Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Encrypting My Network Traffic


  • Please log in to reply
8 replies to this topic

#1 jo15765

jo15765

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:53 PM

Posted 24 January 2017 - 02:09 PM

I am wanting to be completely anonymous online and leave no tracks.  Is using Tor and a VPN service such as Private Internet Access enough to remain totally anonymous online?  Or are there still ways to trace requests back to the host using both of those services?



BC AdBot (Login to Remove)

 


m

#2 RolandJS

RolandJS

  • Members
  • 4,293 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Austin TX metro area
  • Local time:11:53 AM

Posted 24 January 2017 - 02:31 PM

http://www.hongkiat.com/blog/do-donts-tor-network/  -- FWIW  :)


"Take care of thy backups and thy restores shall take care of thee."  -- Ben Franklin revisited.

http://collegecafe.fr.yuku.com/forums/45/Computer-Technologies/

Backup, backup, backup! -- Lady Fitzgerald (sevenforums)

Clone or Image often! Backup, backup, backup, backup... -- RockE (Windows Secrets Lounge)


#3 shelf life

shelf life

  • Malware Response Team
  • 2,633 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:@localhost
  • Local time:12:53 PM

Posted 24 January 2017 - 06:39 PM

Pretty much impossible to not leave some tracks somewhere along the way.

Some excellent info about VPN's here:

 

https://thatoneprivacysite.net


How Can I Reduce My Risk to Malware?


#4 jo15765

jo15765
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:53 PM

Posted 24 January 2017 - 09:20 PM

 

So running Tails is enought?  Unless I am missing something, isn't it possible to trace back the node I connect to, and find my IP?


Pretty much impossible to not leave some tracks somewhere along the way.

Some excellent info about VPN's here:

 

https://thatoneprivacysite.net

 

Yes - I have a VPN service that keeps no record of any searches/downloading etc that is done. 

 

In this instance I know that my computer does, and I was trying to find a way to alleviate that element.



#5 RolandJS

RolandJS

  • Members
  • 4,293 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Austin TX metro area
  • Local time:11:53 AM

Posted 25 January 2017 - 01:00 AM

I have no more answers, I Googled and chose just one of several URLs to post.


"Take care of thy backups and thy restores shall take care of thee."  -- Ben Franklin revisited.

http://collegecafe.fr.yuku.com/forums/45/Computer-Technologies/

Backup, backup, backup! -- Lady Fitzgerald (sevenforums)

Clone or Image often! Backup, backup, backup, backup... -- RockE (Windows Secrets Lounge)


#6 shelf life

shelf life

  • Malware Response Team
  • 2,633 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:@localhost
  • Local time:12:53 PM

Posted 25 January 2017 - 05:48 PM

 

my computer does, and I was trying to find a way to alleviate that element

If you mean cleaning your machine of logs and tracks theres:

 

https://www.bleachbit.org/

https://privazer.com/

https://www.piriform.com/ccleaner


How Can I Reduce My Risk to Malware?


#7 cyberjaguar

cyberjaguar

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:10:53 AM

Posted 24 February 2017 - 02:31 AM

Who do you want to be completely anonymous from? Cyber criminals or the NSA? If the former, then you should be pretty good with what you mentioned and what's been mentioned in this thread -- I would think.

 

If the latter -- well, given what we now know since Snowden's leaks, and given what we know about the mindset of our government (basically, the goal being to have access to basically every computer system in the world -- ideally. That's why they tried to get a backdoor into the Linux kernel) -- Tor won't help you much if the exit node, or if most of the nodes have the NSA's hooks into them.

 

And VPNs won't help you much if every major VPN provider has NSA backdoors into their server. All the big companies cooperate with them to provide access to their software -- why would VPNs be any different?



#8 Plexle

Plexle

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:01:53 PM

Posted 15 March 2017 - 11:41 PM

Use TOR and VPN. I recommend CryptoStorm or ibVPN.



#9 isaccasi

isaccasi

  • Members
  • 119 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:zealand denmark
  • Local time:06:53 PM

Posted 02 September 2017 - 08:56 AM

I recommend ProtonVPN they use a technology that they call secure core, and implementing that you are routed through another country before you connect to the server of choice in a second country, I am not good enough to explain this but have a look for your self on their website :notme:






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users