A major guide to anonymity

Teacher

Professional
Messages
2,670
Reaction score
783
Points
113
Content:
Part 1. Configuring Windows OS for secure network operation.
Part 2. Encrypting data on a PC and ways to permanently delete information.
Part 3. All about passwords. Storage methods.
Part 4. Access to the Internet, select a browser and configure it.
Part 5. Secure email, one-time notes, and file transfer.
Part 6. Anonymizers, Proxies, Socks5 and working with them.
Part 7. RDPs and working with them. Scheme of working through RDPs.
Part 8. VPN and all about VPNs.
Part 9. Methods of secure communication in the network.
Part 10. Bonus article "How to stay as anonymous as possible + examples"
Part 11. Conclusion and conclusions

Part 1. Configuring Windows OS for secure network operation.
If you are doing something serious on the network and work with Windows, then I advise you to switch to Linux, but if you don't want to, then read on. When working with Windows, use only licensed software and constantly update the system with new updates. Updates can be configured in the Control Panel (I think everyone will understand how to configure them). If you are doing something important online, it is best to create a separate account for working with user rights. If you catch a virus, it will not be able to fully activate and register in the system, because most malicious programs register themselves in the registry, and without admin rights, this is impossible to do. You can also work with the main account, but then you need to be extremely careful about what you download from the network and what sites you visit (next will be the chapter about browsers). Set different complex passwords for your accounts. The password must be random. My advice: if you really are doing something serious and dangerous, then install VMware Workstation and perform all actions there. Video on installing a VM (not my video):
The next step in configuration is to install a firewall. We will install Comodo Internet Security. You can download the firewall here: http://www.comodo.com/home/internet-security/free-internet-security.php After downloading, we will install it. We will definitely enable automatic updates. Instructions for installation and configuration can be found at this link (everything is written in great detail): http://www.comss.ru/page.php?id=1658
We have completed the basic configuration. Now we need to go to data encryption on the PC and methods for permanently deleting data.

Part 2. Encrypting data on a PC and ways to permanently delete information.
To encrypt data on your computer, we will use the True Crypt utility.
TrueCrypt is a free, open-source cryptographic software for On-the-fly data encryption.
In order not to copy here the instructions for working with the software and the full manual on encryption, I suggest that you do everything exactly, as at the link: http://wiki.mvtom.ru/index.php/TrueCrypt You can download the software here: http://www.truecrypt.org/downloads
Do the encryption procedure with your flash drive as well.
Permanently delete information.
You can permanently delete information using two programs: Eraser and CCleaner.
Let's try using CCleaner first.
CCleaner is a utility for optimizing and cleaning the system.
During installation, you need to mark the item adding cleaning functions to the trash. Open it, go to settings, then another settings tab and select permanent erasure there. You can put 1 pass, but I recommend using the Gutmann method (35 passes). This software itself is convenient for deleting information.
We are trying to delete information via Eraser.
Eraser is a free utility that allows you to completely delete unnecessary data from your PC's hard drive without the possibility of subsequent recovery. It supports working under Windows 95/98/ME/NT/2000/XP/2003, DOS and partially Windows Vista operating systems. The program uses several different methods of erasing data, is able to deal with encrypted files and folders, and clears the contents of the Trash. Eraser is also able to delete information from network storage, floppy disks, CD-RW, DVD-RAM, DVD-RW, etc. FAT32 and NTFS file systems are supported.
The software may seem complicated at first glance, but for those who find it difficult, use the first method of deleting information. In Eraser, we also set the Gutman method.
Then everything will be clear. Information on using the software can be found here: http://www.hack-info.ru/showthread.php?t=46885

