Anonymous browsing?

Cheeky92

Junior Member
Joined
May 23, 2013
Messages
113
Reaction score
24
Hello guys :)

I'm writing to ask if anybody can pick any flaws in this method for anonymous web browsing, would really appreciate any advice given!

Effectively, I'm planning on purchasing a phone (in cash) and topping it up (with cash) so that I can tether it to my laptop (MAC spoofed) for internet use. Then, using locations situated away from my home, I would tether my phone to my laptop, connect to a VPN (on laptop), then to an offshore VPS (panama - paid for in bitcoins), then through a proxy and onto the internet.

I would be extremely grateful if somebody could point out any ways this method could lead to my personal information being leaked. One question I have is that if I use my laptop for other things (general use), will anybody be able to tie my MAC address to me? If so, is it possible to spoof a new MAC address with every boot/use of the laptop?

Also, I have done some reading on digital fingerprints, is there any need to try and cover these up? As I would be connecting to the internet via an offshore VPS, surely the only fingerprints left would be from that end PC? Sorry if I'm not getting my point across clearly, hopefully somebody understands what I'm getting at :)

Many thanks, really appreciate you reading this guys :)
 
Last edited:
There are better ways.

Weakest links - VPS configuration/VPN provider.

1. Yes.

2. Yes.
 
Thank you for your reply :)

I think I have my VPN provider sorted, they supposedly keep no logs and are situated in a country many seem to trust for ignoring subpoena and the like. With regards to the VPS configuration, do you have anything in particular in mind?

Furthermore, if I do not leak any personal details onto the internet (name/address etc.) via this VPS, will it be possible to tie the laptop to me (whilst effectively using untraceable mobile internet)? Surely the only information they could obtain, assuming 'digital fingerprints' don't come into play, would be the mobile IP address and spoofed MAC?

Thanks again :)

There are better ways.

Weakest links - VPS configuration/VPN provider.

1. Yes.

2. Yes.
 
Also, are there any benefits for using linux over windows on my laptop (using the above method) in the interests of anonymity?

Thanks again guys :)
 
1. They all keep logs.

2. Improper VPS configuration is a major risk.

3. Telco towers are more magical than you think.

4. No such thing as untraceable mobile internet, see 3.

5. As for tying the phone to your laptop, see 3.
 
While I realise that there is no such thing as 'untraceable' mobile internet, with my laptops MAC being spoofed and the mobile phone itself not being tied to myself (solely used for tethered browsing), is there anything else I should be concerned about?

Ultimately, by paying for the VPS/VPN using bitcoins (and taking precautionary measures to tumble them), it is impossible to determine who I am (I believe?) at any point of this process except from information leaked by my laptop? (Digital fingerprints?)

Therefore, whilst I also realise that it would theoretically be possible to identify my physical location whilst using the phone, if this location was varied and the phone remained off unless being tethered, is there any way my identity could be revealed?

Cheers :)
 
Stealing someone else's identity is the only way to hide your identity.All other ways fail ,since you are connecting to an ISP.
 
I guess this is true, however if I'm connecting to an ISP through a mobile (bought and topped up in cash), they can't give away my identity can they? (They have none of my personal details, only data potentially leaked from my laptop?)

Stealing someone else's identity is the only way to hide your identity.All other ways fail ,since you are connecting to an ISP.
 
[h=2]www.torproject.org/projects/torbrowser.html.en :ciao:[/h]
 
Anonymous browsing ? There is no such thing.
 
If you need to use so much protection and spend so much time setting it up to remain as hidden as possible, maybe you should reconsider what your doing if its brings so much heat to law enforcement.
 
It depends on who you're hiding from.

If hiding from corporate tracking, cookies, etc, then Tor is enough.

If hiding from the NSA, you'll get caught before you finish connecting that laptop to your phone.
 
It depends on who you're hiding from.

If hiding from corporate tracking, cookies, etc, then Tor is enough.

If hiding from the NSA, you'll get caught before you finish connecting that laptop to your phone.

There is really no way to hide from the NSA, but you can remain hidden in the system by not doing anything really stupid that makes yourself relevant to the NSA and subject to manual review and possible time dedicated to yourself.
 
I'm looking at hosting a movie site offshore. I fail to see how the NSA could possibly find out who I am with the method I have detailed, there is only one potential avenue (as at no point do I use ANY of my personal details, everything is paid for in thoroughly tumbled bitcoins) and this is by using my laptop which I use for other general use. I'm wondering if by tethering my phone to my laptop, will any of my computers information be leaked (MAC is spoofed, so anything else?)
 
There is really no way to hide from the NSA, but you can remain hidden in the system by not doing anything really stupid that makes yourself relevant to the NSA and subject to manual review and possible time dedicated to yourself.

In my opinion that's as "anonymous" as you can remain. Do nothing serious and stay "commercially anonymous" - that's possible.

Complete anonymity would be too powerful a weapon for countries to ignore.
 
I have always said "Plan your shoplifting as it would be a bank-robbery, and you will be safe". :)

To be 100% anonumous is very hard. But you will be safe. :) In your case they need evidence, and alot of electronic traces. :)

In your case I would probably go with a VPN even if it is less safe. Because It may come situations where you need to handle things/problem quick, then a VPN will be more easy to use, you could also change VPN provider from time to time (and pay bitcoins). Lets say you would use a phone, and somehow they find you, and find the phone, then they have enoght evidence.

If I where you I would use virutal-machines on your laptop, and do the VPN from there, then every week uninstall the vm, overwrite all the data where the VM was and then install again, then if you get cought they would see what you did last week but nothing more then that. Also check what ISP providers there is, there is still some really good one who would make you very protected (atleast there is good ISPs where I am from)


Good luck :)
 
Bypass using proxys and try to use VPN, VPS the highest protection on the internet.
 
Back
Top