- Thread Author
- #2
More likes, more guides
[HIDE]
Time passes, something changes. But the essence remains unchanged!
Someone has known all this for a long time,
but for someone it wont hurt to read...
1. Complete anonymity does not exist in nature at all!
First, we should understand that we do not need complete anonymity. It is enough to confuse the digital fingerprint so that unraveling is unprofitable, and the effort and time spent do not pay off in the result. To create such a level, you do not need any special knowledge or skills; you just need to have your head on your shoulders and read this FAQ in full.
2. Why is all this necessary?
Most of the cybercriminals were identified not thanks to the traces left on the network.
It will be very sad if you are not identified in hot pursuit, your loved ones do not turn you in, and so on, but are caught stupidly because of your laziness and neglect of the basic basics of safety.
You can hide in a bunker with a laptop and a router, get a bunch of VPN services, but what's the point of security if you order pizza from the same laptop?
3. I am not familiar with the basics of programming, I dont understand anything about it and I dont want to understand it at all! What to do to avoid getting burned?
First, let's define your activities:
1) I am an ordinary ordinary user, I like to joke about moms/dads/grandfathers/grandmothers without any illegal actions. I sit on ******* in the evenings, after Ive done my homework and click on buttons.
- They wont find you, because no one fucking needs you. You can take off your tinfoil helmet.
2) There are intentions of some illegal activity in the future. For example, working in a shop in an online position.
- Buy a decent laptop, better hand-made, a decent USB modem or router
- Install Tails on a flash drive (you can find a huge amount of materials on this topic in the public domain)
- Pump up the "Security settings..." Tor Browser settings to the maximum
- Use a password manager to store and generate complex passwords
- Use OTR or GPG message encryption (for example, in Jabber)
- Give up social networks and do not transfer any personal data through the above-mentioned devices
This will be quite enough.
4. What kind of Tails are they and what do they eat them with?
Tails is a pre-configured operating system designed to provide privacy and anonymity. With its help, all traffic is routed through the Tor network.
It leaves no traces on the device from which it is used, does not store any data, and after each reboot it returns to its original form; after shutdown, the RAM is erased. A very convenient thing.
You dont have to:
- suffer with TrueCrypt, because the encrypted Persistent section is created on it in a couple of clicks
- install Tor Browser, since it is already installed with even greater protection, upgrade it to the maximum
- install programs for storing passwords, transferring files, deleting metadata, working with cryptocurrency, encrypting files and messages, software for editing photos/videos/audio files
Because It's all already installed and ready to use!
Download, write to a flash drive (minimum 2 GB), boot from it, install on a new flash drive (from 8 GB), boot from a new flash drive, activate Persistent.
Mission Complete! The OS is ready to use!
5. What characteristics should a computer have for Tails and what else is needed?
I strongly recommend buying a separate laptop that will not be connected in any way with your personality!
What you need for Tails:
- RAM from 4 GB. You can run on 2 GB, but there may be some slowdowns.
- 1 USB 3.0 port, for speed of work from a flash drive
- the processor is only 64bit (x86-64), it is difficult to recommend a specific model.
Requirements for a flash drive:
- Not SanDisk, PNY, Aegis
- USB 3.0
- necessarily on MLC chips, this will give high survivability
- from 8 GB (usually the larger the volume, the higher the speed)
I recommend buying 2 flash drives at once. Make one of them a backup, also install Tails on it and copy all important data to it from time to time, in case one of them fails.
6. What about instant messengers? Skype, WhatsApp, Viber, Telegram do they have encryption?
They cannot be used for the following reasons:
- Central server. You can't create your own.
- Closed source code. What these programs actually do and where they dump everything is unknown.
- Encryption is not using open proven algorithms (GPG/OTR), but using our own - you will be decrypted when needed.
- Linking to a SIM card or device.
7. Why not just randomly chat online and/or communicate in predetermined words that others won't understand?
Hiding the subject of the conversation is not enough, since the very fact of the conversation remains: its sides/time/place/from which devices it occurred and other data that will remain on the server. And you cant trust the encryption of some online chats.
