Difference between revisions of "Guide to Being Anonymous"

From United States Pirate Party
Jump to navigation Jump to search
(Created page with "Whether you just want to maintain your privacy from family and friends or you want to stop the ever more totalitarian government from spying on you, the idea is the same as ar...")
 
Line 12: Line 12:
 
*Use proxy servers that don't log to mask your IP address.
 
*Use proxy servers that don't log to mask your IP address.
 
**Alternatively, the Tor network or a VPN that doesn't log
 
**Alternatively, the Tor network or a VPN that doesn't log
 +
*Disable cookies, use private browsing, or utilize [http://en.wikipedia.org/wiki/Do_Not_Track[Do Not Track]] headers when using the web.
 +
*Use an open source operating system that allow MAC address modification to randomize your computer's unique identifier on public networks.
 +
*Register your own web domain name on a non-US controlled [http://en.wikipedia.org/wiki/TLD[TLD]] extension that allows for identity protection such as [http://www.whoisguard.com/[WhoisGuard]].
 +
 
==Links and Resources==
 
==Links and Resources==
 
*[https://www.eff.org/sites/default/files/EFF_Know_Your_Rights_2011_0.pdf EFF's Know Your Rights]
 
*[https://www.eff.org/sites/default/files/EFF_Know_Your_Rights_2011_0.pdf EFF's Know Your Rights]
 
*[https://ssd.eff.org/ EFF's Surveillance Self-Defense Project]
 
*[https://ssd.eff.org/ EFF's Surveillance Self-Defense Project]
 
*[http://en.wikipedia.org/wiki/Fifth_Amendment_to_the_United_States_Constitution The 5<sup>th</sup> Amendment]
 
*[http://en.wikipedia.org/wiki/Fifth_Amendment_to_the_United_States_Constitution The 5<sup>th</sup> Amendment]

Revision as of 03:36, 1 October 2013

Whether you just want to maintain your privacy from family and friends or you want to stop the ever more totalitarian government from spying on you, the idea is the same as are many of the steps you can take to keep peeping eyes and ears out of your business.

Basic Practices

Aliases

  • Have an alias or even better never use the same alias.
  • Never reveal your true identity to anyone.
    • The fifth amendment can only protect you from having to incriminate yourself.
    • It can't protect you from evidence you give to others who may willingly or accidentally give it away.

Transactions

  • Use cash to buy things.

Advanced Methods

  • Use proxy servers that don't log to mask your IP address.
    • Alternatively, the Tor network or a VPN that doesn't log
  • Disable cookies, use private browsing, or utilize [Do Not Track] headers when using the web.
  • Use an open source operating system that allow MAC address modification to randomize your computer's unique identifier on public networks.
  • Register your own web domain name on a non-US controlled [TLD] extension that allows for identity protection such as [WhoisGuard].

Links and Resources