Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

Question

online privacy

Jan 5, 2015 8:05AM PST

Helllo,
The question of privacy & protection from rogue sources identifying ones location and identity on social media has arisen lately.
This may sound unusual but owing to the extreme nature of the political issues involved, it has been discussed and asserted that certain radical elements using these media are in the habit of collating user details for the unthinkable purpose of targeting agitators of opposing beliefs.
I am reasonably sure there is substance to such suggestions from my regular daily experiences in those situations.
What I would very much like to know is, is TOR a secure and safe way to totally hide ones on-line identity to the extent that would prevent ISP, Social Media or perhaps Police pinpointing who and where one is?
Or, is it necessary to pay to use a VPN like Avast or Hidemyass.com ? if indeed they are adequate tools for the job ?
Unusual question I know.
Many thanks indeed,

Discussion is locked

- Collapse -
Answer
I think TOR is great but VPN? Too many scams.
Jan 5, 2015 8:23AM PST

If you TOR I can't see why you would VPN. In fact there are articles about VPN honeypots. So why go near those?

Just TOR, thank you.

And to see something unsettling, run NAMEBENCH.
Bob

- Collapse -
honeypots?
Jan 5, 2015 8:33AM PST

Ok thank you I didn't realise the pros & cons at all, not having used either before.
I have however, downloaded TOR before but never actually used it as I found the jargon very involved and seeminly over technical to use it to its best advantage.
I will download again and persevere.
I only mention VPN (hidemyass) as it was recommended to me on Twitter and noticed that Avast try to push you into buying theirs.
Never heard of NAMEBENCH but will Google.
Will update when achieved.
Thank you

- Collapse -
Honeypot talk.
Jan 5, 2015 10:18AM PST
- Collapse -
Answer
No Such Things As "Totally Hide"...
Jan 5, 2015 8:27AM PST

If someone wants to find you, they will. How do you think the best crackers/hackers in the world are still caught and prosecuted? Everyone leaves tracks. Basically, if you don't want to be found, don't use a cell phone or use the internet.

Although not related to an "online identitiy, here's just an example: The other day, one of the Christmas cards I sent to friends and family came back as undeliverable. A quick search using Google found the person's new home address, phone number, & email address.. One of the documents that popped up during the search was the voting registration for the state they lived in.. Nothing nefarious done in the search.

Hope this helps.

Grif

- Collapse -
thanks Grif
Jan 5, 2015 8:50AM PST

yes, I know what you mean, just from a couple of trivial details on social media, I was able to "roughly" locate someone in America just using the free online people searches and YouTube. Again, nothing nefarious Happy
I have been using Twitter for a long time and probably got myself in some potentially dangerous conversations over time. It's an unpleasant thought to live with but I don't really want to stop using the media.
Tomorrow will be Tor and namebench day Happy
At least if its free it doesn't hurt to try.
All the best
Thanks

- Collapse -
Tor & Namebench usage
Jan 6, 2015 7:25AM PST

the results page from namebench, does the list produced directly relate to internet usage and own activity history or is it unrelated?

There was a lot of data but interpreting it into something understandable & useful is another thing.

If while (before, during or after) using Tor for social networks or whatever, one uses normal browsers on the same laptop for unrelated normal browsing activity on-line, does that in any way compromise the security offered during activity you wish to keep private?

On tablets & smart-phones, apart from being stuck with using the relevant app, it would seem impossible to use Tor which kind of makes the idea impractical as mobiles are so practical for social media. Presumably if you are using a smart-phone or tablet on home wi-fi there is no protection from Tor on your laptop, obviously.

My preferred item of use is the Android Nexus 10" tablet but the smart-phone is more portable.

Is there a way round the obstacle of not having Tor use on these please ?

I have successfully used Tor via the laptop at least.

Thanks

- Collapse -
But what are "these"?
Jan 6, 2015 8:03AM PST

The tablet could be some Android, iOS, Windows or other OS. The phones have a handful of OSes as well.

For example our Asus T100 is a tablet and TORs just fine.
Bob

- Collapse -
I hope you will understand Bob
Jan 6, 2015 8:41AM PST

that even reasonably competent (domestic usage) people like me sometimes need an idiots guide when dealing with unfamiliar issues.