Part 3. All about passwords. Storage methods.
Passwords for each site must be different. You don't need to set your date of birth, your favorite color, movie, phone number, etc. as a password.
etc. - everything is easily selected. Also, don't use passwords like qwerty, 123456, 12345678,qweasd, or any easy passwords that can be broken in a few minutes. The most secure password according to experts is a password consisting of 16 characters. Basically, when registering on websites and forums, you are asked to enter a password of 6 to 20 characters. 16 characters - the most optimal password! Use uppercase and lowercase letters, numbers, and, if possible, symbols in your password. Example of a 16-character secure password: WPXjVu{pUY{I+AOX. It is better to write down all passwords. Now we will talk about ways to store passwords.
Many people store passwords in their browsers, which is absolutely forbidden!!! At the first hit of a Trojan (for example, the same UFR), your passwords will be lost to attackers. There are people who store passwords in text files on their computer and open them in notepad. This option is also not safe. Yes, there is an option to upload passwords to a flash drive in a text file, but this option is not safe either. What should I do then? It's very simple. We will use the KeePassX software.
KeePassX is a free password storage software that is distributed free of charge under the GPL license. The software is open source. This is also its difference.
Software must be downloaded from the official website! Do not download software from torrents and warez - a Trojan may be embedded in the software! Download link: http://www.keepassx.org/downloads
On the download page, select the archive for Windows. Download it now!
Another advantage of this software is that it does not require installation and the software is portable (you can run it on any PC without installing it). The software has a nice interface. Unpack the archive and run it. After launching, we need to create a password database (when the database is created, we will simply open it).
Click new database:
When creating the database, it will ask you to create a password or key file. The key file will be more reliable, but it can be lost, so we will focus on password protection. Enter the password that we will remember (not the year of our birth!).
Then click OK and enter the key again. Now we can work with our own passwords. We add all the most necessary and valuable items and save the database (required!). "File-Save password database as..." Enter the name of the database and save it to a safe place and then write it to a flash drive! The database only takes up a few kilobytes and is securely encrypted using the AES method. You can open the password database on any computer where the KeePassX software is installed (better write it down on a flash drive). When opening the database, it will ask for the database password, enter the password and work with the password database.

Part 4. Access to the Internet, select a browser and configure it.
We've already covered a lot of things (from system configuration to file protection). Now it's time to go online, select a browser and configure it.
The picture below shows the main browsers, which we will talk about a little:
Browser from Mail and other promovideo icon work on the basis of engine Google Chrome. I have nothing against chrome and other browsers, but they are not suitable for us to work with. IE, Opera, and Chrome are susceptible to exploits, which means that your PC may be infected with a dangerous Trojan. Mozilla Firefox is the most suitable browser for your work. It is the most popular and reliable open-source browser. Download the browser only from the official site! We have decided on the browser, now we need to install the necessary plugins and turn off tracking.
To get started, we need to install several plugins.
NoScript is a plugin that allows you to block all Flash and potentially dangerous objects on websites.
WOT (No, it's not World Of Tanks) is an add - on that will inform us about the reliability and security of the site. The plugin may indicate that the site is dangerous , so it is not recommended to visit it.
AdBlock Plus is a plugin for blocking annoying ads and pop-ups on websites.
Now disable tracking, cookies, passwords, and history:
We put everything as shown in the screenshot.
In the "Protection" tab, uncheck "Remember site passwords".
It is advisable to have a portable version of the browser and store it on a secure flash drive. How to protect a flash drive can be found above, it was described.
Now let's talk about the TOR browser
If you need to register somewhere urgently and you don't want to share your IP address, but there is no configured portable browser at hand, TOR will come to the rescue. It is also suitable for any purpose, but if you need to do a very important task, it is better to use a fully configured PC or RDP (which we will talk about later). Don't listen to these rumors about Thor - they're all rumors. In practice, there were no cases when someone was caught through the tor.
You can download the browser from the official website: https://www.torproject.org/download/download-easy.html.en
When downloading, select the Russian language. After downloading, unzip the archive. The archive will contain a portable fox browser. Many people know how to work with the tor, everything is simple there, I won't describe this. Your IP address changes every few minutes.

Part 5. Secure email, one-time notes, and file transfer.
Where do we go without E-mail on the Internet? Everyone needs yandex. Mail. For whitelisting purposes, register your email at gmail.com. Enabling double authentication. We get access by password + sms. You can't hack such mail easily.
For gray and black cases, you can use temporary mail. There are plenty of services, and the most popular one is http://10minutemail.com/10MinuteMail/index.html
It happens that we need to pass information to another person, if the information is important or secret, then we will use the one-time notes service https://privnote.com How does it work? You are creating a note. at the exit, you get a link, send it to the interlocutor, and after opening the note, it is deleted. Very convenient.
You can use file sharing services to transfer files. We recommend that you: http://takebin.com and http://sendspace.com
Y takebin.com you can also send files to your email address, or rather send download links. To transfer files anonymously, we will fill in the file with the following parameters::
You can set file storage for 1 hour, and the file will be deleted after one hour.
You will then receive an email notification that a file has been sent to you. Sendspace has a similar feature. Use Sendspace to send gray information, and tykebin to send white information :)

