← Back to Library

How to be anonymous in a protest

In an era where a single photograph can end a career, The Hated One argues that the most radical act of dissent is not shouting louder, but becoming invisible. This guide strips away the romanticism of protest to reveal a stark reality: modern law enforcement has evolved from physical suppression to digital erasure, turning every smartphone into a potential arrest warrant. For anyone considering taking to the streets, the author's central thesis is chillingly clear—surveillance is now the primary weapon against democracy, and the only defense is extreme, uncompromising anonymity.

The Digital Trap

The Hated One opens by dismantling the assumption that a smartphone is a neutral tool for documentation. Instead, they frame it as a beacon that broadcasts identity to anyone with the right equipment. "Surveillance is the most powerful tool to silence descent," the author writes, noting that police can now intercept radio signals to extract unique identifiers and trace them back to homes and offices without ever touching the device. This reframing is crucial; it shifts the conversation from physical safety to digital hygiene, arguing that resilience in the 21st century requires protecting one's data as fiercely as one's body.

How to be anonymous in a protest

The author details how cellular radios, Wi-Fi, and Bluetooth beacons act as constant trackers. "Your SIM card has a unique IMEI number that is broadcast indiscriminately into all directions," they explain, describing how "IMSI catchers" can capture this data to find real phone numbers and intercept communications. This is not theoretical paranoia but a description of standard police capability. The Hated One argues that because these signals are so revealing, the only safe option is to leave personal devices at home entirely.

Critics might note that the logistical difficulty of maintaining total digital silence could deter participation, potentially shrinking the movement rather than protecting it. However, the author insists that the risk of identification outweighs the convenience of connectivity.

The Burner Protocol

Moving to solutions, The Hated One provides a granular, almost technical manual for acquiring and using a "burner" device. They are unequivocal about what not to use: "iPhones cannot be used anonymously since an iPhone will not function properly without an Apple ID." They argue that Apple's ecosystem is too deeply integrated with personal identity data, which the government can request at any time. Instead, the author champions the Google Pixel running GrapheneOS, an open-source operating system that allows for complete isolation from Google's tracking infrastructure.

The guide outlines a rigorous acquisition process: purchasing a carrier-unlocked device with cash, avoiding any personal Google accounts, and installing the operating system before the device ever enters the user's home. "A burner phone is a single use or single purpose device... that only contains information relevant to the task and nothing more," The Hated One writes. This level of operational security is presented not as optional, but as a prerequisite for effective protest.

"Your goal must be to become unidentifiable."

The author's insistence on physical isolation is equally strict. They advise removing smartwatches and keeping tablets at home, noting that "every step suggested will be accompanied by a proper explanation to help you understand why you should follow it." This pedagogical approach suggests that the author views anonymity as a skill set that must be mastered, not just a gadget to buy. The recommendation to use Faraday bags to seal all radio signals when not in use further underscores the depth of the threat model.

Operational Security and Communication

Once the hardware is secured, The Hated One turns to software, advocating for a suite of open-source tools that route traffic through the Tor network. They recommend installing F-Droid, a repository for privacy-respecting apps, and using Orbot to create a secure tunnel for all internet traffic. "Tor is slower than clear internet access but it is faster than spending time in jail because it didn't protect your traffic," the author asserts, a pragmatic calculation that prioritizes long-term freedom over short-term convenience.

The guide also addresses the human element of security, advising protesters to create anonymous email addresses and store credentials in an encrypted database like KeePassDX. "Communication with your fellow protesters... has to be anonymous and encrypted even if you know each other," they warn, highlighting that trust within a group does not negate the need for technical safeguards. The author suggests that even metadata can be dangerous, urging users to disable biometric unlocking in favor of long alphanumeric passcodes to prevent forced unlocking by authorities.

A counterargument worth considering is that the complexity of this setup—requiring specific hardware, cash purchases, and technical knowledge—creates a barrier to entry that may exclude those without technical literacy or financial resources. The Hated One acknowledges this by offering a "least secure" option of factory-resetting a personal device, but maintains that it is a compromise that should be avoided if possible.

Bottom Line

The Hated One's guide is a masterclass in threat modeling, effectively arguing that in the current legal and technological landscape, the default state of a protestor is exposed. Its greatest strength is the refusal to offer half-measures, insisting that partial anonymity is no anonymity at all. However, its biggest vulnerability lies in its accessibility; the rigorous protocols described may be too demanding for the average citizen, potentially limiting its utility to a small cadre of highly skilled activists. The piece serves as a stark reminder that the battlefield of modern dissent has moved from the pavement to the server, and the rules of engagement have changed forever.

Sources

How to be anonymous in a protest

by The Hated One · The Hated One · Watch video

the success of any protest depends largely on the resilience of its individuals if the police can't quell your protest nobody is going to listen to your demands staying resilient in a 21st century protest requires far more than enduring batons rubber bullets and tear gas police now have the ability to harass protesters with arrests threats and coercion all the way back to their homes and offices attending a protest with a phone will now tell the police exactly who you are who you communicate with and where you live they can extrapolate all this information just by intercepting radio signals of your phone to catch an mz number associated with your phone number from there they can go to telecommunication providers google apple and social media companies to request all the information they hold on your accounts all of this can be done without the police ever touching your phone surveillance is the most powerful tool to silence descent this is why if you care about your cause you are going to have to care about protecting the identity of you and your fellow protesters your goal must be to become unidentifiable what follows is a comprehensive guide to become anonymous in the streets the goal is extreme anonymity and no middle ground compromises this guide will be split in two parts digital security and physical security make sure to follow and understand every step in both of these parts as they are both equally required to remain anonymous every step suggested will be accompanied by a proper explanation to help you understand why you should follow it every protester should be equipped with this knowledge so feel free to download this video text and description with all the links included for further reading and training share all this information with your friends and especially fellow protesters this guide can be useful to perfect the strategy of anonymous and resilient descent if you have experience with protests or have any useful input post your comments underneath and share this on social media to as many people as possible before attending a protest you have to consider your digital devices your phone can be a crucial tool for documenting the protest navigating streets and communication but it can also be the first thing that compromises your identity your phone has four main radio signals all of which can compromise ...