Home
Forums
New posts
Search forums
What's new
New posts
New profile posts
Latest activity
Members
Current visitors
New profile posts
Search profile posts
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Search forums
Menu
Log in
Register
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Home
Forums
CARDING & HACKING
Anonimity & Security
How to Maintain Complete Internet Anonymity in 2023
Message
<blockquote data-quote="Carders" data-source="post: 257" data-attributes="member: 17"><p><h3>Encrypted backups</h3><p>Even if you remain anonymous, you still need to back up and store large files. Sometimes it is required to give access to them to other people. Stay away from Google Drive and Dropbox as there is no privacy protection like encryption and no anonymity.</p><p></p><p>It is best to make backups locally on an encrypted external hard drive. Crashplan offers a free version of its program for this.</p><p></p><p><img src="https://helpugroup.com/wp-content/uploads/2020/01/backblaze-web-app.png" alt="backblaze-web-app.png" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p></p><p>If you want a cloud service, you need a trusted provider. Choose a service like zero knowledge, which allows you to set your own encryption keys. This is available in <a href="https://spideroak.com/" target="_blank">SpiderOak</a> , iDrive, BackBlaze, Crashplan, which will prevent the ISP from decrypting your files.</p><p></p><p>If you want to work with Google Drive, Dropbox, or other storage without encryption, you can encrypt your files first before sending them to the cloud.</p><p></p><h3>Webcam Security</h3><p>It is known that webcams can be activated remotely and spy on users. Mark Zuckerberg and the head of the FBI even put duct tape on them.</p><p></p><p>Malicious applications can remotely activate webcams. Real-time antivirus protection and periodic antivirus scans can help protect against this. If your laptop has an LED that lights up when the camera is activated, make sure that LED is working. If you don't want to tape up the camera with duct tape, cover your laptop when you are not using it.</p><p></p><h3>Securing Your Wi-Fi Router</h3><p>Many users do not even think about changing the router settings after purchasing it. Unsecured routers can be targeted by attackers. You can intercept traffic, read it, make changes to it. If you are on someone else's Wi-Fi network, it is advisable to use a VPN.</p><p></p><p>If you want to remain anonymous, it is important to change the login and password for entering the router settings, update the firmware, set the most severe encryption level (usually WPA2), restrict incoming and outgoing traffic, disable WPS, disable unused services, check port 32764, enable and read logs, exit the router after shutdown.</p><p></p><h3>iOS and Android are not good for anonymity</h3><p>If you choose an Android or iOS device based on anonymity, use Android. However, even here, complete anonymity is not available to you.</p><p></p><p>It is much more difficult to maintain anonymity on a smartphone than on a computer. Tor's anonymity tools are not mature enough to work well on mobile devices. Apple and Google are closely related to these devices. You can access onion sites using the Orbot Android app, but that is where your options are limited. There are no official Tor browsers for iOS.</p><p></p><p>There are no living operating systems with which smartphones can work, like TAILS on computers.</p><p></p><p>Smartphones have IMEI numbers, MAC addresses, operating system vulnerabilities that cannot be closed and that can be used to identify a specific device when it goes online. Since manufacturers usually make changes to Android, it is difficult to tell what vulnerabilities are in specific devices. Apple and Google can track any iOS and Android device, respectively.</p><p></p><p>Applications constantly communicate with servers on the Internet, transferring data back and forth. This data allows you to track users. Even something as simple as a software keyboard can be used to analyze activity. Cameras and microphones can be hacked to spy on users. When the device receives a signal from the cell tower, its location is determined. In general, there is a lot going on on Android and iOS that users cannot control.</p><p></p><p>While it seems pointless to try to make smartphones completely anonymous, you can make them much more private. On Android you can encrypt your device, iPhones are encrypted by default. Using VPN encrypts traffic, you can also set a self-destruct sequence if you enter your password or PIN code incorrectly several times.</p><p></p><p>Finally, companies like Silent Circle are making Android smartphones with security in mind. For example, Blackphone is fully</p><p>encrypted and works with multiple virtual phones to categorize data. Silent Circle offers a subscription service for iPhone privacy. As mentioned above, confidentiality is ensured here, not anonymity. The contents of the smartphone will be protected, but it will be possible to find out whose smartphone it is.</p><p></p><h3>Beware of the Internet of Things</h3><p>The Internet of Things opens up new possibilities for hackers and espionage. Many IoT device manufacturers think about security as the last thing. A simple note of what time of day a smart air conditioner turns on can provide clues about the owner's habits. Critics have warned of the dangers of working with devices like the Amazon Echo, which always listen to voice commands, even when turned off.</p><p></p><p>Depending on your network activity, this could be a threat to the user's anonymity. Use IoT devices with care.</p><p></p><h3>Create a list of necessary measures</h3><p>No anonymity tool is perfect, not even Tor. This does not mean that they are ineffective. While wealthy corporations or government agencies can spend a lot of time and money analyzing Tor traffic and ultimately find the person they are looking for, it is more likely that the user will make the mistake of impersonating themselves.</p><p></p><p>How can you avoid such mistakes? You can make a list. Whenever you want to remain anonymous online, check the list. Write it down on a piece of paper, but do not write down any logins, passwords or other identifying information here. This is what the list might look like:</p><ul> <li data-xf-list-type="ul">Connect to VPN service without logs</li> <li data-xf-list-type="ul">Go online with Tor Browser / Tails</li> <li data-xf-list-type="ul">Use a DNS server without logs</li> <li data-xf-list-type="ul">Log out of all online accounts after you finish work</li> <li data-xf-list-type="ul">Close all applications and background services with an internet connection</li> <li data-xf-list-type="ul">Disable and block all tracking in the browser and operating system</li> <li data-xf-list-type="ul">Send emails via temporary email</li> <li data-xf-list-type="ul">Register new accounts and log into them via temporary email</li> <li data-xf-list-type="ul">Find information with DuckDuckGo and StartPage</li> <li data-xf-list-type="ul">Mix bitcoins and use third-party wallets</li> </ul></blockquote><p></p>
