A Modest Privacy Protection Proposal
A Modest Privacy Protection Proposal
How to reclaim your privacy in the surveillance age
By Jameson Lopp
Posted September 29, 2018
Photo: Bernard Hermant/Unsplash
Itâs hard to retain much privacy in the information ageâââthe internet has a nearly perfect limitless memory and weâre placing a ton of sensitive data onto it. After being swatted in 2017, I set out on a mission to start my life over with a renewed focus on privacy. While I was motivated by changes in the Bitcoin ecosystem (an increased rate of physical attacks), this guide is meant to be comprehensive for people living in the USA and generally helpful for other citizens of the world. The journey has been long and arduous because there simply arenât many resources out there for how to achieve what I wanted.
Why protect privacy?
You may be thinking âIâm not doing anything wrongâââwhy should I be concerned about privacy?â Itâs important to over-invest in privacy because once itâs lost, itâs really challenging to recover. Consider this: you may not be a target right nowâââbut you may become one in the future as your wealth increases, you endorse unpopular political or religious perspectives or⊠you make a single post on social media in poor judgment.
In December 2013, Justine Sacco, a woman with 170 Twitter followers, posted a very bad joke as she was boarding a plane. Sacco slept during her 11-hour plane trip and woke up to find out that she was the number-one Twitter topic worldwide, with celebrities and bloggers all over the globe denouncing her and encouraging all their followers to do the same. Saccoâs employer, New York internet firm IAC, declared that she had lost her job as director of corporate communications. At least one Twitter user showed up at the Cape Town airport to photograph her arrival. Point being: In the Information Age, it doesnât take much for you to attract the ire of millions of people.
If an unforeseen event such as this happens to you, do you really want to have to move to a new address for safety? It turns out thereâs no one-size-fits all solution to this problemâââit has to be customized to suit each personâs needs and be appropriate for the jurisdiction in which you reside. With that said, Iâll cover high-level privacy threat vectors and as many of the details as possible for mitigating them in this post.
Privacy goals
Itâs important to note the goal of this guide: Itâs not âhow to completely disappear.â If you want perfect privacy, then just close all of your online accounts and move to the middle of nowhere. Rather, my goal is to show you how to achieve the best possible privacy while still retaining your existing reputation.
Also, some of the following are specific to your jurisdiction. Most privacy guides are written for Americans because they are under more attacks with frivolous lawsuits, tracked by more private investigators, targeted for more asset seizures, and jailed for more homeland security charges than any other country.
There are four major levels of privacy protection:
- Protection against the average person who knows how to search the web
- Protection against someone with resources to hire a cheap private investigator
- Protection against someone willing to indefinitely fund a top-tier private investigator
- Protection against agents of nation states with nearly unlimited funds
Most folks are concerned about none of these potential attackers, while some may only be interested in protection against the first level. I can only speak about the first few levels; if you want to hide from governments youâll have to search elsewhere.
Pricing people out of privacy
Before we begin, I want to be clear that many of the techniques come at a cost. I had to fill out hundreds of pages of paperwork, spend around $30,000 in legal/banking/service fees, and endure a four-month process in order to achieve my goals. I estimate annual recurring costs of over $15,000 for my extreme setup. I had to speak to half a dozen attorneys before I found one that was even comfortable helping me. Once I did have an attorney, this made it easier for me to work with bankers because they were more assured that my intentions were legal and I wasnât trying to cover up criminal activity.
And itâs not just about moneyâââthe amount of time and effort required even to perform the financially âcheapâ aspects of this guide are sufficient to turn most people off from attempting them. If youâre willing to dedicate a weekend and a couple hundred dollars, you should at least be able to substantially improve your online privacy, which will put you in the top one percent of internet users.
Again, everyone should customize their privacy plan according to their individual needs and resources. Some of the below suggestions are moderate in nature, while others require far more commitment. Learn about them, anyway. The truth is, surveillance has become the norm. Most people are willing to sacrifice privacy in return for convenience, and swimming against the tide makes for a challenging journey.
My primary takeaway after countless hours of research is that we give a lot of personal information to many different merchants and service providers that are vulnerable to hacking and social engineering. You should assume that over a long enough period of time, any data you give to third parties will be made publicâââwhether or not it happens intentionally is irrelevant. The general solution to many of these data leaks is to use proxies of all kinds: electronic, legal, and human. Letâs dive into specifics.
Mitigating real-time location tracking
The best thing you can do is stop carrying around a portable surveillance device (mobile phone), but theyâre so darn convenient! At the very least, though, you can disable location history whenever possible such as with Google-based services. You should turn off GPS on your phone, though apps may still be able to get rough location data via cell triangulation. Though you may not even want to trust that the tracking is actually turned off. Itâs probably best not to log into Google services using an account that can be tied to your real identity. Consider creating a throwaway account for mobile use. More details on protecting your phone are in the next section.
A much harder threat to defend against is the rise of CCTV with facial recognition, tattoo recognition, and even gait recognition. You can opt-out of some facial recognition with online services such as Facebook and Google, but not others such as Amazon and Apple. And of course, who knows if that data may still be getting resold and used elsewhere, even if you opt out? Since walking around with a mask is often illegal or will draw unwanted attention, it seems that there is no great solution to CCTV at the moment. The optimal solution would be some sort of wearable device that blinds cameras, though all of the incarnations thus far emit infrared and are only capable of blinding infrared nighttime surveillance cameras that donât have IR filters installed.
You could try a product such as the Justice Cap, though itâs only going to work well during low light conditions against cheap cameras that donât have infrared filters. If you do go this route youâll want the highest powered LEDs you can find and if you can get them to pulse, that would likely be even more effective.
Along a similar vein was this privacy visor that emits infrared light in order to defeat facial recognition, though itâs probably not a great way to blend into a crowd.
Reflectacles, on the other hand, donât emit IR lightâââthey reflect it. This seems like a more low-key and low-tech solution.
A recent study showed that perhaps going the other way will work well: projecting infrared onto your own face may defeat most facial recognition software. With sophisticated calibration, the researcher showed that you could even fool face detection software to get false positives and effectively make it think you are a specific person.
Image: Zhe Zhou, Di Tang, Xiaofeng Wang, Weili Han, Xiangyu Lui, and Kehuan Zhang/Fudan University via arXiv
You can also try wearing a photorealistic mask. However, note that in some jurisdictions itâs illegal to wear a mask in public. And youâll once again just end up attracting attention from other members of the public.
The most practical solution seems to be low tech: wear a hat with a large brim such as a baseball cap, along with large dark or mirrored sunglasses that cover a significant portion of your face.
Failing all else, you can always go JuggaloâŠ
Protect your phone
Many services require you to provide a phone number when you sign up and they may even validate that you control it by sending a unique code via SMS. If you donât want to give away information such as your phone provider or area code, you should buy a virtual phone number that forwards to your real phone number. You could use a service like Tossable Digits, though they only accept credit card payments so youâd need to use a prepaid card or virtual credit card to retain your privacy. For even stronger privacy, consider using a service that accepts cryptocurrency, such as NumberProxy. Note that virtual phone numbers/proxies may have issues receiving 2FA SMS codes from web services. They also tend to be unable to send and receive group SMS messages.
For maximum privacy, you should only use a prepaid phone service so that they donât know your name. You should assume that every phone service provider not only knows your location (by triangulating cell tower pings) but also resells that information. What they donât know canât be used against you.
It turns out this is harder than you might expect! From my extensive experience watching The Wire multiple times, I figured Iâd be able to walk into any store selling prepaid phone SIMs, plunk down some cash, and walk out with a burner. Turns out brick and mortar stores like Best Buy will often require ID in order for you to buy a phone plan, even if itâs prepaid! I ended up having to go online and buy a SIM with a prepaid plan that I purchased via a prepaid debit card and had delivered to a private mailbox.
At the software level, the operating systems and apps on phones tend to have abysmal privacy. If you want top-notch privacy, your best option at the time of writing is RattlesnakeOS, which is taking the reins from CopperheadOS (no longer maintained). Something to keep an eye out for is Purismâs Librem phone, which will hopefully be released in 2019.
Protect your residence
In order to achieve privacy that will protect you from a variety of attacks upon your home, you need to break any ties between your name and your residence. To be clear, you must consider your current location compromisedâââthese techniques only work if they are used on a residence that has never been tied to your identity. This means either having official documents listed in someone elseâs name or in the name of a legal entity that canât be linked to you.
