How to Become Anonymous, Secure and Free Online
By Amy Awol
5/5
()
About this ebook
Privacy and security are matters of great concern that are affecting internet users today. People are becoming more conscious that their private data and interactions are being hacked or monitored without their consent, as security breach hacks, government surveillance, and corporate platforms routinely collect data from billions of users, with or without their permission.
This book explains how internet users can become anonymous, secure, and free online. It gives free, practical methods and resources for anyone who wants to do this.
It is hoped people will become more aware and take action in order to protect their own privacy, security, and freedoms before they lose them. Otherwise, common citizens will give these up by default, without realizing that everyone should have the power and option to choose.
Amy Awol
I'm a data analyst who has shared and worked with hundreds of online users. The Internet offers tremendous opportunities for e-commerce, communications, and marketing. Knowing how to use computer applications effectively is critically important. Users who have experience and practice in these areas will gain competitive advantages. I also think personal privacy is very important, even on the Internet. We need to be more conscious of how we treat one another and other living creatures on this planet. We can always work to make the world a little better if we’re creative and proactive. So I enjoy sharing my knowledge and experience with others.
Related to How to Become Anonymous, Secure and Free Online
Related ebooks
Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5What is the Dark Web?: The truth about the hidden part of the internet Rating: 4 out of 5 stars4/5Ultimate guide for being anonymous: Avoiding prison time for fun and profit Rating: 4 out of 5 stars4/5How Not To Use Your Smartphone Rating: 5 out of 5 stars5/5The Darknet Superpack Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Deep Web Secrecy and Security: an inter-active guide to the Deep Web and beyond Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar: A Step by Step Process for Breaking into a BANK Rating: 5 out of 5 stars5/5How to Hack a Human: Cybersecurity for the Mind Rating: 0 out of 5 stars0 ratingsCybersecurity: The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Rating: 0 out of 5 stars0 ratingsDeep Web for Journalists: Comms, Counter-Surveillance, Search Rating: 5 out of 5 stars5/5Hacking into Hackers’ Head: A step towards creating CyberSecurity awareness Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Hacking for Beginners: Your Guide for Learning the Basics - Hacking and Kali Linux: Security and Hacking, #1 Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar: Hacking the Planet, #1 Rating: 5 out of 5 stars5/5Tor and the Deep Web Rating: 0 out of 5 stars0 ratingsHampering the Human Hacker and the Threat of Social Engineering Rating: 0 out of 5 stars0 ratingsDarknet Rating: 4 out of 5 stars4/5The dark behind the web: Dark Web, Deep Web, Fake News, Social Control, AI, Computer Viruses and Hacking Rating: 0 out of 5 stars0 ratingsCompsec: For the Home User Rating: 0 out of 5 stars0 ratingsProtect Your Personal Information Rating: 0 out of 5 stars0 ratingsBlind Spot: Smartphone and Computer Personal Security Guide Rating: 3 out of 5 stars3/5Zero to Hacking: Zero Series, #1 Rating: 0 out of 5 stars0 ratingsHacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Hack Proof Yourself!: The essential guide for securing your digital world Rating: 0 out of 5 stars0 ratingsThe Dark Web: The Unseen Side of the Internet Rating: 0 out of 5 stars0 ratings
Politics For You
The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government Rating: 5 out of 5 stars5/5The Republic by Plato Rating: 4 out of 5 stars4/5The Real Anthony Fauci: Bill Gates, Big Pharma, and the Global War on Democracy and Public Health Rating: 4 out of 5 stars4/5Nickel and Dimed: On (Not) Getting By in America Rating: 4 out of 5 stars4/5Gaza in Crisis: Reflections on the U.S.-Israeli War on the Palestinians Rating: 4 out of 5 stars4/5The Cult of Trump: A Leading Cult Expert Explains How the President Uses Mind Control Rating: 3 out of 5 stars3/5Son of Hamas: A Gripping Account of Terror, Betrayal, Political Intrigue, and Unthinkable Choices Rating: 4 out of 5 stars4/5The Madness of Crowds: Gender, Race and Identity Rating: 4 out of 5 stars4/5Capitalism and Freedom Rating: 4 out of 5 stars4/5How to Hide an Empire: A History of the Greater United States Rating: 4 out of 5 stars4/5On Palestine Rating: 4 out of 5 stars4/5Daily Stoic: A Daily Journal On Meditation, Stoicism, Wisdom and Philosophy to Improve Your Life Rating: 5 out of 5 stars5/5Freedom Is a Constant Struggle: Ferguson, Palestine, and the Foundations of a Movement Rating: 4 out of 5 stars4/5This Is How They Tell Me the World Ends: The Cyberweapons Arms Race Rating: 4 out of 5 stars4/5The Gulag Archipelago [Volume 1]: An Experiment in Literary Investigation Rating: 4 out of 5 stars4/5Ever Wonder Why?: and Other Controversial Essays Rating: 5 out of 5 stars5/5Fear: Trump in the White House Rating: 4 out of 5 stars4/5Killing the SS: The Hunt for the Worst War Criminals in History Rating: 4 out of 5 stars4/5The Great Reset: And the War for the World Rating: 4 out of 5 stars4/5Disloyal: A Memoir: The True Story of the Former Personal Attorney to President Donald J. Trump Rating: 4 out of 5 stars4/5The Girl with Seven Names: A North Korean Defector’s Story Rating: 4 out of 5 stars4/5The End of the Myth: From the Frontier to the Border Wall in the Mind of America Rating: 4 out of 5 stars4/5Why I’m No Longer Talking to White People About Race: The Sunday Times Bestseller Rating: 4 out of 5 stars4/5Hope in the Dark: Untold Histories, Wild Possibilities Rating: 4 out of 5 stars4/5The Essential Chomsky Rating: 4 out of 5 stars4/5Speechless: Controlling Words, Controlling Minds Rating: 4 out of 5 stars4/5
