H
H
hcvbhc2016-03-12 01:50:23
VPN
hcvbhc, 2016-03-12 01:50:23

How to organize anonymity in the network?

How to organize anonymity in the network?
On my version of windows 7, I want to install a vmware or virtualbox virtual machine and send its traffic over an encrypted channel. How to do it correctly?
I will describe several tried and not tested dubious options.
1. Buying a vpn like heidmayass and installing it on a virtual machine - this option is immediately swept aside because ip is periodically illuminated on the same
2ip.ru who paid (you can of course use bitcoins)
3. renting several servers, let's say we rent a server, connect to it via vpn via rdp, put a virtual machine on the server, put another vpn inside the virtual machine and work in the virtual machine - this option is more or less working, but the speed is just hellish
4. Here is this option I’m interested, but I don’t know how to make it and whether it will work as I think.
We install a virtual machine in ourselves, put a vpn like hydmay ass in it, we let the entire connection of the virtual machine through the tor network. We rent vps through a virtual machine using bitcoins.
We set openvpn on vps, connect and rent the next vps, and so on several times.
How to pass connection sequentially through all servers?
Do I understand correctly that in the method I described, the tor connection will go inside the encrypted openvpn or vice versa? and how is it better?

Answer the question

In order to leave comments, you need to log in

3 answer(s)
N
nirvimel, 2016-03-12
@nirvimel

Everything in the world is relative (C), including anonymity.
Anonymity is not something that is or is not.
Anonymity is a quantitative value proportional to the amount of costs (financial, time, labor or political capital) for the deanonymization of a particular person.
This was the preface. Now, in essence: Forget about all these VPN chains and virtual machines inside virtual machines. Anything you need:

  1. Buy just ONE inexpensive VPS and install any type of proxy/VPN on it (which you understand better). Yes, connections can be traced with a VERY strong desire, you can search all the apartments in the city, but no one will do this for the sake of your capture.
  2. Deeply understand network protocols in every detail. To at least understand the specific reason why 2ip.ru fires real ip.
  3. Deeply understand the principles of functioning of TOR and similar onion / garlic networks. (If it seemed to you that you just read a funny word, then this item is especially relevant for you).
  4. Deeply understand the architecture of the OS and virtual machines in order to understand what exactly, in terms of anonymization, the use of a virtual machine gives and what it does not.
  5. Understand why RDP on VPS is not needed.
  6. To understand why paranoia is poorly compatible with the use of operating systems from Microsoft, why it is almost pointless to run VPN inside a virtual machine on Windows 7 for the sake of anonymity, and why it would be more useful to start by running Windows 7 itself only inside a virtual machine (or you can not run it at all) .

V
Vlad Zhivotnev, 2016-03-12
@inkvizitor68sl

With your level of knowledge, do something similar - https://debian.pro/1618
In general, it all depends on what you are hiding from and why you need anonymity on the network. If you are not going to break the law, and anonymity is needed only for the preservation of incognito, then this will be enough.
VPS for bitcoins can be rented in smart-kvm (and there you can manually install the OS on an encrypted disk via VNC).
If you want to hide from law enforcement, then forget it, with such a level of knowledge you will not succeed and the answers on the toaster will not help here - there are too many small moments that you need to carefully monitor.

N
nfire, 2016-03-12
@nfire

Do not forget that a person can be identified by the features of writing / speech. Those. even using a new phone for communication every time and connecting to a random open network, the author of an objectionable blogger can still be figured out.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question