Tutorial Anonymity in Carding (easy for new carders)

Carding 4 Carders

Professional
Messages
2,731
Reputation
12
Reaction score
1,302
Points
113
If you are engaged in virtual carding or plan to start, you should understand that you should pay special attention to security. In this article I will tell you what are the ways of protection and the differences between it. I remind you that virtual carding is making online purchases when you carding CC CVV or FULLZ.

WHAT IS VPN?
VPN is a virtual private network. You connect to the vpn-server and your further actions on the network come from the IP address of this server. The connection from you to the vpn-server is encrypted, which means the Internet provider will not be able to track your activity on the Internet.

In the case of Double VPN, the connection goes first to the first server, and then after it to the second and only after that goes to the final point. It turns out that the Internet provider sees an encrypted connection to the first vpn server, and you appear on the Internet with the IP address of the second vpn server. Therefore, we can assume that DoubleVPN is more reliable than just a VPN with one server in a chain.

Advantage:
Encrypts traffic;
The more people using the same server, the better;
It is possible to use DoubleVPN, two servers - double protection;
Suitable for carding CC.

Minuses:
For some, it may seem expensive;
Some services keep logs and may leave traces (for example, no need to go far, secretsline.biz).

WHAT IS SOCKS5?
Simply put, a socks is an intermediary between you and the end server to which you sent a request.

I will explain with an example:
You want to practice virtual carding. The request from your browser first goes to Socks, and already from the socks goes to the darkwebs website. It turns out that the web server receives a request not from your IP address, but from an IP address socks.

Advantage:
Cheap;
Suitable for carding CC.

Minuses:
It does not encrypt traffic, but simply redirects it.

WHAT IS A SSH TUNNEL?
SSH functionality is the same SOCKS, but with one significant and important difference - traffic encryption.
Consider such a DoubleVPN + SSH chain.

The situation is the same, you want to practice virtual carding. Suppose that you use a 3G modem, it connects to the first vpn server, from there to the second, and from there to the SHH tunnel, and only after the tunnel, the packets go to the final point - darkwebs.

And now about encryption:

Your Internet provider will not be able to track your activity, since Vpn provides strong traffic encryption with a 2048 bit RSA key on both servers; and the provider will not be able to track your activity either, since SSH also encrypts traffic, it turns out 3 layers of encryption. At the same time everyone, you have adequate ping and fast safe surfing!

Advantage:
Encrypts traffic;
Suitable for carding CC.

Minuses:
More expensive than the socks. Cheaper than vpn;
Harder to use than SOCKS and Vpn;

WHAT IS TOR?
This is an open source router. Originally created as a network for the US Navy, but at one point it became public. It is actively used by journalists, political activists and fighters for human rights, it is also popular in countries with severe censorship of the Internet. It has its own pseudo-top-level domain .onion, accessible only via torus routing.

The Tor network has a list of central servers, called directory authorities and distributing a list of transit nodes to connecting nodes. The router accesses these servers once at startup and builds chains that traffic will follow later. Now in the top of the network there are about 6,000 nodes scattered around the world and users traffic starts over them.

Suppose you want to go to darknet again. You entered the address in the address bar and slapped on Enter, then the fun begins:

Outgoing packets are sequentially encrypted with 3 public keys (only one node in the chain can decrypt each layer) and are sent to the 1st node in the chain (input node).

At the input node, the first traffic encryption layer is removed (the traffic is still encrypted with the remaining two keys) and transmitted to the transit node (relay node).
On the transit node, another encryption layer is also removed and the still encrypted traffic is transmitted to the output node (output node).
At the output node, traffic is decrypted permanently and transmitted to the darkwebs web server.

Advantage:
Open source;
Strong encryption;
Own pseudo-domain .onion
Suitable for carding CC.

Minuses:
Sometimes a very high ping (delay);
Ability to intercept traffic at the output node if the destination web server does not support ssl or tls encryption;
The best result can be achieved if you remain within the torus of the network and the .onion domain without going online.

NOTE: If you are at the beginning of your journey, please study this topic carefully. Never neglect security. This is the only way you can safely use CC and full CC for your online purchases.
 

Ruslanqah

BANNED
Messages
6
Reputation
0
Reaction score
0
Points
1
Please note, if you want to make a deal with this user, that it is blocked.
Where is moderator??
It is about advertisement on your website.
Regards.
 

Ruslanqah

BANNED
Messages
6
Reputation
0
Reaction score
0
Points
1
Please note, if you want to make a deal with this user, that it is blocked.
Where is administration?
It is important.
Regards.
 

Teacher

Professional
Messages
2,677
Reputation
9
Reaction score
608
Points
113
The most common myths about anonymity on the Internet

Browser and its TOR network
It is considered a good tool for anonymity.
When using this network and the browser, encrypted traffic passes through a chain of proxy servers that are independent of each other. It changes regularly and new proxies are used. Many people think that identifying the user and his data is unrealistic.
But this is not the case. First, the last server sees the traffic in an unencrypted form. Secondly, the hardware of the computer, Canvas Fingerprint and other things are monitored. So yes, Thor enhances anonymity, but it is not a panacea.

The next misconception is that the history of my requests is stored only by my browser and I can easily delete it.
No, any search engine stores and remembers your queries. Has it ever happened that you google some product, and then you are haunted by its advertising? This is it. Google remembered what you were looking for and took advantage of it.

The third myth is that I will turn on the proxy and be anonymous.
First, the ISP sees that you are connecting to a specific proxy server. Therefore, if you are interested, it will not be difficult to track you. And if you don't connect, the provider will initially know and store your entire history of page visits, even if you later delete it from your computer.

Fourth myth. Do you think that if you do not indicate your real name and surname on the Internet, no one will get to them? The answer is no.
For example, many services now require a mobile phone number. And already on it it is not difficult to track you. You will say that the SIM is not registered in your name.
But your phone number is kept in the contacts of your friends, acquaintances and relatives. Some of them have you signed by name and surname. Mom has you signed as "Son". And at least one of your contacts has a phone book synchronization with Google. Do you understand the connection?

Well, the fifth myth is that if you turn off the geolocation in the smartphone, then they will not be able to track my location.
First, you can still be tracked by your phone number with your mobile operator.
Secondly, you can be easily tracked over the Wi-Fi network to which you connect.
Well, and so on) In general, using a smartphone, you can forget about complete anonymity, unless you turn off all the functions there that make it a smartphone.

Such things, guys) So be careful on the Internet.
 
Top