How to be Anonymous Online – A Quick Step-By-Step Manual

August 2015 Update

By A M Eydie

 

 

Copyright © A M Eydie

All Rights Reserved

2015

 

Table of Contents

Preface

Preview

WARNING, DISCLAIMER OR WHATEVER...

Section: Build A Toolbox

Section: Up and Running

Section: Safe Updates and PGP Program Authentication

Section: PGP/GPG – Everything you want to know

Section: Email, Chatting, Messaging

Section: Writeprints – They will identify those other anonymous netizens... but not you

Section: Bitcoin is NOT Anonymous

The Great Flaw – You are not Stealth, You are Secure

In Closing

BONUS – Creating a bootable microSD card that doubles as your phone's microSD card

The following works are cited in these instructions:

 

Preface

I know these instructions will be purchased by anonymity seekers of many levels. Here is where I am coming from in writing this guide and what you stand to gain.

First, this guide is $4.99. There is something worth $4.99 in this for 95% of you. For beginners, you will be totally anonymous online in two hours (and that is giving you time for a cigarette break). For post-beginners, you will discover some little, yet important, detail(s), like a wrong setting in Tor, that will blow your cover if uncorrected. After all, Tor and Tails DO NOT come preconfigured for total anonymity (f.y.i., there is more to this guide than Tor). Remember, if you have one, single, tiny, little hole in your system, you are NOT anonymous. If you are a know-it-all anonymity expert hacker computer science grad student, you do not need this guide, so feel free to move on. Again, this guide is only $4.99. You probably earn that in 15 minutes at work. Amazon will even give you a refund if you think this whole thing is a total waste.

Second, it is easy to be anonymous once you know how, but it is a pain in the ass when you don't. For $4.99, I will take the pain out of your ass. In the last ten years many anonymity "game changers," like Tor, Tails and Bitcoin, have come about… However, they have flaws. Tor and Tails need some modifications to be secure. Bitcoin is not anonymous in its current form. It does not even pretend to be anonymous. It is pseudonymous… This is a HUGE difference. I talk about why this matters and how Bitcoin can be anonymous in the near future with modifications YOU will make (and no, not "Bit-Laundry" services).

Third, PGP Encryption is confusing. I break it down into short step-by-step instructions, saving hours of figuring it out yourself ($4.99 to save a few stressful hours of your life is a good deal).

Fourth, this is not a book you read these are instructions you follow. If you are looking for a book to spend the day reading by the fire, do not buy these instructions. If you read these instructions in 30 minutes, and then complain that this 'book' merely says install Tails, you did not read this page, AND you did not follow the instructions. It will take you a couple hours to build a solid system. If you want to spend $4.99 to do things the right way the first time instead of spending days searching Google and browsing forums trying to figure this stuff out yourself (and still leaving holes in your system), buy these instructions. If you build your kid a doll house, you do not want a book about doll houses, you just want instructions for building a doll house. For $4.99, I am telling you what to do without asking you to subscribe to a proxy service, buy software or trust a third party.

Fifth, I post all updates on my blog. I make updates often, and there is no reason you should have to buy a new copy to stay "in-the-know." As new technologies are developed, new shortcomings are discovered (like how your mega-strong encryption will be broke in 5 years), and spelling mistakes are corrected :/ I will share them with you.

Preview

This manual is written:

  1. In 1,2,3 step format
  2. With concise, yet thorough, instructions
  3. For beginners using a DVD bootable PC with a DVD burner

I will teach you how to:

  1. Use someone else's computer without them knowing
  2. Browse the internet anonymously
  3. Circumvent Windows without altering anything on the system
  4. Make an email account that actually is anonymous
  5. Use PGP Encryption the right way (I make this simple)
  6. Taunt Kim Jong-Un

I will show you that Bitcoin is NOT Anonymous and how that is about to change.

I will provide you with future updates.

I believe in the “Keep It Simple Stupid” methodology. This manual details exactly what you need to get what you want, no more, no less. I wrote this so you could be anonymous today instead of spending the next week reading everything you find on Google and, in the end, still not know how to implement the proper steps.

The problem I've seen in other books and online instructions is they give you a bunch of sources and programs for anonymity, but they do not tie all the loose ends together. For instance, you might buy anonymity software, but god knows what a totally unrelated program in Windows is still tracking and saving to your hard drive. Besides that, if you want to use a work computer, they certainly are not going to allow you to install anonymity software. Moreover, maybe, you do not want to encrypt your hard drive because that looks suspicious. You need to run straight from a DVD, Flash Drive or Micro SD card outside of Windows altogether. I will even show you how to boot with a flash drive on old computers that typically will not do so.

Let’s tie up those loose ends.

----------

Here are a couple of important points regarding Online Anonymity:

  1. Disabling Cookies is USELESS – You are still traceable through your digital fingerprints
  2. Using an IP Proxy Service is BAD – It routes all your activity through a central source that can track you
  3. Logging into a computer is BAD – It leaves a record that you were there
  4. Subscribing to an Anonymity Service is BAD – You are giving out your name, credit card, etc. to buy your anonymity… You are not anonymous if you have to share personal information!
  5. Creating an anonymous Yahoo, Gmail, etc. account is BAD – Just ask General Petraeus how well this works
  6. JavaScript is BAD – This is a prime vehicle for transporting malware into your system
  7. Super-Cookies are BAD – They regenerate deleted cookies, are stealthy and hard to delete
  8. Digital Fingerprints are REALLY BAD – Advertisers have begun using digital fingerprints to track an individual's activity. Digital Fingerprints are pulled by gathering the data your system provides websites, such as installed fonts, browser extensions and their micro-versions, operating system and its updates, time zone, and such. While individual bits of this information are not particularly dangerous, collectively, they are compiled to create a traceable and absolute "digital fingerprint."
  9. Bitcoin is NOT Anonymous – Other books tell you that Bitcoins are Anonymous or that you can use “Bitcoin Laundry” services to cover your tracks. I will show why they are wrong and what technology is in the works to fix this.
  10. You Have Writeprints – Writeprints are a means of identifying an author solely from the characteristics of her written work. With the ability for individuals to mask IP addresses and minimize digital fingerprints, writeprinting is often the only method available to identify the author.

Don't worry, we are going to work around these.

WARNING, DISCLAIMER OR WHATEVER...

Do not be a fool. None of this is 100%.

To my knowledge, as of August 1, 2015, no one following my instructions has faced an exploit. Since I update these instructions regularly to reflect changes in technology, weaknesses that develop will see rectification quickly and accordingly.

Unfortunately, everything has flaws, especially software. The most popular, and probably most secure, software for online anonymity is Tor. The most popular operating system for online anonymity is Tails. These are the heart and nervous system of these instructions. The strength of these programs comes from the ongoing development of each and their open code. When good guys find flaws, work to rectify them begins immediately. When bad guys find flaws, they may be exploited indefinitely.

If being anonymous online is a hobby, this is the way to go. If being anonymous online is a way to restrict corporate advertisers from tracking your online life, this is the way to go. If you hate the fact that some governments are collectively spying on you for no reason, this is a way to make a point that you are not blindly submitting and a way to complicate their efforts.

The great length that people must go to break these systems hints that they work well. However, if you want a foolproof, 100% certain way to avoid the prying eyes of every entity, there is no solution for you. There are organizations with thousands of people dedicated to tracking and watching you. If you want to use Tor to bad mouth Vladimir Putin, you should know that the Russian Ministry for Interior has a 3.9 million rubles reward for developing methods to identify you. If for nothing more than bragging rights, there are academics and hackers that simply want to be the first to publicize mistakes. In fact, a couple of researchers from Carnegie Mellon University gained a huge amount of attention for their attempts to de-anonymize Tor users in 2014.

These are advanced methods for protecting your anonymity. I take you through detailed steps, far more than you are likely to find in one place online, to authenticate your software. I think the sections on authenticating your system are the most overlooked, yet most valuable aspect of this guide. However, if you are looking for a way to evade every entity in existence, I do not know what to tell you.

