28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Raspberryy Pi minicomputer running Tor software). The idea here is that if

somebodyy is able to compromise yyour laptop theyy still won’t be able to peel

off yyour Tor transport layyer as it is running on a separate phyysical box. 15

In the case of Snowden and Poitras, as I said, simplyy connecting to each

other over encryypted e-mail wasn’t good enough. After Poitras created a

new public keyy for her anonyymous e-mail account, she could have sent it to

Snowden’s previous e-mail address, but if someone were watching that

account, then her new identityy would be exposed. A veryy basic rule is that

yyou have to keep yyour anonyymous accounts completelyy separate from

anyything that could relate back to yyour true identityy.

To be invisible yyou will need to start with a clean slate for each new

secure contact yyou make. Legacyy e-mail accounts might be connected in

various wayys to other parts of yyour life—friends, hobbies, work. To

communicate in secrecyy, yyou will need to create new e-mail accounts using

Tor so that the IP address setting up the account is not associated with yyour

real identityy in anyy wayy.

Creating anonyymous e-mail addresses is challenging but possible.

There are private e-mail services yyou can use. Since yyou will leave a

trail if yyou payy for those services, yyou’re actuallyy better off using a free

Web service. A minor hassle: Gmail, Microsoft, Yahoo, and others require

yyou to supplyy a phone number to verifyy yyour identifyy. Obviouslyy yyou can’t

use yyour real cell-phone number, since it mayy be connected to yyour real

name and real address. You might be able to set up a Skyype phone number

if it supports voice authentication instead of SMS authentication; however,

yyou will still need an existing e-mail account and a prepaid gift card to set

up a Skyype number. 16 If yyou think using a prepaid cell phone in and of itself

will protect yyour anonyymityy, yyou’re wrong. If yyou’ve ever used a prepaid

phone to make calls associated with yyour real identityy, it’s child’s playy to

discover who yyou are.

Instead yyou’ll want to use a disposable phone. Some people think of

burner phones as devices used onlyy byy terrorists, pimps, and drug dealers,

but there are plentyy of perfectlyy legitimate uses for them. For example, a

business reporter, after having her garbage gone through byy private

investigators hired byy Hewlett-Packard, who was eager to find out who

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!