Anti-Forensics Tutorial
Credits to HackForums
Credits to HackForums
Disclaimer: Please note, this guide is not designed to keep you anonymous. This guide is for the sole purpose of preventing your ISP from looking at your traffic, and is in no way, shape, or form meant to protect websites from tracking you.
HTTPS - SSL/TLS Encryption
SSL/TLS (HTTPS) Is HTTP Secure. It encrypts all data on that website that is sent to and from your computer, and then decrypts it once it arrives at its destined location. When using HTTPS, your ISP cannot see what you are browsing.
Below, you will find a better definition of HTTPS;
There are many applications for Web Browsers that will automatically use HTTPS versions of websites when available, a common one for Chrome is 'Prefer HTTPS'
Highly Encrypted VPNs
VPNs that have strong encryption between you and their servers are an excellent method to prevent ISPs from monitoring you traffic. When using one of these services, your ISP is left completely in the dark, but be wary, for now the VPN service that protects you from your ISP can monitor your traffic just as easily if they desire.
If you are looking for a free way to encrypt traffic and prevent your ISP from viewing it, check out SpotFlux (Link below) but be sure to read their privacy policy first.
Spotflux: http://www.spotflux.com
Spotflux's Privacy Policy: http://launch.spotflux.com/privacy.htm
(PLEASE NOT THIS IS NOT A GOOD CHOICE FOR HACKING. FOR HACKING, I RECOMMEND nVPN or KryptoVPN, OR- A VPN sold here on Hack Forums)
Keep in mind, any encrypted VPN will work for hiding your activity from a noisy ISP, but in terms on anonymity, a no-log VPN is required, and preferably off-shore (Russia would be your best option).
Encrypt Your Bit-Torrent Traffic
This is a fairly simple thing to do. If you are using a Bit-Torrent client such as uTorrent or BitTorrent, simply follow these steps;
- Start your client, and click on 'Options'
- Click on 'Preferences'
- Click on the 'BitTorrent' tab
- Set 'Outgoing' to 'Forced'
- Uncheck 'Allow incoming legacy connections'
Proxies
Definition of a proxy:
Encrypted proxies hide your activity from your ISP.
SSH Tunneling
Definition of SSH (Secure Shell):
If you are not familiar with Secure Shell Tunneling already, I recommend you use something a bit easier to deal with, such as a VPN.
Tor
Tor is a very common internet protocal service which encrypts all traffic by relaying it through multiple nodes.
Definition of Tor:
Tor is a highly secure option for hiding your internet usage from your ISP (NOTE: I said highly secure for hiding from activity from your ISP, not highly secure in general.), but it suffers from slow speeds. I have linked two DIFFERENT working methods to increasing Tor speed below (I HIGHLY recommend you read BOTH.)
Confusedhatter's Tutorial: (Popular Technique)
http://www.hackforums.net/showthread.php?tid=458761
Pat.'s Tutorial: (Unique Technique)
http://www.hackforums.net/showthread.php?tid=1970215
Tor Download: https://www.torproject.org/download/download