VPN AND older virtual machine - like Win XP, or Win 7.
That way the browsers on your virtual machine only leak ENTIRELY DIFFERENT identifying information than your main PC would do through a browser.
It's called "Browser fingerprinting" and there's hundreds of ways to do it.
One such way is make a canvas on an invisible web page, draw some text in a particular font - and they can tell some of what your OS is.
Do that with cookies,HTML 5 local filesystem files, browser name and version, (used to) Flash super cookies, page referer (from the PREVIOUS site you were on!), FAVICON cache list_... all this adds up to a UNIQUE BROWSER and therefore user.
See that browser again with a new IP AND different Reddit account?
They KNOW you're the same person.
VPN AND VIRTUAL MACHINE. DO NOT visit or log in to ANY personal account sites you have on it.
Damn stepping it up even more. So clearly you know some technical details here. How about this. Host system on VPN. VM running win xp, with a different VPN service routed through the host’s VPN service. Also windows xp vm browsing on brave through tor. Is this full ghost mode?
Any VM runs on physical hardware that will have Ethernet hardware, and ALL Ethernet hardware at its PHY layer each has a unique ID. That means the VM and any other OS on the machine all have to talk to the same IDed hardware regardless. So a VM does not buy you true anonymity. Plus, any tool that can find a way to query the machine's BIOS can get the unique MAC address and then you're identifiable. The MAC address cannot be changed, it is permanent. Also, packets contain that unique ID; with a VPN, the provider does know your MAC address, so a corrupt provider can give info on you if an agency demands it.
MAC address can be changed though? You can do this in the network settings of the virtualization software. I use virtualbox so at least I am certain you can with it. Also, there are tools to spoof your MAC address.
Tor is solid. At least 3 hops, each machine is the only one that can see the previous link. This means they would have to beach all three of those nodes. I’ve noticed using Tor through brave they use 5 hops. They are also random and change at intervals. In my opinion tor does provide some serious privacy. Add a vpn to the host machine running tor through the browser in a vm with a spoofed MAC and I don’t think anyone is going to be able to track you down unless they are the NSA dumping some heavy resources on you
VPN AND older virtual machine - like Win XP, or Win 7.
That way the browsers on your virtual machine only leak ENTIRELY DIFFERENT identifying information than your main PC would do through a browser.
It's called "Browser fingerprinting" and there's hundreds of ways to do it.
One such way is make a canvas on an invisible web page, draw some text in a particular font - and they can tell some of what your OS is.
Do that with cookies,HTML 5 local filesystem files, browser name and version, (used to) Flash super cookies, page referer (from the PREVIOUS site you were on!), FAVICON cache list_... all this adds up to a UNIQUE BROWSER and therefore user.
See that browser again with a new IP AND different Reddit account?
They KNOW you're the same person.
VPN AND VIRTUAL MACHINE. DO NOT visit or log in to ANY personal account sites you have on it.
Damn stepping it up even more. So clearly you know some technical details here. How about this. Host system on VPN. VM running win xp, with a different VPN service routed through the host’s VPN service. Also windows xp vm browsing on brave through tor. Is this full ghost mode?
Any VM runs on physical hardware that will have Ethernet hardware, and ALL Ethernet hardware at its PHY layer each has a unique ID. That means the VM and any other OS on the machine all have to talk to the same IDed hardware regardless. So a VM does not buy you true anonymity. Plus, any tool that can find a way to query the machine's BIOS can get the unique MAC address and then you're identifiable. The MAC address cannot be changed, it is permanent. Also, packets contain that unique ID; with a VPN, the provider does know your MAC address, so a corrupt provider can give info on you if an agency demands it.
For more info read: https://stackoverflow.com/questions/23935095/how-are-mac-addresses-used-in-routing-packets#23935402
MAC address can be changed though? You can do this in the network settings of the virtualization software. I use virtualbox so at least I am certain you can with it. Also, there are tools to spoof your MAC address.
Yes. I guess a dedicated person could find the right tools to implement this. The average person though with no specialized tools would be vulnerable.
Thoughts on Tor?
I’ve heard mixed things.
Tor is solid. At least 3 hops, each machine is the only one that can see the previous link. This means they would have to beach all three of those nodes. I’ve noticed using Tor through brave they use 5 hops. They are also random and change at intervals. In my opinion tor does provide some serious privacy. Add a vpn to the host machine running tor through the browser in a vm with a spoofed MAC and I don’t think anyone is going to be able to track you down unless they are the NSA dumping some heavy resources on you