Anonymity and online security guide

Mutt

Professional
Messages
1,459
Reaction score
1,105
Points
113
What can be if you do not defend yourself?
You can be jailed for like a political post from your personal profile
  • Your card and passport data may be stolen and this will create problems
  • You can be blackmailed, framed or used as evidence in court
  • They can mine through you, they can put a sox bot
  • Can hack your sites using filezilla and browser vulnerabilities
  • Can steal logins and passwords from the browser
  • They can access the webcam and watch you ...
  • May encrypt your data and demand a ransom
  • They can substitute ads, they can embed scripts into the browser
  • Can spoof DNS and phish you
  • You can be jailed for downloading a pirated copy of a movie (especially in Europe)
  • Your intentions to buy drugs can be detected by the authorities
  • Your illegal actions are available for viewing in 1 click. Almost every webmaster or affiliate marketer has unwanted information on their computer, for which they can be punished

Can you be 100% secure?
No, but you can significantly reduce the risks of deanonymization and data theft.

The story that I watched a few years ago. In certain circles, a man with the nickname Severa is known, he is one of the largest spammers in the world, he himself is from the Russian Federation. For about 20 years, he spammed soaps, poured on everything that was possible, except for RU, defended himself very competently, led an active life on the forums, and no one had ever seen him, although everyone knew him. But a few years ago, he and his family went to Spain, where he was accepted and handed over to the US authorities; now he has several decades to come, as he is accused of interfering in the presidential elections. This is an example that there is no perfect defense. There is a balance of interest in you and your security measures.

The most annoying thing is that along with him, many more people got into the lists, from his contact list in jabber and on the forums. So even if you are not caught, you will still have risks of being grabbed by the ass too. Therefore, everyone needs anonymity and protection of information, without exception.

I work in white, do I need all this?
In addition to the example above, do not forget that you live in a country where laws and basic principles of personal privacy, privacy of correspondence, etc. do not work. Write to some chick of about 20 years in contact, want to meet. But in fact she is 15 years old, and she is suing you under the relevant article, or she will ask for a dough for silence. VK will quickly merge your data into the court, and there will be your phone, mail, and IP addresses. And that's all, even if you get rid of yourself, you will create a lot of problems for yourself. There are many cases in such situations in the courts, do not think that I made it up)

How do I protect myself in practice?

✅ 1. Encryption of data on media.
It all starts with data. I have encrypted all work data and all programs are stored on the system drive, which is completely encrypted. As I said, I am using truecrypt 7.1a. I like it and I'm used to it. You can use Bitlocker or other programs, the essence does not change.
You can download the secure version here, for example. Better yet, search for yourself in Google, so as not to put programs under a link from a stranger. I can spread Trojans like that, don't forget. You can't trust anyone.
I make backups to external hard drives, which are also fully encrypted.
I come up with and remember passwords of 20-30 characters and store them in my head. Yes, this is a vulnerability to some extent, but it suits me.

✅ 2. Portable programs
I try to download all programs only in the portable version. For example, I use a portable firefox, it stores all its data in one folder. It can be dropped, deleted or copied somewhere, it's convenient. Browser files are not scattered throughout the system.

13edc39cfb5de34b4f24e.png


If you encrypt only part of the data and the OS remains open, portable programs are a must. And in general it is better in every sense.
Sometimes I work from an 8 gig SD card, it is encrypted and there are all portable programs - telegrams, a browser, etc. I take a laptop, put a trucript there, decipher the flash drive and work, then I take it out and that's it, no traces on the car
Many popular programs have a portable version, look.

✅ 3. Encrypt traffic through your VPN
Why do you need a VPN, I think you understand. VPN hides your real IP, but that's a trifle. VPN encrypts traffic and the provider does not see what you are doing and what you write in social networks. Yes, there are many places where https is, but many where it is not. VPN scorches the fact that you hide yourself and your data, well, let it go. It's better than putting everything out in the open.
I do not use a public VPN, I have my own server for $ 5, logs and reverse ping are disabled on it, that's enough. I used to use double vpn, but the speed upset me. Yes, VPN cuts the speed by 3-4 times, this must be taken into account. But if you have 50 megabits on the cable, then with VPN it will be 10, which is generally enough for many tasks.

