[HN Gopher] Be anonymous
___________________________________________________________________
 
Be anonymous
 
Author : kashnote
Score  : 189 points
Date   : 2022-02-20 18:54 UTC (4 hours ago)
 
web link (kg.dev)
w3m dump (kg.dev)
 
| ronnier wrote:
| I don't care about being anon, but I don't want all my info
| sitting in databases, so I've made done the following and trying
| to evolve over time and fix gaps that I currently have. This is
| things I've done...
| 
| * Use Brave browser with ublock origins and privacy badger
| 
| * Use pihole + unbound to resolve my own DNS and do not use
| google
| 
| * Run wireguard on my home network that I connect to when I'm out
| and need to use wifi
| 
| * Be anti-google as much as possible. I'm still in the process of
| this, i'll switch my domain based email off of google soon
| 
| * Be anti-facebook and delete all accounts (whatsapp and insta
| included)
| 
| * Be anti-reddit
| 
| * Be anti-cloud and host everything internally as much as
| possible (except for encrypted backups, say for video cam
| footage)
| 
| * All of my home automation is local and blocked from the
| internet. If I want access, I'll connect to my VPN.
| 
| * Use signal with disappearing chats to communicate with my
| friends.
| 
| Still a lot to do, but it's a start...
 
  | hammock wrote:
  | I believe Brave browser has fallen out of favor but I'm not an
  | expert on why
 
    | ronnier wrote:
    | Interesting. Please let me know if you have a better
    | alternative. Ideally I'd like to just run chromium but then I
    | have to build it myself or use some build by some untrusted
    | person so I've decided I'll trust Brave for now...
 
      | xvector wrote:
      | Aside from Tor Browser, Firefox with arkenfox/user.js is
      | ideal for privacy [1].
      | 
      | Chromium-based browsers like Brave are ideal for security
      | [2].
      | 
      | An ideal solution for privacy and security would be running
      | Firefox+user.js in Qubes OS [3], or for even more
      | anonymity, Tor Browser in Qubes-Whonix [4]. However, even
      | this isn't bulletproof, and a 3 letter agency can still
      | determine who you are with techniques like keystroke
      | deanonymization [5] or other techniques [6] like traffic
      | analysis. Tor is also not reliable for anonymity because
      | the project is kind of a shitshow [7], so there's really
      | nothing you can do to truly hide.
      | 
      | [1]: https://github.com/arkenfox/user.js
      | 
      | [2]: https://madaidans-insecurities.github.io/firefox-
      | chromium.ht...
      | 
      | [3]: https://www.qubes-os.org/
      | 
      | [4]: https://www.whonix.org/wiki/Qubes
      | 
      | [5]: https://www.whonix.org/wiki/Keystroke_Deanonymization
      | 
      | [6]: https://www.whonix.org/wiki/Warning
      | 
      | [7]: https://www.hackerfactor.com/blog/index.php?/archives/
      | 906-To...
 
| cellis wrote:
| As careful as some of the things he suggests are...if you're
| truly wanted by a state-level actor or sufficiently motivated
| attacker, you won't be able to hide by simply using VPN and Tor.
| Especially if you're running something with many transactions
| like AlphaBay. You would need to obfuscate quite a bit more:
| 
| - if you're using VPN traffic but most people "around" you
| aren't, you're a suspicious node; your ISP could easily flag you
| to your government. If you use wifi at a common point you're
| likely to be flagged and there isn't an easy way other than
| keeping on the move. But moving often is another anomalous event,
| and it's very difficult to do even for Drug Lords ( El Chapo ) or
| Terrorists that it behooves to do. This puts you in a sort of
| _Zugzwang_ , to borrow a chess term.
| 
| - there's always leakage, for instance, in the way you talk with
| people in the real world. At some point you send enough
| communication for sophisticated frequency analysis.
| 
| - and there are other patterns of usage that could be used to
| identify you, like searches or even keyboard frequency on
| anonymized accounts can be de-anonymized by very specific markers
| ( ML works! ).
| 
| - off ramps for crypto aren't very good. If you're in e.g.
| Brazil, haha, yeah, good luck spending bitcoin or any other
| crypto and going unnoticed. Mixers and tumblers will eventually
| leak and you'll be caught.
| 
| - you're very vulnerable to social engineering by people you do
| business with. one slip where you stop communicating in a
| transactional mode of communication and that's a weak link in
| your armor.
| 
| In the end, the FBI only has to be right once, and you have to be
| right every time.
 
