• Quick note - the problem with Youtube videos not embedding on the forum appears to have been fixed, thanks to ZiprHead. If you do still see problems let me know.

Anonimity on the Internet

Yes: there is not always an audit trail, but you have no convenient way to find out if there is or not.
 
You could move from cybercafe to another and have some anonymity, I suppose....
 
CFLarsen said:
You could move from cybercafe to another and have some anonymity, I suppose....

How do you pay in one? I mean it seems that if you need a credit card to pay for service, they got cha. Unless the card is phoney.

Point being, sitting at home, no matter what tricks you pull eventually it comes back to you.
 
Ed said:
How do you pay in one? I mean it seems that if you need a credit card to pay for service, they got cha. Unless the card is phoney.

Point being, sitting at home, no matter what tricks you pull eventually it comes back to you.

I've heard that many trendy cafes (starbucks, etc) in the larger cities have free wifi access. I've never visited one but I imagined that you walk in and access is automatic ...

Does anyone have experience with this?
 
Ed said:
How do you pay in one? I mean it seems that if you need a credit card to pay for service, they got cha. Unless the card is phoney.

Point being, sitting at home, no matter what tricks you pull eventually it comes back to you.

I've been to cybercafes in New York, Copenhagen, Hong Kong, Bahamas...all places, put down a few coins on the table, and you're set.
 
Rob Lister said:
I've heard that many trendy cafes (starbucks, etc) in the larger cities have free wifi access. I've never visited one but I imagined that you walk in and access is automatic ...

Does anyone have experience with this?

Unless you swipe a machine your IP is logged, I would think. No that would be assigned on the fly. But your machine ID?

I was thinking about this yesterday when they were talking about that horror chick that cut the baby from it's mother. Evidentially they tracked her thru a chat room and nabbed her in 23 hours. All via the Internet, or so they said.
 
I have been thinking about this as well. I have been following the goings on over at www.catchbtk.com and on the message board there, there is apparently messages posted from the BTK killer. If true then there must be some way to find out where the messages came from.
 
Ed said:
Unless you swipe a machine your IP is logged, I would think. No that would be assigned on the fly. But your machine ID?

I was thinking about this yesterday when they were talking about that horror chick that cut the baby from it's mother. Evidentially they tracked her thru a chat room and nabbed her in 23 hours. All via the Internet, or so they said.

They tracked her through the victim's computer logs.
 
There is a way involving some of the above methods plus some others.

Depending on the level of your nafarious activity you might have to find a disposable hardware budget.

May I ask why you want to know?

ED, I think you are talking about the MAC adress of the network device.

O.
 
Orangutan said:
There is a way involving some of the above methods plus some others.

Depending on the level of your nafarious activity you might have to find a disposable hardware budget.

May I ask why you want to know?

ED, I think you are talking about the MAC adress of the network device.

O.

My curiosity arises from the fact that I think that discussions of Internet privacy are simply misdirection and that if a government wants to know who an individual is it is basically pretty simple to find out. It is like trying to hide cash, it gets deposited and gets withdrawn, you are connected to it. The only way to hide cash is to put it under your mattress.

Yeah, MAC. That is specific to each machine, no? And it is transmitted?
 
The MAC address is specific to a network card and it is transmitted (at least to the local network devices). However, you could easily buy a network card, use it and destroy it : might get a bit pricey after a while, though.
 
iain said:
The MAC address is specific to a network card and it is transmitted (at least to the local network devices). However, you could easily buy a network card, use it and destroy it : might get a bit pricey after a while, though.

Many network cards allow you to change the MAC address as part of the driver settings. As long as you choose an address that is not used by another device on your local network segment, you should be fine.

This is how crackers bypass MAC address control on WiFi networks - scan the network for legitimate MAC addresses, then spoof one of them to gain access.

If you sent traffic through an anonymising proxy, your IP address would be stripped out - however, the proxy would have to reveal any details they had logged about you if required to do so by a court. So if you're up to something really naughty, pick a proxy in a different jurisdiction.
 
Doc Dish said:
If you sent traffic through an anonymising proxy, your IP address would be stripped out - however, the proxy would have to reveal any details they had logged about you if required to do so by a court. So if you're up to something really naughty, pick a proxy in a different jurisdiction.

Or find a back door into one of the thousands of badly secured Windows boxes on the internet and use it as your proxy. Write the evidence over with zeroes ten or twenty times afterwards.

Or "wardrive" - roam around with an antenna and a wireless card until you find a badly secured wifi network and use it for your dirty deeds.

Anonymity will still be possible until everyone or nearly everyone secures their computers thoroughly from remote attacks.
 
Diamond said:

Does anonymizer keeps records of who logged in when and who went where. If so, these could be obtained by court order and lead directly, or indirectly, back to you. Possibly they destroy their records but I see liability problems there.
 
Rob Lister said:
Does anonymizer keeps records of who logged in when and who went where. If so, these could be obtained by court order and lead directly, or indirectly, back to you. Possibly they destroy their records but I see liability problems there.
If you use a chain of proxies I don't see how it will be possible to follow the track. No court order will be appliquable to all elements of the chain. And of course it takes only ONE of the member of the chain to delete their log, for anonymity to be assured.

nimzo
 
Ed said:
Unless you swipe a machine your IP is logged, I would think. No that would be assigned on the fly. But your machine ID?

I was thinking about this yesterday when they were talking about that horror chick that cut the baby from it's mother. Evidentially they tracked her thru a chat room and nabbed her in 23 hours. All via the Internet, or so they said.


Well, that is easy to take care of.

Just google around for:

"SMAC"
 
Rob Lister said:
Does anonymizer keeps records of who logged in when and who went where. If so, these could be obtained by court order and lead directly, or indirectly, back to you. Possibly they destroy their records but I see liability problems there.

Yes, anonymizer and any other commercial service keeps logs. No matter what they say. They have to cover their asses somehow.

Anywho, when it comes to being completely anonymous, here is what I recommend. It is slightly illegal, but it does work:

Change your Software MAC address with a program like SMAC so your machine is not traced.

Change your hardware MAC address to match your softwware address. This is really difficult, and you must know how to read hexadecimal code coming in from the chip.

Use a program like SOCKSCHAIN to chain a line of anonymous (Trojaned) SOCKS proxies. Trojaned Proxies are what you want since they are hacked machines that leave no logs.

Use a some form of an offshore VPN to encrypt your traffic, make sure that you set up the VPN

Make sure you do all of this while wardriving

Also, make sure when it comes to email that you use temporary, or what I call, propup mailboxes that you will use only once or twice max to receive emails. www.s-mail.com provides a good service in this regard


If you follow all of this, you should be anonymous... PERIOD!
 

Back
Top Bottom