![Cross mark :x: ❌](https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/274c.png)
![Police car light :rotating_light: 🚨](https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/1f6a8.png)
![Warning :warning: ⚠️](https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/26a0.png)
1. Anonymity in social networks
If you registered in VK (a social network), specifying your phone number, and then connected to VK via Tor, in order to write in the official group of the Zadrishchensk City Administration: "Deputy of the second convocation of the City Duma S. S. Nikiforov is a thief."
![Question mark :question: ❓](https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/2753.png)
![Cross mark :x: ❌](https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/274c.png)
2. Anonymity and Cookies
Cookies are small pieces of information that are stored in your web browser after the site has sent them to you.![Cross mark :x: ❌](https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/274c.png)
![Warning :warning: ⚠️](https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/26a0.png)
3. Many sites store IP addresses of previous actions
For example, you have registered a VPN account that you will connect to via Tor. But I registered you from my IP (because Tor is slow, and in general, that site does not accept connections from the Tor network).
![Question mark :question: ❓](https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/2753.png)
![Cross mark :x: ❌](https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/274c.png)
4. I will buy a VPN (or VPS server to set up OpenVPN) and will be anonymous
![Warning :warning: ⚠️](https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/26a0.png)
![High voltage :zap: ⚡](https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/26a1.png)
5. OpenVPN is very good, but not for anonymity
If we recall the original purpose of VPN networks, it turns out that virtual private networks, within which computers scattered around the world can access each other's local network resources. At the same time, traffic is exchanged in encrypted form, but this traffic is encrypted only for an external observer, but not for the server and clients of the OpenVPN network.
For this reason, if you have purchased a free or paid VPN account, then be prepared that the server owner can do ANYTHING with your traffic and keeps activity logs — what requests were made from which client. How many of them are "honeypots" (traps) and record activity is impossible to say, but in my opinion, 100% of paid and free VPN providers do this.
![Check mark button :white_check_mark: ✅](https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/2705.png)
6. There are 1000 and 1 ways to find out your real IP address
There are a huge variety of options. From the simplest – send a link to a controlled site and view the IP (if communicating via an anonymous messenger) or a file with a Trojan to quite sophisticated ways.
7. If you use any closed source software for illegal activities, then a backdoor is 100% installed there
Backdoors can also be found in legitimate closed-source software — as a hard-to-detect vulnerability that the manufacturer knows about, or just an ordinary stupid, cork — like backdoor-such as was found, for example, in the official firmware of routers.
As for illegal closed-source software that is distributed anonymously, please tell me, well, why not install a backdoor there? The owner won't know, and even if he does, what will he do? He will go to the police and say: I bought scripts to crack the protection of stolen phones, and I installed a virus there... I don't think he will do that.
8. Lack of understanding of the simplest technical aspects of the operation of networks, servers, applications, accumulated and available information in open sources
Phishing sites of some uneducated "hackers" can be easily found simply by analyzing where the POST request goes.
![Question mark :question: ❓](https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/2753.png)
![Warning :warning: ⚠️](https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/26a0.png)
9. The big picture
Example: infrastructure objects are being attacked and IP traces and other indirect signs lead to somewhere far away. But at the same time, the objects and methods of attack are similar to those used by a well-known hacker group.
![Warning :warning: ⚠️](https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/26a0.png)
10. Metadata in files
You need to know everything about metadata and programs to view and clean it up.
![Cross mark :x: ❌](https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/274c.png)
What do I need to do to make sure they don't find me?
One hundred percent guarantee is only the fact that you will not be searched…
A cowboy on a horse is prancing in the square... "Who's that?" "The elusive Joe. "So, really, no one can catch him?" - Yes, who the fuck needs it!
Even if you have studied the "anonymity manuals" from cover to cover, even if it is written by an understanding person, and even if you did everything correctly, but do not understand the other aspects discussed above, then your chances of "burning down" in one of the idiotic ways discussed above are quite high.