Why PIA Is Not Enough to Protect Your Real IP Address
I am the victim of extreme criminal abuse that involved somehow spoofing my real IP address by using it "remotely" [by remote control or by other means] to commit serious crimes, and, also, it was done to avoid being traced back to the real criminal hacker's IP address that committed these Federal crimes. Had my real IP address remained truly hidden from this criminal attack, then I would not be facing this kind of "nightmare attack" and be involved in a criminal investigation too. This happened in February 2015.
I was using at the time a free "volunteer service" of VPN servers that was also attempting to protect my IP too. It was not 100% effective, because the VPN servers were part of a volunteer effort and you could be dropped off the server without being reconnected securely onto another VPN server.
I have no idea exactly how I was hacked, BUT I believe it was very possibly done by someone that is connected to a Forum where I participated. I think this criminal had access to the Forum software for that website either directly [as a moderator] or indirectly, so they could obtain my real IP address information and use it to commit these serious crimes. The reason I believe this is the source of these criminal acts is that I was only back online for a very short time with a new Internet ISP, and I was posting constantly just at this one Forum when these crimes happened. I'm not going to get into the details about this criminal case here, but let's just say you NEVER want to be put at risk for such criminal abuse. Never!
After getting PIA installed and working I thought I would check-out the Forum here to learn more about the service, etc. I came across the recent thread about WebRTC that can bypass the PIA VPN/IP protection to reveal your real IP address to someone using this method. That thread is here: How to Stop WebRTC Local IP Address Leaks on Google Chrome and Mozilla Firefox While Using Private I
What that thread reveals to me is that there are also more 'knowable threats' out there now too. So called "legit scripts" or known programming that is usually getting your IP info for the weather or to give directions, but then it could be used deceptively as malware too to reveal your IP info by using these "accepted" location programming methods too. That is NOT an unknown.
I suggested some organization should be tracking what these scripting IP reveal "programs" can do. PIA or some VPN group or EFF.org or ???
OmniNegro Wrote:
Are you even remotely aware just how many things we would have to list to cover even 1% of the threats out there? If I started right now, and managed to document one every second, it would be a hundred years of non stop work to cover the problems that exist right now, and more are made/discovered each day.
Your best bet is to use the user contributed plugins that minimize the problems that are known. Ghostery, Ad-Block Edge, NoScript, RequestPolicy, and Privacy Badger are together a good start for Firefox. They cover a great many of these problems. But as I implied, there is no perfect solution.
Disable Geolocation too. It is enabled by default in every browser I am aware of. But it is easily disabled in Firefox. Your search engine of choice will tell you how to do it. Be certain to check that geolocation is still disabled every once in a while. It does turn itself back on from time to time. (Usually after an update.)
Your best bet is to use the user contributed plugins that minimize the problems that are known. Ghostery, Ad-Block Edge, NoScript, RequestPolicy, and Privacy Badger are together a good start for Firefox. They cover a great many of these problems. But as I implied, there is no perfect solution.
Disable Geolocation too. It is enabled by default in every browser I am aware of. But it is easily disabled in Firefox. Your search engine of choice will tell you how to do it. Be certain to check that geolocation is still disabled every once in a while. It does turn itself back on from time to time. (Usually after an update.)
My follow-up to those excellent suggestions "just above" from OmniNegro are as follows:
You do understand I'm limiting my concept to legit scripting or programming tools [add-ons] that can give away one's IP as a "reveal" bypassing the encryption and VPN/IP "protections" ? These would be produced by companies like Google, Microsoft, Apple, and all the other legit supplier software companies that develop for their OS's.
So, OmniNegro, are you saying 'just' that one type of threat ->the IP reveal<- is "impossible" to keep-up with? Certainly this type of IP "reveal" threat is not nearly as complicated as tracking the thousands of existing virus's and trying to eliminate these from a target computer. Imo.
For PIA to be a useful tool it should be ensuring that your IP remains anonymous as "job one", and that won't mean "jack" if your IP is easily obtained by other means that websites can use to probe your browser for that IP info simply bypassing what PIA can do.