Disadvantages of public VPN services:
  • IPs spammed, blacklisted
  • Most likely logs are enabled
  • It is not known what they do with your traffic, they can just fuck up data

Benefits of your VPN server:
  • The ip is clean, if you get dirty it can be replaced at no extra charge
  • Logs are disabled and you can check it
  • You can configure additional features, such as prohibit reverse ping
  • Your data is only with you and your hoster. You need a hoster, proven over the years and with an ideal reputation
  • The price is exactly the same, the same 5 bucks!

How to make your own VPN without knowledge and crap? Go to Inferno, these are my old friends, I personally have been working with them for many years. You order a VPS for 5 bucks somewhere in Europe and ask to put a VPN there in the comments when ordering. In 10-30 minutes they will do everything beautifully and drop you configs and instructions for connecting. Everything, the problem will be solved once and for all. I don’t know which hosters still treat clients like that.

e410f25fe1f3139ed57f6.png


VPN needs to be used both on a computer and on an iPhone and Android. This server will be enough for you for all your tasks. Ask to make configs for your different devices, in inferno they will do everything for free.

✅ 4. BIOS password
This is protection from the fool, in case I lose my laptop. It does not save you from deliberate digging in the data, but it is very easy to set a password, and why not do it?

✅ 5. DNS leak protection
If you use a proxy or something like that, check your DNS here https://www.dnsleaktest.com/, maybe it will fire you. You can fix it through the installation as a DNS 8.8.8.8

✅ 5. VPN break protection
If the VPN has fallen off, then you will not notice it. I use such a solution: I register DNS VPN server in the Internet connection config
We register 10.180.1.1 and if the VPN is disconnected, requests for domains will not go away. But this applies only to domains, everything will go to the IP as usual. Therefore, the browser may not work, and telegrams or filesilla will continue to transmit data.
But if the VPN falls off, you will notice it almost immediately, as the sites will stop working.
This must be done once with each connection.

✅ 6. Clearing System Data
Various programs leave traces in the system, for example, RDP keeps the history of connections, or filezilla leaves in the logs the servers where the connection was, along with passwords.
This needs to be cleaned regularly, I use CCleaner Portable. Maybe there is something better, but I don't bother much with it.

✅ 7. Social media profiles
This is the biggest security hole for many people.
In short, you should not have personal pages, or they do, but you cannot be identified by them. You also need to carefully configure the privacy of your page.
I have profiles, as I work and communicate with people, but I adhere to these rules

  • Registration not to your mail and not to your SIM card
  • There are no personal photos and photographs of places by which you can identify you (apartment, city, etc.)
  • Last name and first name changed

Similarly, Google, Yandex and other services - you cannot write your full name there.
I had a case, I was in litigation with a debtor. He wrote a receipt that he borrowed money, but I did not give the loot, but gave him equipment at the same price. According to the law, this cannot be done and the receipt will not work, and he presented evidence in court in the form of our correspondence in the contact, where we agreed on such a scheme.
The judge asked me if this was my account, I said no, although it was mine. But my photos were not there and my full name was different, so they believed me and I won the case.

✅ 8. Forget about antiviruses
In addition to the fact that antiviruses do not perform their functions in 95% of cases, they merge data of various kinds. I just haven't used antivirus software for years.
I just understand how file encryption works, and I myself know how to make a new clean build of the application. Those who spread viruses also know this, so they monitor the cleanliness of files.
Virus, executable, JS, etc., all this is encrypted without problems and is detected by antiviruses with long delays.
In general, antiviruses are pure marketing and scam.

✅ 9. Virtual machine or Dedicated server to run left files and surf on suspicious sites
I think everything is clear here, by launching a file or going to a strange url, it is better to use a virtual machine or a Dedicated Server (RDP).
Grandparents cost $ 1-2, it's better than setting yourself a loader.

✅ 10. Sim card for work
The left SIM card should be in case of registering something - a social network, mail, etc.
It needs to be replenished by $ 5 per month and once a month make a call or send an SMS, otherwise after 3-6 months, depending on the operator, it will simply be blocked.
By registering qiwi on your number and taking grandmothers for broken FB accounts, you run the risk of getting caught. Although for such cases it is better to buy a ready-made kiwi wallet.

