On Wednesday, 27 September 2017 10:04:58 UTC+10, Person  wrote:
> On Tuesday, September 19, 2017 at 11:02:50 AM UTC+8, Person wrote:
> > Let's say you have an online identity that you want to keep separate from 
> > your personal information. On Qubes, is it possible to keep i information 
> > completely separate without physical separation? I have considered using a 
> > separate OS virtualized in Qubes, but it may possibly leak the same device 
> > data. Multibooting with Qubes is also not the safest idea. 
> > 
> > What is the best way to keep online information from being traced back to 
> > you on Qubes?
> 
> Oh, okay. Can this issue can be minimized on Tor or other certain types of 
> browsers? Would a certain VPN work? (I normally distrust VPNs, and certain 
> ones don't work well with Tor, so I probably will not use VPNs.)


TOR merely anonomises you and your location, anything that can be seen from the 
browser and the interaction of the webpage to the server and vice-versa can 
still be seen and detected.

The User Agent doesn't give too much information, but it is advisable to alter 
it to be what you want to show what you want.

IF you want to see what else they can find out, have a look ingot the 
javascript BROWSER object.

VPNs are more for security.
If I'm on an insecure network with my laptop, I will VPN to my home network and 
thus have an encrypted connection out from the insecure network that I don't 
trust.

Also, I have VPN available so that if I need to connect to a server at my 
house, then I can VPN in and do what I need to without having other ports 
exposed to the outside world.

If you VPN, you can then TOR through the VPN. That will create another layer of 
security.
I have multiple locations where I can VPN to that I know and trust. Through one 
VPN I can TOR out to then create a VPN through that TOR tunnel to another 
location and TOR through that.

It hides my location and keeps data encrypted as best it can, but what they can 
find out about me is always going to be minimal, but determinable.

Thus I have multiple VMs for many things. One for one website, one for 
another.. That way, they can't connect the 2 using the browser data. Only by my 
external IP, which keeps changing because of TOR and such, unless I trust the 
site and connect directly to it.

This is why I block many advertising websites. I block and don't use FaceBook, 
I don't use Twitter or Instagram or any of those things.

I only use Google for Apps and even block most of Googles invasion stuff.

So I have many things that I am doing to protect myself.

In browsers (FF BASED), I run NoScript. I also use the Web Developer Toolbar 
and User Agent Switcher from Chris, and FireBug. It's a standard Setup for me.
It allows me to run only what locations I want scripts to run from.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4252d513-1783-4160-9914-e4eb0fb192dc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to