How to ship anonymously
You might not think you have anything to hide, but that doesn’t mean you shouldn’t enjoy the benefits of online privacy. Ultimately what you ship is your business, and your business alone. Now is the time to stand up for yourself and take back your privacy.
We value nothing more than our customers’ privacy, and we will never cut any corners to provide that security.
Here are some tips for things you can do to help you stay anonymous: Use Tor and/or VPNs
Tor No matter what you are doing on the web, it is always a good idea to use Tor, VPNs, or even better both. We designed this website with Tor in mind.
TOR stands for The Onion Router, which is a vast network of computers to route your web traffic through a number of encrypted layers to obscure its origin. Tor is a vital tool for political dissidents and whistleblowers to anonymously share information, and you can just as easily use it to help protect your privacy. Get started by downloading the Tor Browser. This customized fork of Firefox automatically connects to the Tor network and includes some of the privacy-enhancing browser extensions. This package has everything you need to use Tor successfully, but you’ll also need to change your web surfing behavior to retain as much anonymity as possible. Abide by the Tor warnings, and remember this isn’t a magic bullet. It still has some significant weaknesses.
VPN stands for Virtual Private Network. A VPN extends a private network across a public network, such as the Internet. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Applications running across the VPN may therefore benefit from the functionality, security, and management of the private network. A basic explanation for this is that you are creating a tunnel for your LAN (local area network) over the internet. Lots of businesses use VPNs for a legitimate purpose, for example two restaurants in two different cities using a VPN to bridge their network in order for either place to be able to access all files from the other in a secure manner. VPNs may allow users or employees to securely access a corporate intranet while located outside the office. They are used to securely connect geographically separated offices of an organization, creating one cohesive network. Individual Internet users may secure their wireless transactions with a VPN, to circumvent geo-restrictions and censorship, or to connect to proxy servers for the purpose of protecting personal identity and location.
If you’re very serious about maintaining your anonymity, consider investing in a VPN solution like TorGuard or Private Internet Access. These services essentially allow you to disguise your traffic. Your real IP address will be hidden from the world, and your traffic will remain indecipherable to nosy ISPs(internet service providers) or governments. Even if your ISP is actively on the lookout for VPN traffic, you can still benefit from so-called “stealth VPNs”. TorGuard offers its stealth VPN service at no additional cost, and it will make detection and interference much harder to accomplish.
If you have any problems using our website with Tor then please try these settings in your browser:
1– High security Settings
If you are still unable to use our service properly with Tor then please contact us so we may fix the problem. Don’t enable or install browser plugins
Tor Browser will block browser plugins such as Flash, RealPlayer, Quicktime, and others as they can be manipulated into revealing your IP address. Similarly, we do not recommend installing additional addons or plugins into Tor Browser (or any browser for that matter), as these may bypass Tor or otherwise harm your anonymity and privacy. DNS Leak Testing
Even if you’re using a privacy service (like a VPN) to hide your IP address, it’s still possible to give away clues to your identity via your DNS traffic. Thankfully, it’s easy to detect if your configuration is leaking your DNS information. Simply head over to DNSLeakTest.com and run the extended test. If the results show the third-party DNS service you’re using (like TorGuard), you’re set. If your ISP’s DNS info shows up, you have a DNS leak. Follow the steps listed on the “How to fix a DNS leak” page, and then test yourself again to make sure everything is working as intended. Browser Leak Testing
Is your browser disclosing personally identifiable information? Websites can track you based on your browser signature. Your display resolution, OS version, installed plugins and fonts can create a signature that is unique enough to be able to track you. Head over to BrowserLeaks.com and take a gander at all of the data your browser is giving away. This toolset will never be completely exhaustive, but if you want to verify that your privacy and security precautions are really working, this site is an invaluable asset. Anonymous Email
Make sure you use an email provider that has privacy in mind. There are many of them out there; a quick search will get you a few results. Some of the most known ones are Sigaint.org and Tutanota.com. But these are not all of them by any means. Payment
We only take Bitcoin Payments for a reason, Privacy! Bitcoins are by nature not the most anonymous currency out there but with a little bit of work and the help of a tumbler, you will become basically untraceable in no time. Appropriate transaction fees will help keep your profile low as well. We do not track any payments or any orders for that matter, but a payment that is delayed for days will get noticed without us meaning to. PGP
If you have the need to contact us we encourage anyone to use PGP, especially if it involves any kind of sensitive information. You can find our key and contact information on our Frequently Answered Questions page (just scroll to the bottom.) Track your shipments anonymously
We have included a tracking tool on our website so that you may track your shipment without having to worry about exposing your identity. You are able to track your package on our website using Tor; without having to worry about the shipment being flagged because you used Tor. All tracking requests will be redirected to the carrier via our servers. The carrier will never know that you tracked the shipment via Tor. Watch your other activities when not buying postage
Don’t torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that’s how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow down the entire Tor network for everyone else. Use HTTPS version of websites Tor will encrypt your traffic to and within the Tor network, but the encryption of your traffic to the final destination website depends upon on that website. To help ensure private encryption to websites, Tor Browser includes HTTPS Everywhere to force the use of HTTPS encryption with major websites that support it. However, you should still watch the browser URL bar to ensure that websites you provide sensitive information to display a blue or green URL bar button, include https:// in the URL, and display the proper expected name for the website. Also see EFF’s interactive page explaining how Tor and HTTPS relate. Don’t open documents downloaded through Tor while online Tor Browser will warn you before automatically opening documents that are handled by external applications. DO NOT IGNORE THIS WARNING. You should be very careful when downloading documents via Tor (especially DOC and PDF files, unless you use the PDF viewer that’s built into Tor Browser) as these documents can contain Internet resources that will be downloaded outside of Tor by the application that opens them. This will reveal your non-Tor IP address. If you must work with DOC and/or PDF files, we strongly recommend either using a disconnected computer, downloading the free VirtualBox and using it with a virtual machine image with networking disabled, or using Tails. Under no circumstances is it safe to use BitTorrent and Tor together, however. Report bugs/issues or submit ideas
While we might think we have created something close to an awesome system for you, it is possible that we haven’t thought of everything. We would love to hear your ideas on how we can improve our website. Feel free to make suggestions. We listen. We’ve added many features already based on our customers’ requests and can’t wait to hear your idea!
Reasons to ship with Bitcoinpostage.info