8. What messenger can you use then?
Those that work using the jabber protocol (XMPP), with open source. They are time-tested and support encryption of client-client correspondence GPG and/or OTR (that is, no one outside will see it, not even the server owners): -
Psi+ (GPG, OTR) polished Psi with additional functions
- Pidgin (OTR) old proven client, built into Tails
For Android:
- Conversations (GPG, OTR)
- Xabber (OTR)
9. What is the difference between OTR and GPG encryption in simple terms?
To put it simply: OTR requires the presence of the interlocutor online, but provides deniability (after the conversation, the keys are destroyed and the messages can no longer be decrypted, even if the keys were confiscated from both parties).
GPG is much older, more reliable and has more functionality (you can encrypt files, sign messages, verify signatures), keep your keys in an encrypted section, have complex passwords and make backups and there will be no problems.
10. How to store files and do they need to be encrypted?
Of course, you can encrypt your hard drive with TrueCrypt, but can you quickly destroy it if something happens? Is it easy to hide? Therefore, it is more practical to use an easily destructible medium. For example, on a flash drive with Tails in the Persistent section (this is a separate folder in which the contents are instantly encrypted).
11. Where to upload photos/videos/audio files?
For foreign hosting and preferably in .onion, remove metadata from files before uploading.
12. How to delete metadata?
You can use the MAT program.
13. How to safely send/receive photos, videos, audio files to your interlocutor? Is it not possible via Jabber?
Using OnionShare is a secure file sharing service on Tor.
You cannot send files directly via Jabber, only through third-party servers, it is unsafe and should not be done.
14. What about communication through left phones with left SIM cards? Proven method!
Pay attention to point 7. Your location, voice, fact of communication, subject of communication remain, there is no encryption.
15. What about Tor Browser?
1) This is a US development and all that?
- Yes, just like processors, RAM and everything else. But Tor is open source and has stood the test of time.
2) Can JS (JavaScript) scripts lead to deanon if they are allowed?
- Yes, enabled JS directly leads to identification of your device.
3) What does my ISP see when I use Tor?
- Just the fact of using Tor. How exactly do you use it: what sites you visit, what messengers you use, correspondence, etc. - none of this is visible.
The provider can also see that you are using not just Tor, but Tails.
4) What are the general rules for using Tor that need to be followed?
- You should not accept an unsigned certificate (which may be the certificate of the output node)
- It is advisable to exclude the CIS countries and Russia from the IP chain
- In order not to leave your correspondence on servers, you should use client-client encryption (OTR\GPG)
- Do not download torrents via Tor, It is advisable not to download anything at all
- Use https:// versions of sites
- Have complex and different passwords everywhere
- Everything else that is described in this FAQ. I will not repeat myself
16. What about the MAC address of the device? What should I do?
The Wi-Fi module, laptop network card, as well as the router or modem have Mac addresses.
Sites DO NOT see your mac address. But they are seen by your provider and neighboring devices (other peoples routers and Wi-Fi points) and merge this information, for example, into Google/Yandex to determine the location. Exit: turn off Wi-Fi modules and connect to the router via an Ethernet cable.
Every time you start Tails, it automatically changes the mac addresses of your Wi-Fi module and laptop network card.
17. Do you need a VPN in conjunction with Tor? Isn't one Thor enough?
Tor is experimental software that may potentially contain vulnerabilities, although it is constantly being updated. In addition, the VPN hides the fact of using Tor from the provider, which is very important. Well, double protection has never been superfluous.
18. Which VPN service is better to choose?
A good VPN service must meet several criteria:
- the servers and the company itself are located not in Russia or the USA
- support work via OpenVPN (only configuration files are downloaded, and no program is installed from the service)
- payment using cryptocurrency
This is only part information that may be useful to you to set up anonymity.
If you dont want to suffer with all this, then just contact an information security specialist. They can be found on many darknet sites.
Well, as always, Ill say one last thing - take care of yourself!
