chromebook and Routers, but they also offer ANDROID & IOS VPN Apps for easy install. It is really easy to setup the VPN connection either on PCs or on mobile devices with the apps, everyone can do it within a few clicks. Need a free VPN? Then you can download Cyberghost, you got a paid and a free version. Unfortunately cyberghost isn't free for linux.

How to install cyberghost?

Go to the site of cyberghost and click on download. Run the installer and follow all the steps. Run the program and push that big yellow button! Now its configurating your vpn. Visit whatsmyip and see if your ip is changed! You can also install cyberghost on your android and apple products. For linux you would like to download and install frootvpn. Unfortunatly this isn't free too. There is also a vpn for linux called vpnbook that is free.

Step 4: Configure Apps to Use Tor

If you also want apps to have encrypted data by tor, then we have to install proxycap. Install proxycap and open your tor browser. go to settings and then Preferences. A window will open, click on "Use custom proxy settings". Now you got to fill in "No proxies for: ". Just fill in 127.0.0.1 Nice! Copy the port section and click OK and you can close tor browser now. Open proxycap and go to the proxies tab. Click on new and give it a display name. I'm going to call it 'Tor proxy'. Select type SOCKS5. Hostname is going to be 127.0.0.1 and port is the port you just copied. Click on OK. Now you go to rules. Change the field(Under Redirect through proxy) from default to tor poxy(Or the name you gave it). Under this section check specify and select an exe file. Or if you're using mac select an app file. Give it an name and Voila! Click on OK and you're done! Select Enable proxycap in your menu bar and it should be running. Go check it!

Step 5: Adding a Proxy

Using proxies is a tried and true method of obscuring your identity on

the Internet. Although your traffic is not encrypted and can be sniffed, the traffic cannot be attributed to any person as the proxies use their IP addresses rather than yours. Of course, this does not prohibit your traffic being tracked by your cookies. At the moment i haven't got a tutorial for adding proxies. Look for some on the internet and watch out for fake proxies! Don't download proxies no one have ever heard of! I found some tutorials for windows and mac, go check them out! I haven't checked if these proxies are safe. So google around.

Proxy Tutorial for windows 7

Proxy Tutorial for mac

Step 6: Encrypted P2P Chat

Often, people want to chat or use voice communications over the Internet. Both can be intercepted and read. There are at least two technologies available to encrypt these types of communications that makes it very difficult to intercept and read.

Chat
For Internet chats, CSpace is among the best. Like so many of these technologies, CSpace relies upon encryption. CSpace uses a 2048-bit RSA key for authentication and each user has a unique public key to identify themselves. Users are only identified by a hash of their public key on a central server. All communication is encrypted with TLS (Transport Layer Security). You can find more information about CSpace here, though, it is no longer in active development.

Step 7: Well Done!

Nice you got it all working and you're anonymous on the web. Using all of the options gives you the best security! Hope you've learned something and you're safe on the internet now! Thank you! If you liked it vote for the contest.

A Word of Caution
I am very reluctant to use any proprietary, commercial product for purposes of maintaining anonymity. The reason is that these companies easily bow to pressure from state authorities to enable snooping on their networks and products. Although not perfect, open-source products are more likely to give you a greater level of assurance for maintaining your anonymity and privacy.

Note:

I'm not responsible of anything happened to you(your computer), or anything else.

Share

    Recommendations

    • Optics Contest

      Optics Contest
    • Electronics Tips & Tricks Challenge

      Electronics Tips & Tricks Challenge
    • Audio Contest 2018

      Audio Contest 2018

    188 Discussions

    0
    None
    isherclub

    3 years ago on Introduction

    I entirely agree with the principle:

    "I am very reluctant to use any proprietary, commercial product for purposes of maintaining anonymity"

    yet I completely disagree with the advices:

    1. TOR is financed by US intelligence, according to journalist investigation from

    Pando (see http://link.isher.club/1JiF2kD). So forget about TOR.

    2. IPVanish is based in the US therefore subject to the Patriot Act

    (see https://www.ipvanish.com/privacy-policy.php#10)

    3. The concept of CSpace is nice, yet it is old and relies on the usage of

    key servers to store public keys. This kind of encryption has been

    surpassed by end-to-end encryption methodologies such as OTR

    for the chat, zrtp for the voice and others.

    Not to mention that I can use a bullet proof technology to make myself untraceable, but if I use such technology to register myself on my facebook account, I became again immediately traceable.

    Privacy is a huge subject which requires a very meticulous approach to be handled honestly and candidly.

    19 replies
    0
    None
    jmichel5isherclub

    Reply 3 years ago on Introduction

    isherclub thanks for sharing the extra information. I've been wondering why such programs are being widely suggested by a lot of IT's. I heard of a few programs that does a way better job then what we see now, but because they are not with or created by the government its not something you would ever know unless you happened to know some people... What is the bullet proof technology that you mentioned. It is pretty much logical that if you want to go on popular social site that you would use a different device altogether and have one device or so just for private surfering, unless you create a another facebook with no trackers etc...

    0
    None
    isherclubjmichel5

    Reply 3 years ago on Introduction

    I entirely agree with your point

    "It is pretty much logical that if you want to go on popular social site
    that you would use a different device altogether and have one device or
    so just for private surfing"

    Yet, in my experience, this has been a huge cultural barrier. Not to mention that there are out there products and companies that still seem to "ignore" this issues by proposing solutions that can work both ways. In my opinion it is a fraud.

    The technology is out there, there are two huge barriers that have been withholding people to "access" it:

    a. Its complexity of use

    b. the "cultural" shift required to protect our investment (our privacy)

    To answer your question "which bullet proof...", last December, Der Spiegel (a German magazine) published a series of documents made available from E. Snowden.

    Those documents actually stated the obvious: the technology that is community developed and open-source is the hardest to break.

    But please, remember, community developed AND open-source. In other words, that technology that you can compile on your PC at home (first complexity barrier).

    As for the cultural barrier, until our privacy will truly be preserved, we have to take care of it by ourselves, there is no other way and, to quote Christopher Soghoian, principal technologist for the American Civil Liberties Union:

    "We
    need to stop assuming that the phone companies will provide us with a
    secure method of making calls or exchanging text messages,"

    0
    None
    unkerjayisherclub

    Reply 2 years ago

    The commentary of the movie "RED" (former CIA consultant) is enlightening.

    "Don't use a cell phone to commit a crime", it's traceable. He didn't mention brand or method (text, voice, throwaway). He simply said "don't".

    What they want to keep secure, they don't write down, they compartmentalize to just those who need to know and ONLY what they need to know.

    And "disinformation" is their friend.

    I might also add, for the Americans here, the 4th Amendment"

    "You have the right to be free from unreasonable search and seizure..."

    has NOT been amended to include:

    "unless you have nothing to hide".

    And the Miranda rights:

    "ANYTHING you say can can and will be used against you in a court of law"

    Does not implicitly or explicitly mean,

    used to ":exonerate" you.

    Don't talk to the Police:

    To be clear here, I am not advocating crime. I AM saying that EVEN if you are innocent and can prove it. The deck is not stacked in your favor.

    Justice is all about facts as determined by the "allowable" evidence, a case presented by attorneys who want to win, in a court of law, as (in some cases - not always) as determined by "a jury of your peers". Often by people who are elected to office who often tend to see "justice" through the perspective of the next election or their political bias (or both) as well as the demands of the public (in elections). Who lock people up in for profit prisons and do so often out of a bloodthirsty demand for "toughness" on crime.

    This (in America) is the system in which we seek anonymity and privacy.

    Every new threat is a new fear by which the wheels of surveillance can be stoked and the freedoms we'd like to think are "guaranteed" by law can be dialed back.

    Certainly we want to feel "safe and secure".

    At what price?

    It's a NECESSARY balancing act.

    0
    None
    JohnD445unkerjay

    Reply 10 months ago

    Thats Where your wrong. In certain cases the law requires law enforcement to use what you said to your benefit. For example, Police may not omit material facts from a PC affidavit. See Franks V. Delaware. Also, the government has to turn over exculpatory evidence that goes against the government's position. See Brady V. Maryland. Violations of these examples can carry hefty penalties against government actors, ranging from criminal charges for civil rights violations (18 USC 242) to civil liability for civil rights violations. (See 42 USC 1983 and Bivens V. Six Unknown Agents.)

