For beginners |
---|
Elementary anonymity steps for
beginners
How d'you begin a "crash-course" in anonymity lores for beginners?
Ah! Parum tuta per se ipsa probitas est!
Let's just be frank and direct... let's use a lore... sort of...
"Yep!" - said fravia+ - "so you want to understand why anonymity
is important? Easy,
just read on:... I believe that each time ANYBODY asks you for
some personal info
you should by all means do a mix from the following":
1. Smith
11. Anderson
21. Clark
31. Wright
41. Mitchell
2. Johnson
12. Thomas
22. Rodriguez
32. Lopez
42. Perez
3. Williams
13. Jackson
23. Lewis
33. Hill
43. Roberts
4. Jones
14. White
24. Lee
34. Scott
44. Turner
5. Brown
15. Harris
25. Walker
35. Green
45. Phillips
6. Davis
16. Martin
26. Hall
36. Adams
46. Campbell
7. Miller
17. Thompson
27. Allen
37. Baker
47. Parker
8. Wilson
18. Garcia
28. Young
38. Gonzalez
48. Evans
9. Moore
19. Martinez
29. Hernandez
39. Nelson
49. Edwards
10. Taylor
20. Robinson
30. King
40. Carter
50. Collins
1. James | 11. Christopher | 21. Ronald | 1. Mary | 11. Lisa | 21. Michelle | |
2. John | 12. Daniel | 22. Anthony | 2. Patricia | 12. Nancy | 22. Laura | |
3. Robert | 13. Paul | 23. Kevin | 3. Linda | 13. Karen | 23. Sarah | |
4. Michael | 14. Mark | 24. Jason | 4. Barbara | 14. Betty | 24. Kimberly | |
5.William | 15. Donald | 25. Jeff | 5. Elizabeth | 15. Helen | 25. Deborah | |
6. David | 16. George | 6. Jennifer | 16. Sandra | |||
7. Richard | 17. Kenneth | 7. Maria | 17. Donna | |||
8. Charles | 18. Steven | 8. Susan | 18. Carol | |||
9. Joseph | 19. Edward | 9. Margaret | 19. Ruth | |||
10. Thomas | 20. Brian | 10. Dorothy | 20. Sharon |
(October 2006) |
Fravia's relative guide to anonymity | |
"Fravia's relative guide to anonymity" or "no need to be 'too' paranoid" ----------------------------------------- RULES 1) buy pc cash elsewhere (not with cards and not where they know you) 2) wardrive in another part of the town, not the one you live in 3) download only, or if you upload, upload only anonymous things or PGP encrypted stuff 4) rotate your wifi card mac address at every access point: I use "Macmakeup" 5) use wardriving laptop ONLY FOR THAT, no personal data whatsoever on it (or use a live LinuxCD à la Knoppix and/or a USB stick. Boot it with no access to your harddrive) TECHNIQUES 1) Find speedy, beefy first wifi accesspoint with netstumbler: there are so many unprotected at all that you don't even need to fire a wep-packets-analyzer/cracker à la Kismet. 2) connect, browse, download, you may even let , (still using opera and proxomitron, he) some shields down: javascript, java, the whole bazaar : who cares? It's not you. Is "he". 3) ISP "A" will register everything "he" does. 4) work half an hour, download the helluja out of it, upload with care 5) Note that your "host" may have his own log files on the router, but -usually- this is still not a problem since most people do not change the password of the router so that "admin" and "password"|"passwd" is always worth a try in order to get admin access to the current hotspot router and delete the logfile. 6) walk ten meters, change access point ISP "B" will register everything "another he does". work half an hour, download the helluja out of it walk ten meters change access point ...rince and repeat at leisure Reformat hard disk every week just in case, or even better: the moment you buy the computer immediately create an image of the clean system and store it somewhere (like a DVD). Every now and then you erase (3-7 passes) the hard disk and then copy your clean system partition back. Doesn't take much longer than formatting and is even more secure. next day another part of the town, or another town :-) and so on... Note that it can still be a good idea to ADDITIONALLY use TOR TUNNELING tools à la Torpark, for instance mounted on a USB stick. Note that it can still be a good idea to ROUTINELY check what's going on "under the hood" during your connections with a good sniffer à la wireshark (ex-ethereal). |
When posting on Usenet
by fravia+
Never, never, never use a working email address.
When posting news items use a From: or Reply-To: address like the
following ones: