Bitcoin Forum
May 29, 2024, 10:17:54 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: Wired: How to Anonymize Everything You Do Online  (Read 7126 times)
Coolstoryteller
Sr. Member
****
Offline Offline

Activity: 350
Merit: 250


View Profile
June 30, 2014, 09:26:47 PM
 #21

Apparently you can't anonymize yourself on the Bitcointalk forum without having to pay. I fired up my TOR browser to get this message. Extortion for privacy... amazing business model. Privacy measured in units of evil..

-----
Remove Proxyban

Your IP address has previously been used for evil on this forum, or it is a known proxy/VPN/Tor exit node, so you are required to pay a small fee before you are able to post messages or send PMs. You can still use all of the read-only features without paying.

Your account contains 48.46 units of evil. To atone, you must pay a total of 0.00194935 bitcoins (1.94935 mBTC; 194935 satoshi). Pay to the address 1NPn2BcxKeg7d4sxAbSxNxutALhBddxgyp. Once you have paid the full amount, wait a few seconds and then reload this page.

Alternatively, any forum staff member and some other notable members can manually whitelist you. Paying the fee is probably easier/quicker, though.

If you don't have any bitcoins, you can get small amounts of free bitcoins using the sites listed here. It is recommended that you give the free bitcoin sites the address listed above. Do not collect money in your own wallet and then send the bitcoins to the forum -- this will likely result in significant network fees.

"Buy, sell, trade, chat. Leave nothing but a Shadow." - www.shadow.cash
InwardContour
Sr. Member
****
Offline Offline

Activity: 644
Merit: 260


View Profile
July 01, 2014, 02:07:09 AM
 #22

Apparently you can't anonymize yourself on the Bitcointalk forum without having to pay. I fired up my TOR browser to get this message. Extortion for privacy... amazing business model. Privacy measured in units of evil..

-----
Remove Proxyban

Your IP address has previously been used for evil on this forum, or it is a known proxy/VPN/Tor exit node, so you are required to pay a small fee before you are able to post messages or send PMs. You can still use all of the read-only features without paying.

Your account contains 48.46 units of evil. To atone, you must pay a total of 0.00194935 bitcoins (1.94935 mBTC; 194935 satoshi). Pay to the address 1NPn2BcxKeg7d4sxAbSxNxutALhBddxgyp. Once you have paid the full amount, wait a few seconds and then reload this page.

Alternatively, any forum staff member and some other notable members can manually whitelist you. Paying the fee is probably easier/quicker, though.

If you don't have any bitcoins, you can get small amounts of free bitcoins using the sites listed here. It is recommended that you give the free bitcoin sites the address listed above. Do not collect money in your own wallet and then send the bitcoins to the forum -- this will likely result in significant network fees.
The amount of bitcoin they are asking for is very little. .002BTC is worth roughly $1.28 with bitcoin @ $640. This is a very small price to pay to use these forums on tor.

IMO the reason for this is that a lot of people try to use these forums via tor to try to scam others. You would only have one chance of trying to scam before someone could accuse you of being a scammer and your account would be worthless (to a scammer). As a result people would create a lot of accounts, hoping to be successful on at least one scam. Forcing people to pay something prior to even attempting to scam discourages people to scam this way. 
Swordsoffreedom
Legendary
*
Offline Offline

Activity: 2786
Merit: 1115


Leading Crypto Sports Betting & Casino Platform


View Profile WWW
July 01, 2014, 02:39:16 AM
 #23

The evil tax ^_^
Sorry just had to say that since it sounded like a classic in order to do evil you must pay your taxes  Grin

..Stake.com..   ▄████████████████████████████████████▄
   ██ ▄▄▄▄▄▄▄▄▄▄            ▄▄▄▄▄▄▄▄▄▄ ██  ▄████▄
   ██ ▀▀▀▀▀▀▀▀▀▀ ██████████ ▀▀▀▀▀▀▀▀▀▀ ██  ██████
   ██ ██████████ ██      ██ ██████████ ██   ▀██▀
   ██ ██      ██ ██████  ██ ██      ██ ██    ██
   ██ ██████  ██ █████  ███ ██████  ██ ████▄ ██
   ██ █████  ███ ████  ████ █████  ███ ████████
   ██ ████  ████ ██████████ ████  ████ ████▀
   ██ ██████████ ▄▄▄▄▄▄▄▄▄▄ ██████████ ██
   ██            ▀▀▀▀▀▀▀▀▀▀            ██ 
   ▀█████████▀ ▄████████████▄ ▀█████████▀
  ▄▄▄▄▄▄▄▄▄▄▄▄███  ██  ██  ███▄▄▄▄▄▄▄▄▄▄▄▄
 ██████████████████████████████████████████
▄▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄
█  ▄▀▄             █▀▀█▀▄▄
█  █▀█             █  ▐  ▐▌
█       ▄██▄       █  ▌  █
█     ▄██████▄     █  ▌ ▐▌
█    ██████████    █ ▐  █
█   ▐██████████▌   █ ▐ ▐▌
█    ▀▀██████▀▀    █ ▌ █
█     ▄▄▄██▄▄▄     █ ▌▐▌
█                  █▐ █
█                  █▐▐▌
█                  █▐█
▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀█
▄▄█████████▄▄
▄██▀▀▀▀█████▀▀▀▀██▄
▄█▀       ▐█▌       ▀█▄
██         ▐█▌         ██
████▄     ▄█████▄     ▄████
████████▄███████████▄████████
███▀    █████████████    ▀███
██       ███████████       ██
▀█▄       █████████       ▄█▀
▀█▄    ▄██▀▀▀▀▀▀▀██▄  ▄▄▄█▀
▀███████         ███████▀
▀█████▄       ▄█████▀
▀▀▀███▄▄▄███▀▀▀
..PLAY NOW..
Coolstoryteller
Sr. Member
****
Offline Offline

Activity: 350
Merit: 250


View Profile
July 01, 2014, 07:19:36 PM
 #24

Apparently you can't anonymize yourself on the Bitcointalk forum without having to pay. I fired up my TOR browser to get this message. Extortion for privacy... amazing business model. Privacy measured in units of evil..

-----
Remove Proxyban

Your IP address has previously been used for evil on this forum, or it is a known proxy/VPN/Tor exit node, so you are required to pay a small fee before you are able to post messages or send PMs. You can still use all of the read-only features without paying.

Your account contains 48.46 units of evil. To atone, you must pay a total of 0.00194935 bitcoins (1.94935 mBTC; 194935 satoshi). Pay to the address 1NPn2BcxKeg7d4sxAbSxNxutALhBddxgyp. Once you have paid the full amount, wait a few seconds and then reload this page.

Alternatively, any forum staff member and some other notable members can manually whitelist you. Paying the fee is probably easier/quicker, though.

If you don't have any bitcoins, you can get small amounts of free bitcoins using the sites listed here. It is recommended that you give the free bitcoin sites the address listed above. Do not collect money in your own wallet and then send the bitcoins to the forum -- this will likely result in significant network fees.
The amount of bitcoin they are asking for is very little. .002BTC is worth roughly $1.28 with bitcoin @ $640. This is a very small price to pay to use these forums on tor.

IMO the reason for this is that a lot of people try to use these forums via tor to try to scam others. You would only have one chance of trying to scam before someone could accuse you of being a scammer and your account would be worthless (to a scammer). As a result people would create a lot of accounts, hoping to be successful on at least one scam. Forcing people to pay something prior to even attempting to scam discourages people to scam this way.  

If you feel that it's not that big of a deal feel free to send $1.28 to that address. Sorry but these forums are free nobody should have to pay unless you are advertising. New accounts have to make a certain amount of posts before they can actually post outside of the newbie areas.. so that argument of yours in null/void. If you're stupid enough to get scammed by a noob then you deserve to be homeless. Also, relating TOR to scamming is the same as relating curtains in your house with being a terrorist - just because your neighbor can't look into your house you must be a terrorist.