[/HIDE]
[HIDE]
Time passes, something changes. But the essence remains unchanged!
Someone has known all this for a long time,
but for someone it wont hurt to read...
1. Complete anonymity does not exist in nature at all!
First, we should understand that we do not need complete anonymity. It is enough to confuse the digital fingerprint so that unraveling is unprofitable, and the effort and time spent do not pay off in the result. To create such a level, you do not need any special knowledge or skills; you just need to have your head on your shoulders and read this FAQ in full.
2. Why is all this necessary?
Most of the cybercriminals were identified not thanks to the traces left on the network.
It will be very sad if you are not identified in hot pursuit, your loved ones do not turn you in, and so on, but are caught stupidly because of your laziness and neglect of the basic basics of safety.
You can hide in a bunker with a laptop and a router, get a bunch of VPN services, but what's the point of security if you order pizza from the same laptop?
3. I am not familiar with the basics of programming, I dont understand anything about it and I dont want to understand it at all! What to do to avoid getting burned?
First, let's define your activities:
1) I am an ordinary ordinary user, I like to joke about moms/dads/grandfathers/grandmothers without any illegal actions. I sit on ******* in the evenings, after Ive done my homework and click on buttons.
- They wont find you, because no one fucking needs you. You can take off your tinfoil helmet.
2) There are intentions of some illegal activity in the future. For example, working in a shop in an online position.
- Buy a decent laptop, better hand-made, a decent USB modem or router
- Install Tails on a flash drive (you can find a huge amount of materials on this topic in the public domain)
- Pump up the "Security settings..." Tor Browser settings to the maximum
- Use a password manager to store and generate complex passwords
- Use OTR or GPG message encryption (for example, in Jabber)
- Give up social networks and do not transfer any personal data through the above-mentioned devices
This will be quite enough.
4. What kind of Tails are they and what do they eat them with?
Tails is a pre-configured operating system designed to provide privacy and anonymity. With its help, all traffic is routed through the Tor network.
It leaves no traces on the device from which it is used, does not store any data, and after each reboot it returns to its original form; after shutdown, the RAM is erased. A very convenient thing.
You dont have to:
- suffer with TrueCrypt, because the encrypted Persistent section is created on it in a couple of clicks
- install Tor Browser, since it is already installed with even greater protection, upgrade it to the maximum
- install programs for storing passwords, transferring files, deleting metadata, working with cryptocurrency, encrypting files and messages, software for editing photos/videos/audio files
Because It's all already installed and ready to use!
Download, write to a flash drive (minimum 2 GB), boot from it, install on a new flash drive (from 8 GB), boot from a new flash drive, activate Persistent.
Mission Complete! The OS is ready to use!
5. What characteristics should a computer have for Tails and what else is needed?
I strongly recommend buying a separate laptop that will not be connected in any way with your personality!
What you need for Tails:
- RAM from 4 GB. You can run on 2 GB, but there may be some slowdowns.
- 1 USB 3.0 port, for speed of work from a flash drive
- the processor is only 64bit (x86-64), it is difficult to recommend a specific model.
Requirements for a flash drive:
- Not SanDisk, PNY, Aegis
- USB 3.0
- necessarily on MLC chips, this will give high survivability
- from 8 GB (usually the larger the volume, the higher the speed)
I recommend buying 2 flash drives at once. Make one of them a backup, also install Tails on it and copy all important data to it from time to time, in case one of them fails.
6. What about instant messengers? Skype, WhatsApp, Viber, Telegram do they have encryption?
They cannot be used for the following reasons:
- Central server. You can't create your own.
- Closed source code. What these programs actually do and where they dump everything is unknown.
- Encryption is not using open proven algorithms (GPG/OTR), but using our own - you will be decrypted when needed.
- Linking to a SIM card or device.
7. Why not just randomly chat online and/or communicate in predetermined words that others won't understand?
Hiding the subject of the conversation is not enough, since the very fact of the conversation remains: its sides/time/place/from which devices it occurred and other data that will remain on the server. And you cant trust the encryption of some online chats.
8. What messenger can you use then?
Those that work using the jabber protocol (XMPP), with open source. They are time-tested and support encryption of client-client correspondence GPG and/or OTR (that is, no one outside will see it, not even the server owners): -
Psi+ (GPG, OTR) polished Psi with additional functions
- Pidgin (OTR) old proven client, built into Tails
For Android:
- Conversations (GPG, OTR)
- Xabber (OTR)
9. What is the difference between OTR and GPG encryption in simple terms?
To put it simply: OTR requires the presence of the interlocutor online, but provides deniability (after the conversation, the keys are destroyed and the messages can no longer be decrypted, even if the keys were confiscated from both parties).
GPG is much older, more reliable and has more functionality (you can encrypt files, sign messages, verify signatures), keep your keys in an encrypted section, have complex passwords and make backups and there will be no problems.
10. How to store files and do they need to be encrypted?
Of course, you can encrypt your hard drive with TrueCrypt, but can you quickly destroy it if something happens? Is it easy to hide? Therefore, it is more practical to use an easily destructible medium. For example, on a flash drive with Tails in the Persistent section (this is a separate folder in which the contents are instantly encrypted).
11. Where to upload photos/videos/audio files?
For foreign hosting and preferably in .onion, remove metadata from files before uploading.
12. How to delete metadata?
You can use the MAT program.
13. How to safely send/receive photos, videos, audio files to your interlocutor? Is it not possible via Jabber?
Using OnionShare is a secure file sharing service on Tor.
You cannot send files directly via Jabber, only through third-party servers, it is unsafe and should not be done.
14. What about communication through left phones with left SIM cards? Proven method!
Pay attention to point 7. Your location, voice, fact of communication, subject of communication remain, there is no encryption.
15. What about Tor Browser?
1) This is a US development and all that?
- Yes, just like processors, RAM and everything else. But Tor is open source and has stood the test of time.
2) Can JS (JavaScript) scripts lead to deanon if they are allowed?
- Yes, enabled JS directly leads to identification of your device.
3) What does my ISP see when I use Tor?
- Just the fact of using Tor. How exactly do you use it: what sites you visit, what messengers you use, correspondence, etc. - none of this is visible.
The provider can also see that you are using not just Tor, but Tails.
4) What are the general rules for using Tor that need to be followed?
- You should not accept an unsigned certificate (which may be the certificate of the output node)
- It is advisable to exclude the CIS countries and Russia from the IP chain
- In order not to leave your correspondence on servers, you should use client-client encryption (OTR\GPG)
- Do not download torrents via Tor, It is advisable not to download anything at all
- Use https:// versions of sites
- Have complex and different passwords everywhere
- Everything else that is described in this FAQ. I will not repeat myself
16. What about the MAC address of the device? What should I do?
The Wi-Fi module, laptop network card, as well as the router or modem have Mac addresses.
Sites DO NOT see your mac address. But they are seen by your provider and neighboring devices (other peoples routers and Wi-Fi points) and merge this information, for example, into Google/Yandex to determine the location. Exit: turn off Wi-Fi modules and connect to the router via an Ethernet cable.
Every time you start Tails, it automatically changes the mac addresses of your Wi-Fi module and laptop network card.
17. Do you need a VPN in conjunction with Tor? Isn't one Thor enough?
Tor is experimental software that may potentially contain vulnerabilities, although it is constantly being updated. In addition, the VPN hides the fact of using Tor from the provider, which is very important. Well, double protection has never been superfluous.
18. Which VPN service is better to choose?
A good VPN service must meet several criteria:
- the servers and the company itself are located not in Russia or the USA
- support work via OpenVPN (only configuration files are downloaded, and no program is installed from the service)
- payment using cryptocurrency
This is only part information that may be useful to you to set up anonymity.
If you dont want to suffer with all this, then just contact an information security specialist. They can be found on many darknet sites.
Well, as always, Ill say one last thing - take care of yourself!
[/HIDE]