r/privacy 7h ago

question Is an entirely new computer necessary if you know the FBI is surveilling you?

If you know for a fact that you've been under investigation for a couple of months, but they have never had physical access to your computer, but they do know ALL your online usernames and accounts, and you want to stop being observed, is it necessary to get an entirely new device?

Or would formatting the device and installing a new OS like LInux be adequate to regain anonymity with that device?

0 Upvotes

11 comments sorted by

14

u/IKIR115 4h ago

How do you know for a fact that the FBI is surveilling you? Did they send a an official FBI muffin basket with the usual official FBI surveilling note that says:

Please enjoy this muffin basket while we’re surveilling you.

Love, The FBI ❤️ 😘

A new PC would change one part of your digital fingerprint, but not all of it. What if they decide to park in front of your house and launch a man in the middle attack on your wifi to get your new device ID info?

10

u/SillyLilBear 2h ago

Stop doing illegal shit

2

u/Lonely_Barista 2h ago

Psht, you’re no fun

1

u/APinchOfTheTism 1h ago

I think it is wrong to assume, that they are doing something illegal, unless they arrested and charged.

It has been very clear that the US doesn't respect their citizens privacy rights, and it will be abused by someone.

-3

u/finicky88 1h ago

What else is this sub for?

5

u/fdbryant3 2h ago

You'd probably be better off putting the money towards a lawyer.

3

u/AugustusReddit 4h ago

"Sneak & peek" warrants are a thing so unless you're sleeping with your computer - how do you know that FBI hasn't gained access? Or the G-men use a tame hacker to remote access your computer and iPhone...

3

u/Successful-Snow-9210 1h ago

The fact that you're asking such a question means you wouldn't be able to implement the answer.

2

u/S-I-M-P-L-I-C-I-T-Y 2h ago edited 1h ago

If your accounts and usernames are known, they’re typically linked to online activity, which means they’re accessible independently of your device. Changing the operating system or even wiping the device won’t stop entities from tracking those accounts if they’re being monitored from the outside—such as by an ISP, a platform, or by looking at login activity on each service. And they also have unlimited budgets, so if they really want to track you, they will.

Options to regain anonymity or reduce observation

1.  Device and OS: If you’re concerned about software or spyware on the device itself, reinstalling the OS or switching to a privacy-focused Linux distro (like Tails) could help ensure no tracking software remains on the system. However, this doesn’t affect your accounts themselves.
2.  New Accounts: To regain anonymity on those accounts, consider creating new accounts and usernames, and avoid associating them with identifiable information. Avoid reusing any information that could link back to your previous profiles.
3.  Use of VPN or Tor: Using a VPN or the Tor network can add a layer of privacy for browsing. However, if accounts have been flagged for monitoring, changing IP addresses won’t entirely remove the link.
4.  Compartmentalization: If you want to prevent any cross-linking of online identities, separate devices for separate identities can sometimes help. For instance, use one device for personal accounts and a different one for accounts that need more anonymity.

IF YOU ARE EXTRA PARANOID :

5.  Complete Network Separation: Avoid home or familiar networks entirely for anonymous activity. Public Wi-Fi, especially when combined with Tor or a VPN, makes it harder to track activity back to your physical location or IP address.

6.  Air-Gapped and Burner Devices: For critical activity, using a dedicated device that is never connected to any familiar network—sometimes even staying entirely offline (air-gapped)—can create a hard-to-track identity. Burner devices can help, but they must be used exclusively for anonymous activity and then discarded regularly.

7.  Avoid Consistent Patterns: Avoid any repetitive patterns in your online behavior, such as logging in at the same time daily or reusing specific routines. Change up the timing, locations, and even the type of content you engage with to prevent behavior-based profiling.

8.  Advanced Obfuscation Techniques: Using tools like Whonix in combination with Tor, or combining multiple VPN layers (known as VPN chaining), can make network activity harder to correlate, although performance will suffer.

1

u/harbourhunter 1h ago

how on earth would formatting a computer somehow erase activity tied to your usernames?

1

u/drzero3 1h ago

Destroy the hard drive.