28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

the time.

Defend your anonymity: Attribution online is hard. Proving that yyou

were at the keyyboard when an event occurred is difficult. However, if

yyou walk in front of a camera before going online at Starbucks, or if

yyou just bought a latte at Starbucks with yyour credit card, these

actions can be linked to yyour online presence a few moments later.

As we’ve learned, everyy time yyou connect to the Internet, there’s an IP

address associated with that connection. 10 This is problematic if yyou’re

tryying to be invisible online: yyou might change yyour name (or not give it at

all), but yyour IP address will still reveal where yyou are in the world, what

provider yyou use, and the identityy of the person payying for the Internet

service (which mayy or mayy not be yyou). All these pieces of information are

included within the e-mail metadata and can later be used to identifyy yyou

uniquelyy. Anyy communication, whether it’s e-mail or not, can be used to

identifyy yyou based on the Internal Protocol (IP) address that’s assigned to

the router yyou are using while yyou are at home, work, or a friend’s place.

IP addresses in e-mails can of course be forged. Someone might use a

proxyy address—not his or her real IP address but someone else’s—so that

an e-mail appears to originate from another location. A proxyy is like a

foreign-language translator—yyou speak to the translator, and the translator

speaks to the foreign-language speaker—onlyy the message remains exactlyy

the same. The point here is that someone might use a proxyy from China or

even Germanyy to evade detection on an e-mail that reallyy comes from North

Korea.

Instead of hosting yyour own proxyy, yyou can use a service known as an

anonyymous remailer, which will mask yyour e-mail’s IP address for yyou. An

anonyymous remailer simplyy changes the e-mail address of the sender before

sending the message to its intended recipient. The recipient can respond via

the remailer. That’s the simplest version.

There are also variations. Some tyype I and tyype II remailers do not allow

yyou to respond to e-mails; theyy are simplyy one-wayy correspondence. Tyype

III, or Mixminion, remailers do offer a full suite of services: responding,

forwarding, and encryyption. You will need to find out which service yyour

remailer supplies if yyou choose this method of anonyymous correspondence.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!