  | weq wrote:
  | Scamming is BOOMING. We are talking entire developing countries
  | getting onboard. The noise ratio is very high on all these
  | services. There are hundreds of "alphabays" running RIGHT now
  | with millions of people using them, right now. This isnt 2013,
  | those big take-downs of high profile sites did nothing but
  | diversify, fracture the community.
  | 
  | Sure, if u piss off the wrong agent and they spend a few years
  | on the case you may get busted. But the vast majority?
 
  | xvector wrote:
  | > keyboard frequency on anonymized accounts can be de-
  | anonymized
  | 
  | Whonix uses Kloak to mitigate this [1], but unfortunately it
  | isn't available in Qubes-Whonix.
  | 
  | > Mixers and tumblers will eventually leak
  | 
  | Don't use mixers and tumblers, use Monero and/or Monero atomic
  | swaps.
  | 
  | But, you are right that it is futile to maintain defense
  | against a determined 3 letter agency.
  | 
  | [1]:
  | https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak
 
  | 323 wrote:
  | What you said and much more.
  | 
  | For example, you buy a burner phone, but the place you bought
  | it from, even if a second hand shop, had a security camera.
  | Maybe they also record IMEI's before selling phones.
  | 
  | Or you carry your burner phone together with your real phone.
  | Or alternatively, you leave one at home when using the other.
  | Both of these things can be linked by a sufficiently determined
  | actor (FBI/NSA level).
  | 
  | Or they track you to using a public square WiFi one day. Again,
  | cameras are everywhere.
  | 
  | If they got your real name, no matter how, it's game over. You
  | will be surveilled and they will find proof to link you. This
  | is why all those posts "if only DPR used this kind of
  | encryption or dead-men-switch" are ridiculous. Once they knew
  | his real name it was just a matter of time and building a case.
 
    | cellis wrote:
    | I would say that if you're caught and ... _somehow_ manage to
    | delete all the evidence linking you ( you have device
    | explosives or, idk, 2048 bit encryption ), you _may_ be able
    | to escape, but come on, who are we kidding: the FBI has like
    | a 99.96% conviction rate and that 's without even going to
    | into the "parallel construction" or other conspiratorial
    | lines of attack.
 
      | 323 wrote:
      | I don't think the FBI would be that dumb to arrest you
      | before they have solid proof.
 
  | ogisan wrote:
  | You're absolutely right. It is not enough to use anonymity
  | tools, you also have to make sure everything else around you
  | doesn't compromise your anonymity. Made me think of a Harvard
  | bomb threat incident where the student posting a fake bomb
  | threat (through Tor) to avoid final exams was the only person
  | using Tor on campus at the time, which trivially identified
  | him.
  | 
  | https://theprivacyblog.com/blog/anonymity/why-tor-failed-to-...
 
    | klysm wrote:
    | Many anonymity tools have the k-anonymity property. It's
    | really unfortunate for k to be 1.
 
      | 323 wrote:
      | This is the big problem of crypto coin mixers. 99% of their
      | users are trying to launder illegal bitcoin.
 
  | blowski wrote:
  | It's a bit like Schneier's Law. You can put in place
  | protections that you personally cannot workaround, but that
  | doesn't mean someone with sufficient means and motivation would
  | also be blocked.
 
| 14 wrote:
| This reminds me of a time I was having a yelling match with a guy
| on reddit and he started calling me names. I google searched his
| username and he had used it across multiple sites, several being
| porn sites, and he also posted his reddit user name on his
| Facebook and a Facebook search I found his real name and pictures
| of him. When I called him by his real name and linked a picture
| of him he immediately changed his tune. In the end he and I both
| laughed and thought it was funny and he was more curious how I
| found all those thing. I told him he used the same username
| across multiple sites including Facebook. He said he was a lot
| younger and didn't think of those things when he originally did
| it. I removed any post where I used his name and tried not to dox
| him for others to see.
 
| Barrin92 wrote:
| It's good advice. The problem with anonymity in an environment of
| ubiquitous surveillance is that it's paradoxical. The point of
| anonymity is achieving freedom, but staying anonymous expends
| energy and makes you a target, so you can't actually do any
| things that anonymity was supposed to get you.
| 
| If what you really want is sovereignty, which is what most people
| confuse anonymity with, the goal is to be like what Ernst Junger
| called the _anarch_ (in contrast to the _anarchist_ ), which is
| someone who complies and renders herself indifferent to
| authority, rather than standing out and drawing attention.
| 
| A much better practice is to be as open as possible about the
| boring stuff, so you're not constrained and can do what everyone
| else does. Trying to be absolutist about anonymity is
| automatically like wearing a straitjacket.
 
