Fundamentals of safety in carding! Carding training 2021.

Lord777

Professional
Messages
2,578
Reaction score
1,519
Points
113
Regarding the training course for % of profit - if you want to get on it.

I. Your tongue is your enemy.
The title is the whole point. But I'll explain it in hardcore way.

Everything you say or write in open sources will be used against you. Especially in the RF. Comments on youtube, VK reposts - all this can compromise you. Jokes about mothers have already become materials in the case of libel and defamation. (Google link to news about extremism in social networks).

II. Google - "big brother is watching you"
There is a good video from the science channel about how Big Brother has you every day.

Google has become a tool that we use every day. It would be a sin on their part not to take advantage of this alignment to play God. They literally know what you do every day, where you go, what you look, and what you are looking for through their search.

They were obliged to give users the ability to disable "tracking" for users. How to do it? I show it.

a) Stop using Google Chrome;

b) Go to myactivity.google.com, where you turn off the history of actions, tighten the privacy settings to the point of fucking, turn off targeting ads. 20% of the effort gives 80% of the result.

c) Start using duckduckgo.com as your main search engine. Doesn't show ads, gives out only relevant search queries. Recommend.

III. Secure your data.
Full disk encryption. What and how.

Why this is needed - I will not explain, it is not included in the topic of the article. But you need it, believe me.

If you are using Windows then use Bitlocker. If osX is FileVault. Here and there - a built-in utility, the code is closed. But they do their job.

If you don't like this layout, then use Veracrypt (our favorite).
On linux (almost any distribution), when installed, they offer full disk encryption out of the box.

IV. Protect your passwords.
Keepass, passwords in iOS.
Suppose you have some information that cannot be shown to other people. Not at all. Where is the best place to store this information? That's right, at hand.

Then why the fuck are you storing passwords in your browser, or using an online password store that gets cracked three times a day?
Do you trust your passwords to your browser?

Bad news, friend. Bug-tracker (a pool of errors that are documented by users) in Firefox / Opera / Chromium is full of vulnerabilities that allow you to drain your password.

Of the latter, it is a password autocomplete vulnerability in ALL modern browsers. Small invisible fields (1 pixel each) for login: password are embedded on the page. Additional, in addition to the main ones. You press autocomplete, and your login: password will fly away to the attackers.

Draw your own conclusions. Here I can only advise you to switch to local password stores ( not in a notebook, blzhad! ), Like KeePassX. Encrypts, easy to use, generates strong passwords by itself. What else is needed?

V. Use an open source messenger.
Telegram is not anonymous. How to secure your TG. The alternative is jabber.

I will not open America by saying that Telegram is not anonymous. And the servers are centralized. And the source code is closed. And the type of encryption is generally unknown to anyone. Already a wake-up call, as for me.

At your leisure, by the way, read how easy it is to intercept other people's SMS / calls, having a configured home receiver.

Disable receiving telegram calls. Received a call - burned their phone number.
Don't want to switch from your favorite paper airplane? Buy a USA virtual number (google voice, as an example), and create a new telegram account.

But these are all half measures. Tru-cookie cutters use only jabber.

Servers with a high level of anonymity.
  • @ sj.ms
  • @ safetyjabber.com
  • @ Jabber.cd
  • @ thesecure.biz
  • @ default.rs
  • @ xmpp.jp
  • @ jsrv.org
  • @ securetalks.biz
  • @ silper.cz
The source code is open, the type of encryption is known, PGP (Pretty Good Privacy) and OTR (Off-The-Record, "off-the-record" mode, when ALL correspondence is guaranteed to be erased from both users when the chat window is closed) is available

Also, you can set up your own jabber server yourself, which will be controlled only by you. But this is for advanced boys.
 
Security | Anonymity | Carding tutorial 2021
Working in a field in which guys in uniform will be happy to welcome you hot, you definitely need to think about your safety. I'll just describe the basic postulates that are worth relying on and that work well and will continue to work. Protect yourself and study with me for 25% of the profit!

Comp
Your computer, on which the dotka is located, will be very suitable for black deeds. Only it needs to be slightly upgraded for this, namely, to install software on it that will hide your actions from the provider.
Remember, all the links on which you climb are seen by the provider and at the first request of people in the form, he will provide them with data.
Why is the provider obliged to provide data about you? According to the law.
Then, the cunning man, having received the resources on which you hang out, will happily read your correspondence and draw a complete picture of your life on the Internet.
What to do? Obviously, it is necessary to hide your presence from the provider on any websites. In the end, this personal life of ours and what happens in it should not fuck anyone.
For this we will use VPN services. In short (in more detail in the following articles), VPN is a third-party server through which all your Internet requests pass and remain encrypted there forever. And no one will ever see them.
It is also necessary to configure the system, but more on this in other articles!

Your phone
The phone must be left, bought not in your name. Better with a bum in the transition or in the market. Simcard must be left. Bought from the same bum. The left sim card should never be inserted into your PERSONAL phone NEVER - it immediately sends a request and you can be easily pinged, right down to the room in which you ride a dota and throw people. Also, the provider stores for a long time lists with IMEI and numbers working with it in pairs. In short, one left phone - and insert only LEFT SIM cards into it. Do not put your personal SIM cards in your name into it, even for the purpose of checking! But the rule about mobile devices applies to those who stir up the grudge from their phones. We don't fucking need a phone, and if we do, we will use virtual mobiles.

What is vpn?
Roughly speaking, this is a server through which all your traffic passes, bypassing the eyes of your provider.
Why is it needed? To google the word "carding" and be sure that the uncle of operas is not following you.
VPN (English Virtual Private Network) is a generic name for technologies that allow one or more network connections (logical network) to be provided over another network (for example, the Internet).

How do you choose the best VPN service?

It must have several parameters:
1) It must not be in your country
Believe it or not, even a VPN can keep logs and turn them over to the authorities. True, in order for the cop to trace the chain from you to the VPN server, he needs to be very interested. For example, construct a hydrogen bomb. Or something similar. In short, the VPN is only foreign!

2) VPN should not keep logs
It follows from the first point. In order for the VPN server to have nothing to show to the cops, they should not save anything, no logs (a log is a file of information with actions that the user performed (ip, links, etc.)).

As an example, I suggest paying attention to these VPN servers:
Windscribe
Speedify
Nord VPN
 
Top