How To Maintain Your Online Anonymity Using Advanced Techniques

In a previous article I discussed the possibilities of increasing your safety online by using measures such as encryption, VPN and Tor. Nonetheless I did not cover all possibilities and most importantly it was a practical discussion rather than a theoretical one. This article will be a theoretical dissection of online anonymity tools and their weaknesses.

Why do people get caught despite using Tor? Can anyone be truly anonymous online ?

This article will be a summary of the work of Tom Ritter, presented at DEFCON 21, the annual hacker conference. His video presentation can be viewed here and the printed version of his article here.

While doing a great Job, Tom’s work is heavy on tech jargon and might confuse laymen. So I will summarize his work and explain the strengths and weaknesses of modern anonymity tools. His work was published in 2013, but remains relevant today as well.

In his work Tom talks about 4 anonymity technologies : SSL, Tor, Remailers and Shared Mailboxes. Let’s discuss them one by one.

SSL

ssl

SSL stands for Secure Socket Layer and is a common online security standard used by the likes of Facebook and other major websites. The way SSL works is that it creates an encrypted tunnel of communication between 2 parties so that third parties cannot read the messages they are sending to each other. Despite being secure on paper, it can be circumvented rather easily. To understand how, first we must talk about metadata.

Metadata

Metadata is data that describes other data. For example, library cards which hold the name of the book, its publishing date and its location in the library is a form of metadata. Metadata is also used in IT.

An example of metadata is the EXIF file in photos. When you take a photo with a camera you not only register the photo, but usually your device also adds extra info such as the date the photo was taken, the GPS location, phone brand, etc. and stores it in the photo file.

exif_model_pmd

Other form of metadata is not registered but can be inferred. For example, someone created a program that can discover which parts of Google maps you are looking at based on the size of map tiles you are downloading.

map-size

When you are using SSL you are unwillingly lending third parties metadata which can lead to your discovery, particularly the time the message was sent and the size of your messages.

This allows for attackers to do something called a correlation attack.

Correlation attacks are primarily of 2 types : Time-based attacks and Size-based attacks

Time-based attack

In order to perform a time-based attack a party sends a message in an encrypted stream, then it looks at who receives the message. Since SSL communication is instantaneous, you can easily infer who is behind the SSL stream. The third party sends a message at 15:59 and whoever happens to get the message right afterwards must be the person they are looking for.

time-attack

This type of attack was used against the person who dumped Stratfor mailpools. The way it worked is that government analyzed the time he was logging in on the internet and noticed it coincided with the time the person they suspected logged on to a secret chat through Tor. Not only that, rumor has it the government cut electricity to his house at a certain hour and noticed that the user of the secret chat logged out at the same time. The coincidences were too much, so he got caught.

Size-based attack

In order to perform a size-based attack, the third party sends a file of an unusual size, and then whoever receives the file must be the person they are looking for. Since most people on Facebook send small messages to each other, one only needs to send a very large message and see who happens to receive a message of that size afterwards.

size-attack

As you can see correlation attacks render you vulnerable if you use SSL as your only line of defense. The reason is because the Third Party can not see WHAT you are sending, but they know that you ARE sending something, WHEN you do it and HOW BIG is the file.

ssl

Ideally they should not even know you are communicating with anything at all. So, let’s see what other technologies have to offer.

Tor

tor

Tor is a custom browser based on Firefox with extensions that works on the principle of connecting to a few nodes so that when you look at a website the only thing the website can see is the last node you traveled through and on the opposite side your ISP (Internet Service Provider ) can only see your first node, not the whole route.

This is already getting better. However it does not add that much anonymity since now third parties do not know WHO is communicating, but they can still see that it DOES happen, WHEN it happens and HOW BIG the size of messages are.

tor-security

Not only that, but there are known vulnerabilities, particularly of 3 types.

You are viewing a website in the country you are in.

tor-attacked-1

This allows advanced opponents calculate that it was YOU who was using Tor. It is difficult, but not impossible. This is bad news since a lot of people from US view websites stored in US. And so do dissidents from China or Iran.

Every single node you pass through is compromised

tor-attacked

In my previous article I mentioned that the government can set up Tor nodes that they monitor. But to successfully pull an attack they would have to monitor EVERY node you go through.

This requires NWO level trickery, but again, we already have examples of this happening already with VPN agreements. Countries in the Anglosphere have an agreement to give away information regarding VPN usage by suspects from respective countries. This agreements is called Five Eyes. I wouldn’t be surprised if a similar thing is organized regarding Tor nodes.

