What's new
  • ICMag with help from Landrace Warden and The Vault is running a NEW contest in November! You can check it here. Prizes are seeds & forum premium access. Come join in!

How to use an Apple Computer and never be tracked

Snype

Active member
Veteran
OK guys, I'm so bad at computers and all this new age stuff. I'm hoping there is a real way to never be able to be tracked on my computer. With all this stuff going on in the news with the powers above us, they seem to be able to track us on a regular basis. I simply do not want to take that risk. I remember Krunchbubble saying that he is able to go online from his zip drive and has all types of programs set up that look like he is somewhere else in the world. Does anyone have any knowledge if this is even a possibly in today's world? If it is possible for me to do this, can someone walk me though it and take into account that I'm not smart at all when it comes to computers and computer language. Thank in advance!
 

babelfish

Member
OK guys, I'm so bad at computers and all this new age stuff. I'm hoping there is a real way to never be able to be tracked on my computer. With all this stuff going on in the news with the powers above us, they seem to be able to track us on a regular basis. I simply do not want to take that risk. I remember Krunchbubble saying that he is able to go online from his zip drive and has all types of programs set up that look like he is somewhere else in the world. Does anyone have any knowledge if this is even a possibly in today's world? If it is possible for me to do this, can someone walk me though it and take into account that I'm not smart at all when it comes to computers and computer language. Thank in advance!

right.

1. download live cd of something like ubuntu
2. install it to a usb drive
3. boot from that usb drive
4. use the tor browser bundle
5. IMPORTANT: does not guarantee anonymity

Next step:
VPN:

encrypt your interactions to internet at your router, and push them out of some other rabbit hole you control, like a server

next step: proxies

vpn to server, proxy to tor, use the internet.

but unless your dodging a nation-state, livecd installed to usb with tor should do it. encrypt your home directory on install if your paranoid. get a usb that can self destruct if your really paranoid.

oh. and your still not safe to post pix that include any landmarks, license plates, or any other identification, and you should still use something to remove exif data. perhaps take a glance at an imagemagick script.
 

Snype

Active member
Veteran
You sound like you are speaking another language. From the way you speak it sounds like the powers above me can find me but people like you can't. That's not what I'm looking for if I can't stop the powers, then there's nothing. We are all just trapped in a box in this world. Sounds like the future 3030 is here. There's only one way out of this ant farm and it doesn't include technology. Any day now our babies will come with RFID chips.

http://www.youtube.com/watch?v=5eKBXiAVkUA
 
Last edited:

Bababooey

Horse-toothed Jackass
Veteran
Yep, pretty much.
The DEA has access to NSA spy systems, so they can hunt you just like the cia hunts terrorists.
Although, unless you're cartel-level, they (special ops division) probably dont care.
So far.
 

teemu shalanie

WeeDGamE StannisBaratheoN
Veteran
go back to land line. stop using Internet , get a pager only call back from pay phones

hard work staying off the radar

TS
 

Marco61

Member
You sound like you are speaking another language. From the way you speak it sounds like the powers above me can find me but people like you can't. That's not what I'm looking for if I can't stop the powers, then there's nothing. We are all just trapped in a box in this world. Sounds like the future 3030 is here. There's only one way out of this ant farm and it doesn't include technology. Any day now our babies will come with RFID chips.

http://www.youtube.com/watch?v=5eKBXiAVkUA

The powers are directly connected to all the major internet hubs. Proxies is enough to fly under the radar, however, if you are already on the "radar" it will be easy to track you down even through a proxy. Proxies can be compelled to reveal information on your activity if they get a warrant for an investigation. Also just so you people know, TOR users are being targeted by NSA malware.

I agree with teemu_shalanie, if you are conducting business that can land you in prison, you shouldn't be communicating over the internet about it in the first place. Get a burner, use a payphone or talk face to face. Email, registered cellphones and in house land lines are easy to tap.
 

Snype

Active member
Veteran
go back to land line. stop using Internet , get a pager only call back from pay phones

hard work staying off the radar

TS

That is exactly what I'm going to do. I will use the internet on some weekends in another state instead. That's the price for freedom. Pay phones don't exist anymore. Fuck phones. Phone calls can be made on weekends from out of state also. LOL! Going back in time!
 

Snype

Active member
Veteran
Can a moderator please delete this thread. There's no need for it if there's no solution.
 

Marco61

Member
That is exactly what I'm going to do. I will use the internet on some weekends in another state instead. That's the price for freedom. Pay phones don't exist anymore. Fuck phones. Phone calls can be made on weekends from out of state also. LOL! Going back in time!


