Want to stay anonymous on the Internet? Teach you how to achieve with Linux!

Source: Internet
Author: User
Tags linux mint

Want to stay anonymous on the Internet? Teach you how to achieve with Linux!

The Information age brings great convenience and benefits to our lives, and it also poses great risks. On the one hand, people can basically access all the information and knowledge that is known when they click a few buttons, on the other hand, if this power falls into the hands of individual criminals, it will cause great destruction and disaster. Brother Lian Education in this article, we will introduce several steps to protect private information on the Internet.

Before we get started, the only way to make sure your computer is safe and private is to disconnect from the internet and turn off the power. Because the device connected to the Internet is impossible to be absolutely hundred percent safe. There is always a way to avoid security mechanisms, even if not, there will be people continue to develop tools to find new ways. So, the guiding principle here is not to change several settings on a computer, you can build an impregnable fortress, but to set up as many obstacles as possible to make it difficult for any potential attacker or spy to access your system or private information.

You can use several Linux tools to be as anonymous as possible ( brother Lian Www.itxdl.cn: it's getting harder to do now, but if privacy is important to you, you already know the importance of heroic resistance).

1.Tails OS

The first tool we want to introduce is Tails OS, but saying it's a "tool" might be a misnomer, because Tails is a complete Linux distribution, not just a tool. Tails is designed to be an anonymous, self-destruct operating system, and once you run out of it, it erases any traces of existence. Obviously, it's not a good fit for everyday distribution, but if you have something you need to access online, you want to stay private, or you want to browse anonymously, then Tails is a great choice. Tails is completely run as a Live system, and once shut down, it clears itself, rather than permanently installing it on the hard drive.

You can download the latest in the link aboveTails ISOfile, burn it toDVDor copy to bootableU(the latter is much easier, takes a shorter time, and consumes less space). LinuxThere are several tools to burnDVD, mainlyBraseroand theDeVeDe. Or, if you prefer to make a bootableUdisk, you will findUNetbootinideal (or can be used at the end of theDD"command, if you are familiar with the command. Once theTailsCopy to bootable media, just use it to start the computer, just like installing a new operating system or runningLiveSystem.

Tails website seems to only allow you to download Tails with Firefox or Tor browser . I tried to Download the ISO file via Google Chrome when it told me that the browser was not supported. It also forces you to install Firefox attachments, which, once installed, will automatically validate the ISO download software using a checksum verification mechanism . This actually implements a good security measure because it ensures that you won't get a damaged Tails, or there might be a security hole in it, like Linux Mint That happens.

Once you start to enter into the Tails, it will guide you through some initial installation steps, which are fairly straightforward and intuitive. If you have questions, check the documentation for instructions. a key feature of Tails is that all Internet connections are automatically routed through the Tor Network, further enhancing anonymity. If you're not familiar with The Tor network, we'll talk about it later when we explore the tor Browser. Another important feature built into the Tails is MAC address spoofing, which we're exploring Macchanger Tool, you will have a more in-depth introduction.

In a word, if you need a temporary The Live operating system, once shut down, will erase itself (think of the movie "Mission Spy" in the self-destruction of information, but not so exaggerated), then Tails is the perfect choice. For more in-depth knowledge of Tails, be sure to visit the official website.

2.Tor Browser

the next tool we want to introduce is Tor Browser, which is The product of the Tor Project, and the Organization is committed to ensuring online privacy and security. As mentioned above, this tool is already built into the Tails os , but you can also install it on any operating system you like because they have Windows,Mac and the Linux version. As far as I know, it is not possible to find it in any of the official Linux repositories, so you need to download it from the above URL link.

with an ordinary internet connection, traffic is transferred from the host requesting the information directly to the server that provides the requested information, usually with a few additional hops between the server and the server so that traffic is transferred to the intended destination. However, this may be easy to track down even if you delete the browsing history burn. Sowhat Tor does is to route your traffic to a number of different intermediary servers (called nodes) within the Tor network, which are meant to hide the initial source of traffic and then exit through an exit node Tor Network and finally arrive at the desired destination. As you might expect, this can lead to slower browsing, but if privacy matters, learn to sacrifice some speed for anonymous internet browsing. It is recommended that you use the Tor browser only if you have a specific task or some task that requires extra care from the user, rather than as a daily browser.

Tor Browser is a branch of Firefox, so you can install preferred attachments such as Adblock Plus,ublock Origin and DownThemAll , but be aware that installing any accessory may weaken Tor 's security and will put you at risk so that the purpose of using it is gone. Be careful about what you choose to install. In fact,Tor strongly recommends that you do not install any browser plugins. Please note: If you happen to live in an area where the internet is censored,Tor Browser will also avoid Web filters.

Some hidden sites (also called "onions") use hidden URLsthat can only be accessed through the Tor Browser. For example, Silk Road , which is now closed, is one of the "onion" sites, as it can only be accessed through the Tor Browser. If you try to access these links through a regular browser, you won't find them. In addition, some websites will find out if traffic is coming through the Tor Network, so it is almost impossible to have an anonymous Twitter account, because if you try to create a Twitter account and pass Tor Using your account, Twitter will ask you for a phone number. If anyone knows that a one-time mobile phone without the need to purchase a prepaid telephone can avoid this restriction, please leave a message.

It is also worth mentioning that Tor Browser is not the magic "Hide me Up" button. It may still be tracked by your browsing habits. Be sensible and prudent, and remember that every action performed by a computer will leave traces on the network, whether you like it or not.

It is also necessary to point out that, recently, The FBI found and disclosed a bug in the Tor browser that allowed them to track and arrest suspects. So, unless the Tor project team discovers and fixes the vulnerability, Tor is still weak and vulnerable, but it still has a big advantage over regular browsers. Because of this, it may be a bad idea to use Tor alone and not run the Tails OS at the same time . Must be used with caution.

There's also a mobile on Android The Tor solution, called Orbot, uses the orfox Browser, on Google Play and can be downloaded on f-droid.

as a result of improved the security of WEB traffic, virtual private network (VPN) is also worth attention.

3.macchanger and MAC Address spoofing

when it comes to Internet traffic, there are two types of addresses: IP address and MAC address. You may already be familiar with IP addresses, but you may not know much about MAC addresses.

IP addresses are typically assigned automatically by routers or DHCP servers on the network (a DHCP server built into the home router ). This is basically your network address, which can change at any time. You can do this if you want to set an immutable static IP address instead of assigning an address automatically (this is usually appropriate for printers and other shared peripherals on the network.) In addition to the external IP addresses that are actually used for all incoming and egress traffic (if you want to see an external address, you may wish to go to ipchicken), you will usually have an internal IP address, which exists on the local network (possibly 192.168.1.x or 192.168.0.x).

However, in addition toIpaddress, there are alsoMACaddress. Not likeIPaddress,MACThe address is physically cured to a network device and cannot be changed. Because of this,MACThe address is also called the hardware address. Simultaneous use of Internet trafficIPAddress andMACAddress to guide where the data is routed correctly. Therefore, in addition to usingTorBrowser HideIPoutside the address, useMACAddress Spoofing ConcealmentMACThe address is also a good idea.

Again , it can't be like a change.Ipaddress changes like that .MACaddress, but you can cheatMACaddress, so it seems to be a different address. As mentioned earlier, this has been built intoTails OS, but you can do this on other distributions as well. My favorite tool isMacchanger, this is a simple terminal command that allows you to cheatMACaddress, as long as you think it is appropriate. If the tool is not found in the Official Software library (sudo apt-get install Macchanger), you can fromGitHuborGNUwebsite DownloadMacchanger.

The simplest way to use Macchanger is to use the - R(random) flag to create a random MAC address, but from what I use Ubuntu 14.04 LTS , I've never been able to do that. The command executes, but the MAC address does not actually change at all. But that was a long-ago event, andMacchanger seems to have been updated since then. As of the time of this article, it seems to have no problem with Linux Mint, and developers have even added an automatic feature that will change your MAC address whenever the device restarts. So it's easier than ever.

Once your device restarts, now it seems to have a different MAC address, which means that the address has been spoofed. Plus the Tor browser and / or Tails OSHelp to hide your online identity as much as possible.

4. Full- disk encryption

Full-disk encryption is a fairly complex process. In a word, if you want to encrypt the data, the full encryption is not the second choice, because if there is no encryption phrase, no one can physically access any information on your hard drive.

There are many ways to manually configure full-scale encryption, but they are beyond the scope I can understand. As a result, the easiest way to install full-disk encryption is to install Linux Distributions in the process.

If you use Ubuntu or Linux mint, you will notice that during the installation process, when you see the "Installation Type" screen, the "install ubuntu/linux Mint" There are two checkboxes below that show "encrypt the new ubuntu/mint installation system to ensure security" and "combine LVM(logical Volume management) and new Ubuntu/mint Installation System ". I usually tick these two boxes to let ubuntu/mint Handle the rest of the task. However, be aware that if you prefer to set your own custom partitioning scheme, you cannot do this here because this option will cause ubuntu/mint to handle the partition for you. You can still go to "other methods" and install your own encrypted partition, but that would be a bit more complicated.

If you only want to encrypt some folders on a Linux system, another handy utility is encfs, and you should be able to find it in the official repositories. encfs allows you to create an encrypted folder that cannot be opened and viewed without an encrypted password. Note: This does not leave the encrypted folder completely out of the system, because the smart person can still find the location of the encrypted folder (if you know where to look for it, you might be able to figure it out), but if you don't have an encrypted password, you can't access its contents.

Want to stay anonymous on the Internet? Teach you how to achieve with Linux!

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.