anonymity

  1. Friend

    The End of AI Anonymity: China's New Labeling Rules

    AI content creators face a difficult choice – labeling or a fine. The Internet Affairs Administration of China (CAC) has submitted a draft of new rules aimed at regulating the labeling of AI content. The document was developed in order to protect national security, public interests, as well as...
  2. chushpan

    Anonymous transfer

    Hello Anonymous. The easiest way to find small scammers is to monitor the transfer of funds obtained illegally. Therefore, it is worth knowing how to properly “dissolve” your earnings in the information web. How to do it? When it comes to withdrawing the profit received from the buyer, many do...
  3. chushpan

    How much is your freedom worth? Carding: training

    Hello Anonymous. So that your pants remain dry, even at the moment when the money is debited from your furry brother’s card, I decided to roll out a couple of amendments to your work. It would seem that resetting other people's cards is a difficult moral choice. Because if the bank does not...
  4. chushpan

    20 services for checking anonymity, fingerprint, WebRTC, Canvas, IP, WebGL, etc.

    A selection of services for checking the browser for anonymity, checking fingerprints, etc. Content: 1. browserleaks.com 2. whoer.net 3. Fake vision 4. coveryourtracks.eff.org 5. amiunique.org 6. browserspy.dk 7. deviceinfo.me 8. fingerprintjs.com 9. 2ip.ru/privacy 10...
  5. Tomcat

    Anonymization of data does not guarantee your complete anonymity

    There is an opinion that “anonymized” information, which many companies love to collect and use, will not actually protect a person from de-anonymization if the data suddenly leaks online or is used in someone else’s interests. Cloud4Y tells you if this is true. Last fall, Adblock Plus founder...
  6. Tomcat

    About anonymity on the Internet, life and its relativity

    Warning! In order to prevent various questions in advance, as well as to ensure ease of reading, here is a small disclaimer: everything that will be written next is based on personal and subjective experience, expresses the personal opinion of the author and in no case is a call to any illegal...
  7. Father

    Setting up anonymity! For carding =)

    Hello, my dear friend, today I will tell you and show you how to set up a browser vertex. And so let's start, I will write everything as it is without any water! What do we need? Double SSH Tunnel Manager. The antivirus can swear, this is absolutely normal for this program. After downloading...
  8. Father

    Google vs anonymity: Messages "declassify" unknown numbers

    The new feature will allow you to find out the sender without even opening the SMS. Google is developing a new feature for the Messages app that will allow users to see the sender's name even if their number isn't saved in contacts. The new feature was revealed by analyzing the APK of the...
  9. Father

    Tor Browser: Network anonymity, the darknet, and intelligence agencies

    How does the most confidential browser work, does it really guarantee users anonymity, and should it be banned for the sake of fighting cybercrime? Contrary to popular belief, criminal activity accounts for an insignificant proportion of the Tor network. In 2020, researchers from the United...
  10. Teacher

    Setting up your phone for anonymity

    Hello In this article, we will look at what security tools you should have on your smartphone to feel safer on the Internet. VPN The first thing that comes to mind is a VPN. And your own. Or a paid one. I don't recommend anything, but "PIA VPN" shows itself well among the paid ones. Proxy I...
  11. Teacher

    Wireless charging is a threat to anonymity and your home

    Hello! In a new study conducted by a team of academic researchers from the University of Florida in collaboration with CertiK, a number of security threats related to the use of wireless chargers for smartphones were discovered. Researchers have discovered that the new attack method, called...
  12. Teacher

    No mobile number – no problem: nicknames in Signal override the anonymity of correspondence

    The messenger has finally implemented a technology that has been developed over the past few years. The popular messenger Signal, whose developers have always paid special attention to security and privacy, announced a long-awaited innovation - support for nicknames for users. The new feature...
  13. Teacher

    Anonymity comes first: Signal introduces phone number protection

    Messenger takes a big step towards complete communication privacy. For almost a decade, cybersecurity professionals and privacy advocates have recommended the Signal encrypted communication app as the gold standard for truly private digital communication. However, using it, paradoxically...
  14. Brother

    The trial of a hacker in Finland has cast doubt on the anonymity of cryptocurrencies

    After tracking the ransomware in hot pursuit, the specialists managed to restore the entire chain of actions in the blockchain. Finnish law enforcement agencies managed to trace Monero transactions to identify the ransomware hacker, despite the anonymous features of the cryptocurrency. In...
  15. Carding 4 Carders

    Chinese social networks are preparing to deprive popular bloggers of anonymity

    Bloggers with more than 500 thousand subscribers will have to indicate their real names. China's largest social media platforms have launched an initiative that requires bloggers with an audience of over 500,000 subscribers to provide their real names. The main focus is on those who publish...
  16. Carding 4 Carders

    Anonymity on the Internet did not save the scammer from punishment

    Some people commit crimes remotely, creating fake accounts in instant messengers and on Internet platforms, hoping to remain unmasked in this way. However, such "privacy" is a myth. This was reported to the correspondent of the agency "Minsk-News" in the Leninsky District Department of Internal...
  17. Lord777

    Financial anonymity in carding

    Carding in general is a major economic war in which there are all kinds of" troops " as for me, we are infantry, small fry that go like cannon fodder, some of us are caught in enemy territory, some for show in their native cuts. You may ask, if this is a war in which we are engaged as warriors...
  18. Lord777

    Programs for anonymity

    1. STZBlaster - a program for changing the PC name, host, processor ID, HDD volume, MAC address and much more. Additionally, you can change the regional settings in the program. 2. RMOSChange.exe - the program changes the HTTP headers of popular browsers (Mozilla, IE, Mozilla (old)). The...
  19. Lord777

    Lesson on anonymity for carder beginners

    I will tell you how you can be found and how to counteract this, along with describing the algorithms of proxy, VPN and other means of anonymization in the simplest possible language. Greetings to all, dear carder friends! In this article, I will tell you how you can be found and how to...
  20. Tomcat

    Complete anonymity or subscriber story

    Start It all started in 2007. I took my first steps in the wonderful world of carding. But the thought of getting caught constantly haunted me. At night, I dreamed of special purpose groups knocking out the doors of my apartment and signs on the whole screen of the monitor with the inscription...
Top