Passive traffic analysis

Although not mentioned by Ritter in his presentation, it is common knowledge that an opponent with a lot of resources, mostly governments, could analyze the whole network and correlate patterns to discover who is viewing a certain website or communicating with someone.

To give an analogy, it would be like the police heavily patrolling every single street in a city and every single car , so that even if your car had fake plates they could notice patterns and discover its owner.

The problem is, this approach can create false positives, with a 10% chance of error, which is why these analyses are not accepted in court as proof. But you can rest sure if such an analysis points to you, you will be put under further investigation and it only gets worse from there.

So what can be used to further aid us ?

Remailers

remailers

Remailers are an interesting concept. The way they work is that people pool their mail messages on a server, after which some time passes and all mails are sent simultaneously at the same time.

This is supposed to protect from Time and Size based correlation attacks.

The problem here is that it still allows third parties to see that you ARE sending a message, WHEN you sent it and HOW BIG it was. But they can’t see the other end. For the receiver, he has the same problem. Third parties can’t know WHO he got the message from, but they can still see WHEN he receives it from the remailer and HOW BIG it is.

mix-networks

On top of that, for Remailers to work lots of people have to use them at the same time. Otherwise if there are few users, an enemy can still use size-based correlation attacks.

It’s hard to use size-based attacks when thousands of people are sending messages of various sizes, but if only three people at one time are using a Remailer, then it is very easy to do a size-based attack.

Shared mailbox

sm

Shared mailboxes are the most out-of-the-box anonymous solution.

The way a shared mailbox works is that users share a mailbox. They cannot delete messages from it, but can only add encrypted messages to it. And when they want to check if they received a message they download all messages and use their key and try to decrypt the header of all of them and see if any of the messages belong to him.

sm-green

It is a resource-tedious process, but it offers a great payoff. For the receiver this is great because when he downloads the whole mailbox third parties can’t know if he received a message, maybe he did, or maybe he didn’t. For the sender however, the equation stays the same as before.

sm-send-receive

This is for the moment the most powerful anonymity solution out there. However it has a few issues. In order to use alt.anonymous.message (the shared inbox) you need to have some degree of technical skill, and user inexperience leads to issues.

In order to be easier to use alt.anonymous.message allows the use of nymservers. Nymservers act as regular mail addresses, which when sent to, automatically post them to alt.anonymous.message .

type-i-nymserv

There are however issues with AAM and Nymservers.

1. Poor network diversity

The number one issue is there are currently two main node operators: Zax and Dizzum, which are responsible for the trafficking of messages to alt.anonymous.message. If both were to retire or be arrested it would the death of alt.anonymous.message. As you can see, network diversity is horrible.

dizum-and-zax

2. Poor encryption used on messages

Another issue is the type of encryption used. Some messages used the outdated MD5 encryption standard which is easy to crack.

md5

Also, the title of messages are encrypted less strongly in order to be able to determine quickly which belong to you and which don’t. Subjects can be encrypted using either hsubs or esubs. Esubs is an older and stronger standard, but hsubs have grown in popularity in recent years.

esubs-and-hsubs-timeesubs-vs-hsubs

3. Pattern analysis due to use of same subject line and same remailers

A lot of messages use the same subject over and over, people tend to reply to a particular subject. On top of that most people also usually use the same remailer over and over, you can start noticing communication patterns :

pattern

4. Custom Remailer command errors

There are different type of remailers. The old school one was called Type 1 and lives on in the protocol of Mixmaster. It allows a lot of customizing options for the header. The users often screwed up the name of the command, which ended in the title of a message.

For example if you write “X-No-Archive Hello Friend” it would turn into “Hello Friend” and the X-No-archive would be interpreted as a command to not archive. But if you wrote “no-archive-x Hello Friend” you messed up so the title would become “no-archive-x Hello Friend”. If you do this multiple times, you would be identified as a unique user since your titles would all contain “no-archive-x” or uncapitalized “x-no-archive” or whatever other combination of mispelled commands you use.

Since most people used the same commands over and over and did the same mistakes they became quickly identifiable as unique users.

5. Imperfect Remailers

There are different types of remailers. Currently there are two types of remailers in use, MixMaster and MixMinion. MixMinion has certain advantages over MixMaster. But both suffer from certain problems.

remailers-issues

6. Nymservers which do not protect from size-based correlation attacks

Nymservers themselves have problems. Zax’s Nymserver is instantaneous which allows for size-based correlation attacks. However even Type 1 Nymservers (older ones) which are not always instantaneous still allow for size-based correlation attacks given a bit of perspicacity.

