![]() |
| Remain Anonymous using Linux |
Living in the Age of Information that we live in today
carries awesome accommodation and advantage alongside extraordinary dangers.
From one viewpoint, mankind approaches essentially the total of data and
information known in presence at the simple couple of snaps of a catch; however
then again, this extraordinary power in the hands of a loathsome few can cause
incredible obliteration and wretchedness if taken too far. In this article,
I'll direct you through the conceivable strides to anchor your private data on
the web.
It's imperative to take note of that the main 100% secure
and private PC is one that is detached from the Internet and controlled off. In
this way, it is inconceivable for a gadget that is associated with the Internet
to be completely, 100% secure. There is dependably a route around security, and
if there isn't, at that point devices are constantly created to discover new
ways. So the directing rule here isn't to hope to change a couple of settings
on your PC and believe that you've currently empowered your Impenetrable
Fortress, rather the thought is to set up whatever number detours as you can so
as to make it as troublesome as could be expected under the circumstances for
any eventual aggressor or spy to access your framework or your private data.
What is linux??
Linux is the best-known and most-utilized open source
working framework. As a working framework(operating software), Linux is
software that sits underneath the greater part of the other software on a PC,
getting demands from those projects and handing-off these solicitations to the
PC's equipment.
For the reasons for this page, we utilize the expression
"Linux" to allude to the Linux kernel, yet additionally the
arrangement of projects, instruments, and administrations that are commonly
packaged together with the Linux kernel to give the majority of the vital
segments of a completely useful working framework. A few people, especially
individuals from the Free Software Foundation, allude to this gathering as
GNU/Linux, on the grounds that a considerable lot of the devices included are
GNU segments. In any case, not all Linux establishments utilize GNU segments as
a piece of their working framework. Android, for instance, utilizes a Linux
kernel yet depends next to no on GNU instruments.
So which Linux Operating system and tools should we use??
Some of the tools are:
- Tails OS
- Tor Browser
- Macchanger
- Full Disk Encryption Software
1. Tails OS
The primary instrument we will take a gander at is Tails OS,
despite the fact that "device" might be the wrong modifier, as Tails
is a whole Linux Distro, not only an tool. The thought behind Tails is to be an
unknown, self-destructing OS that vanishes and expels any hint of its reality
once you're finished utilizing it. Clearly, this makes it not as much as
perfect to be utilized as one's every day driver, however in the event that
there's something on the web you have to access and you like to keep it private
or need to peruse secretly, at that point Tails is an incredible place to
begin. Instead of being forever introduced onto your hard drive, Tails works
completely as a Live framework and deletes itself upon shutdown.
You can download the most recent Tails ISO at the previously
mentioned interface, and either copy it to a DVD or duplicate it to a bootable
flash drive.
Once you've booted into Tails, it will control you through
some underlying setup steps that are quite straight-forward. If all else fails,
counsel the documentation. A key element of Tails is that all Internet
associations are consequently steered through the Tor arrange, additionally
expanding your namelessness. In case you're new to the Tor arrange, we'll cover
that later on when we examine Tor Browser. Another essential component that is
worked in to Tails is MAC address spoofing, which we'll cover more top to
bottom when we examine the macchanger instrument.
2.Tor Browser
The following instrument we will take a gander at is TorBrowser, a result of the Tor Project, an association committed to online
protection and security. As beforehand specified, this device is as of now
inherent to Tails OS, however you can likewise introduce it on any OS you like,
as they have renditions accessible for Windows, Mac, and Linux.
With a run of the mill Internet association, traffic
specifically from the host asking for data to the server that gives the asked
for data, for the most part with a couple of additional jumps in the middle of
from server to server, all together for the activity to achieve it's expected
goal. This, notwithstanding, can be effectively followed, regardless of whether
you've erased your perusing history. So what Tor Browser does is rather course
your movement to many, a wide range of mediator servers inside the Tor Network,
known as hubs, which serves to muddle the first source of the activity, before
leaving the Tor Network by means of a leave hub lastly achieving the proposed
goal. As you may envision, this can back off your loading speed a bit, yet in
the event that protection is the worry, one can figure out how to live with
yielding a touch of speed with unknown web perusing. It is prescribed to just
utilize Tor Browser when a particular task or undertakings expects one to be
extra careful, instead of using it as your day by day driver.
Tor Browser is a fork of Firefox, so you can install your
favored additional items, for example, Adblock Plus, uBlock Origin,
DownThemAll, et cetera, however realize that any additional extra that you
install could debilitate the security of Tor, in this way putting you in danger
and nullifying the point of utilizing it in any case. Be mindful of what you
install. Truth be told, Tor quite prescribes against the installation of any
program plug-ins. Note that Tor Browser can likewise evade web filters on the
off chance that you happen to live in a place where the Internet is edited, for
example, China.
Some shrouded sites, known as "onions", have
darken URLs and must be gotten to through Tor Browser. It is additionally vital
to take note of that Tor Browser is certainly not an otherworldly "shroud
me" catch. It is conceivable to in any case be followed by your perusing
propensities. Be wise, be careful, and recollect that everything done through a
PC leaves a trail some place, regardless.
There's additionally a versatile Tor arrangement on Android
called Orbot, which utilizes the OrFox program. You can download both on Google
Play and F-Droid.
3.Macchanger or Mac spoofing
MAC spoofing is a system for changing a processing plant
appointed Media Access Control (MAC) address of a network interface on a networked
gadget. The MAC address that is hard-coded on a network interface controller
(NIC) can't be changed. Be that as it may, numerous drivers permit the MAC
deliver to be changed. Moreover, there are instruments which can influence a
working framework to trust that the NIC has the MAC address of a client's
picking. The way toward veiling a MAC address is known as MAC spoofing.
Basically, MAC spoofing entails changing a PC's personality, for any reason,
and it is generally simple.
MAC Addresses are physically singed into your networking
hardware and can't be changed. MAC Addresses are otherwise called equipment
addresses consequently. Web movement utilizes both your IP Address and MAC
Address to know where to appropriately course information. Cause of this, notwithstanding
jumbling your IP Address with Tor Browser, it's additionally a smart thought to
muddle your MAC Address utilizing MAC Spoofing.
Once more, it's difficult to change your MAC Address like
you can with your IP Address, anyway you can parody your MAC Address so it
gives off an impression of being something unique. As beforehand said, this is
something that is as of now inherent to Tails OS, however you can likewise do
this on different distros. My favored instrument is macchanger, which is a
straightforward terminal charge that enables you to parody your MAC address as
you see fit. In the event that you can't discover it in your official archives
(sudo able get install macchanger), you can download macchanger from GitHub or
the GNU site.
4. Full Disk Encryption
Full Disk Encryption is a fairly entangled process that I
don't even completely get it. Get the job done is to state that on the off
chance that you need to encrypt your information, Full Disk Encryption is the
best approach, as it will keep anybody from physically getting to any data on
your hard drive without the encryption passphrase.
There are numerous approaches to physically arrange Full
Disk Encryption, however they all go path over my level of comprehension.
Consequently, the simplest method to set up Full Disk Encryption is amid the
installation of your Linux Distro.
In the event that you utilize Ubuntu or Linux Mint, you'll
see that amid installation when you get to the Installation Type screen,
underneath Install Ubuntu/Linux Mint there are two checkboxes that say
"Encrypt the new Ubuntu/Mint installation for security" and
"Utilize LVM (Logical Volume Management) with the new Ubuntu/Mint
installation". I will for the most part check both of these crates and
permit Ubuntu/Mint to wrap up. Nonetheless, take note of that in the event that
you like to set up your own custom partitioning scheme, you will be not able do
as such here, as this alternative will cause Ubuntu/Mint to deal with the
partitioning for you. It is as yet conceivable to go to Something Else and set
up your own particular encrypted segments, yet it turns into more confounded by
then and would need to be tended to in a different article.
In the event that you simply need to encrypt certain
organizers on your Linux framework, another helpful utility is Encfs, which you
will find on the official repositories .Encfs enables you to make an encrypted
organizer that can't be opened and seen without the encryption passphrase.

EmoticonEmoticon