Convenient anonymity in practice

Man

Professional
Messages
3,070
Reaction score
606
Points
113
A guide on how to make yourself an anonymous work machine.

I somehow didn't get along with virtual machines, I don't like working from them. Either the scrolling lags, or the performance is not that good. I like convenience without brain-fucking. For example, playing YouTube in the background. Therefore, we will have bare metal, like the old-schoolers had in 1995.

To begin with, we need the work machine itself. Clean, where no hardware identifiers are associated with your personal white life. Therefore, go and buy a computer / laptop. Yes, go and buy, no online orders, deliveries or card payments. Stomp your feet and pay in cash. It is permissible to buy used only if you did not call the seller when buying and he is not familiar to you in any way. At this stage, you must not leave any digital traces of the purchase. This is not paranoia, while you sleep, big data is downloaded.

Next, we need a router with built-in Tor. This will be our analogue of Whonix or Tails, only iron. The core of our anonymity. For those who want to fuck around, you can take any powerful enough router, flash it with OpenWRT and set up Tor there. There are guides on the Internet. For the rest, buy a ready-made one right away. There are some https://www.gl-inet.com/ (not an advertisement), Tor is turned on there with one button. There are others, crafts on the Raspberry Pi and much more. You can buy all this on Ali, Avito, eBay, you can find it on the Internet.

Immediately turn off Wi-Fi. Both on the router and on the laptop. On the laptop, it is better to physically turn it off. Unscrew the back panel and pull out the module. This is why you need it. If you are ever hacked by a spy or some software sends telemetry to itself, then the MAC address of your Wi-Fi will be there. And the turned on Wi-Fi gets into the geolocation databases. Any mobile sends the BSSID of all the points it sees to its servers. By the way, is yours far away? :)And in large cities, special cars of special services drive along the streets scanning the air. Use the good old LAN cable.

Bluetooth is there too. In laptops, this is most often one module with Wi-Fi.

On the router, change the MAC address of the LAN interface, turn on TOR, connect a clean laptop and you can install the OS. After installation, you will get a working machine that knows about the outside world only the changed MAC of the router, behind which TOR. The OS has never even gone to its update servers from your IP. Pure anonymity.

Buy a VPN for Monero. Pay for no more than a month, after a month register a new account that is not associated with the previous one. Do not use the application from the VPN service, connect a regular OpenVPN client. The VPN application sends telemetry, through which your accounts will be linked. If you have your own VPN, then change the server and account once a month. If you buy from private sellers, then write from a new contact. Who will say why this is important?

If you install Telegram, do not use official builds. Take open source forks. Same with other software. Instead of Chrome - Chromium, VSCode - VSCodium. Any telemetry to hell. And they won't download a special personal update for you.

As a result, you get a workplace that you can just comfortably work with like a regular computer. Without launching virtual machines, without setting up chains. Just open the lid and work. Anonymity by design, 24/7.

Of course, Linux is the best OS. If anyone needs it, I'll tell you in the comments which distributions are better to install. In general, you can even connect Windows to this scheme if you don't care about the tons of telemetry it collects. The main thing is to turn off Wi-Fi, it will directly lead to your location.

You should not have the slightest connection with your personal life from this laptop. For example, stick a red sticker on it, for an extra reminder. An anonymous laptop is for anonymous activity. Do not use any accounts that you used before. Register everything new.

If you do not need special anonymity (the FBI and Interpol will not look for you), then in these same routers you can turn on VPN instead of TOR. Kill Switch is there. On the main machine, also run VPN (they must be different) and get double VPN. It will be faster than TOR. And with a competent selection of VPN and locations, and no worse in terms of anonymity.

The advantages of such a laptop are that you are not afraid of bookmarks in software, hypervisor, OS, UEFI. All hardware is anonymous. The disadvantages are that any software with telemetry sees hardware identifiers. Therefore, strictly follow the advice above.

Thank you for your attention.
 
Top