"The tablet could be some Android, iOS, Windows or other OS. The phones have a handful of OSes as well."

The information you've given means something to you but it is insufficient for me to grasp exactly what you mean.

"these" refer to the two items I mentioned, 1) Nexus & 2) Smart-phone (Samsung Galaxy S3)

Both of them have typical Android OS ... the tablet is 5.0.1 .... the phone is 4.3 ... definitely not Windows.

Are you advocating using a different OS on these please ? I tried to open Tor on the phone but it wouldn't have it. Haven't tried the tablet yet but as it is similar OS I doubt it will work. Will try tomorrow.

I imagine it may be unfair to expect you to know all these issues and I realise it is less than a critical matter on the face of it but if you can clarify, all well and good.

Thank you.

- Collapse -
Actually it is fair.
Jan 6, 2015 8:54AM PST

My background is in circuit design, embedded software, apps for many platforms. But here's the big thing.

If I answered how to do such on each platform without being generic like "Use TOR" each platform may require a discussion on its own.

On the flip side you must know what you have to get proper help. And you will no longer be an average user.

In parting, isn't using social media the exact opposite idea when surfing anonymously? You might be posting messages to folk you know along with pictures. You could be secure on TOR but then showed who you were on Facebook. That doesn't make sense.
Bob

- Collapse -
PS. I gotta ask.
Jan 6, 2015 8:58AM PST
- Collapse -
I'm very pleased you asked
Jan 6, 2015 10:12PM PST

as I am confident that the majority of people not involved in such activity will not have the first clue that the following problem exists. I had better refrain from taking sides here but the "establishment" is currently (always has been) using extremely dirty tactics to woo voters in their direction. Sometimes very subtle, others very blunt and blatant but they will do "anything" to keep their seats and stay in power, even, to the extent of steering the country on a one way course to suicidal ruin, literally.

For example, is the average TV viewer & Newspaper reader sufficiently aware that, particularly in the case of TV, such things as news broadcasts are clinically doctored and choreographed to portray the news in the light that their particular company and/or financial backers wish them to.

The most obvious illustration of that is the BBC, who from a brainwashed liberals viewpoint, are impartial and fair but in any intelligent observation, are utterly and divisively biased because the EU pays them millions every year so why would they want to promote any anti-EU cause. The same goes very much for ITV & Channel4. I used to enjoy watching news broadcasts before I realised how unashamedly biased they are.

There is an unprecedented dirty fight going on now until May Elections during which you can expect anything and everything. There are factions within UK who want a certain party to win which will offer them the best chances of success for their destructive aims. Effectively though, any of the existing well known three will be equally as bad as the other in that sense.

Anyone at all interested in that topic, I would urge to get involved on Twitter and learn more about the multi-faceted reasons why it is vital that every voter must be more aware of the devious tactics employed by Government to paint a deceptively obtuse picture of things for their own ends. A classic example of that being the reports that the elderly are responsible for the NHS crisis. I have NEVER in my life heard such a wicked distortion of the truth and I've heard a few.

Owing to the nature of the political activity on Twitter whereby one is not obliged to use personal information (random usernames etc) to identify oneself but at the same time, often posting information that is highly inflammatory to others of opposing views, it is widely accepted and recognised that sadly, there are vicious minded people out there who are actually in the business of identifying agitators of opposing views for later reprisals. Sounds extreme but it is widely accepted/suspected.

Not a pleasant thought but unfortunately a very real and present danger. I expect you can guess the type of people I'm referring to by the nature of the activity I mention. It is well known that tracking I.P. addresses and infiltration of ISP data by staff sympathetic to such nefarious causes is a worrying possibility. Hence the ideal of wanting anonymity.

I have spoken to others on Twitter who recommend www.hidemyass.com but then you made it clear on here that Tor & Tails is much preferable...........?

What are honeypots in relation to VPN's anyway ?

I should apologise for abusing this thread and deviating from the topic but it seems relevant.

Thanks for your patience Bob.

