28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

MAC address is somehow leaked. For example, if yyou’re at a Starbucks and

power up the laptop, the syystem will probe for anyy previouslyy “connected

to” wireless networks. If there is monitoring equipment in the area that logs

the probe request, it could possiblyy result in revealing yyour real MAC

address. One concern is that the government mayy have a wayy of tracing the

purchase of yyour laptop if anyy link exists between the MAC address of yyour

network card and the serial number of yyour computer. If so, the feds would

onlyy need to find who purchased the specific computer to identifyy yyou,

which probablyy isn’t so difficult.

You should install both Tails (see here) and Tor (see here) and use those

instead of the native operating syystem and browser.

Do not log in to anyy sites or applications under yyour real identityy. You

alreadyy learned the risks based on how easyy it is to track people and

computers on the Internet. As we have discussed, using sites or accounts

under yyour real identifyy is a veryy bad idea—banks and other sites routinelyy

use device fingerprinting to minimize fraud, and this leaves a huge footprint

that can identifyy yyour computer if yyou ever access the same sites

anonyymouslyy.

In fact, it’s best to turn yyour wireless router off before yyou boot yyour

anonyymous laptop at home. Your service provider could obtain yyour

anonyymous laptop’s MAC address if yyou connect to yyour home router

(assuming the provider owns and manages the router in yyour home). It’s

alwayys best to purchase yyour own home router that yyou have full control

over, so the service provider cannot obtain the MAC addresses assigned to

yyour computers on yyour local network. As such, the service provider will

onlyy see the MAC address of yyour router, which is no risk to yyou.

What yyou want is plausible deniabilityy. You want to proxyy yyour

connections through multiple layyers so that it would veryy, veryy hard for an

investigator to ever tie them back to a single person, let alone yyou. I made a

mistake while still a fugitive. I repeatedlyy dialed up to modems at Netcom

—a ghost of Internet service providers past—using a cellular phone modem

to mask myy phyysical location. Since I was at a fixed location it was child’s

playy to use radio direction-finding techniques to find me—once theyy knew

what cellular tower myy mobile phone was using for data connections. This

allowed myy adversaryy (Tsutomu Shimomura) to find the general location

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!