It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Keep Your Information and Identity Hidden. It Is Your Right.

page: 1
15
<<   2 >>

log in

join
share:

posted on Jun, 25 2016 @ 11:16 AM
link   
I just wanted to offer some advice to fellow ATS members in regards to privacy. Regardless of being used for good or bad, it is primarily only used to keep good people safe and secure. So below I will list precautions that I feel should help fellow ATS members keep themselves and family secure from prying eyes.

THIS IS AT NO POINT ANY FORM OF ADVERTISEMENT FOR ANY COMPANY, I CAN GIVE OTHER PROVIDERS IF YOU WISH. JUST ASK.

1. Keeping your online anonymity

There are various methods to hide your identity from your Internet Service Providers however to keep things simple you should be using a VPN. A VPN can be purchased and installed in a matter of seconds, once enabled you can google your Public IP address online and you will find you are located elsewhere. As if you was in another country. Reason I suggest paid over free, is that you can never really trust a FREE provider as those providers may be set up by Government agencies in order to still track data going through it. Nodes/Computers/Servers can be used at either end to, to track activities. However it is still what paid Service to buy, as some keep logs. One I personally suggest using is NordVPN. They keep no logs, in their words.


NordVPN never logs where you go on the Internet. If anyone asks, the best we can do is shrug our shoulders. And we like it that way.


Currently charged at $5 a month however, if you go to purchase their lowest package and enter where it says. Got Coupon? 70off.

It will be offered at: £26.00 for the Year.

They also offer:

P2P allowed
30 Day Money Back Guarantee
Bitcoin accepted
Global network
Easy to use
Friendly support
Blazing speeds

So with that in place, you will gain a program to download. You sign in, and thats it. Protected.

2. Chatting to others online encrypted.

When you chat online, you may use programs like WhatsApp or Skype. These apps are ok in essence but generally these apps all record conversations with time stamps to an online database. Not something you want really is it? So.

I suggest to those who wish to keep secure in your conversations online to use Wickr. Wickr is a program you can download and run on all platforms, including your android and IOS devices.

WICKR All conversations are encrypted and destroyed after specified minutes. No account registration.

You may find you cannot reach this site, as some Internet Service Providers whitelist the websites meaning you cannot see the site. I would suggest downloading TOR Browser package. Once download and installed it gives you a Firefox built browser. Once launched, it will allow you to reach sites like WICKR and many other websites you may have found hard to reach.

TOR Browser Package. This is also the method of reaching the DARKWEB or DEEPWEB. TOR Browser within itself, keeps you anonymous.

TOR Browser

With TOR, you will be bounced around the globe and again kept anonymous. However some servers it uses could be again used by Government agencies. So the suggestion is, to use a VPN service you pay for, together with TOR Browser to totally enable your online traces left null.

I will add more to this post if users find this helpful. I can go into deeper explanations of online and offline safety. If people wish to know more, please flag and star this post then I will know to add more.

edit on 25-6-2016 by BlackProject because: (no reason given)




posted on Jun, 25 2016 @ 11:21 AM
link   
Newslflash!

Rain, is wet!!!!!!!!!!!!!!!



posted on Jun, 25 2016 @ 11:22 AM
link   
I completely agree with the sentiment of your post. All except TOR browsing. TOR was invented by naval intelligence scientists, and I have no doubt that they know everything that goes on in the onion, regardless if they act on it or not.



posted on Jun, 25 2016 @ 11:25 AM
link   
a reply to: Atsbhct

That is correct however majority of TOR's Servers are now run by people like you or I. They are not entirely run by government agencies. As I said towards the bottom of my post, you should also use another form of security, like a VPN.

No one service should be trusted entirely but they are there to protect general users. TOR is used to allow many of the whistleblowers you hear about today escape being prosecuted for merely helping the world. It has its power.


edit on 25-6-2016 by BlackProject because: (no reason given)



posted on Jun, 25 2016 @ 11:33 AM
link   
there is an old saying from programmers...."what CAN be written, CAN be read"....



posted on Jun, 25 2016 @ 11:39 AM
link   

originally posted by: jimmyx
there is an old saying from programmers...."what CAN be written, CAN be read"....


That is true to a certain level. Firstly the question should be asked, do those who wish to read your information or anyone's have enough good reason to spend time and resources to do so. This is the main reason only once someone becomes a 'Target' is then investigated. Still there is only so many resources that can be utilised.

