Author

Topic: Wired: How to Anonymize Everything You Do Online (Read 7137 times)

hero member
Activity: 518
Merit: 521
This is good for the other features it has, except it would be nice to have an option to turn off Tor or I2P, since both are likely to be honeypots.

The only sure way to obfuscate your IP address is to use an IP address that isn't registered to you.

Quote from: anonymous
After doing some homework I agree with you that Tor seems to be of limited use.
They sure tracked this guy down pretty quick when he used Tor

http://www.theverge.com/2013/12/18/5224130/fbi-agents-tracked-harvard-bomb-threats-across-tor

Actually it is probably not always useless. Unlike a VPN which is a single proxy server, Tor (and other Chaum mix-nets such as I2P) employs onions layers of hops over multiple servers (for Tor I think it is normally 3 unless both are Tor services then 5), so if any one of the servers is not compromised then the obfuscation of your IP address may be achieved. However, don't forget the other possible attacks such as timing analysis by a global adversary even to servers in the onion layers it has not compromised or control, end-to-end attacks such as the use of the Harvard wireless network in the above linked story, and the browser attacks (and other spyware).

If you are using an unregistered connection as I suggested above, then you may already be suspicious to the NSA, thus adding Tor (Tor Bundle or Whonix) may provide another layer of potential imperfect anonymity. The more layers the better if you were already going to be suspicious and not hiding in plain sight due to your use of an unregistered internet connection. For example, lets assume the following probabilities which I pulled out of my ass:

1. 20% chance the surveillance can track your unregistered mobile IP and correlate it to your identity.
2. 20% chance a Tor session's anonymity fails
3. 50% chance a VPN is compromised (or has insufficient users to mix with)

Using all 3 layers together means your probability of not being anonymous decreases to 0.2 x 0.2 x 0.5 = 0.02 = 2%.

However, lets say you are not using a suspicious connection to the internet and lets assume the NSA doesn't save all traffic (only filters and saves suspicious and all encrypted traffic), then using Tor may be detrimental as your probability of be recorded goes from very small up to say 20% (if the #2 is a correct guesstimate).

Let us analyze the probability factors for #1.

Try to never use your unregistered mobile connection from or too near to your residence as triangulation is real.

Also your phone likely has GPS in it which can perhaps be activated remotely by the NSA as well.

Also your late model car may have a GPS in it that is potentially reporting to the provider as admitted last year by the Ford CEO.

Also there are often cameras along the way on stop lights, sides of buildings, etc..

Also your mobile device may be reporting to WiFi hotspots all along the path of your travel.

Also the triangulation and position tracking data of your mobile is probably archived by the providers.

If you are a person who the NSA is determined to identify, it is very difficult because there are video cameras hiding every where, except maybe not in the forest or desert, but satellites (or unmanned drones) can read the VIN number on your dashboard and your license plate, and they could pull up all this archived data after the fact. Apparently there is even infrared technology so they can see through the clouds and at night. The surveillance technologies will continue to improve.

Thus:

1. Never use that mobile for any activity that can be correlated to your identity, i.e. use it very sparingly only for the one anonymous activity of importance.

2. Remove the battery and the simcard from the mobile device when not in use. I say remove both, just in case there is some capacitor some other undocumented means of powering the device to give a homing signal.

3. Either travel to some remote, lonely place in some way that your vehicle and yourself can't be identified by any of the above pitfalls, or travel even if identified to a very crowded location wherein the known location of your mobile can't pinpoint who in that crowd is holding the mobile which is sending the data. So in the latter case, you would want to make sure you can't be seen on an video or satellite imagery in a way that could identify you as the one in the crowd  operating a laptop-- much better you accessed the internet from the mobile device touchscreen instead of attaching it as modem to a laptop (so you don't stand out in the crowd). And note that the accuracy of triangulation and or GPS is getting near to a meter or meters, so it would need to be a very crowded place such as train station, mall, bar, disco, sporting event, etc.. The problem with the hiding in a crowd approach is that eventually it can be correlated that your face always appears in the crowds, you stay in one place too long, or your movements on video correlate with the tracking movements of the mobile, so this isn't really going to work if more than once or for two long of a period of time. Thus realistically you need to travel and use the unregistered mobile device in a way that you can't be identified in any surveillance. This is difficult to accomplish. Even older model cars can still be tracked by their license plates. And most public transportation has surveillance video.

