<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>anonymity &#8211; Privacy News Online by Private Internet Access VPN</title>
	<atom:link href="https://www.privateinternetaccess.com/blog/tag/anonymity/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privateinternetaccess.com/blog</link>
	<description>Online privacy news from around the world.</description>
	<lastBuildDate>Wed, 26 Aug 2020 22:18:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Coming soon: everyone&#8217;s genetic anonymity undermined by distant relatives &#8211; and there&#8217;s nothing you can do about it</title>
		<link>https://www.privateinternetaccess.com/blog/coming-soon-the-death-of-genetic-privacy/</link>
		
		<dc:creator><![CDATA[Glyn Moody]]></dc:creator>
		<pubDate>Sat, 20 Oct 2018 16:00:41 +0000</pubDate>
				<category><![CDATA[General Privacy News]]></category>
		<category><![CDATA[anonymity]]></category>
		<category><![CDATA[databases]]></category>
		<category><![CDATA[dna]]></category>
		<category><![CDATA[dna testing]]></category>
		<category><![CDATA[surveillance]]></category>
		<guid isPermaLink="false">https://www.privateinternetaccess.com/blog/?p=8845</guid>

					<description><![CDATA[<p>Earlier this year, Privacy News Online wrote about how long-standing linked but unsolved murder cases were resolved by checking genetic material found at some of the crime scenes against online DNA-based genealogy sites. The partial matches with others on the database indicated that they were relatives of the murderer. By drawing up a family tree &#8230; <a href="https://www.privateinternetaccess.com/blog/coming-soon-the-death-of-genetic-privacy/" class="more-link">Continue reading<span class="screen-reader-text"> "Coming soon: everyone&#8217;s genetic anonymity undermined by distant relatives &#8211; and there&#8217;s nothing you can do about it"</span></a></p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/coming-soon-the-death-of-genetic-privacy/">Coming soon: everyone&#8217;s genetic anonymity undermined by distant relatives &#8211; and there&#8217;s nothing you can do about it</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Earlier this year, Privacy News Online wrote about <a href="https://www.privateinternetaccess.com/blog/2018/05/the-growing-threat-to-privacy-from-big-data-forensics-and-false-positives/">how long-standing linked but unsolved murder cases</a> were resolved by checking genetic material found at some of the crime scenes against online DNA-based genealogy sites. The partial matches with others on the database indicated that they were relatives of the murderer. By drawing up a family tree containing some 1000 people, the investigators were able to work out who might be the killer.</p>
<p>The genetic genealogist who played a key role in establishing the identity of the murderer was <a href="https://www.nytimes.com/2018/08/29/science/barbara-rae-venter-gsk.html">Barbara Rae-Venter</a>. The New York Times has just published a fascinating tale of how Rae-Venter used DNA tests and publicly-available genetic information to establish the identity of <a href="https://www.nytimes.com/interactive/2018/10/15/science/gedmatch-genetic-sleuthing.html">a woman who was kidnapped as a child</a>. Once more, Rae-Venter searched DNA-based genealogical sites for rough matches with the victim&#8217;s DNA. From these, she was ultimately able to establish the kidnapped girl&#8217;s family tree and thus identity.</p>
<p><a href="https://www.nytimes.com/2018/10/15/science/gedmatch-genealogy-cold-cases.html">The increasingly successful use of this technique</a> raises an important question: given a DNA sample, how likely is it that there will be a rough match among consumer genetics databases? <a href="http://science.sciencemag.org/content/early/2018/10/10/science.aau4832">A US-Israeli group of researchers have published a paper exploring exactly that issue</a>, and the results have major implications for privacy.</p>
<p>The researchers used a dataset of 1.28 million individuals who had sent their DNA to be analyzed by one of the increasingly-popular consumer genomics companies such as <a href="https://www.23andme.com/en-int/">23andMe</a>. They took random individuals from this pool, and searched for any distant family members that might also be present in the dataset. Interestingly, they did not look for close relationships, because there is apparently a tendency for near-relatives to get tested together, which would skew the results for finding matches. Distant relatives are less likely to act in a coordinated fashion, and so searching for such matches give a better indication of the true power of this kind of genetic analysis.</p>
<p>In 15% of the searches, a match which corresponded to a second cousin or closer relative was found. In 60% of the searches carried out by the research team, a match which corresponded to a third cousin or closer relative was found. That&#8217;s significant, because the case involving the unsolved murders mentioned above used matches at this level. The new paper therefore indicates that for around 60% of the genetic pool studied there would be a match that would probably be good enough to identify them if they had left DNA at a location.</p>
