If I log in to my account that includes my name, will my previously anonymous device now be associated with my account? What if I do the same in TailsOS?

  • mipadaitu@lemmy.world
    link
    fedilink
    English
    arrow-up
    32
    ·
    4 months ago

    Yes. That’s how a bunch of people get caught. Sometimes it’s just logging into an “anonymous” account that shares a username with a trackable/traceable network.

    Never log into anything if you’re expecting privacy.

  • jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    14
    ·
    edit-2
    4 months ago

    A couple things will happen. Regardless of how you access tor (Tor browser bundle, tails, whonix, etc)

    Your social media account will be associated as a Tor user.

    Any cookies associated with the session, any browser fingerprinting, the browser, that you logged in via tor will now be tied to your social media identity. So if you look up a recipe for lemon meringue pie, and then in the same browser log into your social media account, even though it’s via TOR, someone will be able to say this social media user looked up a recipe for lemon meringue pie

    Many social media accounts, will flag the account as high risk now, and require you to do extensive verification of your identity. This is honestly a good thing, to prevent people from attacking your account

    What you’re describing, is very much like cutting out magazine letters, dropping a letter into the mail from a random city, and then in the letter identifying who you are with your full name and address. You can do it, but what’s the point?

    It’s up to you, if this fits your threat model, the EFF has some good guides, privacy guides also have some good guides, you need to decide how you want to use the internet.

    • senilelemon@lemmy.worldOP
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      4 months ago

      What if I turn off my browser or restart my device afterwards? Is it too late, even on TailsOS/Whonix?

      • jet@hackertalks.com
        link
        fedilink
        English
        arrow-up
        6
        ·
        edit-2
        4 months ago

        A lot of that depends on your architecture and how you use your systems.

        Nothing will keep your activities separated if you do two things in the same session. Depending on your browser you could persist cookies across sessions, or browser plugins, or just a outdated version of whonix could be enough to link accounts

        What is your objective in your use case?

        • senilelemon@lemmy.worldOP
          link
          fedilink
          arrow-up
          3
          ·
          edit-2
          4 months ago

          My objective is to make my actual personal identity not be traced across the web to the many accounts I have made on sites where I chose not to give any personal info.

          If I open Facebook under my own name, then log into lemmy, I do not want my own identity to be linked with my lemmy account. I know I will be tracked if I do both in the same session or via my browsing history/cookies on the same browser. But what can I do to seperate the link between them?

          Is using another browser/rebooting enough? Should I change my Tor connections? Or do I have to use TailsOS on a USB where I restart the PC before logging in to different accounts?

          I want to know how much is just enough so my two accounts/identities don’t get linked.

          • jet@hackertalks.com
            link
            fedilink
            English
            arrow-up
            6
            ·
            edit-2
            4 months ago

            ok, let me restate - You want to use TWO social media services at the same time without them being linked to each other and yourself. Fair enough.

            Some methods:

            1. Qubes - Setup a VPN netvm, to a different VPN, for a VM tied to each social media account. This ensures your network paths, cookies, browsers never cross
            2. SPN Is interesting, each site would have its own circuit, then you use independent browsers for each account. This is more experimental, but a interesting option, not as guaranteed as Qubes.
            3. Run your own VMs, one per identity, with their own TOR connections, and their own VPNs on whatever computer you normally use (you could use the VMs for whonix or whatever); Just don’t cross contaminate the TOR circuits
            • Whatever you do, only one account/identity per setup, never mix! Never re-use.
            • These types of setups are vulnerable to timing information (you turn on the computer and connect to the same 2 social media accounts at the same time, and turn off the computer and disconnect at the same time, every day for example)
            • senilelemon@lemmy.worldOP
              link
              fedilink
              arrow-up
              4
              ·
              4 months ago

              Holy shit, How fast do you type? And your explainations are so detailed, thanks a lot!

              Is running two different operating systems on different VPNs and different devices also good enough?

              Is using one service on the clearnet normally and the other service later after rebooting with TailsOS also a viable option?

              Also, QubesOS seems like the perfect solution for me, thank you for the suggestion.

              • jet@hackertalks.com
                link
                fedilink
                English
                arrow-up
                5
                ·
                4 months ago

                good enough?

                That is such a problematic statement, depends on your threat model, how much effort they are willing to spend to identify you. Honestly, truly, read the EFF guides, and privacy guides to help you establish your threat models.

                Any two online identities that use different, and consistent paths, without cross contamination will be sufficient for social media like having two facebook accounts so one for friends and family and one for your alternative lifestyle without cross contamination.

                Qubes is great, I recommend you play with it.

              • jet@hackertalks.com
                link
                fedilink
                English
                arrow-up
                2
                ·
                edit-2
                4 months ago

                One more option I forgot to mention, if you’re not really worried about your security, this is more of a nice to have:

                Some VPN software like mullvad browser extension Will let you set site specific VPN exit points. So you could have multiple profiles of Firefox or even Chrome running, each with the browser extension, each specifying different VPN exit points. I wouldn’t consider this high security, but for having two social media accounts coming from two IP addresses with separate browsers and separate cookies this will work

                Under the hood, it just uses different socks proxy servers that known IP addresses, so you could set it up without using the extension, but the extension makes it really easy

  • TheDarkQuark@lemmy.world
    link
    fedilink
    arrow-up
    12
    ·
    4 months ago

    What social media are we talking? I access Lemmy through Tor every now and them. As for more intrusive social media (like Facebook and Instagram), they’ll try to associate your IP to your profile. So, they would be suspicious of continuously changing IPs, and ask for more verification (even more intrusive), or just ban you from their services. Also, they can easily know if the request is made from a tor node (try opening https://www.dan.me.uk/tornodes from a tor IP).

    However, if I were to even ignore you accessing their service via a tor IP, it is still not private. Facebook, for instance, is very adamant on users providing their actual info. I tried opening a facebook account on multiple occasions, both with fake and partial information, and always got banned from their service. I have completely stopped trying now.

    Let’s say you already have an account, and you are accessing the service through Tor (without them blocking or banning you somehow). It would still be a bad idea privacy-wise, because all your user activity is still being tracked, and linked to your profile (which might have your real info). So, you are still being extensively profiled, and your data would still be used for “improving their services and the user experience”.

    So, unfortunately, the only thing to do is not provide them with more data points to track you, i.e. avoid intrusive social media altogether or move to social media which collect less data.

    • senilelemon@lemmy.worldOP
      link
      fedilink
      arrow-up
      3
      ·
      edit-2
      4 months ago

      So, unfortunately, the only thing to do is not provide them with more data points to track you, i.e. avoid intrusive social media altogether or move to social media which collect less data.

      Yeah… That’s not very possible. 95% of people use Facebook/Instagram/Snapchat and these are the only ways to contact them. I’m ok with using these intrusive services for a few minutes at a time to contact people. However, I absolutely do not want facebook to know that me and @senilelemon@lemmy.world are the exact same person.

      • TheDarkQuark@lemmy.world
        link
        fedilink
        arrow-up
        3
        ·
        4 months ago

        Then, to minimize the harm, be cautious of (third-party) cookies (reject them all) and may be use a different browser/session for Facebook.

  • Knighthawk 0811
    link
    fedilink
    English
    arrow-up
    2
    ·
    4 months ago

    if you log into mainstream SM with your account then all previous and future things you do on that system will be linked to you on their end in some way.