Even if you traveled by bicycle or by foot, you can be identified from your originating location (who enters the location and who doesn't emerge is a process of elimination, e.g. a parking garage) and tracked along the way in archived surveillance (remember archived video that captured 9/11 attack on the Pentagon).

You will need to be very clever. If the activity you are doing is not immediately suspicious and would only be investigated weeks or months hence, perhaps you can hope that non-government (privately) operated video surveillance archives will be discarded after some time, but I wouldn't really be so confident about this.

Why do you think they made this phoney terrorism so that can put surveillance at every crowded event.

Also most of you have already identified yourself as being one of the 0.001% who is interested in anonymity. Thus if you are identified in a crowd, you will automatically be a prime suspect.
full member
Activity: 135
Merit: 100
I think with all the NSA stuff going around, things like Tor will be more commonplace.  I like that the option is available, but I don't know how it all works just yet.
hero member
Activity: 518
Merit: 521
Armstrong subsequently wised up.

http://armstrongeconomics.com/2014/07/06/nsa-tor/

Quote from: Armstrong
There has also been claims that the NSA, the totally un-American version of the communist secret police encouraged and protected by Obama, has been targeting those who download Tor or any service that allow you to hide from these ruthless people. Just for the record.

http://daserste.ndr.de/panorama/aktuell/NSA-targets-the-privacy-conscious,nsa230.html
hero member
Activity: 518
Merit: 521
---------------------------- Original Message ----------------------------
Subject: Martin Armstrong is a cryptography neophyte
From:    AnonyMint
Date:    Sun, July 6, 2014 8:48 pm
To:      "Armstrong Economics" <[email protected]>
--------------------------------------------------------------------------

Sorry I wanted to end my communications, but this MUST be corrected.

http://armstrongeconomics.com/2014/07/06/secure-web-browsers/

There are several issues. For one the mere usage of the TOR network itself, makes you into the subset of 'suspicious users'. The pool not using TOR is still larger. It's not a perfect solution. the NSA has a technique that targets outdated Firefox browsers codenamed EgotisticalGiraffe. It has several weaknesses, see https://en.wikipedia.org/wiki/Tor_%28anonymity_network%29#Weaknesses


Using tor alone would not be probable cause for law enforcement to get a warrant as there are several legit reasons to use it.

The browser exploits will continue to proliferate because the NSA purchases zeroday exploits:

https://www.google.com/search?q=NSA+purchases+zeroday+exploits
https://www.schneier.com/essay-455.html

Employing anonymity proxy servers lumps you together with a much smaller portion of the internet users, with a much higher percentage of them doing nefarious activities, thus the national security agencies will likely be apply extra effort to track you and or save your data permanently. My understanding is the NSA can't yet save all traffic it processes from the internet permanently, instead it runs filters on it and saves only data flagged by the filters. Using anonymity proxies (Tor, I2P, VPNs, Anonymox, server-based bitcoin mixers e.g. bitcoinfog, etc) raises a flag, as well as any encrypted data their computers can't decrypt to run the keyword filters on. The NSA can decrypted nearly all HTTPS (TLS) traffic on the internet, because the root certification companies have their signing keys backdoored.

Also the weaknesses you listed are not complete. Every low-latency Chaum mixnet (i.e. Tor, I2P, Anonymox, etc) is subject to timing attacks due to a global adversary (e.g. national security agencies) that can monitor most or all of the encrypted (even if they can't decrypt it) traffic passing in and out of the proxy servers.

http://en.wikipedia.org/w/index.php?title=Onion_routing&oldid=592703635#Weaknesses
https://tails.boum.org/doc/about/warning/index.en.html#index4h1
https://tails.boum.org/doc/about/warning/index.en.html#index7h1
http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29#Exit_node_eavesdropping

This is good for the other features it has, except it would be nice to have an option to turn off Tor or I2P, since both are likely to be honeypots.

