SMS provides a secure communication channel for users. However, between the users and the SMS server, there are four components that users should take
great care to hide their trace from their trackers. They are secure connection, secure web browser, secure device, and secure email account. This
section is about how to make a secure connection from your device to the SMS server.
As you may have already known that all the communication between the users and the SMS server is via SSL (i.e. https protocol), a quite secure way
to use strong encryption method to protect your sent messages content, which avoid anyone to intercept your secret. Then why we still need an additional
secure connection? The reason is that your counter parts are not script kiddies, but a gang of state supported and well equipped professional hackers.
Even your ISP will help them to monitor your cyber activities if government authority requests for it. So, they may not get your messages content easily,
but they can certainly get your SMS sites DNS name and IP address easily if you don't take further steps to hide them. Once they know your SMS site, they
can track all connected IP addresses to your SMS site. If SMS users don't connect to the SMS server with secure connections, their IP addresses and then
their identities can be uncovered by government agents. Therefore, secure connection serves two purposes, hide your SMS site and true identity of SMS
users, or at least protect SMS users even your enemies know your SMS site.
There are three ways to build a secure connection. They are virtual private network (VPN), Tor browser (Tor network), and public available WiFi
hotspots. In general, public available WiFi hotspots are considered insecure, then why should they be used? Because 'secure' in here also means
anonymity.
Virtual Private Network (VPN)
VPN could hide your true IP address as you connect to your SMS server, but you must remember that VPN is NOT designed for anonymity. Your VPN
provider knows your true IP address (and hence your true identity), and all your cyber activities if he wants to monitor you. Therefore, how to choose
your VPN provider is very important for your safety. The basic principles are:
| 1. |
If you need to hide yourself from your local government, don't subscribe those VPN providers that your local government's jurisdiction can be
applied to them.
|
| |
| 2. |
If it is possible, use free VPN services. Although freely available VPN services have many disadvantages, they could provide one more layer of
anonymity for you. They don't have your payment record, and payment record can be used to identify a person. However, you should remember, free
VPN providers still know your true IP address, and your cyber activities. So, rule number 1 must be considered as select your free VPN provider(s).
|
For free VPN service, I recommend VPN Gate. It is developed and run by University of Tsukuba, Japan.
Please note that part of VPN servers provided by VPN Gate come from volunteers, and some of them are located into the territory of dictatorial regimes like
China and Russia, you should avoid those VPN servers. Table 5.1.1 shows you the brief steps to install and use VPN Gate service on varied platforms.
Another honerable mention free VPN provider is Proton VPN. It is in fact not totally free, but it provides
a very good free usage plan for registered users.
| Platform |
Installation & Usage |
| Microsoft Windows |
| 1. |
Go to VPN Gate client download page and click on the link 'Download SoftEther VPN Client +
VPN Gate Client Plugin' to download a compressed file to your computer. Decompress it and install the VPN Gate client.
|
| 2. |
Select an icon 'SoftEther VPN Client Manager' on your desktop, launch it and and double click option 'VPN Gate Public VPN Relay Servers'. Available
public VPN relay searvers will be listed on another pop-up window.
|
| 3. |
Select any one VPN server from the list, click on the button 'Connect to the VPN Server' or just double click it will trigger the connection, another
pop-up window will appear for you to select connection protocol (TCP or UDP), then click the 'OK' button to build a VPN link for your computer. If
everything is OK, a new item 'VPN Gate Connection' with status 'Connected' will be shown on the SoftEther VPN Client Manager.
|
|
| Android |
| 1. |
Install app 'OpenVPN Connect - OpenVPN App' from Google Play. Note: You must make sure the installed app is developed by openvpn.net by checking
app supporting website. Any other apps with similar name may function differently or even have adware or spyware embedded.
|
| 2. |
Access VPN Gate with web browser. From the web page, you will find a list of available VPN servers. Click
on the link 'OpenVPN Config file' of any VPN server you desired. Then another web page 'Download the OpenVPN Configuration File (.ovpn file)'
will be shown. You should find two to four '.opvn' file download links, one set for DDNS hostname and the other set for including IP address.
Select any one '.opvn' file you wanted to download by clicking on it's link. A '.ovpn' file will then be saved to your Android device (usually
on 'Downloads').
|
| 3. |
Open Andriod file location to find your saved '.ovpn' file, click on the saved file, then you will be asked to open it with app 'OpenVPN Connect',
click 'Just once' link to open it. Then you will be asked to import the '.opvn' profile, click 'OK' button to accept it. Now, a new VPN Gate VPN
server profile has been added to your OpenVPN Connect app. You may test it by clicking the 'CONNECT' button. If everything is fine, OpenVPN will
show you the new VPN profile with status 'CONNECTED'.
|
|
| iOS (iPhone, iPad) |
| 1. |
Install app 'OpenVPN Connect - OpenVPN App' from App Store. Note: You must make sure the installed app is developed by 'OpenVPN Technologies'.
Any other apps with similar name may function differently or even have adware or spyware embedded.
|
| 2. |
Access VPN Gate with web browser. From the web page, you will find a list of available VPN servers. Click
on the link 'OpenVPN Config file' of any VPN server you desired. Then another web page 'Download the OpenVPN Configuration File (.ovpn file)'
will be shown. You should find two to four '.opvn' file download links, one set for DDNS hostname and the other set for including IP address.
Select any one '.opvn' file you wanted to download by clicking on it's link. A '.ovpn' file will then be downloaded to your iOS device. Depends
on what web browser you used, the downloaded '.opvn' file is usually to be put on the 'Downloads' folder of corresponding web browser.
|
| 3. |
Find your saved '.opvn' file, and then click on it. It will show you it is an OpenVPN profile, then click the 'share' symbol button on bottom left
corner. A list of apps will be shown for you, select OpenVPN, then click 'ADD' button on the page 'Import Profile'. Now, A new VPN Gate VPN server
profile has been added to your OpenVPN Connect app. You may test it by clicking the 'CONNECT' button. If everything is fine, OpenVPN will show you
the new VPN profile with status 'CONNECTED'.
|
|
| Ubuntu Linux |
| 1. |
Assume your desktop environment is GNOME and network is handled by GNOME network manager. You need to install software packages 'openvpn' and
'network-manager-openvpn-gnome' by following command:
apt-get install openvpn network-manager-openvpn-gnome
|
| 2. |
Access VPN Gate with web browser. From the web page, you will find a list of available VPN servers. Click
on the link 'OpenVPN Config file' of any VPN server you desired. Then another web page 'Download the OpenVPN Configuration File (.ovpn file)'
will be shown. You should find two to four '.opvn' file download links, one set for DDNS hostname and the other set for including IP address.
Select any one '.opvn' file you wanted to download by clicking on it's link. A '.ovpn' file will then be saved to your Linux machine (usually
on folder 'Downloads' under your home directory).
|
| 3. |
Open 'Settings' of Ubuntu Linux, click 'Network' item on left hand side menu. Then corresponding page will be shown, on 'VPN' section, click the
'+' button, another popup window with title 'Add VPN' will be displayed.
|
| 4. |
Select option 'Import from file...', then get the downloaded '.ovpn' file from the file selection window, and click the 'Open' button. Then, all
details of the VPN profile will be shown on the 'Add VPN' window. Now, click the 'Add' button to accept it. A newly added VPN profile entry will
be shown on the VPN section. You may test it by clicking the toggle switch besides it.
|
|
| Table 5.1.1 |
Important Note:
To check your VPN status and details, launch a web browser, and go to web site https://ipleak.net. If DNS service
shown on this web page is still from your original ISP, please wait a while and check again. Don't do anything until DNS service of your device is picked up
by the VPN provider. Otherwise, your internet activities could still be traced by your ISP.
|
Tor Browser (Tor Network)
Tor browser is designed for user anonymity. When you use Tor browser to go to the internet, it will go through three arbitrary selected nodes of Tor network
around the world, and connection between all nodes are strongly encrypted. Because of it's nature, speed of Tor browser could be very slow. Tor project officially
support five platofrms. They are MS Windows, MacOS X, Linux, OpenBSD and Android. Tor browser installation on MS Windows, Linux and macOS are quite straightforward,
just decompress the download archive and run it. Tor browser for Android is installed via Google Play store. Table 5.1.2 summarize some tips for Tor browser
installation and usage you should know about.
Unfortunately, FireFox (except on iOS) and hence Tor browser are not supported by SMS 2.x due to technical issues. Therefore, if you want to use Tor like web
browser to protect yourself, only few options on desktop or laptop computers are available. For example, you may use Brave web browser's private window with
Tor feature on MS Windows, Linux or macOS. Note: Brave web browser for Android and iOS has no this feature.
| # |
Tips |
| 1. |
For security reason, you cannot run Tor browser in super user mode in Linux.
|
| 2. |
Although Tor project has no officially supported Tor browser on iOS (iPhone and iPad), an application called 'Onion Browser' (developed by Mike Tigas) can
use Tor network to protect your web surfing activities. However, you must bear in mind that Onion Browser can't fully protect your IP address from leaking
outside Tor network, especially on multimedia handling.
|
| Table 5.1.2 |
Besides web surfing, if you want to use Tor network to protect all your internet activities, you may turn to use Whonix. Whonix is two VirtualBox virtual
machines built on Debian Linux. One is called 'gateway', another one is called 'workstation'. 'Gateway' has two network interfaces, one of the network
interfaces is used to connect to the Tor network, another network interface is used locally for 'workstation'. All internet connection from the 'workstation'
must go through the 'gateway'. Therefore, all internet activities on the 'workstation' is protected by the Tor network. Since Whonix must be run on VirtualBox,
so that it is for desktop or laptop computers only, and it supports MS Windows, Linux, macOS (except Apple silicon mac) and Qubes.
To download Whonix, go to it's download page. For more details of Whonix, you may consult
Whonix WiKi page.
|
Public WiFi Hotspot
Public available WiFi hotspots are usually insecure places (see this article
for details). However, if you take all the precautions, you could still keep yourself anonymity and safe.
Although public WiFi hotspot can't expose your true identity directly, your trackers still have many ways to correlate indirect data to identify you.
For example, coffee cafes usually provide public WiFi access, and those places also commonly have CCTV monitoring. Your face on CCTV timeline, and internet
activities log on the public WiFi router, could let secret police narrow down who is the right person they target. Therefore, the following tips are for you
as using public WiFi hotspots:
| 1. |
Don't hang on same public WiFi hotspot frequently or regularly.
|
| |
| 2. |
To cover your face, a cap / sunglasses / surgical mask is helpful. Don't dress too outstanding, and don't wear attractive or easily identified accessories.
You must keep yourself low profile.
|
| |
| 3. |
If it is possible, use VPN or Tor network to protect your internet connection as you are using public WiFi hotspot.
|
| |
| 4. |
Activate firewall and disable all sharing on your device. For mobile devices, also disable bluetooth, NFC and all other remote connection ways
except your WiFi card.
|
|