Becoming Anonymous

"more secure you get, the less convenient your

life becomes"

Did you know that your privacy constantly being invaded by the sites you visit, your IPS, or your government? Everything you do is being tracked on the Internet and becoming fully anonymous is not 100% possible. However, there are some ways to get as close as possible to anonymous. In this page we will teach you how to secure all of your devices--such as computers, phones , tablets, and anything else, by securing your passwords, using two factor authentication, securing your web browsers, using a VPN, securing social media , your communication like texting and email, your operating system.

ZONE 1 - basic privacy

Password

Choosing a strong password for anything that you use is very important. It’s important to have a password manager with all of your passwords created inside of it with a super strong password protecting your manager. There’s a website called “how secure is my password” to test if your password is strong.

2 Factor Authentication

When you sign in to a site, it requires you to type a password plus an additional authentication by sending something to your phone number that you type. However, phone numbers are proven to be a great security risk. That’s why, many sites are starting to transition to using Google Authenticator.

Web Browser

Make sure using trusted add-ons and extensions. Switch your default search engine to DuckDuckGo or start page and never store cookie history cache or clear them yourself frequently.

VPNs

A VPN is going to hide your identity on the websites you visit, your internet service provider and any other person trying to track you. It is also an encrypted traffic so nobody can see what you’re doing.

  • !! Stay away from free VPNs
  • !! Try to avoid proxies
  • Social Media

  • Try not to use and real information any kind that includes names, addresses, phone numbers etc. Hide your real information !!
  • DO NOT talk to strangers on social media
  • Don’t post in public comments because you don’t know who you’re talking to
  • Disable permissions, you don’t need to grant. Twitter doesn’t need to access your location, Snapchat doesn’t need to access your SMS text messages.
  • Obfuscated Pictures - Don’t post picture of yourself (especially, your eyes and nose). This is also something that invades your privacy.
  • Phone Number

    Instead of putting your phone number to sites that you use, create a Google Account with false information using a VPN and then use Google Voice and Google Hangouts as a secondary number which is unattached to your personal identity.

    Smart Phone & Computers

    Disable setting that send your usage data instead of apps and the operating system.

  • disable location
  • disable bluetooth
  • remove unused apps
  • activate VPN
  • ZONE 2 - COMPLEX PRIVACY

    Smart Phone Pt2

    Did you know that Iphone is more secure than Android? Most of Android devices don’t get continuous security updates and it’s much easier to infiltrate majority of them. An exception to this is that if you have a stock Android device which frequently gets update come back to this 9.59

    Storage

    Storage You need to periodically wipe your hard drive’s free space using a tool to make sure you can’t recover any of those files. Also, you should be using drive encryption such as BitLocker on windows or FileLocker on Macs. NEVER remove your encryption on Android devices if you have an option to do so.

    Web Browser PT2

    Avoid using Chrome, since Google is very well known as to collect your data. Make sure to have uBlock Origin and make sure flash and JavaScript are completely disabled inside of your browser.

    Communication

    Texting and SMS messages are not secure. You should either use imessage which only works on Apple devices or switch over to Signal. Signal is a very secure messaging app. Everything there is fully encrypted. Side note, Signal can also protects your phone calls as an added feature. Email is a an everyday business communication service that everyone uses. But, most email providers invade your emails sent back and forth. Protonmail is a completely secure, end-to-end encryption and open source email service. Switching Email Providers

  • forward emails to new service
  • modify websites to use new email
  • After a few months, you won’t get any email in your old email account. At that point, you can just use Proton.

    Password Pt2

    Don’t use any form of protection on your computer or mobile devices that isn’t a traditional password - nothing biometric, no pins, nothing voice or fingerprint activated. Make sure to not use a default password on your router and you have a password generated by your password manager.

    Web Browser PT2

    Avoid using Chrome, since Google is very well known as to collect your data. Make sure to have uBlock Origin and make sure flash and JavaScript are completely disabled inside of your browser.

    Computer Operating Sytem

    Most Secure OS

    Windows Host OS OX X Host OS Linux Guest OS on Either Host Linux OS Host

    Switching to a different operating system is a big transition, so start off with a virtual machine or dual booting with one of your main operating system.

    Password PT3

    Make sure that your password protect your bios as well as your storage drives. This way, no one can tamper with your bios or even begin the operating without typing in a password to get past the bios and access your disk or disks.

    Ditch Google

    If you fo to Google activity center, you’ll see where they collect all your information. Delete everything, then delete your Google account. As I mentioned, Google is not secure at all.

    Ditch Your Addiction

    This step is difficult. but delete all your social media. Privacy is supposed to hide who you are and what you’re doing and social media is 100% is not doing that.

    Web Browser PT3

    Tor Browser Bundle is a browser that will encrypt your traffic and mask your IP address. This makes a traffic unable to be sniffed or searched, even by your ISP. The goal here is to get rid of any browser outside of Tor. For android devices you can use Orbot, Orfox, or Firefox Focus which are known as deleting all of your web traffic once you’re done browsing. For iPhones, you can use RedOnion or Firefox Focus.

    ZONE 4 - extreme privacy

  • no phone or basic flip phone (no text)
  • spoof MAC address
  • prevent social engineering (don’t talk to strangers, never give real personal info, change your speech patterns
  • erase your identity