Answer the question
In order to leave comments, you need to log in
Reliable anonymity?
For some reason, when I think about complete anonymity (up to the inability of the CIA to find the Pentagon cracker ... yes, yes, I understand that this is fantastic), Tor seems insecure due to the frequent news about "hacking" onion algorithms, ssh tunnels, sold on the deep Internet look suspicious and unreliable, and only ideas come to mind about broadcasting traffic via dial-up through chains of phones with left SIM cards and using open networks in cafes or even in companies (set up a server tunnel in an open corporate / guest network). On the other hand, the intelligence agencies may not be as strong as they say in the news.
There are many questions, but the main one is how to organize Internet access in order to be sure of your anonymity? Naturally, we do not forget the basic rules - no social. networks and personal data.
Answer the question
In order to leave comments, you need to log in
No way.
A one-time more or less anonymous connection is possible when you buy a phone, the left SIM card, regenerate for the homeless Vasya, you print out the phone, insert the SIM card, call and after talking - destroy the SIM card, break the phone.
Regular completely anonymous communication - if in your model of the offender this is the state - is not and cannot be. For you, I mean. Because the state has immeasurably greater resources and immeasurably greater ways of controlling and obtaining information.
There are ways to make deanonymization more difficult, Tor for example. But these same means - they distinguish you from the crowd, attracting attention. And the biggest problem of online anonymity is that any key or password is good exactly before there is a threat to feel the soldering iron in the j.pe :)
through chains of phones with left sims?
phones are cut in very convenient ways.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question