Anonymity Basics
It is unpleasant when a person feels: because of his beliefs, which are adequately and objectively explained, he can beconvicted. Moreover, hacktivists around the world are trying toinfluence the state through various methods, from petitions toDDoS attacks. Both are interrelated very simply - this is aperson's civil position and when the state restricts us in the rightto freedom of thought (rigid / subjective - it does not matter) weshould be able to point out to it in place.
OPSEC
OPSEC stands for "Operations Security", in other words, operational security. This process is to hide the most interestinginformation from unauthorized persons. First of all, it caninclude data encryption, as well as limit the circle of personswho have access to them. The latter means that your relatives, friends, relatives should not know about your task, this approachwill help you to be sure that no one will be rabid.
So, first of all, you will need to encrypt your data, but rememberthat you can hack everything, so it will only help with anunexpected visit. In addition, the data is also subject torecovery, after deleting the file from the recycle bin, only thelink to it is deleted, it remains on the hard disk beforeoverwriting. But this is not the worst, if it is, and it can also beused by other applications. For example, it can be saved in theswap file (so you should always disable it), but the thumbs fromthumbs.db and so on can be created from the image :) Radicalapproach (and the soul is calmer) is the destruction of the harddrive in fire, : overwrite the entire hard drive, clogging its unitsand zeros several times.
Preparation of working field
There are two approaches: working on the network and outsideit. When working outside the network, it is enough to change thetechnical part of the device, pre-installing the firewall program, which will block incoming and outgoing requests. Of course, deareditorial staff is also aware of the more rigid approach. Peoplewho have a serious approach to such things, allow themselves togo further and use foil as a screen of signals. Yes, in this way, theentire room where your workspace is located is pasted (tightly, without piercing) with five layers of foil, after which the signalwith the network can simply disappear.
Networking is the most difficult part. First of all you need to useeither Tor or someone else's Wi-Fi. Moreover, the second is moredesirable, since the connection to the Tor network is noticeableto your ISP, although it can not see what exactly you are doingthere. On the other hand, the sites you visit via Tor also see thatyou have come from this browser. Accordingly, if, for example, you leave the comment at 11:00 am, in the future, lawenforcement agencies can "ask" Internet providers to connectthem to this network during a period of time (with a couple ofhours difference). The question is that it violates at least acouple of laws on the protection of privacy rights and that theremay be millions in more developed countries - no. Also, for thesake of objectivity, it should be noted: one of the FBI officers (Torbell), who investigated the case of Silk Road (a drug store in Tor) claimed that he had never seen a more perfect system than Tor.
The password for someone else's Wi-Fi can be picked up (by theway, modern systems, very popular in Linux), ask for or justconnect, if it's open. Anyway, before connecting to it, you shouldpurchase a Wi-Fi adapter and find software that automaticallychanges your MAC address. A Wi-Fi adapter is needed to monitorthe process from a distance, as well as to access public Wi-Fiwithout a long-distance password. MAC address to avoididentification in the internal Wi-Fi network. Again, the systemcan enhance automatically bypassing all traffic through Tor (yes, Linux may not), and you can loosen it - it's up to you.
Communication
This is the biggest problem of many hackers, in particular, because of their unconscious vanity :) Someone uses the samenickname in Tor and on the regular network. Someone fills withmetadata (for simplicity, take your passport and see what is init, it's your personal data, metadata is indirect data, forexample, you can set a lot by the time of your activity on thenetwork: are you at home now (if your account is stored on yourcomputer), your time zone (few people on the network aftertwelve.) It's come to this that based on your preferences (maybefrom your clicks on its internal links or likes), the approximatelocation (for example, you communicate in Belarusian, then, probably all you are from Belarus, if you are against thepresident, you take a map of the president's support for theregions from open sources and there is already some kind ofindirect evidence on you. In addition, there are alsocharacteristic speeches of any language present in the regionsand regions where he spread out.)
Sell your votes https://steemit.com/news/@bible.com/6h36cq
✅ @dusterdeciles, I gave you an upvote on your post! Please give me a follow and I will give you a follow in return and possible future votes!
Thank you in advance!
Congratulations @dusterdeciles! You have completed some achievement on Steemit and have been rewarded with new badge(s) :
Award for the number of upvotes received
Click on the badge to view your Board of Honor.
If you no longer want to receive notifications, reply to this comment with the word
STOP
Do not miss the last post from @steemitboard!
Participate in the SteemitBoard World Cup Contest!
Collect World Cup badges and win free SBD
Support the Gold Sponsors of the contest: @good-karma and @lukestokes
Congratulations @dusterdeciles! You have completed the following achievement on Steemit and have been rewarded with new badge(s) :
Award for the number of upvotes
Click on the badge to view your Board of Honor.
If you no longer want to receive notifications, reply to this comment with the word
STOP
Do not miss the last post from @steemitboard:
SteemitBoard World Cup Contest - Play-off for third result
Participate in the SteemitBoard World Cup Contest!
Collect World Cup badges and win free SBD
Support the Gold Sponsors of the contest: @good-karma and @lukestokes