Ace Evader

2006-6-01

Abstract

Privacy and anonymity have been eroded to the point of non-existence in recent years. Our personal, private information is stockpiled and sold to the highest bidder like so much inventory at a warehouse. National Security Letters are written to make countless requests for records from our search engines, libraries, and book stores with no court oversight. Email and especially searchable data is practically unprotected from anyone who might ask to have it. All our electronic communications are tapped. Massive governmental data mining schemes are being built to record everything we publish on the web. In many workplaces, employers spy on and control their employees' Internet access, and this practice is widely considered to be acceptable.

These are dark times. The Fourth Amendment has all but disappeared, thanks to the Wars on Drugs, Porn, and Terror. Any practicing trial lawyer will tell you that you can no longer rely on unreasonable search to be the basis for excluding evidence, especially for digital evidence in the hands of a third party. Likewise the First Amendment has been shredded with exceptions and provisos, and is only truly available to those with the money to fight costly (and usually frivolous) court battles against large corporations. In short, you can say what you want so long as it doesn't effect corporate profits.

How we got to a legal state where this all this activity is the accepted norm, I'm not quite sure. It seems to stem from an underlying assumption that our function at work and at home is that of a diligent slave - a single unit of economic output under the direct watch and total control of our superiors at all times; that we should accept this surveillance because we should have nothing to hide from our benevolent overlords who are watching us merely to protect us from evil.

I believe this view is wrong. Moreover, I believe it is time to reverse the tide. This document seeks to provide the means to protect your right to privacy, freedom of speech, and anonymous net access even under the most draconian of conditions - including, but not limited to, both private and criminal investigation (which happens far more often to innocent people than one might like to think). "So what are you saying? That I can dodge bullets?" "No.. What I am trying to tell you is that when you're ready, you won't have to."


Introduction

Welcome to the first day of the rest of your life.

Document Organization

This document is organized into seven chapters. The first chapter is an introductory philosophical discussion, and the next six are based on the six main ways you can leak information about who you are onto your network connection, or to an attentive individual.

  1. The Matrix

    A discussion of what the Matrix is, how it functions, and how to resist and subvert it. This forms the philosophical underpinnings of this HOWTO and the driving force behind the author's motivation to work ceaselessly on this document for over a year, and then proceed to give it away for free. Not required reading, but strongly recommended.

  2. Network Attributes of your computer

    This includes your network hardware (MAC) address, your IP address, and your 802.11 nickname. This section describes ways of obfuscating each of these attributes, as well as your network data itself.

  3. Local Programs and Services

    Various programs you run can leak information about you to the network. This section describes how to turn them off.

  4. Web related leakage

    Even after you have taken steps to obfuscate your network attributes, it is still possible to leak a surprisingly large amount of information about who you are through your web browser. It is even possible for websites to determine your original IP after routing through a proxy (or even Tor), if you are not careful.

  5. Intrusive Surveillance

    In some environments (public computers, labs, oppressive work places), your computer may be bugged and under direct deliberate surveillance from a third party. This section describes what to look for, and also describes how to use these same tools to your advantage to conceal your activities. It also covers measures you can take to mitigate information disclosure in the case of equipment seizure.

  6. Anonymous Communications

    The previous 4 sections have dealt with how to access Internet resources without fear of divulging your identity. But what if you have something to say? This section discusses the ins and outs of publishing data and communicating anonymously.

  7. Physical Interaction

    The ultimate goal in anonymity over the Internet is to carry it over into the physical world: to use money, and to be able to buy and sell items and otherwise conduct business without fear of surveillance. The means for doing this exist, yet most are prohibitively expensive for the average individual. In most cases, low cost, "good enough" alternatives are available with some extra effort, however. Hopefully, as the Anonymous Economy continues to grow, tools to aid in interacting with it safely will become profitable commodities themselves.

Where to find this Document

The latest version of this document can be found at http://n4ez7vf37i2yvz5g.onion/howtos/ExitTheMatrix or at http://jdoe.freeshell.org/howtos/ExitTheMatrix. The Anonymity Portal also provides a mirror, along with several other documents. Those wishing to mirror or build their own copy can download this web tarball. This instance was built with xmlto html ExitTheMatrix.xml.

 

License

This work is licensed under the Creative Commons Share Alike v2.5 license.

Credits

This document exists because of the hard work of literally millions of individuals working in concert to build a free, open world where all can meet, trade and converse without fear. One day The Man will burn.

At the same time, I would also like to thank The Man, because without him, the millions of individuals working in concert to build a free, open world where all can meet, trade and converse without fear would not have such a fascinating hobby.

Furthermore, I would like to thank the dozens of contributors who have tipped me off to various news articles, software, FIXME solutions, and so on. Your help is much appreciated!

Feedback and Assistance

If I missed anything you feel is important, or if anything is unclear, please contact me via email at . Particularly if you have any material to cover any of the FIXMEs found in the text, please email me. If you are someone who needs confidential anonymity advice or assistance, do NOT use my mailvault GPG key, since I have no control over preventing leakage of the passphrase. Instead, use this key. While mailvault is not located inside the USA (and thus not subject to the most likely form of assault: a National Security Letter), it is not outside the question that they could be coerced in some other manner. If you are unfamiliar with GPG, you may consider installing a graphical front end to help you along.


Check out the member blogs, videos, and discussions http://12160.info/

Views: 2728

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

cheeki kea commented on cheeki kea's photo
Thumbnail

$ Paid Annual Leave $

"Now is the Time for American Workers to Unite! Take back the squandered taxes and demand time off…"
7 hours ago
cheeki kea posted a photo
8 hours ago
Burbia commented on Burbia's blog post Mystery illness strikes Russia with fever, blood symptoms, and no cure in sight.
11 hours ago
Burbia posted a blog post

Mystery illness strikes Russia with fever, blood symptoms, and no cure in sight.

I guess releasing this bio-weapon upon Israeli neighbors would be hitting too close to home. I…See More
11 hours ago
tjdavis posted videos
13 hours ago
tjdavis posted a video

The Electric State | Final Trailer | Netflix

Together, robots & humans can take the whole system down. THE ELECTRIC STATE starring Millie Bobby Brown, Chris Pratt and directed by the Russo Brothers, onl...
yesterday
Less Prone favorited Sandy's video
Saturday
Doc Vega's 7 blog posts were featured
Saturday
tjdavis's blog post was featured
Saturday
Sandy posted a video

"Mommy Tells Me I'm a Girl"-Jeff Younger

Soft White Underbelly interview and portrait of Jeff Younger, a father who is fighting to protect his son from transitioning into a girl. Get 40% off access ...
Saturday
tjdavis posted a video

MindWar: Full Spectrum Cognitive Dominance [Michael Aquino Analysis]

This is my analysis and my thoughts on Michael Aquino's "MindWar". This document is a must-read if you are looking to understand the psyop tactics and cognit...
Saturday
Doc Vega posted a blog post

A Horrid Murder at Land Between the Lakes (Sasquatch?)

 Most of us hear that Sasquatch-Bigfoot are intelligent yet reclusive creatures that are closely…See More
Friday
Doc Vega posted blog posts
Thursday
cheeki kea commented on cheeki kea's video
Thumbnail

Metropolis (1927) Full Movie | 4K Color Remastered: 2023 Colorized with Gottfried Huppertz Score

"Hey thanks for the thumbs up guys. I was blown away (like a leaf in a tornado) when I watched this…"
Thursday
tjdavis favorited cheeki kea's video
Thursday
tjdavis posted a video

Did you know this? I was SHOCKED!

Wounder how many people know what they do to baby chicks? Wounder if they know what the are doing to Salmon? What about the lettuce and tomatoes? This will n...
Thursday
cheeki kea posted a photo
Thursday
Less Prone posted a video

Pine Tree Riots - We'll Have Our Home Again

NOW ON SPOTIFY (and everywhere else)!https://open.spotify.com/album/1gWcRqHD7TSbAA2UzYOLWlEvery people deserves a Homeland.Sung by no one in particular.Origi...
Mar 25
Less Prone favorited cheeki kea's video
Mar 24
cheeki kea posted a video

Metropolis (1927) Full Movie | 4K Color Remastered: 2023 Colorized with Gottfried Huppertz Score

🎉🎬 AT LAST❗❗ Metropolis is the FIRST film we colorized using our newly developed AI colorization software, and we are proud to bring it to you now with the...
Mar 24

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted