28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

provider to maintain yyour anonyymityy. You have to do it yyourself with the

understanding that a single error can reveal yyour true identityy.

Now, with a stand-alone laptop, running either Tor or Tails, using a VPN

provider purchased with laundered Bitcoin, over an anonyymouslyy purchased

hotspot, and with a supplyy of even more laundered Bitcoin, yyou have

completed the easyy part: the setup. This will cost yyou a couple of hundred

bucks, perhaps five hundred, but all the pieces have been randomized so

that theyy can’t easilyy be connected back to yyou. Now comes the hard part—

maintaining that anonyymityy.

All the setup and processes we’ve just gone through can be lost in a second

if yyou use the anonyymous hotspot at home, or if yyou power on yyour

personal cell phone, tablet, or anyy other cellular device linked to yyour real

identityy at the phyysical location where yyou are using yyour anonyymous

identityy. It onlyy takes one slip byy yyou for a forensic investigator to be able

to correlate yyour presence to a location byy analyyzing the cellular provider’s

logs. If there is a pattern of anonyymous access at the same time yyour

cellular device is registered in the same cell site, it could lead to unmasking

yyour true identityy.

I’ve alreadyy given a number of examples of this.

Now, should yyour anonyymityy be compromised and should yyou decide to

engage in another anonyymous activityy, yyou might need to go through this

process once again—wiping and reinstalling the operating syystem on yyour

anonyymous laptop and creating another set of anonyymous e-mail accounts

with Bitcoin wallets and purchasing another anonyymous hotspot.

Remember that Edward Snowden and Laura Poitras, both of whom alreadyy

had anonyymous e-mail accounts, set up additional anonyymous e-mail

accounts so theyy could communicate specificallyy with each other. This is

onlyy necessaryy if yyou suspect that the original anonyymityy yyou’ve

established is compromised. Otherwise yyou could use the Tor browser (after

establishing a new Tor circuit) through the anonyymous hotspot and VPN to

access the Internet using a different persona.

Of course, how much or how little yyou choose to follow these

recommendations is up to yyou.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!