Z
Z
zeuss562018-04-05 01:20:39
Information Security
zeuss56, 2018-04-05 01:20:39

Reliable anonymity?

For some reason, when I think about complete anonymity (up to the inability of the CIA to find the Pentagon cracker ... yes, yes, I understand that this is fantastic), Tor seems insecure due to the frequent news about "hacking" onion algorithms, ssh tunnels, sold on the deep Internet look suspicious and unreliable, and only ideas come to mind about broadcasting traffic via dial-up through chains of phones with left SIM cards and using open networks in cafes or even in companies (set up a server tunnel in an open corporate / guest network). On the other hand, the intelligence agencies may not be as strong as they say in the news.
There are many questions, but the main one is how to organize Internet access in order to be sure of your anonymity? Naturally, we do not forget the basic rules - no social. networks and personal data.

Answer the question

In order to leave comments, you need to log in

3 answer(s)
C
CityCat4, 2018-04-05
@zeuss56

No way.
A one-time more or less anonymous connection is possible when you buy a phone, the left SIM card, regenerate for the homeless Vasya, you print out the phone, insert the SIM card, call and after talking - destroy the SIM card, break the phone.
Regular completely anonymous communication - if in your model of the offender this is the state - is not and cannot be. For you, I mean. Because the state has immeasurably greater resources and immeasurably greater ways of controlling and obtaining information.
There are ways to make deanonymization more difficult, Tor for example. But these same means - they distinguish you from the crowd, attracting attention. And the biggest problem of online anonymity is that any key or password is good exactly before there is a threat to feel the soldering iron in the j.pe :)

A
awesomer, 2018-04-05
@awesomer

through chains of phones with left sims?
phones are cut in very convenient ways.

P
Peter, 2018-04-05
@petermzg

1. Buying a laptop for cash
2. Internet access only through public networks.
3. Forget about your social networks, mail, online banks while using this laptop.
It's minimum ))

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question