<p>However, it&#8217;s important to note that the dataset used by the researchers was not representative of the US population of a whole. About 75% of the 1.28 million individuals were primarily of North European genetic background. This means that individuals primarily from that background were more likely to have a match than individuals whose genetic background was primarily from sub-Saharan Africa, say. Nonetheless, the figures in the study still give a good idea of how easy it has become to find matches for genetic material in DNA genealogy databases.</p>
<p>The researchers went on to calculate how big the pool of DNA samples would have to be to make the probability of finding a rough match near to certainty. They found that a genetic database needs to cover only 2% of the target population to provide a third cousin match to nearly any person:</p>
<blockquote><p>we predict that with a database size of [about] 3 million US individuals of European descent (2% of the adults of this population), over 99% of the people of this ethnicity would have at least a single 3rd cousin match and over 65% are expected to have at least one 2nd cousin match. With the exponential growth of consumer genomics, we posit that such database scale is foreseeable for some 3rd party websites in the near future.</p></blockquote>
<p>It may take a little longer, but the same will be true for people who descend from most other ethnic groups. The researchers went on to consider how easy it would be to establish the exact identity of a person of interest after finding one or more distant relatives in a familial search. The group tried to reduce the number of people who would need to be interviewed, using basic demographic information, such as geography, age, and gender:</p>
<blockquote><p>On the basis of counting relevant relatives of the match, the initial list of candidates contains on average [about] 850 individuals. Our simulations indicate that localizing the target to within 100 miles will exclude 57% of the candidates on average. Next, availability of the target’s age to within [plus or minus five years] will exclude 91% of the remaining candidates. Finally, inference of the biological sex of the target will halve the list to just around 16-17 individuals, a search space that is small enough for manual inspection.</p></blockquote>
<p>This has important implications for people who have provided their DNA for scientific purposes, and allowed it to be released anonymously. As the researchers go on to show in their paper, it is now possible to take DNA from a supposedly anonymous dataset, find matches in public genetic databases, and then work out the identity of the individual by building a family tree. That&#8217;s a big problem, because it means that it will be possible to put names to DNA sequences that may have easily-identified medical problems. Clearly, this might pose a real privacy challenge for people who have donated their DNA in the belief that it would remain anonymous, and that their possibly-serious medical conditions would never be connected with them.</p>
<p>That new capability may impact the willingness of people to allow their DNA to be released for scientific research. But there is a broader problem that will affect everyone. The research described above indicates that soon, US individuals of European descent will have lost their genetic anonymity. Those descended from other major populations will find themselves in a similar situation in due course.</p>
<p>Already, given a DNA sample, distant relatives can probably be found. That&#8217;s the case whether or not the individual concerned had uploaded DNA to a consumer genomics company. And from those close relatives it is likely that a family tree could be built up that would allow them to be correctly identified. Moreover, as more people add their genetic profiles to genealogical databases, the easier, quicker and cheaper it will become to name them.</p>
<p>It is not unreasonable to assume that in a few years&#8217; time, there will be well-populated family trees for more or less everyone in countries where consumer genomics is offered as a low-cost service. As a result, for almost any genetic material found on an object, or at a site, it will be possible to establish the likely identity of the person who left it there. Since we are continuously shedding our DNA wherever we go, this could become the perfect way to identify people and to track their movements and activities – without the need to install any surveillance equipment beforehand.</p>
<p>Featured image by <a href="https://www.23andme.com/en-int/">23andMe</a>.</p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/coming-soon-the-death-of-genetic-privacy/">Coming soon: everyone&#8217;s genetic anonymity undermined by distant relatives &#8211; and there&#8217;s nothing you can do about it</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Brazilian politician: “Freedom of expression is guaranteed, but it cannot be anonymous”</title>
		<link>https://www.privateinternetaccess.com/blog/brazilian-politician-freedom-expression-guaranteed-cannot-anonymous/</link>
		
		<dc:creator><![CDATA[Caleb Chen]]></dc:creator>
		<pubDate>Tue, 10 Oct 2017 13:23:23 +0000</pubDate>
				<category><![CDATA[General Privacy News]]></category>
		<category><![CDATA[Governments]]></category>
		<category><![CDATA[anonymity]]></category>
		<category><![CDATA[brazil]]></category>
		<category><![CDATA[freedom of expression]]></category>
		<guid isPermaLink="false">https://www.privateinternetaccess.com/blog/?p=6537</guid>

					<description><![CDATA[<p>Freedom of expression is not doing well in Brazil. A new law approved last Thursday by the Brazilian Congress allows political parties and candidates to force social media companies to remove any content they feel is defamatory or offensive and posted by an anonymous account. Social media companies would need to provide the full name &#8230; <a href="https://www.privateinternetaccess.com/blog/brazilian-politician-freedom-expression-guaranteed-cannot-anonymous/" class="more-link">Continue reading<span class="screen-reader-text"> "Brazilian politician: “Freedom of expression is guaranteed, but it cannot be anonymous”"</span></a></p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/brazilian-politician-freedom-expression-guaranteed-cannot-anonymous/">Brazilian politician: “Freedom of expression is guaranteed, but it cannot be anonymous”</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Freedom of expression is not doing well in Brazil. A new law approved last Thursday by the Brazilian Congress allows political parties and candidates to force social media companies to remove any content they feel is defamatory or offensive and posted by an anonymous account. Social media companies would need to provide the full name and identification numbers, including social security number, in order to leave the comment online. The new law was passed late in the Congressional session as part of rules for next year&#8217;s general elections &#8211; despite heavy resistance from both privacy advocates and Brazilian media.</p>
<p>Defending the new law which he penned, Brazilian Congressman Áureo of Brazil’s Solidariedade party said he proposed the rule to bring transparency to online speech. He said:</p>
<blockquote><p>“Freedom of expression is guaranteed, but it cannot be anonymous.”</p></blockquote>
<p>One doesn&#8217;t need to look far to see the potential chilling effects this will have on free speech. Another question is whether or not social media platforms will even comply with Brazilian orders. Facebook&#8217;s <a href="https://www.privateinternetaccess.com/blog/2016/03/facebook-exec-arrested-in-brazil-highlights-troublesome-language-barrier-on-civil-rights/">WhatsApp</a> is a famous example in Brazil, having been banned multiple times for refusing to give up metadata on Brazilian users.</p>
<h2>Brazilians speak out against their further restricted freedom of expression</h2>
<p>Several associations representing newspapers, television stations, radio stations, and even magazines &#8211; the type of sites that would invariably end up having anonymous comments about political parties and candidates on their social media accounts &#8211; spoke out vehemently against the new law. They don&#8217;t like that politicians can bypass the judicial process to stifly freedom of expression. The associations said:</p>
<blockquote><p>“Brazil’s internet legal framework clearly states that only through a judicial order it is possible to force the withdrawal of online content.”</p></blockquote>
<p>Carlos Affonso Souza, director at the Institute of Technology and Society, also voiced his concern about the change &#8211; telling <a href="https://uk.reuters.com/article/uk-brazil-politics-censorship/brazil-congress-passes-law-restricting-online-criticism-of-candidates-idUKKBN1CB02S?il=0" target="_blank" rel="noopener noreferrer">Reuters</a>:</p>
<blockquote><p>“That piece of legislation will transform candidates and parties into electoral judges, with powers to take out of the web any content they consider offensive to them.&#8221;</p></blockquote>
<p>Like this article? Get notified by <a href="https://feedburner.google.com/fb/a/mailverify?uri=privacyonline">email</a> when there is a new article or signup to receive the latest news in the fight for Privacy via the <a href="http://feeds.feedburner.com/privacyonline">Online Privacy News RSS Feed</a>.</p>
<p>Featured image from <a href="https://www.flickr.com/photos/rhinman/3757974502" target="_blank" rel="noopener noreferrer">Rachel Hinman</a> via <a href="https://creativecommons.org/licenses/by/2.0/" target="_blank" rel="noopener noreferrer">CC 2.0</a>.</p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/brazilian-politician-freedom-expression-guaranteed-cannot-anonymous/">Brazilian politician: “Freedom of expression is guaranteed, but it cannot be anonymous”</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Another threat to your privacy: the way you write</title>
		<link>https://www.privateinternetaccess.com/blog/another-threat-privacy-way-write/</link>
		
		<dc:creator><![CDATA[Glyn Moody]]></dc:creator>
		<pubDate>Wed, 13 Sep 2017 14:02:51 +0000</pubDate>
				<category><![CDATA[General Privacy News]]></category>
		<category><![CDATA[Governments]]></category>
		<category><![CDATA[amazon]]></category>
		<category><![CDATA[anonymity]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[nsa]]></category>
		<guid isPermaLink="false">https://www.privateinternetaccess.com/blog/?p=6239</guid>

					<description><![CDATA[<p>The &#8216;creator&#8217; of Bitcoin, Satoshi Nakamoto, has been identified. That, at least, is the claim in a recent article by Alexander Muse on Medium. But don&#8217;t get too excited. The article not only fails to name him/her/them, Muse admits he doesn&#8217;t know, either. All he will say is that the Department of Homeland Security (DHS) &#8230; <a href="https://www.privateinternetaccess.com/blog/another-threat-privacy-way-write/" class="more-link">Continue reading<span class="screen-reader-text"> "Another threat to your privacy: the way you write"</span></a></p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/another-threat-privacy-way-write/">Another threat to your privacy: the way you write</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The &#8216;creator&#8217; of Bitcoin, Satoshi Nakamoto, has been identified. That, at least, is <a href="https://medium.com/@amuse/how-the-nsa-caught-satoshi-nakamoto-868affcef595">the claim in a recent article</a> by Alexander Muse on Medium. But don&#8217;t get too excited. The article not only fails to name him/her/them, Muse admits he doesn&#8217;t know, either. All he will say is that the Department of Homeland Security (DHS) has discovered the true identity of Satoshi Nakamoto, but that it won&#8217;t publicly confirm that fact. Not much of a story, you might think. But the real interest lies in how the DHS is alleged to have discovered Bitcoin&#8217;s biggest secret:</p>
<blockquote><p>&#8220;Throughout the years Satoshi wrote thousands of posts and emails and most of which are publicly available. According to my source, the NSA was able to the use the ‘writer invariant’ method of stylometry to compare Satoshi’s ‘known’ writings with trillions of writing samples from people across the globe.&#8221;</p></blockquote>
<p>The application of what is known as <a href="https://en.wikipedia.org/wiki/Stylometry">stylometry</a> is only useful if you have other holdings of text linked to named individuals, which can be compared to a kind of stylistic fingerprint extracted from the texts under study. The problem is that Satoshi Nakamoto could be anyone, anywhere. That means stylometry is only likely to be helpful if you have a huge database of writings that includes everyone on the planet who is active on the Internet; people who are not online can probably be excluded since they are unlikely to have come up with something as inherently Net-based as Bitcoin. Although we are not generally aware of the fact, the NSA has just such a database, as the Medium article explains:</p>
<blockquote><p>&#8220;The NSA then took bulk emails and texts collected from their mass surveillance efforts. First through PRISM (a court-approved front-door access to Google and Yahoo user accounts) and then through MUSCULAR (where the NSA copies the data flows across fiber optic cables that carry information among the data centers of Google, Yahoo, Amazon, and Facebook) the NSA was able to place trillions of writings from more than a billion people in the same plane as Satoshi’s writings to find his true identity. The effort took less than a month and resulted in positive match.&#8221;</p></blockquote>
<p>Again, leaving aside the fact that we are not told the supposed true identity of Bitcoin&#8217;s creator, what is much more relevant for readers of this blog is that the NSA possesses trillions of texts written by billions of people, and can therefore fruitfully apply stylometry to work out the author of a document, provided it is substantial enough to make any match that is found statistically meaningful.</p>
<p>This means for practical purposes, that it is very difficult to write longer documents, or produce sets of smaller texts, anonymously. All the NSA needs to do is to calculate the stylometric fingerprint for a document or group of posts, and then compare it with the huge holdings of texts with identifiable authors in its database. Of course, the NSA will not expend large amounts of time and money doing so unless the document is of particular importance or – as in the case of Satoshi Nakamoto &#8211; the person sought is of particular note.</p>
<p>The quantity of digital data being generated <a href="https://www.forbes.com/sites/bernardmarr/2015/09/30/big-data-20-mind-boggling-facts-everyone-must-read/">continues to grow rapidly</a>. As a result, the number of emails and social media posts that the NSA must store in order to have a comprehensive record of everyone&#8217;s writing style is also growing rapidly. However, don&#8217;t start hoping that the NSA will be overwhelmed, and forced to store only a portion of that data flood. Last December, Amazon announced a new service called the <a href="https://aws.amazon.com/blogs/aws/aws-snowmobile-move-exabytes-of-data-to-the-cloud-in-weeks/">AWS Snowmobile</a>:</p>
<blockquote><p>&#8220;This secure data truck stores up to 100 PB of data and can help you to move exabytes to AWS in a matter of weeks (you can get more than one if necessary). Designed to meet the needs of our customers in the financial services, media &amp; entertainment, scientific, and other industries, Snowmobile attaches to your network and appears as a local, NFS-mounted volume.&#8221;</p></blockquote>
<p>The AWS Snowmobile is primarily designed to move petabytes – or even exabytes – from company data centers to Amazon&#8217;s AWS cloud. But if Amazon can put that much storage in a single container, think how much the NSA might have crammed into its extensive facilities. Given that ten AWS Snowmobile containers can store an <a href="https://en.wikipedia.org/wiki/Exabyte">exabyte</a>, the NSA could easily by running databases holding a <a href="https://en.wikipedia.org/wiki/Zettabyte">zettabye</a> or even a <a href="https://en.wikipedia.org/wiki/Yottabyte">yottabyte</a>. To put that in perspective, a Wired article on Amazon&#8217;s product notes that a single AWS Snowmobile could hold five copies of the <a href="https://archive.org/">Internet Archive</a> – effectively a backup copy of the Web, past and present &#8211; which contains &#8220;only&#8221; about 18.5 petabytes of unique data. Storing every email and social media post it intercepts is clearly quite feasible for the NSA.</p>
<p>Even if it doesn&#8217;t (currently) do this, there is little doubt that the NSA, and other top intelligence agencies in other countries, have vast holdings of our digital activities. That&#8217;s important not just for existing applications like stylometric analysis, but particularly for training future artificial intelligence systems. Indeed, most of the power of such AI tools comes from feeding in lots of relevant data to hone the system. Whatever algorithms the NSA and other spy agencies have developed, they are probably already pretty good at analyzing our digital lives thanks to the huge data stores available for training.</p>
<p>That&#8217;s the bad news. Some good news is that just as stylometric analysis is gaining new power through the application of technology, so it can perhaps be defeated by technology. There&#8217;s an open source project on GitHub called <a href="https://github.com/psal/anonymouth">Anonymouth</a>:</p>
<blockquote><p>&#8220;a Java-based application that aims to give users to tools and knowledge needed to begin anonymizing documents they have written.</p>
<p>It does this by firing up JStylo libraries (an author detection application also developed by [the Privacy, Security and Automation Lab at Drexel University, Philadelphia]) to detect stylometric patterns and determine features (like word length, bigrams, trigrams, etc.) that the user should remove/add to help obsure their style and identity.&#8221;</p></blockquote>
<p>And so the great digital arms race continues, between those wanting to preserve their anonymity and privacy online, and those wishing to strip them away.</p>
<p>Featured image by <a href="https://aws.amazon.com/snowmobile/">Amazon</a>.</p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/another-threat-privacy-way-write/">Another threat to your privacy: the way you write</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Buy Bitcoins Anonymously in the US, Instantly</title>
		<link>https://www.privateinternetaccess.com/blog/how-to-buy-bitcoins-anonymously-in-the-us-instantly/</link>
					<comments>https://www.privateinternetaccess.com/blog/how-to-buy-bitcoins-anonymously-in-the-us-instantly/#comments</comments>
		
		<dc:creator><![CDATA[rasengan]]></dc:creator>
		<pubDate>Wed, 25 Apr 2012 14:24:10 +0000</pubDate>
				<category><![CDATA[Cryptocurrency]]></category>
		<category><![CDATA[General Privacy News]]></category>
		<category><![CDATA[anonymity]]></category>
		<guid isPermaLink="false">https://www.privateinternetaccess.com/blog/?p=335</guid>