The main issue is that this forum is created in the spirit of Bitcoin (pseudo-anonymity). If you really want to be anonymous you have to pay for it. This is the same attitude of the Bitcoin core developers.

"Privacy is evil"
-Bitcointalk.org

"Buy, sell, trade, chat. Leave nothing but a Shadow." - www.shadow.cash
Honeypot
Sr. Member
****
Offline Offline

Activity: 420
Merit: 250


View Profile
July 02, 2014, 07:01:11 AM
 #25

You plug yourself into the largest surveillance network system in the history of mankind and want anonymity? This is like a cow entering a slaughter house then claiming he is being liberated by the butcher's knife because he no longer has to suffer cow tipping.
cech4204a
Sr. Member
****
Offline Offline

Activity: 252
Merit: 250

12CDKyxPyL5Rj28ed2yz5czJf3Dr2ZvEYw


View Profile WWW
July 02, 2014, 09:19:33 AM
 #26

More anonymizing means more web crimes and less security for normal users. Imagine you would be ghost on the street, you will never run out of bad ideas, what you could do to the people.

Bitcoin is DEAD
bitsmichel
Sr. Member
****
Offline Offline

Activity: 518
Merit: 250



View Profile
July 02, 2014, 07:32:19 PM
 #27

More anonymizing means more web crimes and less security for normal users. Imagine you would be ghost on the street, you will never run out of bad ideas, what you could do to the people.

Less anonymity leads to more crimes and increased power for criminals.
Consider these cases:

Would you, as girl, tell your abuser where you live?
Would you tell a thief how much possessions are in your wallet?
Would you tell a paedophile when your kid is alone?
Would you tell a thief when you go on holiday?
Would you tell the government where whistle-blowers live?
Would you tell a killer your location?

Anonymity can be used for both the good and bad.. without anonymity you sacrifice a lot and don't gain anything. (unless NSA pays you  Cheesy)
4chan is a good example. It's used for jokes, talking and also some bad things occurred there.

Coolstoryteller
Sr. Member
****
Offline Offline

Activity: 350
Merit: 250


View Profile
July 02, 2014, 10:21:15 PM
 #28

More anonymizing means more web crimes and less security for normal users. Imagine you would be ghost on the street, you will never run out of bad ideas, what you could do to the people.

Normal users? We were here before you were normal. You're on a cryptocurrency forum. Maybe you should also advocate for decryption and government trapdoors in the user's wallets. I swear as time goes on the level of intelligence in the Cryptocummunity drops exponentially.

"Buy, sell, trade, chat. Leave nothing but a Shadow." - www.shadow.cash
Coolstoryteller
Sr. Member
****
Offline Offline

Activity: 350
Merit: 250


View Profile
July 02, 2014, 10:24:47 PM
 #29

You plug yourself into the largest surveillance network system in the history of mankind and want anonymity? This is like a cow entering a slaughter house then claiming he is being liberated by the butcher's knife because he no longer has to suffer cow tipping.

I've always used a VPN or TOR while browsing so I'm not worried. There's ways to avoid ever being the "cow" as you put it. Fact that this forum tries to make money off of privacy has nothing to do with being a cow or a pig. Its privacy extortion - that is what the big issue is here. Before you make animal parallels, I suggest you take some reading comprehension classes.

"Buy, sell, trade, chat. Leave nothing but a Shadow." - www.shadow.cash
Coolstoryteller
Sr. Member
****
Offline Offline

Activity: 350
Merit: 250


View Profile
July 02, 2014, 10:32:31 PM
 #30

More anonymizing means more web crimes and less security for normal users. Imagine you would be ghost on the street, you will never run out of bad ideas, what you could do to the people.

