anonymity

  1. Hacker

    Total FAQ on Network Security and Anonymity

    1. Complete anonymity does not exist in nature at all! "Complete anonymity" is not required, it is enough to confuse the chain in such a way that its unraveling is unprofitable and the effort spent does not pay off with the result. To reach this level, you do not need any special knowledge and...
  2. C

    Anonymity chain

    In the past ive used a vpn on main > whonix > rdp > vpn. Lately, Ive heard a lot of mixed opinions on this chain and that the first vpn should be forgotten. Would like to hear what you guys think should be improve.
  3. Mutt

    Ideal kit for "Anonymity" in carding

    All information is for informational purposes only and does not call for action! Ideal kit for "Carder's Anonymity": Separate laptop. New 3G / 4G modem. New SIM card on the left forehead. VPN (traffic encryption). VPS (remote virtual server). New identified e-wallets for payment and for...
  4. CreedX

    5 myths about anonymity

    Many people think that the Internet is a relatively free and anonymous network, and with the use of various tools, you can generally remain completely in the shadows. Unfortunately, this is not the case. In reality, the Internet is a way to get information about you. It is through it that cops...
  5. CreedX

    Fine-tuning Windows. Maximum anonymity

    Before carrying out any manipulations with the registry, ALWAYS make a backup of the registry. Alternatively, this can be done from the command line: reg export HKLM hklm_backup.reg and so on every branch. Now let's start directly shamanizing with Windows: Open the registry editor as...
  6. CreedX

    How to wrap all OS traffic in Tor

    Online anonymity has been hotly debated lately. It's not a secret for anyone that data on visits to Internet resources from a local device can be collected at different levels in order to build a "model" of a user, which can later be used against him (or could ). Therefore, it is not surprising...
  7. Hacker

    Online anonymity schemes

    Administrative deanonymization involves sending a request to the hosting provider with a request to provide data on server connections. If multiple links are used, such as multiple VPNs, requests are sent sequentially to each hosting provider, starting with the last one. As a result, it is...
  8. Jollier

    What is a fingerprint and what is it for? Basic browser settings for online anonymity.

    An urgent problem all over the world today is the protection and security of personal data on the network. The ubiquity of technology makes it easy to collect personal information. In addition, users independently share on social networks, instant messengers, e-mail correspondence and other...
  9. Carding

    Carders defensive stance to enforce justice

    How carders build their line of defense when facing justice: Correct legend and testimony. It can happen to anyone. I accidentally lost my IP, made a call from a flashed SIM card, recognized my neighbor - no matter how, but I got burned. They came to you, and guys in uniform came to you. In...
  10. Carding

    5 levels of anonymity on the Internet + instructions for accessing each

    I decided to write an article about five levels of anonymity on the Internet at once, so that you understand how not only small fraudsters mask their activities, but also real criminals whom they were already looking for. Let's say you want to leave an angry comment about the government on...
  11. Carding

    Making a geolocation deanon

    We will need for this case - the utility + the victim's click on our pre-prepared link. Seeker is a utility that sets up the website on the Apache web server and using Ngrok creates a link clicking on which will be requested access to the geolocation, in case such access is granted, we receive...
  12. Carding 4 Carders

    I2P over Yggdrasil: anonymity in mesh networks

    I2P (Invisible Internet Protocol) is a free tool for organizing anonymous communications over the Internet. It is a peer-to-peer network in which each user is, by default, a potential link in an anonymous chain of other network participants. I2P traffic is encrypted and cannot be analyzed. The...
  13. Carder

    Cryptocurrencies and anonymity. Anonymization methods and the most private cryptocurrencies.

    The words "anonymity" and "cryptocurrency", since the appearance of the second, are quite closely related. Even when creating bitcoin, Satoshi Nakamoto said that it is now possible to anonymously make cross-border payments, and even with minimal commissions. But people understand it in different...
  14. Carder

    Offline anonymity and security. How not to get into a mess?

    Good time of day. Last time I wrote about how you can be tracked using your own mobile phone, but this article will be a Supplement and will be devoted to aspects of psychological security and anonymization, which is inherently associated with offline, and also rather focused on beginners and...
  15. Carder

    Free courses on anonymity and security

    Paranoid II-course on anonymity and security (2020) Paranoid II-a logical continuation of the course on anonymity in the Paranoid network Instructor: ghost What the course is about: a set of measures to protect information, privacy, personal data protection, anonymity on the Internet and more...
  16. Carding 4 Carders

    Security and anonymity for Android

    With each everything on the network, more and more potential threats arise that can harm the security of our confidential data, therefore, today we decided to share with you a list of vital applications for your phone that will protect it from external intrusion and surveillance. Services: 1...
  17. Carding 4 Carders

    How to check your IP

    In summary, this is how to check your IP (1) First go to whoer.net to check your IP and anonymity % (2) Then go to Whatleaks.com to make sure your Time zone is correct and your Cookies is good and doesn’t expose you (3) Then go to Dnsleaktest.com to make sure your dns or ip isn’t leaking and is...
  18. Carding

    SAFETY NOOB GUIDE

    GENERAL INFORMATION VPN I will always recommend a VPN even though you may already have socks this adds extra security to your system, the best way of doing this is connecting to your VPN and once connected then connect to your socks this gives a double defence wall. There are many VPN providers...
  19. U-A-S

    Sell RDP / UAS-SERVICE.RU / RDP SHOP #1 - Продажа дедиков!

    Актуальный домен сервиса - UAS-SERVICE.RU Здравствуйте уважаемые пользователи форума! Рады представить вам новый сервис по продаже RDP/дедиков для повышения вашей анонимности! Когда-то мы сами были потребителями данных услуг, но ни найдя ни одного сервиса должного качества, мы создали этот...
  20. nevertheless

    Linken Sphere - the most safety and user friendly antidetect in the world - Безопасный браузер!

    Приветствуем, друзья! Мы рады представить наш новый продукт - наиболее безопасный и дружелюбный браузер антидетект, работающий в мультипоточном режиме. Уверены, что благодаря этому продукту Ваши возможности выйдут на совершенно новый уровень, и Вы уже не сможете представить, каково это было -...
Top