✅ 11. Different passwords on all sites
The main rule that I adhere to is that passwords should be different on all sites.
You can register on some site with the password "kjslfhw89gh", but if the same password fits your mail, then that's it.
I had a service when the owners of the companies were registered there. I used corporate mail for the region and set passwords for accessing the site.
So, for the sake of interest, I checked several dozen mails, and found out that HALF of the passwords that they left with me go to the boxes where documents, correspondence, reports and private data are stored.
Come up with an algorithm by which you will create passwords in your head and remember them. I have 500 passwords and I remember all of them, just having once come up with my own algorithm.
You can use software like LastPassword, but I'm used to keeping everything in my head, I tried several times to move to programs, but it didn't work. And of course they also have vulnerabilities, so this is not a salvation. The head is the best place to store important data.

✅ 12. Messengers
I do not use vibe, whatsapp and other shit. I use telegram, but it also deanonit immediately upon registration, asking for a phone number for activation. You can specify another, this is a solution. Yes, and Telegram has recently undertaken an obligation to give out the phone and IP address of the person on whom the case was opened. I do not like it.
But Telegram has built an adequate policy in relation to users and has not yet been noticed behind the jambs, which is why it is suitable for many tasks.

16ef3da6c5a4fb9dba822.png


There is also a portable telegram, download here .
The best choice for anonymous communication is Jabber + OTR. I am using the Pidgin client.
You can download it on the off site. Additionally, you need to install the OTR plugin, which will protect the data.
You need to choose a server for creating an account, preferably Japanese or other Asian ones, you need to google it. My server is not accepting new registrations for 5 years already.
Unfortunately, there is a problem with jabber on iPhones, I could not install it, but I don’t need it there.

✅ 13. Account password
It seems like a trifle and an obvious hole, but for some reason some do not put a password on their account in Windows or Mac. It is clear that this protection is not much better than the BIOS password, but it is still important.
I also took the habit, when I leave the laptop, I press Win + L and log out of the account. I get out of it even if I go to put coals for the hookah. It just happens automatically. Just in case))

✅ 14. Where do you click and what do you download?
You cannot click on the links that are sent to you, even by familiar people. You can follow links in social networks or other well-known sites, but you need to check if the domain is spelled correctly.
It is enough to click and get on the link, and then you will be given a loader and then anything else.
Likewise files. Do not install or run anything that is in exe, pdf, doc format. C exe is understandable, but document files also have vulnerabilities, through the same acrobat they used to break many computers. Use the virtual machine if you really need to see something

✅ 15. Your nicknames
Very often people put the same nicknames in different forums, websites, social networks and instant messengers.
And I use it. When someone knocks on me or I want to make a deal with someone, I check the nickname of the person and find their profiles on a bunch of sites. This gives a picture of a person, about his activities, reputation, etc.
You can check on Google, VK, FB and other social networks.
So make it a rule to use your nickname either very carefully, or come up with different nicknames each time, or use general ones, such as Alex, Qwerty, and so on.

✅ 16. Errors, dullness and inattention
Even the most fierce anons cannot exclude the human factor. The smartest criminals tend to blurt out either their mistakes or too much self-confidence.
We must try to always be on the alert, consciously approach work, check and recheck our weak points.

Outcome
There is no 100% security and anonymity, if someone really needs to get to the bottom of you and for this there will be money and connections, then sooner or later they will figure out you.
But it is enough to follow these simple security measures to save yourself from most of the problems.

Useful links for anonymity check
 
Manual # 1 - Safety
1.1: General view of ideal safety
The general view of ideal security consists of: an external hard disk (or flash drive) on which a virtual machine is stored in an encrypted container. From this virtual machine, you go online using a VPN for security and a sock (or tunnel) for disguise. More details: 1. An external hard drive (on which a virtual machine with Windows OS and all necessary programs is installed) which will be encrypted using TrueCrypt.

2. TrueCrypt is an on-the-fly encryption computer program for 32- and 64-bit operating systems of the Microsoft Windows, Linux and Mac OS families. It allows you to create a virtual encrypted logical drive stored as a file. TrueCrypt can also fully encrypt a partition on a hard drive or other storage medium such as a floppy disk or USB flash drive. All stored data on a TrueCrypt volume is fully encrypted, including file and directory names.

3. Virtual Machine: VirtualBox or VMware. Both of these programs are great for our needs (who is more comfortable with which). With these programs, you need to install Windows XP (ENG) or Win7 (ENG) on an external hard drive. A virtual machine runs some machine-independent code, or the machine code of a real processor. In addition to the processor, a VM can emulate the operation of both individual hardware components and an entire real computer (including BIOS, RAM, hard disk and other peripheral devices). In the latter case, operating systems can be installed in a VM, just like on a real computer (for example, Windows can be run in a virtual machine running Linux or vice versa).

4. Operating system (usually Windows XP ENG or Win7 ENG), which we install on the virtual machine.

5. VPN (English Virtual Private Network) is a technology that allows one or more network connections (logical network) to be provided over another network (for example, the Internet). VPN Double - a bundle of VPN servers, in which the connection takes place in one country, after which the traffic is transmitted through an encrypted channel to another server and from there goes out into the world. € Protection against any kind of tracking and interception of information. € Protection against hacker attacks on the local network. € Firewall that prevents intruders from scanning your IP address from the Internet. € Internet access without restrictions that exist at the local or state level. € Visiting sites (online gambling, etc.) ) if access from your country is denied. € Protection against scanning and interception of traffic in WI-FI networks. € Full access to all VOIP operators, including Skype. € Completely anonymous internet access.
€ SOCKS (socks) is a network protocol that allows client-server applications to transparently use services behind firewalls (firewalls). When driving in, always wear socks on top! Here the question is not only in disguise as a holder, but also in hiding the VPN itself, in the data center of which, theoretically, they can appear to seize data. € SSH Tunnel is a tunnel created over an SSH connection and used to encrypt the tunneled data. Used to secure data transmission on the Internet. The peculiarity is that unencrypted traffic of any protocol is encrypted at one end of the SSH connection and decrypted at the other. Used as an alternative to Socks. The main advantages over Socks:

1.3: Virtual Box
First of all, download the image of the virtual disk with the OS with which you are going to work in the virtual machine.
How to install an operating system on a virtual machine The first thing to do is create a partition (virtual device). Open VirtualBox and click on "Create". Enter any name you like, in the “Type” and “Version” sections, select those whose image you are going to install.
All the following items: memory size, type of hard disk, number of GB - click "Next" everywhere. The parameters offered by the system are fine. VirtualBox knows what characteristics need to be selected in order to emulate the OS known to it.
Configuration The next step is to configure the virtual OS. You have already allocated space for XP on your computer. Now you need to connect the Windows XP ISO image to the virtual device. Go to "Settings". In the window, select the item "Media", next to "IDE controller - click on" Empty ", next to" Drive: Secondary master "click on the disk icon. And then select" Select an optical disk image".
The image search window will open. You should find the XP ISO file. Basically, the ISO file is the installation disc for the virtual machine.
When you select a file, do not forget to confirm "OK".
Launch You can assume that you have completely prepared the device and "stuffed into the DVD-ROM" the disc. It remains to turn on the machine and start the installation. Click "Run". A separate window of the virtual machine will open, where the installation will take place. Most likely, you have selected 10 GB of hard disk by default, so now the system shows an unallocated area of 10237 MB.
At the bottom of the screen, you see the commands. Press "C" to create a section.
When you create it, click "Install". Now the system offers to format the created partition. Choose NTFS formatting.
Installation started: "The installer is copying files." When the progress is complete, Windows XP will reboot and the installation will continue.
After the installation is completed, it remains to "pull out the disk from the device". Close the virtual XP window and go to "Settings" again. Where you attached the ISO image, you must now remove it. Withdraw. You can delete the ISO file.
Windows XP is ready for the first boot. To conveniently interact with the virtual machine, we will give you a few tips. There are two modes of VirtualBox mouse - integrated and non-integrated. If you use the second one, then to return the mouse to the main OS, press the right “Ctrl”; You can change modes in the "Machine" tab, and there "Disable / enable mouse integration" To work, we need to move files between the main machine and the virtual one. To do this, we need to create shared folders. Create a folder on the main machine from which you want to share with the virtual machine. Hover the cursor over the folder icon, right-click on "configure shared folders" Next, click on the add folder icon, specify the path to the folder we created. After the process is complete, the folder will look like an additional disk on the virtual machine, but on the main machine it will remain as a regular folder. If after these steps the folder is not integrated with the virtual machine, in the virtual machine window at the top, select the "Devices" tab in it "Connect the guest OS add-on disk image" And everything will work.

