Mandatory rules when working with anonymous operating systems

Mutt

Professional
Messages
1,167
Reaction score
835
Points
113
Good day, friend, now you will learn about the basic rules when working with anonymous operating systems

Some overestimate the capabilities of anonymous operating systems, thinking that after they are launched, they have no use for any enemy adversity, but this is extremely destructive to think so. The operating system is just a tool, and its effectiveness will depend on the hands that use it. It should always be remembered that your best defense is a head on your shoulders and a sense of caution, everything else is secondary.

1. Change any system settings, especially if you do not understand well the consequences of such changes.
You don’t have to pick anything if you don’t have enough experience. You shouldn't change the proxy from socks5 127,0,0,1: 9050 to System Proxy Settings just because "everything works anyway, so it goes." Yes, everything works this way and that, but the first mode insures you in case of forgetfulness - if you turn off the tor proxy and forget to turn it back on, you still will not set your real ip on fire.

No need to "hack" in TAILS VPN from a dick, understand which office. If it doesn't have VPN support, it's not because they're crooked programmers. But because a VPN will weaken your anonymity, and not strengthen, as you thought in view of your meager mind.

2. You do not need to open the front doors when an anonymous operating system is loaded on your computer.
No need from the word at all. Not checking the mail, not checking the meter, not running out for a beer, nothing. If you have booted from an anonymous system - sit and work. If you need to open the front door, no matter for what period of time, even for 10 seconds, turn off the system, hide the media in a cache and go open it. Only this way and nothing else. Why?
Everything is simple. For example, at this moment operatives who need data from your carrier can graze you. And they understand that it is encrypted. Yes, you can give you pussies there and beat the passwords out of you, but it's still open to question + it will take some time, during which, for example, other members of the organized criminal group, in which you are a member, will be able to detect your disappearance.
A much easier way to capture a computer with encrypted data, catching the moment when a person opens the door and at the same time a flash drive will stick out in his laptop - just a royal gift of fate!

3. Go online to sites that are not related to work.
YouTube, VK, news, and other fucking - strictly banned. The more sites you visit from an anonymous session, the more information you leave about yourself, your habits, surfing style, etc. So strictly working sites and nothing else. All non-working is from a non-working session.
I will not even write about the entrance to personal accounts of social networks, this is the basics.

4. Download files from the Internet or copy them from other media.
Ideally, you don't need to download anything from anywhere to an anonymous OS, as well as copy from other flash drives. So you can add unnecessary problems. Yes, TAILS will forget everything, including all the bad things - viruses, etc. trojans. But she will forget it AFTER the reboot. If you launch a virus, it will perform its tasks exactly as long as you work before the first reboot.

If the situation requires something to copy / download and run it, then do this as follows:
1. install the rkhunter chkrootkit and clamtk packages
2. update the base for clamtk
3. download what you need
4. TURN OFF THE INTERNET PHYSICALLY - by disconnecting the adapter or modem from the computer (by turning on the "airplane" mode in the laptop)
5. run the file
6. check the system with three programs that I wrote above
and only after that (if everything is ok) return to the Internet again.

5. Joke jokes that you joked not anonymously
If you have your favorite phrases and you force them to the full on the forums, you should not litter them with the same, working in an anonymous system - not necessarily on the same forum, nowhere at all. This is called cross-posting, and this is one of the effective methods of deanonymization in the torus - a dump of all your stupid posts on the torus forum is made, after which the key indicators are calculated:
1. average number of punctuation marks per 100 text characters
2. the average number of errors per 100 characters of text
3. characteristic typos (you confuse the letters k and y because they are next to each other and your left index finger is broken)
4. characteristic jargon (you are a former military man, a former athlete, etc.)
5. dialect, dialect, pronunciation, etc.

After that, a kind of network portrait is formed - and similar in parameters texts, robots begin to search in such cesspools of the Internet as Google, Facebook, and so on. As a rule, they do find matches, unfortunately.

These are the points about which few people know, few write about.
 
Top