Privacy   |    Financial   |    Current Events   |    Self Defense   |    Miscellaneous   |    Letters To Editor   |    About Off The Grid News   |    Off The Grid Videos   |    Weekly Radio Show

Internet Privacy Tricks The NSA Doesn’t Want You To Know

Image source: Forbes

Image source: Forbes

These days, not only is technology getting confusing, but it’s also getting downright intimidating. When you consider the fact that these massive tech giants, such as Google, Comcast and Verizon, are collecting massive amounts of data on we, the average-Joes of America, the technological landscape can seem more oppressive than empowering.

With that said, there seems to be no shortage of these “trusted third parties,” sharing our information with the NSA. Now I’m not saying that I plan on pulling a “Snowden-gag,” but let’s just say that I’m still not exactly comfortable with the idea of having all of my personal information flying around out there in the cyberwind. Fourth Amendment aside, I’m also just not fond of being watched…

And I’m sure that many of you will agree with me on this point, but I believe it’s just bad manners to stare at strangers without their consent. So, here are three good ways to protect your online anonymity, so that you don’t have to feel like some unionized NSA employee isn’t sitting behind some computer screen and staring at your info for no apparent (or tyrannically nefarious) reason.

No. 3: Use Your Good Ol’ Fashioned Horse Sense

The saying “common sense isn’t common” is especially true when it comes to consumer tech, because people use this tech expressly for convenience and increased capabilities. With that said, convenience and increased capabilities are usually going to require your willingness to divulge even more of your data with every little upgrade.

Learn How To Become Invisible In Today’s Surveillance State!

For instance, there really isn’t a way to use wearable tech like Google Glass and smart watches that record your vital signs and sleep cycles while maintaining any expectation of privacy or anonymity. Let’s face it: If you’re at odds with Uncle Sam for adding facial recognition software and fingerprinting to your state’s DMV database, but at the same time you’re OK with the facial recognition capability on your shiny new LG G3, then the point becomes moot. Now that 2015 is ushering in the new age of the “web (internet) of things,” then that means you’ve got to cut out the things in order to avoid being trapped in the web.  It just makes the spider’s life just that much more difficult when its meal isn’t dangling in front of him.

So if you’re a privacy-conscious individual, or you want to maintain a technological off-grid-type lifestyle, then you’re probably going to have to part ways with Facebook. Anytime your real identity is linked with a tech device, then you’re basically asking for attention from your friendly neighborhood spider.

Of course, there are times when we’ll need to interact with the info-guzzlers, so it helps to know how to do this without divulging our sensitive information in the process. I’m talking about compartmentalizing your info, designating certain devices/settings for certain tasks. So, the spider might determine that a certain Facebook profile is into survival and prepping, but it doesn’t know how the user of said Facebook profile is purchasing her preps. Why? Because she uses a different device for that (including a different location/IP address).

That there makes for one confused spider.

Image source:

Image source:

No. 2: Cookies, Flash and the Opt-Out

Essentially, in order for a company successfully to track you and your device, it must place markers in your browser — or just downright hack your computer’s hard drive in a “legal” way.  The two most-used and basic ways they do this are…

  • Cookies
  • Flash

Whether it’s rumored that your particular browser doesn’t track you or not, it’s easy enough to remove all doubt when it comes to cookies. These (unfortunately) have nothing to do with chocolate chips and have everything to do with loading data onto your device, which talks to the tracker’s servers and provides them information about your browser’s history. For instance, that’s how random websites all seem to know that you purchased a Vortex optic last Thursday for your Remington 700, because they’ve all been trying to sell you on a rifle bipod since then.  Coincidence? No.

When it comes to Flash, this is something that you’re going to have to disable, using add-ons for your browser, such as NoScript. What this add-on does is blocks Flash, which in turn, blocks its ability to upload a “script” onto your computer or mobile device.  Also, since advertisements seem to do this on an annoyingly regular basis — and since nobody likes ads anyway — I strongly recommend using Adblock Plus. Trust me, it’s a wonderful, wonderful thing.

Overall, it’s basically impossible to opt-out of every attempt for something online to track you, especially if you’re using anything from Google or Apple. However, they do offer opt-out options, such as the DoubleClick opt-out, which basically places a patch over a raging information leak. No, it’s not perfect, but it certainly helps.

Amazing Breakthrough In Compact Portable Backup Power — Charges Your Phone, Laptop And Even Jump Starts Your Car!

No. 1: Learn Linux Basics (MAC and Tor)

Now, if you’re looking for some serious anonymity and protection from prying eyes, then we’re going to need to get fairly technical.  No. 2 was all about playing defense and trying to maintain privacy, but this method is basically the active approach to achieving relatively strong anonymity. Also, this is where it’s important to understand that privacy and anonymity are two different things.

First, privacy is basically no more than surfing the web and using online services in your own name — but playing on somebody else’s terms and trusting their word that you’re not being tracked.

Anonymity, however, is the act of taking your privacy into your own hands. Rather than politely asking others not to look at you, you’re essentially putting on a mask, and nobody can identify you, whether they want to or not.

I believe that the best way to buck anything trying to track your hardware is to learn how to use Linux-based operating system distributions (or distros), such as…

  • Ubuntu [user-friendly]
  • Debian [more stable]
  • Tails [developed purely for anonymity-purposes … and also quite user friendly]

The reason for this is because you are booting an entirely different operating system from your existing computer or Android phone, which means that all of your original settings that have been leaving digital fingerprints all over the web are pretty much altered to Linux “factory settings.” Oh, by the way, just about anything Linux is open-source (this is, free).

Now, I say “pretty much,” because you will have two other “markers” that you’ll need to deal with. This is very easy to do, using Linux command-line programs, such as macchanger. The issue is that you’ll want to change, or “spoof,” your current MAC (media access control) address, which is essentially your device’s specified key to accessing the Internet. MAC addresses are often registered to match serial numbers, so if that device (or Wi-Fi card) was purchased or acquired in such a way that could connect the dots to you … then you’ve been painted.

Also, in most cases, Linux operating systems tend to have a fraction of the privacy problems that most other operating systems do (Windows, I’m looking at you), because it’s just A LOT harder to load Flash and unwanted scripts onto an OS as security-conscious and rarely used as a Linux distro.

Image source:

Image source:

Speaking of this, I’ve missed a few talking points…

If One Were So Inclined

So, what’s the other way that you can be tracked online?  It’s your most obvious trail marker of them all: your IP (Internet Protocol) address. However, do you remember my mentioning of Mr. Snowden? Well, the humanitarian traitor/hero actually leaked information about a specific web browser, which can really do a good job at obliterating even the NSA’s ability to discover who you are and where you’ve logged on.

It’s called Tor, and though it’s had its hiccups in the past, I believe that this browser can still be a useful tool, especially if you’re not a super high-priority agency target, and are basically just trying to make sure that Starbucks isn’t extracting your web whereabouts (because they can’t use end-to-end correlation attacks). What it does is sends your IP address through a fog, and when inside that fog, Tor bounces your signal from node-to-node around the world.

And when you arrive at your intended web destination, then nobody can recognize you. You look like some guy signing on from Poland, but really, you’re a lady from Portland.

However, if you’re looking for a way to maintain almost complete anonymity, even down to leaving no footprints on your own hard drive, then boot the Tails (Linux distro) operating system from a thumb drive or live DVD on your computer. Not only does Tails do everything from eliminating scripts, cookies and implements the use of I2P and Tor, but it’s also going to make your computer “forget” everything you did on Tails when you were using it.

Tails can do this, because it’s designed to run only from your computer’s RAM (and not use your hard drive storage). If you want to save anything from your Tails session on your computer, then the operating system will ask explicitly beforehand. And that’s where Tails got its name…

  • The
  • Amnesic …noun: forgetfulness; loss of long-term memory.
  • Incognito …adjective & adverb: (of a person) having one’s true identity concealed.
  • Live
  • System

It’s made by the same folks that made the Tor browser, so you can be fairly certain about the privacy/anonymity consciousness of this kind of operating system. So, you could use Tails for basically the highest level of anonymity possible for those of us who aren’t professional hackers.

