Changes

added threat
|Scenario Task Format=Solution
|Scenario Task Parent=Identity or Location
|Scenario Task Type=Profiling your identity and actions, Surveillance|Scenario Tools and Services=Tails OS, Tor Browser, Whonix, SpoofMac|Scenario Task Description=Disassociating your true identity from an IP address assigned to your device usually requires a change of your physical location - a public place - to connect to the Internet from. Using a wifi hot-spot or going to an Internet cafe will give you some degree of anonymity (especially if those places are not running CCTVor force you to register with an ID before using their services). Bear in mind that once connected you need to consider the following concerns that may de-anonymise you on the local network:*Software on your computer. Your Internet browser and many other tools, including malware, may reveal your identity on the network. Use a live operating system such as [https://tails.boum.org/ Tails] or [https://www.whonix.org/ Whonix] on your computer to ensure that there is no history or malicious tools during your session. *Hardware on your computer. In particular your network card (connecting you to the wired or wireless network) has a unique identifier called a Media Access Control (MAC) address. It can be used to identify your computer's actions on the network. However you can spoof this address using [http://www.wikihow.com/Spoof-a-MAC-Address built-in techniques] or a tool like [https://github.com/feross/SpoofMAC SpoofMac]. Tails also allows you to create a fake MAC address for every session.*The services you access online (e.g. your Facebook page) may also correlate your current IP address to your identity. Refer to the [[https://tails.boum.org/ Tails]]] section or use Use the built-in [https://www.torproject.org/ Tor Browser] from the [https://tails.boum.org/ Tails] or [https://www.whonix.org/ Whonix] operating systemsystems. <br />The situation is much more complicated (regarding anonymity) when accessing the Internet from your smartphone. Please refer to the section on [[Phone|Protecting your phone]] for more details.
<br />
}}