Nothing I say, do, provide, link to or recommend is guaranteed to protect your anonymity. Whether it is tomorrow or thirty years from now, every security measure will eventually be compromised. That is the power of technology. Frankly, if you can sue me for it, I am telling you that I am not guaranteeing it; therefore, it is at your risk to follow or do anything that I write in this manual.

Section: Build A Toolbox

The first thing you need to do is gather your tools. By the end of this section, everything you need will be in place and ready to go.

If you are already comfortable and familiar with Tails you can skip to Section: Safe Updates and PGP Program Authentication.

Your Tool List:

Hardware

Software

Step 1: On your Desktop, create a folder named Toolbox.

Step 2: Download your Tools

  1. I have bunched all the software you need into one .zip file that you can download from my website.
  2. I have https encryption, malware protection, and you do not have to register or subscribe to anything.
  3. I recommend that you initially download the Tools from my website so you have the exact versions I used when writing this guide. Doing so will make it much easier to follow along.
  4. Later on, you will download and install the latest versions of the software directly from the developer’s websites.
  5. Download the tools from https://howtobeanonymousonline.info/toolbox/
  6. Save the Toolbox.zip file into the Toolbox folder on your desktop (it’s over 800MB because it’s a big deal)
  7. Now, extract the Toolbox.zip file's contents into the Toolbox folder

If you need a .zip file extraction program, I use 7-zip (http://sourceforge.net/projects/sevenzip)

If you would rather download the Tools directly from the developer websites up front, the links are posted below:

  1. Tails ISO Image (https://tails.boum.org)
  2. Plop Boot Manager (http://www.plop.at)
  3. InfraRecorder (http://portableapps.com/apps/utilities/infrarecorder_portable)

Step 3: Burn two DVD's

Burn Tails

  1. Insert a blank DVD-R into your computer
  2. Go to your Toolbox folder
  3. Right-click the Tails.iso file
  4. Select Burn or Burn disc image *** (if this option doesn’t exist or work, see below) ***

Burn Plop Boot Manager

  1. Insert a blank DVD-R into your computer
  2. Go to your Toolbox folder
  3. Right-click the Plop Boot Manager.iso file
  4. Select Burn or Burn disc image *** (if this option doesn’t exist or work, see below) ***

***To burn your DVD's, install InfraRecorder from your Toolbox

Section: Up and Running

Now, you are now ready to boot your computer using the Tails DVD

Tails - DVD Version

The single biggest advantage of the Tails DVD is that you cannot save data or customize it. These limitations reduce your risk of falling victim to a virus or Malware.

Here's how to use it:

  1. You need to boot your computer from the Tails DVD. Pretty much every computer made in the last ten years will boot straight from the DVD if it is inserted during the startup process. So, either restart the computer with the Tails DVD inserted or insert it immediately upon starting the computer. If the system boots into Tails, pat yourself on the back.
  2. If the computer boots properly from the Tails DVD, you will come to a screen that says Boot Tails
  3. Select Live
  4. You may see a number of 'error' and 'failed' messages during the boot process. Just wait them out. Tails should boot within 3 or 4 minutes.
  5. Once Tails starts, you will see the Welcome to Tails screen. Just click Login

Getting Online:

Ethernet Cable

  1. Once an Ethernet cable is plugged in, just wait, Tails will automatically establish a connection.
  2. You will get a message in the top right corner that says Connection Established, followed by another that says Synchronizing the System's Clock.

Do not worry if you get a message saying your version of Tails is out of date or has numerous security holes… You will fix this later.

  1. The Iceweasel Web Browser will automatically open once you are online.

Wi-Fi

  1. Click on the network icon (it is a little icon with two computers and a little “x” located toward the right side of the top toolbar).
  2. Click it to see the available wireless networks.
  3. Select a network and, if needed, enter its password.
  4. You will get a message in the top right corner that says Connection Established, followed by another that says Synchronizing the System's Clock

Do not worry if you get a message saying your version of Tails is out of date or has numerous security holes… You will fix this later.

  1. The Iceweasel Web Browser will automatically open once you are online.

IMPORTANT! - You have to disable JavaScript manually. That does not happen automatically (Remember, JavaScript leaves you vulnerable to malware).

In the Iceweasel Web Browser:

  1. Click Edit > Preferences
  2. Select the Content tab and uncheck the “Enable JavaScript” box
  3. Click Close

Go to https://check.torproject.org to see if your connection is secure. If so, you are anonymous enough to browse online and feel fairly safe, but, you are NOT running the latest version of Tails. You are not as secure as you will be once you make it all the way through this manual. In later sections, I will cover properly updating your software. Also, don't worry if the connection speed is slow. It varies based on the bandwidth available in the Tor network.

Go to http://www.whatismyipaddress.com to see where it thinks you are. Your IP address will change often, so your location will change, as well.

You have reached the two-hour mark for achieving anonymity. Again, if you are already bored with these instructions, go play, but, come back later because there is A LOT more that must be done to secure your system.

Tails – Flash Drive and MicroSD Version

The big advantage of the Flash Drive or MicroSD card version of Tails is it allows you to upgrade safely. Also, the Flash Drive lets you do an emergency shutdown simply by removing it. Furthermore, you can save files, bookmarks, etc. from session to session.

To minimize the chances of compromising your anonymity, you should keep changes to Tails at a minimum. Part of your anonymity stems from not having a digital fingerprint... Or, more accurately, not having a unique digital fingerprint. Every time you make a change to Tails your digital fingerprint becomes a little more unique. You do not want Kim Jong-Un using your prints to compile a track record of everywhere you have been.

Also, saving data opens the possibility of housing malware inside your system. Encryption and anonymous IP addresses are not going to protect you if you are being watched from inside your system.

That being said, it is time to set up your Tails USB Flash Drive or Micro SD card:

***Important - “Windows 8 Certified” Flash Drives Do Not Work With Tails.Windows 8 Certified” flash drives are not bootable, meaning you cannot use them to boot your computer into Tails. Flash drives that are NOT “Windows 8 Certified” work fine, unfortunately, they are getting harder to find. If you have an old flash drive, you are probably fine. If not, the best alternative is to use a Micro SD Card with a USB adapter. Many SD Cards are sold with a USB adapter for under $15. USB adapters sold separately cost even less.***

  1. (Re)Boot your computer from the Tails DVD (to shut down or reboot, click the top-right red button or press ctrl+alt+delete)
  2. It is common to see a number of 'error' and 'failed' messages during the boot process. Just wait them out. Tails should boot within 3 or 4 minutes.
  3. Unlike before, at the Welcome to Tails screen, click Yes under More Options, and then Forward
  4. Create a Password*** (this is temporary so you can make it easy) and Login

***This is a temporary administrative password that only lasts one session. Occasionally you will be required to use an administrative password to perform certain tasks.***

  1. Once logged in, insert your USB Flash Drive or Micro SD card with its USB adapter
  2. From the top toolbar, click Applications > System Tools > Tails USB installer
  3. Click Clone & Install
  4. In the Tails LiveUSB Creator window, click the Target Device drop-down menu and choose your USB Flash Drive (it is probably preselected)
  5. Click Create Live USB
  6. Click Next
  7. Once installation is complete, click OK
  8. YOU ARE NOT FINISHED

Now, you will configure a Persistent Volume.

  1. Go ahead and shutdown Tails (click the top-right red button or press ctrl+alt+delete)
  2. Leaving the Tails USB Flash Drive or Micro SD card inserted, restart the computer and boot from the Flash Drive or Micro SD card. If you know how to do this skip to step 4, if not…
  3. Leaving the Tails USB Flash Drive or Micro SD card inserted, restart the computer with the Plop Boot Manager DVD also inserted. The computer will boot to a menu with a few options. Choose USB
  4. Next, choose the Live option to start Tails
  5. At the Welcome to Tails screen, choose Yes, and then Forward
  6. Create a Password (this is temporary so you can make it easy) and Login
  7. From the top toolbar, click Applications > System Tools > Configure persistent volume
  8. Create an insanely strong 20+ character password (You can go to https://identitysafe.norton.com/password-generator to generate some strong password examples, then make up your own) and click Create. THIS IS THE SINGLE KEY TO YOUR NEW SECRET WORLD. MEMORIZE IT!
  9. A Persistence Wizard – Persistent volume configuration window will open once the persistence volume is created. Personally, I click every option except the last three (APT Packages, APT Lists, Dotfiles). This way almost everything I do in Tails carries over to the next session
  10. Once you have made your selections, click Save
  11. Now, restart Tails and boot from the Tails USB Flash Drive or Micro SD card (using Plop Boot Manager if necessary)

Now that a Persistence volume has been created, you have the option to use it each time you start Tails from your Flash Drive or MicroSD card. If you choose not to use a Persistence volume at startup, Tails will run like the DVD version. If you choose to use a Persistence volume, Tails will run with your personal settings, files, etc.

