Answer the question
In order to leave comments, you need to log in
What is needed for online anonymity? What means are available for this? How to hide your location and actions with financial transactions?
1. Does the proxy hide the user's location?
2 How is the user's location determined?
3. Is it possible to establish the location of the user in a certain period of time? Based on a certain comment, a LiveJournal post or a private message?
4. How can I hide financial transactions from my ISP?
5. What programs are better to use for anonymous surfing on the Internet?
Answer the question
In order to leave comments, you need to log in
1. Hides IP, traffic is not encrypted, so the provider knows everything about you.
2. Logs, brains, tips.
3. Yes, bringing the facts together can contribute to the ruin of a cozy nest.
4. and 5. Use the services of VPN providers that do not keep logs. All traffic will be encrypted and it will be impossible for the provider to determine what you did and where you went. It is desirable that the VPN provider's servers be located in a country where it is impossible to legally oblige it to disclose the logs (provided that they are still kept).
The formation of high-quality anonymity is preceded by a preparation process. I really hope that all your financial transactions are legal, as my advice is intended to protect the trade secrets of the organization.
The technical side: if someone is very interested in you, then success in reaching you is basically just a matter of money. For example, forcing a VPN service to reveal its logs will cost a lot, and forcing two providers in different countries to open their cards at once will cost 10x a lot, and it’s not a fact that it will work out.
Therefore, it makes sense to encrypt traffic sequentially, through 2 VPN services.
"Social engineering" side:
You can be contacted by indirect signs: suddenly they were encrypted for a couple of hours, which you usually don’t do. A seemingly harmless message was sent to a person, an unnecessary connection with you is immediately formed, and those who need it simply begin to dig further. Do you know that more than half of the accounts in various social networks of the CIS and mailboxes are hacked in a matter of hours and these services cost a penny - less than 15,000 rubles?
The advice is as follows:
Completely stop communicating about business through social networks. Do not add business partners as friends (even on FB) and do not write messages to them, any. It is desirable to get work mail from foreign services, usually they are paid, but this is only about $ 30 per year. Buy a VPN and encrypt all your traffic at all times, not just when you're doing transactions.
Your Comrade:
If my ip is encrypted, but the traffic is not. Is the user's location calculated?The IP cannot be encrypted, it's just changed to something else. The ability to calculate the location depends primarily on the service you use to change the IP address. Trusting your anonymity to free proxy servers and all sorts of "anonymizers" is more expensive for yourself. Most paid proxy servers can provide you with an IP address change and, as I said, do not keep logs, so technically it will be either very difficult or even impossible to find you. A few words about the work of a proxy server: it changes your IP to its own. This "his" he takes from another simple user in the country you are interested in, whose PC is infected with Trojan software. That is, all traffic from you / to you goes through the PC of this user.
And if I understand correctly, then traffic is the flow of information and activity on the network?These are the same megabytes and gigabytes of information that you download from the network or vice versa send to the network. The information is divided into small "packets" and they walk from server to server.
And and very importantly, what is LOGI?This is a logging log , which is located on a server, it keeps track of which server and what time the data packet came from and to which server it was subsequently forwarded. It's a chain, footprints in the snow, that can eventually lead to your actual location. This chain breaks at the point where the server (in this case, the VPN provider) does not keep logs.
As for the social engineering side, I understood little, if you have time, can you reveal it?Social engineering is a way by which you can bypass the technical means of protecting information and get the desired information, based on the human factor and human weaknesses. If, in simple terms, this is a divorce of one of your acquaintances, in order to obtain any information about you. If this is done by a professional who has previously collected information about you from open sources, then most likely you will not even notice when confidential data is taken out from under your nose. This topic is even bigger than GSM anonymity.
And as far as I know, third-party Internet resources are required by law to keep servers with information on the territory of Russia. "Law on personal data" which obliges Internet companies to store personal data of Russian users within the country.VPN providers from which you encrypt your traffic do not store the data you downloaded on their servers. They only provide transit traffic + its encryption, and, of course, IP change. Accordingly, they are not subject to the law on personal data.
there is no proxy server
by ip
it is easy to
use anonymous financial devices by logs
, ideally double tangled vpn + proxy + fluorine
This question has come up for the fourth time, and it's always the same.
Here, read the answer from nirvimel here - Is it legal for a provider to provide user data to law enforcement after revoking the processing of personal data? For Russia, at least, all these lengthy arguments mean nothing. The provider always has one end of the chain - subscriber data. Yes, it may not be you. But the person whose data is with the provider will very quickly cooperate.
The whole problem of those who are trying to solve this issue lies in one thing - you are trying to play by certain rules, for some reason believing that the opponent also adheres to them. If no one needs you, no one will be interested in you, standard measures of protection against spammers-lamers-advertisers are enough. If you are interested in serious organizations, neither two nor three nor ten VPNs will save you. Soldering iron - it solves a lot ...
Here is some useful information by the way.
darkmoney.cc/bezopasnost-i-anonimnost-32/kak-specs...
Ps Anonymity is a good imitation of an ordinary, but not a real person.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question