Forum Statistics

Threads
27,576
Posts
541,660
Members
28,556
Latest Member
Ethan7400

How to Be Invisible on The Web

Bigtex

Bigtex

VIP Member
Aug 14, 2012
1,108
1,636
One of the things I do like about Tor is it spoofs a lot very important information. Below is an example. I am not using Windows 7 or Firefox, it also spoofs the time given from your computer which may or may not match the time of the VPN and it also changes the screen resolution as well as information about the plug-ins you have installed.

Your Browser User Agent String is Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Operating System:
Microsoft
Platform:
Windows 7
Internet Browser:
Firefox 52.0
Beta Version:
No
Connection Speed:
623.20 Kbps
Restrictive Firewall:

It also disables WebRTC ( you should disable this manually other browsers too)

WebRTC Leak Test
WebRTC Support Detection
RTCPeerConnection ×False
RTCDataChannel ×False
ORTC (Microsoft Edge) ×False
IP Address Detection
Local IP Address n/a
Public IP Address n/a
IPv6 Address n/a
WebRTC Media Devices
Device Enumeration ×False
Has Microphone ×False
Has Camera ×False
×False
×False
Unique Device ID's n/a


NSA also has spy servers set up that intercept ALL internet signals. Email, PM's or anything else you do can be seen. All of this can be prevented with PIA by making a few adjustments in your encryption level.

Maximum Protection
Data encryption: AES-256
Data authentication: SHA256
Handshake: RSA-4096

NSA has not broken AES 256 encryption of the RSA-4096 handshake and Government uses both for sending document with security clearance. Most likely they use both because they feel there is no chance of breaking the encryption. AES 128 has been broken and is not recommended in Government.

PIA utilizes high grade encryption based on the cryptographically secure Blowfish CBC algorithm which can be adjust manually to AES-256. This is used in conjunction with the OpenVPN protocol and is able to secure your data transmissions. The more complex the algorithm, the harder the cipher is to crack using a brute force attack which NSA computers use. 128 may take hours using a supercomputer but 256 would take years. Edward Snowden also says the OpenVPN has not been compromised by NSA. OpenVPN has two parts, data channel encryption is used to secure your data and control channel encryption secures the connection between your computer and the VPN server. PIA uses AES 256, SHA 256 and RSA 4096 on both channels.

So with PIA you can manually switch from a good security level, Blowfish-128 to what is considered to be the gold standard of encryption, AES-256. Again, this is what the Government uses to send secure information.
 
Lil Ed

Lil Ed

VIP Member
Jul 15, 2011
786
1,060
Nord is also pretty nice as a vpn. lots of locations also around the world.
 
Bigtex

Bigtex

VIP Member
Aug 14, 2012
1,108
1,636
What I like about Nord is they use what is called a double-hop VPN servers. Meaning they chain you connection through two VPN servers. JUst added security. They also keep no logs of your activity. Another interesting benefit they offer is Tor-over-VPN which hides the fact that you are using Tor. Our lovely federal government is very sensitive about the use of VPN's. More especially Tor. If they dedect Tor they immediately think you are doing something illegal. So hiding the use of Tor could keep you even safer. Nord also uses the AES 256 bit encryption, it also uses 0penVPN which is an open source software. The double-hop VPN may slow it down a little but if it is optimal security you are interested in speed can not be a big issue. Combining this with TOR will not be very fast at all but you will be pretty damn safe.

I do have a small word of warning when using VPN's

Federal Rules of Criminal ProcedureTITLE VIII. SUPPLEMENTARY AND SPECIAL PROCEEDINGS › Rule 41. Search and Seizure
Rule 41. Search and Seizure

https://www.law.cornell.edu/rules/frcrmp/rule_41

The U.S. Supreme Court has approved a change in Rule 41, providing judges across the country with the authority to issue warrants for remote electronic searches outside their district. The judge can also grant a warrant to perform “network investigative techniques” (i.e. hacking) on suspects’ computers, even if the suspect uses tools such as VPNs or Tor browsers to hide his/her identity anywhere in the world.

So what this means if those of use who prefer to hide our identity to protect ourselves from those who want to steal our information raise suspiciousness to the government because they think we are doing something criminal. This can be abused giving local law permission to get warrants to get your computer. Like I said, this law has a huge potential to be abused. But VPNs use is very popular so the likely hood of this happening is not so good, especially as more and more start using them.
 
TheClap

TheClap

VIP Member
Oct 25, 2011
547
173
My problem with Nord VPN is that it's slower than shit.

If you want to take your privacy/anonymity to the max, read the IVPN privacy guides:

https://www.ivpn.net/blog/privacy-guides

I don't remember how I found those, but they'll walk you through the process of putting together a setup that tight as a button.

What I do, I install Linux onto a tiny little USB 3.0 jump drive. I like Linux Lite for this. Then I install PIA and Tor. If you want to go further run a Whonix virtual machine inside of that with it's own VPN. With the use of a virtual machine you can actually create a nested chain of VPNs. Also a VM creates a virtual HDD that keeps absolutely everything for that machine inside of it, so two clicks of a mouse and run it through a file shredder and everything is gone.

However, that is absolutely not what you would actually do because the whole purpose of putting the operating system on a jump drive that's small enough to swallow is that you get rid of that little drive and everything is gone. I set the Linux install to not even mount the drives in my PC so absolutely no trace is left in those.

Now, something else to consider is your MAC address. That's basically the unique serial number that identifies your WiFi card or LAN port on your computer. This can identify your PC specifically. The easy way around that is to go to an electronics store and pay cash for some USB WiFi dongles, so you then have disposable MAC addresses.

Anyway, that's enough out of me for now.
 
J

johnjay06

VIP Member
Jul 22, 2011
426
87
I use express vpn. It's the fastest of all I tried. Hopefully wireguard will be more adopted in the future, it's headed in the right direction
 
gunslinger

gunslinger

VIP Member
Sep 19, 2010
1,906
1,149
Having been a computer tech for a living for the last 15 years I always get a kick out of the "How to be invisible on the internet" Type threads....lol I hate to break it to you guys but if the gov wants you bad enough all your VPNs and tor BS aren't gonna help you. Besides, Unless you are hardcore dealing (especially recs) you aren't much of a target anyway. So use your disposable laptops with spoofed mac address on the McDonald's WiFi from a bootable Linux flash drive using 6 VPNs and tor if you like but you really aren't impressing people who do this stuff for a living.

News flash: Unless you are streaming copious amounts of kiddy porn from your home server its not your online shit thats gonna get you busted. Its remailing, manufacturing, the US mail, customs, and your own loud mouth at the local planet fitness thats going to get your ass busted. Its your bestest pal you been doing business with for the last 6-7 years who gets pinched and rats you out. Its the ex GF who found your stash last year but said nothing now she finds the pics the other whore sent you on your phone. This is the real shit thats gonna get you busted.

Side note: I've only personally known one group of people (really only knew two of them) who went to jail for anything they did online and their online activities only came into question after their storage unit was found containing something like $630,000 worth of gear.

The bottom line is this: There is no possible way to be truly "invisible" on the internet and people who are trying really hard to be are the ones the gov and police are interested in.
 
Last edited:
NDLessPSYcle

NDLessPSYcle

MuscleHead
Apr 1, 2011
838
209
So GS you’re saying the Feds don’t want me, the ex wife doesn’t....wth is next? You gonna tell me the Easter bunny is fake? ;):D
 
M

musto

Member
Oct 14, 2018
79
23
The bottom line is this: There is no possible way to be truly "invisible" on the internet and people who are trying really hard to be are the ones the gov and police are interested in.

LOL so true. But I guess for our part, the least we can do is TRY in whatever way we can :)
 
Who is viewing this thread?

There are currently 0 members watching this topic

Top