To use a Persistence Volume:

  1. In the Welcome to Tails window, answer Yes to Use Persistence?
  2. Enter the Persistence volume password you created and Login
  3. Once you login to Tails, you can find your Persistent folder inside the Amnesia Home folder located on your desktop. Anything you save into the Persistent folder will carry over each time you use Tails with the persistence option selected

A few things you should know about the Persistence Volume:

REMINDER – When you go online, do not forget to disable JavaScript in the Iceweasel Web Browser (Edit > Preferences, select the Content tab and uncheck “Enable JavaScript”).

To see how well you have minimized your digital fingerprint, visit https://panopticlick.eff.org and click the Test Me button. Visit it from Windows, Tails DVD, Tails USB with JavaScript enabled, disabled, etc. Compare your various results and see which options leave you with and without a unique digital fingerprint.

Remember when I told you that you could use someone else’s computer without them knowing? Tails is how. When a computer boots from Tails it circumvents Windows and the computer's hard drive (in fact, you can remove the hard drive and still use Tails). Instead, it runs as its own operating system, utilizing only the computer's RAM. At shutdown, even if you eject the Tails DVD or remove the USB flash drive while the system is running, Tails wipes the RAM.

When using a computer other than my own, I only use the Flash Drive or Micro SD card in its USB adapter. The reason being, I do not have to worry about the Flash Drive getting stuck inside the computer when I need to do a quick bailout. I can just yank it and go. Even if I need the Plop Boot Manager DVD to boot, I can remove it as soon as Tails starts.

The websites pages to visit EVERY TIME you go online

Anonymity is always under threat. As such, you need to verify that you are securely connected to the Tor network, and you must stay current on Tor news. Every time you go online, the first websites to visit are:

  1. https://check.torproject.org/
  2. https://panopticlick.eff.org/
  3. https://blog.torproject.org/
  4. http://slashdot.org and search “Tor”
  5. https://search.disconnect.me/, search “Tor”, and then click “News”

News of a Tails or Tor exploit will travel fast. You do not want to find out when it is too late.

 

 

Section: Safe Updates and PGP Program Authentication

In this section, you will upgrade Tails. Unlike just about everyone else, you will not leave yourself vulnerable to a security breach during the upgrade. I cannot stress how important it is to upgrade Tails properly. Once upgraded, you can go stand outside Labor Camp 16's fence and wave to all those people that said, "just download and install Tails." Since they did not follow these steps, they installed Kim Jong-Un's decoy program, Twails.

You are going to use PGP encryption to authenticate this upgrade. In the next section, I will fully explain PGP, but, for now, just follow these steps to get through the upgrade. This way, once you get to the next section and start making encryption keys you will know you are working within an authentic system.

Downloading and Authenticating Tails

  1. Boot from your Tails Flash Drive or MicroSD card and login with Persistence enabled
  2. Once in Tails, go online and visit the website https://tails.boum.org/download

The Tails website offers plenty of information about authentication, but, it ain't easy. I am going to make the process more “keep it simple stupid” like.

  1. You need to download three files from this page. They are easy to find, but you may still have to look around (all the links will be in green rectangular boxes)...

At this point, you should be downloading the files “tails-i386-x.xx.iso”, “tails-signing.key”, and either “tails-i386-x.xx.iso.sig” OR “tails.i386-x.xx.iso.pgp

You need to wait for all three files to download before continuing to step 4. That could take a few hours, sorry.

  1. Verify if “tails-signing.key” is authentic. This step is a little erratic yet VERY IMPORTANT!

F.Y.I., in Windows, you can open a .key, .sig or .pgp file in Notepad.

  1. Now you will authenticate Tails

It is common for PGP files to end in “.asc” instead of “.sig”, “.key”, or “.pgp”. For any of these files, simply open them in gedit and the top line of the file's text will tell you if it is a Key, Signature, etc. That should save you a few headaches.

Updating Tails

  1. Now that you have authenticated your tails-i383-x.xx.iso file, you can burn it to a DVD-R
  1. Restart your system, this time booting from your new, up-to-date Tails DVD. Just go all the way into Tails; you do not need to create an Administrator password at login.
  2. Insert the same Tails Flash Drive or MicroSD card you have been using all along (Don’t worry; you are only updating it, not erasing it).
  3. From the top toolbar, select Applications > Tails > Tails installer.
  4. Select Clone & Upgrade
  5. Choose your target device (it is probably preselected), click Create Live USB, and then Next
  6. Once completed, you can boot from your up-to-date Tails Flash Drive or MicroSD card with your little secret Persistent world intact.

The following steps are different in your updated version of Tails...

When starting Tails, if you choose Yes for More Options at the Welcome to Tails screen, you are given the option to uncheck Spoof all MAC addresses and to use a Bridge to connect to Tor. Under almost all circumstances, you can leave these settings unchanged.

MAC address spoofing is a way of anonymizing your machine's identity within your local network. Spoofing can be a problem if your local network has restrictions that only allow connections from 'approved' machines. That could be the case within some office networks to increase security. Do not worry if you do not spoof your MAC address, it is not visible online like an IP address. It will only show a network administrator that your machine connected to the internet on a particular network at a particular time. It does not reveal your online activities.

A Bridge is an unlisted access point to the Tor network. Using a Bridge is necessary when a local network (like your office, coffee shop or internet service provider) blocks access to Tor by blacklisting known Tor servers. I talk more about Bridges in a few posts on my blog. You can read them at https://howtobeanonymousonline.info/?s=bridges.

The Tor Web Browser will not automatically open upon connecting to the internet. So...

  1. Connect to an Ethernet cable or Wi-Fi network
  2. Wait for a little Onion Icon to appear on the right half of the top toolbar. It will be yellow while it connects to the Tor network. Wait for it to turn Green.
  3. Once the onion turns green, open your browser from Applications > Internet > Tor Browser or by clicking the Blue and Green Tor Icon on the left half of the top toolbar

To disable JavaScript, in the Tor Browser:

  1. Click the Green Onion to the left of the address bar
  2. Click Privacy and Security Settings...
  3. Select High
  4. Click OK and you are finished

This also disables automatic loading of online custom fonts (an extra preventative measure to stop a website from determining fonts installed on your system)

Disabling Cookies: You no longer have the option of disabling all cookies. However, by default, Third-Party cookies are Disabled. These are the dangerous ones that track you from one site to another. First-Party cookies are Enabled, but, automatically deleted when no longer needed. These cookies only track you within the site that gave you the cookies. They are used, for example, to keep you logged into the site.

A few optional steps:

To disable automatic loading of online images (helpful to speed up browsing):

  1. In the Tor browser URL address bar, type 'about:config' and hit Enter
  2. Click the I'll be careful, I promise! button
  3. Scroll down to the permissions.default.image line. Either double-click, or right-click it and select Modify
  4. Change the integer value to “2
  5. Click OK and you are finished

 

Section: PGP/GPG – Everything you want to know

PGP allows you to encrypt messages. So, if you want to email a secret love note or favorite recipe without Kim Jong-Un fixing his hungry eyes upon it, type it into a little text file, encrypt it and send it.

PGP vs. GPG

PGP and GPG are pretty much the same. The difference between the two comes down to licensing and encryption algorithms that you probably will never notice. They are interoperable, so, using one will not leave you unable to communicate with someone that uses the other. Unless you are a mega uptight person, there is no need to distinguish between the two. I will refer to it all as PGP.