[QUOTE="Carders, post: 257, member: 17"] [HEADING=2]Encrypted backups[/HEADING] Even if you remain anonymous, you still need to back up and store large files. Sometimes it is required to give access to them to other people. Stay away from Google Drive and Dropbox as there is no privacy protection like encryption and no anonymity. It is best to make backups locally on an encrypted external hard drive. Crashplan offers a free version of its program for this. [IMG alt="backblaze-web-app.png"]https://helpugroup.com/wp-content/uploads/2020/01/backblaze-web-app.png[/IMG] If you want a cloud service, you need a trusted provider. Choose a service like zero knowledge, which allows you to set your own encryption keys. This is available in [URL='https://spideroak.com/']SpiderOak[/URL] , iDrive, BackBlaze, Crashplan, which will prevent the ISP from decrypting your files. If you want to work with Google Drive, Dropbox, or other storage without encryption, you can encrypt your files first before sending them to the cloud. [HEADING=2]Webcam Security[/HEADING] It is known that webcams can be activated remotely and spy on users. Mark Zuckerberg and the head of the FBI even put duct tape on them. Malicious applications can remotely activate webcams. Real-time antivirus protection and periodic antivirus scans can help protect against this. If your laptop has an LED that lights up when the camera is activated, make sure that LED is working. If you don't want to tape up the camera with duct tape, cover your laptop when you are not using it. [HEADING=2]Securing Your Wi-Fi Router[/HEADING] Many users do not even think about changing the router settings after purchasing it. Unsecured routers can be targeted by attackers. You can intercept traffic, read it, make changes to it. If you are on someone else's Wi-Fi network, it is advisable to use a VPN. If you want to remain anonymous, it is important to change the login and password for entering the router settings, update the firmware, set the most severe encryption level (usually WPA2), restrict incoming and outgoing traffic, disable WPS, disable unused services, check port 32764, enable and read logs, exit the router after shutdown. [HEADING=2]iOS and Android are not good for anonymity[/HEADING] If you choose an Android or iOS device based on anonymity, use Android. However, even here, complete anonymity is not available to you. It is much more difficult to maintain anonymity on a smartphone than on a computer. Tor's anonymity tools are not mature enough to work well on mobile devices. Apple and Google are closely related to these devices. You can access onion sites using the Orbot Android app, but that is where your options are limited. There are no official Tor browsers for iOS. There are no living operating systems with which smartphones can work, like TAILS on computers. Smartphones have IMEI numbers, MAC addresses, operating system vulnerabilities that cannot be closed and that can be used to identify a specific device when it goes online. Since manufacturers usually make changes to Android, it is difficult to tell what vulnerabilities are in specific devices. Apple and Google can track any iOS and Android device, respectively. Applications constantly communicate with servers on the Internet, transferring data back and forth. This data allows you to track users. Even something as simple as a software keyboard can be used to analyze activity. Cameras and microphones can be hacked to spy on users. When the device receives a signal from the cell tower, its location is determined. In general, there is a lot going on on Android and iOS that users cannot control. While it seems pointless to try to make smartphones completely anonymous, you can make them much more private. On Android you can encrypt your device, iPhones are encrypted by default. Using VPN encrypts traffic, you can also set a self-destruct sequence if you enter your password or PIN code incorrectly several times. Finally, companies like Silent Circle are making Android smartphones with security in mind. For example, Blackphone is fully encrypted and works with multiple virtual phones to categorize data. Silent Circle offers a subscription service for iPhone privacy. As mentioned above, confidentiality is ensured here, not anonymity. The contents of the smartphone will be protected, but it will be possible to find out whose smartphone it is. [HEADING=2]Beware of the Internet of Things[/HEADING] The Internet of Things opens up new possibilities for hackers and espionage. Many IoT device manufacturers think about security as the last thing. A simple note of what time of day a smart air conditioner turns on can provide clues about the owner's habits. Critics have warned of the dangers of working with devices like the Amazon Echo, which always listen to voice commands, even when turned off. Depending on your network activity, this could be a threat to the user's anonymity. Use IoT devices with care. [HEADING=2]Create a list of necessary measures[/HEADING] No anonymity tool is perfect, not even Tor. This does not mean that they are ineffective. While wealthy corporations or government agencies can spend a lot of time and money analyzing Tor traffic and ultimately find the person they are looking for, it is more likely that the user will make the mistake of impersonating themselves. How can you avoid such mistakes? You can make a list. Whenever you want to remain anonymous online, check the list. Write it down on a piece of paper, but do not write down any logins, passwords or other identifying information here. This is what the list might look like: [LIST] [*]Connect to VPN service without logs [*]Go online with Tor Browser / Tails [*]Use a DNS server without logs [*]Log out of all online accounts after you finish work [*]Close all applications and background services with an internet connection [*]Disable and block all tracking in the browser and operating system [*]Send emails via temporary email [*]Register new accounts and log into them via temporary email [*]Find information with DuckDuckGo and StartPage [*]Mix bitcoins and use third-party wallets [/LIST] [/QUOTE]
Name
Verification
Post reply
Home
Forums
CARDING & HACKING
Anonimity & Security
How to Maintain Complete Internet Anonymity in 2023
Top