A lot of you are going to ask, why is Tor unsafe? So let me explain to you why this is the case and give you a few articles to read so you can have a better understanding of how and why.
- 06/13/11 (Document)
- 07/31/15 (Article)
- 07/28/15 (Article)
- 07/29/15 (Article)
- 09/03/13 (Article)
- 08/05/13 (Article)
- 06/01/12 (Document)
So where do I start? A good question and one that should be asked. The first place to start is always going to be your router. Why? Your router is what connects you to the internet and that's exactly what we're aiming to protect.
Your ISP's job is to not only provide you with internet access but also monitor that internet access. Your job is to make their job impossible because your privacy is important weather you'd like to think so or not.
So you may not know it but by default your router comes with it's own stock firmware provided by your ISP. This firmware is proprietary. Usually your ISP will set it up to use their own DNS.
The reason you don't want this is because it's impossible for you to know what the firmware is doing in the background since the source code is private and can only by audited by the copyright holder.
So what you'll want to do is install third party open source firmware such as OpenWrt. To check to make sure your router is supported, you'll need to visit their supported devices page.
After you've installed the new firmware to the router we'll need make sure that we purchase a computer with all the same values we'd like to protect. There's a couple providers out there but we're going to go with Purism.
Once you've purchased one of their laptops, we'll move onto the next step which is our OS. For our operating system we'll be using one called Tails which is provided by the Tor Project as well as a myriad of other companies like the FSF.
To set up our Tails operating system we'll be installing it to a thumb drive. Lucky for you they have put together a great little guide on their website.
Usually I always recommend to take a look at the documentation on the website for the service you're going to be using because you'll learn a lot by doing so and it's definitely worth the time.
Now before continuing with the use of Tails, we'll need to make sure we finish setting up our router because we're not done yet.
To do this, we'll need to look for a VPN who's provider will provide us with the protections we need to protect our values. We'll also need to make sure their policies match up with the technologies they use.
When making your purchase, you'll need to make sure the technologies below are supported. And we'll need to make sure our payment is done anonymously by using a cash payment.
I've gone ahead and done you the favor of picking out a few providers who offer the protections you'll need if you're going to set up the private and anonymous connection which you require. All of which are listed below.
To set either of them up, you can follow the documentation on both of their websites for either DD-WRT or Tomato.
One more thing we'll need to do before continuing is to set up a few third party DNS by using the public servers provided by OpenNIC. Again I recommend doing your research, don't just trust my word for it.
And just to be extra paranoid about it because we're insane, why not add in a few more routers as well as a Tor router and add them all together? To make a Tor router visit the guide provided by Adafruit.
Keep in mind the more VPN routers you chain together, the slower your connection will be so make sure that you pay for the fastest internet available to give you lot's of leeway. And try to only use Tri-Band routers.
After you've setup the VPN on your routers and combined them together we can move on to configuring Tails to use I2P. You can follow the guide which they have created on their website.
Once you've done this you're ready to finally boot into Tails. As long as your router is configured to connect through your VPN, you're ready.
Now finally, you'll probably want to set up a secure bitcoin wallet so I recommend picking up a cold storage device. One I highly recommend is a Bitcoin Trezor.
As for a password manager to secure your passwords when creating online accounts for hidden services or clear sites. I recommend trying out either Master Password or Encryptr.
All of the steps in this guide if done properly will give you a completely transparent internet connection which will prove to be impossible to trace. I wish you the best of luck and I hope you evade the law at all costs.
And for any other alternatives programs you might want to install, I recommend checking out the list of applications I've done you the honor of laying out below. All of the alternatives are completely free and open source.
~ Written by Valoryc.
If you liked the guide, please be sure to give it a thumbs up and if you'd like to download the guide, click here.
Update v.1: https://mega.nz/#!ZsYQACiQ!u5oCPS0zCi-qx_yu-UKEqYKIsu5mnD2uhHWTy_RtT88
Update v.2:
https://mega.nz/#!osBwgBrR!h8jiwLiNG2dVolDSSM6o5kdCbuW1pzCGaEVVmo6Sjjc
Very good read, found some new usefull info. I would also suggest you to invest time into researching about libreboot that will save you from hardware exploits, it works perfectly fine on x200 thinkpad, but that might be too deep for almost everyone.