Introduction: Make Yourself Anonymous on the Web!
"How can I travel and communicate over the Internet without being tracked or spied on by anyone?"
This tutorial is going to explain how you got to this!
There are a multitude of reasons for wanting privacy for communications on the Internet. I think it goes without saying that every human being has an inherent right to privacy. In our current technological state of surveillance, this right to privacy has been severely compromised. Google, the NSA, and GCHQ are all spying on our private communications.
Furthermore, I believe that we have a right to free communication and uncensored communication. Many nations and companies limit what sites its citizens and employees can visit and view. In some cases, if they do go to certain sites, they are immediately suspected of criminal or anti-government activities (often those two are conflated). In these cases, browsing the Internet anonymously can be a matter of life and death. We are going to do this using a proxy server, vpn, and encrypting our send data.
Step 1: Tor Browser
Tor browser is a browser that uses a vpn to show sites another public ip. Tor also encrypts your data. So lets start by downloading tor browser for your platform. So lets go to:
Click on download and select your platform. Save your file somewhere on your hard drive. Note: If you're using linux there's a easier way then downloading every thing from the site. If you're using linux skip to step 2. Select the right download link. And when its done downloading. Run the installer and follow every step. When that's done go into your map where all data is and open start tor browser. If you haven't got a vpn or proxie click the first option. Wait a second and boom! You got your tor browser. To check if its really working type in the search panel " my ip". If its different from your own ip, then its working.
Step 2: Tor Browser for Linux
If you got linux, you've only got to type some simple lines in the terminal. It's as easy as copy and pasting some lines. because thats what you're going to do. you'll also need administrator rights to perform these steps.
So start by typing(copy and pasting) these lines of code:
sudo add-apt-repository ppa:webupd8team/tor-browser sudo apt-get install tor-browser sudo apt-get update
Nice! Now you should have the tor browser. Open it and select the first option if you aren't using any vpn or proxie. You're done! To check if its working type in the search panel " my ip ". And open a site called whatsmyip or something similar. If you're ip is different from your own ip, then its working. Nice!
Step 3: Adding a Vpn
What is a VPN?
A VPN or Virtual Private Network is a method used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. VPNs are most often used by corporations to protect sensitive data. However, using a personal VPN is increasingly becoming more popular for every citizen as more interactions that were previously face-to-face transition to the Internet. Privacy is increased with a VPN because the user’s initial IP address is replaced with one from the VPN provider. This method allows subscribers to attain an IP address from any gateway city the VPN service provides. For instance, you may live in San Francisco, but with a VPN, you can appear to live in Amsterdam, New York, or any number of gateway cities. It is also the best method to surf anonymously. And on top: You will bypass online blocks to access foreign content like a local. Get to websites back home when you’re abroad. And bypass government or workplace censorship of sites like Facebook, Gmail and Youtube. Plus, you can download torrents and use P2P programmes anonymously.
What Vpn to choose?
There are many choices when it comes to VPN providers. There are some
VPN providers who offer free service and there are some which charge for VPN service. Paid VPN provider IPVANISH is doing an excellent job compared to the free service providers, which are very unreliable, slow and not safe. IPVANISH offers robust gateways, proven security, free software, unmatched speed, unlimited bandwith, and the best of all: IT HAS NO TRAFFIC LOGS! Unlike other VPN companies do they NOT collect any data because of their no-log policy! And to stay completely and 100% anonymous, they even offer to pay via paysafecard (but they offer also the usual payment methods and even accept paypal). And on top of that do they not only offer the VPN software for Windows, Mac, Ubuntu, Chromebook and Routers, but they also offer ANDROID & IOS VPN Apps for easy install. It is really easy to setup the VPN connection either on PCs or on mobile devices with the apps, everyone can do it within a few clicks. Need a free VPN? Then you can download Cyberghost, you got a paid and a free version. Unfortunately cyberghost isn't free for linux.
How to install cyberghost?
Go to the site of cyberghost and click on download. Run the installer and follow all the steps. Run the program and push that big yellow button! Now its configurating your vpn. Visit whatsmyip and see if your ip is changed! You can also install cyberghost on your android and apple products. For linux you would like to download and install frootvpn. Unfortunatly this isn't free too. There is also a vpn for linux called vpnbook that is free.
Step 4: Configure Apps to Use Tor
If you also want apps to have encrypted data by tor, then we have to install proxycap. Install proxycap and open your tor browser. go to settings and then Preferences. A window will open, click on "Use custom proxy settings". Now you got to fill in "No proxies for: ". Just fill in 127.0.0.1 Nice! Copy the port section and click OK and you can close tor browser now. Open proxycap and go to the proxies tab. Click on new and give it a display name. I'm going to call it 'Tor proxy'. Select type SOCKS5. Hostname is going to be 127.0.0.1 and port is the port you just copied. Click on OK. Now you go to rules. Change the field(Under Redirect through proxy) from default to tor poxy(Or the name you gave it). Under this section check specify and select an exe file. Or if you're using mac select an app file. Give it an name and Voila! Click on OK and you're done! Select Enable proxycap in your menu bar and it should be running. Go check it!
Step 5: Adding a Proxy
Using proxies is a tried and true method of obscuring your identity on
the Internet. Although your traffic is not encrypted and can be sniffed, the traffic cannot be attributed to any person as the proxies use their IP addresses rather than yours. Of course, this does not prohibit your traffic being tracked by your cookies. At the moment i haven't got a tutorial for adding proxies. Look for some on the internet and watch out for fake proxies! Don't download proxies no one have ever heard of! I found some tutorials for windows and mac, go check them out! I haven't checked if these proxies are safe. So google around.
Step 6: Encrypted P2P Chat
Often, people want to chat or use voice communications over the Internet. Both can be intercepted and read. There are at least two technologies available to encrypt these types of communications that makes it very difficult to intercept and read.
For Internet chats, CSpace is among the best. Like so many of these technologies, CSpace relies upon encryption. CSpace uses a 2048-bit RSA key for authentication and each user has a unique public key to identify themselves. Users are only identified by a hash of their public key on a central server. All communication is encrypted with TLS (Transport Layer Security). You can find more information about CSpace here, though, it is no longer in active development.
Step 7: Well Done!
Nice you got it all working and you're anonymous on the web. Using all of the options gives you the best security! Hope you've learned something and you're safe on the internet now! Thank you! If you liked it vote for the contest.
A Word of Caution
I am very reluctant to use any proprietary, commercial product for purposes of maintaining anonymity. The reason is that these companies easily bow to pressure from state authorities to enable snooping on their networks and products. Although not perfect, open-source products are more likely to give you a greater level of assurance for maintaining your anonymity and privacy.
I'm not responsible of anything happened to you(your computer), or anything else.