How To Remain Completely Anonymous and Hidden Online
How To Remain Completely Anonymous and Hidden Online
How To Remain Completely Anonymous and Hidden Online
Being anonymous has its benefits. Certain freedoms come with being
unrecognizable and untraceable. It also requires sacrifice. Many of the
conveniences of the modern web were built around profiling, tracking,
and analyzing user behavior.
Bearing that in mind, these are the steps you can take and the tools
you’ll need to stay anonymous and hidden online.
Tor
No anonymity checklist would be complete without Tor. This network of
volunteer nodes around the world is synonymous with anonymity. Tor,
short for “the onion router”, allows you to encrypt your internet traffic
and, each time you connect to a web server, route that traffic through a
random array of nodes before heading to the final destination.
Tor does have a few downsides. For one, it’s slow. Tor isn’t suitable for
streaming video or torrenting files. You can browse the web and that’s
pretty much it due to the lack of volunteer resources and competing
traffic from other users.
For this reason, we advise Tor users to use an obfuscation tool like
Obfsproxy, turn on a VPN when using Tor, or both. Obfsproxy is a Tor
project that makes encrypted Tor traffic look like normal un-encrypted
traffic so that it doesn’t draw undue attention. More on VPNs further
down.
Live OS
You could disable all of those settings and uninstall all of your
applications, but that’s not very practical. Instead, we recommend a live
operating system. Live operating systems can be installed on USB
drives or DVDs. By tweaking a few settings in your computer’s
bootloader, you can launch an entirely independent operating system
from a thumb drive on your everyday laptop.
Tails is the official live OS from the Tor Project. All internet traffic–not
just web browsing–goes through the Tor Network. The OS leaves no
trace on your computer and all instant messages, emails, and files are
encrypted. It’s simple to use and is designed to be idiot proof.
VPNs are built for privacy and not anonymity, however, so we caution
against using them alone if you want to truly remain hidden. Privacy and
anonymity often go hand in hand, but remember this important
distinction: anonymity means no one can identify you, but privacy implies
no can see what you’re doing.
Using a VPN requires a certain degree of trust in your VPN provider and
the entities that host their servers. Very few VPN providers own their
own physical server infrastructure. Your traffic is encrypted on your local
device and remains encrypted until it arrives at the VPN server. It is then
decrypted before being sent onto its destination. For a brief moment,
your activity is visible to the VPN provider.
But it’s not so simple as that. Some VPN providers claim to be logless
but in reality they still store metadata. Depending on how anonymous
you want to be, this is a nuance to be wary of. Metadata doesn’t contain
any information about the contents of your traffic, but it can include
details such as when you used the VPN, for how long, how much data
was transferred, and even your original IP address. Always skim through
a VPN provider’s privacy policy for devilish details like these.
Even the few true zero-logs VPNs out there require customers to trust
them. There’s no way of knowing whether they are being honest and
how they will react when faced with a government subpoena. For the
highest level of anonymity, then, try combining your VPN with Tor. Avoid
VPNs based in the United States and Europe, where data retention laws
and government intelligence agencies could put your data at risk.
Simply running Tor Browser while connected to the VPN makes tracing
the user twice as difficult. VPNs can also be configured manually in live
operating systems like Tails.
Logless DNS
When a URL is entered into a browser, a request is sent to a DNS server
to lookup the IP address that matches the URL. Even when using a
proxy like a VPN, these DNS requests can be sent outside the encrypted
tunnel to the default server. By default, DNS requests usually go to and
are recorded by a nearby server operated by the user’s ISP.
If this happens when using a VPN, it’s called a DNS leak. Many VPN
providers offer DNS leak protection, which ensures that all internet
traffic, including DNS requests, are directed through the VPN. These
VPNs typically operate their own DNS servers, which won’t record which
websites you visit if they meet the logless criteria outlined above.
