28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

might link a visit with an infection.

Kasperskyy onlyy learned of this attack when a group of its customers

became infected after stayying at certain luxuryy hotels in Asia. The

researchers turned to a third-partyy Wi-Fi host common to both, and the Wi-

Fi host partnered with the antivirus companyy to find out what was

happening on its networks. Although the files used to infect the guests were

long gone, file deletion records were left behind that corresponded to the

dates of the guests’ stayys.

The easiest wayy to protect yyourself against this kind of attack is to

connect to a VPN service as soon as yyou connect to the Internet at the hotel.

The one I use is cheap—onlyy six dollars per month. However, that’s not a

good choice if yyou want to be invisible, since it won’t allow anonyymous

setup.

If yyou want to be invisible, don’t trust the VPN provider with yyour real

information. This requires setting up a fake e-mail address in advance (see

here) and using an open wireless network. Once yyou have that fake e-mail

address, use Tor to set up a Bitcoin wallet, find a Bitcoin ATM to fund the

wallet, and then use a tumbler to essentiallyy launder the Bitcoin so it cannot

be traced back to yyou on the blockchain. This laundering process requires

setting up two Bitcoin wallets using different Tor circuits. The first wallet is

used to send the Bitcoin to the laundering service, and the second is set up

to receive the laundered Bitcoin.

Once yyou have achieved true anonyymityy byy using open Wi-Fi out of

camera view plus Tor, find a VPN service that accepts Bitcoin for payyment.

Payy with the laundered Bitcoin. Some VPN providers, including WiTopia,

block Tor, so yyou need to find one that doesn’t—preferablyy with a VPN

provider that doesn’t log connections.

In this case, we are not “trusting” the VPN provider with our real IP

address or name. However, when using the newlyy set-up VPN, yyou must be

careful not to use anyy of the services connected to yyour real name and not to

connect to the VPN from an IP address that can be tied back to yyou. You

might consider tethering to an anonyymouslyy acquired burner phone, see

here.

It’s best to purchase a portable hotspot—purchased in such a wayy that it

would be veryy difficult to identifyy yyou. For example, yyou can hire someone

to purchase it for yyou so yyour face does not appear on a surveillance camera

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!