Anonymous Blogger Tools

Anonymous Blogging Tools

The debate on the anonymity of bloggers allows us to translate this post from the Electronic Frontier Foundation, which reminds how to maintain a degree of anonymity and protect its business.

Under the bill proposed by Senator Masson reflected both a lack of knowledge of the Internet, causing a fear and a desire underlying environmental control beyond policy not mastered long ago. Whatever may be said, anonymity on the Internet is of crucial importance. Here are some tips for blogging without being discovered or found, or worried.

Blogs are a mixture of private telephone conversations and newspapers. This is the perfect tool to share your favorite recipe for chocolate mousse with friends – or to support the foundations of democracy by informing the public that a member of the government has been corrupted by your boss.

If you blog, it is not guaranteed that you will attract thousands of readers. But at least some readers will find your blog, and they could be the ones you want or expect it unless they read you. This includes your employer (current or potential), your colleagues, your neighbors, your spouse (s), your family, or anyone who types your name or email address into a search engine and click on two or three links.

The idea is that eventually, anyone can find your blog if your identity “real” is linked in one way or another. And there may be consequences. Members of your family may be shocked or disturbed by reading. A potential employer will think maybe twice before you hire. But these concerns should not stop you from writing. Instead, they must convince you to secure it, or make it available only to a few trusted people.

We offer here a few precautions to help you control your privacy, so that you can express yourself without fear of reprisal. If you follow them properly, these protections can save you a lot of trouble, or a simple embarrassment to your friends or colleagues.

The best way to blog and keep some privacy is to be anonymous. But being anonymous is not as simple as you think.

Say you want to start a blog about your horrible work environment, without taking the risk that your boss or colleagues discover what you tell them. You will need to consider how to anonymize every possible detail about you. And you should also use some tools that make tracking your blog to your real identity more complicated.

1 – Use a nickname and do not give details that can identify you

When you write about your workplace, be sure not to retail talking. This includes things like your location, how many employees do your company and its industry. Same general details can reveal a lot. If, for example, you write, “I work in a Seattle weekly that I will not name,” it is clear that you need to work in one or two places available. Be smart. Instead, you can say that you work in a media company in a small town.

 

Obviously, do not use real names and do not post pictures of yourself. And do not use pseudonyms which resemble your real name. Do not replace Annalee by Leanne, for example. And remember that any type of personal information may reveal your identity. You might be the only one in your business to be born on such a day, or with a red cat.

Also, if you do not want your colleagues fall on your blog, not blogging during work hours. You may have problems for using the resources of your business, such as the Internet, and it will be difficult to prove that you write your blog as part of your work. It will also be very difficult to hide your blogging activity to your colleagues and employees of the department who observe traffic from the intranet under the microscope.

2 – Use anonymization techniques

There are a large number of technical solutions for the blogger who wishes to remain anonymous.

If you worry that your host logs your IP address and can go back to the computer from which you blog, you can use the Tor network for blogging. Tor redirects your Internet traffic through what he calls an “overlay network” that hides your IP address. More importantly, Tor makes it more difficult for Internet snoops to follow the path of your data and traced back to you.

Since the publication of this note, several new technologies have emerged. Here are a few:

> You can use anonymous email account providers.

> Prefer blogging platforms that do not require personal information (Blogger), or host your own blog using WordPress for example if possible.

> Use proxy to secure your Internet connection, this tool example.

3 – Use ping services

If you want to protect your privacy while making visible and accessible information that you post, try to use ping services to distribute your content for you.

The program is responsible for sending a notification (a “ping”) about your publications with search engines like Technorati and Wikio. Once these sites list your entries, which usually take a few minutes, you can remove your rating. Then, the news can spread quickly and its source disappears, all in less than half an hour. This protects the blogger while allowing it to reach a certain audience.

4 – Limit your audience

Many blogging services allow you to restrict access to specific tickets – or at your blog – only those with a password, or authorized. If the purpose of your blog is to communicate with your family or friends, and you want to avoid collateral damage to your privacy, consider using these features. If you host your own blog, you can also password protect, or configure it not to be visible from some specific computers.

5 – Prevent Google to find you

If you want to prevent major search engines like Google to include your blog in their search results, you can create a special file that tells it to ignore these services your site. This file is called robots.txt. You can also use it to prevent search engines to access certain parts of your blog only. If you do not know how to do this yourself, you can use a free generator on the Internet. However, we must remember that the search engines may choose to ignore a robots.txt file, making your blog easily searchable. There are many tricks to make your blog less easily found, without a robots.txt.

