Remain Anonymous Online and Protect Information- Part 1

0
485

from Survival Blog:

Would you like to remain anonymous while online? Would you like to protect your communications and information? Well, I’m going to show you how you can accomplish this. This is intended to be a comprehensive, full paranoid guide. So use everything or just some to get the protection you deem appropriate. It might be best to read through this guide, determine everything you’ll need, and then go step by step. At the end, I’ve provided some resources for additional help, if this doesn’t provide enough in-depth guidance.

Start From Nothing, Remove Everything
Let’s start from nothing. You need a computer, preferably a laptop. I would recommend a gaming laptop from Amazon. If you want absolutely no traces, you’ll want to buy it used (such as on Craigslist) with cash or have an acquaintance buy it from Amazon. You could buy something from a local store with cash, or get a prepaid credit card and use that.

If the laptop has Windows 10 Professional, then you are good to go. However, it probably does not. So, you need to buy and install that. Again, you can buy this from Amazon, a local store, or through a private purchase. When you are installing it, ensure you select to “Remove Everything”. This just makes sure you have a fresh install without any of the extra software that is usually included.

Windows 10 Professional Required for Bitlocker to Encrypt Drive
Windows 10 Professional is required for bitlocker to encrypt the drive. Now encrypt your entire hard drive. To do this, go to the start button, settings, and manage bitlocker. Select your C drive, and turn on bitlocker. The setup will walk you through what you need to do. You’ll be setting a password.

A Quick Password Guide
It’s time for a quick password guide. The best password is a long password that you can remember without writing it down or saving anywhere. It might be something like “I really need a beer!”. A 21 character password is hard to crack. Use sentences with punctuation. Throw in some numbers, and even if someone does guess your password, it’ll still be hard. You might modify it to be “I Really N33d A B33r!”. Alternatively, you could use a password list of randomly generated characters and keep it with you at all times, but I think sentences are easier. Now go back and change your password for your laptop to something better.

A Recovery Key
Once you set your password for bitlocker, you’ll be given the option to save a recovery key. You can use this key to recover your bitlocker drive, so you’ll either want to securely dispose of it or keep it on you at all times. If you forget your password and lose your recovery key, then you will have a brick that you can start all over with. It will take some time for the drive to encrypt, but you can continue to use it while that is working.

Virtual Private Network
Now you are going to setup a VPN– virtual private network. A VPN encrypts your network traffic between you and the VPN provider. This ensures that if someone is snooping on your connection, all they get is your encrypted traffic. You must, however, trust your VPN provider, because they could be acting as the middleman. There are two that I would recommend– Private Internet Access or Proton VPN. Proton has a free option, if you are limited on resources.

How to Pay For Your VPN
Once again, you’ll be presented with a choice of how to pay for your VPN. You could use the Proton VPN free service to purchase the paid VPN service, using a one-time use email.

Secure Email Service
If you google secure email service, you can find them. In my experience they tend to have ads for porn, therefore, I’m not linking to them. Some of these are going to be “shared”, so you may already have mail in the box and someone could see whatever information is sent to that mailbox. Also, if you lose your information to your paid VPN provider, then you just donated your money. Alternatively you can create a free email with gmail or provider like Proton Mail.

Private Internet Access
Private Internet Access has some walk-throughs on setting up their service. Install their client, put in the username and password they provide, and then connect to the server of your choice. If you want a faster connection, select a server that is closer to you. Another use for a VPN is it will allow you to pick where you “are” so that services that will only allow you to watch streaming from their country might allow you to use them. You will want to test your VPN.

Updated with the Latest Protections
Now you need to make sure your computer is updated with the latest protections. Go to your start button, then settings, and search for “check for updates”. Then, click the update button and let the updates get installed. This might take awhile. However, you can continue to use it. You need antivirus software. Windows 10 comes with Windows Defender, which is a good product. You can check for updates by going to settings and searching for Defender. If you want to purchase one from a different vendor, I would recommend ESET or F-Secure. These are only going to protect you so far. If you go looking for trouble (malware, backdoors, et cetera), they may or may not protect you.

Virtual Machines For Internet Activity
All of this was to setup your computer; however we’re not going to use this computer for our Internet activity. We’re going to setup virtual machines for Internet activity. A virtual machine is a software computer that runs on a host, like your computer we just setup. With a virtual machine we can reasonably ensure that it is clean after every use. And, if we need, we can download or setup a new one just to be sure.

Read More @ SurvivalBlog.com

Loading...