  | roughly wrote:
  | > If what you really want is sovereignty, which is what most
  | people confuse anonymity with, the goal is to be like what
  | Ernst Junger called the anarch (in contrast to the anarchist),
  | which is someone who complies and renders herself indifferent
  | to authority, rather than standing out and drawing attention.
  | 
  | This works right up until the thing you want to do - or the
  | person you find yourself to be - is something authority is not
  | indifferent to.
 
  | chaxor wrote:
  | > expending energy
  | 
  | One thing I noticed out of many of the list items given in the
  | post here:
  | 
  | > Only use Tor > Always use a VPN > Never use Google -- only
  | DuckDuckGo > Disable JavaScript on your browser > Watch all
  | incoming and outgoing network calls regularly and scan for
  | abnormalities > Encrypt your laptop and any external drives >
  | End-to-end encrypted communication only > Don't use Gmail --
  | use ProtonMail > Never pay with cards. Use cryptocurrencies. >
  | Turn off all location services from your laptop and phone
  | 
  | Is that these can actually be solved with technology in a way
  | that these are the _default_ and popular behavior (as TLS 1.3
  | is in HTTPS). So it 's important that we realize that these
  | technologies (or something like them) are important and
  | _desired by everyone_ , but just need a bit of development to
  | work. Https and signal are great examples. Many of my parents
  | and grandparents are on signal now, because it's better than
  | most other apps (whatscrap, Facebook msg, imsg, etc). Is the
  | Loki network and Session better? Sure. Of course. But
  | grandparents aren't using it yet because not everyone they know
  | is on it yet like signal, just the tech knowledgeable, or many
  | of their grandchildren.
  | 
  | But ultimately, _None of this should require any effort
  | whatsoever_.
  | 
  | The rest of the points about concealing your name or not is
  | more obviously a choice by the user, as they have to provide it
  | knowingly - so it's less of an issue because they're more
  | likely aware of their choice.
  | 
  | > Don't buy domain names I'm not sure I understand this one -
  | anyone have an explanation?
 
    | cure wrote:
    | > Don't buy domain names I'm not sure I understand this one -
    | anyone have an explanation?
    | 
    | When you buy a domain name, you are supposed to supply
    | accurate ownership information. If you do not, the registry
    | can yank your domain when they discover that. Most registrars
    | obfuscate/hide the information in their whois service, but
    | they still need to have it to comply with the rules of the
    | registry. That information can be subpoenaed.
    | 
    | The purchase/renewal transaction(s) also leave a trail that
    | can be followed.
 
| blakesterz wrote:
| "Ultimately, anonymity comes down to one thing: Control. You
| should educate yourself on data privacy and make sure that you
| know what data you're sharing and what is possibly out there."
| 
| That's some REALLY good Solid advice.
 
  | touisteur wrote:
  | And be OK that sometimes some people don't want to interact
  | with anonymous randos... Credentials are not everything, but
  | they _are_ a filter on medias with large amounts of time-
  | wasters...
 
| chillycurve wrote:
| I have been afraid of sharing my ideas, post history, etc. in a
| way that could be easily traced back to my identity for years. I
| made sure my accounts and usernames bore no personally
| identifiable tid-bits. I use a VPN religiously (that won't
| change).
| 
| I've since decided that I am done with all that.
| 
| I was afraid my employer might question my Reddit posting history
| (they wouldn't.) I was worried someone who Googled me would think
| my past self was dumb (who cares).
| 
| Now my ideas are almost all public and growing more so by the
| day. I am working up the energy to start a personal blog, if
| anything just to document my ideas over time. I am adding my real
| name and email to my Github, HN, (not Reddit, yet, though it
| would not be hard to connect), IH, etc.
| 
| I want someone to be able to Google me and find my best work.
| 
| On the other hand, there are clearly cases and types of
| info/accounts that should remain private. I self-host as much as
| possible. I encrypt personal files before uploading. I have
| multiple Protonmail accounts. I use custom DNS, etc.
| 
| Ideas should be public. Information is a case by case basis, but
| I generally care a lot less than I used to.
 