Even if a VPN advertises DNS leak protection, that statement often only
applies to IPv4 DNS leaks. IPV6 DNS requests can still travel on the
default network and be picked up by both web servers and ISPs. It would
be great if more VPNs would set up IPv6 DNS servers to handle this
situation, but at the moment the best solution is simply to disable IPv6 in
the device’s internet settings. This tool checks for IPv6 and IPv4 DNS
leaks.
If the VPN you use lacks DNS leak protection, or you aren’t using a VPN
at all, try opting for a public no-logs DNS server. You can change your
device’s DNS settings so that requests aren’t sent through your ISP. We
recommend DNS.WATCH or OpenNIC.
Burner emails
It goes without saying that remaining anonymous online means not
logging into any of your existing accounts. But since many apps and
websites require users to sign up, you’ll need an email address or two.
Several services offer free fake and burner email accounts. For one-off
registrations and messages, we recommend Guerilla Mail. No
registration is required and it includes a password manager to help
remember the passwords associated with those accounts.
For a more long-term untraceable email account, the best option is
probably ProtonMail. This end-to-end encrypted service is open-source
and uses zero-knowledge apps for web and mobile. Unfortunately, new
users must apply for an invite due to limited server capacity. ProtonMail
is donation-based.
Never use your own email account when trying to be anonymous. Don’t
even read your email or log into the account. If you want to send
encrypted email from a burner account, you’ll have to set up new PGP or
S/MIME keys.
Cryptocurrencies
If you want to make an anonymous purchase or donation,
cryptocurrencies are superior to PayPal and obviously credit cards. That
doesn’t mean that you can just open up a Bitcoin wallet with a big
exchange like Coinbase and start spending, though.
To get around this, use wallets that change your bitcoin address after
each transaction. This makes you harder to trace. Use a bitcoin mixing
service, which pools your bitcoins with other people’s and mixes them up
before making a payment to the receiver.
Perhaps the most difficult part is anonymously buying bitcoins in the first
place, as doing so requires fiat currency. Private deals and peer-to-peer
exchanges like LocalBitcoins are not for the careless, but they are the
best means of anonymously getting your hands on coins.
Remember that Bitcoin isn’t the only player in town, although it is the
biggest. Litecoin, DarkCoin, and Dogecoin are popular as well.
Search engines
Google keeps track of every search query and link you click on. If you’re
using Tor, this doesn’t matter so much, but it’s still a good idea to opt for
an alternative.
File transfers
The moment might arise when you need to anonymously send a file
that’s too big for an email attachment. If you’re a whistleblower who
wants to leak a large trove of damning documents to the public,
uploading the files to Dropbox just won’t do.
Remember to access the site using Tor and share the links using a
burner email or some other anonymous method, as the website might
well be gathering information on site visitors despite the fact that
registration isn’t required.
If you want to test how well your browser protects you from tracking,
head over to the Panopticlick website. This tool made by the Electronic
Frontier Foundation (EFF) can show you in excruciating detail how an ad
agency can identify your browser using a unique fingerprint.
Encrypted communications
Besides email, you’ll also want to cover your tracks when sending
messages and making calls. Encryption is more focused on privacy than
anonymity; even if a message is encrypted, a snoop still knows who the
sender and receiver is. But if you’re going through the trouble of being
anonymous, you might as well take every precaution.
Encrypted backup
Even anons need to back up and store large files, and sometimes allow
other people to access them. Stay away from Google Drive and
Dropbox, as these contain no real privacy protections such as encryption
and aren’t anonymous at any rate.
You can learn more about how to take all of these steps and more in
our guide on securing wireless routers.
Make a checklist
No anonymity tool, even Tor, is perfect. But that doesn’t mean they
aren’t effective. While a well-funded corporation or government agency
could spend huge amounts of time and money running traffic analysis on
the Tor network to eventually find the person they are looking for, it’s
much more likely that person will make a mistake and drop a clue
somewhere along the way.
So how do you avoid making mistakes? The same way surgeons and
other high-risk occupations do: with lists. Every time you want to be
anonymous online, start from the beginning of your checklist. Write it
down on a piece of paper, but don’t include any login credentials or other
identifying information. Here’s what one might look like based on
everything discussed: