
As an entertainment, as well as an exercise in security and anonymity in our time, the author of the blog
Untraceable presented his blog, which he believes is absolutely anonymous - such that it is impossible to calculate the author of the blog.
So, how to create an anonymous blog.
Tails os
Tails OS - Linux OSes, specially sharpened under anonymity. All network activity goes through the Tor network. The OS has an encrypted partition, on which it is convenient to store the bitcoin wallet, passwords and blog source code, and runs from a USB flash drive.
For reliability, you can make a USB backup on a desktop computer in an encrypted hidden TrueCrypt partition. And set it up so that when you enter a fake password, another section will open in which you can put something convincing - a passport scan, for example.
')
E-mail
For mail, we use a free box on outlook.com, and to confirm registration - an anonymous one-time box at
https://hidemyass.comBlog
The blog is generated in static pages using
Octopress , and the pages are uploaded to GitHub via SSH (the key is also stored on USB).
Domain
We buy for Bitcoins from
IT Itch , and configure DNS to point to a page on GitHub.
Bitcoins
To buy a domain for Bitcoins - you must first take them somewhere. For this, the
localbitcoins.com service is
suitable , including where you can buy bitcoins for cash. You are looking for sellers in your city on this service, make an appointment, meet, give cash, and get bitcoin (say, the seller conducts a transaction from the phone). I checked - there are already several people in Moscow. Account on the site, of course, also we get through Tor.
How now to find the author of the blog
Dictionary analysis
There are methods for analyzing used words, with the help of which you can find similar texts in style. The easiest way to avoid this is using Google Translate to translate the original text into a language, then back, and clean up the result. If you get even more confused, you can order a human translation with Bitcoin payment.
Post time analysis
The time of appearance of records can be compared with the activity of a person; however, this is also quite easy to avoid by changing the routine.
Hacking tor
Perhaps, but time consuming. To make hacking difficult, you can connect one or more VPN servers leased for bitcoin from providers that do not require documents.
Bitcoin transactions
The transactions themselves are available, but it is rather difficult to compare the transaction with a real person. Especially when buying them for cash. You can, of course, run into an FSB / FBI agent.
Total
After all these tricks, really tracking the author of the blog looks like a rather difficult task.