  | chaxor wrote:
  | What do you use as a custom DNS?
 
| mindvirus wrote:
| The article touches on a good point: one mistake and you're out.
| It doesn't even have to be your mistake - you didn't choose to
| put your SSN out there after all, yet here we are.
| 
| This gave me a radical company idea, on the other end of the
| spectrum: spam as a service. Something that'll take your name,
| email, and other things and put it all over the internet in
| questionable and plausibly denial ways. That way, even when
| someone is trying to find things out about you, it'll be hard to
| find, and easy to deny. (I'm kidding of course).
 
  | [deleted]
 
  | _moof wrote:
  | _> It doesn 't even have to be your mistake_
  | 
  | This is the crucial piece. It doesn't matter how careful you
  | are; everyone who knows you has to be careful too. I have a...
  | well, I hesitate to use the word stalker, because that makes
  | them sound more motivated than they really are. But someone on
  | that spectrum, anyway. After a few years of being harassed I
  | managed to elude them. Then they found me again. You know how?
  | They pieced together two pieces of information posted publicly
  | by other people. That's all it took.
 
  | hammock wrote:
  | This idea exists but doesn't always work.
  | 
  | Example A: Apparent Nazi sympathizers planted inside the
  | Canadian protests- some people thought they were provocateurs,
  | others assumed they were legit and cast a negative light on the
  | protests overall
  | 
  | Example B: Hunter Biden's laptop (before it was acknowledged to
  | be real). Saying he was a target for disinformation campaigns
  | mostly worked
 
  | Liiiii wrote:
  | "Something that'll take your name, email, and other things and
  | put it all over the internet in questionable and plausibly
  | denial ways."
  | 
  | What if instead of spamming the correct information out, spam
  | slightly incorrect information out.
  | 
  | Correct address, incorrect middle initial, wrong birth month,
  | and a machine generated SSN would be from the right time
  | period, area number, but with an incorrect group and serial
  | number.
 
  | adelie wrote:
  | This is essentially the premise of Neal Stephenson's Fall or
  | Dodge in Hell.
 
    | [deleted]
 
  | propesh wrote:
  | Kidding aside, this is exactly how it will go down. Politician
  | in a scrape of financial corruption or etc.? Deepfake s*x video
  | or other viral blatant misinformation & obfuscation; what's the
  | risk? Upside, no one knows what to believe. Exactly what
  | various "countries" are doing. It will be extreme; to the point
  | where, don't believe half of what you actually see.
 
    | bee_rider wrote:
    | It should be noted that this is a pretty bad end state.
    | Reporting is already an extremely weak force for preventing
    | corruption on the part of the powerful. Journalists entering
    | a state of total uselessness is only going to make the
    | problem bigger.
    | 
    | In a realm of total bullshit the winners are the one who are
    | best at lying. "I don't know what to believe and everyone
    | involved is probably corrupt" is usually just an excuse to
    | disengage and follow base instincts.
 
  | bugBunny wrote:
  | I guess none of these suggestions really work without the last
  | one "Move to Brazil and live in the rainforest" :)
 
    | hammock wrote:
    | Even that didn't work for John McAfee
 
      | LinuxBender wrote:
      | To be fair he never lived in a rain forest. He was always
      | around people and often managed to upset many of them.
 
  | Damogran6 wrote:
  | Name it something catchy...like equiphax
 
    | HPsquared wrote:
    | "equip hax"
 
| alliao wrote:
| Photos easily pinpoint you too, any pictures you upload + user
| name is pretty much game over
 
| nickstinemates wrote:
| The conclusion is a weird one, given the premise. The crux of the
| argument is basically true. Its an all or nothing proposition.
| 
| Or you can lead a double life. One for your public persona, where
| you don't care at all about security, and your real persona,
| where you do. This has been my approach on the internet since
| basically it started and handles were a common thing.
 
  | caslon wrote:
  | With that in mind, you just might have posted this comment on
  | the wrong account.
 
  | ReactiveJelly wrote:
  | > The crux of the argument is basically true. Its an all or
  | nothing proposition.
  | 
  | No, it's not.
  | 
  | Every online account (that doesn't involve money or legal
  | paperwork) can have its own name. Then you can decide whether
  | to have _some_ accounts ultimately link back to your legal
  | name, or all accounts, or none.
  | 
  | > Or you can lead a double life. ... This has been my approach
  | on the internet since basically it started and handles were a
  | common thing.
  | 
  | That's exactly what I'm doing, and neither of us are living in
  | the Brazilian rainforest, so anonymity really is a spectrum.
 
    | numpad0 wrote:
    | > Then you can decide whether to have _some_ accounts
    | ultimately link back to your legal name,
    | 
    | No, _you_ don 't. Someone else could, if there is one with
    | high enough affection to you. I think you'll have to think of
    | bulk ingestion and on-prem processing to be sure your
    | activities won't trace back to you.
 
  | aqme28 wrote:
  | I don't think it's all or nothing. Look at anonymous public
  | personas like Banksy or Dril. People have tracked them down,
  | and you can look up who they are if you try.
  | 
  | But for the most part these people are anonymous, and get to
  | enjoy some of the benefits of that.
 
| oh_sigh wrote:
| Alex Cazes had bad op-sec. His #2, DeSnake, didn't, and is still
| alive and well and has restarted his marketplace and gives
| anonymous interviews to media outlets:
| 
| https://www.wired.com/story/alphabay-desnake-dark-web-interv...
 
| kwhitefoot wrote:
| The title is misleading, clickbait. The article is in fact about
| why it probably isn't necessary to be anonymous and even then
| says nothing particularly important.
 
  | djur wrote:
  | A title not precisely describing the premise and conclusion of
  | the article is neither misleading nor clickbait. The article is
  | about online anonymity. It could be "On being anonymous" or "To
  | be anonymous"; "Be anonymous" is fine, too.
 
| sampo wrote:
| Maybe Eric S. Raymond's advice from 21 years ago is no longer
| true in today's internet:
| 
| > Concealing your identity behind a handle is a juvenile and
| silly behavior characteristic of crackers, warez d00dz, and other
| lower life forms. Hackers don't do this; they're proud of what
| they do and want it associated with their real names. So if you
| have a handle, drop it. In the hacker culture it will only mark
| you as a loser.
| 
| http://www.catb.org/~esr/faqs/hacker-howto.html#style
 
  | YaBomm wrote:
 
  | hkon wrote:
  | Easily. It was advice for another time.
 
| vmception wrote:
| Exhibit A: Was Mary only _from_ Syracuse, or was Kash, kg.dev,
| using dating apps _in_ Syracuse
| 
| well, I got tired of caring already, but maybe others havent.
 
| alfiedotwtf wrote:
| Good article!
| 
| As an experiment, a few years ago I put my mobile phone number on
| my blog, and to date I've only received 2 anonmous messages on
| Signal but no calls besides recruiters.
| 
| The old adage "No one is thinking about you as much as they are
| thinking about themselves" is true.
| 
| While it's good to practice good security hygiene, be mindful of
| also being practical.
 
| ReactiveJelly wrote:
| Agreed. Anonymity is a spectrum. Just like personal finance, most
| people haven't even begun to assess what state they're in.
| 
| You should not accept the state you're in without knowing what
| state that is. Most people should have more anonymity than
| they're giving themselves.
| 
| "Defend your rights. Nobody else will do it for you."
| 
| -- ReactiveJelly
 
| DantesKite wrote:
| There's a middle ground somewhere here, in between "Don't be a
| criminal" and "Don't be stupid."
| 
| I don't think the lesson we should take from AlphaBay is "Take
| better privacy safeguards" but "Don't set up an illegal dark web
| operation."
 
| underwater wrote:
| I mix @realname and @pseudonym accounts. I'm generally pretty
| careful about what I post under my real name and less so under an
| alias.
| 
| However, over time I drop enough clues that people could figure
| my real identity with a little work. That leaves me with the
| worst of both worlds. It seems safest to assume that your
| identity is always tied to everything you do online.
 
  | can16358p wrote:
  | I think with ML getting smarter and people posting (either with
  | their identity or anonymously) more and more content, it will
  | be trivial to crossmatch anonymously posted content to real
  | identities by ML examining "styles" of text: from punctuation
  | to sentence structure to vocabulary use, and it will have an
  | accurate estimation of who that "anonymous" person is.
 
    | kibwen wrote:
    | This would be pretty easy to counter by having a tool that
    | would analyze any comment you post and strip all the
    | identifying marks out of it; no punctuation other than
    | periods, no complex or compound sentences, all words replaced
    | by equivalents from the list of the most common thousand
    | English words, all voices and tenses normalized, no
    | paragraphs, no capitalization, etc.
 
