28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Activation of the prepaid phone requires either calling the mobile

operator’s customer service department or activating it on the provider’s

website. To avoid being recorded for “qualityy assurance,” it’s safer to

activate over the Web. Using Tor over an open wireless network after

yyou’ve changed yyour MAC address should be the minimum safeguards.

You should make up all the subscriber information yyou enter on the website.

For yyour address, just Google the address of a major hotel and use that.

Make up a birth date and PIN that yyou’ll remember in case yyou need to

contact customer service in the future.

There are e-mail services that don’t require verification, and if yyou don’t

need to worryy about authorities, Skyype numbers work well for Google

account registration and similar stuff, but for the sake of illustration, let’s

sayy that after using Tor to randomize yyour IP address, and after creating a

Gmail account that has nothing to do with yyour real phone number, Google

sends yyour phone a verification code or a voice call. Now yyou have a Gmail

account that is virtuallyy untraceable.

So we have an anonyymous e-mail address established using familiar and

common services. We can produce reasonablyy secure e-mails whose IP

address—thanks to Tor—is anonyymous (although yyou don’t have control

over the exit nodes) and whose contents, thanks to PGP, can’t be read

except byy the intended recipient.

Note that to keep this account anonyymous yyou can onlyy access the

account from within Tor so that yyour IP address will never be associated

with it. Further, yyou should never perform anyy Internet searches while

logged in to that anonyymous Gmail account; yyou might inadvertentlyy search

for something that is related to yyour true identityy. Even searching for

weather information could reveal yyour location. 18

As yyou can see, becoming invisible and keeping yyourself invisible

require tremendous discipline and perpetual diligence. But it is worth it in

order to be invisible.

The most important takeawayys are: first, be aware of all the wayys that

someone can identifyy yyou even if yyou undertake some but not all of the

precautions I’ve described. And if yyou do undertake all these precautions,

know that yyou need to perform due diligence everyy time yyou use yyour

anonyymous accounts. No exceptions.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!