What technical advice would you add? Do you believe you truly can “surf” anonymously? Share your tips in the section below:

You’re Being Watched: 7 Sneaky Ways The Government Is Tracking Your Every Move. Read More Here.

© Copyright Off The Grid News


  1. Bicyclebobs Prescott Wisc

    I recently purchased a specific valved adapter for small bicycle tubes online from Walmart and what do you think happened. I’m getting bombed by bike specific adds from Wally World. We’ll there are some pretty good deals anyway…

  2. You can also use a Virtual Private Network such as Staganos. Its good for your smart phone and for your PC. You can choose VPN servers from all over the world and your connection is encrypted end to end. It’s great on public Wi-Fi, no one can snoop on your connection.

  3. Unfortunately, the term “Internet Privacy” has become an oxymoron.

  4. been using this VPN for years, encrypted end to end, servers all over the world chose a different IP every time you logon. Your ISP can’t even track you. I also use Ccleaner and Glary Utilities to clean up my computer. Much faster than Thor, I tried but was to slow on my computer.
    Every body should be on a VPN network or not use the internet unless you don’t care about your privacy

  5. Hi,
    What about an anonymous proxy server? There are public servers that allow anyone to route through and they have hardware and software firewalls that cause a reverse trace route to end with them. Thus your web activity is, for example, coming from Russia while you are in Canada. The IP will of course be the one assigned by the server. If you are ultra paranoid you can route through several proxy servers using VPN which will besides multiplying the difficulty of tracking you will encrypt your information. There are also pay subscription proxy servers like Rayner. Finally PC world has a excellent article on how to set up a anonymous email account which if taken a few steps further will allow you to get a Google voice account. Since your IP address is anonymous and so is your email address (s) and also your phone number, you are fairly well protected. BUT someone is at some point going to notice. The question then will be WHY does this person take all these measures to remain anonymous? If your neighbor arrived home at all hours of the night with black duffle bags and all attempts to befriend him are met with polite but avoidance behavior and generalities. If you asked him what he did and he said “sales” but refused to elaborate. What would you think? Well if you take all the measures above you will be anonymous to 99% of the population but that 1% are not people you want looking into who you are. In closing, got nothing to hide? Then act like it. Got something to hide? Don’t do it online keep it old school.

    • Well, Mr. “John Smith,” I suppose you’re using your real name because you’ve “got nothing to hide” and thus you’re “act[ing] like it.” Good for you, such probity apparently makes you feel all superior and pious.
      It may never have occurred to your narrowly provincial mind that there are as many reasons that people may desire to retain their privacy as there are people who desire to retain their privacy.

      Why do people wear clothing? A nudist might challenge a clothed person to bare all with your same taunt: “If you have nothing to hide, then act like it. Take it all off!” That nudist has a perspective problem. While the nudist’s beliefs, values and worldview might favor the public display of bodies as nature created them, many other people prefer to wear clothing for their own reason(s). Some might like to choose colors, experience fabrics and textures against their skin, follow or set style trends, impress or unsettle others, or simply express their personality through adornments. Most people would acknowledge the occasional value of clothing for physical comfort and protection from the elements. Yet, an air traveler in the USA is forced to choose between being X-ray undressed or physically sexually molested. In general, people who wear clothes value their privacy, and want to retain the right to choose who may view their undressed body, who may photograph it, and what may be done with those images.

      I use the clothing analogy and invoke TSA’s egregious violations to help you understand that there are many very legitimate reasons why people value their privacy and want to retain control of their personal information. Your taunt about having “nothing to hide – act like it” is just SO WRONG in a land where the people are supposedly the sovereigns and the government is the servant. The more the government knows about us individually and collectively, the more power the government can wield and the less free we are.

Leave a Reply

Your email address will not be published. Required fields are marked *