    0
    None
    jwbowman06unkerjay

    Reply 2 years ago

    After reading several of the comments here, one observation should be stated.

    The firm and unabashed answer to the question of "what do you have to hide?" should always be:

    "EVERYTHING"

    It's nonsense that an entire generation has been fooled into thinking that a desire for privacy equates to criminal activity, or that any type of spying on YOU is somehow a benefit to YOU.

    0
    None
    DeanP31jwbowman06

    Reply 2 years ago

    That is a great way of turning the unspoken assumptions on their head. It reminds me of taxation - where the government and its dependents assume that all your money and property are theirs, and they'll let you keep a little.

    0
    None
    ShawnM38DeanP31

    Reply 2 years ago

    Absolutely, people need to know and keep in mind that big bro is a business,they don't make money, they just illegally tax the hell out of us and spend as they see fit. No one "pays" taxes, the gov just takes them. They get stealth tech n we get shite sandwiches. They're all crooks,and they'd rather wipe their asses with the constitution than follow it. We have a right to privacy!!

    0
    None
    macgyver71jwbowman06

    Reply 2 years ago

    Usually when I hear that type of talk (or the "If you don't break the law, you dont have anything to worry about"), I tell them to read "Three Felonies a Day" and then come back and have this conversation.

    0
    None
    lovethebackwoodsjwbowman06

    Reply 2 years ago

    Right on, jwbowman06! For some reason, I have always been the type of person whom even strangers in a crowded room, at church, some social function, even in a restaurant, will seek out with a brief introduction, then ask, "Could I speak with you about something confidential (personal, private, whatever)"? I never leave a setting to go somewhere alone with an unknown person, but I have a few times suggested something like, "Would you like to go over there toward the corner, or to the end of this row, where we can sit and talk for a moment without being interrupted?" None of these people, or relatives or close friends, (or I myself) would want to have private conversations broadcast to the world. If a close friend or relative is discussing family situations with me, or even just whom to vote for, it is our business alone, period. I would be very reluctant to discuss private issues with anyone who feels that everything about our private lives should be open information for any busy-body to just wants to know!

    0
    None
    callunajeanjwbowman06

    Reply 2 years ago

    YES, this. I grew up with a phone tap because of the work my father did. I cherish my privacy...

    0
    None
    isherclubdianad1

    Reply 3 years ago on Introduction

    @dianad1, re: "_I'll_ be compiling at home"

    I understand what you're saying :-)

    We need to start somewhere.

    I believe you trust the guy who comes and fix your PC (at least I hope do).

    This guy may be able to package for you what you need to protect your privacy.

    If he doesn't, then he perhaps knows someone who can (I can always tell him what to do of course) but ultimately the point is:

    a. we take open-source, community developed, technology

    (either we or someone we trust)

    b. we pack it in an usable form (again we or someone we trust)

    c. we use it.

    Any other way cannot, at this stage, be trusted.

    I myself offer such kind of services and often I have been asked to provide "certifications" from "higher" authorities confirming the quality of what I do, and my answer is:

    "if you ask me to certify myself, how can you trust me?!? On the contrary, I give you everything you need to check my work, and if you like it, you take it, but it is you, ultimately, who is responsible for looking after your own interests".

    0
    None
    dianad1isherclub

    Reply 3 years ago on Introduction

    Unfortunately, I have usually been the person to do all the repairs, installations, builds, etc., on my own computers. I've compiled programs and installed Linux, but I sure don't want to mess with that level of complexity and difficulty any more in my life. It's a life drainer. I have neither the time (you know some software can take hours and days to work out the bugs and nuances to work on your particular system) nor the inclination.

    I'm betting most people don't. Assuring private interaction with resources while on the Internet needs to be at least as easy as antivirus software--and many of those are too complex for your average user. I don't mean neo-luddites, either.

    As to trusting repair people, when I've "outsourced" to someone commercial rather than messing with problems myself, many of them have been half-trained maroons or rude young people in a hurry to jump to conclusions and not even listen to what I've tried already. I've worked in IT at many levels, from drilling holes in concrete to run peer-to-peer networking back in the day (does anyone even know what that is any more??), installing components, maintaining servers, and upgrading computers on the hardware side to programming Web sites before the advent of content management software. Still, I find many of the repair folks narrow-minded and only interested in the next, kewl thing. They are like doctors who have decided what you have before even examining you. I have often ended up fixing it myself after they are done mucking around.

