Preview - How to be Anonymous Online: Step-by-Step Anonymity with Tor, Tails, Bitcoin and Writeprints (2016)

How to be Anonymous Online: Step-by-Step Anonymity with Tor, Tails, Bitcoin and Writeprints (2016)


This manual is written:

1. In 1,2,3 step format

2. With concise, yet thorough, instructions

3. For beginners using a DVD bootable PC with a DVD burner

I will teach you how to:

1. Use someone else's computer without them knowing

2. Browse the internet anonymously

3. Circumvent Windows without altering anything on the system

4. Make an email account that actually is anonymous

5. Use PGP Encryption the right way (I make this simple)

6. Taunt Kim Jong-Un

I will show you that Bitcoin is NOT Anonymous and how that is about to change.

I will provide you with future updates.

I believe in the “Keep It Simple Stupid” methodology. This manual details exactly what you need to get what you want, no more, no less. I wrote this so you could be anonymous today instead of spending the next week reading everything you find on Google and, in the end, still not know how to implement the proper steps.

The problem I've seen in other books and online instructions is they give you a bunch of sources and programs for anonymity, but they do not tie all the loose ends together. For instance, you might buy anonymity software, but God knows what a totally unrelated program in Windows is still tracking and saving to your hard drive. Besides that, if you want to use a work computer, they certainly are not going to allow you to install anonymity software. Moreover, maybe, you do not want to encrypt your hard drive because that looks suspicious. You need to run straight from a DVD, Flash Drive or Micro SD card outside of Windows altogether. I will even show you how to boot with a flash drive on old computers that typically will not do so.

Let’s tie up those loose ends.


Here are a couple of important points regarding Online Anonymity:

1. Disabling Cookies is USELESS – You are still traceable through your digital fingerprints

2. Using an IP Proxy Service is BAD – It routes all your activity through a central source that can track you

3. Logging into a computer is BAD – It leaves a record that you were there

4. Subscribing to an Anonymity Service is BAD – You are giving out your name, credit card, etc. to buy your anonymity… You are not anonymous if you have to share personal information!

5. Creating an anonymous Yahoo, Gmail, etc. account is BAD – Just ask General Petraeus how well this works

6. JavaScript is BAD – This is a prime vehicle for transporting malware into your system

7. Super-Cookies are BAD – They regenerate deleted cookies, are stealthy and hard to delete

8. Digital Fingerprints are REALLY BAD – Advertisers have begun using digital fingerprints to track an individual's activity. Digital Fingerprints are pulled by gathering the data your system provides websites, such as installed fonts, browser extensions and their micro-versions, operating system and its updates, time zone, and such. While individual bits of this information are not particularly dangerous, collectively, they are compiled to create a traceable and absolute "digital fingerprint."

9. Bitcoin is NOT Anonymous – Other books tell you that Bitcoins are Anonymous or that you can use “Bitcoin Laundry” services to cover your tracks. I will show why they are wrong and what technology is in the works to fix this.

10. You Have Writeprints – Writeprints are a means of identifying an author solely from the characteristics of her written work. With the ability for individuals to mask IP addresses and minimize digital fingerprints, writeprinting is often the only method available to identify the author.

Don't worry, we are going to work around these.


Do not be a fool. None of this is 100%.

To my knowledge, as of July 14, 2015, no one following my instructions has faced an exploit. Since I update these instructions regularly to reflect changes in technology, weaknesses that develop will see rectification quickly and accordingly.

Unfortunately, everything has flaws, especially software. The most popular, and probably most secure, software for online anonymity is Tor. The most popular operating system for online anonymity is Tails. These are the heart and nervous system of these instructions. The strength of these programs comes from the ongoing development of each and their open code. When good guys find flaws, work to rectify them begins immediately. When bad guys find flaws, they may be exploited indefinitely.

If being anonymous online is a hobby, this is the way to go. If being anonymous online is a way to restrict corporate advertisers from tracking your online life, this is the way to go. If you hate the fact that some governments are collectively spying on you for no reason, this is a way to make a point that you are not blindly submitting and a way to complicate their efforts.

The great length that people must go to break these systems hints that they work well. However, if you want a foolproof, 100% certain way to avoid the prying eyes of every entity, there is no solution for you. There are organizations with thousands of people dedicated to tracking and watching you. If you want to use Tor to bad mouth Vladimir Putin, you should know that the Russian Ministry of Internal Affairs has a 3.9 million ruble reward for developing methods to identify you. If for nothing more than bragging rights, there are academics and hackers that simply want to be the first to publicize mistakes. In fact, a couple of researchers from Carnegie Mellon University gained a huge amount of attention for their attempts to de-anonymize Tor users in 2014.

These are advanced methods for protecting your anonymity. I take you through detailed steps, far more than you are likely to find in one place online, to authenticate your software. I think the sections on authenticating your system are the most overlooked, yet most valuable aspect of this guide. However, if you are looking for a way to evade every entity in existence, I do not know what to tell you.

Nothing I say, do, provide, link to or recommend is guaranteed to protect your anonymity. Whether it is tomorrow or thirty years from now, every security measure will eventually be compromised. That is the power of technology. Frankly, if you can sue me for it, I am telling you that I am not guaranteeing it; therefore, it is at your risk to follow or do anything that I write in this manual.