6 – Register your domain name anonymously

Even if you do not give any names or personal information on your blog, people can look at the WHOIS for your domain name, and discover who you are. If you do not want this to happen, you can register your domain name anonymously.

Scandinavia is found probably one of the safest solutions. If you want to host your blog in a safe place, protected by the Swedish constitution (very protective), you can contact PRQ, a Swedish specialist host in sensitive hosting.

Blogging Fearless

Browse Anonymously

A pack of bloggers recently discovered that the hard work could lead to unemployment. According to estimates, dozens of people have been transferred for blogged, and the number is increasing day by day.

The bad news is that in many cases there is no legal means to fight against such dismissals. Even if your freedom of expression is protected, this protection does not exempt you from the consequences of what you say.

One way to ensure that you will not receive any comments as your blog a letter of dismissal is to make sure that you write in frames protected by law.

1 – Political views

Theoretically the Constitution prevents an employer to fire you on the grounds of political opinion. If you mention your blog and your membership in the PCF that your boss fire you for that, you can consider quite a trial.

2 – Unions

Similarly, freedom of association is extremely well protected. You can blog about it so nearly secured. If you belong to a union, it is even possible that your contract provides for the possibility of blogging.

3- Whistleblower

Generally, laws protect those who disclose vital information. Someone who discloses activities harmful to the society of his employer is protected, for example. However, many people mistakenly think that if they report violations or illegal activities of their employer on their blog, they are automatically protected. This is not the case. You must first bring these problems to the attention of legal authorities concerned. You can also complain to your supervisor in your company. But first inform the competent authority, for example, your employer rejects toxic sludge into the groundwater, and blogging.

4 – If you work in the administration

If you are a civil servant, blogging about what happens is protected by freedom of expression. In addition, it is in the public interest to know how taxes are used. Obviously, do not post confidential or classified information.

5- Extra legal professional activities

In general, the law protects the blogging about professional activities, as long as the employer does not a priori limit to such activities. However, the law remains poor compared to blogging.

Blog without getting fired

The blog is now central on the Internet. You cannot be sure that nobody will ever know that you blog. RSS and other new features make aggregative referencing your blog even more frequent, easy and difficult to control. But as long as you blog anonymously and carefully, what you say online is unlikely to cause you harm in your life offline.

IP address down masks!

Ip Address down masks

Anonymity can there on the internet? Be warned, a surfer who surfs on the internet is no guarantee that anonymity be preserved. It is even the opposite. The tracking of personal data is the number one issue of Web 2.0.

Post a review on Amazon, upload videos on YouTube, place photos on Flickr, and write a status on Facebook, there are many examples. All these sites are many possibilities to scan, store and analyze traces the user leaves on the canvas.

Thus, on the web, the data are collected systematically and without the user’s knowledge. There are many methods used (IP address, cookies, Web bugs …). CNIL [1] has also implemented an application that allows very didactic understand that direct supervision is to our knowledge on the net: Your traces on the Internet: it is not a virtual surfing.

IP address!

When the user browses the Internet, a connection is established between your computer and remote servers that host the web pages they visit. This communication is done through an internet protocol that uses IP addresses (see box in block diagram).

Thus, when a user surfs, its IP address is accessible to all the sites they visit. IP very interesting, since it allows collecting precise information about the visitor: date and time of connection, location, provider (ISP), cookies accepted or not, screen resolution and operating system. The web browser meanwhile, also leverages this address since it allows to list the sites the user has visited and therefore to analyze history in order to infer their interests.

The IP address can also be found in the source code of each email sent.

You thought forward masked through anonymous connections or false identities? Yet you have left indelible marks.

The discretion to compensate for the lack of anonymity

The anonymity seems illusory. However there are ways to be discreet on the net.

Proxy and VPN

Proxy and VPN [2] are two technologies that hide the IP address of the user to allow him to surf “anonymously.” Both systems allow the connection to pass on a staging server. Thus, this is the IP address of the server, and not that of the user, which is scattered across the web.

A proxy is configured within the application used to connect to the internet. Simply enter the proxy address in the web browser. Several caveats to the use of a proxy:

First, all software cannot use a proxy. Then, an application that will access internet outside the proxy will reveal the true IP. Finally, even within the browser using the proxy, some applications will not be taken into account and show the true identity of the user (secure sites (https) and streaming).

Warning, these solutions are easy to implement multiply on the net. Some unscrupulous individuals offer them to retrieve the identifiers of users, exploiting their data and lead to phishing sites (phishing)…

VPN, on the other hand, transits the entire Internet traffic through servers located usually abroad, which does not restrict its use to a particular application. A VPN is also safer because it encrypts data.

So, proxy or VPN! The choice will depend on the needs of the user. To hide his IP address, a proxy may be sufficient and it is easier to use since there is nothing to install. In contrast, if the goal is to remain anonymous and protect all data, a VPN is required. It is also very useful for people who connect via public Wi-Fi spots. This is to prevent malicious interception of their Internet connection and their data.

The Tor network

We talk about the Tor network (“onion” in English) because it is a network consisting of multiple layers (or more precisely nodes). Internet access is through a “path” random route in these nodes: it allows covering their tracks to hide the origin and contents of the connection. This system is in the form of small software to install. The Tor network however, has several disadvantages: go back often makes navigation slow, and it has security vulnerabilities.

Other anonymizing systems

There is also developed software to hide IP address (ex: JAP / JonDo or Hide My IP). Also, all browsers except provide functionality anonymization on the web.

Wherever possible, it is preferable to focus on open source programs. Why open source software is more secure than it software “traditional”? To understand, consider the browsers and ask us behind most of them. The answer is simple: multinationals (Microsoft for Internet Explorer, Google Chrome or Apple for Safari). And the leitmotif of these large groups is profitability. Choosing an Open Source nonprofit will therefore limit abuse.

Do not lose sight of the system that the user chose not to reveal its IP address, this information has…

VPN

VPN…You think you are anonymous!

VPN & HADOPI

This post is the first in a small series on the theme of anonymity, VPNs, and by extension, possible attacks. For a more comfortable reading, which should be one ticket will make several at once, they will have a more or less technical. The first is a (long) introduction to the basics of IP anonymization … good reading.

VPN this word used anyhow and all the sauces, and especially to hear so many cons-truths about their virtues “anonymization.” Here are some thoughts on VPNs, driven by an increase in spam on this blog related to operations of noise around HADOPI. If some rather courteous offer me to try their solutions, others are downright rotten systematically all tickets they come to paste a link on their website that claims to sell the security at $ 5 per months. But most disturbing of all, it is mostly misconceptions that are carried on many sites and wikis, and tend to say that a VPN is the ultimate weapon to make you immune from inspection deep packet (IPR) and preserve your anonymity.

What is a VPN?

A virtual private network or VPN is an encrypted tunnel which passes in its communications in order to secure them. Thus, it intends to monitor the routes the information to avoid capture by unauthorized third parties.

While VPNs are currently very reasonably effective response to pass under the radar of Trident Media Guard, they are not a panacea, and not enough to maintain your anonymity. Whether on P2P networks or simple websites, there are even behind a VPN, several techniques to reveal your real IP address. There are many pitfalls, as they emanate from the sites you visit as your own doing, it is important to be aware of that.

The roots of evil

By laying text as uninspired that HADOPI our good legislator has unwittingly exposed to a very real threat which we can observe some undesirable effects in other countries. Many companies have rushed into this new market of mass surveillance and control generalized others try to make parades. Our Minister of Industry has something to rub his hands, he will emerge here to see a new part of the economy hexagonal, although smelly, that of the digital arms race. On the Internet as in real life, trader’s guns can be very friendly people, it is the protection they sell you on paper, but death is their stock in trade. People who need to ensure their perfect anonymity were either professional whose Confidentiality is required by the nature of their duties, or people whose illicit nature and criminogenic activities required to avoid get caught. By reducing the need for anonymity in order behaviors tort type MP3 download copyrighted, so do not be surprised to see some mafias rub their hands and say they will be able to tackle public larger markets. Infrastructures are there, they are just waiting for the right!

This is very disturbing and paradoxical because the anonymity and privacy (or privacy) is a legitimate need, securing the exchange is too. Administrative procedures (taxes, URSSAF …), banking or financial (…) require secure data exchange.

 

We can thank our elected officials for making this choice for the Internet Company, often due to a lack of political courage, sometimes by ignorance.

Internet is a public network

Internet was not designed for anonymity and privacy, it is a public network, the routing information is public and therefore the data are originally not encrypted. Internet naturally allows encryption, but it does not hide the identity of the sender or the recipient (encryption hides the payload but not the routing information or metadata).

The basis of anonymity

I certainly do not pretend to give a comprehensive course on anonymity but being aware of what it entails, let me just, I hope to break a myth that is to make you swallow that “solutions “simplistic just to meet 10% of the anonymity issues are long-term solutions for protecting your identity on the network. All this is far more complex than love to tell you.

A VPN (virtual private network), proposed the creation of a tunnel, usually encrypted between your computer (or in some cases your router) and the service provider. In most cases, all that passes between the service provider and the content that you target plaintext passwords over the network. Few services offer encryption “end to end” (end to end), this is the first vulnerability VPN solutions. If all goes clear between your provider and the content target your visit, usually on a remote server, at the bottom right of the Internets, you better have damn confidence. Take good conscience in choosing a VPN service provider, you give him the same thing that you entrust your ISP, any precautions is to know the laws in force in the country of the supplier service.

In terms of errors, the most commonly observed is the confusion between content protection (encryption) and protection of the environment, between encryption and processes to reduce the risk of data capture. If one had to summarize it simply looks like:

Define the information content

The context defines the environment and how to access the information.

It protects content through encryption.

It protects the environment through a series of methods and techniques adapted, and certainly not a product, whether hardware or software.

If the content or the context is compromised, your anonymity is compromised.

It should also make the difference between protecting privacy and anonymity

Anonymity: the right not to be identified by a third party;

Protection of privacy: the ability to protect its communications uptake by unauthorized third parties … In other words, to prevent others from what you say or what you do.

If I read correctly, you must understand such a network is not encrypted necessarily guarantee your anonymity. And conversely, protects the digital context … but not the content (but we’ll come back in a future post the same small set).

Who listens to what and where?

You have all heard a stupid sentence, even from the mouth of people known as “Mark Zuckerberg” (Facebook founder) of the type: “If you have nothing to hide, you have nothing to hide”. There must be people who have never made ​​a purchase for example on the Internet or who have never exchanged an email or photos with family…

Are you entrusting your personal data…

Come on, close your eyes and imagine for a moment that I work for Universal Music, how I will proceed to your opinion if I wanted to hunt small freeloaders? Bingo, I will ascend VPN service more or less clearly branded “circumvent Hadopi.

Surf anonymously on the internet

Surf anonymously on the internet

Firstly, sweep conventional wisdom: It is impossible to be completely anonymous on the internet, you can certainly limit his footsteps, but there are limits.

When your PC connects to the internet, it needs an IP address, this address is provided by your ISP: it always knows who you are. If a filtering system is established provider level, you might try all methods, you will never anonymous.

Now, it may be unpleasant to be tracked by the websites you visit or every search on Google or stored by the famous search engine.

To counter this, there are several solutions. All rely on what is called a proxy. The proxy is an address or a remote server on which all your internet requests will be redirected and the connection only traces recorded are those of the proxy, and not those of your Pc.

The easiest method is to use a proxy to go on sites that offer this service: No software installation you submit your research or URLs directly: No registered personal info, your anonymity is respected.

Hide information with a proxy

Privacy on the Internet is often questioned, many users anxious to keep their anonymity on the web looking for effective solutions and easy to use.

Social networks are a very good example of what has become the internet from their appearance, namely a window before which almost everyone can stop to explore the privacy of members. The youth of this generation are the most affected by this phenomenon, and most of them do not seem to measure the impact of this display of privacy. Others are more concerned with their personal information, but do not want to happen as the good things that can bring them internet.

Surf anonymously with a proxy

For those, the use of randomly generated proxy servers can be a good solution if you know how to use and understand their function, because it still requires a minimum of computer knowledge. The proxy server is a type of individuals who share many relay functions in the context of Internet browsing. Its other name proxy is well aware of its use. This type of server plays an important role in securing the navigation, allowing, among other things, to hide the IP address of a user.

Otherwise, the proxy functions allow using them as a beacon for a more rational use of the Internet connection. It is this objective that is particular companies that pass the requests of their employees through a proxy.

Use a proxy on your browser

This is used as a filter between the security page that you are trying to access the server and the user. This proxy allows anonymous but for certain, it is not full.

The use of a proxy, said cache, resulting finally automatic storage of the most requested pages. The process of activation of the proxy on a personal computer is accessible to everyone, but it depends on the browser used. We always start by going to Tools on the browser page. Then either goes in Internet Options for Internet Explorer or in connection settings for Mozilla. In the latter case, it activates the Manual proxy configuration check box. The IP proxy to use is specified in the HTTP Proxy field.

Setting up a proxy server

For Internet Explorer, the process is continued by clicking on Network Settings, the Connections tab. You check the command “Use proxy” before entering its IP. There are different types of proxy in accordance with the protocol used. It cites, among others, an HTTP proxy, proxy SMTP, IMAP, or PHP. This protocol is considered to be the easiest to use. It is also good to know that the use of proxy has no advantages.

On the other hand, the use of proxy exposes the identification of sites to which one is more accurate. Not to mention that the presentation of the current page via proxy may sometimes differ, in terms of quality of the original page. Worse still, some websites have bases regularly updated which identify proxy servers to automatically block access through one of them. This approach often justified by a desire security can sometimes mask a desire not to miss any information about users who visit the site.