This Instructable will demonstrate a method of automatic wireless anonymity using two security applications.
Step 1Downloading the applications.
The two applications we will be using are called MadMACs and TOR .
When a computer connects to a wireless network it usually obtains an IP through a DHCP server, which is basically just a method of providing dynamic IPs so that everyone does not have to sit down and figure out what IP everyone else is using and then manually set one on their own machine. When a request is made to a DHCP server two pieces of information are recorded, your MAC address and your hostname. What MadMACs does is randomize both of these for you automatically every time you boot, or every time you manually tell the software to do so.
Once your computer is connected to the network, randomized or not, most of the traffic leaving your PC is in the clear. So any network admin, or *nix user with free software can eavesdrop on everything you do. TOR solves this problem through a suite of applications that anonymize your connection point and encrypt all your traffic.
So with both pieces of software installed you have hidden your identity from the network, and made all of your traffic unreadable by anyone else on the network you have chosen to connect to.
(Sorry, no how madmacs works, but then its pretty self explanatory)
When a computer connects to a wireless network it usually obtains an IP through a DHCP server, which is basically just a method of providing dynamic IPs so that everyone does not have to sit down and figure out what IP everyone else is using and then manually set one on their own machine. When a request is made to a DHCP server two pieces of information are recorded, your MAC address and your hostname. What MadMACs does is randomize both of these for you automatically every time you boot, or every time you manually tell the software to do so.
Once your computer is connected to the network, randomized or not, most of the traffic leaving your PC is in the clear. So any network admin, or *nix user with free software can eavesdrop on everything you do. TOR solves this problem through a suite of applications that anonymize your connection point and encrypt all your traffic.
So with both pieces of software installed you have hidden your identity from the network, and made all of your traffic unreadable by anyone else on the network you have chosen to connect to.
(Sorry, no how madmacs works, but then its pretty self explanatory)
Step 2Installing and Configuring MadMACS
For the normal user the MadMACS installation is pretty straightforward.
You just click OK or YES for all of the options, making sure you select your wireless card for randomization.
At setup window 5 in the MadMACs program you are given the option of typing in a prefix for the the MAC address randomized. This just identifies the brand of the MAC to the DHCP server, you can find a database of prefixes here
Advanced, paranoid users :
For super paranoid users who rightfully do not trust precompiled code from virtually unknown publishers, the source is provided with the compiled program. I've made an instrutable on how to do this.
The compiler is available from AUTOIT, here. You want version 3.
You just click OK or YES for all of the options, making sure you select your wireless card for randomization.
At setup window 5 in the MadMACs program you are given the option of typing in a prefix for the the MAC address randomized. This just identifies the brand of the MAC to the DHCP server, you can find a database of prefixes here
Advanced, paranoid users :
For super paranoid users who rightfully do not trust precompiled code from virtually unknown publishers, the source is provided with the compiled program. I've made an instrutable on how to do this.
The compiler is available from AUTOIT, here. You want version 3.
Step 3Installing Tor
Installing TOR is as easy as installing any other program. So just keep clicking next until it is completely installed.
The difficult part is configuring your programs to use it.
Here are a couple screenshots of the Tor installation program, don't worry if your version numbers are different, and leave all the options checked.
The difficult part is configuring your programs to use it.
Here are a couple screenshots of the Tor installation program, don't worry if your version numbers are different, and leave all the options checked.
Step 4Configuring your Programs to use TOR
TOR is an anonymizing program which is interfaced through a proxy that is included with the suite.
If you use Firefox it is incredibly easy to start using TOR, all you have to do is go to the Tor Buttonaddon page, and install it. Then whenever you need to browse anonymously (and securely) you just click the tor button and you're all set.
For your other programs, you need to look up how the program interfaces with proxies, and manually enter the information. Since there is such a wide variety of programs people use I won't list any here, but I will provide details upon request. Just leave a comment with the program name and I will reply with a brief how-to.
Proxy Details for TOR ::
localhost port 8118
Or, 127.0.0.1 port 8118
I've added three examples for programs I think are still somewhat popular, each are two pictures with comments. First two are Aim, second two are MSN, third two is Pidgin the gaim successor.
If you use Firefox it is incredibly easy to start using TOR, all you have to do is go to the Tor Buttonaddon page, and install it. Then whenever you need to browse anonymously (and securely) you just click the tor button and you're all set.
For your other programs, you need to look up how the program interfaces with proxies, and manually enter the information. Since there is such a wide variety of programs people use I won't list any here, but I will provide details upon request. Just leave a comment with the program name and I will reply with a brief how-to.
Proxy Details for TOR ::
localhost port 8118
Or, 127.0.0.1 port 8118
I've added three examples for programs I think are still somewhat popular, each are two pictures with comments. First two are Aim, second two are MSN, third two is Pidgin the gaim successor.
Step 5Make sure its all working.
My basic self test is to point Firefox to Whatismyip and make sure its not my home IP. to test it in the field, toggle the tor button while hitting your refresh key, when the tor button is on it should be a different IP from when its off.
If all works out, your laptop will now boot with a randomized MAC and hostname, and TOR will start and allow you to encrypt all your traffic.
It was bought up that TOR exit nodes could still eavesdrop on your traffic. For secure web browsing through an exit node you can use sites such as http://www.conceal.ws/ which encrypt the traffic through your entire session. More sites such as this one would be appreciated.
Any problems, feel free to comment.
Thats it for now, stay anonymous.
If all works out, your laptop will now boot with a randomized MAC and hostname, and TOR will start and allow you to encrypt all your traffic.
It was bought up that TOR exit nodes could still eavesdrop on your traffic. For secure web browsing through an exit node you can use sites such as http://www.conceal.ws/ which encrypt the traffic through your entire session. More sites such as this one would be appreciated.
Any problems, feel free to comment.
Thats it for now, stay anonymous.