Therefore we identified main issues with AAM (alt.anonymous.message):

1) Giving users options allows for segregation and profiling
2) Some encryption is weak
3) It can be complicated to use and allows for beginner mistakes
4) Weak network diversity

Nonetheless, Ritter identified the most secure way of using AAM :

1) Use a strong passphrase and hsub
2) Use Type 3 PGP packet (Key Stretching)
3) Use Remailers
4) Do not use extra headers or options

The issue here is that if you do it properly you will still be part of a small community of people doing so (around 500 – 1500 people), which will make you looks suspicious and will cause the government to look closer into you and maybe add you to a database.

Solutions of the future

Pynchon gate

Pynchon Gate is a project meant to replace shared mailboxes. It uses Private Information Retrieval. It exposes less meta-data, scales better and resists flooding and size-based attacks. However it is currently work in progress

pynchon-gate

Improved Remailers

MixMinion is currently the best remailer protocol and as such should be used as a basis for future improvement. Planned improvements include things such as improving TLS settings and moving to a new packet format.

mixminion

What is currently lacking

As of right now, what is lacking is some tech that could be used to anonymously share large files. AAM and such are low bandwidth, which means it can only be used to share small files like text messages.

A new service needs to be created to cover this niche. In the words of Tom Ritter :

But what I keep coming back to is the fact that we have no anonymity network that is high bandwidth, high latency. We have no anonymity network that would have let someone securely share the Collateral Murder video, without Wikileaks being their proxy. You can’t take a video of corruption or police brutality, and post it anonymously.

Now I hear you arguing with me in your heads: Use Tor and upload it to Youtube. No, youtube will take it down. Use Tor and upload it to MEGA, or some site that will fight fradulent takedown notices. Okay, but now you’re relying on the good graces of some third party. A third party that is known to host the video, and can be sued. Wikileaks was the last organization that was willing to take on that legal fight, and now they are no longer in the business of hosting content for normal people.

And you can say Hidden Service and I’ll point to size-based traffic analysis and confirmation attacks that come with a low-latency network, never mind Ralf-Phillip Weinmen’s amazing work the other month that really killed Hidden Services. We can go on and on like this, but I hope you’ll at least concede the point that what you are coming up with are work-arounds for a problem that we lack a good solution to.

Conclusions

As we can see true anonymity online is non-existent. At the very least, third parties can collect meta-data on you and use correlation attacks, when ideally they shouldn’t even know you are communicating at all. Moreover, even strong anonymity tools like Tor have shown to have known vulnerabilities.

However, what matters is not whether something is vulnerable in theory, but rather does it keep you safe in practice? And so far, the tools we have at our disposal are pretty powerful.

As I have mentioned in my previous article, using TailsOS off a flash stick in a public wi-fi area with no cameras + VPN/Tor seems to be the best solution for now.

The testament to the power of anonymity tools is that pedophile rings and drug dealers have managed to escape persecution by multiple world governments to this day using them.

And that’s what I will talk about in my next article. We will analyze the electronic operational security of pedophile rings and how one infamous one managed to escape unscathed after years of being searched. Stay tuned.

Read More: 12 Ways To Increase Your Anonymity And Security Online

105 thoughts on “How To Maintain Your Online Anonymity Using Advanced Techniques”

  1. Thank you very much for both your articles, probably among the best ones I’ve read anywhere on personal cyber security.
    “As I have mentioned in my previous article, using TailsOS off a flash stick in a public wi-fi area with no cameras + VPN/Tor seems to be the best solution for now.”
    100% agreed.

    1. Yup, second this. Also, if I ever run TOR at home, it’s never for any privacy or legal reasons, but only to “help” the network with more access points, thwarting any attempts by the man to manipulate TOR. For anything where I was concerned about my identity, I would use TailsOS fresh boot off a USB drive with random MAC address connecting to public wifi.
      I’ll also add that it’s important not to give away your identity in other ways. If I wanted to share some secret info with you guys, I would do all of the above, but I would NOT post the info using spicynujac, but instead a second account that I never accessed from my home network.

