Avatar of Mike

Internet Anonymity 101

3 rating, 3 votes3 rating, 3 votes (+3 rating, 3 votes, rated)
You need to be a registered member to rate this post.
Loading ... Loading ...

May 9, 2012 in Activism, Resistance, Technology

by

Internet Anonymity is absolutely necessary  in today’s age. Especially after our tyrannical president Barack Obama, signed the NDAA (National Defense Authorization Act) on December 31, 2011. Codified in the NDAA, it describes the indefinite detention of United States Citizens without trial or due process without taking into account any concern of Habeas corpus. After the NDAA was signed, it basically nullifies Habeas Corpus almost in its entirety!  The NDAA’s dangerous incarceration provisions would authorize the president and all afterwards, to order the military, to pick up and indefinitely imprison people captured anywhere in the world, including US Citizens without due process. Furthermore a confirmed military document was leaked to Paul Joseph Watson on May 3rd 2012 named “FM 3-39.40 INTERNMENT AND RESETTLEMENT OPERATIONS” which explains why such an operation needs to be established, and the guidelines, rules and procedures that should be followed by the concentration camp’s staff and faculty members. You can download the document for yourself HERE

But your probably asking yourself  “Well how does this pertain to me when i use the internet”. Well ill tell you.  Being politically active online is no longer a safe practice as we once thought it to be. But its not! You’re actions can be considered “Civilly and Politically Radical or Dissident” and could incriminate you in many ways in the eyes of the corrupt Leninist/Marxist/Stalinist, communistic Establishment and Fat Cat corporations, and somewhere in the near future, can result in YOU being detained indefinitely in some North Korean Style “Re-Education Camp”

Many large social website like Facebook, or Myspace and blogspot etc, and even Google, conduct invasive data mining operations on an industrial scale. These websites retain data for many years, What you search for example, what you posted, your comments, your replies, your threads and many other of you’re activities conducted online are all recorded, documented and saved.

Well how do you protect yourself? Now that’s a good question. But ill tell you. There is a program called The Onion Router (TOR for short). Using Tor protects you against a common form of Internet surveillance known as “traffic analysis.” Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. It can even threaten your job physical safety and family by revealing who and where you are, geographically by your IP address.

How does traffic analysis work? Internet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that’s an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you’re doing and, possibly, what you’re saying. That’s because it focuses on the header, which discloses source, destination, size, timing, and so on.

Tor helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you — and then periodically erasing your footprints. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks so no observer at any single point can tell where the data came from or where it’s going.

Now with TOR, you should also take extra steps in creating a tormail.org email account. When you sign up for Tormail.org for an email account, it should be done using the TOR browser. Your new TorMail email address can now be used in signing up for accounts on different websites. Never use your personal EMAIL address!  As far as internet messaging goes, you should use an open source program called Torchat if you want to keep your conversations completely private from our nosy internet service provides(ISP) in which the government already has access to, through the logged data traffic with the help of the Patriot Act.

I myself went as far as encrypting a volume onto a USB Thumb drive. In where I’ve installed TOR, and TORChat on the encrypted volume which is on the USB. To do this, i used TrueCrypt.

Truecrypt uses a few different encryption techniques, but i myself use, the AES encryption algorithm The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that may be used by US federal departments and agencies to cryptographically protect sensitive information. TrueCrypt uses AES with 14 rounds and a 256-bit key. The NSA conducted a review and analysis of AES, the U.S. CNSS (Committee on National Security Systems) announced in that the design and strength of AES-256 are sufficient to protect classified information up to the Top Secret level. This is applicable to all U.S. Government Departments or Agencies including the C.I.A. that are considering the acquisition or use of products incorporating the Advanced Encryption Standard (AES) to satisfy Information Assurance requirements associated with the protection of national security systems and/or national security information.

 

If your interested in TOR you can download it HERE

If your interested in TORChat you can download it HERE. If your on Windows, then download the windows zip

If your interested in encrypting your data and files (TOR, and Torchat) you can check out TrueCrypt HERE


Infowars.com Videos:

Comment on this article:

9 responses to Internet Anonymity 101

  1. Online privacy test StayInvisible.com to analyze what does your browser reveal to websites, in addition to your IP address. Allows to check your default Internet connection and connections protected with “hide my IP” services like proxy or VPN – often with shocking results. Modern web browsers provide a user with a lot of features but they have also been designed to reveal your IP address and tons of other “innocent looking” information to websites. A collection of such information can be used to compile browser fingerprints that according to the EFF study are unique, identifiable and can be easily used for online tracking.

  2. I’ve used Tor for a little while and something interesting happened today. I have a program also called PeerBlock which stops groups from viewing you IP Address I guess, and when I clicked to open Tor it said that NATO C3 was trying to access my IP (https://en.wikipedia.org/wiki/NC3O)

    So how can Tor be safe if as soon as I click on it, it says they are snoopin around? I have nothing to hide just dont like my privacy being shit on. Thanks

  3. Mike, I downloaded all the TOR applications. I haven’t figured everything out yet but I’m loving it! People need to know about this and I’ll do my best to spread the word! Thanks!
    Lawrence

  4. Thanks for sharing!

  5. Awesome…gonna give that a try. I assume that will work with a linux based Zorin OS.

    • Mike said on May 10, 2012

      Depending on the file structure of Zorin Os you can download the Tor Browser Bundle for Linux, Or you can even check out the Live bootable distro called tails found at https://tails.boum.org/ I hope my info was helpfull! Make sure to click the “thumbs up button” if you like it! Thanks

Leave a reply

You must be logged in to post a comment.