6

This is not any stupid question for me to do bad things on the net. I was trying to understand this topic, and now I want to test if my research was ok.

Suppose you do not want anyone (really anyone, no one, no person in the world) to know who is the author of one image you want to publish (not gonna publish anything, just an example).

What I would do:

  • Get a new laptop/computer/smartphone (so that every possible known detail is now NEW.)
  • Do not access ANY personal account (no hotmail, no facebook, no twitter, no-thing...).
  • Upload this image from a random new wireless access point.

My questions:

  • Buy a new laptop? Necessary? Format is not enough? Using a Virtual Machine?
  • Random wireless access point? Necessary?
  • What if I was wearing my already-known mobile phone in the pocket? Could governments get my name from any connection?

Edit: I think the most important thing is NEVER connect to a personal account, is this really the most important point?

Holoway
  • 63
  • 5
  • Some thoughts: A virtual machine would still use the host NIC and thus a known MAC. A WiFi AP makes you traceable to at least that location (so, country, maybe town is known) otherwise, it's fine. From the connection log on the AP, they'll grab the MAC address of the WiFi NIC of the laptop, then they find out which laptop that NIC was built into, then they trace that laptop to the store that sold it and then they find you on the CCTV footage... – Oliver Salzburg Jun 17 '13 at 17:14
  • @OliverSalzburg Interesting. But, "connection log on the access point" is ONLY saved ON the AP, so, the detective would HAVE to find out that AP. But if it is a large Oxford University, would MrDetective be able to find the exact computer? (maybe there was a camera at the room) – Holoway Jun 17 '13 at 17:22
  • 1
    I'm a big fan of ski masks – Scandalist Jun 17 '13 at 17:24
  • All of your suggestions have nothing to do with obscuring the author of an image. No precaution will prevent me from learning who made [this](https://upload.wikimedia.org/wikipedia/commons/6/6a/Mona_Lisa.jpg). Besides, if no person in the world is to know who the author is, what about the author himself? – Marcks Thomas Jun 17 '13 at 18:28
  • 2
    If you wanted to upload a file to somewhere, just leave a bunch of pendrives in public places, with an autorun executable and some other boobytraps to make the people who found the pendrive just execute some program. This program should update the file to wherever you want. – Carlos Campderrós Jun 17 '13 at 21:31

4 Answers4

5

Every network card has unique MAC address that's used for network communication before IP-based connection is estabilished. That's why using your everyday PC isn't a good idea. That's also why using a new PC isn't a good idea, as its MAC is unique too.

MAC itself indicates network card's manufacturer that you could possibly contact. Then you can ask them for some more info and this way possibly even track down where that network card/laptop with that network card was sold to you. If they have surveillance cameras, then they know you.

Using a virtual machine isn't a solution, as entire network communication will still be routed through host machine via NAT.

Possible solution: mask MAC address before connecting.

Windows has a bunch of services that use your network without your knowledge, especially one that checks if your connection works. So basically it will try to say "hello" to Microsoft everytime you connect to the Internet. There's also Windows Update, time synchronization service etc. etc.

Possible solution: use custom Linux distro, those are easier to keep in check as you can compile those yourself, checking every single line of code. (it's paranoid, but we both know your question is too ;)

Many other apps have autoupdaters running in the background - every single one will try to contact some remote server, telling it something about your connection.

Possible solution: use a firewall with whitelist. Make sure it doesn't call somewhere itself.

Your browser will be quite unique, you can check it here. The one I'm using now is unique among 2,987,405 tested so far. So was Chrome on my Android smartphone.

I can't think of any reliable solution for this problem, because there's no such thing as an "average browser".

You're not anonymous when using public Wi-Fi. All your communicaton can be easily captured and intercepted with a $100 device and there's no reliable way to check if your connection is safe. On the other hand, encrypted Wi-Fis are usually not anonymous by design - you need to acquire login credentials or connection password, and this limits the number of potential suspects greatly.

Possible solution: I can't think of any. (comments are welcome)

Your IP discloses your Internet provider, and thus your approximate location. Possible solution: anonymous proxy (if you trust those) or Tor.

Your phone. Well, that's a long story. You never know if it's not tracking you right now. You can use Replicant or something like that, but it's just software and you can't be sure what's in your hardware.

If your phone can get it's location based on GSM towers in radius, then they can identify you too. That's just for starter.

The Google Car doesn't only take photos for Google Maps, it also saves names of Wi-Fis in radius. When you run Google Maps in your mobile, it will first try to get approximate location using GSM and then by names of networks your phone can connect to. Basically, it probably can approximate your location to a circle with diameter of 30 meters. But I guess your phone has GPS too, so...

Turning the phone off isn't an option, as you still don't know if it's completely off. SIM card isn't required for it to operate. Battery is, but not all phones have removable battery.

gronostaj
  • 55,965
  • 20
  • 120
  • 179
  • 1
    Complete answer. Thanks a lot for taking your time, too. I will research on it. [And referring to the "paranoic question". It is, I know (Get a Life, I'd say), but the real purpose is maintain a regular updated controversial blog... and have 150% guarantees of anonymity] – Holoway Jun 17 '13 at 17:57
  • re: Browser uniqueness, the Blender add-on for Firefox anonymises your browser by making it pretend to be the most common configuration (Windows 7, FF 17.0). It gives good results with panopticlick. https://addons.mozilla.org/en-us/firefox/addon/blender-1/ – MikeFHay Jun 19 '13 at 11:11
2

Try this one out as a thought experiment.

  1. Load the file on a USB drive
  2. Walk to a random Internet kiosk that allows you to use these drives
  3. Do not use any personal authentication (no logins with your passwords)
  4. upload this file to one of the many sites that allow anonymous temp uploads
    (a quick search shows https://filetea.me/default/ as an option); write down the URL
  5. Change to another random Internet koisk
  6. Upload the file from that temp URL -- to wherever
  7. Consider using stuff like http://www.onion-router.net/ in addition

Having done all this... the real question about your privacy is a function of the cost of what you want to keep private. Think about that too.

In other words:

Buy a lock 
that is costlier to break 
than the cost of the thing it protects 
by orders of magnitude proportional to your paranoia ;-)
nik
  • 55,788
  • 10
  • 98
  • 140
  • Yes, this was funny to read, really. My paranoia is just that I am exaggerating the case to make it generic (my real purpose is to maintain (with regular updates) a blog with polemical writings?) But now you told me a nice option, what would you do knowing the real purpose? I liked the live-cd idea from above to avoid getting my "Fakedata-blogaccount" access user and password by some kind of keylogger/malware, so i could update each time from a different access point. – Holoway Jun 17 '13 at 17:54
2

You are looking for TAILS, The Amnesic Incognito Live System. Based on Debian Linux, it is a live system that aims at preserving your privacy and anonymity.

From their about page:

It helps you to use the Internet anonymously almost anywhere you go and on any computer but leave no trace using unless you ask it explicitly.

It runs on a CD-ROM, or a DVD, or a Flash drive and only stores information in RAM, It will not save anything to a hard drive, even if swap space is available. This means that ultimately, your data can't be traced to the computer you are on. Rather than quote the rest of their about page, go take a read and see if its of any use to you.

It is important to note all of the above answers information, and if you're uploading images, you should also purge their metadata before saving them online. That's one further step towards anonymity.

Of course, if you're hosting the blog on hosting you've paid for, then you must anonymize yourself there too. Pay for WHOIS privacy, or use a third-party domain management service. Set your web server to disable log creation. This can be a pain for those wanting to troubleshoot issues, but it is another avenue of retracing those who connected from what IP address at what time ... so turn them off.

Paul
  • 4,764
  • 29
  • 41
  • Thanks for the information, it's a really interesting system. I've been researching a lot and there's still a big problem with it. TAILS uses the TOR project, and this will make it dangerous for me to connect to Facebook (official blog-facebook, nothing related with personal data) and sometimes even impossible. So I started to research some VPN's and the best one I saw is HMA (HideMyAss), which I can pay with WireTransfer (Including fake data on the bill). What do you think about it? Is it possible to get a LIVE system which includes the necessary software to activate my VPN connection by dft? – Holoway Jun 18 '13 at 09:05
0

Buy a new laptop with cash, upload the content with a live linux distro from a foreign location via a proxy chain or other methods (Using a new user account and new email address with fake names etc), power down the computer and reduce everything down to a molten pile with an acetalyn torch.

The most important point however is not to upload anything at all and know that you are never truly anonymous. Luckily there is so much data out there, you basically have security by default.

Scandalist
  • 3,051
  • 9
  • 36
  • 41
  • This was interesting too :), but... "and know that you are never truly anonymous". There must be the **perfect** plan. (Sorry can't vote you up... gave you a smile instead) – Holoway Jun 17 '13 at 17:24
  • There never is a perfect plan. Only well thought out plans that raise the chances of anonymity and evasion. – Scandalist Jun 17 '13 at 17:25