Category:How to Exit the Matrix

From InfoAnarchy
Jump to: navigation, search

Welcome to the first day of the rest of your life.

Document Organization

This document is organized into seven chapters. The first chapter is an introductory philosophical discussion, and the next six are based on the six main ways you can leak information about who you are onto your network connection, or to an attentive individual.

  1. The Matrix
    A discussion of what the Matrix is, how it functions, and how to resist and subvert it. This forms the philosophical underpinnings of this HOWTO and the driving force behind the author's motivation to work ceaselessly on this document for over a year, and then proceed to give it away for free. Not required reading, but strongly recommended.
  2. Network Attributes of your computer
    This includes your network hardware (MAC) address, your IP address, and your 802.11 nickname. This section describes ways of obfuscating each of these attributes, as well as your network data itself.
  3. Local Programs and Services
    Various programs you run can leak information about you to the network. This section describes how to turn them off.
  4. Web related leakage
    Even after you have taken steps to obfuscate your network attributes, it is still possible to leak a surprisingly large amount of information about who you are through your web browser. It is even possible for websites to determine your original IP after routing through a proxy (or even Tor), if you are not careful.
  5. Intrusive Surveillance
    In some environments (public computers, labs, oppressive work places), your computer may be bugged and under direct deliberate surveillance from a third party. This section describes what to look for, and also describes how to use these same tools to your advantage to conceal your activities. It also covers measures you can take to mitigate information disclosure in the case of equipment seizure.
  6. Anonymous Communications
    The previous 4 sections have dealt with how to access Internet resources without fear of divulging your identity. But what if you have something to say? This section discusses the ins and outs of publishing data and communicating anonymously.
  7. Physical Interaction
    The ultimate goal in anonymity over the Internet is to carry it over into the physical world: to use money, and to be able to buy and sell items and otherwise conduct business without fear of surveillance. The means for doing this exist, yet most are prohibitively expensive for the average individual. In most cases, low cost, "good enough" alternatives are available with some extra effort, however. Hopefully, as the Anonymous Economy continues to grow, tools to aid in interacting with it safely will become profitable commodities themselves.

Where to find this Document

The latest version of this document can be found at http://n4ez7vf37i2yvz5g.onion/howtos/ExitTheMatrix or at http://jdoe.freeshell.org/howtos/ExitTheMatrix. The Anonymity Portal also provides a mirror, along with several other documents. Those wishing to mirror or build their own copy can download this web tarball. This instance was built with xmlto html ExitTheMatrix.xml.

License

This work is licensed under the Creative Commons Share Alike v2.5 license.

Credits

This document exists because of the hard work of literally millions of individuals working in concert to build a free, open world where all can meet, trade and converse without fear. One day The Man will burn.

At the same time, I would also like to thank The Man, because without him, the millions of individuals working in concert to build a free, open world where all can meet, trade and converse without fear would not have such a fascinating hobby.
Furthermore, I would like to thank the dozens of contributors who have tipped me off to various news articles, software, FIXME solutions, and so on. Your help is much appreciated!

Feedback and Assistance

If I missed anything you feel is important, or if anything is unclear, please contact me via email at <aceevader]-a-t-[mailvault.com>. Particularly if you have any material to cover any of the FIXMEs found in the text, please email me. If you are someone who needs confidential anonymity advice or assistance, do NOT use my mailvault GPG key, since I have no control over preventing leakage of the passphrase. Instead, use this key. While mailvault is not located inside the USA (and thus not subject to the most likely form of assault: a National Security Letter), it is not outside the question that they could be coerced in some other manner. If you are unfamiliar with GPG, you may consider installing a graphical front end to help you along.

"How to Exit the Matrix" is part of the series "How to Exit the Matrix" by Ace Evader and has been modified and wikified from it's original form (this link requires The Onion Router). Other mirrors are here, here, and here.


This work is licensed under the Creative Commons Share Alike v2.5 license. http://creativecommons.org/images/public/somerights20.png

Pages in category "How to Exit the Matrix"

The following 7 pages are in this category, out of 7 total.