![]() |
For beginners |
---|
Elementary anonymity steps for
beginners
How d'you begin a "crash-course" in anonymity lores for beginners?
Ah! Parum tuta per se ipsa probitas est!
Let's just be frank and direct... let's use a lore... sort of...
1. Smith | 11. Anderson | 21. Clark | 31. Wright | 41. Mitchell |
2. Johnson | 12. Thomas | 22. Rodriguez | 32. Lopez | 42. Perez |
3. Williams | 13. Jackson | 23. Lewis | 33. Hill | 43. Roberts |
4. Jones | 14. White | 24. Lee | 34. Scott | 44. Turner |
5. Brown | 15. Harris | 25. Walker | 35. Green | 45. Phillips |
6. Davis | 16. Martin | 26. Hall | 36. Adams | 46. Campbell |
7. Miller | 17. Thompson | 27. Allen | 37. Baker | 47. Parker |
8. Wilson | 18. Garcia | 28. Young | 38. Gonzalez | 48. Evans |
9. Moore | 19. Martinez | 29. Hernandez | 39. Nelson | 49. Edwards |
10. Taylor | 20. Robinson | 30. King | 40. Carter | 50. Collins |
1. James | 11. Christopher | 21. Ronald | 1. Mary | 11. Lisa | 21. Michelle | |
2. John | 12. Daniel | 22. Anthony | 2. Patricia | 12. Nancy | 22. Laura | |
3. Robert | 13. Paul | 23. Kevin | 3. Linda | 13. Karen | 23. Sarah | |
4. Michael | 14. Mark | 24. Jason | 4. Barbara | 14. Betty | 24. Kimberly | |
5.William | 15. Donald | 25. Jeff | 5. Elizabeth | 15. Helen | 25. Deborah | |
6. David | 16. George | 6. Jennifer | 16. Sandra | |||
7. Richard | 17. Kenneth | 7. Maria | 17. Donna | |||
8. Charles | 18. Steven | 8. Susan | 18. Carol | |||
9. Joseph | 19. Edward | 9. Margaret | 19. Ruth | |||
10. Thomas | 20. Brian | 10. Dorothy | 20. Sharon |
(October 2006) |
Fravia's relative guide to anonymity | |
"Fravia's relative guide to anonymity" or "no need to be 'too' paranoid" ----------------------------------------- RULES 1) buy pc cash elsewhere (not with cards and not where they know you) 2) wardrive in another part of the town, not the one you live in 3) download only, or if you upload, upload only anonymous things or PGP encrypted stuff 4) rotate your wifi card mac address at every access point: I use "Macmakeup" 5) use wardriving laptop ONLY FOR THAT, no personal data whatsoever on it (or use a live LinuxCD à la Knoppix and/or a USB stick. Boot it with no access to your harddrive) TECHNIQUES 1) Find speedy, beefy first wifi accesspoint with netstumbler: there are so many unprotected at all that you don't even need to fire a wep-packets-analyzer/cracker à la Kismet. 2) connect, browse, download, you may even let , (still using opera and proxomitron, he) some shields down: javascript, java, the whole bazaar : who cares? It's not you. Is "he". 3) ISP "A" will register everything "he" does. 4) work half an hour, download the helluja out of it, upload with care 5) Note that your "host" may have his own log files on the router, but -usually- this is still not a problem since most people do not change the password of the router so that "admin" and "password"|"passwd" is always worth a try in order to get admin access to the current hotspot router and delete the logfile. 6) walk ten meters, change access point ISP "B" will register everything "another he does". work half an hour, download the helluja out of it walk ten meters change access point ...rince and repeat at leisure Reformat hard disk every week just in case, or even better: the moment you buy the computer immediately create an image of the clean system and store it somewhere (like a DVD). Every now and then you erase (3-7 passes) the hard disk and then copy your clean system partition back. Doesn't take much longer than formatting and is even more secure. next day another part of the town, or another town :-) and so on... Note that it can still be a good idea to ADDITIONALLY use TOR TUNNELING tools à la Torpark, for instance mounted on a USB stick. Note that it can still be a good idea to ROUTINELY check what's going on "under the hood" during your connections with a good sniffer à la wireshark (ex-ethereal). |
When posting on Usenet
by fravia+
Never, never, never use a working email address.
When posting news items use a From: or Reply-To: address like the
following ones: