Read

User menu

Search form

Techtivist Report: Hiding in the Blogosphere

Techtivist Report: Hiding in the Blogosphere
Tue, 11/27/2012 - by Conrad Jaeger

The recent tragic death in custody of Iranian activist Sattar Beheshti underlines the dangers of blogging at the sharp end - and the need for heightened security if your words are likely to incur the wrath of authorities.

By its very nature, a blog will give away certain elements of your personality, but not necessarily your identity if you cover your tracks. That said, you can never guarantee 100% anonymity because a determined adversary will always get you in the end. You can, however, make their lives extremely difficult.

The safest course is never to blog from home or via any personal device, but to use a cybercafé or public library. You can then set up an anonymous email account and link it to an anonymous blogging account and upload from there.

Avoid locations near your usual haunts and vary them as often as possible, only choosing the busiest times. Compose the blog directly onto a portable drive and use a free program like CCleaner to clear the history on whichever device you use.

You might also add a number of simple apps to the drive, including text and photo editors and a shredder. Portable Apps is a good source. Then shred relevant documents once the blog has been uploaded. Options include Eraser and Evidence Nuker.

If you have more than one blog, use different email and blog hosts and think twice before embedding any social network links like Facebook or Twitter, or an RSS feed. Equally, never visit your blog from any device linked to you and never Tweet about it under your real identity.

Generally, this will work for most eventualities but you can tighten security further by only ever accessing your blog via a hidden network of the Deep Web.

The most popular network is Tor, which stands for The Onion Router, and it works by hiding users among all the other users and repeatedly encrypting and unencrypting whatever data they send and receive. If you ever wondered why they can’t bring down WikiLeaks, it’s because Julian Assange uses Tor. You can download the free Tor/Firefox browser here.

Once on Tor, you can access the email and blog sites without leaving any trace of the cybercafé’s IP address. You will need to have selected both a blog site and email account that do not require JavaScript to be running on the browser because JavaScript will also link back.

Additionally, it is a good idea while down in the Deep Web to set up an anonymous email account with TorMail for added security.

Be equally cautious in publicizing your blog. To get your message out to the most popular blog search engines use Pingomatic, which alerts them all for you. Conversely, you might not want anyone to know about your blog, bar a select few, and will want to keep it out of the search engines. This involves inserting a robots.txt into your blog that will tell the engines to stay away. To find out more, visit the Robotstxt website.

Another option is to avoid blog hosts and have your own website hosted anonymously in a far-off country - preferably one hostile to your own government - making court orders for disclosure meaningless. You then access all this via Tor from a cybercafé with an encrypted USB thumb drive.

However, investigators always follow the money, so paying by credit card or PayPal may lead them to you. One simple option is to only pay for services with a pre-paid credit card.

Even so, there is no true hiding place. It’s no secret that the security services can employ sophisticated algorithms to analyze any blog’s writing style and idiosyncrasies. All they have to do then is compare the patterns with all the emails they intercept and simply select the culprit from among trillions.

See more work by the author, Conrad Jaeger, here.

3 WAYS TO SHOW YOUR SUPPORT

ONE-TIME DONATION

Just use the simple form below to make a single direct donation.

DONATE NOW

MONTHLY DONATION

Be a sustaining sponsor. Give a reacurring monthly donation at any level.

GET SOME MERCH!

Now you can wear your support too! From T-Shirts to tote bags.

SHOP TODAY

Sign Up

Article Tabs

What remains unknown is whether post-truth Republicans will succeed in 2024 as the Nazis did in 1933.

Based on details that have emerged about Trump’s presidential agenda, the far-right Heritage Foundation plans for the next GOP president to have all the tools necessary to demolish multicultural democracy and establish a white, Christian ethnostate that imposes a gender apartheid not unlike the Taliban’s Afghanistan.

Donald Trump, Hitler

Like Hitler, Trump has a unique command of propaganda, a captivating public presence, and he knows how to drive home narratives beneficial to him and harmful to his enemies.

Trump’s brand of hyper-nationalism combined with the intense consolidation of executive power follows the same playbook as fascistic leaders in other countries like India,Russia, Hungary, Turkey, Egypt, Italy and Argentina, among others.

The Florida governor’s humiliating loss has a dark undertone: Most Republicans, and many independents, apparently have a craving for the unchecked lawless vengeance that Trump has promised if he wins a second term.

What remains unknown is whether post-truth Republicans will succeed in 2024 as the Nazis did in 1933.

Based on details that have emerged about Trump’s presidential agenda, the far-right Heritage Foundation plans for the next GOP president to have all the tools necessary to demolish multicultural democracy and establish a white, Christian ethnostate that imposes a gender apartheid not unlike the Taliban’s Afghanistan.

Donald Trump, Hitler

Like Hitler, Trump has a unique command of propaganda, a captivating public presence, and he knows how to drive home narratives beneficial to him and harmful to his enemies.

Trump’s brand of hyper-nationalism combined with the intense consolidation of executive power follows the same playbook as fascistic leaders in other countries like India,Russia, Hungary, Turkey, Egypt, Italy and Argentina, among others.

The Florida governor’s humiliating loss has a dark undertone: Most Republicans, and many independents, apparently have a craving for the unchecked lawless vengeance that Trump has promised if he wins a second term.

Based on details that have emerged about Trump’s presidential agenda, the far-right Heritage Foundation plans for the next GOP president to have all the tools necessary to demolish multicultural democracy and establish a white, Christian ethnostate that imposes a gender apartheid not unlike the Taliban’s Afghanistan.

Posted 3 weeks 3 days ago

Trump’s brand of hyper-nationalism combined with the intense consolidation of executive power follows the same playbook as fascistic leaders in other countries like India,Russia, Hungary, Turkey, Egypt, Italy and Argentina, among others.

Posted 1 month 2 weeks ago
Donald Trump, Hitler

Like Hitler, Trump has a unique command of propaganda, a captivating public presence, and he knows how to drive home narratives beneficial to him and harmful to his enemies.

Posted 1 month 1 week ago

What remains unknown is whether post-truth Republicans will succeed in 2024 as the Nazis did in 1933.

Posted 1 week 2 days ago

Based on details that have emerged about Trump’s presidential agenda, the far-right Heritage Foundation plans for the next GOP president to have all the tools necessary to demolish multicultural democracy and establish a white, Christian ethnostate that imposes a gender apartheid not unlike the Taliban’s Afghanistan.