Warning!
In order to prevent various issues in advance, as well as to ensure ease of reading, hereinafter a small disclaimer: everything that will be written further is based on personal and subjective experience, expresses the personal opinion of the author and in no case is an appeal to any illegal or anti-state actions , the article is written in dry language and without pictures in a flash, is not informative or true.
An article in hot pursuit of the
previous one , in which security was considered at the
basic level necessary in 2019 for every self-respecting person. However, a higher, advanced level is also, I think, worthy of consideration.
Once upon a time in a distant galaxy ... The old republic fell.
Although no, this is already about politics, about politics it is impossible, just imagine that everything that will be described later cannot and does not happen in Russia.
so
We have some reason to remain anonymous on the net.
We go to google, type in something like “Fundamentals of anonymity on the net”, and get some results, including
this one .
One way or another, all the result options offer us several basic solutions, including proxy, vpn, tor and i2p, let's take a brief look at their pros and cons.
Let's start with the simplest, with
proxy :
+ Accessibility (a huge amount of free proxies found by simple googling)
+ Ip spoofing
- Lack of any traffic encryption
- The need to trust the creator of the server
As we can see, the proxy is able to satisfy the need to bypass blocking the site by ip (as the blue-and-blue state-owned company is doing now), but it does not at all satisfy the banal requirements of anonymity.
Next traditionally comes the
VPN :
+ Ip spoofing
+ Traffic encryption (optional)
- Availability (there are free VPNs, but in most cases they are an additional seller of your data on the way of your traffic from the computer to the servers of sites and services)
- The need to trust the creator of the server
Already a much more suitable option, both for bypassing locks, and for some basic anonymity.
There remain
tor and
i2p allocated in one point, since on average they adhere to the general principle of decentralization of traffic:
+ Availability (distributed free of charge)
+ Ip spoofing
+ Encryption
- High entry threshold
- Crutches and difficulties in working with the usual Internet
- connection speed
All this has already been said more than once, why all this?
And this is all to the point that to a greater or lesser extent, but all of these options are only the
first step on your path to dystopian absolute anonymity. It can protect you from basic threats (or substitute them even more), provide access to blocked resources, but no more.
The second step: security, according to professional fraudsters, carders, drug dealers and other anarchist libertarians
We have already secured a certain basic level. Is this really all, is the all-seeing eye lost all interest in us and does not have the opportunity to find and punish us?
No, nothing like that.
Surely you have heard more than once that the current Russian Fin-Tech is one of the best, if not the best.
To some extent, this is true, but its development in Russia has made fairly important technologies almost unknown to Russian users, which, however, judging by the same
sensational investigation, jellyfish did not pass at all by Russian silovikov and state. apparatus.
So that a simple layman could understand what will be discussed further - a small example from life:
In many European and American countries, bank cards without cvv are common, often not registered, without confirmation of transactions by SMS. You ask: "But how then do they protect the money of citizens?" Everything is simple, if the mountain does not go to Magomed, Magomed goes to the mountain. Banks did not protect their customers, they were taken over by the payment transfer system and the stores themselves. This resulted in the emergence of the most powerful
anti-fraud systems . In order for the text to be clear to everyone, I briefly explain: antifraud is a system that records not only the theoretical address determined by ip, but also your screen resolution, model and serial number of the processor, video card, hard drive, determines the time installed on your computer, looks at your cookies and activity on a particular site of a store, bank. Next, the current configuration is compared with the previous ones and a decision is made whether to make a transfer, whether to give access to the account, etc.
Let's get back to our sheep (our theoretical anonymity)
So our task is to deceive the antifraud. There are a number of solutions:
- VPN + Virtual
- Tor + Virtual
- VPN + Tor + Virtual
- VPN + Virtual + VPN
- ... (it’s not difficult to think of a continuation, possible combinations of wagons)
- Anti-Detect Browsers
(Virtualalka is a copy of the system running on your computer virtually, while the main system is running, like a window. How to start it? Google, everything is on the surface.)
To begin with, let
’s see
“combinatorial” options , and more simply, options where we use several solutions at the same time to achieve the desired result.
What are the advantages and disadvantages of these options:
+ Variability!
+ The ability to realistically fake or portray a person (for example, we choose VPN + Virtual: even if the VPN provider merges you, it will still be harder to find among all users of a specific IP Internet provider, since your theoretical existence will be on a different device (the one you emulate virtualka)
- Difficulty in setting up
- Most likely you will be the only user of a specific IP of your Internet provider that uses encryption
- Still need to trust VPN provider, Tor hosts
Further on,
antidetect browsers are interesting, but in their own way specific: the creators of such browsers claim that they have included a maximum of personality-changing functions in their products. Some of these browsers support independent fine-tuning, some provide a “store” of ready-made personalities that, according to sellers, are able to pass antifraud, some and that, but most of these browsers do not reveal their code to the community, which causes some concerns about all of their functionality. If the pros and cons, then:
+ Variability
+ Easy to set up
+ High level of security (if the browser meets the declared specifications)
- The need to trust the creator of the browser
- The high cost of most solutions
Step Three: Retribution
Okay, the virtual machine is configured, but let's
say something went wrong and you
were found . What to do? You will not believe it, but there are solutions to this case, namely:
- Disk encryption
- Livecd
- LiveCD Encryption))))
Let's consider them in detail:
Disk encryption is traditionally done using
VeraCrypt . You will find an alternative - the flag is in your hands, in any case, there will not be a review on setting up VeraCrypt here and now, just like everything about which is google above is pretty simple. If on the basics - you can for example encrypt the part where your virtual machine lies and even the dirtiest paws of corrupt investigators cannot reach your “secrets”.
But what if you are
especially dangerous ? My answer is:
liveCD will help you!
Don’t be afraid of the name, LiveCD has actually been LiveUSB for a long time. As well as about everything that is above the installation instructions, there will be no configuration, only a general description, the details are in Google: we buy a USB flash drive with a metal case, with a volume of at least 16-32gb and preferably supporting USB3.0, install the operating system on it, connect to the computer, start the system from it, enjoy. If they come, we throw them into the toilet / window / nearest bushes.
Well, actually without a review, the third option since everything is logical and clear from the previous options.
Well, the fourth step: an absolute victory over all these fighters with privacy (almost impossible) .
There will not be a detailed overview of each item, only a list, I think everyone will understand why this is so:
- We do not use services that compromise us during an anonymous session.
- We do not use services that compromise us .
- We actively use cash, do not use Internet banking, and do not make purchases on the Internet.
- We do not use logins and passwords used by us in services compromising us .
- We do not leave information compromising us during an anonymous session.
- We do not leave information compromising us on the Internet at all.
- We try to dress inconspicuously .
- We dress unremarkably. No, I’m serious, unremarkable, not like MIA operatives, who can be seen per kilometer by their unremarkable clothes .
- We make a good habit of going to bed early and getting up at five to six to look through the door peephole and the window .
- We play sports and maintain ourselves in good physical shape .
- Eat right , do not save on food.
- Do not break
with ... but the laws.
Good luck to everyone, and I hope this wonderful text will not be useful to you in a beautiful Russia of the future.