Want to stay anonymous on the Internet? Teach you how to achieve with Linux!

Source: Internet
Author: User
Tags anonymous linux mint

The Information Age brings great convenience and benefits to our lives, and it also poses great risks. On the one hand, people can basically access all the information and knowledge that is known when they click a few buttons, on the other hand, if this power falls into the hands of individual criminals, it will cause great destruction and disaster. Brother Lian Education in this article, we will introduce several steps to protect private information on the Internet.

Before we get started, the only way to make sure your computer is safe and private is to disconnect from the internet and turn off the power. Because the device connected to the Internet is impossible to be absolutely hundred percent safe. There is always a way to avoid security mechanisms, even if not, there will be people continue to develop tools to find new ways. So, the guiding principle here is not to change several settings on a computer, you can build an impregnable fortress, but to set up as many obstacles as possible to make it difficult for any potential attacker or spy to access your system or private information.

You can use several Linux tools to remain anonymous as much as possible (

Brother Lian www.lampbrother.net

Reminders: It is also more difficult to do in the present, but if privacy is important to you, you already know the importance of heroic resistance.

1.Tails OS

The first tool we want to introduce is Tails OS, but saying it's a "tool" might be a misnomer, because Tails is a complete Linux distribution, not just a tool. Tails is designed to be an anonymous, self-destruct operating system, and once you run out of it, it erases any traces of existence. Obviously, it's not a good fit for everyday distribution, but if you have something you need to access online, you want to stay private, or you want to browse anonymously, then Tails is a great choice. Tails is completely run as a Live system, and once shut down, it clears itself, rather than permanently installing it on the hard drive.

You can download the latest in the link above Tails the ISO file, burn it to a DVD or copy it to a bootable USB flash drive (the latter is much easier, takes less time, and has fewer wasted space). Linux has several tools to burn DVDs, mainly Brasero and DeVeDe. Or, if you prefer to make a bootable USB flash drive, you will find UNetbootin ideal (or you can use the "dd" command at the terminal if you are familiar with the command). Once the Tails is copied to the bootable media, just use it to start the computer, just like installing a new operating system or running a live system.

Tails website seems to only allow you to download Tails with Firefox or Tor browser. I tried to download the ISO file via Google Chrome when it told me that the browser was not supported. It also forces you to install Firefox attachments, which, once installed, will automatically validate the ISO download software using a checksum verification mechanism. This actually implements a good security measure because it ensures that you won't get a damaged Tails, or there might be a security hole in it, just like what happens to Linux Mint.

Once you start to enter into the Tails, it will guide you through some initial installation steps, which are fairly straightforward and intuitive. If you have questions, check the documentation for instructions. A key feature of Tails is that all Internet connections are automatically routed through the Tor network, further enhancing anonymity. If you're not familiar with the Tor network, we'll talk about it later when we explore the Tor browser. Another important feature built into the Tails is MAC address spoofing, which we'll look at in more detail when exploring the Macchanger tool.

In a word, if you need a temporary The Live operating system, once shut down, will erase itself (think of the movie "Mission Spy" in the self-destruction of information, but not so exaggerated), then Tails is the perfect choice. For more in-depth knowledge of tails, be sure to visit the official website.

2.Tor Browser

the next tool we want to introduce is Tor Browser, which is the product of the Tor Project, and the Organization is committed to ensuring online privacy and security. As mentioned above, this tool is already built into the Tails OS, but you can also install it on any operating system you like because they have versions for Windows, Mac, and Linux. As far as I know, it is not possible to find it in any of the official Linux repositories, so you need to download it from the above URL link.

with an ordinary internet connection, traffic is transferred from the host requesting the information directly to the server that provides the requested information, usually with a few additional hops between the server and the server so that traffic is transferred to the intended destination. However, this may be easy to track down even if you delete the browsing history burn. Sowhat the Tor browser does is route your traffic to a number of different intermediary servers (called nodes) within the Tor network, which are meant to hide the initial source of traffic, then exit the Tor network via an exit node and arrive at the desired destination. As you might expect, this can lead to slower browsing, but if privacy matters, learn to sacrifice some speed for anonymous internet browsing. It is recommended that you use the Tor browser only if you have a specific task or some task that requires extra care from the user, rather than as a daily browser.

Tor Browser is a branch of Firefox, so you can install preferred attachments such as Adblock Plus, Ublock Origin and DownThemAll, but know that any attachment installed may weaken Tor's security, It will put you at risk so that the purpose of using it is gone. Be careful about what you choose to install. In fact, Tor strongly recommends that you do not install any browser plugins. Please note: If you happen to live in an area where the internet is censored, Tor browser will also avoid WEB filters.

Some of the hidden sites (also called "onions") use a concealed URL, accessible only through the Tor browser. For example, Silk Road, which is now closed, is one of the "onion" sites, as it can only be accessed through the Tor browser. If you try to access these links through a regular browser, you won't find them. In addition, some Web sites will find that traffic is not coming through the Tor network, so it is almost impossible to have an anonymous Twitter account, because if you try to create a Twitter account and use your account with Tor, Twitter will ask you for a phone number. If anyone knows that a one-time mobile phone without the need to purchase a prepaid telephone can avoid this restriction, please leave a message.

It is also worth mentioning that Tor Browser is not the magic "Hide me Up" button. It may still be tracked by your browsing habits. Be sensible and prudent, and remember that every action performed by a computer will leave traces on the network, whether you like it or not.

It is also necessary to point out that, recently, The FBI found and disclosed a bug in the Tor browser that allowed them to track and arrest suspects. So, unless the Tor project team discovers and fixes the vulnerability, Tor is still weak and vulnerable, but it still has a big advantage over regular browsers. Because of this, it may be a bad idea to use Tor alone and not run the Tails OS at the same time. Must be used with caution.

There's also a mobile on Android The Tor solution, called Orbot, is available for download on Google Play and f-droid using the Orfox browser.

as a result of improved The security of WEB traffic, virtual private Network (VPN) is also worth attention.

3.macchanger and MAC address spoofing

when it comes to Internet traffic, there are two types of addresses: IP address and MAC address. You may already be familiar with IP addresses, but you may not know much about MAC addresses.

IP addresses are typically assigned automatically by routers or DHCP servers on the network (a DHCP server built into the home router). This is basically your network address, which can change at any time. You can do this if you want to set an immutable static IP address instead of assigning an address automatically (this is usually appropriate for printers and other shared peripherals on the network.) In addition to the external IP addresses that are actually used for all incoming and egress traffic (if you want to see an external address, you may wish to go to Ipchicken), you will typically have an internal IP address that exists on the local network (possibly 192.168.1.x or 192.168.0.x).

However, in addition to IP address, there is also a MAC address. Unlike IP addresses, MAC addresses are physically cured to network devices and cannot be changed. Because of this, the MAC address is also called the hardware address. Internet traffic uses both an IP address and a MAC address to guide where the data is routed correctly. Therefore, in addition to using the Tor browser to hide the IP address, it is also a good idea to use MAC address spoofing to hide the MAC address.

Again , it can't be like a change. The IP address changes the MAC address, but you can cheat the MAC address, so it seems to be a different address. As mentioned earlier, this is already built into the Tails OS, but you can do so on other distributions as well. My favorite tool is Macchanger, which is a simple terminal command that allows you to cheat MAC addresses as long as you feel fit. If the tool is not found in the official repositories (sudo apt-get install macchanger), you can download Macchanger from GitHub or the GNU website.

The simplest way to use Macchanger is to use the-R (random) flag to create a random MAC address, but from my use of Ubuntu 14.04 LTS, I've never been able to do that. The command executes, but the MAC address does not actually change at all. But that was a long-ago event, and Macchanger seems to have been updated since then. As of the time of this article, it seems to have no problem with Linux Mint, and developers have even added an automatic feature, so your MAC address will change every time the device restarts, making it easier than ever.

Once your device restarts, now it seems to have a different MAC address, which means that the address has been spoofed. Plus the Tor browser and/or Tails OS Help to hide your online identity as much as possible.

4. Full- Disk encryption

Full-disk encryption is a fairly complex process. In a word, if you want to encrypt the data, the full encryption is not the second choice, because if there is no encryption phrase, no one can physically access any information on your hard drive.

There are many ways to manually configure full-scale encryption, but they are beyond the scope I can understand. As a result, the easiest way to install full-disk encryption is to install Linux distributions in the process.

If you use Ubuntu or Linux Mint, you will notice that during the installation process, when you see the "Installation Type" screen, under "Install Ubuntu/linux Mint" There are two check boxes, respectively, "Encrypt the new Ubuntu/mint installation system to ensure security" and "combined use LVM (logical volume management) and the new Ubuntu/mint installation System ". I usually tick these two boxes to let Ubuntu/mint handle the rest of the task. However, be aware that if you prefer to set your own custom partitioning scheme, you cannot do this here because this option will cause Ubuntu/mint to handle the partition for you. You can still go to "other methods" and install your own encrypted partition, but that would be a bit more complicated.

If you only want to encrypt Some folders on a Linux system, another handy utility is ENCFS, and you should be able to find it in the official repositories. ENCFS allows you to create an encrypted folder that cannot be opened and viewed without an encrypted password. Note: This does not leave the encrypted folder completely out of the system, because the smart person can still find the location of the encrypted folder (if you know where to look for it, you might be able to figure it out), but if you don't have an encrypted password, you can't access its contents.



Want to stay anonymous on the Internet? Teach you how to achieve with Linux!

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.