Two, any data stored on a computer can be destroyed with software, multiple passes or taken out and drilled through. Another reason why SSD's are becoming pushed for. They are very hard to erase with software with multiple passes, they do not store data the same.



posted on Jun, 25 2016 @ 11:41 AM
link   
a reply to: BlackProject

I like your post a lot. I am going to check out wickr. Looks interesting. I have a VPN on one machine that I have kept clean. I never log into any social networks on it, use the TOR browser and use duckduckgo.



posted on Jun, 25 2016 @ 11:44 AM
link   

originally posted by: nullafides
Newslflash!

Rain, is wet!!!!!!!!!!!!!!!


Not everyone knows these things. I have 2 clients now where all I am doing is showing them how to use TOR, VPNs, PGP mail and how to set up bitcoin. There is a big demand for privacy and more people than you think just don't know how to go about it.



posted on Jun, 25 2016 @ 11:45 AM
link   

originally posted by: reldra
a reply to: BlackProject

I like your post a lot. I am going to check out wickr. Looks interesting. I have a VPN on one machine that I have kept clean. I never log into any social networks on it, use the TOR browser and use duckduckgo.



Thank you.

Very good. It can be best to also run programs like NoScript in a browser in order to stop unwanted scripts running that could record data. Using Tor Browser actually comes preloaded with this and many other features to stop background tracking occurring.

Disconnect, is another anonymous search.



posted on Jun, 25 2016 @ 11:56 AM
link   
a reply to: BlackProject

I'm a Tech Tard; is this what you're talking about?
download.cnet.com...



posted on Jun, 25 2016 @ 11:57 AM
link   
a reply to: BlackProject

I just looked at disconnect.me TY.



posted on Jun, 25 2016 @ 11:58 AM
link   
a reply to: reldra

Thanks to YOU, and your recommendation on another thread, I now use Duckduckgo for searches and absolutely love it. I got absolutely fed up withs Google because I'd search for news and get stuff up first that is 2 years outa date.

Thanks for your contribution!





posted on Jun, 25 2016 @ 12:00 PM
link   
a reply to: TonyS

You're welcome



posted on Jun, 25 2016 @ 12:02 PM
link   

originally posted by: TonyS
a reply to: BlackProject

I'm a Tech Tard; is this what you're talking about?
download.cnet.com...


That is what he means. I see he's offline, so i'll just say to find nord's website. I have found CNET used to be great to download from, they have been adding in crapware along with what you want sometimes.



posted on Jun, 25 2016 @ 12:18 PM
link   
There was a similar thread approx 6 months back which led me to Qubes. An operating system that creates multiple virtual machines (VMs) which achieves security by isolation. You can create a Whonix/Tor VM for anonymous browsing and it remains contained within that VM. There are pre-made templates for Fedora, Debian and Whonix.

I like the fact that you can have your docs, photos and videos contained within one VM with no internet access. I have a VM for email, one for browsing to bookmarked links and another solely for banking. You can also create a disposable VMs eg to download and check a suspicious file.


Qubes

Whonix


edit on 25-6-2016 by Morrad because: (no reason given)



posted on Jun, 25 2016 @ 12:32 PM
link   
a reply to: TonyS

That is NordVPN Program yes. I would download it through their website as Download.com sometimes seem to want to try install adware/malware in its installation.

You would have to purchase NordVPN subscription to log into that program but once down then yes, you would be running anonymous online.



posted on Jun, 25 2016 @ 12:34 PM
link   
Just want to chime in and recommend PIA VPN. I've had no bad experience using their service, and you can pay with a gift card from dozens of local stores with the Paygarden service. Makes it very easy to stay 100% anonymous, as you can go to a local store and buy a gift card with cash, then go use the gift card to pay online without using any personal info.



posted on Jun, 25 2016 @ 12:36 PM
link   
a reply to: Morrad

Nice post, I have seen other operating systems going for a similar procedure but this looks promising one that I have not been privy to before you mentioned. I will look into this.

I know that creating an anonymous operating system would be the best way to go for all of us that wish to keep our identity and actions hidden. After all, our operating systems are also snooping on us.



posted on Jun, 25 2016 @ 12:37 PM
link   
a reply to: VivreLibre

I would also suggest using that service too, I know they would probably fall not far from second in my view of good VPN services.



posted on Jun, 25 2016 @ 12:39 PM
link   
a reply to: BlackProject

I pose a single question. In transference from point a to point z...via TOR, encriptin incognito and multiple servers 1-20 deep into an onion....who owns possession of the towers, cable, microwave transmitters needed to move these secure encripted bits of data around the world through the air, under the ground, sea and by satellite?

The means of transferring. It belongs to who? Encripted, secure, onion layered, using TOR...in fact....using everything in place that ALLOWS these very ideas to move from place to place.

I just want everyone to realize the obvious...
edit on 25-6-2016 by mysterioustranger because: (no reason given)




top topics



 
15
<<   2 >>

log in

join