In the U.S. there are a few states with especially strong privacy protection for Limited Liability CorporationsâââNew Mexico, Nevada, and Wyoming. You can read one comparison of legal differences here and another here. To get an idea of a high-end privacy protection setup, check out the âUltra Asset Protection Packageâ from Wyoming Corporate Services:
As we can see, more sophisticated setups basically use the âshell companyâ paradigm to wrap the actual ownership of assets with a variety of legal entity layers that are difficult, if not impossible, to peel away. Once these legal entities are formed, you should use them to purchase / rent / lease property and pay for any services such as utilities and deliveries at your residence.
One helpful thing to keep in mind when setting up new services is to remember that there are plenty of âaddress-challengedâ people who donât have a permanent address because they live in recreational vehicles / live a nomadic lifestyle. There seem to be a lot more of them than people trying to protect their privacy. As such it may be easy to find practical advice by reading forums and websites devoted to nomadic lifestyles. Itâs also useful when explaining your situation to others. That is, youâre less likely to be questioned if you just say âmy RV doesnât have a fixed addressâ than if you say âIâm trying to protect myself from data leaks.â
Once you are settled into your new location, you may want to take it to the next level when you are on phone calls or video chats. Youâll want to ensure that you donât leak information via ambient noise or visuals. In this case Iâd recommend setting up your camera to have a blank wall behind you or just buy a collapsible screen. For noise, place the microphone in a small isolation booth or build one by lining the sides of a cardboard box with noise absorbing material. For the ultra paranoid, be aware that something as innocent as a storm outside could help attackers to pinpoint your location.
Are you worried about surveillance from laser microphones? If you complete the rest of this guide, hopefully no one can find your residence in the first placeâââbut if you want to be extra safe, consider a noise generator.
Another issue to consider is EXIF data in photos. You shouldnât post photos that you have taken near your physical location as they may very well include embedded GPS coordinates, especially if the photo was taken with a smartphone. The only way to be sure about this is to use an EXIF cleaner (Windows/Mac) or ExifTool (Linux) to scrub metadata before posting such photos online.
Yet another edge case concern is related to your time zone. If you are making public posts that get timestamped then it doesnât take a ton of your post data to narrow down which longitude youâre living near via temporal analysis. This may not matter much if you live along a well-populated longitude, but if youâre living somewhere more (longitudinally) remote such as Hawaii, New Zealand, or Greenland, it could be a dead giveaway.
Temporal analysis of spends out of 336xGpGweq1wtY4kRTuA4w6d7yDkBU9czU via BitInfoCharts
Above is an example of temporal analysis on a bitcoin address that holds quite a few BTC. The times listed are in GMT and we can see that daily activity begins at 12 a.m. GMT and drops off after 3 p.m. GMT. These times happen to line up with 9 a.m. and midnight, Tokyo time. It turns out that this is the cold wallet for a Japanese exchange called CoinCheck.
This should be obvious, but you shouldnât make public posts about physical businesses because it gives away your location. This includes âchecking inâ on FourSquare, tagging photos and status updates on Instagram/Facebook/etc, and even posting business reviews on Yelp/Google/Facebook. One caveat is if you do so for misdirection by making posts about places that arenât near your residence. (More on misdirection later.)
You may think some of the above is overkill, but remember when 4chan found Shia LaBeoufâs secret art location in a little more than a day? First, they used planes seen overhead to narrow down via public flight path info, then they used positions of stars to narrow further. The final piece of info that gave it away was when a user drove around the area honking their car horn. Donât underestimate the power of the internet to crowdsource investigations.
Protect your snail mail
You should never receive any mail or deliveries in your own name at your address. Little known fact: All mail that goes through the US Postal System gets scanned and put into a database. Is that database secure? Best to assume itâs notâŠ
Optimal ($$$): Rent the cheapest apartment you can find just to receive mail. Since itâs a âreal addressâ it wonât raise any red flags with services to which you give it.
Decent ($$): If you have a good relationship with an attorney, they may be willing to accept mail on your behalf. You can also use a âghost addressâ via JJ Lunaâs contacts.
Decent ($): Buy a virtual address/remailing service. You can even combine several of these together to create a sort of âonion routingâ for your physical mail. Each âhopâ will only know about the hop before and the hop after it. Some options are EarthClassMail and TravelingMailBox.
Better than nothing ($): Buy a Post Office Box/mailbox in a UPS Store.
Once you have your proxy address(es) set up, youâll want to use them for every service that doesnât require proof of residence. This includes:
- Credit cards
- Domain names
- Bank accounts
- Subscriptions and memberships
- Online services
Protect âreal propertyâ
âReal propertyâ is a category of items for which you are taxed on a recurring basis simply for owning, which creates public records, a.k.a. privacy leaks. Most commonly this will be a house, any vehicles you own, though in some jurisdictions it can also cover pets! On a related note, income taxes are not public record, but over 75,000 IRS employees in the US have access to them⊠theyâre not exactly private.
Once again, youâll need to register these assets under an LLC/legal entity that canât be tied to your identity. For liability and privacy purposes you will likely want separate LLCs to own real estate versus owning vehicles. This is to reduce the number of links to your residence: If an attacker manages to find one of your vehicles and sees that itâs owned by âNoName LLC,â the first thing they will do is search for all publicly registered property owned by âNoName LLCââââif this same LLC owns your residence, your privacy has been compromised.
Another thing to note with regard to vehicles is that if you donât want your name on the insurance policy, youâll need to get commercial fleet insurance and in my experience, this can be about twice as expensive as personal insurance.
Protect your real name
Since you will inevitably end up interacting with people as you go about your life, youâll want an alias that canât be connected to you. A first name and last name that is common to your area (but not suspiciously common) should suffice, as it will be more forgettable. If you need help thinking of a common name, look up census data from your region. If youâre in the US, you can use this name generator service.
Itâs not like folks are going to be asking for your government ID unless youâre purchasing age-restricted goods and services. Just make sure that you keep it simple and consistently use the same pseudonym; otherwise, youâre likely to forget which ânym you gave to which service provider.
Keep a low profile
Another common privacy strategy other than using proxies is to âhide in the crowd.â As such, when youâre out in public you should strive to be unnoticeable and unmemorable. Donât wear flashy clothes, donât make exotic body modifications, blend in with local styles and customs. Donât drive a rare car, donât make any noticeable exterior modifications such as wheels, stickers, or vanity plates.
Protect your internet privacy
Your ISP, various government agencies, and who knows who else may be monitoring your internet traffic.
Many popular web services are chock full of various tracking software, much of which is simply trying to correlate your internet browser with your interests in order to better target advertising at you.
Youâll also want to protect yourself from various online activity trackers such as advertisers and social networks. I recommend installing these browser extensions:
You can also provide protection for all devices on your network including smart TVs and mobile apps by configuring your router to use a local DNS server that is running Pi-hole. It will block any network requests for known advertisers and trackers.
While youâre at it, change the default search engine for your browsers to be one that is pro-privacy.
You should also switch to a pro-privacy email service. Similar to choosing a VPN, thereâs no clear âbestâ provider. Thereâs a good comparison guide here.
If you want to take it to the extreme, consider quitting the use of all Google services. Thereâs a great guide here:
You can secure a decent amount of your web browsing from snooping third parties by installing browser extensions, but itâs not foolproofâââthe aforementioned entities can still see which domains / IP addresses youâre visiting, even though they canât peer into the data packets that are going back and forth.
VPNs are quite important for protecting your internet privacy. When youâre at home they prevent the websites and other online services from knowing your real IP address, and thus your geographic location. When youâre not at home and using WiFi access points operated by untrustworthy third parties, it prevents them from snooping on your traffic. Itâs really hard to decide on the best VPN, because there are many factors at play, so Iâll leave you to research that. Thereâs a great guide here.
What I definitely recommend is setting up your home network to automatically use your VPNâââyou can accomplish this by buying a router that has a built-in VPN client. By having the VPN configured at the router level, any device that connects to your router will automatically be protected by your VPN without requiring configuration on the device itself. Thereâs a lot of good info here.
Iâm a fan of the AsusWRT Merlin firmware which provides a lot of additional functionality on top of the stock ASUS firmware, including more complex routing policies. By using the Merlin firmware you can specify certain devices (like video streamers) to not use the VPN and you can configure a kill switch with just a few minutes of tinkering. After running VPNs at the router level for several months I noticed that, from time to time, the VPN connections would fail. If you donât have a kill switch enabled, you wonât know if your VPN fails until perhaps you notice that you arenât getting as many CAPTCHAs as usual when logging into web apps. A kill switch is a must so that you instantly know when you are no longer protected by a VPN.
Also note that you wonât be able to put video streaming services behind a router that is configured to send ALL traffic through a VPN; theyâll lock out your account because they assume you are trying to bypass regional content restrictions. The solutions to this are to either use one with firmware that supports selective routing as linked above (and create an exclusion rule for streaming devices) or to use a two-router setup thatâs chained from your modem (where the first router is) for non-VPN devices, and the second router for VPN devices. If youâre not a networking expert, you may need a hand from a geeky friend to help set that up.
You can purchase some VPNs anonymously with a throwaway email account and cryptocurrency. For next-level purchase privacy here, note that any bitcoin-accepting VPN provider can be purchased with monero via xmr.to.
Using a router with VPN support is the most user-friendly way to protect all of your devices, but it comes at a cost. The CPU(s) on the router will likely become your bottleneck with regard to bandwidth. In my testing with a top of the line multi-CPU router, it wasnât possible to achieve over 50 Mbit/S speeds due to the CPUs maxing out while performing the encryption and decryption operations.
First spike: maxing out downstream at 43 Mb/S. Second spike: maxing out upstream at 48 Mb/S. Screenshot: Jameson Lopp
A downside here is that if you have a very fast ISP thatâs over 50 Mb/S, an off-the-shelf consumer router, even a high-end one with multiple processors, is going to be bottlenecked by its CPU. If this bottleneck is a concern for you then youâll need to invest more effort into building a Linux-based router on beefier hardware. Hereâs a good guide, though youâd want to invest more than $50 in the hardware.
The above is great for your at-home devices, though note that youâll also want to configure VPNs manually on your mobile devices that are going to leave your home network from time to time. In my experience, VPNs that support OpenVPN are the easiest to configure on various devices.
Finally, youâll want to make this setup more robust. Routing all of your traffic through one server creates a single point of failure, and sometimes a VPN server can get overwhelmed and become unresponsive for a lengthy period of time. What to do? Configure multiple active VPN connections! The tricky part that took a fair amount of research was how to do this in a way so that the kill switch doesnât activate if any of the servers go down, which would make your setup even less robust.
For AsusWRT Merlin firmware, the answer is explained in this forum post. TL;DR: you should define four or five VPN clients, set them all to start on boot, but only enable the kill switch on the last VPN client. That way, if any of them fail the routing rules for a lower priority client will kick in, while if the last VPN client fails AND all of the other clients have failed, the kill switch will activate and block all traffic.
A note on DNS leaksâââif youâre protecting all of your traffic with VPN tunnels then it ought to also be making DNS queries through the VPN. However, if you arenât protecting all of your devices with VPNs then consider running a Pi-Hole DNS server on your home network. It will block DNS queries to advertising domains and reduce your overall query volume by caching results. You can configure the upstream DNS server that it uses to be a pro-privacy server such as Cloudflareâs 1.1.1.1.
Protect your PC
In order to prevent data leaks due to malware, install covers over your webcams. Iâm a fan of the magnetic SpiShutter for MacBooks, otherwise you can just buy a simple adhesive sliding shutter.
At the software level, you can take back some control of what various processes in your computer are accessing by running a firewall such as Little Snitch. You can also run antispyware apps such as Micro Snitch, which will alert you when processes try to access your microphone or camera. If you want the best privacy and security, you really shouldnât run OS X or Windows, but rather a privacy-focused flavor of Linux.
If youâre at Edward Snowden-levels of paranoia then youâll want to break out the soldering kit and physically remove the hardware connections for cameras and microphones. As Edward states, this is a âpain in the ass.â
If youâre a Linux nerd and you want extreme privacy without destroying your hardware, buy a Librem laptop. They run on open source hardware with hardware switches to enable/disable the webcam/microphone and the wifi/Bluetooth. It also runs a stripped-down version of Debian with no proprietary closed source software packages.
Protect online accounts
This is good advice for anyone in general, but you should do what you can to keep unwanted intruders out of your online accountsâââespecially your email account. The average person uses the same password or three across all of their online services and they just memorize them. This is a single point of failure and when a single one of those services suffers a data breach, you can be sure that your username and password will be sold on the black market and fed into bots that try to use them to log into every popular online service. Youâve probably already been âpwnedâ and donât even know it.
This means using a good password manager such as LastPass/1Password/KeePass to generate strong random unique passwords for every online service you use and to add second-factor authentication to every online account that supports it. While youâre at it, protect your password manager with a hardware 2FA device such as a Yubikey, Trezor, or Ledger.
The prior listed password managers are convenient and reasonably secure, though they put your privacy in the hands of a third party. They also have design flaws that can potentially expose your entire password database to malware. The ultimate security and privacy (but less convenient) password managers let you control your own data and use a hardware token for decryption. Lance Vick, lead security engineer at BitGo, has a great guide here.