Part 6. Anonymizers, Proxies, Socks5 and working with them.
Anonymizer - a tool for hiding the IP address. For example, if you have blocked access to social networks at work, we open an announcer and use it to log in to the social network. In other words, we change the IP address for a specific site.
The most famous anonymizer is http://cameleo.ru/ More anonymizers can be found here http://2ip.ru/anonim/. Also 2ip.ru serves as a source for checking the computer's IP address and anonymizer.
Proxy - a remote computer that, when you connect your machine to it, becomes an intermediary for the subscriber to access the Internet. The proxy transmits all requests of the subscriber's programs to the network, and after receiving the response, sends it back to the subscriber. Sample operation scheme:
For more information about Proxy services, please visit: http://2ip.ru/article/proxy/

Where can I get a proxy?
You can get a proxy at the giveaway or buy one. For serious work, I advise you to spend a few dollars and buy a proxy, because they are much better than those proxies that are in the distribution. But if you don't have any money or don't want to spend it, then you can use one of the distribution services (in fact, there are a lot of them): http://fineproxy.org (they distribute proxies there, and you can also buy them there!) and http://hideme.ru (there is a distribution in the proxy section and you can also buy it, but I don't like the quality of proxies from this service).
Proxies have several levels of anonymity:
No (the proxy is not anonymous and will show all basic information about you)
Low (there is almost no anonymity - basic information will be shown, including your IP address in the status "hidden behind a proxy server".)
Average (almost no information about you will be shown, only it will be written that the IP address is hidden behind a proxy server)
High (there will be no information about you and the IP address will contain an IP proxy).
There are a lot of programs for working with proxies. All information about these programs can be found on the website: http://www.freeproxy.ru/ru/programs/index.htm
Let's look at how to work with a proxy using the Mozilla Firefox browser.
Let's say we have a proxy 190.238.45.44:8080 (8080 is a port, they are different for each proxy).
Open the browser settings and then do the same as on the screenshot. Similarly, socks5 are configured.
SOCKS5 is configured in the same way, only instead of an http proxy, we enter the IP and port in the sox column.
Sox is essentially the same thing as a proxy. This is a network node on another computer.
You can find socs on the same hideme. Sites that sell socs: http://5socks.net/ (manual registration) and vip72.com (everything happens automatically).

Part 7. RDPs and working with them. Scheme of working through RDPs.
RDP - unbound computers from different countries that are designed to work. The essence of working with RDP is convenience. You don't need to buy proxies and sockets, but just connect to the RDP and work. In other words, we get access to the configured machine. Constantly working through RDP is not particularly convenient, since the speed is low, but it is safe. Using a bunch of vpn + RDP to get to a person is difficult, but it is possible. RDPs are mainly used by carders (we will not go into details).
RDPs can also be taken at the giveaway and bought. I do not advise you to take it on the distribution - they have already outlived their time or will slow down very much and you will not be 100% the same owner. I advise you to buy RDP. You must write to the seller, specify the country and characteristics. RDPs are not expensive, starting from $ 3. There is a lot of information on working with RDPs. People who sell, too.
You can connect to RDP via: Start-Accessories-Remote Desktop Connection. I advise you to go in already with the VPN enabled (we will talk about vpn later). A bonus scheme will also be available at the end of this course!

Part 8. VPN and all about VPNs.
VPNs are a replacement for sockets and proxies. By sending traffic through the vpn server, you will feel safe, as all traffic goes first to the vpn server, and then to the provider. The provider no longer sees your logs.
There are a lot of Vpn services nowadays. In the choice, one is better than the other, but let's consider whether this is the case? The best option is your own VPN service. To do this, you need to buy a gva / upu away from Russia and raise your own VPN there. There are a lot of articles on raising money, but those who are too lazy to do this, they can just go to http://inferno.name , choose the cheapest tariff ($15 for 3 months) and write when placing an order to install a VPN and disable logs! But if you are too lazy to do this, then you can buy access from the vpn service.
I want to tell you that everyone keeps logs. If the service itself does not keep logs, then traffic can be sniffed in the DC. That's why I've selected the most reliable vpn service for you,
which does not keep logs on the server and provides excellent bundles. For work, I advise you to use Double vpn + sox/tor, and it is better to connect to RDP via vpn and do all your work there. All information on connecting a VPN and configuring it on a PC can be found on the service's website. Link to the service: http://vpnlux.com . You can use any service, but what we recommend is the most reliable one.
There are vpn services that sign traffic, but there are some that don't. Those VPNs that sign traffic keep logs, This is not a statement, this is guesswork.
From the Antichat forum, I found a small list of services that sign traffic and that don't.

Sign up for traffic:
DoubleVPN.com
tsunamivpn.com
5VPN.net
kebrum.com
VPN-Service.us
spicevpn.com
opp-corp.com
vipvpn.com
proxpn.com
cyberghostvpn.com
torvpn.com
hide-my-ip.com
COMODO TrustConnect
usaip.eu
hideme.ru
buyswitchvpn.com
They don't transmit unnecessary information about themselves (they don't subscribe to traffic):
VIP72.ORG
hotspotshield.com
secsys.net
vpntunnel.se
securitykiss.com
privatetunnel.com
packetix.net
free-vpn.org
vpn.insorg.org
anonimitynetwork.com
openvpn.ru
lysator.liu.se
webmastervpn.com
If the service doesn't sign traffic , it doesn't mean that it doesn't keep logs! The DC itself can keep logs. For normal work on the network (to communicate on forums and sites, a regular VPN (for example, vpnlux) is enough).
And you will learn how to be as anonymous as possible at the end of the course.

Part 9. Methods of secure communication in the network.
We all know that icq, skype,vk have long been under the control of the authorities and everyone is watching and listening. For secure communication, there is jabber.
Jabber-instant communication protocol.
Now almost all sellers have a jabber. But jabber can also keep logs (this applies to public servers). I don't recommend using it for communication purposes jabber.ru - it keeps and stores logs since 2006. The safest jabber is your own. Raising your jabber is not difficult. Just buy an UPU and install the necessary packages. But I don't advise you to raise the jabber on the upu - the UPU can sniff traffic. For Jabber, the best option is the cheapest RDP (dedicated server) that is officially purchased. However, if this option is not available, you can use the following jabber servers (verified, no logs): xnteam.ru (from the forum team xaker.name) and exploit.im (from the forum exploit.in). Takebin will soon also have its own secure jabber server, it's only a matter of time!
For communication via jabber, I recommend the PSI+ + OTR client. I will not describe here how to install, all information on installing and configuring the client and otr can be found here: http://forum.beznal.cc/topic/1528-zhabber-psi-otr/ и http://forum.psi-plus.com/viewtopic.php?f=7&t=43
I have nothing to do with cashless payments!
On my own, I know that with a 64-bit system there may be problems in the installation, but I did everything right.
If you are engaged in a serious business, then completely forget about icq and skype! Don't share all your personal information with them (passwords, addresses, phone numbers, etc.).
Communicate strictly through Jabber + OTR. An alternative to OTR is PGP.

More Jabber clients that support OTR and PGP:
1. Miranda
2. Pidgin
3. QIP (does not support any encryption method, just correspondence).

Part 10. Bonus article "How to stay as anonymous as possible + examples"
This article was already on openssource.biz but many users haven't seen it, so I thought it would be the perfect addition to this course!
To remain anonymous, a person should not leave traces of their real identity on the network. To understand this, I made a small diagram:
* - the diagrams will show the IP address as real 192.168.1.1 — this is not the IP of the router — this is the IP for the example in the article. Instead of 192.168.1.1-your sole proprietor is located. Also, all the individual entrepreneurs of vpns that will be different in the diagrams are an example.
Explanation of the above scheme:
There is a person named Vasya, he has a nickname: vasek54. Vasya wanted to join a black-themed forum (whether it's a hack or a forum on laundering, that's not the point). Vasya had 1 Email address, where the profiles of his VK and Odnoklassniki were linked. He left this Email when registering on the black forum. For example, the authorities have a database of this forum, or they follow the forum and have access (a slightly unsuccessful example), they look at information about the user vasek54 and have something like this:
Nickname: vasek54 IP: 198.168.1.1 E-mail: vasek54azaza@gmail.com
Now that the police have the data (ip,e-mail), Vasya is being tracked down via the Internet. And by how much e-mail is linked, for example, to VK, and on Vasya's page his real data, photos, phone numbers, etc., then we can assume that Vasya is "accepted". They set up surveillance on him.
PS. You can find the Vkontakte page via E-mail, enter it in the "Forgot password" column, and if the page is linked to this e-mail, it will be shown.
You can also find out your email address via Skype. You can read how this is done here.
Now let's analyze user errors.
If the user was protected via:Vpn, proxy or SSH tunnel, then the scheme would look something like this:
Explanation: Vasya has an IP address of 192.168.1.1, he connects to the VPN and all traffic begins to be transmitted through the VPN service. If Vasya had registered on the forum via a VPN, the agents would have received not his IP, but the IP of his VPN service, which would have complicated the search for Vasya. But this method does not guarantee 100% anonymity, because it is possible to get a real IP by knowing the IP of the Vpn, but this is beyond the power of an ordinary user.
Use fake data!
In our example, we can see that Vasya used the same E-mail everywhere (vk, od, forums). If you register somewhere, then get another E-mail and do not create any social networks on it! Also, if you are doing something serious, then do not go to the social network.do not post personal information, because as far as we know, photos are not deleted from the VK, and correspondence is not deleted either. For all important issues, negotiate via Jabber + OTR, but not via Vkontakte and ICQ.
Changing the MAC address. Surveillance can also go through the MAC address. You can find out how to change the MAC address via google by entering the query: Mac Address Spoofing
But what if something needs to be done?
If you need to crank something, then it is better to use RDP (remote desktop, or in other words — RDP). RDP should be used if you want to do something bad. Sellers RDPs full, look for it. I also advise you to read the manuals "How to clean logs on RDP", etc. I will not describe this here.
Explanation: When logging in to the network, let's say we have IP: 192.168.1.1 and have already changed the MAC address. We connect and let all traffic through the SSH tunnel (I won't describe how to do this, there are a lot of manuals, as well as sellers who sell SSH tunnels). After we have sent all traffic through the ssh tunnel, we connect to the RDP. If you wish, you can send traffic via vpn on RDP. Then do whatever you want. After you finish working on RDP, wipe the logs.

Part 11. Conclusion and conclusions
Let's sum up the results:
 No need to work under an administrator account!
Proxies and sockets are not so anonymous.
 Everyone keeps logs!
 When working, use a RDP (or rather a bundle, as in the last diagram)
 Do not communicate in icq or Skype for work and do not share personal information
 Communicate only through jabber+otr!
 
8 ways to stay anonymous online
Data protection on the Internet is one of the most pressing issues of 2018. We spend more and more time online and leave more and more personal information there. This information can be used by intruders. Although it is not possible to completely hide your presence on the Internet, it can seriously complicate the process of collecting information about you.

1. Proxy service
A proxy is a server that acts as an intermediary between a small local network and the Internet. Many Internet users rely on proxies to hide their IP addresses or access content that is restricted by region. Most proxy services are free, but there are also paid proxies.

2. Tor
Tor is a free and open source software for implementing the second generation of so-called onion routing. This is a proxy server system that allows you to establish an anonymous network connection that is protected from eavesdropping.

3. VPN
VPN is a service for anonymous surfing that allows you to hide your real IP address and encrypt Internet traffic so that no one can follow you. Because of its ease of use, a VPN is considered one of the most popular methods of anonymous surfing.

4. Message Encryption
Information leakage is one of the most common online privacy issues. To keep your data and correspondence confidential, install an app where messages are encrypted end-to-end. Among the apps that promise to keep their privacy are Telegram, Signal, and Dust.

5. Use encrypted email
Of course, services like Gmail or Yandex. Mail will not be able to provide anonymity. Among the alternatives:Tutanota is an application with a fully encrypted mailbox. Another option is ProtonMail. The service offers encrypted email accounts and does not require any personal information when creating an account. However, the free data plan offers only 500 MB for storing emails.

6. Disable geolocation
Almost all social networks or sites like Google track your device's location. Despite the fact that they use this information to provide more personalized services, it is obvious that partners of tech giants also get access to this information. And it is not a fact that third-party servers are protected from hacking.

7. Check access levels in mobile apps
Almost every app on your mobile device asks for permission to access at least one of the functions of your smartphone. And while this will be justified in most cases, sometimes the apps can be too intrusive. For example, sometimes apps require you to specify your real-time location, access to photos, or even your contact list.

8. Cryptocurrencies
One of the defining characteristics of cryptocurrency is anonymity: to make transactions, the user does not need to provide their personal data. So, in the bitcoin blockchain, not the names and surnames of senders are recorded, but the digital addresses of wallets and the amount of shipments.
 
Top