More Facts and NOT A TROLL HERE!
Kerms, I respect your opinions and it is not BS - no troll here. I hope you don't really hate me. I am just trying to protect my family. And asking for information here shouldn't cause me any more problems than I already have. But it could help me protect myself.
I was hoping that I could find enough information that even if he did know I was able to be untracible, he might leave this venue alone.
Life in danger? Possibly. Financial stability in danger, definitely. Freedom in danger - distinct possibility.
I seem to have comments like yours from most places I try to get information from.
It is a shame that bad people out there ruin it for legitimate people like myself.
Tracking via hardware ID is becoming more common place, not just a hollywood fantasy. The Patriot Act has much to do with the issue.
If they can't track easily with IP addresses then the next thing they track with is MAC addresses. Then hardware ID's. Much of the tracking is due to the use of Java and Javascript. But there are many other ways.
Look at this one about MAC tracking:
http://www.computing.net/answers/netware/tracking-users-by-mac-address/4306.html
MSN has been doing it for a long time. That is how and why they initiated the fiasco of a verification program to get software and updates. Genuine Advantage is what I think they called it.
I was hoping to find a way to be able to save and use my existing email accounts and other internet accounts (non financial) without worrying about being hunted down.
This is an excerpt from wikipedia:
https://en.wikipedia.org/wiki/Internet_service_provider
"Internet service providers in many countries are legally required (e.g. CALEA in the U.S.) to allow law enforcement and intelligence agencies to monitor some or all of the information transmitted by the ISP. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks and software such as DCSNet in the United States, or SORM in Russia, allowing them to monitor Internet traffic in real time."
A private investigator can use the same methods to track people. A crooked law enforcement person can abuse their police powers to find information. And there is no way for you to know if/when they do or what information they are obtaining. Even Child Support Enforcement can access ALL of your information without a warrant. Your ISP records everything you do. They can record your hardware ID's as well.
I do not know what information they can obtain while someone is using Linux. I know Linux is better and safer than Windoze, but I don't know in what ways.
Has anyone gone to
www.grc.com and read anything about computer security?
My intention is not to trash any forums or any other place.
My intention is to find suitable information on how to protect my family and hopefully still use my existing internet accounts. Even the TOR network can be traced.
I believe Linux has a plausible solution, I just don't know what it is or how to implement it.
I also know that many of the free encryption programs have back doors in them that others can decrypt.
I wonder though just how I am making my situation worse by asking questions.
If I don't ask questions then how will I know how to do what I want?
Jumping from public access nodes to public access nodes is impracticable. We are not on the lam and shouldn't need to go to that extreme. No 'Bonnie & Clyde' here. Just whistle blowers that are afraid.
Even if we never used the internet or phone again, there still is one way to track us, unfortunately.
I checked into getting social security numbers changed. Well, when you do that the credit reporting agencies associate your old SS numbers with the new ones. Unless you are part of a government sponsored witness protection program, you can't do it alone.
All the privacy laws on the books mean nothing if someone is intent on tracking you. And lawyers are greedy - they want tons of money UP-Front to do anything. We don't have that kind of money. If we did we would do things a lot differently.
Here is another set of methods that can be used to track you:
http://computer.howstuffworks.com/carnivore3.htm
Does anyone really think that the software is the only one of it's kind in existence?
And the software can be misused by nefarious persons with the right connections.
Here is something you might like to read:
http://www.fcc.gov/document/enforcement-bureau-issues-25000-nal-google-inc
Click on Expand and read the part of google stealing information.
Excerpt:
"This payload data included e-mail and text messages,
passwords, Internet usage history,
and other highly sensitive personal information. "
It is becoming extremely difficult to NOT be on the internet any more.
More and more companies are going 'paperless'. meaning online only.
How can I not be able to use the internet and exist?
Many cell phone and other phone companies use the VIOP protocol (I.E. internet).
A USB stick won't work on my computer. It won't boot from it.
ALL flash hardware keeps fragments of data on it. Using TRIM or DISCARD can help remove much of it, but it doesn't remove all of it. See here:
http://www.itproportal.com/2011/02/24/flash-memory-cant-be-securely-erased/ and that applies to portable flash drives as well.
You mention a USB flash drive.
Have you looked into this one?
http://www.thegreenhead.com/2008/03...secure-hardware-encrypted-usb-flash-drive.php
I have to go for now. I just hope that someone has a plausible solution for me.