Fundamentals of basic carder safety in carding

Tomcat

Professional
Messages
2,689
Reaction score
981
Points
113
When working according to gray and black carding schemes, you must take into account many factors that can de-anonymize you. In this article, I grouped these factors and briefly tried to describe the methods of protection

I hope every newcomer and experienced will emphasize something for themselves.

Main risk factors:
1) Social
2) Financial
3) Hardware

Social security


This type of security is based on how society sees you!

I have formed the basic rules:
1 - Do not communicate with anyone about work activities, except partners
2 - Do not waste money if you cannot confirm the legality of its ownership
3 - Don't meet drops directly. If this is still required, then use a human spacer (drop guide)
4 - Build your “legend” (where you work, what you do, how much you pay, etc.)

Choose a profession remotely, so it will be more difficult to catch you in a lie.

Financial security


I divide this type of security into 2 categories:
1) Deposit funds
2) Withdrawal of funds

We use cryptocurrency for input and output.
For me, Monero has been the simplest and most trusted for a long time.
You can create a wallet here: wallet.mymonero.com
Commissions on Monero are minimal

Safe refill bundles:
1) Exchanger (for the best rates, see bestchange)
2) Monero wallet #1
3) Monero wallet #2
4) Exchanger and withdrawal to a convenient anonymous wallet (trust type) or direct payment for the service

Never pay for dubious services and goods from your exchange!

Safe withdrawal links:
1) Receiving cryptocurrency
2) Monero exchanger
3) Monero wallet No. 2 (receiving “dirty” money)
4) Monero wallet No. 1
5) Exchanger with Monero for a convenient option for you

With each type of activity, strive to obtain the “final result” in cryptocurrency!

Hardware Security


I divide this type of security into 2 categories:
1) PC
2) Communication

In this type of security there must be constant rules:

1 Rule - VPN

Internet access when working is MANDATORY with VPN!
It’s better, of course, to create it yourself, because there will definitely be no logging there, and everything goes up in half an hour
We described how it rises in our previous article, use it!

2 Rule - Internet
It is always better to use a modem and the left SIM card for safety
You can top up your left SIM card from the same crypto exchangers
Fiber optics gives advantages in the form of speed, but gives an accurate connection to the apartment
Fiber optics can be used if you have an extended security bundle. We'll talk about it a little later

Rule 3 - Virtual machines
Use VirtualBox virtual machines whenever possible
If there is an attempt to find out your PC identifiers, then all that can be found out is the virtual machine identifiers

4 Rule - Intersection of activities
Your work and your personal Internet space should not intersect!
If you scam people on Avito from the same browser that you use on VK, they will quickly find you.
Therefore, buy an external SSD drive and install the operating system there and work only from it!

5 Rule - Cryptography
Use encryption, a good one is TrueCrypt. Veracrypt is also good, but the first one is better.
Create encrypted archives on the external SSD from which you work and store all working information there.

Rule 6 - Think about what will happen if in 10 minutes you have a search
Estimate the time to destroy evidence if there is a knock on your door.
If you are not working from an external SSD, breaking a hard drive on a desktop PC will take much longer.
Estimate the approximate time you need to destroy evidence.
Always remember what to break and in what order.

This rule can save you!

Rule 7 - Don't use cell phone service
It is advisable to avoid it completely!
If you need to receive SMS, buy an account for free on the forum or use services for receiving SMS
If you need to call someone, set up IP telephony

8 Rule - Maximum confidentiality on the network
We don’t tell anyone our real name, let alone our last name. The same applies to eye color and other “attributes”
Hide your phone number in all applications, prohibit copying contacts from your address book.
Avoid using voice messages.
Always evaluate the data that you “transmit” to your interlocutor.

Basic security bundles:


1 Link: (simplified)
External ssd drive. Encrypted archive with data inside
Modem with the left SIM --- your own VPN --- proxy/Internet access via a virtual machine
This combination is suitable if you are not doing anything truly criminal, for example selling scans or doing rendering

2 Link: (basic)
External ssd drive. Encrypted archive with data inside
Modem with the left SIM --- your own VPN --- virtual machine --- any other VPN --- proxy/internet access

3 Link: (complicated)
External encrypted SSD drive. There is also an encrypted archive with data inside.
Modem with the left SIM --- your own VPN --- connection torification (Whonix) --- your own VPN on another hosting --- proxy/internet access
Suitable for any occasion. In the next article we will look at how to torify a connection!

You can also strengthen any connection:
1) Linux as the main operating system
2) Using a router with an openvpn client
In some router models you can upload your own VPN configuration file.
What gives the advantage is that you can already create a minimal VPN (router)---VPN (PC) combination at a basic level

Remember that all solutions ONLY work in combination!
 
Top