The only sure way to obfuscate your IP address is to use an IP address that isn't registered to you.
sr. member
Activity: 644
Merit: 260
Apparently you can't anonymize yourself on the Bitcointalk forum without having to pay. I fired up my TOR browser to get this message. Extortion for privacy... amazing business model. Privacy measured in units of evil..

-----
Remove Proxyban

Your IP address has previously been used for evil on this forum, or it is a known proxy/VPN/Tor exit node, so you are required to pay a small fee before you are able to post messages or send PMs. You can still use all of the read-only features without paying.

Your account contains 48.46 units of evil. To atone, you must pay a total of 0.00194935 bitcoins (1.94935 mBTC; 194935 satoshi). Pay to the address 1NPn2BcxKeg7d4sxAbSxNxutALhBddxgyp. Once you have paid the full amount, wait a few seconds and then reload this page.

Alternatively, any forum staff member and some other notable members can manually whitelist you. Paying the fee is probably easier/quicker, though.

If you don't have any bitcoins, you can get small amounts of free bitcoins using the sites listed here. It is recommended that you give the free bitcoin sites the address listed above. Do not collect money in your own wallet and then send the bitcoins to the forum -- this will likely result in significant network fees.
The amount of bitcoin they are asking for is very little. .002BTC is worth roughly $1.28 with bitcoin @ $640. This is a very small price to pay to use these forums on tor.

IMO the reason for this is that a lot of people try to use these forums via tor to try to scam others. You would only have one chance of trying to scam before someone could accuse you of being a scammer and your account would be worthless (to a scammer). As a result people would create a lot of accounts, hoping to be successful on at least one scam. Forcing people to pay something prior to even attempting to scam discourages people to scam this way.  

If you feel that it's not that big of a deal feel free to send $1.28 to that address. Sorry but these forums are free nobody should have to pay unless you are advertising. New accounts have to make a certain amount of posts before they can actually post outside of the newbie areas.. so that argument of yours in null/void. If you're stupid enough to get scammed by a noob then you deserve to be homeless. Also, relating TOR to scamming is the same as relating curtains in your house with being a terrorist - just because your neighbor can't look into your house you must be a terrorist.

The main issue is that this forum is created in the spirit of Bitcoin (pseudo-anonymity). If you really want to be anonymous you have to pay for it. This is the same attitude of the Bitcoin core developers.

"Privacy is evil"
-Bitcointalk.org
What would stop someone from creating a bunch of newbie accounts, posting for several months on them to increase post count and forum ranking? These accounts would no longer be "noob" accounts.

If it were to come down to it, the admins could give one's IP address to law enforcement if there was evidence that a particular account had clearly scammed other users. If the users used TOR then this would not be possible (the IP address provided would simply be that of TOR exit nodes).

What is discussed on these forums is not illegal nor is the subject matter very controversial. So there is little legit reason to need your ISP and others who can watch your IP address to not know you are using these forums.
sr. member
Activity: 350
Merit: 250
More anonymizing means more web crimes and less security for normal users. Imagine you would be ghost on the street, you will never run out of bad ideas, what you could do to the people.

Less anonymity leads to more crimes and increased power for criminals.
Consider these cases:

Would you, as girl, tell your abuser where you live?
Would you tell a thief how much possessions are in your wallet?
Would you tell a paedophile when your kid is alone?
Would you tell a thief when you go on holiday?
Would you tell the government where whistle-blowers live?
Would you tell a killer your location?

Anonymity can be used for both the good and bad.. without anonymity you sacrifice a lot and don't gain anything. (unless NSA pays you  Cheesy)
4chan is a good example. It's used for jokes, talking and also some bad things occurred there.