Quick explanation of .asc, .key, .pgp, .gpg and .sig files?

It is common to find PGP related files with the wrong extensions. If you suspect this to be the case, open the file in your gedit program (right-click the file > Open with > gedit). The top line of the text will tell you if it is a public PGP key, private PGP key or signature file. Just rename the file as needed. If the entire text is pure chaos, including the first line, it is an encrypted file, which you can give a .pgp extension.

Create your PGP key

  1. Open the Passwords and Keys program (Applications > System Tools > Preferences > Passwords and Keys)
  2. In the Passwords and Keys window, click File > New
  3. Choose PGP key, and then continue
  4. Enter a full name and email address (these do not have to be real). Adding a Comment is optional
  5. Click 'Advanced key options'
  6. Choose RSA and set the Key Strength to “4096” bits. You do not need to set an Expiration Date
  7. Click Create
  8. Make a strong password and remember it (it is unrecoverable)
  9. Your brand new public PGP key is visible by selecting GnuPG keys from the left column
  10. By right-clicking your key and selecting Properties, you can view its details, as well as change its password

Export and share your public PGP key

  1. Open the Passwords and Keys program (Applications > System Tools > Preferences > Passwords and Keys)
  2. Select the GnuPG from the left column
  3. Click your key to highlight it
  4. Click File > Export
  5. Select Armored PGP keys from the PGP Keys drop-box (in the bottom right corner of the Seahorse Export window)
  6. Give your key any Name you wish, just make sure it has the .asc extension (keyname.asc)
  7. Choose a location, and then click Export
  8. This file is your public PGP key. As the name suggests, it is for the public. You can share it with anyone, post it on a website, and give it to your worst enemy. It is used to 'lock' a file so that only you can 'unlock' it
  9. An Extra Special Step – Go to the location that you saved your exported public PGP key and use gedit to open it (right-click the file, Open with > gedit Text Editor). The text is your actual public PGP key. You can share this text instead of sharing the file. For example, instead of attaching a public PGP key file to an email, you can paste its text into an email. Likewise, you can post the key's text on a website as opposed to the file

Copy everything, Starting with “-----BEGIN PGP PUBLIC KEY BLOCK-----and ending with-----END PGP PUBLIC KEY BLOCK-----

Import someone else's public PGP key

  1. Save their filename.asc or filename.pgp public PGP key (you can save it anywhere, this is temporary). If you only have the text of someone's public PGP key, copy the text into gedit and save it as filename.asc. The filename can be anyname you choose

Copy everything, Starting with “-----BEGIN PGP PUBLIC KEY BLOCK-----and ending with-----END PGP PUBLIC KEY BLOCK-----

  1. Open the Passwords and Keys program  (Applications > System Tools > Preferences > Passwords and Keys)
  2. In the main window, click File > Import
  3. Find and open filename.asc
  4. You have imported the key and can see it by selecting GnuPG keys from the left column
  5. You can now delete the original filename.asc file that you used in Step 1

Import a public PGP key from a Keyserver

You can easily look up someone's public PGP key if they upload it to a keyserver. Keyservers are databases that anyone (even you) can use to share their public PGP key(s) with the world. To import someone's public PGP key from the keyservers:

  1. Make sure you are connected to the internet
  2. Open the Passwords and Keys program  (Applications > System Tools > Preferences > Passwords and Keys)
  3. Select Remote > Find Remote Keys
  4. Enter a search term, such as a Key ID or a Key name
  5. A list of public PGP keys containing the search term will appear. To Import a key, right-click it and select Import. Once imported, you can close the window
  6. The public PGP key is visible by selecting GnuPG keys from the left column

Encrypt a file with PGP

In the next steps, you are NOT using the Passwords and Encryption Keys program

  1. Before you choose a file to encrypt, you must have already imported the intended recipient's public PGP key. If you do not have anyone else's public PGP key, you can use your own key and send a file to yourself. Better yet, make a second public PGP key, and then use it
  2. Find the file that you want to encrypt (it can be on your desktop, in the persistent folder, or wherever) (if you need a file to test, just open gedit, write yourself a little note and save it)
  3. Right-click the file and select Encrypt
  4. The Choose Recipients window will open. The public PGP keys you have in your system are listed
  5. Select the recipient(s) for whom you are encrypting the file. Whether or not you sign the file is up to you. If you sign it, when the recipient decrypts the file they can see it is from you. It is kind of like putting your signature on a letter
  6. Click OK
  7. If you do not sign the file, you will be prompted to name the file. Any name will do (filename.pgp), and then click OK
  8. Only the chosen recipient(s) will be able to decrypt the file
  9. You can now send the encrypted file

Sign a file using your PGP key

You can put your signature on a file, so people know it is from you, not an impostor. You can sign both encrypted and non-encrypted files.

  1. Find the file that you want to sign (it can be on your desktop, in the persistent folder, or wherever) (if you need a file to test, just open gedit, write yourself a little note and save it)
  2. Right-click the file and select Sign
  3. Select your PGP key from the Sign message as window, and then click OK
  4. If prompted, enter your key password, and then click OK
  5. At the location of the original file a second file appears. It has the same name as the original, plus '.sig' added to the end (filename.txt.sig appears after signing filename.txt)
  6. The person verifying your signature needs three things, the original file you signed, the '.sig' file and your public PGP key (filename.txt, filename.txt.sig and your_public_key.asc)

Where security gets tricky

Ideally, the person verifying your signature had previously received and verified your public PGP key.

This process works like bank signatures did in the old days.

Now, suppose the bank received a signature card and a signed check at the same time. Meanwhile, you were not present. Even though the signatures match, the bank cannot tell if they are authentic.

You face the same dilemma if you get a public PGP key online at the same time as a signed file. You need a way to authenticate the public PGP key before you can use it to authenticate a signed file.

Authenticating a public PGP key

There are a two ways to make sure you have someone's actual public PGP key, not a fake.

Authenticate with the Keyservers:

If someone trusts that a public PGP key is authentic, they can sign it. When you import a particular key, you can see the keys of all the people that have chosen to publicly sign it, vouching for its authenticity. Using the terminal, you will view these signatures.

  1. Open the Passwords and Keys program (Applications > System Tools > Preferences > Passwords and Keys)
  2. Select the GnuPG from the left column
  3. Right-click an imported public PGP key, and then select Properties (as an example, select Tails Developers tails@boum.org 'offline long-term identity key')
  4. Take note of the Key ID, because you will need it in a moment (in this case, 58ACD84F – as of August 1, 2015). You can leave this window open while you proceed to the next step
  5. Open the Terminal program (Applications > Accessories > Terminal)
  6. In the Terminal window, type “gpg --list-sigs Key_ID”. In this example, you would type gpg --list-sigs 58ACD84F
  7. The terminal displays a list of signers

The more signatures that are from people you know and trust, the more trust you can have in the keys authenticity

This trust stuff is a big deal for software developers collaborating on projects and, in the case of my family, Christian missionaries spreading the word to hostile lands. For most other people, PGP is just a way of pretending to be Batman and Robin exchanging puppy memes without the Joker eavesdropping.

Authenticate with the key's Fingerprint.

To check a key's Fingerprint:

  1. Open the Passwords and Keys program  (Applications > System Tools > Preferences > Passwords and Keys), and then import the key in question
  2. Select the GnuPG from the left column
  3. Right-click the key, and then select Properties
  4. Under the Details tab is the key's Fingerprint (for example, the Tails developers fingerprint is A490 D0F4 D311 A415 3E2B B7CA DBB8 02B2 58AC D84F)
  5. Compare the Fingerprint to that of others who have the same key in their possession. The more corroborating sources, the more trust you can have in the keys authenticity. If it is a popular key, an online search may provide a number of comparisons
  6. If you believe the key is fake you can delete it (right-click the key, and then select Delete)

Upload your key to the keyservers / Sync keys you have signed

You DO NOT need to upload your public PGP key to the keyservers in order to sync the other keys. However, if you want your public PGP key publicly available, use the following “sync everything” steps. If you would rather not publicly list your public PGP key, use the following “sync a particular key” steps.

To upload/sync everything...

  1. Open the Passwords and Keys program  (Applications > System Tools > Preferences > Passwords and Keys), and then import the key in question
  2. Select Remote > Sync and Publish Keys
  3. Click Key Servers, and then choose a keyserver from the Publish keys to: drop-down menu and click Close
  4. Click Sync
  5. Your personal public PGP key will be uploaded. Also, the other keys will sync to reflect new trust signatures

Authenticate software

  1. Download the following files into one folder...

Wait for all three files to download before preceding

  1. If you need to, authenticate the imported public PGP key, aka “signing key” (get it in person, check the keyservers, fingerprint or whatever else works for you)
  2. Verify the signature...

If you see filename.xxx Good Signature, you have authenticated the file!

If you see filename.xxx Unknown Signature, you have not authenticated the file. Either you did not download the entire file, forgot to import the public PGP key before checking the signature, imported the wrong public PGP key or the signature is wrong or forged.

Authenticate software (Real Life Example)

Here is a real life example using a few demonstration files from my website

  1. Make sure you are connected to the internet, and then open the Tor Browser (Accessories > Internet > Tor Browser)
  2. Go to https://howtobeanonymousonline.info/pgpkey/
  3. Right-click 'Anna M Eydie Public PGP Key', and then select Save Link As
  4. Click Save to save annameydie.asc. Any location will do
  5. Now, go to https://howtobeanonymousonline.info/sigtest/
  6. Right-click 'Some Random File', and then select Save Link As
  7. Click Save to save some_random_file.zip. Any location will do
  8. On the same web page, right-click 'Some Random File Signature', and then select Save Link As
  9. Click Save to save some_random_file.zip.sig. You must save it to the same location as some_random_file.zip
  10. You can close or minimize the Tor Browser
  11. Using the File Manager (Applications > Accessories > Files), navigate to the location of annameydie.asc
  12. Right-click annameydie.asc, and then select Open With Import Key. A 'Key Imported' message will display in the upper right corner of Tails
  13. Now, navigate to the location of some_random_file.zip and some_random_file.zip.sig
  14. Right-click some_random_file.zip.sig, and then select Open With Verify Signature
  15. A 'some_random_file.zip.sig: Good Signature' message will display in the upper right corner of Tails

Section: Email, Chatting, Messaging

I do not trust email providers. Not a single one. Neither should you.

Since the Snowden scandal erupted, there are service providers touting their non-USA based servers. To me, this means nothing. What do I care if the server is in the United States or not? The United States is not the only country with intelligence agencies that want to read people's email. The only difference between the United States and other countries is Edward Snowden happened to work for the USA, so he blew his whistle on them and fled to Russia. If he worked for the Russians, he would have blown the whistle on them, fled to the United States and received a medal from the President. If he worked for North Korea, he would have been too hungry to blow the community whistle.

Anyway...

Three criteria for anonymous email:

  1. A confirmation method must NOT be required. Confirming an account requires that you already figured out how to be anonymous for the previous account, which would then mean you do not need a new anonymous account.
  2. JavaScript must NOT be required since it is a vehicle for malware.
  3. Tor affiliated IP addresses must be allowed. Gmail, for instance, blocks IP addresses it links to Tor.

Email providers that meet all three criteria:

You can use any email provider that meets the three criteria. You are not limited to one I mention. However, you are limited by the difficulty in finding providers that meet the criteria (Hushmail does not meet the criteria).

*If the limits prove too constricting, I cover alternative email options later in this section*

The risk with email providers is they can change or shutdown at any time. Since I first wrote these instructions, I have had to abandon three email providers. One no longer meets our criteria, another quit accepting new accounts, and a third shutdown. At the moment, one service, Safe-mail.net, meets the three criteria.

[Latest Update: a new email service, https://ruggedinbox.com, now meets the three criteria!]

Safe-mail is not safe! Do not let anyone tell you otherwise. Its servers are in Israel. It is easy to imagine that a back door is built into their system per government request. Having said that, Safe-mail meets the three criteria. You just have to access the website from within your anonymous system and encrypt messages yourself BEFORE they are uploaded and sent. If you follow the rules, you do not need to trust the email provider that you use.

Signing up with Safe-mail

  1. Go to https://www.safe-mail.net
  2. Click Sign Up now!
  3. Read about how you give them the right to access your account, and then Agree (or Disagree and go home)
  4. Fill the stuff out and click Sign Up
  5. Congratulations!! it will say.
  6. From your browser's address bar, go back to https://www.safe-mail.net. (if you click the 'Continue to Safe-mail System' button, you are taken to the JavaScript interface. It will not work well)
  7. On the main page, when you sign in you need to select Fast (no scripts or icons) from the Interface drop-down menu. The other interface options do not work with JavaScript disabled
  8. If you get a Security message, just click Continue. If you get a Your IP Address has changed... message, just enter your password and Continue

Now, you have an anonymous email account.

Is Not-so-Anonymous email actually more Anonymous?

Anonymous Email is NOT convenient. First of all, since options are limited, you are totally dependent on a service not shutting down or changing its system in a way that is incompatible with your system. Second of all, you might not want an email address that looks anonymous. Your careless boss is going to keep an eye on you, wondering why you need a '@safe-mail.net' email address. To be honest, I would never use Safe-Mail.net. I do not think they have a bad system, I just think using them puts a target on my back.

A now defunct email provider, TorMail, was the source of a major JavaScript exploit in which an attacker was able to insert malware into the systems of Tor users visiting the TorMail website. The malware learned a TorMail user’s real IP address and then reported it back to the attacker. The malware relied on the user having JavaScript enabled in an outdated version of Tor Browser running on a Windows System. Users following this guide were immune to the exploit.

Let us consider four reasons why TorMail and its users were likely targets. First, TorMail was run on servers owned by a small company specializing in anonymity, which also happened to host illegal websites. Second, TorMail was a relatively small, unknown service that happened to be popular among individuals conducting illegal activity. Third, since TorMail was only accessible to Tor users, an attacker was going to put forth the creative energy to unmask its users. Fourth, in the event an attacker was able to access the contents of TorMail accounts (and they did), they could retrieve user's past communications and pseudonyms to link them to physical locations and real identities. Had TorMail been a large company, it is likely they would have had a security team in place to identify and stop attacks in a relatively short amount of time. Also, it would have run from in-house servers, not ones that also hosted someone else's content that may have been a target for seizure. Besides, had it not been billed as some super secret anonymous email provider, nobody would have given it a second look in the first place.

For the sake of inconspicuousness, selectively, thoughtfully breaking the JavaScript rule is not the end of the world. Following, are a few points that might help you decide if breaking the rule for email is right for you.

Instead of Windows, you are running Tails, an open source Linux operating system. This fact alone reduces the likelihood that you fall victim to a malware attack. It makes much more sense for an adversary to develop an attack for Windows than Linux, since Windows has a larger user base. Not only does Linux have a smaller user base, there are numerous variants of Linux within that base. Additionally, being open source and popular, the Tails code has many eyes on it. An attack targeted at more than a few, select Tails users will hurriedly be recognized and rectified by the open source community.

By running Tails from a DVD-R and selecting No when prompted at the initial More Options screen, you have two layers of security that the TorMail victims did not. Using the DVD denies the ability for a program to carry over from one session to another. Furthermore, when you select No from More Options, you deny Root Access. Without root access, changes cannot be made to system files.

There are also some advantages to using a well-known email provider:

Is not-so-anonymous email actually more anonymous? Weigh the options. If you need super-untraceable anonymous email, the account must meet the three criteria. However, your options are limited and may leave you using an email provider that draws unwanted attention. By flying under-the-radar, you have more services to choose from and are less noticeable.

Internet Relay Chat

IRC (Internet Relay Chat) has been around since the old days... That is the 1980's. Just like Ray-Ban's and Will Smith, it has not aged a bit. It is simple, it is quick, you can send private messages and you can group chat. So, let's get to it...

Special Notice: Unfortunately, DDOS attacks on the Tor IRC server happen. During such events, connections may fail. So, if you cannot get a connection, despite doing everything right, you are not crazy.

Chatting

  1. From the top toolbar, Go to Applications > Internet > Pidgin Internet Messenger
  2. The “Buddy List” and “Accounts” windows will open... If not, look at the right half of the top toolbar. To the left of the Green Onion icon will be an icon that looks like a little message box behind a circle. Click this icon and the windows will open. Then, select Accounts > Manage Accounts
  3. An account that you can use is already created with a random username. To use it, click the checkbox in the “Enabled” column next to random_username@irc.oftc.net. I will show you how to create a new account later.

(If you are working within your Persistence system, your account and username will carry over to future sessions. If not, you will have a new name for each session)

  1. A third window will open and display your connection (If you get an SSL Connection Failed, double check to see if you are online). At the top of this window select Conversation > Join a Chat.... You can also join a chat from the Buddy List window by selecting Buddies > Join a Chat...
  2. Now a fourth window opens! Just click Room List
  3. Finally... Your last window is open!!! From this Room List window, you can... you guessed it... choose a chat room. Just scroll around, pick a room and click Join (you can join more than one room)
  4. Move or Close the Room List window and go back to the Conversation window. Your room choices will show as Tabs. Click the tab for a room and go chat
  5. To Instant Messaging an individual, right-click their name, select IM and send a message

I want you to look at something. Right-click a name in the names list and select Info (your name or someone else's... it does not matter). There is revealing information here. If you login to IRC from outside Tails, the information under the Username will be your IP address and internet provider. Kim Jong-Un's cyber scouts would love to see this it!

Messaging

  1. In the Buddy List window, select Buddies > +Add Buddy
  2. Add the username of the buddy you want to instant message within the Buddy's username box (I realize you probably do not have a buddy yet, so, the easiest thing to do is run Tails on a second computer, open up another IRC window and talk to yourself OR you can go randomly select some lucky user in some random chat room and hope he/she is lonely enough to humor you)
  3. You will now see your buddies name under Buddies in the Buddy List window. Right-click it and select IM
  4. You can chat away, BUT, you need to follow a couple more steps to be Private
  5. From the top toolbar of your Chat window, select OTR > Start private conversation
  6. After a few seconds, your conversation will turn private, BUT, you still need to Authenticate your Buddy
  7. Again, select OTR, and then select Authenticate buddy
  8. The Authenticate Buddy window will open. There are three options for authenticating your buddy. For simplicity, just choose Question and answer. Then, type a question and answer that only you and your buddy know and click Authenticate
  9. Your Buddy will receive the question on her end. If answered correctly, you will be told Authentication successful. Your Buddy is now Authenticated (Even though you just Authenticated your Buddy, she has not Authenticated you. To Authenticate you, she will send you a question)
  10. Click OK
  11. Go back to the Buddy List window that has been open the whole time. Right-click your Buddie's name and select OTR Settings. The OTR Settings window will open
  12. Uncheck Use default OTR settings for this buddy
  13. Check Enable private messaging, Automatically initiate private messaging and Require private messaging
  14. Whether you want to "log OTR conversations" is up to you. Personally, I do not log anything, just in case Kim Jong-Un gets into my Persistence system. Then again, the whole point of a Persistence system is so you can save stuff like this, so, to each his own.
  15. DONE. Yay!

Other IRC stuff

Adding Another Account:

  1. From the Buddy List window, select Accounts > Manage Accounts
  2. In the Accounts window, click the Add button
  3. The Modify Account window will open
  4. IMPORTANT - There are 1000's of IRC networks throughout the world. Many block TOR IP addresses... meaning they are blocking you. If you are curious, internet searches will turn up other networks and their settings. We will use the irc.oftc.net server.
  5. Input the following in the Modify Account window, under the Basic tab:
  1. Under the Advanced tab:

Sending/Receiving Files

This feature does not work on IRC through the Tor network. Sorry.

Add Buddy Pounce

This is for you to set some notifications

  1. Right-click your Buddies' name and select Add Buddy Pounce...
  2. Check the boxes that fulfill your Buddies' activity notification desires

Section: Writeprints – They will identify those other anonymous netizens... but not you

As I stated before, my goal in writing this manual is to provide you with a means of being anonymous. It is not intended to be a comprehensive book about anonymity technology, so, please forgive me for the brevity on this topic. Still, I will try to give you a clear understanding of writeprints, how they can be used as a weapon against your anonymity and how to counter the attack. A sharp, good looking person like you can keep the writeprinters off your ass with just a little bit of knowledge and effort. Let's get to it.

Writeprints are a means of identifying an author solely from the characteristics of her written work. It is a separate discipline from handwriting analysis and digital forensics. With the ability for individuals to mask IP addresses and minimize digital fingerprints, writeprinting is often the only method available to identify the author.

The field of writeprinting is far from perfect, however, the accuracy of some writeprinting analysis is scary. Bloggers, tweeters, chatters, and posters are identified enough to warrant concern. I do not rank writeprints as high as fingerprints, digital fingerprints, handwriting analysis or DNA when it comes to evidence. Writeprinting is more comparable to a witness telling the police that the thief was "around 5'5, 300lbs, round-faced, oddly tanned skin, had short brown hair shaved on the sides, was smiling, waving, wearing a Dennis Rodman jersey and riding a white stallion into the sunset." That does not give the police a name or address, but, it does allow them to focus their search.

A number of methods are available for writeprint analysis. Most seek to identify an author by combining a variety of features, such as average word length, vocabulary complexity, favorite words, topics, grammar, punctuation, capitalization and sentence length. These nuances vary enough between individuals that they can be compiled to create a unique writeprint. To clarify, when I talk about the author, this does not only mean someone that has written a book, article or some other large body of work. That applies to individuals who post on message boards, tweet, blog or email. Ten 50 word tweets can be as useful as one 500 word email.

As part of China's 12th Five-Year Plan, funding was provided for extensive research into identifying bloggers with writeprints. Apparently, they find it imperative to identify people who exercise free speech. A China funded study at their own Wuhan University had an 80% success rate when attempting to single out different authors from a pool of 50 Amazon.com reviews [1]. Of course, China is not the only beneficiary of writeprinting. Corporations and other governments can use writeprints to identify whistleblowers.

The most famous case study in writeprinting involves the Federalist Papers. The Federalist Papers are 85 anonymously authored articles, published in the late 1780's, to promote the ratification of the United States Constitution. Speculation by scholars, as well as contradicting claims by various Founding Fathers, narrowed the field to only a handful of potential authors. Researchers writeprinted the 85 articles and determined there were three authors. Author #1 wrote 51 articles, Author #2 wrote 26 articles, Author #3 wrote five articles, and Authors #1 and #2 collaborated on three articles. By matching the writeprints of each article with the writeprints of the Founding Fathers, it was determined that Author #1 was Alexander Hamilton, Author #2 was James Madison and Author #3 was John Jay.

Investigators are not always so lucky as to have a list of suspects from which to identify an author. This scenario was tested by a team of researchers who mined writeprints from an email database in which all emails were anonymous, and no suspects were given. The researchers extracted each email's writeprint. With that, they grouped the emails by their respective authors (example: suppose there were 100 emails, they determined 30 emails were by one author, 20 by another and 50 by a third). Once each author's emails were grouped, creating a larger body of work per author, a more accurate writeprint was extracted [2]. No further attempt was made to identify each author's true identity, but, one can only imagine what an entity with large resources and supercomputers scouring the web could do with the “more accurate” writeprints.

In another project, researchers extracted unknown authors writeprints from individual, anonymous blog posts. The writeprints were matched against a database of 100,000 non-anonymous blogs (2.4 million blog posts in total). With no further personal investigative work and strictly using open source software, the researchers were able to identify successfully the authors 7.5% of the time. When the researchers extracted an unknown authors writeprints using three anonymous blogs posts, the success rate grew to 25%. Even when writeprinting failed to match unknown authors to their non-anonymous blogs, the field of possibilities was often narrowed from 100,000 to 20 [3].