      1. 1 yr ago I finally resigned from my last job and i couldn’t be happier now… I started working from my house, over a site I stumbled upon on-line, for several hours /a day, and my income now is much bigger then it was on my office work… Last paycheck i got was for Nine thousand dollars… Superb thing about this work is that now i have more time to spend with my family… http://chilp.it/728813e

    2. Many if not all public wifis require some sort of identification like an email. It is no longer that easy to create free emails as it once was as all free providers like hotmail, yahoo, gmail etc require SMS based authentication and/or detect that you are using a known VPN or TOR and refuse to allow you to create an account.

  2. How is it I can pronounce anonymous with no problem but, I get tongue tied just thinking about pronouncing anonymity?

        1. while I think this anemone lacks empathy, it displays magnanimity when it comes to elocution of elegies.

        2. Now that’s a mouthful.
          “Guadalajara harlots hump hot jalapenos.”
          (Try saying that one three times, fast…)

    1. Think “an on imity”. An on imity. “I am looking at an on imity.” Might help. If not, being tongue tied occasionally is better than being a cuck.

    2. you can be half downs….
      Most of the time, you can be half-downs and not even know it.

    1. Solution is using liveboot Tails / Tor system. Then they would only see that one person was using Tor but they would have no idea who that person was, as they’d never seen the machine on the network before.

      1. Assuming larger networks aren’t logging which endpoint customer facing ports are accessing Tor or a VPN. You can’t change the ID in modern cable modems for example. Trust nothing. Just today a new exploit for Tor/Firefox hit that gets all the way to kernel32.dll so they get your MAC. The one in the rom on the network adapter that Dell / Apple / etc. has in their database tied to the warranty info.
        So you need to be thinking one layer deeper. A 2nd hand beater laptop new enough to support virtualization. Run Tails in a VM on that laptop with the networking configured to route ALL traffic to/from the VM straight into a VPN.
        Still not 100%. Traffic analysis can still hose you. Put a different VM on the laptop piped into the same VPN running bittorrent on some yellow level content. That becomes your cover for running a VPN if questioned. Yellow meaning copyright violations that aren’t first run movies or something the Mouse would track you down over but NOT red hot illegal porn, secret Illuminati files or alt-right activism beyond shitposting memes. That will at least throw enough traffic on the VPN link that they can’t run any of the tricks mentioned in the article to see a targeted message go all the way to you without having a tap on the exit side network rack for your VPN provider.
        Now you just need iron op sec discipline to keep your secret activity entirely walled off. Never ‘just read’ at a site you use your secure identity at so they don’t pattern analyze a common set of IPs who visit the same couple of sites, etc. Bottom line, either study hard, cut the cord and make an entire new identity and live paranoid or don’t. Half assed just draws unwelcome attention and won’t stop a three letter agency long. Then you just have to hope their big data isn’t good enough to analyze your style of writing and match up your real and secret identity.

        1. If you’re using public or university wifi, it doesn’t matter if authorities can see the ID on their cable modem. It will merely identify which public point the person used to access the internet, a network which is upon to potentially thousands of users, who are not authenticated or identified.
          If you’re running Tails/Tor, I believe it randomizes your MAC address each time upon boot. If not, a quick macchanger -r eth0 command line entry will do so.

  3. Thanks for posting this. Please keep practical IT articles like this coming. Really beneficial to the less tech savvy guys out there like me.

  4. I always reset my computer to “factory condition” at least once every two weeks. Dunno with 100% certainty, but if they kick down my door and grab my laptop, it might be pretty difficult to find out what sites I visited a few weeks earlier, as in theory there should be no record of that on my ‘puter.
    Doing this also rids my machine of malware and other crap. My old laptop which I bought in 2005, still works fine. The one I currently use, purchased in 2010, runs like a top. I know this has helped increase the lifespan of my computers.

    1. If “they” want to get into your computer, “they” will get into your computer. “They” don’t have to break your door down and physically take it away.

    2. I use an application called “sandboxie”. With this, everything that happens inside your web browser gets written to a temp file store called the sandbox. This includes cookies, the list of sites visited, and any damage done by malware or viruses.
      You can then clear the sandbox, and all of the above changes will be rolled back, leaving the computer in its original state.

      1. Interesting alternative there. I just put all of my files on an outboard storage drive. But this sounds easier…

  5. IMPORTANT MESSAGE
    Talking about privacy – the ROK site is not secure AT ALL. To be precise the problem is Disqus.
    Today an impostor has copied my avatar and screen name and has been making comments I have not authorized nor do I agree with. The problem is Disqus doesn’t make the screen name unique so anyone can copy anybody else. Only the username is unique.
    For example, if you go to this comment http://disq.us/p/1e301kh and click on the screen name you will see that this is a different account with only 21 comments as opposed to 800+ on my account.
    My last comment is this one – https://disqus.com/home/discussion/returnofkings/how_mainstream_tv_uses_emotional_triggers_to_sway_political_opinion/#comment-3028002140
    Anything after that is not mine.
    From now on, I am terminating my participation here as it is not secure. You have fun with the impostor.

      1. It is a total shamble! Any other comments software I know protect the username and the screen name. I just wonder why Disqus is such a popular software as I seen it used in so many sites. And yes I won’t be surprised that it is funded by the elite as their goal has been to monopolize the internet.
        Roosh should consider implementing a bespoke comments software considering that most of the topics discussed here are not exactly PC.
        I urge everyone to reconsider their participation through Disqus as this is a serious breach of data protection.
        DisQusting incompetence!

        1. It gets creepier. Y Combinator was mostly seeded via funds from Sequoia Capital –
          https://en.wikipedia.org/wiki/Sequoia_Capital
          “Sequoia Capital has invested in over 250 companies since 1972, including Apple, Google, Oracle, PayPal, Stripe, YouTube, Instagram, Yahoo! and WhatsApp.[21] The combined current public market value for these companies is over $1.4 trillion, equivalent to 22 percent of Nasdaq.[3] Its portfolio is mainly in financial services, healthcare, outsourcing and technology.[19]”

        1. Ha!!!
          Nah I get some blood too but only when I have those crazy parties with Posesda

        2. I like your new cover Lolshill. Italian Catholic that was ‘seen as the help’ by WASP’s.
          A two for one deal where you get to shit on the much despised by your ilk Catholics and WASP’s whilst hiding your true identity.
          A little too Hollywood cliché the way you sell it though, wouldn’t you say.

        3. Dude you must have a crush on me or something. Go back to your hole you little weirdo.

      1. Why don’t you check the accounts then and see for yourself?
        The impostor’s account is: @disqus_UWHzUiTUYv
        Mine is: @disqus_fi8qKe7Hwd
        Anyone can use my screen name and yours too. I can register as lolknee tomorrow, copy your avatar and start talking the complete opposite of what you’ve been saying. How would you feel?
        Disqus is a no, no for me from now on. This discussion is the last of me using it.

        1. You may be able to copy my handle but you could never copy my swagger!

        2. But what would they have to gain? I would understand impersonating Roosh or the author, but impersonating you is rather pointless. You may have accidentally logged into different accounts on different devices.

        3. I have to say that that does not look like something you would say. That said, you do say some outlandish stuff so I usually take it with a grain of salt.

        4. True but not stupid as this:
          This is why I firmly believe a woman should lead the family. The concept of “patriarchy” is simply a silly notion. A group of people you supposedly love should be lead by the least compassionate and nurturing person in the family? Please. My wife leads our household and we make do just fine.
          http://disq.us/p/1e2r9qm
          The funny thing is you all fell for it!

        5. I didn’t even know that there was an imposter, he was posting the same identical kind of weirdness that he always does.

        6. No wonder that you fall for politicians’ lies like Trump’s.
          When have I even made the faintest suggestion that a woman should lead a family, a firm, a country or anything for that matter?

        7. Except, he/she posted just like you. You rarely make sense or follow any formal sort of logic, and at times you say totally insane and frankly weird things, so it’s not like we have a lot of clues on what the “normal you” actually would be.

        8. You’ve made so many strange, weird and frankly illogical statements in the course of your time here that nothing you, or “it”, would say surprises me.

        9. They do not make sense to you – more than a 1000 upvotes show that my comments do ring true with some people.

        10. There’s a lot of unstable people in the interwebs. I’m just telling you why nobody noticed the difference. Don’t deflect at me, man, I’m just the messenger.

        11. You’re angry and sputtering. I should probably pat you on the head and walk away.
          Which, actually, is what I’ll do.
          *pat pat pat*
          *walks away*

        12. Your problem is you think you are the measure of all things. Those are narcissistic tendencies.
          Anyway, I’m done here as this place is like an echo chamber.
          Have fun with the impostor.

        13. Given as he posts just like you, it will be like you’ve never left.
          As I said, you’re angry and are attacking the messengers. Very irrational.
          Hope your day gets better.

        1. You got being handsome down pat. Now if you can do something about you brains and personality

    1. Wow, your having a doppelganger is very creepy!
      It does seem a bit foolish sometimes to be pouring my heart out on Disqus. I assume intelligence agencies and law enforcement would have complete access to my postings and actual identity, yet still I hesitate to add personal details that would narrow down who I am.
      A few months ago there was a story going around that the HRC/Soros people would be mounting a campaign against ‘alt right’ sites, including publicly doxxing commentators.

      1. Yes, it is foolish to be pouring your heart anywhere on the net – it’s the ultimate spying machine.

        1. We scoff at the Facebook crowd, but posting an opinion here that could get attract a lot of violence to your person nowadays is more foolish than liking kitten videos.

      2. I reckon a Hillary presidency would have doxxed alt-right users. And shut em down.
        For now important not to have a triggly-puff following you around…screaming “rapist”

    2. Roosh has a history of banning cloned accounts as soon as they come to his attention.

  6. Anonymity tends to become less of a right and more of a privilege. For those with the know-how and/or the money.
    There can also be other solutions but they require quite some know-how and quite some effort, because the prep time is quite a lot. Thank God for open source and crowd-supported projects like tor (Snowden’s files indicated that as of 2012, NSA still hasn’t broken tor completely, and relies on other tricks). Still, it’s sad. Or a source of inspiration. Hmmm……
    This article has way less comments as of now, but it still is a rare thing. Living in the information age and knowing nothing about technology is an oxymoron that became a sad reality. Just as some men who can’t light a fire to grill a steak.

  7. Liking this one. For someone like me who is a total computer doofus stuff like this is super helpful

    1. It’s even helpful to folks like myself who know more than the average person, but aren’t hacker level. Definitely facing this article for reference.

  8. For all you conspiracy-theorist bashers…this excerpt was taken directly from the above article –
    “Now I hear you arguing with me in your heads: Use Tor and upload it to Youtube. No, youtube will take it down. Use Tor and upload it to MEGA, or some site that will fight fradulent takedown notices. Okay, but now you’re relying on the good graces of some third party. A third party that is known to host the video, and can be sued. Wikileaks was the last organization that was willing to take on that legal fight, and now they are no longer in the business of hosting content for normal people.”
    These things are factual, they are not in the realm of “conspiracy theory”.
    Conspiracies abound. This is abundantly clear, especially as outlined by numerous ROK articles, or, by merely using one’s eyes and one’s brain, while processing the data one is exposed to in the real world.
    Hell, even Thomas Jefferson knew all too well of the insidiousness and pervasiveness of banking and corporate conspiracies. The USA was formed, allegedly, to get away from the myriad conspiracies hatched by the British elite, that were infringing upon the freedoms of the general populace of Great Britain…
    Do you guys who always break out the “tin-foil-nut-job” label, when confronted with somebody who states the obvious (namely, that conspiracies are a fact of life), have a brain tumor that blocks your neuroreceptors, whenever your eyes are exposed to conspiratorial material, and this precludes you from understanding the import of the galactically obvious.
    That’s the only rationale I can come up with here…I mean, aside from the inferentially obvious one. Which doesn’t need to be mentioned.

    1. It’s not that some people entirely disbelieve the various conspiracy theories it’s that many of them, myself included, have been BSed enough over the years that they are skeptical of most everything.

      1. As you should be. We are in a very very rare moment where you can see many of the truths right now. The window might close if the Elites regain control. Really look hard at the wikileaks, you have elite pedophilia there(pizzagate), you have assassinations(the INEZ “movie” was an offer to do a hit), you have podesta admitting that theyve dumbed down the populace, but are losing compliance. You have citi chosing about 70% of obamas cabinet, you have george soros telling hillary to do things, and Podestas brother making a sacrifice to Moloch. I’d say thats a pretty good start. And you have no one disputing these things, only moderators trying to scrub them, and shills trying to spin them. And people dying like flies around Julian Assange.

    2. I wouldn’t even be surpised if they were able to affect thoughts with some types of electromagnetic radiation. I’ve seen studys that show brainwaves changing drastically when a cell phone is on talk mode(without the person talking)It reminds me alot of marketing, where if you ask people if marketing affect them, most will say in the strongest terms NO. Then the marketers laugh and laugh because they have the science. What most people just don’t get is how amazingly bizarre and fucked up the wealthiest people are. What could you do if you had enough money to buy the Media and the Entertainment industry? Could you push certain agendas? Could you prevent people from learning certain truths? Could you kill someone and hide that fact? The weath of the Rothschilds is estimated in the hundreds of trillions. The US stock market is only worth around 20 trillion. These people can do whatever the hell they want.

      1. They sure can (do whatever the hell they want). They can even make people think there’s no such thing as a conspiracy. Meanwhile, the government convicts people of conspiracy every day. Talk about living in a permanent dream world.

        1. There was a good saying that the best trick the devil ever did was convincing the world he didnt exist. It makes sense that alot of the Elites are bankers, these are the people with the most discipline, with the longest time horizons. A conspiracy..the idea that the rich and powerful dream up exotic secret plans with others to get more money and power. Impossible you nut job. I just never could have guessed just HOW fucked up they are, thats where it starts sounding like lala land.

        2. Yeah, rich guys with time on their hands – what, they sit around, trying to figure out how to give back all the money they stole from the poor? Heh. Not likely. Weird, I was going to write that same “greatest trick the devil pulled” line that you wrote, in my first response. The movie, “The Usual Suspect”, has a lot of hidden truth in it, along these lines.

  9. This is so important and yet everything in the article just went way over my head.
    I just want a simple:
    For private partially anonymous email communications, do this in these steps.
    For sharing video/photos/documents with specific friends/loved ones without having to use social network hogs use this.
    For reading websites and streaming video [films/tv/porn] do this.
    To make sure your isp doesn’t see whatever you work on or look at, do this.
    ———
    We’ve already lost so many privacy protections in the uk so this is very important. We dont have free speech protections like the US does so privacy is super important.

    1. Evidently it’s not that simple. I have several company owned devices and can only wonder if someone goes behind me to see what I’ve been looking at.
      Anytime I start reading about how to eliminate that possibility I get easily discouraged because they start using all sorts of acronyms or giving examples about various happenings from the Internet and I have no idea what they are talking about. Times are moving faster than this country boy can keep up.

  10. Some say these networks were set up by the NSA itself. By using Tor you will attract attention. I would not recommend. Just be mindful that there is no privacy in the digital world and act accordingly. Plain old snail mail is probably more secure.

    1. You know, I am almost allergic to tin foil and conspiracy shit but what you said here seems absolutely plusible

      1. The NSA collects ALL man made communication on Earth. Every network packet/radio wave finds it’s way into the vast belly of the agency. That’s what one of my teachers (that worked for them) told us back in the late ’90s. People only became aware of the practice several years ago (thanks Snowden) but this has been going on since forever.
        The today’s data technologies are mind boggling and their potency grows by the day.
        Edit: I was laughing out loud when they were wondering where Hillary’s 33K emails were.

        1. Kim Dotcom sent them the photos of the Spycloud in Utah, who to talk to and what to type in to pull up HIllary’s email. He knows because it came out in the court case against him. Their prime minister Of NZ had to apologize to him.

      2. So they’ve failed on you with Blue Pill, but they’ve won with “conspiracy theory”. I’ll take a crack at telling you a mad conspiracy theory. The Federal Reserve is not a governmental agency, and we don’t actually know who owns it(at one time we did and it pays out a dividend). It has about 2 trillion in assets. Warren Buffet said it was the largest hedge fund in history. The fact that you didn’t know any of this verifiable information hopefully demonstrates how much control over information this group of people have. Check out Kennedy’s speech too, who wanted to smash the CIA into a thousand pieces. https://www.youtube.com/watch?v=zdMbmdFOvTs

        1. I simply don’t have the expertise, energy or desire to understand the Federal Reserve. I understand my own world well enough to carve out a life I am happy with. That other stuff, right or wrong, and most of it I think is probably bullshit but whatever right or wrong, it is just too big for me. I honestly just don’t care enough.

        2. You see, we live in a debt based economy and not in a wealth based economy. The FED is the one creating the debt by creating fake money the banks lend out. In this type of economy if there is no debt, there is no money. When the debt goes supernova, these fake money will reach their intrinsic value – which is zero.
          If there is no debt, there is no money. Always remember that.

    2. That’s the way I look at it. It was more or less invented and set up by the government they certainly are able to find most anything they want to find. The old saying that anything you put on the Internet lives forever is true.

  11. The testament to the power of anonymity tools is that pedophile rings…have managed to escape persecution by multiple world
    governments to this day using them.

    Don’t need to be anonymous to do that, just need to employ a euphemism. “Pizza” seems to be a good one…

  12. When you understand the differences between SSL and TLS, and how SSL was decomed a while back (but dumbass companies still using it), then you can safely use a computer.
    Otherwise, best advice to take is to simply NOT USE TECHNOLOGY. But if you insist, here’s some better tips:
    1. Stop treating your “personal” computer (including your phone) as personal. It’s not. START treating it as a public machine. That means stop naming your iPhone “Joe’s iPhone” and your PC “Joe’s Macbook”.
    2. Use aliases for everything. Never use your real name for ANYTHING, period.
    3. All personal data should be encrypted and stored offline (i.e. encrypted USB). Accessing personal data should be done from a freshly-installed encrypted machine (i.e. Live USB of Linux Mint). When done, store the USB in a safe place. If it get’s lost, so what — it’s encrypted (using custom encryption, not purchased). When you’re done using the Live USB for PERSONAL transactions, reboot your computer into your “public” OS (Windows, or whatever) and continue to use the machine as a “public” machine.
    4. Do not compromise on this. NOT A SINGLE TIME. All it takes is that “one time” for you to access your yahoo-email from your “public machine”, and now Yahoo’s database has logged the IP address of both your public and private-encrypted machine from the same location — now you’re busted if Yahoo ever gets a request for release of IP information from the govt. All it takes is 1 match, and all it takes is a click of a button these days to filter through all these databases that Yahoo, Google, Facebook, etc. are collecting without your knowledge.
    5. Too hard to just do that? Then stop using the shit. No really, just stop. Our fathers before us never touched a keyboard, let alone laid their eyes on a cell phone. They went to the grave like men — having survived in this earth without ever using so much as email. We can do it too.
    P.S. For those who say “I have nothing to hide”, you’re in the worst situation since you think you’re safe. It’s not about following the law and “having nothing to hide.” It’s about sovereignty. When the govt. comes knocking on your door to take your guns, your kids and your dignity, you won’t stand a chance. Why? They were profiling you for years and can read your every move — because you permitted it.

    1. I think this is all true.
      But, its just too strict and complicated.
      Don’t do ‘nothen wrong except speak (which can be back dated as hate speech)
      There is no hiding – I don’t trust any of these devices – Tor etc…who made it?
      And I don’t care…

      1. Agreed — and it’s getting more complicated by the day. I hold a CCIE certification, but I’m getting to an age where I am way too tired to keep up with all this emerging tech. Therefore, I’m doing my best to reduce if not eliminate my dependancy on technology. Can’t hack me if I don’t use it.

  13. Free time for your kids? Yeah, your selfie indicates you’re doing a bang-up (possibly quite literally!) job at that!
    “AHHHHH! SHE WAS SHOT IN THE HEAD!”

  14. Well TOR also relies on obfuscation by number of users…however if you are the only one using TOR — you’re in trouble.
    I regularly get antirobot checks on google search queries, which means that that particular TOR exit node is quite busy. So it’s quite hard to track down an individual (even with MITM).

  15. I’ve seen scary things this election, like when i searched for the email of one of the guys suspected of offering to do a hit for Podesta. The forum it led to chilled my bones. A forum like any other forum where people go about the business of murder. It looked like they were mostly working for capital management companies, and they couch all of their language in movie lingo,(scriptwriters are assassins, producers, someone who is paying to have something done, etc). The guy who posted about the email on reddit came back to his apartment with the door kicked down. I don’t think using secrety emails is the way you win this war. You win by exposing them and you win by being able to protect yourself. They fear the masses with their pitchforks, and a correct understanding of what they’ve done and who they’ve done it to. Buy a gun and buy a dog, and move to a place where people know their neighboors and be ready to fight if and when it comes to it. Assassins aren’t eager to go after people who are waiting for them, who have the home field advantage. The people I see who aren’t being shut down on our side are specifically the people who have armed themselves.

  16. HYPERHACKTIVE1 gmail com is a professional hacker that specializes in exposing cheating spouse,and every other hacking related issues. he helps catch cheating spouse by hacking their communications like call, Facebook, text, emails, Skype and many more. i have used this service before and he did a very good job, he gave me every proof i needed to know that my fiancee was cheating. You can contact him on his email HYPERHACKTIVE1 gmail com to help you catch your cheating spouse, or for any other hacking related problems, he will definitely help you, he has helped a lot of people, contact him and figure out your relationship status. i wish you the best too

  17. NOW this IS the kind of article that should be featured more on return of kings… Refreshing and very helpful. THUMBS up to August Moliere

Comments are closed.