

However, if you want better privacy and anonymity than browser extensions can provide, you might consider a basic setup (covered in Part 2) to compartmentalize your activities using VMs and VPN services.Ĭonversely, if you’re a political dissident who might suffer serious consequences if compromised, using the full setup (covered in Parts 3-8) would be prudent. If you just want to circumvent commercial tracking and behavioral marketing, you don’t need the full setup described here. Use hidden Truecrypt volumes for plausible deniability (not included in these guides)įor example, if you just want to circumvent Internet censorship and data retention by your ISP, you don’t need more than a good VPN service (unless consequences of getting caught are serious). Use full disk encryption (FDE) on host machines (and VMs) VPN compromise via traffic analysis or provider collusionĬompartmentalize Internet access and distribute trust using nested chains of VPNs and TorĬonnect to VPN server(s) via secure, private proxies (not yet included in these guides) Leaks and exploits that circumvent VPNs or TorĬompartmentalize and isolate workspace and networking in separate VMs

The key threats, and corresponding defenses, are: THREATĬompartmentalize and isolate activity using multiple pseudonyms, workspace VMs, VPN services and Tor What are you protecting? Who are you protecting it from? What might happen if you were compromised? Start by reading An Introduction to Privacy & Anonymity and Applying Risk Management to Privacy. Before choosing which aspects to implement, it’s best to consider your threat model. These are advanced guides, and the full setup will require at least a few days of focused work. It explains how to obtain vastly greater freedom, privacy and anonymity through compartmentalization (aka compartmentation) and isolation, by using multiple virtual machines (VMs) with Internet access through nested chains of VPNs and Tor. This series of guides goes far beyond that. If you’re here, you may be using (or considering) a VPN service to provide online privacy and anonymity, and perhaps to circumvent Internet censorship. Advanced Privacy and Anonymity Using VMs, VPN’s, Tor, etc Part 1 – Introduction
