5 Ways to become Anonymous(jumpstart)
Being Anonymous is not bad ,it more secured and safe, but being Identical is cool until your suffer from your madness
Windows is full of holes that can be exploited. Every month Microsoft issues a security patch with the latest fixes. These holes may allow spyware to infest, completely overcoming all your anonymity efforts. Any hacker worth his salt avoids Windows like the plague. Instead, they use security hardened open-source operating systems, such as Debian, OpenSUSE, however you need to be fully secured with anonymity, I recommend as Tails and Whonix. Tails is very active than Whonix, beacuse it depend os Debian, Debian is the largest community based opensource OS
Avoid anyone tracking down you’re real IP address through using VPN services and TOR.
VPN enables users to create a encrypted private tunnel. Anyone attempting to trace from the internet side can only see the address of the VPN server, which could be a server located in any country around the world you choose. But real is VPN service provider can see what actually are doing, Because a VPN in this sense is just a glorified proxy. The VPN provider can see all your traffic, and do with it what they want – including logging.
But my provider doesn’t log!
Don’t ask me “then how we connect to the internet ?”,
Dont use common free email service like Gmail, Outlook, ymail etc, We know they protect our data, but remember SilkRoad, world largest DeepWeb exchange site
Instead, use anonymous email services or remailers. Anonymous email services allow you to email someone without any trace back to you, especially if coupled with VPN or TOR access. Remailers are a service whereby you can send from a real email account and the remailer will forward it on anonymously. Some remailers enable return mail, but the risk is if the remailer itself is ever compromised, it would have a record of your real email address. However, remailers can be chained together for additional layers of anonymity.
Two issues here. The first is having your computer’s unique MAC address recorded by the router of the public location, although this is avoidable by MAC spoofing. If you’re ever traced back to your real MAC address then you can be linked to your original computer. Add to this any in-store CCTV and you’re busted! Secondly, wifi hacking attacks are commonplace. A man-in-the-middle attack over wifi will bypass all your hard earned anonymity. Admittedly, the other hacker would need to be on the same physical wifi network already, so he probably knows who you are anyway!
Real-world hackers add on may more layers of security to anonymise their activities. However, the above cant give you the full anonymous environment, but I thought It’s usefull