Mutt
Professional
- Messages
- 1,459
- Reaction score
- 1,105
- Points
- 113
What can be if you do not defend yourself?
You can be jailed for like a political post from your personal profile
Can you be 100% secure?
No, but you can significantly reduce the risks of deanonymization and data theft.
The story that I watched a few years ago. In certain circles, a man with the nickname Severa is known, he is one of the largest spammers in the world, he himself is from the Russian Federation. For about 20 years, he spammed soaps, poured on everything that was possible, except for RU, defended himself very competently, led an active life on the forums, and no one had ever seen him, although everyone knew him. But a few years ago, he and his family went to Spain, where he was accepted and handed over to the US authorities; now he has several decades to come, as he is accused of interfering in the presidential elections. This is an example that there is no perfect defense. There is a balance of interest in you and your security measures.
The most annoying thing is that along with him, many more people got into the lists, from his contact list in jabber and on the forums. So even if you are not caught, you will still have risks of being grabbed by the ass too. Therefore, everyone needs anonymity and protection of information, without exception.
I work in white, do I need all this?
In addition to the example above, do not forget that you live in a country where laws and basic principles of personal privacy, privacy of correspondence, etc. do not work. Write to some chick of about 20 years in contact, want to meet. But in fact she is 15 years old, and she is suing you under the relevant article, or she will ask for a dough for silence. VK will quickly merge your data into the court, and there will be your phone, mail, and IP addresses. And that's all, even if you get rid of yourself, you will create a lot of problems for yourself. There are many cases in such situations in the courts, do not think that I made it up)
How do I protect myself in practice?
1. Encryption of data on media.
It all starts with data. I have encrypted all work data and all programs are stored on the system drive, which is completely encrypted. As I said, I am using truecrypt 7.1a. I like it and I'm used to it. You can use Bitlocker or other programs, the essence does not change.
You can download the secure version here, for example. Better yet, search for yourself in Google, so as not to put programs under a link from a stranger. I can spread Trojans like that, don't forget. You can't trust anyone.
I make backups to external hard drives, which are also fully encrypted.
I come up with and remember passwords of 20-30 characters and store them in my head. Yes, this is a vulnerability to some extent, but it suits me.
2. Portable programs
I try to download all programs only in the portable version. For example, I use a portable firefox, it stores all its data in one folder. It can be dropped, deleted or copied somewhere, it's convenient. Browser files are not scattered throughout the system.
If you encrypt only part of the data and the OS remains open, portable programs are a must. And in general it is better in every sense.
Sometimes I work from an 8 gig SD card, it is encrypted and there are all portable programs - telegrams, a browser, etc. I take a laptop, put a trucript there, decipher the flash drive and work, then I take it out and that's it, no traces on the car
Many popular programs have a portable version, look.
3. Encrypt traffic through your VPN
Why do you need a VPN, I think you understand. VPN hides your real IP, but that's a trifle. VPN encrypts traffic and the provider does not see what you are doing and what you write in social networks. Yes, there are many places where https is, but many where it is not. VPN scorches the fact that you hide yourself and your data, well, let it go. It's better than putting everything out in the open.
I do not use a public VPN, I have my own server for $ 5, logs and reverse ping are disabled on it, that's enough. I used to use double vpn, but the speed upset me. Yes, VPN cuts the speed by 3-4 times, this must be taken into account. But if you have 50 megabits on the cable, then with VPN it will be 10, which is generally enough for many tasks.
Disadvantages of public VPN services:
Benefits of your VPN server:
How to make your own VPN without knowledge and crap? Go to Inferno, these are my old friends, I personally have been working with them for many years. You order a VPS for 5 bucks somewhere in Europe and ask to put a VPN there in the comments when ordering. In 10-30 minutes they will do everything beautifully and drop you configs and instructions for connecting. Everything, the problem will be solved once and for all. I don’t know which hosters still treat clients like that.
VPN needs to be used both on a computer and on an iPhone and Android. This server will be enough for you for all your tasks. Ask to make configs for your different devices, in inferno they will do everything for free.
4. BIOS password
This is protection from the fool, in case I lose my laptop. It does not save you from deliberate digging in the data, but it is very easy to set a password, and why not do it?
5. DNS leak protection
If you use a proxy or something like that, check your DNS here https://www.dnsleaktest.com/, maybe it will fire you. You can fix it through the installation as a DNS 8.8.8.8
5. VPN break protection
If the VPN has fallen off, then you will not notice it. I use such a solution: I register DNS VPN server in the Internet connection config
We register 10.180.1.1 and if the VPN is disconnected, requests for domains will not go away. But this applies only to domains, everything will go to the IP as usual. Therefore, the browser may not work, and telegrams or filesilla will continue to transmit data.
But if the VPN falls off, you will notice it almost immediately, as the sites will stop working.
This must be done once with each connection.
6. Clearing System Data
Various programs leave traces in the system, for example, RDP keeps the history of connections, or filezilla leaves in the logs the servers where the connection was, along with passwords.
This needs to be cleaned regularly, I use CCleaner Portable. Maybe there is something better, but I don't bother much with it.
7. Social media profiles
This is the biggest security hole for many people.
In short, you should not have personal pages, or they do, but you cannot be identified by them. You also need to carefully configure the privacy of your page.
I have profiles, as I work and communicate with people, but I adhere to these rules
Similarly, Google, Yandex and other services - you cannot write your full name there.
I had a case, I was in litigation with a debtor. He wrote a receipt that he borrowed money, but I did not give the loot, but gave him equipment at the same price. According to the law, this cannot be done and the receipt will not work, and he presented evidence in court in the form of our correspondence in the contact, where we agreed on such a scheme.
The judge asked me if this was my account, I said no, although it was mine. But my photos were not there and my full name was different, so they believed me and I won the case.
8. Forget about antiviruses
In addition to the fact that antiviruses do not perform their functions in 95% of cases, they merge data of various kinds. I just haven't used antivirus software for years.
I just understand how file encryption works, and I myself know how to make a new clean build of the application. Those who spread viruses also know this, so they monitor the cleanliness of files.
Virus, executable, JS, etc., all this is encrypted without problems and is detected by antiviruses with long delays.
In general, antiviruses are pure marketing and scam.
9. Virtual machine or Dedicated server to run left files and surf on suspicious sites
I think everything is clear here, by launching a file or going to a strange url, it is better to use a virtual machine or a Dedicated Server (RDP).
Grandparents cost $ 1-2, it's better than setting yourself a loader.
10. Sim card for work
The left SIM card should be in case of registering something - a social network, mail, etc.
It needs to be replenished by $ 5 per month and once a month make a call or send an SMS, otherwise after 3-6 months, depending on the operator, it will simply be blocked.
By registering qiwi on your number and taking grandmothers for broken FB accounts, you run the risk of getting caught. Although for such cases it is better to buy a ready-made kiwi wallet.
11. Different passwords on all sites
The main rule that I adhere to is that passwords should be different on all sites.
You can register on some site with the password "kjslfhw89gh", but if the same password fits your mail, then that's it.
I had a service when the owners of the companies were registered there. I used corporate mail for the region and set passwords for accessing the site.
So, for the sake of interest, I checked several dozen mails, and found out that HALF of the passwords that they left with me go to the boxes where documents, correspondence, reports and private data are stored.
Come up with an algorithm by which you will create passwords in your head and remember them. I have 500 passwords and I remember all of them, just having once come up with my own algorithm.
You can use software like LastPassword, but I'm used to keeping everything in my head, I tried several times to move to programs, but it didn't work. And of course they also have vulnerabilities, so this is not a salvation. The head is the best place to store important data.
12. Messengers
I do not use vibe, whatsapp and other shit. I use telegram, but it also deanonit immediately upon registration, asking for a phone number for activation. You can specify another, this is a solution. Yes, and Telegram has recently undertaken an obligation to give out the phone and IP address of the person on whom the case was opened. I do not like it.
But Telegram has built an adequate policy in relation to users and has not yet been noticed behind the jambs, which is why it is suitable for many tasks.
There is also a portable telegram, download here .
The best choice for anonymous communication is Jabber + OTR. I am using the Pidgin client.
You can download it on the off site. Additionally, you need to install the OTR plugin, which will protect the data.
You need to choose a server for creating an account, preferably Japanese or other Asian ones, you need to google it. My server is not accepting new registrations for 5 years already.
Unfortunately, there is a problem with jabber on iPhones, I could not install it, but I don’t need it there.
13. Account password
It seems like a trifle and an obvious hole, but for some reason some do not put a password on their account in Windows or Mac. It is clear that this protection is not much better than the BIOS password, but it is still important.
I also took the habit, when I leave the laptop, I press Win + L and log out of the account. I get out of it even if I go to put coals for the hookah. It just happens automatically. Just in case))
14. Where do you click and what do you download?
You cannot click on the links that are sent to you, even by familiar people. You can follow links in social networks or other well-known sites, but you need to check if the domain is spelled correctly.
It is enough to click and get on the link, and then you will be given a loader and then anything else.
Likewise files. Do not install or run anything that is in exe, pdf, doc format. C exe is understandable, but document files also have vulnerabilities, through the same acrobat they used to break many computers. Use the virtual machine if you really need to see something
15. Your nicknames
Very often people put the same nicknames in different forums, websites, social networks and instant messengers.
And I use it. When someone knocks on me or I want to make a deal with someone, I check the nickname of the person and find their profiles on a bunch of sites. This gives a picture of a person, about his activities, reputation, etc.
You can check on Google, VK, FB and other social networks.
So make it a rule to use your nickname either very carefully, or come up with different nicknames each time, or use general ones, such as Alex, Qwerty, and so on.
16. Errors, dullness and inattention
Even the most fierce anons cannot exclude the human factor. The smartest criminals tend to blurt out either their mistakes or too much self-confidence.
We must try to always be on the alert, consciously approach work, check and recheck our weak points.
Outcome
There is no 100% security and anonymity, if someone really needs to get to the bottom of you and for this there will be money and connections, then sooner or later they will figure out you.
But it is enough to follow these simple security measures to save yourself from most of the problems.
Useful links for anonymity check
whoer.net
f.vision
whatleaks.com
You can be jailed for like a political post from your personal profile
- Your card and passport data may be stolen and this will create problems
- You can be blackmailed, framed or used as evidence in court
- They can mine through you, they can put a sox bot
- Can hack your sites using filezilla and browser vulnerabilities
- Can steal logins and passwords from the browser
- They can access the webcam and watch you ...
- May encrypt your data and demand a ransom
- They can substitute ads, they can embed scripts into the browser
- Can spoof DNS and phish you
- You can be jailed for downloading a pirated copy of a movie (especially in Europe)
- Your intentions to buy drugs can be detected by the authorities
- Your illegal actions are available for viewing in 1 click. Almost every webmaster or affiliate marketer has unwanted information on their computer, for which they can be punished
Can you be 100% secure?
No, but you can significantly reduce the risks of deanonymization and data theft.
The story that I watched a few years ago. In certain circles, a man with the nickname Severa is known, he is one of the largest spammers in the world, he himself is from the Russian Federation. For about 20 years, he spammed soaps, poured on everything that was possible, except for RU, defended himself very competently, led an active life on the forums, and no one had ever seen him, although everyone knew him. But a few years ago, he and his family went to Spain, where he was accepted and handed over to the US authorities; now he has several decades to come, as he is accused of interfering in the presidential elections. This is an example that there is no perfect defense. There is a balance of interest in you and your security measures.
The most annoying thing is that along with him, many more people got into the lists, from his contact list in jabber and on the forums. So even if you are not caught, you will still have risks of being grabbed by the ass too. Therefore, everyone needs anonymity and protection of information, without exception.
I work in white, do I need all this?
In addition to the example above, do not forget that you live in a country where laws and basic principles of personal privacy, privacy of correspondence, etc. do not work. Write to some chick of about 20 years in contact, want to meet. But in fact she is 15 years old, and she is suing you under the relevant article, or she will ask for a dough for silence. VK will quickly merge your data into the court, and there will be your phone, mail, and IP addresses. And that's all, even if you get rid of yourself, you will create a lot of problems for yourself. There are many cases in such situations in the courts, do not think that I made it up)
How do I protect myself in practice?

It all starts with data. I have encrypted all work data and all programs are stored on the system drive, which is completely encrypted. As I said, I am using truecrypt 7.1a. I like it and I'm used to it. You can use Bitlocker or other programs, the essence does not change.
You can download the secure version here, for example. Better yet, search for yourself in Google, so as not to put programs under a link from a stranger. I can spread Trojans like that, don't forget. You can't trust anyone.
I make backups to external hard drives, which are also fully encrypted.
I come up with and remember passwords of 20-30 characters and store them in my head. Yes, this is a vulnerability to some extent, but it suits me.

I try to download all programs only in the portable version. For example, I use a portable firefox, it stores all its data in one folder. It can be dropped, deleted or copied somewhere, it's convenient. Browser files are not scattered throughout the system.

If you encrypt only part of the data and the OS remains open, portable programs are a must. And in general it is better in every sense.
Sometimes I work from an 8 gig SD card, it is encrypted and there are all portable programs - telegrams, a browser, etc. I take a laptop, put a trucript there, decipher the flash drive and work, then I take it out and that's it, no traces on the car
Many popular programs have a portable version, look.

Why do you need a VPN, I think you understand. VPN hides your real IP, but that's a trifle. VPN encrypts traffic and the provider does not see what you are doing and what you write in social networks. Yes, there are many places where https is, but many where it is not. VPN scorches the fact that you hide yourself and your data, well, let it go. It's better than putting everything out in the open.
I do not use a public VPN, I have my own server for $ 5, logs and reverse ping are disabled on it, that's enough. I used to use double vpn, but the speed upset me. Yes, VPN cuts the speed by 3-4 times, this must be taken into account. But if you have 50 megabits on the cable, then with VPN it will be 10, which is generally enough for many tasks.
Disadvantages of public VPN services:
- IPs spammed, blacklisted
- Most likely logs are enabled
- It is not known what they do with your traffic, they can just fuck up data
Benefits of your VPN server:
- The ip is clean, if you get dirty it can be replaced at no extra charge
- Logs are disabled and you can check it
- You can configure additional features, such as prohibit reverse ping
- Your data is only with you and your hoster. You need a hoster, proven over the years and with an ideal reputation
- The price is exactly the same, the same 5 bucks!
How to make your own VPN without knowledge and crap? Go to Inferno, these are my old friends, I personally have been working with them for many years. You order a VPS for 5 bucks somewhere in Europe and ask to put a VPN there in the comments when ordering. In 10-30 minutes they will do everything beautifully and drop you configs and instructions for connecting. Everything, the problem will be solved once and for all. I don’t know which hosters still treat clients like that.

VPN needs to be used both on a computer and on an iPhone and Android. This server will be enough for you for all your tasks. Ask to make configs for your different devices, in inferno they will do everything for free.

This is protection from the fool, in case I lose my laptop. It does not save you from deliberate digging in the data, but it is very easy to set a password, and why not do it?

If you use a proxy or something like that, check your DNS here https://www.dnsleaktest.com/, maybe it will fire you. You can fix it through the installation as a DNS 8.8.8.8

If the VPN has fallen off, then you will not notice it. I use such a solution: I register DNS VPN server in the Internet connection config
We register 10.180.1.1 and if the VPN is disconnected, requests for domains will not go away. But this applies only to domains, everything will go to the IP as usual. Therefore, the browser may not work, and telegrams or filesilla will continue to transmit data.
But if the VPN falls off, you will notice it almost immediately, as the sites will stop working.
This must be done once with each connection.

Various programs leave traces in the system, for example, RDP keeps the history of connections, or filezilla leaves in the logs the servers where the connection was, along with passwords.
This needs to be cleaned regularly, I use CCleaner Portable. Maybe there is something better, but I don't bother much with it.

This is the biggest security hole for many people.
In short, you should not have personal pages, or they do, but you cannot be identified by them. You also need to carefully configure the privacy of your page.
I have profiles, as I work and communicate with people, but I adhere to these rules
- Registration not to your mail and not to your SIM card
- There are no personal photos and photographs of places by which you can identify you (apartment, city, etc.)
- Last name and first name changed
Similarly, Google, Yandex and other services - you cannot write your full name there.
I had a case, I was in litigation with a debtor. He wrote a receipt that he borrowed money, but I did not give the loot, but gave him equipment at the same price. According to the law, this cannot be done and the receipt will not work, and he presented evidence in court in the form of our correspondence in the contact, where we agreed on such a scheme.
The judge asked me if this was my account, I said no, although it was mine. But my photos were not there and my full name was different, so they believed me and I won the case.

In addition to the fact that antiviruses do not perform their functions in 95% of cases, they merge data of various kinds. I just haven't used antivirus software for years.
I just understand how file encryption works, and I myself know how to make a new clean build of the application. Those who spread viruses also know this, so they monitor the cleanliness of files.
Virus, executable, JS, etc., all this is encrypted without problems and is detected by antiviruses with long delays.
In general, antiviruses are pure marketing and scam.

