We recommend this proxy software My IP Hide to hide your IP address.
(And if you're up against anything like that, keep in mind that cryptography and digital anonymity may not work the way you think).* Not every http proxy supports the https websites such as facebook and craigslist. While I do connect from my home ADSL (so I'm traceable), that connection is anonymous for anyone except (perhaps) law enforcement and governments.
On my own home PC I've a Windows 7 VM identical to one hundred million others, and my name isn't anywhere in it. But I'm voluntarily logged with my username, so I'm definitely not "anonymous". Unless someone succeeds in breaking into that machine or its serving routers and see where my connection comes from, I'm untraceable. Untraceability is more related to the communication infrastructure, so you're talking VPN or SSH tunnels, overseas shell hosts, and (ab)using other people's open WiFis.įor example I'm now connected through a double SSH tunnel and the machine in the middle keeps no logs whatsoever.
Anonymity is more depending on your infrastructure, so a VM is a good way of going about it my own choice would be to run as close to a stock install of the most common OS you can find, with no personal information stored on it ever. You are not asking about anonymity but untraceability (they're slightly different things, and the latter does improve the former). What is the best way that we can use to keep our anonymity inside a VM? So to prank your room-mate a VM is great, and you can prank a co-worker as well, as long as you don't work somewhere that has a separate, competent and equipped IT department.
The switch knows - or strongly suspects - that your VM is actually you, or that you know more than you should about that VM). In the above case of a LAN, a VM with a "bridged" interface is almost indistinguishable from a separate machine altogether (again, barring higher end setups in which you're connected with a smart switch. So for the purpose of modeling an attack, a VM is better. Also, a VM would be more "coherent" - you wouldn't need to be careful against slips. It might be easier to setup a VM with, say, Linux than deploying some "attack tool" that forges packets as if they came from a Linux box. There is no difference between the program running the VM and any other program (why should there be?). Except very specific cases in a LAN (no routers in the middle), your VM will still be "seen" from the outside as belonging to your system, the one that is running the VM. If I use a proxy shield inside a VM and spoof my IP address, is thereĪny possibility that someone else ( victim ) can identify the host