Staying Hidden - A Guide to Basic and Advanced Anonymity

Lots of people do not know how to be hidden online, so I made this simple guide on some easy-to-advanced measures you can take.

I do not support illegal use of this information. That being said, if you feel unsafe this information is on my own website under soulsender.github.io which is not associated with any external websites. Unless you have a compromised Root Certificate, nobody can directly see you are reading this article, they only know you are on my website.

Be wary that the domain name of any website is readable. For getting around this, see the VPN section for minimal suspicion.

Please note that for the sake of simplicity, I have trivialized some aspects of the following technology in the hopes that it will be more understandable for the general audience. That being said, if something is not right with something I’ve written, you may contact me at soulsender@tutanota.com.

I encourage you to read the entire thing if you feel seriously threatened, as understanding these concepts will help you in your privacy, but I’ve included a TL;DR (Too Long, Didn’t Read) at the end of the section as well if you don’t want to.

Don’t use this information for evil. I’m doing my best to educate and help people.

Table Of Contents

Abbreviations and Shit

I use a lot of technical abbreviations, you can use this quick guide to know what I am talking about. I explain most of these more in detail in their respective sections.

Signal the Secure Messager App

Unlike WhatsApp, Telegram, Instagram Messenger, iMessage, etc., Signal is an open-source messaging app. This means that the code is available for anyone to look at. It is more secure and more private than other closed-source apps like the ones listed above. It cannot have secret hidden backdoors for the government to be listening in because it is quite literally not written into the code of the app.

Signal also uses End-2-End (E2E) encryption. Unlike other messenger apps that use traditional encryption like Facebook and Apple, the messages you send are only seen by YOU and the recipient. This works because you are generated a special key (public and private versions) that you exchange with the recipient. This is actually quite an old process, and you can do it manually using something like GPG, although this manual process won’t be practical for daily use.

As is proven in this article, Signal does not take any more information than is required, and will not give it to the United States government. Additionally, they work with the ACLU (American Civil Liberties Union).

Signal comes with some quirks and features for anonymity. You can set it to automatically delete messages after a certain timeframe. You can also set it to require a PIN by going to Settings > Privacy > Screen Lock.

(And for all the nerds out there, yes, I know Matrix exists, but no normal end user is going to be able to set up their own self-hosted Matrix server.)

TL;DR

Signal is open-source and is not used to spy on users. It truly does not collect information aside from the last login connection and the date of account creation. Its traffic is secured via E2E encryption.

VPNs and Misinformation

VPNs are one of the most generally misinformed pieces of technology security ever made. Many advertisers such as NordVPN, ExpressVPN, PrivateInternetAccess, etc., straight out lie to their customers, so I will go into the myths and truths of VPNs here. Tom Scott made a very good video about this as well.

Myths

Truths

My Personal Trusted Providers

(this is not sponsored, these are genuinely good)

TL;DR

VPNs are very misinformed. They change your virtual location and use the VPN server’s IP address. VPN providers will keep logs, and they will give those logs to law enforcement. They are not initially meant for anonymity and privacy.

The Dark Web and Tor

It’s not dangerous if you’re not stupid.

Tor - The Onion Browser

This is where your anonymity starts to get serious. The Tor browser is a special browser specifically designed to be completely anonymous (it’s actually a forked version of Firefox if you can believe it). There is nothing illegal about downloading and using Tor (depending on where you live this might differ). Tor is actually funded by the United States government (I’ll explain this later and why it’s ok).

The Tor Browser uses a special type of technology called Onion Routing. This is named after an onion, because this type of routing uses “layers” to mask the user’s traffic.

Tor Diagram

This traffic is encrypted in a multi-layer way, where the relays cannot see past the next connected relay. The only thing the first relay will see is where the data is coming from, and the location of the next relay. The relay after that one will only see the relay before, and the relay after, but not the source of the data. This continues until the last relay can see the destination of the traffic, but not the origin. Typically there will be 3 relays by default, but you could increase this at the cost of the speed of the connection.

Tor with a VPN (don’t do it)

Some people say you should use Tor with a VPN for “maximum” privacy, but this is not true, and might compromise your security.

On this page on the Tor wiki, they explain why you should not do this.

“You can very well decrease your anonymity by using VPN/SSH in addition to Tor. (Proxies are covered in an extra chapter below.) If you know what you are doing you can increase anonymity, security and privacy.

Most VPN/SSH provider log, there is a money trail, if you can’t pay really anonymously. (An adversary is always going to probe the weakest link first…). A VPN/SSH acts either as a permanent entry or as a permanent exit node. This can introduce new risks while solving others.

Who’s your adversary? Against a global adversary with unlimited resources more hops make passive attacks (slightly) harder but active attacks easier as you are providing more attack surface and send out more data that can be used. Against colluding Tor nodes you are safer, against blackhat hackers who target Tor client code you are safer (especially if Tor and VPN run on two different systems). If the VPN/SSH server is adversary controlled you weaken the protection provided by Tor. If the server is trustworthy you can increase the anonymity and/or privacy (depending on set up) provided by Tor.

VPN/SSH can also be used to circumvent Tor censorship (on your end by the ISP or on the service end by blocking known Tor exits).”

- Alexander Færøy on the Tor Wiki

In short, using Tor is completely anonymous, while using a VPN only hands your information to the VPN provider. This completely defeats the purpose of Tor and is unnecessary.

Just like in the VPN section, I will do an overview of Truths and Myths of Tor.

Myths
Truths
TL;DR

Tor is pretty much the end-all of online privacy. It uses multiple layers of encryption, in a way where the source and destination are nearly impossible to both locate. It has not been cracked, and any faults are due to the end user and not the protocol.

Circumventing Censorship

Censorship is when you aren’t able to visit a website or use a service because a firewall is blocking you. Perhaps this is because you are at school, and your sysadmins don’t want you looking up questionable stuff. Or maybe it’s because you live in a dictatorship regime; in which case, somehow, you are reading this. The following methods should work for both.

DISCLAIMER: This comes with risks. This may get you in trouble depending on where you live, and unfortunately, this relies on some websites not being blocked, which you will have to visit, so it’s likely that you could be exposed during the setup of this process.

Method A - Tor Browser With a Bridge

I would recommend this way first, as it is free, but it relies on Tor and Tor traffic not being blocked already.

First, download the Tor Browser. DO NOT USE ANY OTHER WAY OF ACCESSING TOR. Do not use Brave, do not use proxychains, only use Tor. This is because using a different client makes you stick out like an ass and will compromise you.

If the previous URL was blocked for you, you may use either this link or this link. In addition, you may use GetTor with the following steps.

  1. Send a request to gettor@torproject.org specifying your operating system (and your locale). Ex: “windows es”
  2. GetTor will send you back a reply with links to download Tor Browser from supported providers.
  3. Download Tor Browser from one of the providers. When done, check the integrity of the downloaded file by verifying its signature.
  4. (Optional but recommended) In GetTor emails, there will be a link to a file with the same name as the package and the extension “.asc”. These .asc files are OpenPGP signatures. They allow you to verify the file you’ve downloaded is exactly the one that we intended you to get. For example, torbrowser-install-win64-8.5.4_en-US.exe is accompanied by torbrowser-install-win64-8.5.4_en-US.exe.asc.

Once you have the browser downloaded, go to the settings in the top right corner. Click on the Tor icon labeled “Connection”. I suggest you have “always connect automatically” checked. You may set a bridge in the menu below. Click “select a built-in bridge”. You may try obfs4, Snowflake, or meek-azure. I recommend Snowflake; however, you may try the other two if needed.

Method B - VPN With Obfuscation

In the case of Tor not working at all, you not being able to obtain it, or it is too slow for your use case, you may try a VPN with Shadowsocks obfuscation. Normally VPNs will leave a trace of OpenVPN or WireGuard encrypted traffic. While traffic sniffers can’t see what the actual traffic is, they can see that it is a VPN connection, and block it. If this happens, you might want to use Shadowsocks.

Shadowsocks makes the traffic look similar to DNS traffic or something similar, and not like VPN traffic. Many VPN providers will have this feature built into their application. I suggest a Mullvad subscription paid with Monero for maximum anonymity. As with the previous sections, I am not sponsored by Mullvad. I genuinely like their product more than other products. Though Mullvad will still have your IP address, it is unlikely they will give it