+1

Some people are better off using Fiat currency, credit cards and the like. Not even sure why there are people in a cryptocurrency forum advocating anti-anonymity. Meh, since the forums owners don't give a shit about privacy either I guess they're in good company. I am going to make it my side project to drive this forum's credibility into the ground. Once people hear about this privacy extortion it's game over for this extortionists forum.
sr. member
Activity: 350
Merit: 250
You plug yourself into the largest surveillance network system in the history of mankind and want anonymity? This is like a cow entering a slaughter house then claiming he is being liberated by the butcher's knife because he no longer has to suffer cow tipping.

I've always used a VPN or TOR while browsing so I'm not worried. There's ways to avoid ever being the "cow" as you put it. Fact that this forum tries to make money off of privacy has nothing to do with being a cow or a pig. Its privacy extortion - that is what the big issue is here. Before you make animal parallels, I suggest you take some reading comprehension classes.
sr. member
Activity: 350
Merit: 250
More anonymizing means more web crimes and less security for normal users. Imagine you would be ghost on the street, you will never run out of bad ideas, what you could do to the people.

Normal users? We were here before you were normal. You're on a cryptocurrency forum. Maybe you should also advocate for decryption and government trapdoors in the user's wallets. I swear as time goes on the level of intelligence in the Cryptocummunity drops exponentially.
sr. member
Activity: 518
Merit: 250
More anonymizing means more web crimes and less security for normal users. Imagine you would be ghost on the street, you will never run out of bad ideas, what you could do to the people.

Less anonymity leads to more crimes and increased power for criminals.
Consider these cases:

Would you, as girl, tell your abuser where you live?
Would you tell a thief how much possessions are in your wallet?
Would you tell a paedophile when your kid is alone?
Would you tell a thief when you go on holiday?
Would you tell the government where whistle-blowers live?
Would you tell a killer your location?

Anonymity can be used for both the good and bad.. without anonymity you sacrifice a lot and don't gain anything. (unless NSA pays you  Cheesy)
4chan is a good example. It's used for jokes, talking and also some bad things occurred there.
sr. member
Activity: 252
Merit: 250
12CDKyxPyL5Rj28ed2yz5czJf3Dr2ZvEYw
More anonymizing means more web crimes and less security for normal users. Imagine you would be ghost on the street, you will never run out of bad ideas, what you could do to the people.
sr. member
Activity: 420
Merit: 250
You plug yourself into the largest surveillance network system in the history of mankind and want anonymity? This is like a cow entering a slaughter house then claiming he is being liberated by the butcher's knife because he no longer has to suffer cow tipping.
sr. member
Activity: 350
Merit: 250
Apparently you can't anonymize yourself on the Bitcointalk forum without having to pay. I fired up my TOR browser to get this message. Extortion for privacy... amazing business model. Privacy measured in units of evil..

-----
Remove Proxyban

Your IP address has previously been used for evil on this forum, or it is a known proxy/VPN/Tor exit node, so you are required to pay a small fee before you are able to post messages or send PMs. You can still use all of the read-only features without paying.

Your account contains 48.46 units of evil. To atone, you must pay a total of 0.00194935 bitcoins (1.94935 mBTC; 194935 satoshi). Pay to the address 1NPn2BcxKeg7d4sxAbSxNxutALhBddxgyp. Once you have paid the full amount, wait a few seconds and then reload this page.

Alternatively, any forum staff member and some other notable members can manually whitelist you. Paying the fee is probably easier/quicker, though.

If you don't have any bitcoins, you can get small amounts of free bitcoins using the sites listed here. It is recommended that you give the free bitcoin sites the address listed above. Do not collect money in your own wallet and then send the bitcoins to the forum -- this will likely result in significant network fees.
The amount of bitcoin they are asking for is very little. .002BTC is worth roughly $1.28 with bitcoin @ $640. This is a very small price to pay to use these forums on tor.