Given the previous research, let's play out a scenario that applies existing technology:

Realistically, the investigators are going to be more thorough. The scenario will probably go more like this:

Given this scenario, there is probably a much greater than 7.5% to 20% chance that the software correctly identifies Sam from the 900 employees. There is probably a near 100% chance that the writeprinting software can narrow the field to 20 suspects, of which Sam is included. From these 20 suspects, traditional investigative techniques can probably weed out Sam as the whistleblower.

This scenario might be hypothetical, but, it is not unrealistic.

You have an advantage over Sam in that you know writeprints exist. As such, you will not be naive when you send that letter exposing the toxic waste dump in Tumangang City. Moreover, since you are a genius, you can wear your leather writer gloves so your prints do not end up all over the net.

IMPORTANT – You should not mask your writeprints in your daily life. You only mask them when you need to be anonymous. You do not want to alter your non-anonymous writeprints and end up with them matching your anonymous ones.

A few techniques you can apply to anonymize writing:

You do not necessarily need to follow all of these methods. You can pick and choose those that you feel best work for you

Applying the previous techniques can make you stand out as trying to hide your writeprints. Feel free to use them as a guide for faking your writeprints instead of following them exactly to obscure your writeprints

Above all else, writeprinting relies on your consistency as a writer. Fortunately, you can change your style anytime without too much hassle.

For fun, visit http://www.textalyser.net to have stuff writeprinted.

Section: Bitcoin is NOT Anonymous

Think of Bitcoin as digital cash. Until recently, it served as a means for high-risk currency trading, gambling and drug dealing. It was popular for these transactions because it was unregulated, easily used internationally and could be traded for government-issued currencies on exchanges, the most famous being the now defunct Mt. Gox.

Here is a tiny history of Bitcoin. It was introduced to the world in 2009 via the white paper “Bitcoin: A Peer-to-Peer Electronic Cash System.” Just about nobody cared about Bitcoin until 2011 when the price of one Bitcoin went from $1 to $32 and back down to $2. After this first crash, financial nerds figured Bitcoin was just a cheap thrill that would soon fade away. After creeping up to $14 by the end of 2012, Bitcoin reached $1240 on December 4, 2013. Now, Bitcoin has scrutiny. Venture capitalists, FBI agents, and Academics are all over the technology, and, for various reasons, are dedicating resources to tracking and identifying users. The IRS and DEA showed that they are in the game by making the high profile arrests of Charlie Shrem, CEO of BitInstant and Robert Faiella, aka BTCKing, from the Silk Road on January 27th, 2014 (read a brief of the events at https://howtobeanonymousonline.info/bitcoin/busted/.

Before I go into why Bitcoin is not anonymous, I want to mention why Bitcoin is awesome:

While I am not going into all the details of Bitcoin’s inner workings, I am going to dispel the misconception that Bitcoin is anonymous. In fact, Bitcoin is the most public payment system in the world. Previously, it was considered “anonymous” because no entity cared enough to track transactions and identify users. Well, as I just mentioned, they care now.

Tracking Bitcoin is manageable for those with ample resources because every Bitcoin transaction is broadcast to the world through what is known as the Blockchain (visit https://www.blockchain.info to see). The Blockchain prevents a person from double spending a Bitcoin. Since every transaction is broadcast to the public, the “anonymity” comes from the fact that an individual's Bitcoin wallet address is publicly displayed instead of their actual identity. This is known as pseudonymity, not anonymity.

Here is a liberal scenario to help explain why this is a problem.

Let’s rework this scenario with a Bitcoin.

Using Bitcoins, Xavier, Yasmin and Zack thought they were on the “down-low” since all of their activity was done behind their computers using fake IP addresses and randomly generated "anonymous" Bitcoin wallet addresses. So wrong they are!

There are a number of ways to track Bitcoins along their transaction chain [7]. In fact, many stolen Bitcoins have never been used because there are no places to spend them without the risk of being identified. If they are traded on one of the major Bitcoin exchanges for government-issued currency, to be useful, the money must eventually be transferred to a bank. Subpoenaing an exchange would reveal where the money was transferred to or from. Subpoenaing the bank would identify who owned the account (Subpoenaing an exchange is one of the means the Feds used to identify BTCKing, from the Silk Road, as Robert M Faiella). If the Bitcoins were used to purchase physical goods, those physical goods would need to be physically delivered, exposing the receiver to the risk of identification or the goods to possible seizure. Selling a large quantity of Bitcoins in person is unrealistic since a well-informed person would not buy an enormous  volume of Bitcoins from a mysterious seller knowing we now live in a world where the FBI can and has seized illegally obtained Bitcoins (read about Ross William Ulbricht).

Thank God for Bitcoin "laundry" services! They will scrub those dirty, traceable Bitcoin's clean... Right? Maybe?? Hopefully???

Nope.

Using a Bitcoin laundry service assumes two things; First, they will wash your Bitcoins. Second, you can trust them for anything else.

Washing a Bitcoin is no simple task. The laundry service needs to mix your Bitcoin with LOTS of other Bitcoins. Then, those mixed Bitcoins must be divvied up and sent through LOTS of separate transactions where, again, they are mixed with new Bitcoins and re-divvied up at every step. That must happen to the point where it is statistically impossible to prove the link from a fraction of the Bitcoin at the beginning of the process to a fraction of the Bitcoin at the end of the process. That just is not going to happen. In fact, researchers tested out some Bit-Laundry services. The results? The Bitcoins were stolen, or the same Bitcoins were returned [7]. I am no genius, but, I would say if you took your dirty shirt to the cleaners and it came back dirty, you got f-cked. If you took your dirty shirt to the cleaners and they stole it, you got double f-cked.

Using a Bit-laundry service also brings us back to the third party trust issue. This entity could be tracking or sharing data, susceptible to subpoenas or under siege by Kim Jong-Un. Seriously, when is the last time you went to the cleaners, and it was not run by Koreans? I certainly can't remember.

So what the heck!

As with everything else cyber-related, there are computer geeks working on a solution. Last year, the John Hopkins University Department of Computer Science began developing Zerocoin, an add-on to Bitcoin to anonymize Bitcoin transactions. This year, the Zerocoin developers joined another group of developers and renamed the project Zerocash.

Zerocash will make use of two new crypto-currencies, a new ‘Zerocoin’ and a yet-to-be-named ‘basecoin.’ Zerocoins will be anonymous, and the basecoins will not.

If a user cannot initially obtain Zerocoins through a transaction, she will purchase or accept basecoins, and then convert those to Zerocoins. Once the user has Zerocoins, they can be spent without revealing the coin amount or addresses of the parties involved and without relying on a central authority. Importantly, the Zerocoins will not need to be spent in the same amount as the original basecoin conversion (an improvement upon the original Zerocoin project). In other words, a user can convert two basecoins into two Zerocoins, and then only spend one. As long as the two parties in the transaction are willing to accept Zerocoins, there will be no need to convert back to basecoins, although that will be an option. The Zerocash project remains in the testing phase.

In my opinion, for crypto-currencies to achieve widespread use, they must incorporate anonymity. Imagine if all of your financial records are public. Your coworkers will see your income. Your useless friend that needs a loan or your needy pastor that wants to remodel the chapel will know your bank balance. Your nosy neighbor will tell everyone you are broke and a month behind on your Mercedes payment. If the current Bitcoin becomes a dominant currency, this will be your reality.

On my blog (https://howtobeanonymousonline.info/) I will keep you up to date on crypto-currency anonymity innovations.

The Great Flaw – You are not Stealth, You are Secure

At the source, anyone spying on your home internet connection can see if you are using Tor (You Are Not Stealth). They cannot see what you are doing, whom you are talking to or what you are reading. All they know is that you are going somewhere, and they will probably not find out where (You Are Secure).

In the middle, out in the Tor network, spies can see activity. They cannot see what it is, where it came from or where it is going (You Are Secure).

At the destination, wherever that may be, spies can see Tor users visiting. They cannot see who the visitors are or where they came from (You Are Secure).

On a grand scale, this is all the security you need. It does not matter that you are not stealth. Since you are one person out of hundreds of thousands floating across the Tor network every second, it should not be inferred which of those anonymous connections is yours. On an intimate scale, this is not the case.