Less anonymity leads to more crimes and increased power for criminals.
Consider these cases:

Would you, as girl, tell your abuser where you live?
Would you tell a thief how much possessions are in your wallet?
Would you tell a paedophile when your kid is alone?
Would you tell a thief when you go on holiday?
Would you tell the government where whistle-blowers live?
Would you tell a killer your location?

Anonymity can be used for both the good and bad.. without anonymity you sacrifice a lot and don't gain anything. (unless NSA pays you  Cheesy)
4chan is a good example. It's used for jokes, talking and also some bad things occurred there.


+1

Some people are better off using Fiat currency, credit cards and the like. Not even sure why there are people in a cryptocurrency forum advocating anti-anonymity. Meh, since the forums owners don't give a shit about privacy either I guess they're in good company. I am going to make it my side project to drive this forum's credibility into the ground. Once people hear about this privacy extortion it's game over for this extortionists forum.

"Buy, sell, trade, chat. Leave nothing but a Shadow." - www.shadow.cash
InwardContour
Sr. Member
****
Offline Offline

Activity: 644
Merit: 260


View Profile
July 03, 2014, 05:21:45 AM
 #31

Apparently you can't anonymize yourself on the Bitcointalk forum without having to pay. I fired up my TOR browser to get this message. Extortion for privacy... amazing business model. Privacy measured in units of evil..

-----
Remove Proxyban

Your IP address has previously been used for evil on this forum, or it is a known proxy/VPN/Tor exit node, so you are required to pay a small fee before you are able to post messages or send PMs. You can still use all of the read-only features without paying.

Your account contains 48.46 units of evil. To atone, you must pay a total of 0.00194935 bitcoins (1.94935 mBTC; 194935 satoshi). Pay to the address 1NPn2BcxKeg7d4sxAbSxNxutALhBddxgyp. Once you have paid the full amount, wait a few seconds and then reload this page.

Alternatively, any forum staff member and some other notable members can manually whitelist you. Paying the fee is probably easier/quicker, though.

If you don't have any bitcoins, you can get small amounts of free bitcoins using the sites listed here. It is recommended that you give the free bitcoin sites the address listed above. Do not collect money in your own wallet and then send the bitcoins to the forum -- this will likely result in significant network fees.
The amount of bitcoin they are asking for is very little. .002BTC is worth roughly $1.28 with bitcoin @ $640. This is a very small price to pay to use these forums on tor.

IMO the reason for this is that a lot of people try to use these forums via tor to try to scam others. You would only have one chance of trying to scam before someone could accuse you of being a scammer and your account would be worthless (to a scammer). As a result people would create a lot of accounts, hoping to be successful on at least one scam. Forcing people to pay something prior to even attempting to scam discourages people to scam this way.  

If you feel that it's not that big of a deal feel free to send $1.28 to that address. Sorry but these forums are free nobody should have to pay unless you are advertising. New accounts have to make a certain amount of posts before they can actually post outside of the newbie areas.. so that argument of yours in null/void. If you're stupid enough to get scammed by a noob then you deserve to be homeless. Also, relating TOR to scamming is the same as relating curtains in your house with being a terrorist - just because your neighbor can't look into your house you must be a terrorist.

The main issue is that this forum is created in the spirit of Bitcoin (pseudo-anonymity). If you really want to be anonymous you have to pay for it. This is the same attitude of the Bitcoin core developers.

"Privacy is evil"
-Bitcointalk.org
What would stop someone from creating a bunch of newbie accounts, posting for several months on them to increase post count and forum ranking? These accounts would no longer be "noob" accounts.

If it were to come down to it, the admins could give one's IP address to law enforcement if there was evidence that a particular account had clearly scammed other users. If the users used TOR then this would not be possible (the IP address provided would simply be that of TOR exit nodes).

What is discussed on these forums is not illegal nor is the subject matter very controversial. So there is little legit reason to need your ISP and others who can watch your IP address to not know you are using these forums.
AnonyMint
Hero Member
*****
Offline Offline

Activity: 518
Merit: 521


View Profile
July 07, 2014, 12:49:27 AM
 #32

---------------------------- Original Message ----------------------------
Subject: Martin Armstrong is a cryptography neophyte
From:    AnonyMint
Date:    Sun, July 6, 2014 8:48 pm
To:      "Armstrong Economics" <armstrongeconomics@gmail.com>
--------------------------------------------------------------------------

Sorry I wanted to end my communications, but this MUST be corrected.

http://armstrongeconomics.com/2014/07/06/secure-web-browsers/

Quote from: Armstrong
A number of emails have asked me about Tor. The Tor anonymity network is championed as a tool for freedom of speech and anonymity when surfing the web. The Tor network is an online service that allows users to surf the web anonymously. Its main benefit is to reduce the chances of network surveillance discovering a user’s location or web usage. For that reason it is championed as an important tool for promoting free speech and protecting personal privacy, especially for people under authoritarian regimes including the USA.

Alex Biryukov, Ivan Pustogarov at the University of Luxembourg discovered a flaw that allowed people to crack in. However, before the flaw became public it was corrected. The best is the Tor Bundle.

The new version of Firefox improves security and speed by enabling newer TLS (Transport Layer Security) standards by default... However, this is an open source and you can get add-ins for anonymous browsing such as Tor and AnonymoX is an initiative for anonymization on the internet.

AnonymoX actually provides anonymization and country faking is done by an anonymization network. It consists of many servers, in every country of your country list. These servers are provided and managed by them.

Besides the points made below, note also that AnonymoX is a for profit scheme, and thus will be easily subsumable by the NSA (one national security letter gag order will work fine):

https://www.anonymox.net/en/premium

We need something better! Nothing that we have now is provably anonymous, except if you obtain an unregistered connection to the internet.

There are several issues. For one the mere usage of the TOR network itself, makes you into the subset of 'suspicious users'. The pool not using TOR is still larger. It's not a perfect solution. the NSA has a technique that targets outdated Firefox browsers codenamed EgotisticalGiraffe. It has several weaknesses, see https://en.wikipedia.org/wiki/Tor_%28anonymity_network%29#Weaknesses


Using tor alone would not be probable cause for law enforcement to get a warrant as there are several legit reasons to use it.

The browser exploits will continue to proliferate because the NSA purchases zeroday exploits:

https://www.google.com/search?q=NSA+purchases+zeroday+exploits
https://www.schneier.com/essay-455.html

Employing anonymity proxy servers lumps you together with a much smaller portion of the internet users, with a much higher percentage of them doing nefarious activities, thus the national security agencies will likely be apply extra effort to track you and or save your data permanently. My understanding is the NSA can't yet save all traffic it processes from the internet permanently, instead it runs filters on it and saves only data flagged by the filters. Using anonymity proxies (Tor, I2P, VPNs, Anonymox, server-based bitcoin mixers e.g. bitcoinfog, etc) raises a flag, as well as any encrypted data their computers can't decrypt to run the keyword filters on. The NSA can decrypted nearly all HTTPS (TLS) traffic on the internet, because the root certification companies have their signing keys backdoored.

Also the weaknesses you listed are not complete. Every low-latency Chaum mixnet (i.e. Tor, I2P, Anonymox, etc) is subject to timing attacks due to a global adversary (e.g. national security agencies) that can monitor most or all of the encrypted (even if they can't decrypt it) traffic passing in and out of the proxy servers.

http://en.wikipedia.org/w/index.php?title=Onion_routing&oldid=592703635#Weaknesses
https://tails.boum.org/doc/about/warning/index.en.html#index4h1
https://tails.boum.org/doc/about/warning/index.en.html#index7h1
http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29#Exit_node_eavesdropping

Quote from: Dan Egerstad, a Swedish security consultant
If you actually look in to where these Tor nodes are hosted and how big they are, some of these nodes cost thousands of dollars each month just to host because they're using lots of bandwidth, they're heavy-duty servers and so on. Who would pay for this and be anonymous?

Thus Tor et al are more likely to be honeypots some (or most?) of the time.

