Last Updated - 5/1/2015
Updating as time permits.
If you have any questions, please post below. If you have a specific question (i.e. questions about a type of router and its settings), you can PM me.
Subject:
Comprehensive guide to providing anonymity online. While noting that nothing is 100%, this guide will provide you the most up-to-date settings, software, and applications to make it virtually impossible to detect your location, thereby securing your identity, and (double) encrypt your e-mail(s). These products, procedures, and settings provide a layer of protection that is overkill for an end user of a product (gear) such that the forces to be wouldn’t expend its resources on you, but rather the supplier/source.
Rational:
Some of the content in the subsequent paragraphs is just good practice and will protect you during your day to day activities online. However, this thread is specifically focused on the need for ultra stealth and anonymity when you’re purchasing gear, having source discussions, or any other activities you don’t want traced back to you that would ultimately incriminate you (and the recipient of your conversations). I estimate that this is between 1% - 10% of all your online activity. I’ve distilled this down to the essentials and provided links to the software/applications/instructions.
Basics:Cell Phone:
Never use this for stealth. As of the last update, TOR browsers are not available for cell phone Operating Systems and are the first line of defense for online anonymity. Also, you'll need a VPN and adjust your settings (turn OFF cellular and GPS, etc. - each phone, and even software/firmware versions are vastly different such that I don't even want to chance it. Also, Google this, "Edward Snowden iphone".
Modem/Router/Wi-Fi
1) Change the password of the router/modem, and if possible, the username. (Write it down!)
2) Change the default modem login IP address (Write it down!)
*This is in the format of xxx.xxx.xxx.xxx (i.e. 196.168.001.001, also the same as 196.168.1.1; zero's are ignored. I suggest using something like 938.947.466.372 (utilizing no zero's).
*Also note, when you change this IP address, your router/modem may need you to type the NEW IP it into the browser.
3) Change the default modem SSID to something unique
4) Enable Security Mode
Note: use the highest encryption available on your modem (unless a device in your home is not compatible).
5) Firewall – Set to highest level, but may prohibit VOIP such as Skype.
6) (Optional) Change from DHCP Hosting to Static IP’s - make a table of all listed devices connected by either the devices name and/or MAC address.
7) If available, hijack or connect to your neighbors Wi-Fi.
Computer/Laptop
Rename your computer something random and not associated to you, style of life, favorite team, etc. (Use something like: "Oil Change" or "User1")
Scope:
As a general rule, utilize VPN and E-mail providers who do not have extradition treaties with the US (or the country in which you reside). Additionally, it’s even more secure if the country hosting the VPN and E-mail servers is physically in, and operated/owned by a county which diplomatic relations are strained or non-existent (in the US, as of the date edited/posted, this would be Afghanistan, Russia, North Korea, China, etc.). Point-in-case, popular encrypted email providers like
Hushmail (based in Canada),
Safe-mail.net (based in Europe), and VPN service provider
www.hidemyass.com (also based in Europe) were all served court orders by the aforementioned country of the service provider, due to a strong armed US tactic and strong diplomatic relations. As you can see, the trend is that you want service providers to have operations and hardware in a country with weak diplomatic ties to the US….or your country of origin if not a US citizen.
(Optional) Virtual Portal Network (VPN). If your decide to use one, and you are required to pay, use Bitcoins.
E-Mail: Do not use Safe-mail.net nor Hushmail.com.
Utilize an encrypted e-mail provider in Russia or China. This one is popular in the Darkweb circle:
https://tutanota.com/ , although a few others exist. Tutanota.com is great because not only does it encrypt, but the sender needs a second method to communicate the password/key to even open the e-mail.
Encryption for E-Mail:
Hands down, use PGP (which stands for Pretty Good Privacy). Use this link
https://www.gnupg.org/download/index.html
Browser:
TOR Browser is the only browser at this juncture:
https://www.torproject.org/projects/torbrowser.html.en
A TOR browser is an Internet communication method intended to enable online anonymity. Read the homepage where is says "Tips On Staying Anonymous " - this is behavior modification required from your typical browsing practices.
Tails:
Basically, it's a mini operating system and software on a USB or similar (SD card for example). Not required, but lets you destroy all data with one hit from a hammer.