Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
Editorials & Other Articles
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
The Hitchhiker's Guide to Online Anonymity
https://anonymousplanet.org/guide.htmlThis is highly technical for people who really need anonymity (i.e. reporters in danger of retaliation)
This guide is a non-profit open-source initiative, licensed under Creative Commons Attribution-NonCommercial 4.0 International (cc-by-nc-4.0) https://creativecommons.org/licenses/by-nc/4.0/
You are free to: Share copy and redistribute the material in any medium or format
This is only the introduction!
For a simpler guide, see my post.
Digital Security and Privacy Tips for Those Involved in Abortion Access
https://democraticunderground.com/109530002
or just go the source, EFF
https://www.eff.org/deeplinks/2022/05/digital-security-and-privacy-tips-those-involved-abortion-access
CC BY license, https://www.eff.org/copyright "You do NOT have to ask permission to post original EFF material on a mailing list or newsgroup"
I am leaving references unresolved. Please go to the site.
quote
Introduction:
TLDR for the whole guide: A strange game. The only winning move is not to play 4.
Making a social media account with a pseudonym or artist/brand name is easy. And it is enough in most use cases to protect your identity as the next George Orwell. There are plenty of people using pseudonyms all over Facebook/Instagram/Twitter/LinkedIn/TikTok/Snapchat/Reddit/ But the vast majority of those are anything but anonymous and can easily be traced to their real identity by your local police officers, random people within the OSINT5 (Open-Source Intelligence) community, and trolls6 on 4chan7.
This is a good thing as most criminals/trolls are not tech-savvy and will usually be identified with ease. But this is also a terrible thing as most political dissidents, human rights activists and whistleblowers can also be tracked rather easily.
This guide aims to provide an introduction to various de-anonymization techniques, tracking techniques, ID verification techniques, and optional guidance to creating and maintaining reasonably and truly online anonymous identities including social media accounts safely. This includes mainstream platforms and not only the privacy-friendly ones.
It is important to understand that the purpose of this guide is anonymity and not just privacy but much of the guidance you will find here will also help you improve your privacy and security even if you are not interested in anonymity. There is an important overlap in techniques and tools used for privacy, security, and anonymity but they differ at some point:
Privacy is about people knowing who you are but not knowing what you are doing.
Anonymity is about people knowing what you are doing but not knowing who you are 8.
(Illustration from9)
Will this guide help you protect yourself from the NSA, the FSB, Mark Zuckerberg, or the Mossad if they are out to find you? Probably not Mossad will be doing Mossad things 10 and will probably find you no matter how hard you try to hide11.
You must consider your threat model12 before going further.
(Illustration by Randall Munroe, xkcd.com, licensed under CC BY-NC 2.5)
Will this guide help you protect your privacy from OSINT researchers like Bellingcat13, Doxing14 trolls on 4chan15, and others that have no access to the NSA toolbox? More likely. Tho we would not be so sure about 4chan.
Here is a basic simplified threat model for this guide:
(Note that the magical amulets/submarine/fake your own death jokes are quoted from the excellent article This World of Ours by James Mickens, 2014above10)
Disclaimer: Jokes aside (magical amulet ). Of course, there are also advanced ways to mitigate attacks against such advanced and skilled adversaries but those are just out of the scope of this guide. It is crucially important that you understand the limits of the threat model of this guide. And therefore, this guide will not double in size to help with those advanced mitigations as this is just too complex and will require an exceedingly high knowledge and skill level that is not expected from the targeted audience of this guide.
The EFF provides a few security scenarios of what you should consider depending on your activity. While some of those tips might not be within the scope of this guide (more about Privacy than Anonymity), they are still worth reading as examples. See https://ssd.eff.org/en/module-categories/security-scenarios [Archive.org].
If you want to go deeper into threat modeling, see Appendix B3: Threat modeling resources.
You might think this guide has no legitimate use but there are many16171819202122 such as:
Evading Online Censorship23
Evading Online Oppression
Evading Online Stalking, Doxxing, and Harassment
Evading Online Unlawful Government Surveillance
Anonymous Online Whistle Blowing
Anonymous Online Activism
Anonymous Online Journalism
Anonymous Online Legal Practice
Anonymous Online Academic Activities (For instance accessing scientific research where such resources are blocked). See note below.
This guide is written with hope for those good-intended individuals who might not be knowledgeable enough to consider the big picture of online anonymity and privacy.
end quote
InfoView thread info, including edit history
TrashPut this thread in your Trash Can (My DU » Trash Can)
BookmarkAdd this thread to your Bookmarks (My DU » Bookmarks)
2 replies, 921 views
ShareGet links to this post and/or share on social media
AlertAlert this post for a rule violation
PowersThere are no powers you can use on this post
EditCannot edit other people's posts
ReplyReply to this post
EditCannot edit other people's posts
Rec (4)
ReplyReply to this post
2 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies
The Hitchhiker's Guide to Online Anonymity (Original Post)
usonian
Dec 2022
OP
Cheezoholic
(2,612 posts)1. Great Post! n/t
orthoclad
(4,728 posts)2. Useful reference in the age of surveillance. Thanks.