Pay special attention to your email accountâââmost people only have a single email address that likely has a ton of sensitive information in it, and if an attacker gains control of your email account they can probably use it to reset passwords to most of your other online accounts. This is a single point of failure; consider using different email accounts for different purposes, and protect them with hardware 2FA.
Protect communication channels
Any email, phone call, or text message you send can be intercepted because theyâre sent across public networks without being encrypted. Trying to fix email with PGP encryption is pretty much a lost cause; consider using a secure email such as Ciscoâs Registered Envelope Service. You can pretty easily improve phone call and text message security by buying a burner phone and using end-to-end encrypted apps such as Signal, Whatsapp, and Telegram on it. You can use other services such as Send Safely to transfer larger documents.
For the ultra privacy conscious itâs worth noting that Signal, Whatsapp, and Telegram are all closed, centralized walled gardens that can still sell your metadata even though they canât read the content of your messages. Signal and Whatsapp require a phone number, making it much more work for you to have a private account. They can find out who you are talking to and when you are talking to them. More private but slightly less user-friendly alternatives are decentralized open communications systems like Riot, XMPP with OTR, and IRC with OTR.
Protect your financial data
Most mainstream financial services are highly insecure and have poor privacy. You can protect those services using standard online account strategies as mentioned earlierâââstrong passwords and hardware 2FA. And certainly donât input your real address with any of those providers.
Credit reporting agencies have created huge targets by centralizing tons of sensitive information, thus they get hacked from time to time, resulting in rampant identity theft.
Many Americans are familiar with âthe big threeâ credit bureaus, but it turns out that there are quite a few more!
You should freeze your credit reports; this will prevent anyone from requesting a copy and potentially finding sensitive data. Here are links to freeze your credit report for major providers in the U.S.:
- TransUnion
- Equifax
- Experian
- Innovis
- SageStream
- Advanced Resolution Services
- Clarity Services
- CoreLogic
I also recommend submitting forms to opt out of as many data brokerages as possibleâââyou can find an extensive list here.
You should also stop using normal credit cards except perhaps while travelingâââmore details on that in the next section.
Protect your purchases
Cash is still the king of financial privacy, though itâs less convenient than plastic and downright unusable for online purchases. Another downside Iâve encountered recently is that it is becoming more common for merchants to not be able to provide sufficient change. I can only assume this is because far fewer customers are using cash.
A more convenient and still highly private option is to carry prepaid debit/gift cards you purchased with cash. The next best privacy option is to use a debit/credit card in the name of your LLC. Make sure it doesnât have your real name or address on it; the billing address should be the billing address of your LLC (the address of the registered agent or of a private mailbox). This can be tricky because card providers tend to require a real name on every card they issue. I donât have a specific solution I can share here other than to recommend making some banker friends who will work the system on your behalf.
Virtual disposable credit cards are great for privacy and security. You can limit your attack surface by giving unique card details to each merchant and setting spend limits on each card.
- Up to 10 virtual prepaid Visa cards at a time
- Some fees apply
- Prepaid physical Visa card
- Limited to âŹ100 without identity verification
- Some fees apply
- Create virtual prepaid Visa cards or Mastercards
- Some fees apply
- Create unlimited virtual Visa cards
- Supports custom card spending policies
- Must provide checking account details
- Free
- Create virtual or plastic prepaid Mastercards
- Some fees apply
- Create virtual gift cards for participating merchants
- Free
For folks with a U.S. bank account, the most convenient option seems to be Privacy.com. However, by default, they will ask for the login info to your online checking account. For the best privacy, you should ask them to enable your account via ACH integration to ensure that they canât read all of your bank accountâs activity.
Note: What Privacy.com doesnât tell you is that there are global limits for maximum daily/monthly usage. Iâm not sure what the defaults are, but the daily limit seems to default to less than $2,000. If you email support, theyâll increase your limits, though your limit will depend upon your usage history.
Also note that you may encounter issues with single-use Privacy.com virtual cards. It turns out this is because a number of merchants actually make multiple charges to your card. Often this is because they make a pre-authorization charge at the time of sale, then cancel it and make the real charge upon shipping the product. Iâve also run into issues with merchants such as Home Depot where they have multiple delivery services (local vs. shipping carriers) and they make separate card charges for each one even if you created a single order. Also, some services may not accept these virtual cards at all because they get identified as prepaid cards and some merchants consider those to be too risky to process.
Also worth noting is that Privacy.com has a policy against creating multiple cards for the same company, which isnât clear when youâre setting up your account. This can result in charges being declined on the Privacy.com end.
Screenshot: Jameson Lopp
Finally, if you want even stronger privacy, you can create what equates to a double proxy on your purchases by creating a Privacy.com account that is linked to your LLC bank account. Note that Privacy.com likely wonât approve your account immediately because itâs geared toward personal checking accounts, but it should be reviewed and approved within a few days of signing up.
Protect your driverâs license data
This one is tricky because DMVs in the U.S. must comply with the REAL ID Act, which requires proof of residence. Generally, this means showing bills or financial statements that are mailed to your residence. Of course, if youâve followed the above procedures then you shouldnât be receiving any mail at your residence that has your name on it! And unfortunately, commercial remailing addresses (such as the private mailbox services discussed earlier) are kept in databases and you will often be prevented from using them for anything requiring a residential address.
In terms of threat models, the average person probably canât access the DMV data to see what address is on your driverâs license, but licensed private investigators have access to tools that often do have this data. There are also likely thousands of government employees who can access this data, and countless incidents of abuse have been cataloged over the years. And in fact, many states make tens of millions of dollars a year by selling DMV records to third parties. Thus itâs important to decide what you need protection againstâââif you think that someone may go to the trouble of hiring a PI to track you down, you should consider going to the effort of protecting your driverâs license.
As mentioned previously, you may find some helpful information on RV forums. It seems like many nomads find a friend nearby to use their address as a registered residence. Of course, this requires that you trust the person with your mail and that there are no issues with their address being associated with your nameâââyou donât want to make your friends a target!
I canât offer specific advice here because it varies from jurisdiction to jurisdiction, but there should be alternative forms that you can submit in order to provide certification of your residence address. This was an area where I needed help from an attorney. If you have sufficient resources then you should consider renting a cheap apartment that you use as your official residence, but donât actually spend much time there.
Regardless of what you end up doing with your driverâs license, you should consider having a âpassport cardâ issued if your country offers them. You can carry this card around and use it as proof of identity without exposing your physical address, as your address is not listed on your U.S. passport.
Traveling and crossing borders
If you drive a car, thereâs a high likelihood that cameras will capture your license plates, scan them, and connect them to your identity. There are various products you can buy to help obscure the plate from cameras, though itâs unclear how effective they are.
This is another data leak that you can somewhat protect against by only registering vehicles to an anonymous LLC. For the ultra paranoid, note that many newer vehicles come with built-in GPS tracking in the form of a service such as OnStar. You may wish to take extra steps to disable this hardware or simply not purchase a vehicle equipped with it.
If you want to take vehicle privacy to the extreme, one option may be to not own one at all. This is easy in high-density urban environments, though nearly impossible in rural areas. If youâre in a semi-densely populated area then you can create accounts with ridesharing services that are registered with your anonymous LLCs and use them to order cars as needed.
When you cross the borders of nation-states, you are subject to extremely high levels of scrutiny. There are two schools of thought for protecting your privacy here:
- Carry your data with you, encrypted at rest A. Pro: convenience B. Con: no plausible deniability
- Carry no data, just fresh unencrypted devices A. Pro: border agents can have access and find nothing B. Con: must transfer the data by other means
If you donât want to cross borders with data then you can ship an encrypted drive to your destination ahead of time, or you can take a snapshot of your hard drive and upload an encrypted disk image that you download upon reaching your destination. Another option is to keep data on an always-running computer at your home that you then download your files from via SFTP/SCP/a more user-friendly tool such as Syncthing. Or you can just run your ârealâ computer on a private server somewhere and use your laptop as a thin client, using protocols such as RDP and SSH to remote into the server.
Johnathan Corgan wrote a tool to create fully encrypted live boot Ubuntu images with custom content. It outputs ISO images you can either burn to DVD or make a bootable USB stick out of. You can also run the images in a virtual machine.
For international travelers, you have probably noticed the installation of automated border control machines that scan your passport and take your photo. You probably donât have much choice but to use them when entering a country for which you are not a citizen, but if you are entering your own country you should be able to opt out and avoid having your photo taken.
When traveling you will probably end up staying at hotels. If itâs known that you will be in a certain city (such as for a conference) then you should protect yourself from being found at a specific hotel by using a pseudonym. This used to be a lot easier because you could give any name you wanted to a hotel and pay with cash. But these days most hotels are going to want ID and a credit card. JJ Luna recommends that you get around this issue by adding an âauthorized userâ to one of your existing credit cards in the name of your desired pseudonym. You can make the reservation and payment in that name, and while you will give your real ID to the concierge at check-in, they generally donât care if it matches the reservation. This is a common thing for authors, actors, and musiciansâââif you are questioned then just state that the reservation is under your professional name rather than your legal name because your credit card was issued under your professional name.
Voting
Registering to vote is high risk (it creates a public record).
Crime
Obviously, you shouldnât commit crime; if you get caught itâs going to create a set of very public records. However, thereâs a flip side: becoming a victim of crime can have a similar negative impact upon your privacy due to the public records that are created by the justice system! Good opsec means being aware of the company you keep and staying out of sketchy situations that could cause you to become collateral damage. It also means that if you witness something that makes you call for emergency responders, you should consider doing so from a burner phone and not leaving any identifying information.
Protect your family
This oneâs tough. The larger the size of your family thatâs living at your residence, the larger the attack surface on your privacy. Anyone who can be tied to you needs to have the same level of privacy protectionâââyour privacy is only as strong as the weakest link.
Marriage: This creates a public record and ties you to someone. As far as Iâm aware there is no requirement for a county-issued marriage licenseâââthat form of registration is voluntary. Given that weddings tend to be fairly public events, you should probably get married in a location other than where you reside.
Children: Create birth records, health records, and school records. The school records are difficult to work around; the best options seem to be either homeschooling or private school, which are both expensive in different ways.
Stretch goal: Leave false trails
If you have the resources to do so, consider using misdirection as another tactic. If someone is hunting you down, they probably have limited resources. By purposefully leaking incorrect data, you can leave trails of breadcrumbs that lead to dead ends and frustrate folks who are trying to penetrate your privacy shield.
How might you do this?
- Choose a location that is plausible you may be moving to.
- Tell friends and acquaintances who are never going to actually visit you that this location is where youâre moving.
- Change your location data on social media profiles to say youâre there.
- Set up cheap accounts in that area that may show up on public reports.
No one has unlimited time; most attackers will give up after spending a certain amount of resources and failing to find you.
Data cleanup and protection
Depending upon your jurisdiction you may have different options available to you to ask for personally identifiable information to be removed from various services. Though depending upon your desired level of protection this may be a waste of timeâââonce data has been leaked you can never be SURE that it is deleted.
If you take the most extreme route of burning your old life and starting anew then you shouldnât bother with data removal, because leaving your old data out there can serve as misdirection/false trails.
Limitations
Youâre not going to be able to hide from government agents by using these tacticsâââthere will be a legal trail of breadcrumbs. Also, given the pervasiveness of networked surveillance cameras this day in age, you canât completely avoid the eyes of Big Brother in urban environments. Itâs safe to assume that various entities are sucking up these data streams and applying various facial/tattoo/gait recognition algorithms to them.
One weak point certainly becomes the third parties with which you are communicating. There were several points along the way when clueless folks with whom I was interacting leaked data that could be used to correlate the entities I formed with my identity; I plugged the ones that I could and just have to hope that the others went unnoticed. In order to protect against this, donât even open the possibility for someone who is helping you set up a new service to screw up and correlate the new service with your identity. Donât give them your real email address or your real phone number.
You also have to be very careful about reviewing what your service providers are doing. I had several points at which I had to direct a service provider to stop what they were doing. For example, I had a banker send me an authorization form to issue a credit card for my LLC that had my real name on it as the cardholder. That would have been a massive privacy leak to the credit card provider and every merchant with whom I interacted, as theyâd now be able to make the association between the LLC and myself.
Stress-test your setup
The only way to be sure that you have achieved the level of privacy that you desire is to hire experts to try to break through the shields you have erected. Find an experienced private investigator or two and ask them to dig into your life. At this point it will come down to how much digging you are willing to pay for, which you should decide based upon how motivated you expect your attackers may be.
An experienced PI should start by doing various database searches, trying to find trails you may have left behind. If this initial search fails to find any leaks, you may wish to take it a step further and ask them to try to socially engineer your friends and family to see if any of them could be tricked into leaking information about you.
Are you an expert in this field? Can you find holes in my proposal? Can you help me improve my privacy? If so, send an email to opsec@lopp.net and letâs chat.
Educational resources
The following are some educational resources that I used to jump start my research that were not linked in the main body of this guide: