InternetSecurity

Anonymous Security Advice

At the very least if you are going to interact with Anonymous you need to have a VPN. This should literally be step 1:

What is a VPN: A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider.

So what does this mean? To put it most simply if someone tries to log your IP, this person will see the IP of your VPN service provider protecting your personal computer. It will cost you money to have a good VPN service but you do get what you pay for in this industry. However, even on the lower end of price range most VPN services do an adequate job. Below is a list of trusted VPN servers, there are of course many others if you do the research. Free VPN’s do exist, but use at own risk I would advise.

IPVanish
Perfect Privacy

A VPN alone should be good enough to protect you from the average person on the internet. But once you have one you are ready for Step 2: setting up some sort of proxy protection.

What is a Proxy? A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client’s request or the server’s response for various purposes.

There are different ways you can go about creating a proxy. The most most simple way is to use a browser with a built in proxy. Many people have traditionally used Tor for this but recent news keeps popping up that Tor browser is full of holes. A proxy browser is helpful because again if someone is trying to hack you they will spot this proxy IP first. If they are able to crack through this proxy they will still end up at your VPN IP. If you sign into your VPN first, then proxy second the proxy in a way protects the VPN creating a duel level protection.
At the very least if you are going to interact with Anonymous you need to have a VPN. This should literally be step 1:

Find Free Browser’s With Built In Proxy Here: http://www.omgtop5.com/proxy-browsers-for-windows/

So now you have your VPN and Proxy Browser, step 3, you can add on proxy chain. The longer the chain the longer/harder it will take for anyone who wants to hack into you. Every proxy a bypass’ leads them straigh to another proxy address which goes to another, so on and so forth. If they somehow get through them all they get to your browser proxy, then VPN. A third layer of protection. It is rare to encounter a proxy chain, but for this same reason in many ways is much more effective than a VPN. I must note that much like VPN services you get what you pay for with proxy chain services. If you are interested a quick google search will lead you to multiple proxychain providers.

Now that you have all the outside protections in place you are going to want some internal protection. Believe it or not even with a VPN and Proxy your computer may still leak your IP to web sites. Something known as the WebRTC makes a real time connection to each web site you visit. Even with protections turned on this connection will be made and depending on the site, leak your IP. Step 4, You are going to need to install something to Disable WebRTC. This will be free and easy.

Disable WebRTC for Firefox: https://addons.mozilla.org/en-us/firefox…le-webrtc/

Disable WebRTC for Chrome: https://chrome.google.com/webstore/detai…bkdm?hl=en

To Test If Your Browser Is Leaking Your IP through WebRTC Test Here: https://www.browserleaks.com/webrtc

Step 5, This next bit may not be completely necessary and will be annoying to use while browsing the internet but it is a last line of defense in a way. If you want lock tight security you are going to want a Java Script blocker. No Script is a free source java blocker which allows your to peal back layer by layer the scripts you wish to allow and what you dont with a click of a button. You can turn on and off as you please and custom set the level you want set at each individual web site.

Install No Script: https://noscript.net/

If you ever sense that someone is on your computer you can use the following sequence to booth them off your computer, at least temporarily. You can use the command in bold on a regular basis, it will not disrupt your internet connection.

Open cmd window
Title Hacker (press enter)
color 2 (enter)
echo off (enter)
cls (enter)
ipconfig/flushdns (enter)
ipconfig/release (enter)
ipconfig/renew (enter)
If you want to try and find the IP address of that person on your computer open cmd and use: netstat -n or netstat -an or netstat -anp

To Keep an Anonymous Identity On The Internet: Invent an alias, a surname if you will, with a name of your choice. Go and register this name with one of the big email service providers. Use this new email to register any new Twitter, Facebook, Instagram, et cetera accounts. Be sure to clear all browser cookies before using this alias or better yet use a different web browser for your anonymous identity than you would use for your more typical internet activity. If you have a further need for security beyond these steps you may want look into encryption, stenography or TAILS system.

Share Your Thoughts
Tags

Pascal Eugene

Founder of ‘Geek The Net’. Cyber Security Analyst, Information Security Researcher, Developer and Part-Time Hacker.

Related Articles

Close