There is no plausible way to prove that (to know whether) any anonymity proxy servers is not compromised by a backdoor (spyware, virus, etc) on the server, or the operators have been served a national security gag order, or an individual in their company is a spy, or they are an operation funded and run by the national security agencies, etc..

Note on the more conspiratorial perspective that the black budget of those powers-that-be who pulls the strings inside the government is greater than the $3 trillion (est. $5 trillion according to Catherine Austin Fitts at solari.com) that Donald Rumsfeld announced the day before 9/11 was missing from the Pentagon budget (and all the records were conveniently destroyed by the attack on the Pentagon the next day).

The NSA can perhaps even reprogram the microcode in your hardware and perhaps even access your computer over an air gap, if they become interested enough in your activities.

http://www.eweek.com/security/nsa-can-hack-you-even-if-you-arent-connected-to-the-internet.html
http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/
http://www.gizmag.com/malware-jump-air-gap/30056/
https://www.schneier.com/blog/archives/2013/10/air_gaps.html
http://www.forbes.com/sites/steveblank/2013/07/15/your-computer-may-already-be-hacked-nsa-inside/
http://www.infowars.com/intel-ceo-refuses-to-answer-questions-on-whether-nsa-can-access-processors/

I wrote the following about iCloak:

This is good for the other features it has, except it would be nice to have an option to turn off Tor or I2P, since both are likely to be honeypots.

The only sure way to obfuscate your IP address is to use an IP address that isn't registered to you.

unheresy.com - Prodigiously Elucidating the Profoundly ObtuseTHIS FORUM ACCOUNT IS NO LONGER ACTIVE
AnonyMint
Hero Member
*****
Offline Offline

Activity: 518
Merit: 521


View Profile
July 07, 2014, 01:10:44 AM
 #33

Armstrong subsequently wised up.

http://armstrongeconomics.com/2014/07/06/nsa-tor/

Quote from: Armstrong
There has also been claims that the NSA, the totally un-American version of the communist secret police encouraged and protected by Obama, has been targeting those who download Tor or any service that allow you to hide from these ruthless people. Just for the record.

http://daserste.ndr.de/panorama/aktuell/NSA-targets-the-privacy-conscious,nsa230.html

unheresy.com - Prodigiously Elucidating the Profoundly ObtuseTHIS FORUM ACCOUNT IS NO LONGER ACTIVE
robbyd86
Full Member
***
Offline Offline

Activity: 135
Merit: 100


View Profile
July 07, 2014, 01:26:57 AM
 #34

I think with all the NSA stuff going around, things like Tor will be more commonplace.  I like that the option is available, but I don't know how it all works just yet.
AnonyMint
Hero Member
*****
Offline Offline

Activity: 518
Merit: 521


View Profile
July 07, 2014, 05:40:46 PM
 #35

This is good for the other features it has, except it would be nice to have an option to turn off Tor or I2P, since both are likely to be honeypots.

The only sure way to obfuscate your IP address is to use an IP address that isn't registered to you.

Quote from: anonymous
After doing some homework I agree with you that Tor seems to be of limited use.
They sure tracked this guy down pretty quick when he used Tor

http://www.theverge.com/2013/12/18/5224130/fbi-agents-tracked-harvard-bomb-threats-across-tor

Actually it is probably not always useless. Unlike a VPN which is a single proxy server, Tor (and other Chaum mix-nets such as I2P) employs onions layers of hops over multiple servers (for Tor I think it is normally 3 unless both are Tor services then 5), so if any one of the servers is not compromised then the obfuscation of your IP address may be achieved. However, don't forget the other possible attacks such as timing analysis by a global adversary even to servers in the onion layers it has not compromised or control, end-to-end attacks such as the use of the Harvard wireless network in the above linked story, and the browser attacks (and other spyware).

