Has anyone here setup EOS such that 5 eyes, 9 eyes, and invasive governments are prevented from tracking your online presence or … well you get the idea.
Sounds like a job for:
that only happens when it’s unplugged
With enough determination and resources, anyone can be tracked. That level of privacy is a pipe dream. Even the Tor network can be tracked, just takes more time and effort.
Try Qubes OS and even that is only reasonably secure. Depends on your threat model, and in any case security is a habit, and a behavior. If you really want that level of anonymity, or protection you already failed by having what appears to be a pretty public user profile, with the kind of details that don’t appear to be AI generated. Regardless, nothing is secure.
So what do you really want here? Some tips about how to secure your browser, or do you actually want to go through with the significant effort it would take to be anonymous.
Don’t have enough knowledge to say if its possible, but I like the idea.
Basically a wide field, you can start with brainstorming your network activities and find out how to hide these activities.
- VPN would be an option to pass a lot of eyes
- TOR ?
- encryption for Email (end to end)
- DNS Server
- online accounts – may use relay for the used mail accounts? Create Avatar-Account
- lockdown OS https://wiki.archlinux.org/title/Security [RTM]
- Personal hygiene (not soap)
That’s technical question and totally related to Linux and installed EndeavourOS or not?
just… don’t let us lead the discussion into a mutual conductive uselessness.
This is a good list. I might piggyback on that a bit if that’s ok
Of course @manyroads, it’s your choices for each of these that will impact your capacity to be tracked.
VPN
You might have a look at TechLore’s list for a VPN comparison:
I won’t bother telling you which I’d prefer, because everyone here (including myself), has their opinions, and they don’t all agree, so something to be said for personal needs, which you know best
TOR
Just be aware, that using TOR, or VPN, is an activity that is recognisable by your ISP. Have you ever walked into a room where kids are clearly up to something, but when asked what they’re doing, the answer is a dubious, “NOOTTHING ”, which is kids-speak for DEFINITELY SOMETHING
Well, TOR may well have that effect too.
Also if using TOR and you sign-in to a web service that identifies you, that has the potential to severely compromise the effectiveness of TOR. The last node in a TOR connection doesn’t know the origin (you), but the web-service you’re signed into would. The last node, if a state actor, may have the capacity to connect those dots.
Encrypted Email
If only this was the norm. This is one of the weakest links. Email, as it passes through virtually any service in the world, even the “encrypted-at-rest” ones, has likely been exposed to either the sending, or receiving server, in plain text.
If you can get your friends, family and colleagues onboard with end-to-end encrypted emails, you’re in a good place, but that’s probably the hardest thing to accomplish on this list
DNS
Check out Quad9. I cut to the chase on that one because there aren’t all that many other options, except perhaps leveraging DNS provided via trusted VPN provider (through the VPN).
The question asked and the title of this topic is one of the examples of when it is not clear what is meant by a secure/hardened system and it’s relationship to privacy.
ChromeOS is one of the most secure systems (based on a hardened Linux kernel) out there, but is it private?
If they are asking for common practices to stay somewhat private online, then the measure proposed here above may help to some extent.
If their threat model is such as to escape the prying eyes of the 5+9, then they have to find other ways to become invisible.
Surely;)
It’s free and open Source read here for the license:
I have carrier pigeons, and pay the local kids in kit kats and jelly belly’s to inform me if anyone suspicious comes within a few blocks.
Obviously the only 100% way to be safe is to make sure you’re not online. Physically pull wifi cards, no ethernet once setup. You can do a lot, just not connected.
You could daisy chain GrapheneOS phones to public networks, preferrably behind VPN’s, without using any sim cards or anything . . . and even that likely still isn’t a guarantee if someone is looking for you since you’re probably on camera somewhere and a someone firing away on a laptop in camera view is probably going to get caught even in a disguise in a vehicle with fake/stolen plates. . .