How to Be Anonymous and Secure Online

It is one of the web’s often-mentioned and even somewhat-creepy moments – a user is served with a banner ad promoting products on a website they visited days, or even months in the past. It is as if the ads are stalking them from site to site. Most people know that issue of “ad stalking” or “re-targeting”, as marketers refer to it – has something to do with cookies; however, that is barely the half of it. The underlying tracking for all of this is provided by Google, Microsoft or Yahoo (depending on what search engine you use), or even one of a number of programmatic ad platforms most users have never heard of. The system notices that sites users are visiting, choosing the right moment to “re-market” services or products from a website they visited at some point in the past, based on how receptive it thinks the users will be.  Of course – the promoted website has paid for this privilege.

Free Services Come at a Cost

So is this creepy… well, only if you don’t fully grasp what is really going on when you are using the Internet. As far as marketers are concerned, if a person has a negative feeling towards the ad, then the re-marketing has not worked. Now, privacy would be challenging enough if marketers and advertisers were the only ones snooping through your personal information and installing software and cookies on your device without your knowledge. However, every free service (including social media sites, search engines, cloud storage, and many more) uses this business model. To put simply – user data is too valuable not to be taken advantage of. Those free services you use are free because the user has become the product, whose behavior patterns and habits can be sold to the third parties. Meanwhile, broadband providers are increasingly required by the government to save the Internet usage history and data logs of users for reasons justified by national security.

Dynamic Pricing

While this type of marketing is seemingly harmless, this personal tracking can also cost you money through a marketing technique named “dynamic pricing”. With this technique, websites mysteriously offer two different users a different bill or identical products or services. While we don’t exactly know how this is done, everything from the browser used, the search engine, the buying history of the person or the profile of data suggesting his or her affluence may come into play. Surprisingly, even the number of searches may potentially raise the price. Seemingly, this is most common when users are buying commodity services such as car rental, hotel booking and flights, all of which are sold through a network of intermediary providers who get to decide the rules without having to tell anyone what these are. In this context, privacy becomes about being treated fairly, something Internet providers don’t always seem keen to do.

Using VPNs to Stay Anonymous

The only way to ensure advertisers, marketers, and general outsiders don’t gather information about you while you are browsing the Internet is to appear to be somewhere else, in a completely different location. Thankfully, VPN services are everywhere these days, and they have not only the advantage of securing the traffic between your PC and servers, but also masking your IP address and location. Furthermore, you don’t even have to spend a lot of money on them; because even the cheapest VPN services out there have enough features to provide you with complete security.  Virtual Private Networks also double as a way to get access to Geo-blocked content – if you are in a country that cannot get the BBC iPlayer, Netflix or Hulu, a good VPN could be your ticket.

Recommended VPN Providers:

·         ExpressVPN

This provider advertises itself as the fastest VPN on the planet, and while cannot corroborate the claim, according to the number of satisfied users, it seems ExpressVPN lives up to the hype. The setup is really simple, the interface is intuitive, and you can utilize the system over your smartphone and tablet.

·         PureVPN

PureVPN is a service provider that offers one of the most secure and one of the fastest VPN services on the market. As you can see in this PureVPN review, it does great in speed test and protects you online with its impressive 256-bit encrypted secure servers.

·         Mullvad

Mullvad is one of the rare services that actually don’t keep users’ activity logs, and does whatever it can to ensure the safety of the client’s identity. While the features are just a little above average, the service takes Bitcoin, if you want to avoid potential risks while paying for the VPN.

Avoiding Free VPNs

Let’s try to answer one of the most important question – why are some VPNs free? The answer is quite simple, they can perform the same sort of profiling of user behavior that the ISP does, but for commercial rather than legal reasons. Effectively, the user is simply swapping the spying of one company – the Internet Service Provider, for another – free Virtual Private Network.

British Spies Attacked Hackers

“Targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs.”

“Anyone here have access to a website with at least 10,000+ unique traffic per day?” asks one hacktivist in a transcript taken from a conversation that began in an Operation Payback chat room. An agent responds and claims to have access to a porn website with 27,000 users per day. “Love it,” answers the hacktivist. The hackers ask for access to sites with traffic so they can identify users of the site, secretly take over their computers with malware and then use those computers to mount a DDOS attack against a government or commercial website.

Full Story –

Anonymous forced Facebook offline

Facebook admitted they experienced problems in a statement.

“Earlier today, some users briefly experienced issues loading the site. The issues have since been resolved and everyone should now have access to Facebook. We apologize for any inconvenience,” the company’s announcement said.

An attack orchestrated by the infamous hacktivist group Anonymous forced Facebook offline, with many of its 900 million users unable to log onto the social network for hours.

Anonymous took to Twitter, using their @YourAnonNews handle to say “looks like good old Facebook is having packet problems,” and sprinkled it with some no-nonsense hashtags like #FuckFacebook and #FuckYourIPO.

They followed with “RIP Facebook a new sound of tango down bitches”, which resulted in “RIP Facebook” trending on Twitter both in the United States and worldwide.

March 31, 2012 – Operation: BLACKOUT

The greatest enemy of freedom is a happy slave.”

To protest SOPA, Wallstreet, our irresponsible leaders and the beloved
bankers who are starving the world for their own selfish needs out of
sheer sadistic fun, On March 31, anonymous will shut the Internet down.


In order to shut the Internet down, one thing is to be done. Down the
13 root DNS servers of the Internet. Those servers are as follow:


By cutting these off the Internet, nobody will be able to perform a
domain name look-up, thus, disabling the HTTP Internet, which is,
after all, the most widely used function of the Web. Anybody entering
“” or ANY other url, will get an error page,
thus, they will think the Internet is down, which is, close enough.
Remember, this is a protest, we are not trying to ‘kill’ the Internet,
we are only temporarily shutting it down where it hurts the most.

While some ISPs uses DNS caching, most are configured to use a low
expire time for the cache, thus not being a valid failover solution
in the case the root servers are down. It is mostly used for speed,
not redundancy.

We have compiled a Reflective DNS Amplification DDoS tool to be used for
this attack. It is based on AntiSec’s DHN, contains a few bugfix, a
different dns list/target support and is a bit stripped down for speed.

The principle is simple; a flaw that uses forged UDP packets is to be
used to trigger a rush of DNS queries all redirected and reflected to
those 13 IPs. The flaw is as follow; since the UDP protocol allows it,
we can change the source IP of the sender to our target, thus spoofing
the source of the DNS query.

The DNS server will then respond to that query by sending the answer to
the spoofed IP. Since the answer is always bigger than the query, the
DNS answers will then flood the target ip. It is called an amplified
because we can use small packets to generate large traffic. It is called
reflective because we will not send the queries to the root name servers,
instead, we will use a list of known vulnerable DNS servers which will
attack the root servers for us.

DDoS request —> [Vulnerable DNS Server ] Normal client requests
| ( Spoofed UDP requests
| will redirect the answers
| to the root name server )
[ 13 root servers ] * BAM

Since the attack will be using static IP addresses, it will not rely
on name server resolution, thus enabling us to keep the attack up even
while the Internet is down. The very fact that nobody will be able to
make new requests to use the Internet will slow down those who will try
to stop the attack. It may only lasts one hour, maybe more, maybe even
a few days. No matter what, it will be global. It will be known.


download link in #opGlobalBlackout
The tool is named “ramp” and stands for Reflective Amplification. It is
located in the \ramp\ folder.

———-> Windows users

In order to run “ramp”, you will need to download and install these two


The Winpcap driver is a standard library and the TOR client is used as
a proxy client for using the TOR network.

It is also recommended to use a VPN, feel free to choose your own flavor of this.

To launch the tool, just execute “\ramp\launch.bat” and wait. The attack
will start by itself.

———-> Linux users

The “ramp” linux client is located under the \ramp\linux\ folder and
needs a working installation of python and scapy.

Read more:

“He who sacrifices freedom for security deserves neither.”
Benjamin Franklin

We know you won’t listen. We know you won’t change. We know it’s because
you don’t want to. We know it’s because you like it how it is. You bullied
us into your delusion. We have seen you brutalize harmless old womans who were
protesting for peace. We do not forget because we know you will only use that
to start again. We know your true face. We know you will never stop. Neither
are we. We know.

We are Anonymous.
We are Legion.
We do not Forgive.
We do not Forget.
You know who you are, Expect us.

From :

Power grid not a target – Says Anonymous

A masked hacker, part of the Anonymous group, is pictured in Lyon, France, in January (AFP, Jean-Philippe Ksiazek)

“Why would Anons shut off a power grid? There are ppl on life support/other vital services that rely on it. Try again NSA. #FearMongering,” Anonymous said in a message on @YourAnonNews.
In addition to rejecting the Journal report, Anonymous also organized a spam attack on the newspaper’s Facebook pages on Tuesday, urging supporters to post comments denouncing the article.