Technical, Security, Privacy Question. Computer security expertise needed.

llepard

Member
Joined
May 16, 2007
Messages
1,030
Hi Folks:

Sorry to jump into middle of general politics but not sure where else to ask this.

If an individual wants to write something controversial and send it to web sites to be posted, is there a way to insure that the source is anonymous?

In other words, say a person writes an opinion piece that is controversial . They write the piece and sign it using a pen name. They then send it to some blogs/opinion sites.

The question is, can it be sent in such a way that the Government could never track the original source?

Thanks.

LL
 
I would use a CD or USB drive based linux distro. This allows you to run a fully-featured OS on practically any computer from the last 3-5 years without leaving a trace on any local storage media. Here's a good list of them: http://www.kimpl.com/anonymous-distros/

Make sure it has TOR pre-installed on the OS. Tor is "The Onion Router". The wikipedia article on it explains it better: http://en.wikipedia.org/wiki/Tor_(anonymity_network)

Follow the instructions on the distro you choose for getting it onto the host media (CD/DVD/USB drive). When you have a functioning boot drive, you can do this one of a few ways: 1) take it to a library/cyber cafe/etc. and use their computers (less to link to the poster, but frowned upon by the staff of those establishments), or 2) bring your own computer to a coffee shop/library/net cafe/airport/wherever there is free wifi and boot from the portable linux distro that way - there will be slightly more to link to you (the hardware MAC address of your ethernet port/wireless card), but many of these distros can even spoof (change on a software level) those, so keep that in mind.

Best of luck.
 
Last edited:
You can download TOR and use it really easily.

The TOR network was designed by computer scientists/hackers to keep you totally anonymous.
 
Yeah, running it from a bootable CD is another layer of security, especially if it's not from your own machine...
 
I would use a CD or USB drive based linux distro. This allows you to run a fully-featured OS on practically any computer from the last 3-5 years without leaving a trace on any local storage media. Here's a good list of them: http://www.kimpl.com/anonymous-distros/

Make sure it has TOR pre-installed on the OS. Tor is "The Onion Router". The wikipedia article on it explains it better: http://en.wikipedia.org/wiki/Tor_(anonymity_network)

Follow the instructions on the distro you choose for getting it onto the host media (CD/DVD/USB drive). When you have a functioning boot drive, you can do this one of a few ways: 1) take it to a library/cyber cafe/etc. and use their computers (less to link to the poster, but frowned upon by the staff of those establishments), or 2) bring your own computer to a coffee shop/library/net cafe/airport/wherever there is free wifi and boot from the portable linux distro that way - there will be slightly more to link to you (the hardware MAC address of your ethernet port/wireless card), but many of these distros can even spoof (change on a software level) those, so keep that in mind.

Best of luck.


Thank you very helpful.!
 
read about chinese dissidents for hints.

100% anonymous. even with tor is rough. the US agencies have so much monitoring capabilities.

one could piggy back on open wifi connections,though this is likely not legal in us.

one could go to foreign country, say mexico.

depends how much the finding the anonymous is worth.
 
Hi Folks:

Sorry to jump into middle of general politics but not sure where else to ask this.

If an individual wants to write something controversial and send it to web sites to be posted, is there a way to insure that the source is anonymous?

In other words, say a person writes an opinion piece that is controversial . They write the piece and sign it using a pen name. They then send it to some blogs/opinion sites.

The question is, can it be sent in such a way that the Government could never track the original source?

Thanks.

LL

Using an offshore proxy that doesn't keep logs would work, but you would have to be able to trust them first.
 
DO NOT LET ANY META DATA SNEAK OUT. E.g., if you use LibreOffice Writer, go to File-->Properties and ensure that you didn't give them or at some point fill in your name, initials, organization, et cetera. Start with a fresh, empty document to ensure revision history isn't included. You don't want somebody to open, undo some changes and see your name or something else.

To be safer, create the file in plain text. Vary the language/grammar a tad from your normal self especially if you have lots of writing samples to select from. As to the suggestion regarding Linux, the value of running from a one-time OS (i.e., do not send from whatever OS you normally use) is that your PC might be uniquely identified without using an IP address:


Within our dataset of several million visitors, only one in 6,831 browsers have the same fingerprint as yours....

[after I turn on javascript 'cause I run w/ noscript like a boss]

Your browser fingerprint appears to be unique among the 2,782,886 tested so far. [holy fuck!]

TEST YOUR PC TO LEARN ABOUT THIS! (panopticlick.eff.org)



You can download TOR and use it really easily.

The TOR network was designed by computer scientists/hackers to keep you totally anonymous.

Err, maybe - for safe measure - access the network with a Starbucks or McDonald wireless hotspot. Resist the temptation to purchase anything unless maybe with cash which explains why you were there. Shamrock Shake!
 
Err, maybe - for safe measure - access the network with a Starbucks or McDonald wireless hotspot. Resist the temptation to purchase anything unless maybe with cash which explains why you were there. Shamrock Shake!

That is not a good idea really. They have security cameras everywhere at those places, they can narrow down who has a laptop, phone and/or tablet out and which one sent a message from their network fairly easily by looking at logs and their camera footage.
 
Last edited:
One thing is certain. Do not take any one or even a combination of all of these posts as fact that will help you remain secure. None of these are even coming close. I would elaborate but would rather not at risk that I would falsely inform by not including something. Your best bet is to devote serious research into the matter.

You've got a good start with the topics mentioned here, now use those to start exploring the rest of the related material on the internet. Research how the internet is built, how connections get sent, what the server-client relationship is, and everything to do with it. If you can't set up your own client-server proxy or vpn network, then how can you be sure you aren't detectable? Furthermore, there are other ways of tracking messages outside of this framework through intermediaries.

Also, consider that the US feds have passed law saying they can intercept any message that they suspect is coming from outside the United States. Recall that the Internet was created by the Fedcoats in the DoD decades ago, and they have combined millenia more of experience than you, in addition to legal immunity. Good luck.
 
Last edited:
As a network engineering/network security guy, I can tell you this one thing: you are never truly anonymous or secure. True anonymity and security on the internet is unachievable. The advice I provided before will get you to a point where tracking you down is more of a pain in the ass than it is worth. And as MRK said, there is a lot of research into the subject and the various technologies and practices that one must do to be truly effective.
 
EFF is absolutely badass. While large corporations that have no interest in protecting your privacy or free speech challenge the government's actions simply for positive press, EFF quietly fights the battle tirelessly every day. A modest donation for all their hard work once in a while is money well spent.
 
Anyone who works with networks can tell you that there is no way to be totally anonymous. All you can do is take measures to ensure that you have very few things that point back to you. Once I finish my CCNA course work I'll be moving into CCNA Security and I'll try to keep everyone here up to date on ways I know to lower your cyber footprint.
 
If I were going to do such a thing I'd wrap the text in a small program that would post the text on a time delay then erase itself. If you really wanted to be obnoxious about it you could post it through a dozen proxies located in non-Western-aligned nations and for good measure have the originating computer (not your own) thrash its hard drive into oblivion. If you want to be really really obnoxious post it on a hacker site somewhere and label it as a script kiddie tool so some 14-year-old in Indonesia is the one executing it.
 
Last edited:
Back
Top