IMO the reason for this is that a lot of people try to use these forums via tor to try to scam others. You would only have one chance of trying to scam before someone could accuse you of being a scammer and your account would be worthless (to a scammer). As a result people would create a lot of accounts, hoping to be successful on at least one scam. Forcing people to pay something prior to even attempting to scam discourages people to scam this way.  

If you feel that it's not that big of a deal feel free to send $1.28 to that address. Sorry but these forums are free nobody should have to pay unless you are advertising. New accounts have to make a certain amount of posts before they can actually post outside of the newbie areas.. so that argument of yours in null/void. If you're stupid enough to get scammed by a noob then you deserve to be homeless. Also, relating TOR to scamming is the same as relating curtains in your house with being a terrorist - just because your neighbor can't look into your house you must be a terrorist.

The main issue is that this forum is created in the spirit of Bitcoin (pseudo-anonymity). If you really want to be anonymous you have to pay for it. This is the same attitude of the Bitcoin core developers.

"Privacy is evil"
-Bitcointalk.org
legendary
Activity: 2884
Merit: 1115
Leading Crypto Sports Betting & Casino Platform
The evil tax ^_^
Sorry just had to say that since it sounded like a classic in order to do evil you must pay your taxes  Grin
sr. member
Activity: 644
Merit: 260
Apparently you can't anonymize yourself on the Bitcointalk forum without having to pay. I fired up my TOR browser to get this message. Extortion for privacy... amazing business model. Privacy measured in units of evil..

-----
Remove Proxyban

Your IP address has previously been used for evil on this forum, or it is a known proxy/VPN/Tor exit node, so you are required to pay a small fee before you are able to post messages or send PMs. You can still use all of the read-only features without paying.

Your account contains 48.46 units of evil. To atone, you must pay a total of 0.00194935 bitcoins (1.94935 mBTC; 194935 satoshi). Pay to the address 1NPn2BcxKeg7d4sxAbSxNxutALhBddxgyp. Once you have paid the full amount, wait a few seconds and then reload this page.

Alternatively, any forum staff member and some other notable members can manually whitelist you. Paying the fee is probably easier/quicker, though.

If you don't have any bitcoins, you can get small amounts of free bitcoins using the sites listed here. It is recommended that you give the free bitcoin sites the address listed above. Do not collect money in your own wallet and then send the bitcoins to the forum -- this will likely result in significant network fees.
The amount of bitcoin they are asking for is very little. .002BTC is worth roughly $1.28 with bitcoin @ $640. This is a very small price to pay to use these forums on tor.

IMO the reason for this is that a lot of people try to use these forums via tor to try to scam others. You would only have one chance of trying to scam before someone could accuse you of being a scammer and your account would be worthless (to a scammer). As a result people would create a lot of accounts, hoping to be successful on at least one scam. Forcing people to pay something prior to even attempting to scam discourages people to scam this way. 
sr. member
Activity: 350
Merit: 250
Apparently you can't anonymize yourself on the Bitcointalk forum without having to pay. I fired up my TOR browser to get this message. Extortion for privacy... amazing business model. Privacy measured in units of evil..

-----
Remove Proxyban

Your IP address has previously been used for evil on this forum, or it is a known proxy/VPN/Tor exit node, so you are required to pay a small fee before you are able to post messages or send PMs. You can still use all of the read-only features without paying.

Your account contains 48.46 units of evil. To atone, you must pay a total of 0.00194935 bitcoins (1.94935 mBTC; 194935 satoshi). Pay to the address 1NPn2BcxKeg7d4sxAbSxNxutALhBddxgyp. Once you have paid the full amount, wait a few seconds and then reload this page.

Alternatively, any forum staff member and some other notable members can manually whitelist you. Paying the fee is probably easier/quicker, though.

If you don't have any bitcoins, you can get small amounts of free bitcoins using the sites listed here. It is recommended that you give the free bitcoin sites the address listed above. Do not collect money in your own wallet and then send the bitcoins to the forum -- this will likely result in significant network fees.
sr. member
Activity: 644
Merit: 260

You can browse the forum and visit the registration form, which does not seem to block. I think it's allowed  Smiley


Quote
Problem with Tor and IP2 is that onion routing in a low-latency node based network is a fundamentally flawed concept. If you want anonymity against the feds, we will need a different conceptual design.

