Link to home
Start Free TrialLog in
Avatar of lra4bat.sl lra4bat.sl
lra4bat.sl lra4bat.sl

asked on

100% anonymous Online

Hello, I am in need of a way to be 100% anonymous online, I have heard a bit little of everything, but I REALLY need an expert to tell me DEFINITELY HOW TO DO IT and what is the correct way, just to let you know I don't want to use TOR, I know there is Tails and Whonix but I need decent internet speed to use, and even if Tails and Whonix are very powerful in questions of hide your real IP seems like both use Tor which is very lag for me, anybody who say there is no way to be 100% anonymous online isn't correct, yes there is, hackers have been doing a great work and never being caught in their acts, of course some of them really get caught but some of them really know what they are doing and never get caught by lets say: FBI, NSA. All I wish is talk to a really expert that understand the discussion here and know how to REALLY DO IT, without promote any VPN, Tor and their exit nodes and its amazing lag and etc. I am right now more focused on RDP, since it give you a far VPS to manage, and also a new IP address, my only questions is if RDP is good for hide yourself since it connects you to another computer and gives you a new IP address, I heard Windows keeps logs of the real IP address behind the RDP and maybe the site you bought the RDP will have access to these logs or anything like that, or even the site who you bought the RDP can see your real IP address easily, I REALLY need someone who understand the discussion and advanced networking and security. I REALLY care about my privacy and want to be anonymous in a way nobody can find me, and even if someone dare to try that him will give it up later because the difficulty is too much. I am developing a work for college about hackers, so I want to put on this work how hackers avoid authorities like FBI, NSA. thanks.
Avatar of noci
noci

Not the message you want to hear i guess, still here it goes:

Criminals have been caught on the net. Even behind TOR (that is mostly due to fingerprinting browsers & hardware and finding the waterhole server inside the onion). 


A TOR like scheme is needed to prevent identification of either end (and from there the other end).

a VPN might help to escape a walled garden, it only defeats the options you have with TOR as an entry point for your anonymity  out of your control can be monitored. Traffic will be hidden at least partly due to encryption.

RDP will NOT hide you. endpoints are known (at least your end end there are no random diversions).

VPN also show addresses, so they are no recourse for anonymity. 

A VPS will not hide you as there will be only two connection to/from it TO you and to the next hop... (and a record of payment leading to address).


wrt. hopping from server to server .. reconnecting every time is exactly what TOR does, only at a lower level and with more frequent changes of pathways.

Besides the IP trail there is the money path that can be followed. because several services need to be bought somewhere.


Problem that criminals have less, they use stolen credit cards for payments, taking systems hostage, extorting mony from people in other ways to pay for the services that need money.

You may be able to hitchike the same trails they use through "bulletproof" hosters, if you can find a trustworthy one.






Yea... no.


Even with Tor, the PC you use can be tracked.  It's through esoteric methods that most people couldn't do, but I know hackers who can explain how.  How to track things using frequencies, timings, and other footprints.  It's not usually easy... but it can be done.


Do you walk down the street in a mask?  If not, you've got cameras and facial recognition identifying you.  And even if you did, you're likely the only one walking with a mask on so in that, you've made yourself identifiable.


Ask yourself WHY you want to do this... WHO is trying to track you.  For most people, the level of privacy offered by a VPN service and an in private browsing session is enough.  If it's not you're probably doing something you shouldn't be OR you should probably have HIRED hackers/IT Security experts who can advise and protect you. 


If you really wanted to protect your privacy, you'd have been using a well developed alias for years and it'd be what you go by where ever you legally can go by it.


@Lee: even the way you walk is unique to you.

Avatar of lra4bat.sl lra4bat.sl

ASKER

@noci I saw your reply, i know lots of things used to identify you like fingerprint and etc. Do you have any knowledge in this field? Can we open private conversation please? Please have in mind as of now i only need to hide my real IP address, you said Tor, VPN, RDP willnot work, so what to do? Thanks.

noci and Lee are correct.  There is no way to be perfectly anonymous online.

Tor was hailed as a privacy solution.  In the event, many Tor exits are run by government entities even though the sites may be offshore.

Same goes for VPNs.  You have no knowledge of who is behind the company that runs that VPN.  If it's a bargain price or a lifetime subscription, the chances are good that it's run by a government agency.

Anonymous proxies?  The old "I'm behind seven proxies" does no good when all of them are funded by governments.

See also:  "Five Eyes."

https://en.wikipedia.org/wiki/Five_Eyes

Encryption?  Every method of encryption has been broken, and it was usually years before the NSA admitted it -- "Yeah, we broke that even before it came out."  Just this week it turns out that one of the world's most prominent Swiss (it must be safe, right?  It's Swiss!) encryption companies was run by the US intelligence agencies and had put in backdoors to eavesdrop on government traffic worldwide.

Such a simple thing as a browser profiling your installed fonts, and your display size, gives better than 90% recognition of your system as you travel around the internet.

The result:  There is no privacy on the internet no matter how hard you try.
Ditto on all the above.

Tip: If you're committing a large enough crime, almost all privacy measures can be defeated to find you.

If you're not engaged in crime, you can just use a fast VPN like PIA along with Firefox (as Chrome seems to track data even when running incognito).

Short answer, it is not possible to be 100% anonymous.  VPN, Tor, ... are your best solutions, but even they can be defeated.

All you guys should be kidding, if all of you don't know how to do it, please tell me at least how to make things difficulty for top agencies like FBI, NSA. I am developing a work for college about hackers, so I want to put on this work how hackers avoid authorities like FBI, NSA. Not using Tor or anything related, i need decent internet speed on my day-to-day to better develop my college work, please also try to don't talk the word VPN since they keep logs..., Thanks.

Online security is tough, online anonymity is extremely tough. This is because computers use exact one-to-one mapped numbers to be able to communicate. 

It is the same reason more or less why online voting is destined to fail.


Criminals hide behind their victims in most cases, and so called "bulletproof" hosting to hide behind.

  The are breaking into some-ones home PC and go from there. takes one more step to trace someone. 

  TOR will complicate things considerable,  but not completely make tracing impossible it depends on how much intermediates nods are under control of one entity.


The characteristics you are looking for are distributed nodes under control of various different entities. no central control nodes, all things encrypted. 

With multiple random and changing connections between the routing nodes, where at least a few hops need to be taken.


I2P can be an option... https://geti2p.net 

Here is another attempt... (i doubt it works on any scale)  https://www.codeproject.com/script/Articles/ViewDownloads.aspx?aid=1205964  (called m2).

Freenet: https://wiki.i2p-projekt.de/wiki/index.php/Freenet

don't talk the word VPN since they keep logs..


That's not necessarily true.  Not all VPN providers keep logs, it depends which ones you use.

@Daniel Pineault OK, tell me one you are sure they dont keep logs, you are sure the logs dont ever existed. Thanks.

I hope you're not running on Windows in that case.  What browser do you use?


There are some providers that have audits performed, that guarantee no logs.  Some even open source their software for peer review.


Anyways.  The discussion is sadly leading nowhere.  Wish you the best.  Hopefully others here can provide you with the answer you wish to hear.

@Daniel Pineault Yes, i know linux rocks better for security and not be traced, but yes, I am using windows, i only accessed linux about 3 times in my life... I use mozilla firefox, 

There is no 100% anonymity. The best you can create is a range of pseudonym short lived partial connections (aka TOR, I2P). 


Windows has telemetry and send a WHOLE lot of data to Microsoft.  If you want a low profile that is the first thing that needs to go.  Start with tails.

There are several ways you can create ever changing random tracks that depend on no logs being kept. Stacking several technologies is only as strong as the weakest in the link, and some are counter-productive.

In the case of VPN you need ALL traffic to go through  including DNS queries etc. be sure of that.

TOR, I2P are the best chance.  VPN's will be needed IF a walled garden needs to be escaped from.

Tough to be fully anonymous against the security agencies targeted. So is to reduce footprint to best possibly by avoidance. 


Avoid cyber world if we have to be paranoid. 


No-no for social sites as the whole idea is not to let other know you or can search for you. You may think you can fake it but it is a matter of time it get traced down to the truth. 


Same too use less mobile apps and restrict permission such as to allow whatever data to be feedback and planted back in the developer hands. 


In fact, if that's not doable then it may seems to allude to having the below comms. Not anywhere we can see them emerging. There is Proton email, Spideroak storage, Signal messaging, PGP end to end, and Tor browsing, but not anywhere close to 100, at most not worst them normal user as these tools helps in reducing footprint and serves a bit more on avoidance to be traced...


Metadata-resistant communication is an unsolved, cutting-edge technical research problem.


You should do your homework before entrusting anything important to them. However, the field of zero-knowledge file storage is an encouraging sign.

Problem with some of the tools is the central point there is with Signal, Protonmail (there is one server, one organisation) that can be broken into.. 

Encryption makes content safe against prying eyes, also it can provide clues to build a case by collecting a lot of data as identity endpoints can stored for future use when a key can be recovered.  So rotating identities are needed as well.

Annonimity means no one knows who you are. Such a thing does not exist. At one point your identity is known by one provider to whom your information is provided I.e. In the form of a payment.

You can not use your own internet feeds, can not use anonymizors to whom you provide your info. Even if you buy your own infrastructure the IP from which requests are seen to those looking for it will track it back to.

Point being you can make it more difficult, but not impossible.

You never know whether the anonymizer vendor you are using was overtaken by a government entity after they showed to a court, or within the country ... Or have a person on hand ....
Is this question still open?
Consider this, you found a providerN to whom you can setup a VZN and who guarantee they are not logging.
They have control of a million nodes through which they can distribute traffic, randomization.

At one point or another an activity put a mode point on the radar.consider it a small thread onto which an agency can pull.
It exposes others whether it is a mesh or hub and spoke type control.
It is a matter of time, the node to which you connect might be the first identified or the factor factors of two.
I.r. If there are a million nodes, and they can be exposed or discovered at multiples of two.  I.e found one. From it you can two additional, from each of those you find two additional each. In 16 intervals, you'll identify 2^16

Note, once you have a node, instead of looking for traffic coming out, you could send traffic through and when you control


Input [black box]  output destinations.

You can illuminate many things

The same way those who are on the run, they to change things location, environment, etc.
Annonymization to reach 100% you would need to follow the same pattern not staying with the same for any extended period of time.

The fall is always when some screws up and have sonething better to offer instead.
This question needs an answer!
Become an EE member today
7 DAY FREE TRIAL
Members can start a 7-Day Free trial then enjoy unlimited access to the platform.
View membership options
or
Learn why we charge membership fees
We get it - no one likes a content blocker. Take one extra minute and find out why we block content.