					<description><![CDATA[<p>If CISPA or other privacy-busting legislations pass, every detail of our personal lives will be at risk &#8211; and you&#8217;ll want to buy Bitcoins for safety. Although many of our foundations are rooted in anonymity, everything we see, do and buy may soon be exposed. However, technology always evolves, and anonymity is no exception. As many already &#8230; <a href="https://www.privateinternetaccess.com/blog/how-to-buy-bitcoins-anonymously-in-the-us-instantly/" class="more-link">Continue reading<span class="screen-reader-text"> "How to Buy Bitcoins Anonymously in the US, Instantly"</span></a></p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/how-to-buy-bitcoins-anonymously-in-the-us-instantly/">How to Buy Bitcoins Anonymously in the US, Instantly</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="attachment_338" aria-describedby="caption-attachment-338" style="width: 300px" class="wp-caption alignleft"><a href="https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/04/iStock_000016359207XSmall.jpg?x63129"><img loading="lazy" class="size-medium wp-image-338" title="Spies Everywhere" src="https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/04/iStock_000016359207XSmall-300x199.jpg?x63129" alt="Spying" width="300" height="199" srcset="https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/04/iStock_000016359207XSmall-300x199.jpg 300w, https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/04/iStock_000016359207XSmall.jpg 425w" sizes="(max-width: 300px) 85vw, 300px" /></a><figcaption id="caption-attachment-338" class="wp-caption-text"><strong>Big Brother is Watching You</strong></figcaption></figure>
<p>If CISPA or other privacy-busting legislations pass, every detail of our personal lives will be at risk &#8211; and you&#8217;ll want to buy Bitcoins for safety. Although many of our <a href="http://en.wikipedia.org/wiki/Federalist_Papers">foundations are rooted in anonymity</a>, everything we see, do and buy may soon be exposed. However, <a href="http://torrentfreak.com/the-history-of-filesharing-120422/">technology always evolves</a>, and anonymity is no exception.</p>
<p>As many already know, <a href="https://www.privateinternetaccess.com/pages/pay-with-bitcoin">Bitcoin</a> is a decentralized, digital currency that can be used like cash. What many people may not already know, however, is that there is no need to hand over all of your information to an exchange to buy bitcoins. It&#8217;s already incredibly easy to buy bitcoins anonymously, in less than 10 minutes!</p>
<p><strong>Update: The following is an antiquated method to buy bitcoins anonymously. Currently, the best way to buy bitcoins anonymously is still to use a VPN or Tor and use a service like described by the anonymous member of the Bitcoin community below.</strong></p>
<div></div>
<h2>How to Buy Bitcoins Online Anonymously</h2>
<div>An anonymous member of the Bitcoin community has contributed these wonderful instructions detailing 6 simple steps to buying Bitcoins with near anonymity in the US.</div>
<p style="text-align: center;"><span style="text-align: center;">• • •</span></p>
<div style="text-align: left;"><strong>Step 1.</strong></div>
<div style="text-align: left;">Download and install TOR from <a href="https://www.torproject.org/" target="_blank" rel="noopener noreferrer">https://www.torproject.<wbr />org/</a></div>
<div></div>
<div><strong>Step 2. </strong></div>
<div>While using TOR create a Tormail account at <a href="http://jhiwjjlqpyawmpjx.onion/" target="_blank" rel="noopener noreferrer">http://jhiwjjlqpyawmpjx.<wbr />onion</a></div>
<div>You can confirm the address at <a href="http://tormail.org/" target="_blank" rel="noopener noreferrer">http://tormail.org/</a></div>
<div></div>
<div><strong>Step 3. </strong></div>
<div>While using TOR, visit <a href="http://www.bitinstant.com/" target="_blank" rel="noopener noreferrer">http://www.bitinstant.com</a></div>
<div></div>
<div><strong>Step 4.</strong></div>
<div>Choose the Cash deposit to Bitcoin to email option.</div>
<div></div>
<div><a href="https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/04/Screen-Shot-2012-04-25-at-4.00.50-PM.png?x63129"><img loading="lazy" class="aligncenter size-medium wp-image-336" title="BitInstant" src="https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/04/Screen-Shot-2012-04-25-at-4.00.50-PM-300x71.png?x63129" alt="Cash Bank Deposits" width="300" height="71" srcset="https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/04/Screen-Shot-2012-04-25-at-4.00.50-PM-300x71.png 300w, https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/04/Screen-Shot-2012-04-25-at-4.00.50-PM-500x119.png 500w, https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/04/Screen-Shot-2012-04-25-at-4.00.50-PM.png 709w" sizes="(max-width: 300px) 85vw, 300px" /></a></div>
<div>
<div><strong>Step 5.</strong></div>
<div>Follow the instructions on <a href="http://www.bitinstant.com/">Bitinstant</a> to make your cash deposit, and have your Bitcoins sent to your new Tormail account.</div>
<div>No ID is needed.</div>
<div></div>
<div><strong>Step 6.</strong></div>
<div>Receive your Bitcoins via email.</div>
<div></div>
<p>&nbsp;</p>
<div>And voila.  Now you can use your anonymous e-mail account and anonymous bitcoins to buy goods and services online, truly anonymously.</div>
<p>&nbsp;</p>
<div><strong>Here are a few places you can spend Bitcoins:</strong></div>
<div><a title="VPN Service" href="https://www.privateinternetaccess.com/">Private Internet Access</a> &#8211; Anonymous VPN Service</div>
<div><a href="http://www.memorydealers.com/">MemoryDealers</a> &#8211; Transceivers, Cables, and Memory</div>
<div><a href="http://www.coindl.com/">CoinDL</a> &#8211; The iTunes of the Bitcoin economy</div>
<div><a href="http://www.bitcoindeals.com/">BitcoinDeals</a> &#8211; The Amazon of the Bitcoin economy</div>
<p>A quick search of the interweb will also display the thousands upon thousands of other shops that accept Bitcoin so you can buy bitcoins then spend them.</p>
<p>&nbsp;</p>
<div>Have any other suggestions on how to buy bitcoins, or where to spend bitcoins?  Let us know in the comments!</div>
<div></div>
<div></div>
</div>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/how-to-buy-bitcoins-anonymously-in-the-us-instantly/">How to Buy Bitcoins Anonymously in the US, Instantly</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privateinternetaccess.com/blog/how-to-buy-bitcoins-anonymously-in-the-us-instantly/feed/</wfw:commentRss>
			<slash:comments>97</slash:comments>
		
		
			</item>
		<item>
		<title>Pullin&#8217; a Rabbit out of a Black Hat</title>
		<link>https://www.privateinternetaccess.com/blog/pullin-a-rabbit-out-of-a-black-hat/</link>
					<comments>https://www.privateinternetaccess.com/blog/pullin-a-rabbit-out-of-a-black-hat/#comments</comments>
		
		<dc:creator><![CDATA[rasengan]]></dc:creator>
		<pubDate>Tue, 13 Mar 2012 02:59:37 +0000</pubDate>
				<category><![CDATA[Cryptocurrency]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[General Privacy News]]></category>
		<category><![CDATA[anonymity]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[hacking]]></category>
		<guid isPermaLink="false">https://www.privateinternetaccess.com/blog/?p=113</guid>

					<description><![CDATA[<p>Step 1 &#8211; Hack a computer. Step 2 &#8211; ? Step 3 &#8211; Profit. In the past, step 2 generally consisted of several intricate steps that required a significant amount of effort and skill.  Even if a system was filled with valuable data, it was highly unlikely that any of said data was actually valuable &#8230; <a href="https://www.privateinternetaccess.com/blog/pullin-a-rabbit-out-of-a-black-hat/" class="more-link">Continue reading<span class="screen-reader-text"> "Pullin&#8217; a Rabbit out of a Black Hat"</span></a></p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/pullin-a-rabbit-out-of-a-black-hat/">Pullin&#8217; a Rabbit out of a Black Hat</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong><a href="https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/03/11223904_500.jpg?x63129"><img loading="lazy" class="alignleft size-medium wp-image-114" title="Rabbit" src="https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/03/11223904_500-300x225.jpg?x63129" alt="Smoking Puppet" width="300" height="225" srcset="https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/03/11223904_500-300x225.jpg 300w, https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/03/11223904_500.jpg 384w" sizes="(max-width: 300px) 85vw, 300px" /></a>Step 1</strong> &#8211; Hack a computer.<br />
<strong>Step 2</strong> &#8211; ?<br />
<strong>Step 3</strong> &#8211; Profit.</p>
<p>In the past, step 2 generally consisted of several intricate steps that required a significant amount of effort and skill.  Even if a system was filled with valuable data, it was highly unlikely that any of said data was actually valuable to the hacker.</p>
<p>Therefore, at this point, one generally had to undergo several steps to turn a profit:</p>
<p>1. Find a buyer who was interested in the data.<br />
2. Sell the data.<br />
3. Seller had to make sure buyer sent funds.<br />
4. Buyer had to make sure seller sent data.<br />
5. All steps needed to be conducted anonymously.</p>
<p>This meant that hackers had to create fake bank accounts, which meant they had to create fake identities, which meant they needed to purchase these from yet another untrusted source in order to conduct the anonymous transaction.  As one can see, these were quite daunting tasks.  Of course, there were (and still are) major criminal organizations, as well as highly entrepreneurial hackers, that have solved these problems.  But, overall, these persons and organizations represented a minority percentage of the people who wished to hack for profit.  For everyone else, the difficulties and risks involved in obtaining bank accounts with false identities or receiving payments in some other anonymous manner just wasn&#8217;t worth it.</p>
<p>For most hackers, there was little opportunity to profit from hacking, and therefore, most hacking was conducted for purely non financial reasons.  Many of the most talented hackers were not criminal by nature, and as such, were unwilling to take the dangerous risks required to financially gain from a hack.  As such, much hacking was conducted for seemingly altruistic reasons (e.g., showing the site they infiltrated it, how they did it, and how to fix it).  Many hackers did this to obtain a job, or merely to feel good about themselves after helping someone out (as well as internet fame).</p>
<p>However, everything changed when a new money was created out of thin air.  Bitcoin solves all of the above problems for hackers entirely and, moreover, quite elegantly.  Suddenly, hackers are able to profit with minimal effort:</p>
<p>1. Hack.<br />
2. Grab Bitcoin Private Keys.<br />
3. Transfer Bitcoins to oneself.</p>
<p>At this point the hacker has already profited.  They can go further and put the Bitcoins through a mixing service to anonymize them and then cash them out at an exchange for USD.  Furthermore, this can all be done over Tor to remain fully untraceable.</p>
<p>When compared to the previous monetization schemes associated with hacking, this is several orders of magnitude easier.  All one needs to do is simply find a system with Bitcoins on them.  While this is scarce now, it is highly likely that Bitcoins will become much more prevalent over time.  Additionally, it is fairly simple to find servers who are holding Bitcoins (see <a title="Linode hacked" href="http://arstechnica.com/business/news/2012/03/bitcoins-worth-228000-stolen-from-customers-of-hacked-webhost.ars">Linode</a>) as well as monitor the Bitcoin P2P network for IPs associated with Bitcoin transactions.</p>
<p>Even script-kiddies who distribute applications to create botnets which can be used for mining or DDoS attacks no longer need to DDoS sites and hold them ransom.  Instead, they can simply steal Bitcoins off any computer they control.</p>
<p>Hacking has changed.  And while money can be generated with a computer, it can now  also be stolen through black hat hacking even faster.  It&#8217;s not <em>Houdini</em>; but rather, <em>Who dun&#8217; it</em>?  And, today, it looks like<strong> we&#8217;ll never know</strong>.</p>
<p><strong>Some tips on staying safe:</strong></p>
<p>1. Use a VPN or Tor to mask your IP on the Bitcoin P2P network.<br />
2. Keep all of your Bitcoins in an offline wallet.<br />
3. Use a <a title="Brain Wallet" href="http://www.forbes.com/sites/jonmatonis/2012/03/12/brainwallet-the-ultimate-in-mobile-money/">BrainWallet</a>.</p>
<p>If you have other suggestions, please feel free to leave them in the comments!</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/pullin-a-rabbit-out-of-a-black-hat/">Pullin&#8217; a Rabbit out of a Black Hat</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privateinternetaccess.com/blog/pullin-a-rabbit-out-of-a-black-hat/feed/</wfw:commentRss>
			<slash:comments>8</slash:comments>
		