The way TOR is constructed is indeed drawing attention. I think, in order to have anonymity, a new conceptual design is needed as you mentioned.



What seem to be the issue on TOR network?

There are several issues. For one the mere usage of the TOR network itself, makes you into the subset of 'suspicious users'. The pool not using TOR is still larger. It's not a perfect solution. the NSA has a technique that targets outdated Firefox browsers codenamed EgotisticalGiraffe. It has several weaknesses, see https://en.wikipedia.org/wiki/Tor_%28anonymity_network%29#Weaknesses

Using tor alone would not be probable cause for law enforcement to get a warrant as there are several legit reasons to use it.
hero member
Activity: 798
Merit: 1000
Interesting article. Now watch all the politicians screech about how Tor should be banned in the U.S. because obviously criminals are using it to organize blatantly illegal activity. I might download the Tor version of Firefox though, if only for the sake of confusing Google.
member
Activity: 85
Merit: 10
I found it usefull. Thanks.
newbie
Activity: 40
Merit: 0
Unfortunately, i didn't find anything new for myself here Embarrassed
sr. member
Activity: 518
Merit: 250

You can browse the forum and visit the registration form, which does not seem to block. I think it's allowed  Smiley


Quote
Problem with Tor and IP2 is that onion routing in a low-latency node based network is a fundamentally flawed concept. If you want anonymity against the feds, we will need a different conceptual design.

The way TOR is constructed is indeed drawing attention. I think, in order to have anonymity, a new conceptual design is needed as you mentioned.



What seem to be the issue on TOR network?

There are several issues. For one the mere usage of the TOR network itself, makes you into the subset of 'suspicious users'. The pool not using TOR is still larger. It's not a perfect solution. the NSA has a technique that targets outdated Firefox browsers codenamed EgotisticalGiraffe. It has several weaknesses, see https://en.wikipedia.org/wiki/Tor_%28anonymity_network%29#Weaknesses


full member
Activity: 182
Merit: 100

You can browse the forum and visit the registration form, which does not seem to block. I think it's allowed  Smiley


Quote
Problem with Tor and IP2 is that onion routing in a low-latency node based network is a fundamentally flawed concept. If you want anonymity against the feds, we will need a different conceptual design.

The way TOR is constructed is indeed drawing attention. I think, in order to have anonymity, a new conceptual design is needed as you mentioned.



What seem to be the issue on TOR network?
sr. member
Activity: 518
Merit: 250

The challenge that this faces is the fact that many sites will restrict/block access from TOR exit nodes. These forums will even make you pay a (very) small amount of BTC in order to access your account if you try to access via TOR (AFAIK this is only a one time payment).


Does this bitcoin forum allow user to use tor to register and post?



You can browse the forum and visit the registration form, which does not seem to block. I think it's allowed  Smiley


Quote
Problem with Tor and IP2 is that onion routing in a low-latency node based network is a fundamentally flawed concept. If you want anonymity against the feds, we will need a different conceptual design.

The way TOR is constructed is indeed drawing attention. I think, in order to have anonymity, a new conceptual design is needed as you mentioned.
hero member
Activity: 574
Merit: 500
freedomainradio.com
Nothing new here.
hero member
Activity: 518
Merit: 521
Read my summary of the problems with the other anonymous coins as linked in my prior post. They all have serious problems.

Tor (IP2 also if it becomes popular) draws attention to your activity. The national security agencies are recording everything.

I don't see any good solutions (yet) against the taxman and the hunt for all wealth by the bankrupt governments coming.

Problem with Tor and IP2 is that onion routing in a low-latency node based network is a fundamentally flawed concept. If you want anonymity against the feds, we will need a different conceptual design.
legendary
Activity: 2884
Merit: 1115
Leading Crypto Sports Betting & Casino Platform

Fair enough but unless your the Fed or a Cop it keeps you a bit more clothed in a sense than roaming around the internet naked without any form of anonymous protection.

