Anonymity: Basics


the condition of being anonymous.

lack of outstanding, individual, or unusual features; impersonality.

Two definition you get for anonymity when you google the word, but from a hacker perspective anonymity means a fine line between jail and freedom. In essence anonymity is where the game is played, the game of cat and mouse. In this tutorial I’m gonna try my best to address the basics and my techniques. Do whatever you please with this information, but don’t blame me if you get caught after all who’s there to blame but yourself?

The first thing to address is that even when using a proxy, vpn, or spoofing you still run a risk. Using proxies that you don’t know what the owner is doing with your information is such one risk. If you don’t like this risk then don’t use any anonymity software, simple as that. Of course if you’re still reading this then you clearly accept the risks.

With that outta the way, time to explain proxies. With a simple google search the definition for proxies are:

In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers.

Yes that’s the defintion of a proxy. I’m not gonna go into much detail about proxies and how they work. The point here is that when used correctly a proxy can in essence put a veil on your real Ip, for example using a Russian Proxy would make it look like you’re in Russia when in reality you are in your parents basement drinking coffee. There are many sources but my favorite to use is this particular website:

VPNs are in my opinion the same as proxies, but I’m not gonna go into much detail about the differences. A VPNs purpose is the same to “hide” your real Ip and thus fooling pretty much everyone, well almost. There’s no one-hundred percent to hide your Ip no matter what you try, this should be noted when playing the game, yes this is a game as in cat and mice. I use the VPN GhostVPN on my phone, but not on my computer for security reasons.

I personally use a combination of Tor (proxy) and GhostVPN on my phone and I use a program called proxychains. Proxychains does what the name says, it allows you to chain multiple proxies together so that way you “hop” between the proxies. Although even this method isn’t 100% bullet proof, nothing is.

EDIT: If you’re interested in more of in depth detail please check out this really good article:

How to Become a Ghost Hacker - Merozey' Tips by Merozey

(I like to thank Cromical for showing me this article)


Nice article! If you’d really like to know more about techniques that can help you remain Anonymous and so on take a look at this article: How to Become a Ghost Hacker - Merozey’ Tips by Merozey! It’s really in-depth and I think you’ll learn a lot from it that can help with later articles! Otherwise nice job! However, I understood you did say:

Which I can respect, but I’m sure it would be better to actually get into detail about how they work. People, and yourself would benefit by having that knowledge. I personally find all forms of anonymity very-very fascinating, but due to my procrastinating self I haven’t gotten around to reading up on it too much (binge watching Mr.Robot). Anyways, in the long run good job although there is still room for improvement (as there is with all our articles).

1 Like

I understand but I had the suspicion someone else described in detail about what and how proxies work. I didn’t want the hassle to repeat what already been written. Thanks for the suggestions.


Ah, makes sense on your part. Either way it was great.

From the point of view of hiding your IP they may look the same, but technically they are completely different beasts. The most obvious difference between both is that the VPN usually encrypts the traffic an works transparently for all applications (you basically get a new network interface, a tunnel for your traffic) whereas to connect through a proxy the application needs to support that kind of connection or you have to “proxyfy it”.

The main purpose of VPNs is actually to access remote networks in a secure way (so the encryption) and as if you were actually in the remote network. They are like a virtual cable from your machine to the remote network. It can be use to hide your IP but just because, in a sense, you are using the remote network to bounce your connection…

A post on this is coming… not sure when but it will come unless somebody else write it first :wink:


@0x00pf: In the VPN post you just mentioned, will you be covering l2tp and related things? using C?

1 Like

I’ve talked to @unh0lys0da in the IRC about that :slight_smile:. In principle I was planning to use other technology easier to grasp, I believe, for an introductory paper. Actually, I found out yesterday that I need a bit more education on managed L2PTv3 tunnels… I also find out that there are quite some interesting topics behind them


I’ll definitely look into the possibility of l2tp and other related things… I should note that this was my opinion based so please don’t take offense if I may say something wrong.