Mutt
Professional
- Messages
- 1,459
- Reaction score
- 1,105
- Points
- 113

All information provided is for informational purposes only and does not call you to take actions that violate the law!
In this article, we will talk about network security when conducting any gray cases.
I will not leave links, specific schemes, etc. because I want you to develop yourself, understanding the full degree of responsibility. So turn on your head and look for methods on your own. This will be general information for beginners. More thought than a call to action or an explanation of some schema.
So let's get started. I hope it's no secret for you that every day you leave a ton of different information about yourself on the Internet. Every day, applications on your smartphone / laptop go online about their business and thus de-anonymize you. Not to mention the fact that many of them are simply following you.
For example, the Facebook mobile application starts collecting information about you as soon as you turn on the device. There are also a bunch of nuances, for example, the VPN was suddenly cut off and the traffic went directly, applications climb into the network bypassing the VPN, and so on.
On the network, you leave your IP, mac address, cookies, data of the network card, modem, router, device hashes, screen numbers, keyboard, motherboard.
Believe me, the manufacturer stores this data and in which case it all can serve as evidence in your own case.
For not particularly criminal actions, all this can be hidden according to the scheme: VM + VDS + VPN.
However, if you have done too many dirty deeds, then it will not save you. it all depends on the desire with which they will look for you, and how you confuse your tracks.
For example:
you live in Russia and scammed a shkolotron for 1000 rubles, then there is a small probability that they will look for you, but if Major Doigrales sees a foreign ip, then with a probability of 95% they will be scored on this matter.
But if you steal a thick pack of greens from the bank accounts, then no VMs, Dedics, Vpn and Soks will save you.
What follows from all this? What did I mean by that?
The first rule of the Internet is not to upload yourself to the Internet.
- Don't leave your traces on left-handed accounts
- For dark deeds, come to an internet cafe in another city and coo through the local wi-fi (But don't forget to shine your face under the cameras)
- Do not take phones with you, even without SIM cards. Leave them at home.
It's all about time, and do not forget about all the points of approach to your left wallet, or the whole business.
Imagine the situation
You decided to breed a mammoth for 150k rubles.
They introduced themselves as some kind of bank agent, etc., it doesn't matter.
He throws money at you.
You have connected vds + vpn.
Suppose that you go online from a modem.
You fucked it up, money on wallets for laundering.
Now investigation
The cops see the IP.
He leads them to the VPN.
They put pressure on him by law and promise to solder assistance in the crime.
If the VPN is not the most slag, it will resist for a while ... It's even better to take a foreign one, so that it will take longer to fuck with it.
In this case, all the bullshit will take 3-4 months.
After, when the VPN fought to the last, or maybe sluggishly resisted for the sake of decency, they get the IP of your Dedicated Server.
And then they see that he is USA.
Paperwork, send a request there.
Paperwork answering a request with your real IP. (It is also worth cleaning the cookies, but it's better to take the fuck out of your grandfather altogether)
Solving problems with the USA will take another 2-3 months.
Let's say they received your real IP, although everything is cut off on the Dedicated Server (RDP).
And then there are 2 options
- You worked in an internet cafe. Half a year has passed. And the employees there can change several times a month, they don't know you by sight. Recordings from cameras, perhaps no longer. (But you trade less with your face! You never know what)
- You worked from the left laptop via a modem. Simka is left, the seller who sold it to you no longer remembers you, he has people like you every day ... They are looking for you by sim card, but it has long been gone, blocked, reissued and sold to someone.
Further, all the details of the card of foreign banks, etc., order not for yourself and not at your address, pay for everything through the terminal, wearing inconspicuous clothes. The mask would also go out into the night. Generally ideal.
Telephone
The phone should not be yours, your friend's, friend's girlfriend's heifer's brother and your cat. It must be purchased from the radio market. An ordinary, old, push-button telephone. Receive SMS or call.
Switch on the phone only when needed and immediately cut it off, preferably not with a button, but simply pull out the battery.
Well, it is clear that the house should not be turned on, not turned on in your area, in your city, if it is not a giant, too.
And if it is a giant, then drive off to its other end, and leave the main phone at home TURNED ON. Why included? Because the opera will be watched, who disconnected in the cell, and who appeared. And so on, cell by cell. Are you sure that in a big city many phones turn on and off along with yours? I'm not.
Ideally, after which either large all the machinery into the river, scraps into the fire. Well, he seems to have told everything, I hope you knew all this and did not allow any such jambs.