Step 1 - Pseudonyms
Essentially, this involves setting up an anonymous email account with Hotmail, Yahoo, or Hushmail (which is new to me, but looks very good). Note: Yahoo (and maybe some others) will ask you for an alternative email address, however, so be sure not to give them one if anonymity is your goal. After that, you'll want an anonymous blog service. Ethan recommends Blogsome (free WordPress blogs), Blogger, and Seo Blog (can't find a good link for this, anyone?).
Step 2 - Public computers
Rather self-explanatory: use internet cafe's and other computers that many people use, so authorities can't trace the IP address back to you personally. Not fool-proof obviously, and certainly not convenient, so...
Step 3 - Anonymous proxies
Ethan explains that this way, when you use your webmail and weblog services, you'll leave behind the IP address of the proxy server, not the address of your home machine... which will make it very hard for anyone to find you. You might need some geek help to do this, but here's Ethan's list of reliable public proxies:
- publicproxyservers.com - anonymous and non-anonymous proxies.
- Samair (http://www.samair.ru/proxy/) - only anonymous proxies, and includes information on proxies that support SSL.
- rosinstrument proxy database (http://tools.rosinstrument.com/proxy/) - searchable database of proxy servers.
This will also slow down your browsing speed. But once you're up and running (you really need to read the document for the technical details), you can test where the internet thinks you're coming from at noreply.org. More oppressive governments block the popular proxies too, so you might have to search for a while to find one they don't know about. Ethan also recommends bloggers switch proxies regularly.
Step 4 - This time it's personal!
Rather than using a public proxy though, you can use a personal approach, otherwise known as a friend's computer (preferably a friend outside the reach of the oppressive government) as a proxy. They need some tricky software (Ethan recommends Circumventor from Peacefire.org), but, of course there are potential problems with this as well, including the friend's computer changing IP addresses, or the oppressive government realizing the blogger is spending all their time at one IP address and getting suspicious anyway. And so, the plot thickens, as does the technology...
Step 5 - Onion Routing through Tor
I'll just let Ethan explain this one:
Tor, a relatively new system...provides a high degree of anonymity for websurfing. Onion routing takes the idea of proxy servers – a computer that acts on your behalf – to a new level of complexity. Each request made through an onion routing network goes through two to 20 additional computers, making it hard to trace what computer originated a request. Each step of the Onion Routing chain is encrypted, making it harder for the [oppressive] government...to trace...posts.
At this point, however, you're virtually into hacker territory. Oddly, though, this "cloaking" technology is reported easy to install: Tor. Downsides include some sites, like Wikipedia, recognizing cloaked visitors and not letting them add comments, as well as, expectedly, slower browsing.
Step 6 - MixMaster, Invisiblog and GPG
If all that's not anonymous enough for you, enter the world of spook (aka paranoid) blogging:
[There's a] new option: Invisiblog (http://www.invisiblog.com/ [note, this URL returns an XML error message,]). Run by an anonymous group of Australians called vigilant.tv, it’s a site designed for and by the truly paranoid. You can't post to Invisiblog via the web, as you do with most blog servers. You post to it using specially formatted email, sent through the MixMaster remailer system, signed cryptographically. [...]
GPG (http://www.gnupg.org/) - the GNU implementation of Pretty Good Privacy, a public-key encryption system (http://en.wikipedia.org/wiki/Public-key_cryptography). In two sentences: Public-key encryption is a technique that allows [you] to send messages to a person that only [you] can read, without...needing to share a secret key with you that would let you read messages other people send..... Public key encryption also allows people to “sign” documents with a digital signature that is almost impossible to forge.
[and] MixMaster, a mailing system designed to obscure the origins of an email message. MixMaster uses a chain of anonymous remailers – computer programs that strip all identifying information off an email and send it to its destination – to send email messages with a high degree of anonymity.
Again, all this is much slower, but obviously untraceable. Technically, setting this up involves more details than make sense to simply copy here...see the document, pp. 60-61. But you're safe to say what you want/need to this way.
Ethan ends his text with perhaps the most important advice for the would-be-anonymous blogger:
And remember not to sign your blog posts with your real name!
You might want to step away from your computer. This post will self-destruct in 30 seconds....