During December 2013's final exam's week, Harvard University was emailed a bomb threat. Upon reviewing the email, the FBI could see that it was sent using the Guerrilla Mail service from a Tor IP address. From there, they searched Harvard's system records for all students that accessed Tor around the time of the email. Next, they asked those students if they sent the bomb threat. One student, a Korean whose surname happens to be Kim, confessed (I swear to God, it was a Korean named Kim).

I only use this story as an example of blowing one's cover because the good morality stories do not make the news. Please do not send any bomb threats. You will make us both look like a--holes.

 

 

In Closing

The Germans used the “unbreakable” Enigma machine to encrypt communications during WWII. Unfortunately for the Nazis, the United Kingdom’s Ultra program broke Enigma, and the Brits read their sh-t. See the story in the movie The Imitation Game!

In the 1950's, the United States was flying over the Soviet Union with a badass spy-plane called the U-2. Even though the Soviet's could see it, it was too high to shoot down. Then, on May Day, 1960, the Soviets shot one down.

In the 1970's, the Data Encryption Standard was developed and implemented as the United States' federal standard for data encryption. In 1998, it was broken by brute force using background processing power provided by volunteers on the internet.

Eventually, all security is breached. When? Who knows. Apply the analogies as you see fit.


Stay ethical. Stay legal. Have fun.


A M Eydie

***

If you want to say something nice, Amazon.com has a comment section…

If you want to complain, please first read the 4th paragraph of the Preface that was available in the free preview for you to read before you bought the book. If you still hate me, you can get a refund (Amazon.com > Your Account > Manage Your Content and Device > Actions > Return for Refund)

***

To donate to Tails, visit: https://tails.boum.org/contribute/how/donate.

***

If you want to send an e-card to taunt or praise Kim Jong-Un, one of these cheerleaders for human equality can forward it to him: http://www.korea-dpr.com/organization.html. Long live the Kim's!

***

BONUS Section ahead → → →

BONUS – Creating a bootable microSD card that doubles as your phone's microSD card

WARNING – This is cool, but not highly secure.

This works on microSD cards formatted by Android phones. Like Tails, Android is a Linux-based operating system; therefore, they use the same file format.

A quick preview of what you are going to do... You will format your microSD card with your phone, and then install Tails using a program called UNetbootin.

The following instructions, with screenshots, are posted at https://howtobeanonymousonline.info/tutorial/sdcard-2/

What you will need:

Start Tails with Root Privileges

  1. Boot Tails from your DVD (you are using the DVD because you will be downloading software into Tails. You do not want changes made that can carry over to future sessions)
  2. At the Welcome to Tails screen, choose Yes for More Options?
  3. Create an Administration password, and then Login (other options can remain unchanged)

Download and Install UNetbootin

  1. In Tails, connect to the internet
  2. Once online, go to the top toolbar and select Applications > System Tools > Administration > Synaptic Package Manager
  3. When asked, enter your Administration password and click OK
  4. The Synaptic Package Manager will open. It is a database of programs that you can easily install in Linux, and therefore Tails. At the moment, you will only see programs that are currently installed on your system
  5. At the top-left corner of the window, click Reload. The Download Package Information window will open (if you get an error, double check to make sure you are online). You will see that it is downloading new package information. It might take 10 minutes, or so, to finish
  6. Click the Search button at the top-right corner of the Synaptic Package Manager window. Type unetbootin in the search field and click search
  7. A few package options will be displayed. Right-click unetbootin and select Mark for installation
  8. Click the Apply button at the top
  9. In the Summary window, click Apply. You will see it downloading and installing.
  10. Once the Changes applied window opens, click Close
  11. You can close Synaptic Package Manager.

Install Tails to your Phone's SD Card

  1. With your phone, format the microSD Card (every phone is different, but you probably go somewhere like Settings > Memory > Format)

The next steps quickly become confusing, so I am going to be specific.

  1. Back in Tails, double-click the Computer icon on the desktop. It will open the File Browser
  2. Once the File Browser window is open, insert the formatted microSD card with USB adapter into your computer
  3. You will see a new drive icon appear in the File Browser window (probably named Generic Mass-Storage). Double-click this icon to reveal its contents
  4. You will see the file folders your phone put on the card when it was formatted (Documents, Music, Photos, etc.)

Even though you cannot see it yet, the microSD card drive is now “mounted” to /dev/sda1. This will matter in a minute.

If you need to download the Tails.iso file, see the Downloading and Authenticating Tails section for instructions.

  1. If you chose to download Tails beforehand onto a second flash drive, insert it now. Just as before, find its icon and double click it. Once you open it, it will also be “mounted.” This time to /dev/sd b 1 ( as opposed to sda 1) .

Now that the drives are inserted and mounted...

  1. Open the Terminal (from the top toolbar, select Applications > Accessories > Terminal)
  2. In the terminal, type unetbootin and press Enter
  3. Enter your Administrative password and click OK
  4. UNetbootin will open
  5. Tick the bullet for Diskimage (it is the second choice)
  6. Select ISO from the drop-down menu.
  7. On the same line as Diskimage and ISO, click the little box with “...” in it. The Open Disk Image File window will open
  8. Find your Tails.iso file. If you downloaded it to the Amnesia folder, go to the left column and select File System > home > amnesia. If it is on your flash drive, select the drive from the left column. When you find your Tails.iso file, click it, and then click Open
  9. Now, you are back in the UNetbootin window. On the bottom line, make sure Type: is USB Drive and Drive: is /dev/sda1.
  10. Click OK
  11. It will take five to ten minutes for Tails to install. Do not worry if the progress bar stalls around 84% (it stalls because the particular file it is working on is large).
  12. Once it tells you “Installation Complete, Reboot” you can Exit.
  13. When you boot from the microSD card, you will notice that the boot process has changed. Instead of the black “Boot Tails” screen with the 'Live' and 'Live (failsafe)' options, you will be taken to a blue blue screen with a few other choices, starting with Default. Just use your arrow key to go down and select Live.
  14. You are done. You can boot into Tails, and you can use the card in your phone to save pictures, music and whatever else.

Unfortunately, you cannot create a persistence volume. If you do, you will wipe out everything your phone saved to the card.

WARNING... AgainI DO NOT CONSIDER THIS SECURE. I can imagine too many scenarios in which Kim Jong-Un can hack your phone and manipulate your SD card from Pyongyang.

Secure or not, having a secret operating system in your phone is pretty cool, especially when you can use it to boot someone's computer.

Go impress somebody in the Chess Club.

 


 

The following works are cited in these instructions:


1: Jianwen Sun, Zongkai Yang, Sanya Liu, Pei Wang, Applying Stylometric Analysis Techniques to Counter Anonymity in Cyberspace, 2012

2: Iqbal, Farkhund, Hamad Binsalleeh, Benjamin Fung, and Mourad Debbabi, Mining writeprints from anonymous e-mails for forensic investigation, 2010

3: Michael Brennan, Rachel Greenstadt, Deceiving Authorship Detection, 2011

4: Aylin Caliskan, Rachel Greenstadt, Translate once, translate twice, translate thrice and attribute: Identifying authors and machine translation tools in translated text, 2012

5: M. Schmid, Computer-aided Writeprint Modeling For Cybercrime Investigations, 2012

6: Michael Brennan, Rachel Greenstadt, Practical Attacks Against Authorship Recognition Techniques, 2009

7: Meiklejohn, Sarah, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage, A fistful of bitcoins: characterizing payments among men with no names, 2013


 


[*] 

              In the first half of 2014, a Bitcoin mining pool named GHash.IO came to comprise over 50% of the mining power in the Bitcoin network. Previously, it was thought to be practically impossible for a single entity to gain such a large position. GHash.IO could have used their position to manipulate and compromise the Bitcoin system... essentially, asserting some 'Central Authority' powers. Major Bitcoin miners left the pool to remove the 50% threat, as those most vested in Bitcoin would stand to lose the most if confidence in the currency evaporated. Do an online search of “Bitcoin 51% Attack” to learn more.