I think the main point I'm trying to make is WebRTC may just be one of dozens [or more?] programs or browser scripting plug-ins that can ALREADY bypass PIA's IP protections to reveal your true IP information. If that is true, then we need a more organized effort to eliminate these threats as much as possible. The model is similar to what anti-virus and firewall companies can do.
I think it's obvious that using IE or Chrome or Safari is just a plan for disaster if you truly are trying to protect your real IP address from criminal abuse, as I am. So, that leaves Firefox, since I tried Opera only to learn it is already vulnerable to WebRTC.
I hope this thread can be a starting point to begin to document what you really need to do to protect your real IP address as completely as is possible. PIA is only part of that protection, but you will need far more "protection" than that to truly protect your IP address. For starters, it seems you must be using Firefox with certain add-ons and features disabled to have a chance at doing this correctly.
Please use this thread to list out what needs to be done to protect your IP from websites probing your browser to get that IP information.
This discussion has been closed.

Comments
The VPN is not the problem. Your childish idea of a one size fits all solution is half the problem, and your OS and applications themselves are the other half.
There is no fix for all problems. And even if you use the VPN and it does everything it should, the OS can still give away data that can be used against you. That is not something the VPN is supposed to protect you from. The VPN does only one thing, and does it well.
But a lighter does it's job well too, and you can set yourself on fire with it and scream how defective it is and ask people if they meant that the lighter cannot be kept from burning you too. And I would have to answer that if you are dumb enough to continue being burned, you probably did it yourself.
You do not know "jack" and your attitude does not make me inclined to even try to help you.
Right now you have a choice. You can choose to stop being confrontational and we can try to figure out what you need and want of the software currently available, or you can choose to be aggressive and we will see who is better at arguing to no benefit. If you choose to move on and try to figure out what you need and want, then I will gladly forget this post and we can probably figure out what is best for you.
So decide and if you choose right, tell me what software you currently use on what OS, and I will tell you what I know that may help. And you will soon find that many here know a great deal about this subject.
Ignore the ZenMate part. That's why we use PIA. It's a good general article and talks about some useful plugins.
I'd also ignore the adblock part a use ublock instead.
I also use Windows 7 x64. I use Firefox 36.0.1 with all the extensions I mentioned, and the very first thing I did upon installing the OS was to kill off all IPv6 pseudo interfaces.
And while my choice of words is certainly odd, English is the only language I ever knew. (I understand why you may presume otherwise. I do not use conjunctions by choice, not because I do not understand how to use them.)
The odds are that no-one will find what happened that caused you to be victimized. But if they do figure it out, so long as telling us does not provide a tip for others to do the same thing, we would all like to hear about it. I would guess a trojan was somehow planted on your system. This requires either direct access to the system, or for you to run a program that is going to infect your system.
In truth I did take your original post as being aggressive. But as I promised, I will simply forget it. It seems very clear that was not your intent. I apologize for my aggressive response.
So let us figure out what you need. You have the browser and extensions figured out. Now for some general advise. I suggest not installing anything you do not need. If you do not need Java, do not install Java. Even if you do need Java, if you do not need it to be used in your browser, set it to not activate except manually in Firefox. (Set it to "Ask to activate" mode in the addons menu.)
Literally anything that you do not need is a potential avenue of an attacker. So think before enabling stuff that is useless to you. Fill us in on the other applications you use that need Internet access and we may be able to help tell you how we do things and why we use our methods. I hope some of this is useful, and I look forward to contributing more.
Applications I run over the VPN connection may choose to leak further data. Preventing that CANNOT be and never has been the purpose of a VPN connection. It is only a network connection, you can think of it as a virtual ISP that doesn't keep customer data.
Staying anonymous on the net requires more than a few browser plugins and registry hacks or firewall settings. For example, after installing Tor Browser you see a page featuring a warning box which reminds you to think about habits and directs you to a list of warnings[1] - these warnings are specific to Tor but mostly apply to VPNs, too. Tor Browser has been patched from vanilla Firefox to behave differently, in a more unanimous way across installations, to make its users all appear identical. Still, if you use it to log into your Facebook account or your banking account, you give up your anonymity instantly.
Check your behavior before you fret over attacks or exploits.
[1] https://www.torproject.org/download/download.html.en#warning
Everything you are saying about what happened to you is mighty fantastical. The odds of something going down the way you have this situation in your mind are so slim that it is hard to even quantify the chances. Frankly, people just aren't interesting enough to go after them and spoof their ip to commit felonies with, no matter how annoying you might have been on a message board.
In my career of hearing stories like yours, I've gotten very jaded. I often find myself explaining to my clients that it doesn't really matter what the truth actually is, it really only matters what you can make it appear to be in the courtroom.
Do not put your faith in your state's computer forensic skills. If your fantastical scenario is true, you need to have a damn good lawyer, and some damn expensive computer forensics of your own performed on those computers after the state is done with them (and some damn fine expert witnesses).
Unfortunately though, it is much easier to believe that it was in fact you that did something stupid on your computer yourself, and that the purpose of this thread on this message board is actually a fishing expedition for ideas related to your defense. Like, hmmm, what can these Internet security/privacy people think up that are holes in Internet security that I could use to pin my crime on? Something somebody says is bound to sound good in court.
Note: I'm not explicitly accusing you of this, as I have nothing more than my own personal conjecture to accuse you with. Frankly, even if that's exactly what you are doing, you are more than welcome to do it. Hopefully these discussions and your use of computers doesn't violate any terms of your bail/bond. And hopefully your questions and discussions here don't end up being used against you by the prosecution.
There is nothing wrong with trying to be safe from malicious hackers, but be aware that the actions a guilty party would take may appear identical to the actions an innocent party may take. And a prosecutor may not give a damn if you are innocent or guilty, but rather will care what they can make you look.
If you have not already discussed this thread with legal counsel, then please do yourself a favor and abandon it. You can always find it again later after this mess blows over. But for now, prioritize staying out of sight.
In fact, you seem to get your hacking idea from the story of Tony Bragalia getting his computer hacked by some unknown schmuck using the code name "A Glass Darkly" in The "Roswell Slides" conspiracy.
If anyone wants to know what I am taking about: http://mysteriousuniverse.org/2015/02/spying-on-the-roswell-slides/
So yeah, if I was your detective, I'm not sure how much of the benefit of a doubt I would be giving you right now. Sorry.
http://ufocon.blogspot.com/2015/02/adan-dew-provided-this-update-and.html
http://nickredfernfortean.blogspot.com/2015/02/more-roswell-slides-info.html
Just be wary of what you say, why you say it, and how you say it when you might be under heightened scrutiny at the time. Your motives may be questioned at every turn.
Good point. It's kind of disturbing that PIA doesn't simply put a robots.txt file on their server. It's odd considering what this place is all about.
One tough thing you do need to face is that you were tricked before, and nothing you knew about computers meant anything to whomever did this. So it would be a good idea to stop thinking it will next time.
I never even attended high school, much less college, yet I know for a fact that I have better knowledge on some subjects than Doctors do. The point of this is that different people have different knowledge and no degree makes a person know anything at all, not even if they study it day and night for years.
So for your own sake, please presume you know exactly nothing at all about computers. And there is a way to cheat and make this much easier. But it requires specific conditions.
Firstly do you need Windows? If you play games, or have some other applications that can only run on Windows, this option may not work.
Second if you are unwilling to start anew with something that will make you a hardened computer user that no hacker can readily do anything to, then this will not work.
But if you are able to, use Linux. In full. Do not go halfway. Use Linux for anything and everything you can, and only use Windows in a VM if you must.
My suggestion is to install and use Linux Mint as your OS. It will place you at the newbie stage of computer literacy, but by doing so, you will be shedding any possible holes in your knowledge, and all bad habits like logging in under a username with administrative clearances.
The difficulty of making you someones Internet victim will rise exponentially as you leave Windows and Mac and all these sorts of nightmares behind. Linux is the M1Abrams tank of the Internet world.
But ultimately it is your choice. We will help you with whatever OS and applications we can.
Also, I really was not necessarily the direct target of these two crimes. Two other targets were "named", and these targets were likely the intended direct victims. I don't pretend to understand the motives or reasons why anyone would commit such insane acts, but it often will involve a disturbed younger male that does this sort of thing. I'm not going to waste time here trying "to profile" the type of person that will do this, but I have some pretty good ideas about it.
I'm am innocent of any participation in what happened. Somehow my "IP address" is associated indirectly in how these crimes were carried out. I do not know exactly how/when that was determined, so I have no idea how accurate any of that may be. It is very likely I was logged onto the free VPN service, when these crimes happened. IF that is true, then it will be very interesting "how" my real IP was somehow implicated.
Let's move on beyond trying to analyze whether or not I can be trusted with my story. I'm telling the truth, as best as I can recount it without revealing enough details to identify it precisely. I do want to maintain my privacy about this here too! Your type of post is not helping me to protect myself and other people from this type of criminal abuse.
I have too much of an investment in time with Windows that I don't want to switch over to any other OS. I just don't have the time or interest to switch over to a new OS, so I will learn how to minimize its security risk online when possible.
1) I'm surprised no one has mentioned using a really good Firewall beyond what Windows offers. Has anyone experimented with these? I tried Comodo's Firewall. It has powerful reporting and logging features, so one could at least gather "evidence" of what is happening with your Internet and network connections.
2) Also, what about using a router with DD-WRT that is also compatible with the PIA service? Is that going to offer an extra layer of security that will protect my IP information or protect my computer from being hacked at a much higher level of difficulty?
3) I noticed the Comodo software also offers a sandbox feature. I think that means it will run programs in a virtual mode when launched from that sandbox. Should I be running Firefox in VM mode from that sandbox too? What else should be run in VM mode? uTorrent or ?
4) If I download a torrent mkv or mp4 or other video or audio file, then are these safe to play in a media player without containing any virus too? What about opening a text file associated with this in Windows notepad? I assume a virus scan can check if a text file will be infected? What about just opening the text file in VM mode? Is that safe to not be able to attack outside its VM?
You want to blame the victim? That is what you're doing with these kinds of posts. It is how you think, and I've not made you decide how to think and judge my situation. This thread has nothing to do with the subject matter you keep turning to. You're essentially derailing the topic of this thread based on some very "limited information", but you can "sense" the truth about my situation.
Please don't post to this thread unless you have some security suggestions to offer here for readers to further protect their IP address, etc. from similar types of criminal activity. Stay On Topic! You are off-topic with your previous posts.
http://privacyware.com/personal_firewall.html
RDP is a bad idea, and adding a third party version of it is a terrible idea.
Text files are innocuous even if they are trojans. There is no application that can open a text file as an executable.
And so long as the associated media player is safe, no media files are dangerous. If you are not sure what to trust, grab a copy of VLC player from here.
https://www.videolan.org/
I am trying not to insult you, but some of the questions you ask make me wonder if this is all a show, or if you really know fuck all about computers. So @Irryie is not bluffing when he says part of what you say sounds rehearsed. In a previous post you say "I have enough of a computer background" and all I can think of is that you do NOT have enough of a background to know that text files are never executables on Windows?...
Different people have different knowledge. So I will stop trying to figure it out. But understand that the more you talk, the harder it is to believe you. Just let it be.
As for virtualization, VMware is probably the best you can get. And you can resort to Sandboxie if you want to try that as a solution, but it does not offer the same level of protection.
I would not use a Sandbox built into another program. I always prefer a program built to do one singular task, since they tend to always do it better than catch all programs with a million uses. It is like comparing a real screwdriver to the screwdriver part on one of those expanded swiss army tools.
DD-WRT can be very good, but unless you have a good router, it will greatly slow the overall speed due to encryption overhead.
Quoting myself from the OP:
I hope this thread can be a starting point to begin to document what you
really need to do to protect your real IP address as completely as is
possible. PIA is only part of that protection, but you will need far
more "protection" than that to truly protect your IP address. For
starters, it seems you must be using Firefox with certain add-ons and
features disabled to have a chance at doing this correctly.
Please use this thread to list out what needs to be done to protect your IP
from websites probing your browser to get that IP information.
All of the red flags that are going off in Irryie's mind due to his experience with his clients is going off in my mind for the same reasons. It's possible that we are both unfairly judging this guy, but we'll probably never know for sure. I just can't bring myself to take this thread seriously.
My initial accusatory post was heavily edited a few minutes after I posted it. I initially was much more bold in my calling BS on eBikesRC. I scaled it back because I was being almost cruel with insufficient evidence to back up what I was saying.
A healthy skepticism of everything my clients tell me ends up helping them out in the long wrong. If I doubt them, and challenge them, and force them to prove themselves right to me, it usually ends up helping them down the road, especially if we have to go to trial.
This entire discussion is just giving me that "shyster vibe". Maybe that's unfair. It's hard to read tone and intent into works on a page of a forum. But I noticed the same inconsistencies and oddities that Irryie noticed. Had I not edited out my initial comment, it would have been eerie how similar Irryie's first post and mine were.
Do you think anyone cares about "the help" you are definitely not offering anyone here now or in the future too? Again, I posted in the OP for the following information in reply to my OP. You obviously are totally abusing that request over and over being "a troll" about this. That's your doing and your thinking.
This is the information that should be posted about in this thread. It is my request from the original OP as follows:
I hope this thread can be a starting point to begin to document what you
really need to do to protect your real IP address as completely as is
possible. PIA is only part of that protection, but you will need far
more "protection" than that to truly protect your IP address. For
starters, it seems you must be using Firefox with certain add-ons and
features disabled to have a chance at doing this correctly.
Please use this thread to list out what needs to be done to protect your IP
from websites probing your browser to get that IP information.
If you can't respect my OP request and choose to ignore it to pontificate over and over about my alleged dishonesty, or whatever you're driving at, then I think you're not being helpful to anyone else reading this thread that wants to use good security measures beyond PIA to prevent criminal abuse. I'm the OP, so I'm calling you a troll on this account. You've helped no one here, imo. You certainly have not helped me either. Why keep posting your hostility and false allegations?
As I said before, imho, you have no way of knowing anything by what I've written in all my
posts here. You have formed your opinions that expresses how you think,
but I am certain you are mistaken by your methods of analysis and
experience you say you have. Why? You're trying to implicate me as
someone that has done what? You fill in the details, because I can't
read your mind or know your motives.
Please respond to the direct questions I've asked you in this post, or, better yet, please just stop posting to this thread. I'm am the OP, and I think you've become "a troll" here by not being helpful or constructive to this thread, IMO.
You come across as someone that has hijacked the purpose and intent of this thread and have derailed it OT for the information I am still asking for. You will not provide any of that On Topic information by your very replies that are ALL Off-Topic to the requested information from the OP.
You've only proven to me that you're a trouble maker here, and you've proven to me you definitely can not discern the truth by any means with anything I've posted. It's pretty laughable that you've even attempted to do this on a forum where I already admitted I'm limiting what information I'm able to share here. I say "nuts". You know nothing, really.
Khariz is smart enough to stop posting and not keep posting a cut-n-paste opinion over and over that you are continuously doing destroying the purpose of the OP. Why? Because it is not offering new information that the OP is requesting. You, on the other hand, seem to be filled with all kinds of judgments that you have no basis "in fact" to make any of the assertions you are making except that it's your obvious uninformed opinion. As I said, it's pretty laughable that you've even attempted to do this on a forum
where I already admitted I'm limiting what information I'm able to share
here. I say you are "nuts". You know nothing, really.
Thanks for your post and ideas.