📜 ⬆️ ⬇️

Fully anonymous blog

image
As an entertainment, as well as an exercise in security and anonymity in our time, the author of the blog Untraceable presented his blog, which he believes is absolutely anonymous - such that it is impossible to calculate the author of the blog.

So, how to create an anonymous blog.

Tails os


Tails OS - Linux OSes, specially sharpened under anonymity. All network activity goes through the Tor network. The OS has an encrypted partition, on which it is convenient to store the bitcoin wallet, passwords and blog source code, and runs from a USB flash drive.

For reliability, you can make a USB backup on a desktop computer in an encrypted hidden TrueCrypt partition. And set it up so that when you enter a fake password, another section will open in which you can put something convincing - a passport scan, for example.
')

E-mail


For mail, we use a free box on outlook.com, and to confirm registration - an anonymous one-time box at https://hidemyass.com

Blog


The blog is generated in static pages using Octopress , and the pages are uploaded to GitHub via SSH (the key is also stored on USB).

Domain


We buy for Bitcoins from IT Itch , and configure DNS to point to a page on GitHub.

Bitcoins


To buy a domain for Bitcoins - you must first take them somewhere. For this, the localbitcoins.com service is suitable , including where you can buy bitcoins for cash. You are looking for sellers in your city on this service, make an appointment, meet, give cash, and get bitcoin (say, the seller conducts a transaction from the phone). I checked - there are already several people in Moscow. Account on the site, of course, also we get through Tor.

How now to find the author of the blog


Dictionary analysis

There are methods for analyzing used words, with the help of which you can find similar texts in style. The easiest way to avoid this is using Google Translate to translate the original text into a language, then back, and clean up the result. If you get even more confused, you can order a human translation with Bitcoin payment.

Post time analysis

The time of appearance of records can be compared with the activity of a person; however, this is also quite easy to avoid by changing the routine.

Hacking tor

Perhaps, but time consuming. To make hacking difficult, you can connect one or more VPN servers leased for bitcoin from providers that do not require documents.

Bitcoin transactions

The transactions themselves are available, but it is rather difficult to compare the transaction with a real person. Especially when buying them for cash. You can, of course, run into an FSB / FBI agent.

Total


After all these tricks, really tracking the author of the blog looks like a rather difficult task.

Source: https://habr.com/ru/post/210636/


All Articles