If you are using an unregistered connection as I suggested above, then you may already be suspicious to the NSA, thus adding Tor (Tor Bundle or Whonix) may provide another layer of potential imperfect anonymity. The more layers the better if you were already going to be suspicious and not hiding in plain sight due to your use of an unregistered internet connection. For example, lets assume the following probabilities which I pulled out of my ass:

1. 20% chance the surveillance can track your unregistered mobile IP and correlate it to your identity.
2. 20% chance a Tor session's anonymity fails
3. 50% chance a VPN is compromised (or has insufficient users to mix with)

Using all 3 layers together means your probability of not being anonymous decreases to 0.2 x 0.2 x 0.5 = 0.02 = 2%.

However, lets say you are not using a suspicious connection to the internet and lets assume the NSA doesn't save all traffic (only filters and saves suspicious and all encrypted traffic), then using Tor may be detrimental as your probability of be recorded goes from very small up to say 20% (if the #2 is a correct guesstimate).

Let us analyze the probability factors for #1.

Try to never use your unregistered mobile connection from or too near to your residence as triangulation is real.

Also your phone likely has GPS in it which can perhaps be activated remotely by the NSA as well.

Also your late model car may have a GPS in it that is potentially reporting to the provider as admitted last year by the Ford CEO.

Also there are often cameras along the way on stop lights, sides of buildings, etc..

Also your mobile device may be reporting to WiFi hotspots all along the path of your travel.

Also the triangulation and position tracking data of your mobile is probably archived by the providers.

If you are a person who the NSA is determined to identify, it is very difficult because there are video cameras hiding every where, except maybe not in the forest or desert, but satellites (or unmanned drones) can read the VIN number on your dashboard and your license plate, and they could pull up all this archived data after the fact. Apparently there is even infrared technology so they can see through the clouds and at night. The surveillance technologies will continue to improve.

Thus:

1. Never use that mobile for any activity that can be correlated to your identity, i.e. use it very sparingly only for the one anonymous activity of importance.

2. Remove the battery and the simcard from the mobile device when not in use. I say remove both, just in case there is some capacitor some other undocumented means of powering the device to give a homing signal.

3. Either travel to some remote, lonely place in some way that your vehicle and yourself can't be identified by any of the above pitfalls, or travel even if identified to a very crowded location wherein the known location of your mobile can't pinpoint who in that crowd is holding the mobile which is sending the data. So in the latter case, you would want to make sure you can't be seen on an video or satellite imagery in a way that could identify you as the one in the crowd  operating a laptop-- much better you accessed the internet from the mobile device touchscreen instead of attaching it as modem to a laptop (so you don't stand out in the crowd). And note that the accuracy of triangulation and or GPS is getting near to a meter or meters, so it would need to be a very crowded place such as train station, mall, bar, disco, sporting event, etc.. The problem with the hiding in a crowd approach is that eventually it can be correlated that your face always appears in the crowds, you stay in one place too long, or your movements on video correlate with the tracking movements of the mobile, so this isn't really going to work if more than once or for two long of a period of time. Thus realistically you need to travel and use the unregistered mobile device in a way that you can't be identified in any surveillance. This is difficult to accomplish. Even older model cars can still be tracked by their license plates. And most public transportation has surveillance video.

Even if you traveled by bicycle or by foot, you can be identified from your originating location (who enters the location and who doesn't emerge is a process of elimination, e.g. a parking garage) and tracked along the way in archived surveillance (remember archived video that captured 9/11 attack on the Pentagon).

You will need to be very clever. If the activity you are doing is not immediately suspicious and would only be investigated weeks or months hence, perhaps you can hope that non-government (privately) operated video surveillance archives will be discarded after some time, but I wouldn't really be so confident about this.

Why do you think they made this phoney terrorism so that can put surveillance at every crowded event.

Also most of you have already identified yourself as being one of the 0.001% who is interested in anonymity. Thus if you are identified in a crowd, you will automatically be a prime suspect.

unheresy.com - Prodigiously Elucidating the Profoundly ObtuseTHIS FORUM ACCOUNT IS NO LONGER ACTIVE
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!