| numpad0 wrote:
| Notably missing aspect is precise time of events.
| 
| Personas like someone who posts content during 08:34:40 -
| 09:23:23 except 08:43:30-08:55:23, never seems to be active
| during 22:00 - 06:00, can be narrowed down to something like a
| person commuting via bus route A from stop B to C changing to a
| train route from C to D through passageway E in the station.
| 
| From there you can look for a man looking down at a phone, or
| couple information with other factors, or throw in a bait like a
| giant stinking dead fish or a rare and loud car in front of him
| and watch for responses he'd make. IMSI catchers and Bluetooth
| scanners can be useful as well if your adversaries are
| resourceful. Time and location of transmissions and time of
| receptions can be correlated, in theory.
| 
| This type of attacks can't be mitigated on fast-paced social
| media at all; both posts and requests has to be queued and
| obfuscated for time.
 
  | mhitza wrote:
  | That's a bultin feature of messaging systems like I2P-bote
  | (running on I2P darknet). It's been a while since experimenting
  | with Bitmessage but I think they queue/batch messages as well.
  | But for forum like software that's definitely true, can't
  | easily have variable delayed posting.
  | 
  | Another aspect that's important and often ignored, is writing
  | style anonymization. You practically want an offline tool, that
  | removes idiosyncrasies from the text you write and makes it
  | sound as bland as possible.
  | 
  | edit:
  | 
  | A related story. Around 2010-2012 I was working for a company,
  | and I was part of a somewhat managerial group. At one point we
  | decided to pull in direct employee feedback in an anonymous
  | free-text form. Due to their writing style being reflective on
  | the way they spoke, it was possible to point exactly who wrote
  | what message. Of course, few exceptions existed, I didn't
  | personally know all the employees in the company.
 
| chayesfss wrote:
| Share accounts with others, widely. No reason not to unless
| you're trying to build up some type of e-cred with your other
| account.
 
| indigodaddy wrote:
| Feels like the article is slanting this Alex guy as a hero of
| sorts? I don't like the tone of the article and wish I hadn't
| clicked on it now..
 
| ChrisMarshallNY wrote:
| I'm sort of the opposite.
| 
| I make sure that I can be found and attributed. I deleted my last
| anonymous account, a couple of years ago. In the Days of Yore, I
| was pretty much "Dick From the Internet." A real neckbeard troll.
| 
| There's a lot of reasons that I do it. The biggest, is that I
| want to be in control of my narrative. I learned from a couple of
| folks that are _really good_ at curating their SEO results.
| 
| Also, these days (for a change), I'm pretty well-behaved. Doing
| it this way, helps to keep it that way.
 
| srmarm wrote:
| Privacy is on a spectrum, but is also compounded by time and once
| the cats out the bag it can be impossible to turn back. In the
| example given of Alex Cazes he could change the from email but
| the damage was already done - there's no way to recall the emails
| already sent that led a trail back to him.
 
  | upofadown wrote:
  | The article states that _anonymity_ is on a spectrum. Privacy
  | is a different issue. You can lead an entirely private but non-
  | anonymous life.
 
| formerly_proven wrote:
| Be anonymous
| 
| Become ungovernable
 
| jefftk wrote:
| The article presents a spectrum, dismisses both extremes, and
| advocates that people aim for the middle. The problem is, you may
| think you are hanging out in the middle, but you probably have
| much less privacy than you think you do. Even if you are making
| the right choices for today, you can't trust that the future will
| keep things private (advances in ML, ubiquitous surveillance) and
| you don't know that futures isn't here yet.
| 
| Personally, I hang out at the fully open end of that spectrum.
| This has worked out pretty well for me; I don't think I've run
| into any downsides.
 
| psacawa wrote:
| > Don't buy domain names
| 
| Can anyone explain this? Assuming your data isn't in the WHOIS
| record, why does this increase your exposure more than any other
| company knowing your name?
| 
| A search shows up options for anonymous domain name services.
 
| ur-whale wrote:
| I would _strongly_ advise anyone who really wants to be anonymous
| on the internet such as a freedom activist in a totalitarian
| country, _not_ to follow the advice listed at the end of the
| article.
| 
| Or rather: these are very basic and very naive recommendations,
| certainly good first steps, but absolutely nowhere near enough to
| guarantee strong anonymity on the internet.
| 
| Remaining truly anonymous on the net is _extremely_ hard,
| especially in these days where ML can be used to statistically
| narrow down and pinpoint who wrote a specific piece of text only
| based on things like use of punctuation, vocabulary, sentence
| structure and style.
 
  | kgeist wrote:
  | >especially in these days where ML can be used to statistically
  | narrow down and pinpoint who wrote a specific piece of text
  | only based on things like use of punctuation, vocabulary,
  | sentence structure and style.
  | 
  | I think you can fight ML with ML - for example, use GPT-like
  | algorithms generate text for you. But then you must also be
  | careful about when you post - I remember some of the Russian
  | trolls were exposed because their bursts of activity coincided
  | with 9am-6pm Moscow time. So you have to use a random number
  | generator decide when to appear online if you want to hide your
  | location. There's always something which can narrow down their
  | search. One small mistake and you are busted. They don't even
  | need to pinpoint you exactly, if it's narrowed down to
  | 1000-10000 people who meet the criteria, they already win
  | because they have the capacity to go through the list one by
  | one and eventually find you.
 
  | Swenrekcah wrote:
  | Would the solution be a digital version of the old newspaper
  | cutout ransom letter?
  | 
  | Generate via GPT-3 a text giving roughly the impression you
  | want to make and then copy/paste sentences from online news
  | media if you need the names of particular persons or events.
  | 
  | Would be rather crude though, but less tedious than literally
  | cutting and pasting letters was.
 
    | kgeist wrote:
    | I had a similar idea in a sibling post. But this only works
    | if you basically have a secret alter ego which has nothing to
    | do with your work/public persona, because otherwise they can
    | match your favorite topics in those GPT-3 generated texts to
    | your interests in real life, by factoring in also other
    | little facts, like when you usually appear online, etc. It's
    | probably enough to protect the average Joe but imho not
    | enough to protect a targeted freedom activist, unless their
    | activism is their alter ago and publicly they aren't known to
    | be activists. Otherwise their every step is monitored in a
    | typical dictatorship and it's not that hard for them to
    | connect the dots who was the author of a certain message.
 
| m348e912 wrote:
| I don't know if dating app users understand that it doesn't take
| much information to find out who they really are. Sometimes all
| that's needed is a first name, profession, or university is
| enough if one of the three is somewhat unique for the area. If
| you're concerned about privacy on dating apps, you're better off
| being really vague about basic aspects of your life, or trying a
| bar instead :)
 
| Ansil849 wrote:
| > Don't use macOS or Windows -- only Linux
| 
| > Move to Brazil and live in the rainforest
| 
| Juvenile, snarky, irreverent and irrelevant advice I'd expect to
| read on a 12 year old's Reddit post.
 
  | retrac wrote:
  | > I don't know about you, but I don't want to do all of that.
  | [...] I don't recommend being on either extreme of this
  | spectrum.
  | 
  | It's a list of extreme techniques for protecting ones' identity
  | online. Of course, completely sanitizing your online presence
  | is difficult, and probably unnecessary. I thought the two lists
  | were a nice rhetorical framing - present a dilemma (total
  | openness vs. total anonymity) and then wiggle out of it to a
  | compromise.
 
    | Ansil849 wrote:
    | > It's a list of extreme techniques for protecting ones'
    | identity online.
    | 
    | The items I quoted do nothing to protect ones' identity
    | online. Snark is only effective if relevant.
 
      | RustyConsul wrote:
      | holy cow! I literally laughed out loud when i read the
      | rainforest remark. Chill out dude, you're reading something
      | called 'Thoughts' by some random dude on the internet lol
 
      | AitchEmArsey wrote:
      | The closed nature of MacOS and Windows means that you have
      | no guarantees (and no audit mechanism) to determine how
      | much the machine is passing your data back to HQ. As the
      | post very clearly states, most people don't need to care -
      | but someone with extreme paranoia has only one obvious
      | choice here.
      | 
      | Your aggressive negativity is far less interesting than
      | this blog, and serves no purpose whatsoever.
 
  | i_am_proteus wrote:
  | That might be why the next thing in the article is:
  | 
  | >I don't know about you, but I don't want to do all of that.
 
  | can16358p wrote:
  | Linux part is perfecly valid IMO, though the rainforest was I
  | think a bit deliberate exaggeration.
 
    | fsflover wrote:
    | Linux is definitely more anonymous than Windows/Mac, but if
    | you seriously want to be anonymous, you should use Qubes with
    | Whonix.
 
___________________________________________________________________
(page generated 2022-02-20 23:00 UTC)