Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

I am using Tor browser from some time, few weeks maybe and I am still trying to

ID: 661181 • Letter: I

Question

I am using Tor browser from some time, few weeks maybe and I am still trying to determine the level of anonymity that the browser gives.

I am using the browser to advertise a service that I am offering in social networks. I create the accounts using outlook.com e-mail and since I am using Windows OS, I was wondering if outlook.com could get any information about my real identity when I am using their e-mail services. I am asking this because I have heard that if some company has a software installed on your computer, it can detect your MAC address. And what concerns me in particular is the fast that when I log into my outlook.com e-mail, it shows that I am active in Skype and Messenger. Since I never linked my skype account with the outlook.com account, they shouldn't have such kind of information right?

So my question is - is there any chance that Microsoft and Outlook.com could have any kind of information about my true identity, I mean about the fact who uses the particular @outloo.com e-mail address and such? Is there any way for them to disclosure my true identity if the police asks them to? Such kind of things.

Thanks in advance to anyone who would be kind enough to answer my question.

Explanation / Answer

You say that you do not trust Microsoft and want to hide your identity from that company.

However, this is gapingly inconsistent with your action of using an operating system that consists of countless of megabytes of binary executable code produced by Microsoft.

Suppose that you use an operating system whose vendor you do not trust; you suspect that it might gather information about you and leak it.

A way to combat this is, firstly, not to enter any personal information into that computer or through that computer.

Secondly, treat it as a potentially harmful blackbox and firewall it properly: use your external router (not the internal firewalling features) to block that box from connecting to anything on the Internet. Make only a rew judicious holes in the firewall for any needed access, and only to specific IP or domain name destinations.

Do not enable any "automatic updates" (they shouldn't work anyway since they are blocked). Use alternative means to keep that OS up to date that do not involve "phoning home", such as using another computer to download service packs and transferring them to that computer.

If you in fact completely distrust the vendor of some device and its operating system, yet for some reason still want that on your network, you should use a two firewalls: it should go through a firewall to talk to other nodes on your local network, and to go outside. This way you have some protection against that untrusted device attacking our LAN, and from that device phoning home to relay information.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote