Internet Anonymity 101
Internet Anonymity is absolutely necessary in today’s age. Especially after our tyrannical president Barack Obama, signed the NDAA (National Defense Authorization Act) on December 31, 2011. Codified in the NDAA, it describes the indefinite detention of United States Citizens without trial or due process without taking into account any concern of Habeas corpus. After the NDAA was signed, it basically nullifies Habeas Corpus almost in its entirety! The NDAA’s dangerous incarceration provisions would authorize the president and all afterwards, to order the military, to pick up and indefinitely imprison people captured anywhere in the world, including US Citizens without due process. Furthermore a confirmed military document was leaked to Paul Joseph Watson on May 3rd 2012 named “FM 3-39.40 INTERNMENT AND RESETTLEMENT OPERATIONS” which explains why such an operation needs to be established, and the guidelines, rules and procedures that should be followed by the concentration camp’s staff and faculty members. You can download the document for yourself HERE
But your probably asking yourself “Well how does this pertain to me when i use the internet”. Well ill tell you. Being politically active online is no longer a safe practice as we once thought it to be. But its not! You’re actions can be considered “Civilly and Politically Radical or Dissident” and could incriminate you in many ways in the eyes of the corrupt Leninist/Marxist/Stalinist, communistic Establishment and Fat Cat corporations, and somewhere in the near future, can result in YOU being detained indefinitely in some North Korean Style “Re-Education Camp”
Many large social website like Facebook, or Myspace and blogspot etc, and even Google, conduct invasive data mining operations on an industrial scale. These websites retain data for many years, What you search for example, what you posted, your comments, your replies, your threads and many other of you’re activities conducted online are all recorded, documented and saved.
Well how do you protect yourself? Now that’s a good question. But ill tell you. There is a program called The Onion Router (TOR for short). Using Tor protects you against a common form of Internet surveillance known as “traffic analysis.” Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. It can even threaten your job physical safety and family by revealing who and where you are, geographically by your IP address.
How does traffic analysis work? Internet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that’s an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you’re doing and, possibly, what you’re saying. That’s because it focuses on the header, which discloses source, destination, size, timing, and so on.
Tor helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you — and then periodically erasing your footprints. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks so no observer at any single point can tell where the data came from or where it’s going.
Now with TOR, you should also take extra steps in creating a tormail.org email account. When you sign up for Tormail.org for an email account, it should be done using the TOR browser. Your new TorMail email address can now be used in signing up for accounts on different websites. Never use your personal EMAIL address! As far as internet messaging goes, you should use an open source program called Torchat if you want to keep your conversations completely private from our nosy internet service provides(ISP) in which the government already has access to, through the logged data traffic with the help of the Patriot Act.
I myself went as far as encrypting a volume onto a USB Thumb drive. In where I’ve installed TOR, and TORChat on the encrypted volume which is on the USB. To do this, i used TrueCrypt.
Truecrypt uses a few different encryption techniques, but i myself use, the AES encryption algorithm The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that may be used by US federal departments and agencies to cryptographically protect sensitive information. TrueCrypt uses AES with 14 rounds and a 256-bit key. The NSA conducted a review and analysis of AES, the U.S. CNSS (Committee on National Security Systems) announced in that the design and strength of AES-256 are sufficient to protect classified information up to the Top Secret level. This is applicable to all U.S. Government Departments or Agencies including the C.I.A. that are considering the acquisition or use of products incorporating the Advanced Encryption Standard (AES) to satisfy Information Assurance requirements associated with the protection of national security systems and/or national security information.
If your interested in TOR you can download it HERE
If your interested in TORChat you can download it HERE. If your on Windows, then download the windows zip
If your interested in encrypting your data and files (TOR, and Torchat) you can check out TrueCrypt HERE