1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Anonymous browsing?

Discussion in 'Black Hat SEO' started by Cheeky92, Feb 22, 2015.

  1. Cheeky92

    Cheeky92 Junior Member

    Joined:
    May 23, 2013
    Messages:
    111
    Likes Received:
    16
    Hello guys :)

    I'm writing to ask if anybody can pick any flaws in this method for anonymous web browsing, would really appreciate any advice given!

    Effectively, I'm planning on purchasing a phone (in cash) and topping it up (with cash) so that I can tether it to my laptop (MAC spoofed) for internet use. Then, using locations situated away from my home, I would tether my phone to my laptop, connect to a VPN (on laptop), then to an offshore VPS (panama - paid for in bitcoins), then through a proxy and onto the internet.

    I would be extremely grateful if somebody could point out any ways this method could lead to my personal information being leaked. One question I have is that if I use my laptop for other things (general use), will anybody be able to tie my MAC address to me? If so, is it possible to spoof a new MAC address with every boot/use of the laptop?

    Also, I have done some reading on digital fingerprints, is there any need to try and cover these up? As I would be connecting to the internet via an offshore VPS, surely the only fingerprints left would be from that end PC? Sorry if I'm not getting my point across clearly, hopefully somebody understands what I'm getting at :)

    Many thanks, really appreciate you reading this guys :)
     
    Last edited: Feb 22, 2015
  2. tiyowan

    tiyowan Regular Member

    Joined:
    Aug 7, 2013
    Messages:
    250
    Likes Received:
    136
    There are better ways.

    Weakest links - VPS configuration/VPN provider.

    1. Yes.

    2. Yes.
     
    • Thanks Thanks x 1
  3. Cheeky92

    Cheeky92 Junior Member

    Joined:
    May 23, 2013
    Messages:
    111
    Likes Received:
    16
    Thank you for your reply :)

    I think I have my VPN provider sorted, they supposedly keep no logs and are situated in a country many seem to trust for ignoring subpoena and the like. With regards to the VPS configuration, do you have anything in particular in mind?

    Furthermore, if I do not leak any personal details onto the internet (name/address etc.) via this VPS, will it be possible to tie the laptop to me (whilst effectively using untraceable mobile internet)? Surely the only information they could obtain, assuming 'digital fingerprints' don't come into play, would be the mobile IP address and spoofed MAC?

    Thanks again :)

     
  4. Cheeky92

    Cheeky92 Junior Member

    Joined:
    May 23, 2013
    Messages:
    111
    Likes Received:
    16
    Also, are there any benefits for using linux over windows on my laptop (using the above method) in the interests of anonymity?

    Thanks again guys :)
     
  5. tiyowan

    tiyowan Regular Member

    Joined:
    Aug 7, 2013
    Messages:
    250
    Likes Received:
    136
    1. They all keep logs.

    2. Improper VPS configuration is a major risk.

    3. Telco towers are more magical than you think.

    4. No such thing as untraceable mobile internet, see 3.

    5. As for tying the phone to your laptop, see 3.
     
    • Thanks Thanks x 1
  6. tiyowan

    tiyowan Regular Member

    Joined:
    Aug 7, 2013
    Messages:
    250
    Likes Received:
    136
    Yes, especially a more specialized distro.
     
    • Thanks Thanks x 1
  7. Cheeky92

    Cheeky92 Junior Member

    Joined:
    May 23, 2013
    Messages:
    111
    Likes Received:
    16
    While I realise that there is no such thing as 'untraceable' mobile internet, with my laptops MAC being spoofed and the mobile phone itself not being tied to myself (solely used for tethered browsing), is there anything else I should be concerned about?

    Ultimately, by paying for the VPS/VPN using bitcoins (and taking precautionary measures to tumble them), it is impossible to determine who I am (I believe?) at any point of this process except from information leaked by my laptop? (Digital fingerprints?)

    Therefore, whilst I also realise that it would theoretically be possible to identify my physical location whilst using the phone, if this location was varied and the phone remained off unless being tethered, is there any way my identity could be revealed?

    Cheers :)
     
  8. kbklash

    kbklash Senior Member

    Joined:
    Jun 2, 2012
    Messages:
    1,140
    Likes Received:
    449
    Location:
    in my BMW to my BHW
    Home Page:
    Stealing someone else's identity is the only way to hide your identity.All other ways fail ,since you are connecting to an ISP.
     
  9. Cheeky92

    Cheeky92 Junior Member

    Joined:
    May 23, 2013
    Messages:
    111
    Likes Received:
    16
    I guess this is true, however if I'm connecting to an ISP through a mobile (bought and topped up in cash), they can't give away my identity can they? (They have none of my personal details, only data potentially leaked from my laptop?)

     
  10. jamb0ss

    jamb0ss Junior Member

    Joined:
    Feb 9, 2012
    Messages:
    125
    Likes Received:
    46
    Occupation:
    Bots programming
    [h=2]www.torproject.org/projects/torbrowser.html.en :ciao:[/h]
     
  11. Nut-Nights

    Nut-Nights Jr. VIP Jr. VIP

    Joined:
    Jun 20, 2013
    Messages:
    5,042
    Likes Received:
    3,210
    Location:
    Hell
    Home Page:
    Anonymous browsing ? There is no such thing.
     
  12. Capo Dei Capi

    Capo Dei Capi BANNED BANNED

    Joined:
    Oct 23, 2014
    Messages:
    754
    Likes Received:
    1,732
    If you need to use so much protection and spend so much time setting it up to remain as hidden as possible, maybe you should reconsider what your doing if its brings so much heat to law enforcement.
     
  13. bartosimpsonio

    bartosimpsonio Jr. VIP Jr. VIP Premium Member

    Joined:
    Mar 21, 2013
    Messages:
    12,064
    Likes Received:
    10,836
    Occupation:
    WHEREZ MA
    Location:
    BITCOINS AT?
    Home Page:
    It depends on who you're hiding from.

    If hiding from corporate tracking, cookies, etc, then Tor is enough.

    If hiding from the NSA, you'll get caught before you finish connecting that laptop to your phone.
     
    • Thanks Thanks x 1
  14. Capo Dei Capi

    Capo Dei Capi BANNED BANNED

    Joined:
    Oct 23, 2014
    Messages:
    754
    Likes Received:
    1,732
    There is really no way to hide from the NSA, but you can remain hidden in the system by not doing anything really stupid that makes yourself relevant to the NSA and subject to manual review and possible time dedicated to yourself.
     
    • Thanks Thanks x 1
  15. Cheeky92

    Cheeky92 Junior Member

    Joined:
    May 23, 2013
    Messages:
    111
    Likes Received:
    16
    I'm looking at hosting a movie site offshore. I fail to see how the NSA could possibly find out who I am with the method I have detailed, there is only one potential avenue (as at no point do I use ANY of my personal details, everything is paid for in thoroughly tumbled bitcoins) and this is by using my laptop which I use for other general use. I'm wondering if by tethering my phone to my laptop, will any of my computers information be leaked (MAC is spoofed, so anything else?)
     
  16. bartosimpsonio

    bartosimpsonio Jr. VIP Jr. VIP Premium Member

    Joined:
    Mar 21, 2013
    Messages:
    12,064
    Likes Received:
    10,836
    Occupation:
    WHEREZ MA
    Location:
    BITCOINS AT?
    Home Page:
    In my opinion that's as "anonymous" as you can remain. Do nothing serious and stay "commercially anonymous" - that's possible.

    Complete anonymity would be too powerful a weapon for countries to ignore.
     
  17. Snatch2014

    Snatch2014 Regular Member

    Joined:
    Dec 11, 2014
    Messages:
    288
    Likes Received:
    44
    I have always said "Plan your shoplifting as it would be a bank-robbery, and you will be safe". :)

    To be 100% anonumous is very hard. But you will be safe. :) In your case they need evidence, and alot of electronic traces. :)

    In your case I would probably go with a VPN even if it is less safe. Because It may come situations where you need to handle things/problem quick, then a VPN will be more easy to use, you could also change VPN provider from time to time (and pay bitcoins). Lets say you would use a phone, and somehow they find you, and find the phone, then they have enoght evidence.

    If I where you I would use virutal-machines on your laptop, and do the VPN from there, then every week uninstall the vm, overwrite all the data where the VM was and then install again, then if you get cought they would see what you did last week but nothing more then that. Also check what ISP providers there is, there is still some really good one who would make you very protected (atleast there is good ISPs where I am from)


    Good luck :)
     
  18. rashedhns

    rashedhns Junior Member

    Joined:
    Aug 13, 2014
    Messages:
    127
    Likes Received:
    9
    Bypass using proxys and try to use VPN, VPS the highest protection on the internet.