The question anonymint was what type of privacy can a low level tech user (Not to technical or hard to use)
That a normal user can use to anonymize themselves easily.

I'm more under the idea a namecoin based or Ethereum based cryptography base system might do the trick but curious what your stop gap measures would be.
But zerocoin could work as well not sure what a crytonode is as a designation though.
Is it the tor equivalent of the end server encrypted?
full member
Activity: 164
Merit: 100
Has anyone here tested I2P browser and can give some feedback?
full member
Activity: 179
Merit: 100

The challenge that this faces is the fact that many sites will restrict/block access from TOR exit nodes. These forums will even make you pay a (very) small amount of BTC in order to access your account if you try to access via TOR (AFAIK this is only a one time payment).


Does this bitcoin forum allow user to use tor to register and post?

sr. member
Activity: 518
Merit: 250
I think a number of proxies or VPNs may be better for anonymity than TOR. Correct me if I'm wrong.
sr. member
Activity: 518
Merit: 250
Long story short, you should use TOR to maintain anonymity online.

The challenge that this faces is the fact that many sites will restrict/block access from TOR exit nodes. These forums will even make you pay a (very) small amount of BTC in order to access your account if you try to access via TOR (AFAIK this is only a one time payment).

I have seen sites that do not even allow users to register or visit using TOR. But these are not .onion sites but the regular web.  I think the downside of TOR is that the subset which uses it is much smaller than the total set, thus making it easier to find you for an ISP, correct me if I'm wrong.
sr. member
Activity: 644
Merit: 260
Long story short, you should use TOR to maintain anonymity online.

The challenge that this faces is the fact that many sites will restrict/block access from TOR exit nodes. These forums will even make you pay a (very) small amount of BTC in order to access your account if you try to access via TOR (AFAIK this is only a one time payment).

Another major challenge is that it is very difficult for a site to gauge the likely hood that your account has been hacked. Normally a site can see that you usually login from London, England using Modzilla and if someone logs in from an IP in London using Modzilla there is a good chance that the account owner has logged in, conversely if someone logs in from Sydney, Australia with Firefox then the account has likely been hacked and additional security screening would be necessary.
legendary
Activity: 2884
Merit: 1115
Leading Crypto Sports Betting & Casino Platform
Whonix seems very interesting indeed,

Quote
Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network[1], Debian GNU/Linux[2] and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP.

Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible

Source: https://www.whonix.org/

This will allow some level of anonymity and privacy for tech people, but the mainstream is still left out in the open  Smiley
The article focusses a lot on Tor, which I think is a good but I don't think it's the only method.


Tor is a very secure system, but it does have its moments when someone can get in like the FBI with Silk Road.

They didn't really break into Tor in that case but caught the person through investigation but it still counts more or less.

Still for less technical people tor is a good way to communicate with a relative sense of privacy and security as the article mentioned the super paranoid will have stronger stuff to use Smiley.

http://www.howtogeek.com/142380/htg-explains-is-tor-really-anonymous-and-secure/
sr. member
Activity: 518
Merit: 250
Whonix seems very interesting indeed,

Quote
Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network[1], Debian GNU/Linux[2] and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP.

Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible

Source: https://www.whonix.org/

This will allow some level of anonymity and privacy for tech people, but the mainstream is still left out in the open  Smiley
The article focusses a lot on Tor, which I think is a good but I don't think it's the only method.
legendary
Activity: 2884
Merit: 1115
Leading Crypto Sports Betting & Casino Platform
This one got my interest since it seems like the smartest way to anonymize

Whonix creates multiple “virtual machines” on the user’s computer—software versions of full computer operating systems that are designed to be indistinguishable from a full computer. Any attacker trying to compromise the user’s computer will be confined to that virtual machine.

Thanks for the share
legendary
Activity: 1148
Merit: 1014
In Satoshi I Trust
Jump to: