I
I
inout2011-05-07 23:32:00
Computer networks
inout, 2011-05-07 23:32:00

How to achieve maximum security on the network?

A direct and logical answer: do not go online immediately.

The question was inspired by the somewhat paranoid post “There is no anonymity, accept it!”

Direct and logical advice: reconciliation will not suit us either.

I am interested in the question, how can one be and actively exist in the network, while maintaining maximum confidentiality? I have a desire, firstly, to familiarize myself with this issue, and secondly, to compile a collection of recommendations.

First of all, the technical side of the question is interesting: by what means to achieve this security (tor, proxy, tor+proxy...)?

Who uses what, who can advise literature and materials, etc., everything is needed!

Thank you!

Answer the question

In order to leave comments, you need to log in

6 answer(s)
A
Alex Efros, 2011-05-08
@powerman

Judging by the context, you are interested in anonymity, not security.
Complete anonymity, firstly, is impossible, and secondly, it is not needed, because. from a certain point it will only attract undue attention to you. Maximum anonymity can be achieved through the use of full-fledged virtual identities, one of which will be your real identity.
It is on behalf of this person that you will upload all the necessary information to the network - the name and contact information for customers / acquaintances, the address and credit card for stores, photos for friends. You may try to control the amount of information posted, limit your presence on social networks, etc. - but this will not give a great effect: everything that you do not tell about yourself, your friends will tell about you. The only way to avoid this is if you don't have friends, you don't shop online, you don't look for jobs online, you don't try to make money online, ... which is absolutely unacceptable for most, so it's better to immediately accept that "real" You will still have virtual. The only possible way to "anonymize" it is not to draw attention to it - do so,
And for all other activities on the network, use completely different virtual identities. So that they cannot be associated with your real personality, it is advisable to exclude all possible intersections of virtual personalities with real ones:

  1. come up with a full-fledged personality - name, nickname, gender, email, ...
  2. use another OS for all activities on behalf of the virtual (ideally, not just another Windows / Linux in VMware, but a really different OS, with a different set of applications used - a different browser, IM client, etc.); it may make sense to use special Linux distributions focused on maximum anonymity
  3. configure this OS differently than you usually configure your system - different language, different screen resolution, different time zone
  4. if possible, use another channel to access the Internet (for example, if the main system works through a city LAN or ADSL, the virtual system can work through public WiFi)
And only when this part of your anonymization is ready, you can start taking care of VPN, Tor and proxy. Of course, there is still a possibility that you will still be calculated according to the psychological profile ... :-) but in order for someone to start comparing the psychoprofiles of your virtuals, you must first have a suspicion that these virtuals belong to one person, and for this you most likely need will let it out on its own or make a mistake (indicate the wrong email, or go online through the wrong channel, etc.).
DISCLAIMER: Maintaining a full untraceable virtual identity can lead to mental illness over time. :)

K
kolobob, 2011-05-08
@kolobob

The simple and logical answer is a VPN server, preferably your own. We raise NAT on it and make it a gateway to the Internet. It is also desirable to raise the caching DNS.
From that moment on, we get an encrypted channel to the VPN server or any other point inside the VPN. Everything behind the VPN will see the traffic, but will not know whose it is.
If someone wants to know who all the same went where through the VPN, questions will be asked to the owner of the server. Therefore, it is better to put the server somewhere abroad.
Among the shortcomings, I can note that the traffic will first go to the server, and then to the destination, and back the same way. Accordingly, the ping will increase. Real-time access is not reflected very much.
Of the advantages: you can drive almost any traffic (ethernet or IP level), such as IP telephony, mail, samba, etc.

S
sajgak, 2011-05-07
@sajgak

tor, proxy - that's all a no brainer. The only thing you really need to do to remain anonymous is not to leave traces: do not scatter your work email, other contact details, do not be friends with real friends in social networks. networks, do not register anywhere using real passport data.
This seems to be all too simple and clear, but far from simple in execution.

P
Puma Thailand, 2011-05-08
@opium

1) We use anonymous proxy / vpn servers for surfing, be sure to those that do not save logs, do not ask for advice.
2) We use anonymous emails.
3) We use anonymous SIM cards bought in the subway.
4) We pay from anonymous wallets, qiwi to an anonymous SIM card, webmoney and Yandex money to Vaska Pupkin, we issue anonymous virtual visas in the same systems.
5) We use passport scan generators and make Vasya Pupkin's passport and helmet wherever verification is required.
6) We mainly use foreign services that do not have Russian support and language, we will not make life easier for those who will look for us. We are trying to use Japanese and Chinese services.
7) We do not store any information on our computer, anyone who wants anonymity should be sure that they will come to him and take the computer, and your computer should be like you, anonymous.

X
xanep, 2011-05-08
@xanep

No way. Or you didn't watch the video well. Even if you do not write anything to the network, you have friends (even just virtual ones) who will give something out about you. In addition, you have already appeared on the network, it’s too late to do something, it’s impossible to delete anything.
You just need to get used to the fact that everything said on the network is said publicly. And accordingly, think what you write;)

C
Celine_80, 2021-09-28
@Celine_80

Use an anti-detect browser such as adspower, multilogin, indigo, etc. or an anonymous tor browser.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question