How to stay 100% anonymous on the internet

Carder

Professional
Messages
2,619
Reputation
7
Reaction score
1,653
Points
113
WARNING -EVERYTHING YOU DO WITH THIS TUTORIAL DO IT AT YOUR OWN RISK. USE IT FOR EDUCATIONAL PURPOSES ONLY. I'M NOT RESPONSIBLE FOR ANYTHING YOU DO WITH THIS TUTORIAL! (A)

First i would like to say… To all the people who say, that's impossible, ifthe goverment want you they catch you. No that's not right. The people who got caught are stupid people. People who brag about what they were doing. Tell it to friends or write it on forums. Remember… If the police can't trace you they will try to dox you. If you brag about what you are doing on HF, they can just ask Omniscient for your IP, because you can't use proxies and so on HF.

Things you need:
  • Truecrypt.
  • Smac.
  • Wireless Network Adapter.
  • nVpn.
  • Vps.
  • Another nVpn account.
  • Socks5 for use victims IP adress. One slave on your RAT.
  • A list of working proxies.
  • A closed mouth.
  • A home.
Truecrypt
You should first of all encrypt your drive so not even the cops can acces it and see what your were doing if they find your HDD.There are many tuts of HF how to encrypt your HDD with truecrypt.

Smac
Smac is a powerfull tool that can change your mac address.Use it! It's reduce the chance of getting caught. There are way to many tuts on HF how to use it.

Wireless Network Adapter
Wireless network adapter change your mac addres, so if they found out your real mac address after you spoofed itwith smac, they will just get the mac adress of your usb adapter.

nVpn
nVpn is the best vpn for hacking on the marked. What a VPN does is it connect you to a Vitural Privat Network that is encrypted. So if they trace you they will get nVpns IP not yours. They say they don't keep logs, but i'm sure they do.But they delete after a period of time.

VPS
VPS stands for a Virtual Privat Server and what it do is that you connect to a Virtual machine, so you don't have any hacking shit on your machine and agian, it's change your IP.

Socks5
You need one slave from your RAT to use his IP. Socks5 mean that your IP change to your victims IP. So instead of you, the cops end up to him. Remember, if this one.. You can get it to look like a person of your choice do it :) Of course when he say he didn't, they will scan his PC for rats.. and then they will go a step down.. To your VPS :)

Proxies
Proxies change your IP in your browser and show another IP instead of yours.

A closed mouth
Alltime keep your mouse closed! If you brag about what you have done, you will get caught.They find you if you brag! Be sure about that. Even your friends will tell it to their friends.

What should i do then i got this?
First thing you need to do is to get slave rat, you could use are target person so the cops will end up to him.You should have encrypted your PC with truecrypt before doing anything else.But first you get down to the Internet Cafe with Wireless Network. When you are on the Internet Cafe you put your Usb Adapter in and spoof it's mac address with smac. Then you are there you connect to your nVpn. Then you connect to your VPS and connect to another nVpn account. Then you should forward your ports on nVpn that is installed on your VPS.Then you should choose a target from your rat list, right click on him and use him as socks5.After this you make a proxy chain. A proxy chain is a long list of working proxies so when they find your first proxy they just get to the next and this go on and on agian and agian. The idea with a proxy chain is that they give up or the proxy has deleted logs before they get to the last one. Keep your mouth closed. If you brag, they find you, be sure about that.Go home. And if you do something big so they go through all this they will just end up on the internet cafe with you home and watching TV. A good idea would be to take your HDD and your USB adapter out, run a magnet over the HDD and smash both USB adapter and HDD.Then burn it or something to the last. So there is nothing there can give you away if they come to your home.

Tips n' tricks
  • Just a little tip… A good idea would to not smash your PC at the Internet Cafe because that would maybe get a little attention and don't burn it there too.
  • You can of course buy more nVpns, proxies and vps to get more secure etc.. Like -> nVpn -> vps -> nVpn -> Socks5 -> vps -> nVpn -> socks 5 -> Proxy chain -> Do your dirty job.
  • Really, you don't even need all this, all thisdo it piss the cops off with after a long searching ending up on a internet cafe and a smashed computer. I'm not 100% sure about this.. But i think you just can go to the internet cafe, do your job, leave, smash PC and speciel the HDD! And that's it. But for being on the secure side so they have harder to find you. But if you follow my TUT it's will be a pain in the ass for the cops to find the internet cafe with no… you!
  • You can use smac every time you connect to a new VPS for being double secure.
  • If you use proxies that your country is unfriendly with, the cops with have a harder time to get the logs.
  • Don't log on facebook, HF or any other things that can lead to you then you are logged in with your vpn, vps, socks5 or proxies.
  • Because then they just ask facebook for maybe that IP adress and then they tell the the cops the latest account logged in that IP. Not use your real info then buying nVpn, vps, your RAT or buy proxies.
  • Don't do this at your main PC, but a low price one if you want the smashing part.
  • A good idea would be to take your HDD and your USB adapter out, run a magnet over the HDD and smash both USB adapter and HDD. Then burn it or something to the last. So there is nothing there can give you away if they come to your home.

I hope this tut helped some people to stay anonymous on the internet. You can feel free to PM for more questions about it. Credits to Argoi.
 

Carding 4 Carders

Professional
Messages
2,731
Reputation
12
Reaction score
1,321
Points
113

10 steps for anonymous and secure Internet browsing​

Safe Internet browsing entails daily actions that prevent your data from falling into the hands of people who want to use it for purposes that are not profitable for you, for example. identity theft and specialized malware.
Anonymous browsing means that your data is simply not protected, but the data is not tracked.
As a regular user, everything you do online is tracked.
However, there are various reasons why you might be fine with the tracked data, as well as reasons why you might not be able to handle it.
I refuse to enter into this discussion today.
However, I will try to tell you as briefly as possible about all the necessary steps that you need to take to use the Internet safely and, if you want, anonymously.

1. HTTPS Everywhere
HTTPS is a secure version of the hypertext transfer Protocol that is used for data exchange between browsers and websites.
Almost every current website uses HTTPS, so stay away from websites that don't, as it's a simple indicator that your data isn't in safe hands.
There is even a browser extension, HTTPS Everywhere, that forces browsers to transmit data over HTTPS, even if they don't have a certificate.
You can download it for Internet Explorer here.

2. Beware of public (unprotected) Wi-Fi
Public Wi-Fi is one way to make sure that your online activities aren't used to determine your location, since the IP address assigned to your system won't always be yours.
However, make sure that you don't allow your machine to communicate with other connected devices, receive automatic updates and app downloads, and so on.

3. Beware of browser plugins
Modern browsers, such as Google Chrome and Firefox, have the ability to extend their functionality with plugins, and while this is a good thing, not all plugins are created the same, especially if you download plugins from a non-standard repository, such as the Chrome Store for Google Chrome.
Before installing plugins, be sure to read their privacy policies to confirm that they respect your right to privacy and that they have the option to disable tracking.

4. DuckDuckGo
DuckDuckGo is a search engine that aims to keep your search history private and block ad trackers.
It is highly recommended by most open source communities and is even the default search engine in the Onion browser, TOR.
I don't paint Google in a bad color, but the search engine makes money from selling ads based on data tracked by users who use its service.
Of course, if you want to be sure that your data is safe, you would definitely stop using Google.

5. Beware Of Cookies
Cookies are not bad in themselves, because they are a method that web services use to provide you with customized browsing experiences.
Cookies can be used to perform several complex tasks, including storing login credentials, map information, location and language preferences, and so on. so it is important to keep track of what cookie data your browser stores and how it will be used.

6. TOR browser
TOR IS a free and open source software that allows users to browse the Internet anonymously by redirecting Internet traffic through various repeaters.
This is an additional step to encrypt your IP and all data packets that communicate with your computer, so that your identity is masked regardless of whether you are using a VPN.

7. Use a VPN
VPNs are the easiest way to change your IP address, and most VPNs provide the ability to encrypt your Internet traffic, spoof your location, and grant you access to geo-blocked websites.
I don't suggest that you use a proxy server, because while it will give you access to geo-blocked websites, proxy servers don't offer you half the features that you will use in a VPN, and anonymity is one of the most important.

8. Use an anonymous email account
Popular email account providers, such as Gmail and Yahoo Mail, require you to provide certain personal information that is automatically shared in their community for multiple purposes.
What you should do is opt out of these services in favor of anonymous email services like TorGuard and ProtonMail, which allow you to create accounts and interact with others via email without compromising your identity.

9. Use a mobile network
Browsing with your phone's data is a safe way to stay anonymous online, as it uses a routing system that assigns a unique IP address each time you connect to it.
While this method keeps your identity anonymous, it is slow and not as effective.

10. Anonymous online payments
You cannot remain anonymous online if you send Bank details and similar credentials over the Internet, even if it is a secure process.
Then how do I make online payments?
Use gift cards and cryptocurrencies.
These days, they are becoming easier to master, and more companies are adding support for them.
The above-mentioned items are checkboxes that need to be checked to ensure the security of your data on the Internet and permanent anonymity.
Remember to pay attention to the details of any services you use when you are online, and adhere to the privacy policies specified in the apps you use, such as. Tor.
Do you know any other points that you can add to this list?
Share your thoughts and suggestions in the comments box below.
 
Top