		
			</item>
		<item>
		<title>Cloak and Swagger: A Brief History of Anonymous Identity Protection on the Internet</title>
		<link>https://www.privateinternetaccess.com/blog/cloak-and-swagger-the-history-of-anonymous-identity-protection-on-the-internet/</link>
		
		<dc:creator><![CDATA[rasengan]]></dc:creator>
		<pubDate>Thu, 01 Mar 2012 22:34:14 +0000</pubDate>
				<category><![CDATA[Cryptocurrency]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[General Privacy News]]></category>
		<category><![CDATA[anonymity]]></category>
		<category><![CDATA[identity protection]]></category>
		<category><![CDATA[vpn service]]></category>
		<guid isPermaLink="false">https://www.privateinternetaccess.com/blog/?p=14</guid>

					<description><![CDATA[<p>Anonymity has proven itself a vital property of society.  Dating back to the beginnings of time, anonymous writings have been found in many great literary works, including but not limited to Cave Paintings, Hieroglyphs, The Bible, Tom Sawyer, as well as the same Federalist Papers that helped in the ratification of the US Constitution. The &#8230; <a href="https://www.privateinternetaccess.com/blog/cloak-and-swagger-the-history-of-anonymous-identity-protection-on-the-internet/" class="more-link">Continue reading<span class="screen-reader-text"> "Cloak and Swagger: A Brief History of Anonymous Identity Protection on the Internet"</span></a></p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/cloak-and-swagger-the-history-of-anonymous-identity-protection-on-the-internet/">Cloak and Swagger: A Brief History of Anonymous Identity Protection on the Internet</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em><a href="https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/03/iStock_000001367650XSmall.jpg?x63129"><img loading="lazy" class="alignleft size-medium wp-image-179" title="iStock_000001367650XSmall" src="https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/03/iStock_000001367650XSmall-300x201.jpg?x63129" alt="Hooded Man" width="300" height="201" srcset="https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/03/iStock_000001367650XSmall-300x201.jpg 300w, https://www.privateinternetaccess.com/blog/wp-content/uploads/2012/03/iStock_000001367650XSmall.jpg 423w" sizes="(max-width: 300px) 85vw, 300px" /></a>Anonymity</em> has proven itself a vital property of society.  Dating back to the beginnings of time, anonymous writings have been found in many great literary works, including but not limited to Cave Paintings, Hieroglyphs, The Bible, Tom Sawyer, as well as the same Federalist Papers that helped in the ratification of the US Constitution.</p>
<p>The founder of <a href="http://www.2ch.net/">2Ch</a>, a popular anonymous forum in Japan, said,</p>
<blockquote><p>&#8220;&#8230; delivering news without taking any risk is very important to us. There is a lot of information disclosure or secret news gathered on Channel 2. Few people would post that kind of information by taking a risk. Moreover, people can only truly discuss something when they don&#8217;t know each other.</p>
<p>If there is a user ID attached to a user, a discussion tends to become a criticizing game. On the other hand, under the anonymous system, even though your opinion/information is criticized, you don&#8217;t know with whom to be upset. Also with a user ID, those who participate in the site for a long time tend to have authority, and it becomes difficult for a user to disagree with them. Under a perfectly anonymous system, you can say, &#8216;it&#8217;s boring,&#8217; if it is actually boring. All information is treated equally; only an accurate argument will work.&#8221; (Source: Wikipedia)</p></blockquote>
<p>There is very little room for argument as to how anonymity protects ideas, society and ultimately, the freedom of <strong>humanity</strong>.  However, anonymity has also become an important tool to protect oneself from the many dangers of the Internet.</p>
<p style="text-align: center;">• • •</p>
<p>In the early days of the Internet, IRC Networks which, at the time, did not mask IP addresses and hostmasks, quickly became the <em>World of Warcraft</em> for the youth and angry alike.  A popular network, known as Eris Free Networks or <a href="http://www.efnet.org/">EFnet</a>, became a group warzone where users would compete to take control of IRC channels and IRC nicknames.  Essentially, one would be able to utilize a form of DOS attack to disconnect other users and servers from the network.  Some of these attacks consisted of sending a specific <a href="http://www.softpanorama.org/Net/Internet_layer/icmp.shtml">ICMP packet</a> which confused routers, while others consisted of simple traffic/packet floods.  These attacks were used against both the IRC servers to incite a network-split as well as specific users in order to remove opposition groups from control of IRC channels and nicknames.</p>
<p>Groups eventually utilized Eggdrop bot networks which consisted of multiple IRC clients spread across multiple geographic networks to maintain connectivity to IRC, and essentially, maintain control of IRC channels and nicknames even in the event of network-splits and bot floods.  Many of the bots and individual IRC connections were run through high powered UNIX Shells in order to utilize more stable connections with bigger pipes.  With this came the birth of multiple vanity hosts, which utilized the &#8220;reverse DNS&#8221; of IP addresses to portray custom messages in user&#8217;s hostnames.</p>
<p>A revolutionary solution arrived when <em>dalvenjah</em> launched <a href="http://www.dal.net/">DALnet</a>, and with it, channel and nickname registration services.  However, quickly it became a reality that cloaking IP addresses was still important, even with the absence of channel and nickname wars.</p>
<p>At this point, more experienced (aka <em>higher level</em>) users (aka <em>script kiddies</em>) were able to utilize tools such as <a href="http://en.wikipedia.org/wiki/Denial-of-service_attack#Teardrop_attacks">Teardrop</a>, Smurf, Boink, Ping of Death, amongst others against the less experienced (aka <em>newbies</em>).  Some of these led to instant <a href="http://en.wikipedia.org/wiki/Blue_Screen_of_Death">blue screens</a> [<em>of death]</em>, while others hilariously crashed the TCP Network Stack causing a dialog box to open indicating the computer would restart in 60 seconds.  With long boot times on the slow computers of yesterday, the re-spawn time associated with a death in World of Warcraft is a far cry from the 5+ minute waits caused by these restarts along with the potential busy signals when dialing into ISPs.</p>
<p>As such, for the receivers of these attacks, there were very few laughs.  This made it increasingly important to protect one&#8217;s IP address with the use of UNIX shells as well as IRC bouncers.  Finally, anonymizing and cloaking one&#8217;s IP address became so important in preventing hacks, attacks, and serious smacks (worse than getting slapped by mIRC&#8217;s <em>trout</em>) that innovation was introduced by <em>binary</em> and <em>Mysidia</em> (Darkfire.Net/Sorcery.Net) in the creation of built-in IRC cloaking on IRC servers which has, today, become adopted in the majority of IRC networks&#8217; codes.</p>
<p>Fast forward today, a different mischief in IP usage has begun.  While script kiddies and individuals used to be the perpetrators of negative IP usage, today, corporations have begun to use IP addresses as well for data tracking.  On August 4, 2006, <a href="http://en.wikipedia.org/wiki/AOL_search_data_leak">AOL released the data for millions of searches</a> by millions of users.  Programmers were able to cross-reference the <em>&#8220;anonymized&#8221;</em> data to figure out who entered each search query.  This was a massive breech of data privacy which led to severe embarrassment for many.</p>
<p>Projects such as <a href="http://donottrack.us/">Do Not Track</a> attempt to protect users by providing an opt-out from data tracking and mining.  However, there seems to be very little reason at this time for corporations to comply with these projects.  Further, projects such as <a href="http://www.youhavedownloaded.com/">YouHaveDownloaded</a> that provides P2P BitTorrent download data by IP, have helped to re-emphasize that IP privacy is ever so important.  In fact, cross referencing BitTorrent data with Skype P2P traffic leads to a direct breech in identity and, essentially, privacy.  Additionally, anonymous crypto-currencies such as <a href="http://www.bitcoin.org/">Bitcoin</a> suffer from these same problems, especially when not used with a <a href="http://coderrr.wordpress.com/2011/06/30/patching-the-bitcoin-client-to-make-it-more-anonymous/">patched Bitcoin client</a>.</p>
<p>Today, many users opt to protect their identity using <a href="http://www.torproject.org/">Tor</a> and <a href="https://www.privateinternetaccess.com/">VPN services</a>.  The protection of our privacy and access to anonymizing identity protection services is an important must as we build the Internet, which is, today, still just a newbie.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.privateinternetaccess.com/blog/cloak-and-swagger-the-history-of-anonymous-identity-protection-on-the-internet/">Cloak and Swagger: A Brief History of Anonymous Identity Protection on the Internet</a> appeared first on <a rel="nofollow" href="https://www.privateinternetaccess.com/blog">Privacy News Online by Private Internet Access VPN</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 23/114 objects using disk
Page Caching using disk: enhanced 

Served from: ok.piaservers.com @ 2021-01-26 06:54:01 by W3 Total Cache
-->