Reviews for How to Become Anonymous, Secure and Free Online
1 rating0 reviews
Book preview
How to Become Anonymous, Secure and Free Online - Amy Awol
How to Be Anonymous, Secure and Free Online
By Amy Awol
Copyright 2018 by Amy Awol
Commercial use of this book or its contents is prohibited. Private, educational, and non-commercial use is permitted for quoting short passages if credit attribution is given with the title, author, and publication information. Images provided are public domain or may be subject to Creative Commons copyrights and fair use policies. All other rights are reserved.
Smashwords Edition
Table of Contents
Dedication
Foreword
Chapter 1: Why We Need Anonymous Security
Chapter 2: General Options for Going Incognito
Chapter 3: Set up a Tor Anonymous Relay System
Chapter 4: Get a Secure, Encrypted Email Account
Chapter 5: Set up an Anonymous OS, Browser, and Applications Suite
Chapter 6: Use a Web Proxy or Virtual Private Network
Chapter 7: Use Free Online SMS Messaging and Virtual Phone Numbers
Chapter 8: Freedom, Privacy, and Accountability
Chapter 9: Share and Publish Anonymously
Chapter 10: The Debate about Anonymous Social Media
Chapter 11: Use Free Apps and Resources
Chapter 12: The Best Fit and Final Argument for Anonymity
Afterword
About the Author
Reference List for Links and Resources
Thanks for Reading
Dedication
This publication is for all Internet users who want to be safe, secure, and free.
Foreword
This book explores different uses of anonymity to protect online internet security and privacy under a wide variety of needs and circumstances for users. Most resources mentioned in relevant chapters are free. They’re also listed at the end of the book.
Since this book may be important to all common citizens, it is offered free of charge.
Chapter 1 - Why we Need Anonymous Security
Let’s face it, the Internet has revolutionized the lives of those who regularly use computers. We use computers almost without thinking, but there’s an underlying concern if we want to work and share with reasonable freedom and security. The Internet isn’t as innocent as it might first appear to be. What people take for granted in daily activities, doesn’t take into account certain dangers that might jeopardize their privacy, finances, or lives.
Most users aren’t aware they’re being tracked and followed by AI bots and algorithms, which register and record computer activities, locations, preferences, personal data, passwords, and finances. They may be tracked by the government, online companies, malicious users, or hackers who could act to hurt them. All of this happens without clear surface evidence to alert or help those who are attacked, nor is there any indication who might be doing this—friend or foe.
The inventors of Amazon, Apple, E-bay, Facebook, Intel, Google, Microsoft, and Twitter have created Artificial Intelligence Algorithms, which track human activities, resources, money, and time. Call it what you will, these AI algorithms have been designed to exploit human emotions with the best intentions, but often worse results, with a primary purpose for making huge quantities of money. Once the AI genie escapes the bottle, there’s no going back. We can’t count on it to go where it was intended to go, or do what it was supposed to because it isn’t conscious in the sense that people are. AI on corporate platform levels tends to operate autonomously and those who suffer consequences from this have little recourse unless they take measures to protect themselves. With money as the bottom line, legitimate businesses, governments, or criminals may get in on the action, often by using—or subverting—the same technologies that people suppose are helping them to do the things they want.
AI algorithms have equation routines and functions that lie beyond common user comprehension and control. People usually can’t see the proprietary software or formulas, and yet these have capabilities for invading our privacy and extracting information about our personal lives that we wouldn’t want to give to anyone else. Unfortunately, all of this has been aided and abetted by the government and military agencies, which most would assume are intended to protect us. Furthermore, these systems have weaknesses that are exploited by high tech criminals, who can potentially attack unsuspecting victims.
Hide if you can
Aeryon_Scout_In_Flight.jpg – Wikimedia Commons
Public Domain by Dkroetsch 2011
Not to be alarmist, but is this what we really want for our future?
Besides the intentional surveillance, our lives are being scrutinized in ways most people in the past could never imagine. This starts to get frightening. What you can’t see can hurt you if you do nothing to protect yourself. These nascent technologies have amassed huge data bases which compile information about billions of human beings. How secure is that data? Documented evidence from thousands of hacks and security failures show we cannot trust our personal data in the hands of government or corporate giants. Security breaches have repeatedly jeopardized personal information for hundreds of millions of people. These are data breaches that have been discovered and people already know. How much worse could this possibly be from what isn’t known?
Influence or control of global economics has worked insidiously to gradually siphon money from the general economy into the hands of the super-rich. One percent of the population now owns or controls more than 50 percent of the world’s resources. While this may not be immediately evident for people who have never control to resources to begin with, those in lower economic strata find it difficult to make decent living wages or improve their lives, because billions of financial and personal transactions are already automated and controlled by others through corporations with tremendous economic power. Artificial intelligence helps those who have power to stay in control.
While it seems reasonable when law-enforcement agencies collect information to capture the bad guys, some have used this as an excuse to monitor everyone. After all, we all have the potential for going rogue or breaking bad, don’t we? Although terrorist incidents are less likely to affect us than common accidents or domestic violence, security agencies around the globe have used this excuse to intervene and hack personal data from computer users, email messages, and phone calls. This makes wire-tapping (telephones) of the past seem like child’s play.
Although we were warned by authors and thinkers like George Orwell (in the novel 1984) about the dangers of a totalitarian surveillance society, it was once easy to argue that technologies didn’t really exist for scrutinizing the activities of millions of people—all at once. Not anymore. Now those technologies do exist and they’re being used to track and follow all of our activities. The fact people don’t see this, gives them a false sense of complacency and allows them to rationalize that the technologies being used are reasonably safe, but this isn’t the case. There’s a hidden Big Brother in AI technology that monitors many of the things we do.
DARPA image by USGov-Military, Public Domain
In our own brave new world, most people innocently trust technology to take care of them. A problem arises, however, when that trust is violated in order to extract the most personal details of our lives. Would corporations, governments, and thieves stoop to do this? You bet they would. We can see examples of this happening almost every day.
Is there anything we can do to protect ourselves?
The answer is yes, we can protect ourselves if we’re aware and convinced of the need to do this.
Since the Internet is an open communications platform between computers, it tends to reveal extensive data about its users. IP address information reveals specific identifiers for the computers being used in networks, Internet providers, and geographic locations. This is similar to a caller ID, except that many user platforms also mine more data about the users themselves than is supposedly needed for marketing purposes. Companies with millions of users collect huge quantities of information including bank account information, browser history, computer use, credit card information, email addresses, passwords, phone numbers and physical addresses, past purchases, contact lists, and user preferences. These companies (and also the Government) can track what you’re doing any time you’re online, and may (or do) monitor all other personal activities whenever they want to.
How you can protect yourself from these outrageous levels of scrutiny? Do you have to give up what you want and completely change your habits for computer use?
Let’s start by saying it’s useless for people to try to change the course of history, unless they become directly involved with making it. Computers are here with us to stay, but we can take advantage of their capabilities without putting ourselves at serious risk. First however, people need to admit that they are at serious risk without realizing it, simply by signing up and allowing massive social media exposure for the popular services they’re using. What are we talking about? People who sign up for email services, those who subscribe Facebook and Twitter, buyers who make purchases with Amazon or E-bay, and use Google searches for browsing online are exposing their personal lives and information in ways they cannot imagine. In short, that means nearly all of us are unwittingly revealing personal information and ignoring the potential consequences.
So, should we become technological Luddites and deny the convenience and luxury of using online services? Probably not. But that doesn’t mean we have to go into those services with our eyes wide shut. Being blind to the possible consequences of having personal data hacked isn’t the best way to go. People need to be aware they’re exposing themselves up front, and then decide whether it’s convenient to do something about it or not. Those who become aware often discover this too late, only after an attack occurs. Foreknowledge can help people to be prepared ahead of time.
This assumes, however, that people know about other alternatives for their online activities. It also assumes they’ll be mindful and conscious enough of their online computer interactions to take precautions when it’s necessary to use them.
How can people avoid this type of public and private scrutiny? Go incognito and become anonymous. In spite of the overt and open platform browsing habits most people use, it’s possible to browse anonymously without revealing computer IP and personal information.
This requires using a few different tools and changing certain internet computer use habits, but users will discover a completely new type of freedom for internet use—one which is unrestricted by personal exposure and all that’s implied by this.
What’s it like to be free from Big Brother looking over your shoulder? It can be incredibly liberating to feel you’re not constantly being watched. This doesn’t free a person to behave irresponsibly or illicitly. But it does give more freedom to say or do what you want, without unknown or unwanted scrutiny by inhuman algorithms, which are intended to exploit your emotional intelligence—and yes, these are configured to predict your eventual behavior in order to manipulate you.
Buy this, do that, post a like, react or respond in some way. Do you really want to be emotionally controlled by a machine? In today’s world,