Offline anonymity and security. How not to get into a mess?

Carder

Professional
Messages
2,616
Reaction score
1,940
Points
113
Good time of day. Last time I wrote about how you can be tracked using your own mobile phone, but this article will be a Supplement and will be devoted to aspects of psychological security and anonymization, which is inherently associated with offline, and also rather focused on beginners and all those who ask questions: "will a VPN help?".

The far side of the moon​

I want to touch on the "far side of the moon", so to speak. And to tell not so much about online anonymity, but specifically about her friend walking with her by the hand on the hot sand, but, unfortunately, many quite often simply do not pay attention or in every possible way ingratiate - offline anonymity and security.

Why offline, you may ask? Because in most cases, they burn out on this one. They simply do not care about everything because of the imaginary and illusory anonymity on the web. It is needed-naturally, absolutely. However, it alone and only it is far from enough if they are interested in you.

How many times have you seen an operatic survey or a detention report in force "We broke through all his VPN chains through communication with a bunch of providers on different continents, we decrypted the exit node and selected exactly his data from millions of other delusional characters and letters, we decrypted and restored the encrypted SSD drives burned in the microwave, we spent a year and several million on all this, but we found a room carder who shod a $ 5,000 shop and issued him a fine" - I haven't heard this many times.

- Cash out money. Did you pour it through your Bank card? Your brother's or cat's card? Did you show your banking details? But they are much easier to break through than the VPN network with traffic encryption through the tor, and it turns out that it was useless! Or maybe I went to the Bank's cash register? Be sure that sooner or later this may become your side. As the respected Chekhov used to say: "If at the beginning of the play there is a gun hanging on the wall, then (by the end of the play) it should go off."

- Highlighted your personal data. It can be anything: your address, phone number, VK or FB page, Instagram, online wallet, etc., which in no case should not be associated with your occupation. That is, in General. That is, no way!

- Object A has been linked to object B. (for example, a mail account and your personal phone number), this applies to a lot of things, and here you can touch on online anonymization. Specialized services can establish a link between two accounts that were logged in at one time or another from the same IP address! It would seem that so what? Yes, it's all blocked by a bunch of VPNs and in General! - But no, this is an additional link between your dark deeds, and if you did not commit anything from one account, and how to do it from another, then the first one will help you get to the last one!

"Bragging and loquacious. An overly large frontal lobe with 95% self-confidence.

"My tongue is my enemy!" - always remember these words as the most important prayer.
- Pinned a brother / friend / cat. Or just a close person who knew about your Affairs, put on a bottle and he kindly told everything, and also testified against you. After all, who can guarantee that your brother will not go drunk and talk about his beloved distant relative, according to him, hoeing pendos online stores for thousands of dollars? I will say it is wrong, they are interested in, and you will be able to reach You even if it didn't even plan it. After all, an extra star on the shoulder straps will not hurt anyone, right?

- Receipt of parcels, shipment, goods from carding. Did you drop a friend? So-so idea, it would be worth teaching him then what and why to say in case of what! And in general, do not tell me about your business - after all, dropology is a whole art, which I will definitely write about in more detail, or use special services!

- Trust. Here, I think everything is clear. Choose carefully who, when, and what you can trust! Even if you are 99.99% sure, there is absolutely no guarantee that he will not stick his finger in your nose!

- Storage of information, staff and so on, which in one way or another can become evidence against you. Think about it, is You have everything tucked away and hidden well if you encrypt your data, whether using proven techniques tested saved, "only", and if those people in your work? Check it out. Organize an alarm case in case of something, you never know. What happens if your work laptop / flash drive/credit card, etc. suddenly falls into the wrong hands?

Measure seven times and cut once. Test yourself with dozens of times and their work, find all its weaknesses, all of a sudden You've missed something? After all, it is better to overdo it than not to overdo it.
 
Please note, if you want to make a deal with this user, that it is blocked.
Good time of day. Last time I wrote about how you can be tracked using your own mobile phone, but this article will be a Supplement and will be devoted to aspects of psychological security and anonymization, which is inherently associated with offline, and also rather focused on beginners and all those who ask questions: "will a VPN help?".

The far side of the moon​

I want to touch on the "far side of the moon", so to speak. And to tell not so much about online anonymity, but specifically about her friend walking with her by the hand on the hot sand, but, unfortunately, many quite often simply do not pay attention or in every possible way ingratiate - offline anonymity and security.

Why offline, you may ask? Because in most cases, they burn out on this one. They simply do not care about everything because of the imaginary and illusory anonymity on the web. It is needed-naturally, absolutely. However, it alone and only it is far from enough if they are interested in you.

How many times have you seen an operatic survey or a detention report in force "We broke through all his VPN chains through communication with a bunch of providers on different continents, we decrypted the exit node and selected exactly his data from millions of other delusional characters and letters, we decrypted and restored the encrypted SSD drives burned in the microwave, we spent a year and several million on all this, but we found a room carder who shod a $ 5,000 shop and issued him a fine" - I haven't heard this many times.

- Cash out money. Did you pour it through your Bank card? Your brother's or cat's card? Did you show your banking details? But they are much easier to break through than the VPN network with traffic encryption through the tor, and it turns out that it was useless! Or maybe I went to the Bank's cash register? Be sure that sooner or later this may become your side. As the respected Chekhov used to say: "If at the beginning of the play there is a gun hanging on the wall, then (by the end of the play) it should go off."

- Highlighted your personal data. It can be anything: your address, phone number, VK or FB page, Instagram, online wallet, etc., which in no case should not be associated with your occupation. That is, in General. That is, no way!

- A nesnesi B nesnesine bağlanmıştır (örneğin, bir posta hesabı ve kişisel telefon numaranız), bu birçok şey için geçerlidir ve burada çevrimiçi anonimleştirmeye dokunabilirsiniz. Özel hizmetler, aynı anda veya aynı IP adresinden oturum açılmış iki hesap arasında bir bağlantı kurabilir! Öyle görünüyor ki ne olmuş? Evet, hepsi bir grup VPN tarafından ve Genel olarak engelleniyor! - Ama hayır, bu karanlık eylemleriniz arasında ek bir bağlantıdır ve bir hesaptan hiçbir şey işlemediyseniz ve bunu diğerinden nasıl yapacağınız, o zaman ilki sonuncusuna ulaşmanıza yardımcı olacaktır!

"Övünen ve geveze.% 95 özgüvene sahip aşırı büyük ön lob.


- Bir kardeşi / arkadaşı / kediyi sabitledim. Ya da İşlerinizi bilen yakın bir kişi, bir şişe koydu ve her şeyi nazikçe anlattı ve size karşı tanıklık etti. Ne de olsa, ona göre, kardeşinizin sarhoş olmayacağını ve sevgili uzak akrabası hakkında konuşmayacağını kim garanti edebilir, pendos çevrimiçi mağazaları binlerce dolara çapalayarak? Yanlış olduğunu, ilgilendiklerini söyleyeceğim ve planlamasa bile Size ulaşabileceksiniz. Sonuçta, omuz kayışlarındaki fazladan bir yıldız kimseye zarar vermez, değil mi?

- Taraktan koli, sevkıyat, malların alınması. Bir arkadaşınızı düşürdünüz mü? Öyleyse fikir, ona o zaman neyi ve ne durumunda niçin söyleyeceğini öğretmeye değer! Ve genel olarak, bana işinizden bahsetmeyin - sonuçta, dropoloji, kesinlikle daha ayrıntılı olarak yazacağım veya özel hizmetler kullanacağım bütün bir sanattır!

- Güven. Burada her şeyin açık olduğunu düşünüyorum. Kime, ne zaman ve neye güvenebileceğinizi dikkatlice seçin! % 99,99 emin olsanız bile parmağını burnunuza sokmayacağına dair kesinlikle hiçbir garanti yoktur!

- Bir şekilde aleyhinize delil haline gelebilecek bilgilerin, personelin vb. Saklanması. Bir düşünün, verilerinizi şifrelerseniz, "yalnızca" kaydedilmiş, test edilmiş kanıtlanmış teknikler kullanılarak kaydedilmişse ve işinizdeki kişiler varsa, her şey gizli ve iyi saklanmış mı? Bunu kontrol et. Asla bilemeyeceğiniz bir şey olması durumunda bir alarm durumu düzenleyin. İş dizüstü bilgisayarınız / flash sürücünüz / kredi kartınız vb. Aniden yanlış ellere düşerse ne olur?

Yedi kez ölçün ve bir kez kesin. Kendinizi düzinelerce kez ve çalışmalarıyla test edin, tüm zayıf yönlerini bulun, birdenbire Bir şeyi kaçırdınız mı? Sonuçta, aşırıya kaçmamaktansa abartmak daha iyidir.
Thank you.
 
Today I want to continue the conversation about "Maximum peace of mind."
This is what I call a decent level of anonymity for working in any environment.

Anonymous financial instruments
At the very beginning of my career, I felt an acute shortage of anonymous accounts and bank cards.
Now let's talk about the rules for working with cards.

Never go to ATMs near your place of residence
Ideally, go to fill up in a neighboring city. We chose a city. We check the area for cameras. Fill up in the dark. We leave the car a couple of blocks away, in a quiet alley. Rooms are sprayed with water and sugar before the trip. By the time you arrive, they will be so covered with dust that you will not be able to disassemble them. We put glasses, a wig, and a mustache on our beautiful face...well, here someone likes it. Clothing is only a one-time item. We leave the phone number at home. After the cashout, we burn the entire matbase on the way back. Maybe I'm a complete paranoid, but maybe that's why I've never been in the field of view of the Authorities yet.

Acquaintances and drops
Never drag people who can point out at least something about you into the topic of cash. Pricks almost anyone. In 2008, I was leaked by my best friend. He was lying at the feet, just to avoid getting killed. And once drop had to break his head-the bitch let her hands go to the community center. Therefore, it is ideal to search for people who do not know you at all, will not remember you, but whom you can control. Really - my experience.

We keep it as far away as possible
All checkmate and cash is NEVER stored at home. For maps and videos, you need a cache. First, if you are accepted, they will wool your home. I did this. I buy a sealed container in Leroy Merlin, there in cellophane cash and cards. I put it in the right place. And in my wristwatch, I put a Micro SD box under the cover, which contains encrypted Google Maps coordinates and instructions on what to do to my family if I was accepted. Make a note of it)))

One thing-only banking details
Don't be greedy. Benefit received? Money withdrawn from your accounts? The map must be destroyed! It is better to overpay slightly-but do not attach an extra episode to yourself in case of admission. Get rid of dirt as needed. 90% are accepted after cash-out. This is your life and safety. Keep this in mind.

Proven software for Android
Well, now I'll tell you about my preferences in software, for confident and safe work. Each program passed 100% of my requirements. Look for it yourself. I won't give you any links. There is no time to check every source. Start.

  • Open VPN Connect - Well, this is the beginning of the beginning. VPN client. In my opinion, it is suitable for moderate blackness. Quite flexible adjustment.
  • Droid wall - As you might have guessed, this is a firewall that blocks applications from accessing the Internet, and prohibits draining traffic bypassing the VPN.
  • Mock Location - Replaces the user's geolocation, uses dummy locations. It has a setting for active movement. Not a bad thing.
  • Mac Address Ghost - Software for changing the Mac address.
  • VOIP client for IP telephony. Flexible adjustment. Protocol g. 729 g. 238
Big Brother is not napping or giving up on GOOGLE
To begin with, due to changes in the privacy policy, Google collects data about its users. Data is collected and stored. You know what I'm getting at. Location, search queries, and traffic....all this is analyzed. A close friend of mine often used the leaky nature of this service, and used data about people for his own purposes. Think for yourself what this means. My advice is that if you really make gestures, then give up Google services...generally. I did it a long time ago and I don't regret it. Anonymity is more expensive.

Think two moves ahead
Here we come to the most important point. Debriefing, and scrolling through the layout in your head - you should not forget about this. Every little thing can lead to fatal consequences. Therefore, it is necessary to understand how to act, depending on the situation. Strict analysis and cold calculation - that's what I always use. It's not for me to judge or teach you, but if you decide to do something, consider every detail. From a change in handwriting and behavior style to a complete change in appearance. Of course, if they want to, they'll find you.

In conclusion of the article, I want to say that what I wrote above is not a copy-paste or fiction, but my personal, life experience. Maybe what I said will be useful to someone. If you have any questions, please contact us. Always happy to make new contacts. I think I'll be here for a long time... Good luck to all on the difficult path!
 
48a47d8e9e7e3270e25c8.jpg

How many times have you seen an operational survey or a report on the detention in force "We broke through all his VPN chains through communication with a bunch of providers on different continents, we decrypted the exit node and selected exactly his data from millions of other delusional characters and letters, we decrypted and restored the encrypted ssd drives burned in the microwave, we spent a year and several million on all this, but we found a room carder who put on $ 5000 in a shop and issued him a fine" - I've not heard this many times.

Cashing out money.
Did you pour it through your bank card? Your brother's or cat's card? Did you show your banking details? But they are much easier to break through than the VPN network with traffic encryption through the tor, and it turns out that it was useless! Or maybe I went to the bank's cash register? Be sure that sooner or later this may become your side. As the respected Chekhov used to say: "If at the beginning of the play there is a gun hanging on the wall, then (by the end of the play) it should go off."

Highlighted your personal data.
It can be anything: your address, phone number, VK or FB page, instagram, online wallet, etc., which in no case should not be associated with your occupation. That is, in general. That is, no way!

Object A was linked to object B.(For example, your email account and your personal phone number). This applies to a lot of things, and here you can touch on online anonymization. Specialized services can establish a link between two accounts that were logged in at one time or another from the same IP address! It would seem that so what? Yes, it's all blocked by a bunch of VPNs and in general! - But no, this is an additional link between your dark deeds, and if you did not commit anything from one account, and how to do it from another, then the first one will help you get to the last one!

Bragging and talkativeness.
Too big a frontal lobe with 95% self-confidence.

Pinned down a brother / friend/ cat.
Or just a close person who knew about your affairs, put on a bottle and he kindly told everything, and also testified against you. After all, who can guarantee that your brother will not go drunk and talk about his beloved distant relative, according to him, hoeing pendos online stores for thousands of dollars? If they say it to the wrong person, they will be interested in it, and they will be able to reach out to you, even if they didn't even plan to do it in the first place. After all, an extra star on the shoulder straps will not hurt anyone, right?

Receiving parcels, forwarding, product code@rding.

Did you drop a friend? So-so idea, it would be worth teaching him then what and why to say in case of what! And in general, do not tell me about your business - after all, dropology is a whole art, which I will definitely write about in more detail, or use special services!

Trust.
Here, I think everything is clear. Choose carefully who, when, and what you can trust! Even if you are 99.99% sure, there is absolutely no guarantee that he will not stick his finger in your nose!
 
Top