VMware
How to install an operating system on a VMware Workstation virtual machine VMware Workstation is a program for creating virtual computers on your PC. VMware Workstation can be used to test different operating systems and programs, network connections on one computer, without affecting the security of the main PC. This article will show you how to create a Windows XP virtual machine. After launch, a diological window of the VMware Workstation program appears:
To create a new virtual machine, press the "New Virtual Machine" button or just press the Ctrl + N buttons on the keyboard.
Select the disk or .iso file (image) with the operating system. In my example, I will use a Windows XP disk. Click Next.
VMware Workstation will ask for an activation key (if you are installing Windows). After entering the key, select the name and folder where the operating system will be installed.
We indicate the size of the hard disk of our virtual machine and click Next. The recommended hard disk size for Windows XP is 40 Gb, but 8Gb is enough for testing.
The last check before creating the virtual machine. Using the Customize Hardware ... button, you can change the current settings, for example, increase the amount of RAM for the virtual machine. Click Finish, the installation of the operating system on VMware Workstation begins.
Then the operating system is installed on VMware Workstation as usual.

1.6: Working with Dedicated Server (RDP)
A dedicated server (also a dedicated server) is a type of hosting in which the client is provided with a separate physical machine. Typically used to run applications that cannot coexist on the same server with other projects or have increased resource requirements.
How to connect to Dedicated Server? You can connect to Dedicated Server using the built-in Windows utility: Remote Desktop Connection. Start => Programs => Accessories => Communication => Remote Desktop Connection.
What do you need to pay attention to when choosing a Dedicated Server? Internet connection speed, Memory (RAM), Stone (processor), OS. Here are examples: Win2003 Ram 1gb CPU 3 Pentium4 America Downstream speed 4.57 Mbit / s Upstream speed 1.49 Mbit / s
What is Dedicated for? Dedik is suitable for any action for which you need to change your geolocation. (Any carding themes in which you need to geolocate to the cardholder) Also used for brute, spam, flood, ddos and much more. In general, for all those operations that require a long time on the computer and its load.

Where can I get a Dedicated Server? There are two ways:
1) This is, of course, a purchase. (You can find sellers in the useful contacts of the forum) 2) Get it off yourself.
Rules for working with Dedicated Files!
Run the command line (Start> Run> cmd.exe) and write the following in it:
Code: net user Username password / add
net localgroup Administrators UserName / add
net localgroup "Remote Desktop Users" Username / add
net accounts / maxpwage: unlimited Now let's break down each command:
net user Username password / add - Adds a new user with the specified username and password
net localgroup Administrators UserName / add - Adds the desired user to the Administrators group
net localgroup "Remote Desktop Users" UserName / add - Adds the desired user to the group of remote users
net accounts / maxpwage: unlimited - avoids password expiration (14 days)
For example, if you want to create an account named user and password password, then the commands will look like this:
Code: net user user password / add
net localgroup Administrators user / add
net localgroup "Remote Desktop Users" user / add
net accounts / maxpwage: unlimited Great, the account has been created. Now we need to hide it from the vinlog so that your account does not shine among other users.
To do this, go to the register (Start> Run> regedit.exe) go to HKEY_LOCAL_MACHINEHKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonSpecialAcc. First, we need to create our own account, because if we do all our dirty deeds under the admin account, then our Dedicated Dedicated as soon as the admin comes and sees what is happening in his account.
We will create the account through the command line, as it is faster and more convenient. So, let's start creating an account:
ountsUserList and create a new DWORD parameter there (right-click, new parameter
DWORD) We call this parameter the name of your account, and assign it a numerical value of 0.
Next, go to C: \ Documents and Settings and hide the folder with your account there with all the subdirectories and files. (Right-click> properties> check the "hidden" box and click apply)
And yet, create yourself a folder in C: \ WINDOWS \ system32 or deeper, and also make it hidden with all the files, folders and subdirectories. You will need it in order to store all the files you need there.
That's it, now you have a hidden account on the Dedicated server and a folder where you will shove all your stuff. You can safely disconnect from the Dedicated Server and log in under your account.
Note: You shouldn't install anything on the Dedicated Server, pour everything in the already installed form. Do it through cloud services or file sharing. Those. upload folders with installed software from the main machine to file hosting and download from Dedicated Server.
 
Top