    But that can take a long time. So, yeah, trust is a rare commodity. Time is more precious these days. Compiling my own code? There has to be an easier way!

    Nonetheless, I do appreciate your optimism that solutions are out there. Do you blog about the topic of private/anonymous browsing or can you recommend a good place to keep informed?

    0
    None
    Lashwaydianad1

    Reply 3 years ago on Introduction

    LinuxMint, and similar distros, are the answer to this. I made the switch about a year ago, and it's been easier to use than any Microsoft product since XP. No joke.

    The community is intensely active, and it's releases are very stable (and secure), with it intending to be the open source OS for those who just want a computer to work without paying.

    0
    None
    isherclubLashway

    Reply 3 years ago on Introduction

    @Lashway

    I'm afraid this may be a little misleading.

    1. The point of open source community developed technology is not about having a solution to our IT needs that is cheaper (without paying) but that is more secure (because thousands or hundred of thousands of private citizens check it for us)

    2. Unfortunately it is not enough to install an open source operating system because, as correctly mentioned @absolutekold earlier in here, to approach the problem of keeping our data private is simply too big to be realistically solved by any of us.

    On the contrary, what we can do, is to prioritize our needs for privacy, identify what we really need to keep private, then find appropriate technologies and methodologies that will help us to increase the level of privacy for such kind of information we want to protect.

    To summarize, the message is two-fold:

    a. protecting everything is impossible

    b. increasing the level of privacy is something that can be done but requires the use of open source technology and a change in our habits

    Finally as a side note, you may find interesting this article about how to take advantage of open source technologies to increase data protection

    http://link.isher.club/1Ogwp0W

    But don't forget that your hard-drive may be already inherently insecure, as reported on this other article

    http://link.isher.club/1DRuE24

    Or even your CPU may not be that secure after all

    http://link.isher.club/1Hv2i0f

    0
    None
    isherclubdianad1

    Reply 3 years ago on Introduction

    @dianad1

    What I am saying is that you need to start shifting your trust onto someone you can more easily control: either yourself or someone close.

    This doesn't come for free.

    I've heard somewhere about the theory of transforming "trust" or "reputation" in a sort of currency.

    Perhaps soon an online "market" will attribute "reputation points" to professionals whose only job will be to integrate such technologies into usable forms, thus avoiding the risk of bumping into "...folks narrow-minded and only interested in the next, kewl thing..."

    Until then, privacy will come to a cost, and it won't be cheap. At least we know in which direction to invest our money.

    Those who will make you believe that you simply install a new app and you are safe, will just be fooling you.

    Yes, I blog about privacy in general, including anonymous browsing, with an eye more to the regulatory aspects in different countries. I don't know of any specific place to look or, to be more precise, I believe it is wrong we need to look at just one place.

    For example a few days ago an interesting conference about BitCoin let us understand that Intel chips (and very likely many other manufacturers) have been including technology that may well have been used, or could be used, to hack our systems.

    I myself worked about 15 years ago on special firmwares installed on commercial hard drives used to access, or deny access, to data stored in them, regardless of what the operating system was doing.

    So everything is interconnected and to be effective, we need to look at protecting our privacy from every single point of view.

    0
    None
    JohnD445jmichel5

    Reply 10 months ago

    Actually, while Tor is funded by the U.S. Government, the government does not participate in the development or maintenance of Tor, and has no direct input as to how Tor is implemented. While the FBI and others have claimed to have cracked the Tor network, we must remember that the Department of Defense still uses it AND we must remember that the few cases where Tor's anonymity was breached after operation Torpedo, were cases where server-side code was clearly implicated in the breach directly. The latest round of attacks have exploited a vulnerability in PHP, by way of example. Tor is only as strong as the technology deployed over it. Also, VPNs Do NOTHING to protect your identity- they have your identity when you connect, and are known to sell your data to the highest bidder. Proxy servers are similarly implemented to VPNs. Therefore, Tor is your single best bet of online anonymity, however Tor can also be blocked from a server entirely. (For example, Wikipedia blocks all Tor exit nodes.)