I think everything is clear here, by launching a file or going to a strange url, it is better to use a virtual machine or a Dedicated Server (RDP).
Grandparents cost $ 1-2, it's better than setting yourself a loader.

The left SIM card should be in case of registering something - a social network, mail, etc.
It needs to be replenished by $ 5 per month and once a month make a call or send an SMS, otherwise after 3-6 months, depending on the operator, it will simply be blocked.
By registering qiwi on your number and taking grandmothers for broken FB accounts, you run the risk of getting caught. Although for such cases it is better to buy a ready-made kiwi wallet.

The main rule that I adhere to is that passwords should be different on all sites.
You can register on some site with the password "kjslfhw89gh", but if the same password fits your mail, then that's it.
I had a service when the owners of the companies were registered there. I used corporate mail for the region and set passwords for accessing the site.
So, for the sake of interest, I checked several dozen mails, and found out that HALF of the passwords that they left with me go to the boxes where documents, correspondence, reports and private data are stored.
Come up with an algorithm by which you will create passwords in your head and remember them. I have 500 passwords and I remember all of them, just having once come up with my own algorithm.
You can use software like LastPassword, but I'm used to keeping everything in my head, I tried several times to move to programs, but it didn't work. And of course they also have vulnerabilities, so this is not a salvation. The head is the best place to store important data.

I do not use vibe, whatsapp and other shit. I use telegram, but it also deanonit immediately upon registration, asking for a phone number for activation. You can specify another, this is a solution. Yes, and Telegram has recently undertaken an obligation to give out the phone and IP address of the person on whom the case was opened. I do not like it.
But Telegram has built an adequate policy in relation to users and has not yet been noticed behind the jambs, which is why it is suitable for many tasks.

There is also a portable telegram, download here .
The best choice for anonymous communication is Jabber + OTR. I am using the Pidgin client.
You can download it on the off site. Additionally, you need to install the OTR plugin, which will protect the data.
You need to choose a server for creating an account, preferably Japanese or other Asian ones, you need to google it. My server is not accepting new registrations for 5 years already.
Unfortunately, there is a problem with jabber on iPhones, I could not install it, but I don’t need it there.

It seems like a trifle and an obvious hole, but for some reason some do not put a password on their account in Windows or Mac. It is clear that this protection is not much better than the BIOS password, but it is still important.
I also took the habit, when I leave the laptop, I press Win + L and log out of the account. I get out of it even if I go to put coals for the hookah. It just happens automatically. Just in case))

You cannot click on the links that are sent to you, even by familiar people. You can follow links in social networks or other well-known sites, but you need to check if the domain is spelled correctly.
It is enough to click and get on the link, and then you will be given a loader and then anything else.
Likewise files. Do not install or run anything that is in exe, pdf, doc format. C exe is understandable, but document files also have vulnerabilities, through the same acrobat they used to break many computers. Use the virtual machine if you really need to see something

Very often people put the same nicknames in different forums, websites, social networks and instant messengers.
And I use it. When someone knocks on me or I want to make a deal with someone, I check the nickname of the person and find their profiles on a bunch of sites. This gives a picture of a person, about his activities, reputation, etc.
You can check on Google, VK, FB and other social networks.
So make it a rule to use your nickname either very carefully, or come up with different nicknames each time, or use general ones, such as Alex, Qwerty, and so on.

Even the most fierce anons cannot exclude the human factor. The smartest criminals tend to blurt out either their mistakes or too much self-confidence.
We must try to always be on the alert, consciously approach work, check and recheck our weak points.
Outcome
There is no 100% security and anonymity, if someone really needs to get to the bottom of you and for this there will be money and connections, then sooner or later they will figure out you.
But it is enough to follow these simple security measures to save yourself from most of the problems.
Useful links for anonymity check
Find and check IP address
What's my IP address, how to find and check my IP address. Two versions of anonymity check: light and extended

Detect Expert by Vektor T13 Technologies: Your Trusted Partner in the World of Anti-Fraud and Online Security
Explore and bypass anti-fraud systems with the tailored products and services offered by Detect Expert by Vektor T13 Technologies. Your pathway to comprehensive fraud analysis and solutions.
Check IP, learn my real IP computer address and my location by IP - WhatLeaks.com
Check your IP and computer address, my IP, learn full information about your computer IP address and your geo location with our site! We will help you to detect and fix IP and DNS leaks and hide or change your IP.
