Become Untraceable - How To Create An Anonymous Identity | Tutorial

197,543
0
Published 2022-08-13
Become untraceable by creating anonymous identities. This is how it's done. Support independent research and analysis by joining my Patreon page: www.patreon.com/thehatedone

The Internet is a giant network of privately owned spaces open to public, where every participant knows the exact identity and location of one another and where corporate stalking is a perfectly legitimate business model. If you are not okay with automated decisions being made about your every move, you should consider creating an anonymous identity.

Anonymity is the most powerful mitigation strategy on a publicly observable network such as the Internet. It is the most direct path towards privacy. This guide will tell you exactly what you need to know and do in order to create and maintain your very own anonymous identity.

The Internet is a privacy nightmare because every action is by default identifiable and linkable. That means actions always lead to a unique location and/or account on the network and actions can built a profile over time. Linkability and identifiability are your biggest privacy and anonymity threats on the Internet. For maximum anonymity, both of these threats need to be mitigated to the fullest extent possible.

Our first step with any service will be to dissociate our account details from our personal information. The second step is to compartmentalize our anonymous identities so that they are isolated from our personal identities.

Dissociation and isolation of your anonymous identities are not the only steps to keep your anonymity. Be extremely cautious of what types of data you submit to these services while using them. Always think of the linkability and identifiability threats when using these accounts.

PRIVACY THREAT MODELING
www.threatmodelingmanifesto.org/
LINDDUN strategy for threat modeling
www.linddun.org/post/keys-to-successful-privacy-th…
www.linddun.org/linddun
www.linddun.org/_files/ugd/cc602e_cf7e4c6b1d894bda…
www.linddun.org/go-getting-started
Linkability
www.linddun.org/linkability
Identifiability
www.linddun.org/identifiability-1
Mitigation strategies
www.linddun.org/mitigation-strategies-and-solution…

RECOMMENDED TOOLS
KeepassXC
keepassxc.org/
Bitwarden
bitwarden.com/
FIDO security keys
fidoalliance.org/what-is-fido/
GrapheneOS
grapheneos.org/
Orbot
orbot.app/
Tor Browser
www.torproject.org/
Tutanota
tutanota.com/
ProtonMail
proton.me/
Briar
briarproject.org/
OnionShare
onionshare.org/
Wire
wire.com/en/
Matrix/Element
element.io/
How to anonymously install applications
www.privacyguides.org/android/#obtaining-applicati…
Aurora Open Source Software
auroraoss.com/
How to obtain an anonymous burner phone - The Intercept
   • How to Prepare a Cheap Burner Phone f...  
How to obtain an anonymous burner phone - The Hated One
   • How To be Anonymous In A Protest | Bu...  

NEWS SOURCES
Google location tracking
www.wsj.com/articles/states-file-new-suits-against…
Chainalysis
www.coindesk.com/business/2022/08/04/chainalysis-e…

Credits
Music by:    / @co.agmusic  

Follow me:
twitter.com/The_HatedOne_
www.reddit.com/r/thehatedone/

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

All Comments (21)
  • If you can't be anonymous, you can still provide companies with as much false information as possible.
  • @asaultikk
    Man makes better content than a literal company
  • @ImParzelli
    This video just proved its impossibe to be "anonymous". thanks boss
  • @Defang24
    Stay off social media, delete all corporate apps, set up your own cloud server.
  • @hackaniceday
    This is the most complete and detailed explanation I have ever seen.
  • I read that NSA has facilities in Germany where tutanota is from. In my country a cybersecurity person created a 100% secure online service and was later threatened by NSA to whether provide a backdoor for them or close the service or face consequences. I don't believe there are any secure online service in the western part of the world and if there are it isn't for long. So even doing all of this steps you mentioned seems completely irrelevant to maintain anonymity because they will certainly have backdoors for NSA.
  • Step 1: demolish your phone, live without the internet.
  • @IPear
    Btw, off topic, but as soon as I started talking about free and open source software on my channel (mentioning newpipe), all my videos are blocked from the monetization. Now we know what Google is scared of: open source alternatives.
  • @Its-Just-Zip
    Small note about email Aliases proton has purchased simple login meaning that in the near future users with a paid proton account should be able to access paid simple login features by default. Do with that in for what you will. Some people seem to have bought the cheese that proton is for one reason or another a honey pot or otherwise dubious of which I don't quite understand, but it is an option that is available
  • @valdimer11
    Downloading tor for tutabnota isnt enough to remain untraceable. You should use a usb with tails or some other linux distribution, THEN download TOR, THEN setup Tutanota. THEN do the rest of the steps here. The problem is, downloading TOR from a smartphone is never really a good idea and its traceable, albeit, it would still be very difficult.