Bitcoin Forum
June 18, 2024, 04:34:04 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Maintaining Phone Privacy  (Read 618 times)
subwoofer12 (OP)
Sr. Member
****
Offline Offline

Activity: 251
Merit: 253



View Profile
April 09, 2016, 09:22:47 AM
 #1

How do you maintain privacy on your phone?

I show my methods of using a VPN and Tor in this video
https://www.youtube.com/watch?v=aEMKUYrWQ68

Another one of the many reasons I hate iOS, only shitty 3rd party apps exist for using Tor

Note that if you want transparent proxying, 'Torifying' of all apps, you'll need to root your phone with SuperSU
Additionally to make sure I'm NSA-proof, I only communicate with my contacts using ChatSecure

I know some may criticize me for using a VPN provider based in the United States, but I trust TorGuard and have been using their service for years.
They also keep no logs whatsoever https://torrentfreak.com/vpn-anonymous-review-160220/

I also realize that my e-mail address is shown in the video, but that account I just made for the demo Wink

Apps mentioned in this post/shown in video:

TorGuard my preferred VPN provider, I also like Private Internet Access
Orbot required to connect to Tor
Orfox  any other browser can be used but I recommend Orfox. Orfox is the mobile equivalent of Tor Browser
SuperSU root manager
ChatSecure encrypted chat
NewBet
Hero Member
*****
Offline Offline

Activity: 966
Merit: 500


View Profile
April 09, 2016, 09:48:16 AM
 #2

LoL , why do you need to hide so much? You sound like a Anonymous , hacking everywhere...
The only apps i used to protect my privacy is CM Security, it protected me from malware that trying to steal my privacy information, credit card and etc
subwoofer12 (OP)
Sr. Member
****
Offline Offline

Activity: 251
Merit: 253



View Profile
April 09, 2016, 09:55:39 AM
 #3

LoL , why do you need to hide so much? You sound like a Anonymous , hacking everywhere...

Haha  Cheesy

In the US we have this horrible institute which is know as the NSA  Wink

A movie I can recommend is Citizenfour
NeilLostBitCoin
Sr. Member
****
Offline Offline

Activity: 882
Merit: 303


View Profile WWW
April 09, 2016, 10:10:24 AM
 #4

Additionally, FBI now bypassed the iPhone 5-4, but not the iPhone 5s - 6s. I think VPN is enough to maintain your privacy. 
NewBet
Hero Member
*****
Offline Offline

Activity: 966
Merit: 500


View Profile
April 09, 2016, 10:52:19 AM
 #5

LoL , why do you need to hide so much? You sound like a Anonymous , hacking everywhere...

Haha  Cheesy

In the US we have this horrible institute which is know as the NSA  Wink

A movie I can recommend is Citizenfour
Now i understand, obviously I'm not from US
so i don't think i have this kind of problem
one more questions, did they actually invasion privacy?
subwoofer12 (OP)
Sr. Member
****
Offline Offline

Activity: 251
Merit: 253



View Profile
April 11, 2016, 08:13:52 AM
 #6

one more questions, did they actually invasion privacy?

By far. The NSA directly violated the 4th amendment.

http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order
https://theintercept.com/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/

I think VPN is enough to maintain your privacy.  

The VPN is just to hide from my ISP that I'm using Tor.

There's several ways to set this up, you can do VPN before Tor



VPN after Tor



Now if you really wanna go all out you can do three layers
VPN > Tor > VPN > WWW

Here's how you'd set this up

Get a router that automatically connects to a VPN https://torguard.net/store/
Setup a Tor wifi hotspot on Raspberry Pi https://learn.adafruit.com/onion-pi

So the Raspberry Pi has the Ethernet cable plugged into it and the wifi it spits out is going over the Tor network
Since your router connects to the VPN immediately your ISP has no clue you're using Tor

Now simply connect to the wifi hotspot https://learn.adafruit.com/onion-pi/test-it
Setup another VPN on your computer

Here's the advantages of this 'triple encryption' setup

  • The first VPN hides the fact you are using Tor
  • You get the anonymity of the Tor network
  • The second VPN protects you from malicious exit nodes

Quote
Routing your traffic through Tor to your VPN has the major benefit of hiding traffic from malicious exit nodes. Because traffic is encrypted with the VPN before entering the Tor network, and because it is decrypted after leaving the Tor network, any exit relays that are snooping your traffic will see nothing but noise. The risks of VPN logging are also reduced, as any logs will have a Tor Exit IP attached to it rather than your real IP (and usually it's meta-data that is logged, not content).

Of course the major difficulty in doing this is acquiring the VPN in the first place. Even though the VPN server will only see your IP as being that of the exit relay, your anonymity will be ruined if it has a financial record of you. Because of this, washed/anonymized Bitcoins, or better yet Darkcoins, must be used to purchase the VPN. You will also have place the purchase over Tor to ensure that the VPN has no initial record of your account, and that the transaction IP doesn't appear on the blockchain (remember to check that the site you're visiting is authentic, and using HTTPS). You must also remember to never connect to the VPN without first going through Tor. This requires some strict security habits, but if your threat model warrants this type of security then you don't have much choice.

I would argue that this is the best possible way to maintain anonymity

Additionally, FBI now bypassed the iPhone 5-4, but not the iPhone 5s - 6s.

I absolutely hate Apple, this is the reason I use Android
https://www.reddit.com/r/Android/comments/46ap3k/would_fbi_need_backdoor_from_google_to_decrypt/

Apple's dumbass engineers didn't even prevent brute-forcing of iCloud passwords until this January
http://www.wired.com/2014/09/three-things-apple-can-fix-iclouds-awful-security/

Enzyme
Sr. Member
****
Offline Offline

Activity: 420
Merit: 250


View Profile
April 11, 2016, 02:09:28 PM
 #7

Doesn't using an untrustworthy VPN do worse when combining with tor?
Slowturtleinc
Member
**
Offline Offline

Activity: 84
Merit: 10


View Profile
April 11, 2016, 09:10:40 PM
 #8

Is this more labour intensive to run on a cell phone or can you do all this without screwing things up?
Was leaning Iphone but my privacy does mean a lot to me,going andriod.

██████████            Gunthar: Fast and Serious Lending Service
█████████       ●●●● ●●● - ●●● - ●●● - ●●● - ●●● - ●●● - ●●● ●●●●
██████████    ●●●● Don't loose your collateral: refinance with us ●●●●
zsobro
Jr. Member
*
Offline Offline

Activity: 41
Merit: 10


View Profile
April 11, 2016, 10:31:00 PM
 #9

Why VPN is not enough?
subwoofer12 (OP)
Sr. Member
****
Offline Offline

Activity: 251
Merit: 253



View Profile
April 14, 2016, 11:24:09 AM
 #10

Why VPN is not enough?

Quote
While many VPN services claim not to log activity, we have to remember that this is simply a promise to us (and promises can be broken). If the VPN provider got a court order they'd most likely find a way to somehow link the activity back to you, either by revealing that 'oops, we log some things after all', or by starting to log only your account for any future activity without your knowing. So while VPNs are great for low risk situations, they're by no means ideal for when you need serious anonymity against a state actor.

Some guy who works for the VPN company 'accidentally' clicks the button to enable logging. One warrant against you and you're fucked.

Doesn't using an untrustworthy VPN do worse when combining with tor?

I would argue the advantages outweigh the disadvantages. There's around 1,400 exit nodes on the Tor network, 99.5% are 'good' nodes, however 0.5% of nodes are considered to be malicious, i.e. they attempt to track you steal your passwords etc. VPNs prevent this. The key word here is untrustworthy, AirVPN, TorGuard, PIA are all excellent choices. In fact PIA hosts the forum

We are currently hosted by Private Internet Access, a bitcoin-accepting VPN service. I would assume that we're also renting the physical server from them, but I'm not privy to those details.

You want to prevent the VPN from being associated from you in the first place, even if they do log, generally you're still safe

Quote
The risks of VPN logging are also reduced, as any logs will have a Tor Exit IP attached to it rather than your real IP (and usually it's meta-data that is logged, not content)

A VPN that accepts DASH (darkcoins) is the best option because you can't trace the blockchain back to you. The only VPN provider I know of that accepts DASH is TorGuard. But if you can find a provider that accepts Bitcoin you're in the clear, for example

Open Firefox buy Bitcoins with Coinbase
Go to altcoin exchange and buy DASH
Send to Dash Wallet

Now do all the following in Tor Browser

Go to Blockchain create a new wallet https://blockchainbdgpzk.onion/
Go to altcoin exchange convert DASH back to BTC (This is the beauty of DASH, every transaction is anonymized)
Send BTC to blockchain wallet you just created

Now you have a bitcoin wallet with coins that can't be traced back to you
Buy VPN service with these bitcoins from the provider of your choice

Important to note!

Quote
You must also remember to never connect to the VPN without first going through Tor.

Is this more labour intensive to run on a cell phone or can you do all this without screwing things up?
Was leaning Iphone but my privacy does mean a lot to me,going andriod.

It would work on Android but you would have to carry around an extension cord and a Raspberry Pi everywhere you go
In practicality the only method currently supported on Android is VPN To Tor

Read here for more info https://thetinhat.com/tutorials/darknets/tor-vpn-using-both.html

Slowturtleinc
Member
**
Offline Offline

Activity: 84
Merit: 10


View Profile
April 14, 2016, 04:46:20 PM
 #11

Will bookmark this to look into more,presumed a andriod would be the best bet for a new phone over Iphone,is there a better choice than andriod?
My latest phone is about to be replaced,have dropped it to many times to expect it to work properly.

██████████            Gunthar: Fast and Serious Lending Service
█████████       ●●●● ●●● - ●●● - ●●● - ●●● - ●●● - ●●● - ●●● ●●●●
██████████    ●●●● Don't loose your collateral: refinance with us ●●●●
subwoofer12 (OP)
Sr. Member
****
Offline Offline

Activity: 251
Merit: 253



View Profile
April 14, 2016, 07:11:23 PM
 #12

is there a better choice than andriod?

No, but there's better Android devices. I would suggest the Nexus 6P or if you want to wait a few months Google will be unveiling a new Nexus device in the Fall.

Google directly provides the software updates, so you'll be the first one with latest iteration of Android. Google also puts out monthly security patches OTA

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!