Any chance you can make a friend that works for a cellphone store? I had one that would give me prepaid SIM cards registered to Disney characters and fake names. I would use them for a week or so, toss them out, and pop in one that I hadn't used before.
 

babelfish

Member
hiding is work

hiding is work

You sound like you are speaking another language. From the way you speak it sounds like the powers above me can find me but people like you can't. That's not what I'm looking for if I can't stop the powers, then there's nothing. We are all just trapped in a box in this world. Sounds like the future 3030 is here. There's only one way out of this ant farm and it doesn't include technology. Any day now our babies will come with RFID chips.

http://www.youtube.com/watch?v=5eKBXiAVkUA

Not exactly;
http://www.wnd.com/2008/01/45542/

Yep, pretty much.
The DEA has access to NSA spy systems, so they can hunt you just like the cia hunts terrorists.
Although, unless you're cartel-level, they (special ops division) probably dont care.
So far.

not exactly;
somewhat;
yeah;
yeah.

The powers are directly connected to all the major internet hubs. Proxies is enough to fly under the radar, however, if you are already on the "radar" it will be easy to track you down even through a proxy. Proxies can be compelled to reveal information on your activity if they get a warrant for an investigation. Also just so you people know, TOR users are being targeted by NSA malware.

I agree with teemu_shalanie, if you are conducting business that can land you in prison, you shouldn't be communicating over the internet about it in the first place. Get a burner, use a payphone or talk face to face. Email, registered cellphones and in house land lines are easy to tap.

lets see here..... ok!
not exactly; not really, yeah probably. if available, and usually without a warrant, just from an official email domain. like *@[fbi|nsa|cia|dea|faa|irs|etc].gov
somewhat - that's specifically windows versions, not clean open source.. singled out a bit? yes. since encrypted assumed all foreign traffic till otherwise decrypted. (can apply to any encryption, even ssl)

debatable, if done right, but good place to start. kinda, kinda, yeah.

That is exactly what I'm going to do. I will use the internet on some weekends in another state instead. That's the price for freedom. Pay phones don't exist anymore. Fuck phones. Phone calls can be made on weekends from out of state also. LOL! Going back in time!

right idea, travelling that much would likely get your plate scanned; then patterns emerge in 'BIG DATA'. yes. not as an anonymous connection, right. yeah, but not the phones, the policy behind the architecture. bad idea to call known contacts like that, meaning out of state is not mixed with personal, cell phone for family. no phone with you when travelling. otherwise you will stand out eventually.

Can a moderator please delete this thread. There's no need for it if there's no solution.

please dont.. Wrong. Knowledge is always key.

Any chance you can make a friend that works for a cellphone store? I had one that would give me prepaid SIM cards registered to Disney characters and fake names. I would use them for a week or so, toss them out, and pop in one that I hadn't used before.

yeah you also need to hack the phone and emulate different physical id's in between sim cards.. dont keep contacts on phone, contacts #'s should also change in between so patterns don't build.. and remember burners are KNOWN bands of #'s... so your really hiding in a smaller forest.. the protection being that theoretically they won't have a record of you actually buying it.. reality says its hard to get a third step connection to do something easily and safely. also using obviously fake pseudonyms would just make them stand out more.




Even just your browser plugins and search patterns can be enough to find you. If you go to known sites, that means the pool of users is far smaller (one amongst a few hundred thousand or million ips, vs one amongst the whole internet). The main idea here is to not put any personally identifying info in your posts and pix, and to not get caught in the act of posting. When we use tor, we get routed in with users of a similar interest..

Also important to remember: most proxies are not completely anonymous, and if a site bothers to try they can execute code on your machine through your browser to detect your real IP. So, the VPN basically changes your exit to the internet, its like a wormhole for your data traffic. It also encrypts the communication in between you and your exit. So, that exit point is your new 'real' ip, then you use the proxy to try to hide what you can of that one, then you use tor to hide that proxy.

Mylocation -> vpn exit -> proxy -> tor[another proxy - but a set of them, with ever changing dynamic routing -- packets don't take the same path for long]

Anything can be compromised. With enough resources anything could be recorded. But the upside to there being so much content on the internet, is that it cannot be both recorded AND archived indefinitely. And, there are still a few other pieces of information to hide..

So, it may be hard to hide if they really really really try, and yeah nation-states have the advantage. If they choose they can redefine the law, or even what words that make up crucial bits of the law means. Which is the real problem with what we have going on. It was never an issue to pass on information that was NEEDED and LAWFULLY shown to be LIKELY to bear fruit. The question of what can they do to an offender if they 'accidentally' got information about someone's crimes as a result of information gained in another investigation is one that was tried in court decades ago in the telco world. If you care to you could even encrypt your voice traffic over a copper line... but the only truely safe way to exchange keys to decrypt (anything) is in person. And then you still don't know that the other key holder hasn't been compromised in some way. :p

Get used to the idea that you don't know who you are talking to. Never stop looking for clues that its really someone else behind the keyboard. The extreme can happen, but very very rarely does. Just like you buy a lock for your front door that can be hacked in seconds, because locks keep out the honest, you should always take good basic steps.

Final tip: don't do banking and personal emails through tor/proxy. VPN should be ok if you control both sides of the tunnel.
 

Tony Aroma

Let's Go - Two Smokes!
Veteran
Depends how anonymous you want to be.

If you just don't want a site like ICMAG to have a record of where you connected from (e.g. your home), just use a proxy. It doesn't encrypt your postings or anything like that. It's just a go-between, you connect to the proxy and the proxy connects to a web site. It makes it look like you're logging in from somewhere else. For example:

https://www.proxfree.com

Most of these free web-based proxies aren't entirely compatible with all web site functions (e.g., can't give rep points here). For that you need special proxy software you install on your computer. It slows things down, but it works. I use JonDo. It's a bit more complicated as you have some set up to do.

I also use a connection blocker called Collusion (for Safari). Every time you connect to a web site, it sends out your information to several other sites (like Google). Collusion blocks this outgoing info. Also shows a very interesting graph of blocked connections. It might surprise you how far and wide your info really goes.

If you're talking about completely encrypting everything you send and receive, then that's a whole 'nother ball game. It's possible, but not easy.
 

dddaver

Active member
Veteran
Or...don't use the internet. Was fun...too bad, as I hit the shut-down button. This is fucking nuts. Bye bye.
 

headband 707

Plant whisperer
Veteran
go back to land line. stop using Internet , get a pager only call back from pay phones

hard work staying off the radar

TS

lol lol what would make you think landlines are now safe LOL They never were before ,, To really stay off the radar you might have to move the hell away from these fucked up places.. You computer keeps you on the grid as well lol stay safe headband 707:biggrin:
 

babelfish

Member
Depends how anonymous you want to be.

If you just don't want a site like ICMAG to have a record of where you connected from (e.g. your home), just use a proxy. It doesn't encrypt your postings or anything like that. It's just a go-between, you connect to the proxy and the proxy connects to a web site. It makes it look like you're logging in from somewhere else. For example:

https://www.proxfree.com

Most of these free web-based proxies aren't entirely compatible with all web site functions (e.g., can't give rep points here). For that you need special proxy software you install on your computer. It slows things down, but it works. I use JonDo. It's a bit more complicated as you have some set up to do.

I also use a connection blocker called Collusion (for Safari). Every time you connect to a web site, it sends out your information to several other sites (like Google). Collusion blocks this outgoing info. Also shows a very interesting graph of blocked connections. It might surprise you how far and wide your info really goes.

If you're talking about completely encrypting everything you send and receive, then that's a whole 'nother ball game. It's possible, but not easy.

a proxy will not fool icmag. not if they care in the least. a vpn will.

Let me show you:
https://zorrovpn.com/articles/web-proxy-detection

Web proxies (or anonymizers) are widely used as a tool for bypassing restrictions on access to many web services. But there is a common misconception that a web proxy can hide your IP address. Turning off Java and Flash does not guarantee your anonymity, because someone can still learn your IP address via JavaScript. Since visiting most websites with JavaScript disabled makes no sense, using a web proxy for ensuring your anonymity could bring an unwanted situation.

Glype is currently the most popular open-source implementation of a web proxy. CGIProxy and Cohula are less popular, but have the same functionality. PHProxy and Zelune are used very often too.

To detect the usage of a web proxy, you can compare a real website address with the value of window.location.hostname, or check for the existence of a specific anonymizer's variables.

ginf.url // Glype
window["_proxy_jslib_SCRIPT_URL"] // CGIProxy
window["REAL_PROXY_HOST"] // Cohula
To learn a user's IP address, all you need to do is use some code in such a way that a web browser's request is sent not through a web proxy, but directly. For example, you can mask a website address (Cohula), divide the src attribute of the <script> tag between a few document.write functions (Glype), or redefine special variables used for making links (CGIProxy).

var our_proto = "https";
var our_host = "zorrovpn" + "." + "com"; // mask address
var our_request = "show-js-ip";

// Trick for CGIProxy
window["_proxy_jslib_THIS_HOST"] = our_host;
window["_proxy_jslib_SCRIPT_NAME"] = "/" + our_request + "?#";
window["_proxy_jslib_SCRIPT_URL"]
= our_proto + "://" + our_host + "/" + window["_proxy_jslib_SCRIPT_NAME"];

document.write('<script sr');
document.write('c="' + our_proto + ":" + '//' + our_host + '/' + our_request);
document.write('"><\/script>');
You might have noticed that CGIProxy replaces with _proxy1_varname any variable whose name begins with _proxy, so use window["_proxy_varname"] instead.

You can research some web proxy detection techniques using Firebug or other developer tools included in your browser.

To test this kind of IP address detection, visit this page via any anonymizer. For example, use hidemyass.com (Glype), anonymizer.ru (Cohula), or scusiblog.org (CGIProxy). Uncheck the "Remove scripts" option to turn on JavaScript.

Tested with the latest Cohula, CGIProxy 2.1.6, and Glype 1.4.4

Detected IP address: 64.213.35.2 (United States)
Web-proxy: No
Source code is available at https://zorrovpn.com/articles/web-proxy-detection.js

Turning off Java, Flash and JavaScript helps to decrease the risk of de-anonymization. But you can never be sure that HTML filtering by a web proxy is always absolutely accurate. To avoid IP address disclosure, use VPN, SOCKS 4/5, HTTP proxy, SSH tunnels, Tor, I2P, and other technologies, combining them for better anonymity.
[/code]

Or...don't use the internet. Was fun...too bad, as I hit the shut-down button. This is fucking nuts. Bye bye.

If you quit playing the game, we have fewer signals to hide within. =[ Don't ever let power figures cow you. You have the ability to be strong, and to do it wisely. This is a game that started long before the internet, its just its so much more visible on the net, and with fast communications comes fast change. BE THE SOLUTION. Have no shame for JUST BEING A GOOD PERSON - YOU!

lol lol what would make you think landlines are now safe LOL They never were before ,, To really stay off the radar you might have to move the hell away from these fucked up places.. You computer keeps you on the grid as well lol stay safe headband 707:biggrin:

no transmission of information has ever been safe in any time. ever.


 

gaiusmarius

me
Veteran
thanks for posting all that babelfish. very interesting, wish i understood more though lol.

i do want to mention that icmag does not keep ip logs, from the beginning we have made sure that there would never be ip logs that could get subpenaed. also the whole site runs in https so all content is ssl encrypted. we also don't have any scripts running like google analytic s, score card and all the rest of the spying scripts. we actually sacrifice google rankings by disallowing some of these tracking scripts.

still using a proxy like tor bundle seems sensible. wish i knew more about vpn tunnels and some of these other methods you were mentioning.

i do agree the biggest risk is people posting up too much information without knowing they are doing so or by not thinking things through. be it pics of the house, car, pet, girlfriend or even just furniture, let alone tattoos all makes it really easy to identify you.
 

babelfish

Member
thanks for posting all that babelfish. very interesting, wish i understood more though lol.

i do want to mention that icmag does not keep ip logs, from the beginning we have made sure that there would never be ip logs that could get subpenaed. also the whole site runs in https so all content is ssl encrypted. we also don't have any scripts running like google analytic s, score card and all the rest of the spying scripts. we actually sacrifice google rankings by disallowing some of these tracking scripts.

still using a proxy like tor bundle seems sensible. wish i knew more about vpn tunnels and some of these other methods you were mentioning.

i do agree the biggest risk is people posting up too much information without knowing they are doing so or by not thinking things through. be it pics of the house, car, pet, girlfriend or even just furniture, let alone tattoos all makes it really easy to identify you.

ICmag is one of the places that cares. If you like, you guys can ask questions, and i'll do my best to give answers... there are a few other techies hanging out about, perhaps a few will chip in as well.

Lets talk about cell phones:

http://arstechnica.com/security/2013/08/diy-stalker-boxes-spy-on-wi-fi-users-cheaply-and-with-maximum-creep-value/
"What a lot of people don't realize is it's talking all the time, whether or not it's connected," O'Connor said of Wi-Fi enabled mobile devices, which in his case happens to be an iPhone. "Every couple of seconds, every wireless device that's on is sending out a huge amount of personally identifiable information. If we have sensors spread out over an area, that means it's sending out both an identifier and its location." And of course, he added, there's often a vast amount of personal data sent in the clear over the Wi-Fi connection itself.
 

Latest posts

Latest posts

Top