<p>In this tutorial we're going to take a look at how to manage your online Anonymity.</p>
<imgsrc="0.png"class="imgRz">
<p>We want 3 ways to access websites. The first being while using tor, for complete anonymity. The second is to do the same but to masquerade it with a non-KYC VPN which will also be acquired anonymously, and the last is without any protection.</p>
<imgsrc="1.png"class="imgRz">
<p>As a preventive measure, we're going to separate each VMs using VLANs, so that there's a clear separation between any KYC VMs, and VMs used for anonymity. To do so there will be 3 separate VLANs, one being for Anonymity purposes, and the others for KYC use.
For Anonymity, there will be a veracrypt hidden partition in use for plausible deniability.</p>
<imgsrc="2.png"class="imgRz">
<p>To prepare the computer for those tasks, we will rely on opensource software to avoid any tracking, we'll remove logs from arch linux, and from pfsense. </p>
<p>And lastly, we're going to take a look at how to keep track of your accesses to the websites you access anonymously</p>
</div>
</div><!-- /row -->
</div><!-- /container -->
</div><!-- /grey -->
<!-- +++++ Second Post +++++ -->
<divid="cis3">
<divclass="container">
<divclass="row">
<divclass="col-lg-8 col-lg-offset-2">
<h2><b>Initial Setup </b></h2>
<p>First let's make sure all logs get erased upon system shutdown (by piping all logs to go to the /tmp/ folder):</p>
<p>Then create the 2 separate LANs for the VMs in virt-manager like so:</p>
<imgsrc="27.png"class="imgRz">
<imgsrc="28.png"class="imgRz">
<p>Then you're going to need to create the pfsense VM, so first get the iso from the <ahref="https://www.pfsense.org/download/">official website</a>:</p>
<p>Before installing the VM we will setup the 3 network cards it will handle: The default WAN, and the 2 LANs </p>
<imgsrc="12.png"class="imgRz">
<imgsrc="13.png"class="imgRz">
<imgsrc="14.png"class="imgRz">
<imgsrc="15.png"class="imgRz">
<p>Now let's start installing the pfsense VM:</p>
<imgsrc="16.png"class="imgRz">
<imgsrc="17.png"class="imgRz">
<imgsrc="18.png"class="imgRz">
<imgsrc="19.png"class="imgRz">
<imgsrc="20.png"class="imgRz">
<imgsrc="21.png"class="imgRz">
<imgsrc="22.png"class="imgRz">
<p>And now that's done, next step is to make sure pfsense handles the 2 VLANs properly:</p>
<imgsrc="23.png"class="imgRz">
<imgsrc="24.png"class="imgRz">
<imgsrc="25.png"class="imgRz">
<imgsrc="26.png"class="imgRz">
<p>Then we set the ip addresses of each interface, starting with the LAN-KYC VLAN:</p>
<imgsrc="29.png"class="imgRz">
<imgsrc="30.png"class="imgRz">
<imgsrc="31.png"class="imgRz">
<imgsrc="32.png"class="imgRz">
<p>Then do the same for the LAN-ANON VLAN:</p>
<imgsrc="36.png"class="imgRz">
<imgsrc="37.png"class="imgRz">
<imgsrc="38.png"class="imgRz">
<p>For this next step, we're going to put a VM in the KYC vlan to finish the pfsense router setup</p>
<imgsrc="39.png"class="imgRz">
<imgsrc="40.png"class="imgRz">
<p>From there, it's a matter of setting up pfsense:</p>
<imgsrc="41.png"class="imgRz">
<imgsrc="42.png"class="imgRz">
<imgsrc="43.png"class="imgRz">
<imgsrc="44.png"class="imgRz">
<imgsrc="45.png"class="imgRz">
<p>To change the pfsense theme to a dark theme, go in System > General Setup > webConfiguratior > Theme > set to pfsense-dark</p>
<imgsrc="46.png"class="imgRz">
<p>As you've seen above, we've set 2 temporary public dns servers, so next we're going to setup 2 local TOR DNS servers, which will allow the VMs to resolve any domain anonymously. </p>
<imgsrc="47.png"class="imgRz">
<p>Once done, we make sure that pfsense takes these 2 dns servers, and only uses them, will also setup firewall rules to deny any other dns traffic. </p>
<imgsrc="48.png"class="imgRz">
<p>Here you can see it's working fine:</p>
<imgsrc="49.png"class="imgRz">
<p>Then shutdown the VM, clone it and you'll have the 2 tor DNSes working.</p>
<imgsrc="50.png"class="imgRz">
<p>Next just put them in the anon VLAN:</p>
<imgsrc="51.png"class="imgRz">
<imgsrc="52.png"class="imgRz">
<p>Once in there, we make sure that they are DHCP reserved so their ip won't change over time:</p>
<imgsrc="53.png"class="imgRz">
<imgsrc="54.png"class="imgRz">
<imgsrc="55.png"class="imgRz">
<p>Then do the same for the other tordns:</p>
<imgsrc="56.png"class="imgRz">
<imgsrc="57.png"class="imgRz">
<p>Then from the firewall, we allow the whole subnet to communicate to tordns1 and 2, because they will also be the bridge nodes, and we allow the tordns 1 and 2 servers to connect anywhere with any protocol.
That way, the only traffic that can escape from the anon subnet, will only be through these 2 servers, that will prevent any data leak from happening.</p>