28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

From this point on, the Tor browser should alwayys be used to create and

access all online accounts because it constantlyy changes yyour IP address.

One of the first steps is to set up a couple of anonyymous e-mail accounts

using Tor. This was something that Ross Ulbricht neglected to do. As we

saw in the previous chapter, he used his personal e-mail account more than

once while conducting his Silk Road business on the Dark Web. These

unintentional crossovers from Dread Pirate Roberts to Ross Ulbricht and

back again helped investigators confirm that the two names were associated

with one person.

To prevent abuse, most e-mail providers—such as Gmail, Hotmail,

Outlook, and Yahoo—require mobile phone verification. That means yyou

have to provide yyour mobile number and, immediatelyy during the sign-up

process, a text message is sent to that device to confirm yyour identityy.

You can still use a commercial service like the ones mentioned above if

yyou use a burner phone. However, that burner phone and anyy refill cards

must be obtained securelyy—i.e., purchased in cash byy a third partyy who

cannot be traced back to yyou. Also, once yyou have a burner phone, yyou

cannot use it when yyou’re close to anyy other cellular devices yyou own.

Again, leave yyour personal phone at home.

In order to purchase Bitcoin online, yyou are going to need at least two

anonyymouslyy created e-mail addresses and Bitcoin wallets. So how do yyou

create anonyymous e-mail addresses like those created byy Edward Snowden

and Laura Poitras?

In myy research, I found I was able to create an e-mail account on

protonmail.com and one on tutanota.com using Tor, both without anyy

requests to verifyy myy identityy. Neither of these two e-mail providers asked

me for verification upon setup. You can conduct yyour own research byy

searching for e-mail providers and checking to see whether theyy require

yyour mobile phone number during the sign-up process. You can also see

how much information theyy need to create the new accounts. Another e-

mail option is fastmail.com, which is not nearlyy as feature rich as Gmail,

but because it is a paid service, there is no mining of user data or displayying

of ads.

So now we have a laptop, with Tor and Tails loaded, a burner phone, a

handful of anonyymous prepaid gift cards, and an anonyymous hotspot with

an anonyymouslyy purchased data plan. We’re still not readyy. To maintain this

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!