Carding 4 Carders
Professional
- Messages
- 2,730
- Reaction score
- 1,467
- Points
- 113
1. Don't use your mobile phone for 2-step verification on TOR
Most websites provide 2-step verification using the mobile number that sends an OTP (One Time Password) to your mobile phone number, allowing you to log into your account securely. You should be careful when using the TOR browser to access your account.
Providing your mobile phone number to a website will only hinder your online anonymity as it will be easier for you to track you using your number. Please note that even if you use a SIM card registered under some other name, your carrier can easily track you as they also store your device's IMEI number in their database and can be used to track you.
2. Do not use user accounts outside TOR
If you use the TOR browser to check your Facebook, Twitter or email accounts, never use those accounts outside of the TOR browser as it will post your online information to the website. Nearly every site on the network now logs information such as your login and logout times, your location, your IP address, and other details. Using your account on the open Internet even once will be sufficient to register your IP address and ultimately identify you.
3. Don't post your personal information
You should embed this moment in your heart, do not post personal information like name, address, birthday, credit card number when using TOR. This will reveal your identity and there will be no point in using TOR, I hope you understand.
To hide completely, you need to be a pseudonym. So what is it? This means that you need to present yourself as a person with disparate behavior when using TOR. The new person should have different kinds of morals and hates, food choices, fantasies, etc.
To this end, create a new user account with a new email address that doesn't even reflect your real identity. You can use this email address for your social accounts and enjoy your anonymity and praise the power of TOR.
Also, don't be confused between anonymity and pseudonym.
An anonymous connection is one in which the server you want to connect to has no idea of your real IP address / location and your identity.
A pseudonymous connection is one in which the requested server has no idea of your actual IP address / location, but has an identity that it can associate with the connection.
4. Do not send unencrypted data over TOR
While you were reading the article about TOR, you came across the fact that TOR encrypts your connection, not your data, and the TOR exit nodes are vulnerable. Therefore, it is very important not to send unencrypted data over the TOR network, as someone could access your information while the data is at the last node.
5. Don't use TOR with Windows
Windows Microsoft is the most used desktop operating system in the world, but it doesn't seem to work if you want to use the TOR browser. Credits are packed due to operating system vulnerabilities and can reveal your identity even if you use TOR to access the Internet.
Linux systems will serve you well for this purpose. Linux distributions like Tails and Whonix are preconfigured with TOR. You can manually configure it on any distribution you like.
6. Remember to delete cookies and local website data
When you access a website, it sends a small file to your computer that stores a record of your browsing habits and other data so that the website can recognize you the next time you visit, this file is called a cookie. Some websites may also store data locally on your hard drive.
You must delete these cookies and local website data after every browsing session you perform on TOR. These things can allow the site to collect information about you and track your location and IP address.
Later versions of the Tor browser automatically deleted website cookies and loaded history after the session ended. As an alternative. you can click on the "New ID" option (press the bow button in front of the address bar) to keep the Tor browser open.
7. Don't use TOR for Google Search
If you want to be anonymous when using TOR, don't use Google to find your queries. While this sounds strange, this is because Google collects information such as your searches, stores cookies on your computer, and tracks your browsing habits in order to enable its advertising services.
You don't want to reveal this, do you? This way, you can use other search engines like DuckDuckGo and StartPage as they don't register your IP address or any other action. In fact, there have been instances where Google worked correctly with Tor. They may display an error message or how you can solve the captcha. This is because people who go to Google via Tor become suspicious.
8. Don't use an HTTP site in TOR
You know very well that TOR can be exploited by exploiting the vulnerabilities that exist on your exit nodes. Thus, if you access HTTP sites using TOR, chances are that someone could access your information while it is on the endpoints. The data sent to and from the HTTP site is unencrypted and can be viewed on endpoints since TOR only encrypts the connection within its network.
You can prevent such situations by using HTTPS sites. They use end-to-end encryption protocols such as SSL (Secure Socket Layer) and TLS (Transport Layer Security). This way, all your data remains safe even if it is outside the TOR network.
9. Do not connect to the same server with and without TOR at the same time
Here's one important thing to keep in mind. If you are accessing a specific remote server using TOR (anonymously), do not access the same server outside the TOR network (not anonymously), as this could reveal your actual identity. This is because in case your internet is down, both of your connections will be terminated at the same moment, and it won't be too difficult for you if someone is spying on you to connect the pieces and complete the puzzle.
Alternatively, the web server may try to match the two connections by increasing or decreasing the speed on one of your TOR or non-TOR connections to see if the speed changes on the other and therefore tracks your real IP address.
Final Words
For being anonymous on the Internet, TOR is a great option, even if federal agencies criticize it for acting like a barn for illegal activities. Let me assure you; it was not created for this purpose. You only need to take some precautions so that you don't damage the network.
Being anonymous is sometimes. Maybe because you just want to be a pseudonym for a while, or you are an activist who wants to spread some information, or you are accompanied on the Internet. TOR is for you, you only need to learn how to use it effectively and you will start to love the digital world.
(c) https://space.gerki.ws/threads/3674/
Most websites provide 2-step verification using the mobile number that sends an OTP (One Time Password) to your mobile phone number, allowing you to log into your account securely. You should be careful when using the TOR browser to access your account.
Providing your mobile phone number to a website will only hinder your online anonymity as it will be easier for you to track you using your number. Please note that even if you use a SIM card registered under some other name, your carrier can easily track you as they also store your device's IMEI number in their database and can be used to track you.
2. Do not use user accounts outside TOR
If you use the TOR browser to check your Facebook, Twitter or email accounts, never use those accounts outside of the TOR browser as it will post your online information to the website. Nearly every site on the network now logs information such as your login and logout times, your location, your IP address, and other details. Using your account on the open Internet even once will be sufficient to register your IP address and ultimately identify you.
3. Don't post your personal information
You should embed this moment in your heart, do not post personal information like name, address, birthday, credit card number when using TOR. This will reveal your identity and there will be no point in using TOR, I hope you understand.
To hide completely, you need to be a pseudonym. So what is it? This means that you need to present yourself as a person with disparate behavior when using TOR. The new person should have different kinds of morals and hates, food choices, fantasies, etc.
To this end, create a new user account with a new email address that doesn't even reflect your real identity. You can use this email address for your social accounts and enjoy your anonymity and praise the power of TOR.
Also, don't be confused between anonymity and pseudonym.
An anonymous connection is one in which the server you want to connect to has no idea of your real IP address / location and your identity.
A pseudonymous connection is one in which the requested server has no idea of your actual IP address / location, but has an identity that it can associate with the connection.
4. Do not send unencrypted data over TOR
While you were reading the article about TOR, you came across the fact that TOR encrypts your connection, not your data, and the TOR exit nodes are vulnerable. Therefore, it is very important not to send unencrypted data over the TOR network, as someone could access your information while the data is at the last node.
5. Don't use TOR with Windows
Windows Microsoft is the most used desktop operating system in the world, but it doesn't seem to work if you want to use the TOR browser. Credits are packed due to operating system vulnerabilities and can reveal your identity even if you use TOR to access the Internet.
Linux systems will serve you well for this purpose. Linux distributions like Tails and Whonix are preconfigured with TOR. You can manually configure it on any distribution you like.
6. Remember to delete cookies and local website data
When you access a website, it sends a small file to your computer that stores a record of your browsing habits and other data so that the website can recognize you the next time you visit, this file is called a cookie. Some websites may also store data locally on your hard drive.
You must delete these cookies and local website data after every browsing session you perform on TOR. These things can allow the site to collect information about you and track your location and IP address.
Later versions of the Tor browser automatically deleted website cookies and loaded history after the session ended. As an alternative. you can click on the "New ID" option (press the bow button in front of the address bar) to keep the Tor browser open.
7. Don't use TOR for Google Search
If you want to be anonymous when using TOR, don't use Google to find your queries. While this sounds strange, this is because Google collects information such as your searches, stores cookies on your computer, and tracks your browsing habits in order to enable its advertising services.
You don't want to reveal this, do you? This way, you can use other search engines like DuckDuckGo and StartPage as they don't register your IP address or any other action. In fact, there have been instances where Google worked correctly with Tor. They may display an error message or how you can solve the captcha. This is because people who go to Google via Tor become suspicious.
8. Don't use an HTTP site in TOR
You know very well that TOR can be exploited by exploiting the vulnerabilities that exist on your exit nodes. Thus, if you access HTTP sites using TOR, chances are that someone could access your information while it is on the endpoints. The data sent to and from the HTTP site is unencrypted and can be viewed on endpoints since TOR only encrypts the connection within its network.
You can prevent such situations by using HTTPS sites. They use end-to-end encryption protocols such as SSL (Secure Socket Layer) and TLS (Transport Layer Security). This way, all your data remains safe even if it is outside the TOR network.
9. Do not connect to the same server with and without TOR at the same time
Here's one important thing to keep in mind. If you are accessing a specific remote server using TOR (anonymously), do not access the same server outside the TOR network (not anonymously), as this could reveal your actual identity. This is because in case your internet is down, both of your connections will be terminated at the same moment, and it won't be too difficult for you if someone is spying on you to connect the pieces and complete the puzzle.
Alternatively, the web server may try to match the two connections by increasing or decreasing the speed on one of your TOR or non-TOR connections to see if the speed changes on the other and therefore tracks your real IP address.
Final Words
For being anonymous on the Internet, TOR is a great option, even if federal agencies criticize it for acting like a barn for illegal activities. Let me assure you; it was not created for this purpose. You only need to take some precautions so that you don't damage the network.
Being anonymous is sometimes. Maybe because you just want to be a pseudonym for a while, or you are an activist who wants to spread some information, or you are accompanied on the Internet. TOR is for you, you only need to learn how to use it effectively and you will start to love the digital world.
(c) https://space.gerki.ws/threads/3674/