![]()  | 
For beginners | 
|---|
Elementary anonymity steps for
beginners
    
How d'you begin a "crash-course" in anonymity lores for beginners?
Ah! Parum tuta per se ipsa probitas est!
Let's just be frank and direct... let's use a lore... sort of...
"Yep!"  - said fravia+ - "so you want to understand why anonymity
is important? Easy,
just read on:... I believe that each time ANYBODY asks you for
some personal info
you should by all means do a mix from the following":
  
  
     
   1. Smith  
     11. Anderson  
     21. Clark  
     31. Wright  
     41. Mitchell  
  
     
   2. Johnson  
     12. Thomas  
     22. Rodriguez  
     32. Lopez  
     42. Perez  
  
     
   3. Williams  
     13. Jackson  
     23. Lewis  
     33. Hill  
     43. Roberts  
  
     
   4. Jones  
     14. White  
     24. Lee  
     34. Scott  
     44. Turner  
  
     
   5. Brown  
     15. Harris  
     25. Walker  
     35. Green  
     45. Phillips  
  
     
   6. Davis  
     16. Martin  
     26. Hall  
     36. Adams  
     46. Campbell  
  
     
   7. Miller  
     17. Thompson  
     27. Allen  
     37. Baker  
     47. Parker  
  
     
   8. Wilson  
     18. Garcia  
     28. Young  
     38. Gonzalez  
     48. Evans  
  
     
   9. Moore  
     19. Martinez  
     29. Hernandez  
     39. Nelson  
     49. Edwards  
  
     
 10. Taylor  
     20. Robinson  
     30. King  
     40. Carter  
     50. Collins  
  
| 1. James | 11. Christopher | 21. Ronald | 1. Mary | 11. Lisa | 21. Michelle | |
| 2. John | 12. Daniel | 22. Anthony | 2. Patricia | 12. Nancy | 22. Laura | |
| 3. Robert | 13. Paul | 23. Kevin | 3. Linda | 13. Karen | 23. Sarah | |
| 4. Michael | 14. Mark | 24. Jason | 4. Barbara | 14. Betty | 24. Kimberly | |
| 5.William | 15. Donald | 25. Jeff | 5. Elizabeth | 15. Helen | 25. Deborah | |
| 6. David | 16. George | 6. Jennifer | 16. Sandra | |||
| 7. Richard | 17. Kenneth | 7. Maria | 17. Donna | |||
| 8. Charles | 18. Steven | 8. Susan | 18. Carol | |||
| 9. Joseph | 19. Edward | 9. Margaret | 19. Ruth | |||
| 10. Thomas | 20. Brian | 10. Dorothy | 20. Sharon | 
(October 2006)  | 
| Fravia's relative guide to anonymity | |
"Fravia's relative guide to anonymity" or "no need to be 'too' paranoid" ----------------------------------------- RULES 1) buy pc cash elsewhere (not with cards and not where they know you) 2) wardrive in another part of the town, not the one you live in 3) download only, or if you upload, upload only anonymous things or PGP encrypted stuff 4) rotate your wifi card mac address at every access point: I use "Macmakeup" 5) use wardriving laptop ONLY FOR THAT, no personal data whatsoever on it (or use a live LinuxCD à la Knoppix and/or a USB stick. Boot it with no access to your harddrive) TECHNIQUES 1) Find speedy, beefy first wifi accesspoint with netstumbler: there are so many unprotected at all that you don't even need to fire a wep-packets-analyzer/cracker à la Kismet. 2) connect, browse, download, you may even let , (still using opera and proxomitron, he) some shields down: javascript, java, the whole bazaar : who cares? It's not you. Is "he". 3) ISP "A" will register everything "he" does. 4) work half an hour, download the helluja out of it, upload with care 5) Note that your "host" may have his own log files on the router, but -usually- this is still not a problem since most people do not change the password of the router so that "admin" and "password"|"passwd" is always worth a try in order to get admin access to the current hotspot router and delete the logfile. 6) walk ten meters, change access point ISP "B" will register everything "another he does". work half an hour, download the helluja out of it walk ten meters change access point ...rince and repeat at leisure Reformat hard disk every week just in case, or even better: the moment you buy the computer immediately create an image of the clean system and store it somewhere (like a DVD). Every now and then you erase (3-7 passes) the hard disk and then copy your clean system partition back. Doesn't take much longer than formatting and is even more secure. next day another part of the town, or another town :-) and so on... Note that it can still be a good idea to ADDITIONALLY use TOR TUNNELING tools à la Torpark, for instance mounted on a USB stick. Note that it can still be a good idea to ROUTINELY check what's going on "under the hood" during your connections with a good sniffer à la wireshark (ex-ethereal).  | 
When posting on Usenet
 by fravia+
 Never, never, never use a working email address.
When posting news items use a From: or Reply-To: address like the
following ones:
