The fastest, easiest and simplest way to surf anonymous is the following:
(1) Download the Tails Linux distro from
Tails - Home
(2) Download and run Unetbootin from:
UNetbootin - Homepage and Downloads
(3) use Unetbootin to create a bootable Tails USB stick from the Tails ISO
(4) Boot from the USB stick and choose "Live" from the Tails menu
(5) Leave the password blanc
(6) Enjoy
- All internet is channeled through a torr network
- There is no access to your HDD
-------------------------------------------
The Amnesic Incognito Live System (Tails) is a Debian-based live CD/USB with the goal of providing complete Internet anonymity for the user. The product ships with several Internet applications, including web browser, IRC client, mail client and instant messenger, all pre-configured with security in mind and with all traffic anonymised. To achieve this, Incognito uses the Tor network to make Internet traffic very hard to trace.
- use the Internet anonymously almost anywhere you go and on any computer:
- all connections to the Internet are forced to go through the Tor network;
- leave no trace on the computer you're using unless you ask it explicitly;
- use state-of-the-art cryptographic tools to encrypt your files, email and instant messaging.
Note:
It is possible to burn the ISO to a CDROM. When you boot into Tails from the CDROM you can create a bootable persistent USB from there. However this method does not work with all motherboards it seems. It didn't with mine. You could also use "Universal USB Installer" instead of Unetbootin. However it doesn't contain the latest Tails version yet (0.15). You will have to wait for it. Unetbootin works fine, but you won't have a persistant system.
What you can do is create 2 partitions on the USB. One FAT partition big enough for the ISO. Install the ISO here using the bootable USB software. Boot Tails from the USB, insert an admin password, and create an additional password protected encrypted ext3 partition on your USB device. Here you can store all your files. Again, the operating system itself will not be persistant. Personally I prefer it not to be. Safety comes at the cost of comfortability.
When you boot Tails it asks you to insert an admin password. If you don't, a limited user account will be created without access to the internal HDD and other resources. This is safer than inserting a password, so don't. Unless you need access to your HDD or format your USB etc. When doing so, don't connect to the internet and reboot before you do.
As an additional safety precausion, password protect you HDD in BIOS. When you boot, boot straight from the USB without inserting the HDD password. This creates a physical barier to your HDD. If your computer doesn't have the option to password protect you HDD, you can encrypt it for the same effect. Truecrypt offers the option to encrypt and password protect the entire HDD. Truecrypt might be NSA, but on the level of this forum (discussing banned plants) I wouldn't worry.
Even if someone somehow hacks your Tails OS and is able to gain sudo power, which is probably not possible if you leave the password blanc, he will not be able to access the HDD to identify you. In theory, this should be just as safe as a virtual machine. In my opion, even safer as running a virtual machine your main OS. If your main OS gets hacked, keylogs can show your virtual machine login and encryption passwords and eveything you do in you vitual machine might be exposed. Governments are known to infiltrate citizens computers (Google: R2D2 Trojan).
My two cents.