Y
Y
Your Comrade2016-04-03 20:53:24
Computer networks
Your Comrade, 2016-04-03 20:53:24

What is needed for online anonymity? What means are available for this? How to hide your location and actions with financial transactions?

1. Does the proxy hide the user's location?
2 How is the user's location determined?
3. Is it possible to establish the location of the user in a certain period of time? Based on a certain comment, a LiveJournal post or a private message?
4. How can I hide financial transactions from my ISP?
5. What programs are better to use for anonymous surfing on the Internet?

Answer the question

In order to leave comments, you need to log in

6 answer(s)
L
lakegull, 2016-04-04
@Gulag

1. Hides IP, traffic is not encrypted, so the provider knows everything about you.
2. Logs, brains, tips.
3. Yes, bringing the facts together can contribute to the ruin of a cozy nest.
4. and 5. Use the services of VPN providers that do not keep logs. All traffic will be encrypted and it will be impossible for the provider to determine what you did and where you went. It is desirable that the VPN provider's servers be located in a country where it is impossible to legally oblige it to disclose the logs (provided that they are still kept).
The formation of high-quality anonymity is preceded by a preparation process. I really hope that all your financial transactions are legal, as my advice is intended to protect the trade secrets of the organization.
The technical side: if someone is very interested in you, then success in reaching you is basically just a matter of money. For example, forcing a VPN service to reveal its logs will cost a lot, and forcing two providers in different countries to open their cards at once will cost 10x a lot, and it’s not a fact that it will work out.
Therefore, it makes sense to encrypt traffic sequentially, through 2 VPN services.
"Social engineering" side:
You can be contacted by indirect signs: suddenly they were encrypted for a couple of hours, which you usually don’t do. A seemingly harmless message was sent to a person, an unnecessary connection with you is immediately formed, and those who need it simply begin to dig further. Do you know that more than half of the accounts in various social networks of the CIS and mailboxes are hacked in a matter of hours and these services cost a penny - less than 15,000 rubles?
The advice is as follows:
Completely stop communicating about business through social networks. Do not add business partners as friends (even on FB) and do not write messages to them, any. It is desirable to get work mail from foreign services, usually they are paid, but this is only about $ 30 per year. Buy a VPN and encrypt all your traffic at all times, not just when you're doing transactions.
Your Comrade:

If my ip is encrypted, but the traffic is not. Is the user's location calculated?
The IP cannot be encrypted, it's just changed to something else. The ability to calculate the location depends primarily on the service you use to change the IP address. Trusting your anonymity to free proxy servers and all sorts of "anonymizers" is more expensive for yourself. Most paid proxy servers can provide you with an IP address change and, as I said, do not keep logs, so technically it will be either very difficult or even impossible to find you. A few words about the work of a proxy server: it changes your IP to its own. This "his" he takes from another simple user in the country you are interested in, whose PC is infected with Trojan software. That is, all traffic from you / to you goes through the PC of this user.
In addition to the lack of encryption, proxy servers have other disadvantages, such as unstable speed and disconnection (when a user with Trojan software restarts or turns off the PC).
If this is a smartphone with a SIM card inside, then everything is more complicated. The fact is that the telecom operator can determine the location of any subscriber with an accuracy of several tens of meters (in the city). But on a smartphone, you can also set up a VPN (OpenVPN) and work anonymously. GSM anonymity is a separate topic, too big to cover here. Many experienced businessmen communicate on business only from a separate device, the SIM card of which is registered to one of their guards. In the Russian Federation, any information breaks through, even the drying of telephone conversations, it's just a matter of price.
And if I understand correctly, then traffic is the flow of information and activity on the network?
These are the same megabytes and gigabytes of information that you download from the network or vice versa send to the network. The information is divided into small "packets" and they walk from server to server.
And and very importantly, what is LOGI?
This is a logging log , which is located on a server, it keeps track of which server and what time the data packet came from and to which server it was subsequently forwarded. It's a chain, footprints in the snow, that can eventually lead to your actual location. This chain breaks at the point where the server (in this case, the VPN provider) does not keep logs.
As for the social engineering side, I understood little, if you have time, can you reveal it?
Social engineering is a way by which you can bypass the technical means of protecting information and get the desired information, based on the human factor and human weaknesses. If, in simple terms, this is a divorce of one of your acquaintances, in order to obtain any information about you. If this is done by a professional who has previously collected information about you from open sources, then most likely you will not even notice when confidential data is taken out from under your nose. This topic is even bigger than GSM anonymity.
And as far as I know, third-party Internet resources are required by law to keep servers with information on the territory of Russia. "Law on personal data" which obliges Internet companies to store personal data of Russian users within the country.
VPN providers from which you encrypt your traffic do not store the data you downloaded on their servers. They only provide transit traffic + its encryption, and, of course, IP change. Accordingly, they are not subject to the law on personal data.
The VPN works as shown in the diagram:
In this diagram, your IP address will be replaced with the IP address of a server in the Netherlands. That is, for the owner of the site you visit, you will be defined as a visitor from the Netherlands.
With a VPN connection, the provider that provides you with Internet access can only calculate the amount of data downloaded to you, but cannot determine their content. It also cannot determine the origin of this data.
Finally.
Any anonymity has two phases:
1) before the moment when your personality began to be associated with a certain event
2) after this moment.
In the first case, you will need to simply encrypt with a serial connection through two VPN providers.
In the second case, the risk of confidential data leakage increases many times over. If it is possible not to share confidential information with business partners, then do not share it. Most people get hacked into once or twice.
Apparently the person means that for the provider you are not an anonymous user. This is true, since it provides you with Internet access under an agreement drawn up on the passport data of a real person. Yours or not, it doesn't matter. Several people may have physical access to a PC, but first of all they will ask from the one whose last name is in the contract. Of course, this will only happen if the logs point back to you. If everything is done correctly, then this will never happen. In the meantime, there is no precedent - no one will look for anyone. I repeat - an attempt to find tails from IP addresses, build the entire chain and reach a real person, this is a very expensive task and it is not a fact that there will be at least some result. Interested persons will take up this matter only if there are at least some guarantees that the result will cover the spent resources. In the meantime, you are not a dollar millionaire - no one will do such a march for you.
The question about the provider who knows about you is illustrated by the following analogy:
Here you are walking down the street and you see people around you, right? You see the faces of people, perhaps you have met some of these faces before, perhaps you know some by name and even know their passport details (let's say you met a colleague from a previous job). You know where these people are now (in your field of vision!), you see who they are talking to now, if you wish, you can even remember the numbers and make of the car where they got into. Question: NEXT WHAT!
You can’t say that a person walking past you wearing black glasses put them on because he wants to hide his eyes, because it seems to you that only those who have committed some kind of crime can wear glasses in cloudy weather. This is just your interpretation.
The same with the provider - he cannot claim that you are doing something illegal simply on the basis that they have begun to encrypt all traffic. In the world, any sane organization encrypts all its traffic. This is a trade secret! It should be! Otherwise, in the head of the security service of such an organization - SOVOK.
Follow my advice: encrypt your sensitive data and don't let people you don't know well control your PCs and mobile devices. You will sleep better.

P
Puma Thailand, 2016-04-04
@opium

there is no proxy server
by ip
it is easy to
use anonymous financial devices by logs
, ideally double tangled vpn + proxy + fluorine

C
CityCat4, 2016-04-04
@CityCat4

This question has come up for the fourth time, and it's always the same.
Here, read the answer from nirvimel here - Is it legal for a provider to provide user data to law enforcement after revoking the processing of personal data? For Russia, at least, all these lengthy arguments mean nothing. The provider always has one end of the chain - subscriber data. Yes, it may not be you. But the person whose data is with the provider will very quickly cooperate.
The whole problem of those who are trying to solve this issue lies in one thing - you are trying to play by certain rules, for some reason believing that the opponent also adheres to them. If no one needs you, no one will be interested in you, standard measures of protection against spammers-lamers-advertisers are enough. If you are interested in serious organizations, neither two nor three nor ten VPNs will save you. Soldering iron - it solves a lot ...

R
Rohar21, 2016-04-07
@Rohar21

Here is some useful information by the way.
darkmoney.cc/bezopasnost-i-anonimnost-32/kak-specs...
Ps Anonymity is a good imitation of an ordinary, but not a real person.

W
wukibuh, 2016-07-19
@wukibuh

You will be caught at the end point.
Someday you will use the money for a real product (or withdraw with real money).

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question