Anonymous Computing

When it comes to obtaining complete anonymity on their systems many of those individuals implement TOR routing protocols, VPN sessions, browse the deep web, and use bit coin.  Sure most of this in theory will grant the end user the illusion of anonymous networking and anonymous web browsing.  One key difference between a good anonymous web user and an average anonymous browsing, is hardware.  There is no such thing as anonymous hardware though right?

With most things in this world money usually acts as a crippling factor, we don't have all the money in the world to do anything and everything, so we use multi-purposes tools functioning in conjunction with one another for a common outcome.  Our gaming PC or our hand me down laptop PC can act as both a tool for its intended purpose, be it gaming or productivity, and then in our off hours function as a completely anonymous device.

The inherent issue here is that trying to use the same device for both purposes depreciates it's value in the latter.  By being anonymous sometimes, and visible at other times, the integrity of the anonymous hardware really isn't all too anonymous.  Tracking MAC and IP addresses in the real world isn't entirely that hard, but when that same MAC crosses into uncharted territory, that PC loses its anonymity and becomes yet another fish swimming in the wrong pond.  The mask, the hat, the coat, or what ever other garment required to ascertain anonymity is really more of just a fashion statement gone awry.

On the converse a "good" way to obtain anonymity in these waters is by having a completely separate set of hardware dedicated to the purpose of anonymity.  A VPN connection dedicated to just that single device, preferably paid for with bit coin, and hidden from the world.  A MAC address that has never once touched the lips of Google or Bing, a piece of hardware that not once launched FireFox, Chrome, Internet Explorer, or whatever web browser of choice.  Leaving that PC in particular anonymous to the remainder of the world.

This is best practice for anyone looking to be anonymous while online.  Bare in mind it still isn't a guarantee.  If VPN providers become compromised or subpoenaed for some form of data, the entire search for complete anonymity could become lost.

The best way to embark on this whole ordeal is to build a new PC from scratch, and when it comes to anonymity, using a Windows PC is probably a pitfall in and of itself, requiring constant updates and strange signals from time to time.  For optimal efficiency Linux is the way to go.  A brand new PC fully equipped with an i7, and whatever hardware desired to complete the package.  Before getting it online, put every install file onto a flash drive and transfer it over.  Make sure this new Linux PC is set up with TOR routing and VPN connections before plugging an Ethernet cable in or connecting to WiFi.

If you're looking to be anonymous with a laptop, the same principles apply, but before the PC even launches its "first time configuration" setup, have your install media loaded for your Linux distro of choice.  My suggestion for the Linux distro would be Tails Linux which by default is designed to use TOR routing for its internet access.  And it can be implemented in a live disk as well as a full installation.

Keep in mind anonymity on any PC is not, and will never be, guaranteed, there will always be some eventual way of finding who you are and you'll be required to adjust the way you do things in order to accommodate the new changes.  We are always under threat of ever prying eyes watching our every move, but taking the steps required to make your PC anonymous aren't just important, but crucial if that is your intended route.

If you have any questions, concerns, or comments, let us know in the comment section below, and as always, be safe my goblins.

SHARE

About Unknown

    Blogger Comment
    Facebook Comment

2 comments:

  1. There are a lot of good points on this about what it takes to truly stay anonymous. One thing that Tor, as an example, stress about when using it's service is changing behavior. It's not too difficult to figure out an anonymous user from a non-anonymous user if both are visiting the same sites from the same MAC, etc. Gotta think a bit differently when trying to stay hidden.

    ReplyDelete
    Replies
    1. Anonymity is never a guarantee though. Even with the latest and greatest technologies available, truly staying anonymous isn't fool proof. They'll get caught eventually with enough persistence, but by then there will be a new way of staying hidden.

      Delete