- Collapse -
have only just
Jan 6, 2015 10:15PM PST

seen the detail via this link, I haven't tried yet but it looks hopeful thank you.

- Collapse -
I will always do
Jan 6, 2015 10:18PM PST

the research if I understand what is required.
cheers Bob

- Collapse -
(NT) I don't use FB, only Twitter anonymously
Jan 6, 2015 10:14PM PST
- Collapse -
Answer
what are you looking for?
Jan 6, 2015 9:48AM PST

a way to be completely anonymous?

- Collapse -
that's about the size of it ideally
Jan 6, 2015 10:10PM PST

I'm very pleased you asked as I am confident that the majority of people not involved in such activity will not have the first clue that the following problem exists. I had better refrain from taking sides here but the "establishment" is currently (always has been) using extremely dirty tactics to woo voters in their direction. Sometimes very subtle, others very blunt and blatant but they will do "anything" to keep their seats and stay in power, even, to the extent of steering the country on a one way course to suicidal ruin, literally.

For example, is the average TV viewer & Newspaper reader sufficiently aware that, particularly in the case of TV, such things as news broadcasts are clinically doctored and choreographed to portray the news in the light that their particular company and/or financial backers wish them to.

The most obvious illustration of that is the BBC, who from a brainwashed liberals viewpoint, are impartial and fair but in any intelligent observation, are utterly and divisively biased because the EU pays them millions every year so why would they want to promote any anti-EU cause. The same goes very much for ITV & Channel4. I used to enjoy watching news broadcasts before I realised how unashamedly biased they are.

There is an unprecedented dirty fight going on now until May Elections during which you can expect anything and everything. There are factions within UK who want a certain party to win which will offer them the best chances of success for their destructive aims. Effectively though, any of the existing well known three will be equally as bad as the other in that sense.

Anyone at all interested in that topic, I would urge to get involved on Twitter and learn more about the multi-faceted reasons why it is vital that every voter must be more aware of the devious tactics employed by Government to paint a deceptively obtuse picture of things for their own ends. A classic example of that being the reports that the elderly are responsible for the NHS crisis. I have NEVER in my life heard such a wicked distortion of the truth and I've heard a few.

Owing to the nature of the political activity on Twitter whereby one is not obliged to use personal information (random usernames etc) to identify oneself but at the same time, often posting information that is highly inflammatory to others of opposing views, it is widely accepted and recognised that sadly, there are vicious minded people out there who are actually in the business of identifying agitators of opposing views for later reprisals. Sounds extreme but it is widely accepted/suspected.

Not a pleasant thought but unfortunately a very real and present danger. I expect you can guess the type of people I'm referring to by the nature of the activity I mention. It is well known that tracking I.P. addresses and infiltration of ISP data by staff sympathetic to such nefarious causes is a worrying possibility. Hence the ideal of wanting anonymity. I have spoken to others on Twitter who recommend www.hidemyass.com but then Bob has made it clear on here that Tor & Tails is much preferable...........?

What are honeypots in relation to VPN's anyway ?

I should apologise for abusing this thread and deviating from the topic but it seems relevant.

Thanks for your patience James.

- Collapse -
One way
Jan 7, 2015 6:10AM PST

zip up files you want, then run it through truecrypt and password protect it. You can email such files and the person on the other end knowing the same password (sent by post perhaps or told in person) or using same passfile, can open it using truecrypt on their side. Of course that leaves the to and from addresses.

Total anonymity would require war driving to find open internet access at hotels, McDonalds, private residences, etc and booting from a Linux LIVE DVD, connect through it. Register new webmail addresses, and send encrypted email or truecrypted files. The greater the fear, the more that can be done, such as using proxies, have disposable wireless fobs, yagi antenna so not too near the wifi access signal. (no sense having an outside camera recording car tab number). Most of it is just going through the steps and figuring how to hide or coverup each one.

- Collapse -
It's not so much
Jan 7, 2015 8:56AM PST

sending files as just being anonymous and untraceable on-line.

I will have to investigate the options you've suggested as some I have never heard of but
a massive thank you for all that info.

Will report when I can,

ATB.