Jump to content

foofoolame

Active Members
  • Posts

    11
  • Joined

  • Last visited

Posts posted by foofoolame

  1. so in summary lets see:

    at a random point in time purchase computer/laptop with cash from non-corporate/chained store. such as a local mom and pop store; wearing clothes/costume i normally wouldnt wear in case their cc cameras are uploaded/accessible by 8ig 8rother..

    purchase vpn anonymously using bitcoins

    enter no incriminating data whatsoever on the device

    connect randomly at different wifi locations/wardrive everytime i want to use it

    use tails live cd always

    (this only applies to the device/personality i want to remain more secure)


  2. Regarding TOR, for accessing the internet proper you basically get a secure line to the exit node, but beyond that anybody can see the traffic. So long as this traffic doesn't identify you in any way, shape or form, there's nothing to worry about. The smart thing to do is to have a dedicated machine somewhere in your house other than where you typically go about your computer-y things. This is a psychological barrier if you will - being in a different setting when you use the TOR box will help reinforce the idea that you shouldn't be doing your 'normal' computer-y things here. You can use personally identifying services from your TOR box, such as email, IM, twitter, even facebook. BUT you must be aware that no information provided here must refer to your real identity. You can't (re)tweet similar things (or worse, retweet your other identity's tweets), you can't like similar stuff (or worse, like your other identity's posts), etc. Basically, you need to focus as much as you can the online activity you do on your TOR box on the one thing you actually need the TOR box for. If you don't want the email account you access from your TOR box to end up being linked to the twitter account you use from your TOR box, use a different email address for registering (duh) and reboot your Tails distro before doing so, so you end up with a new TOR session for this activity. If you want to use these things simultaneously, acquire an additional machine to function as a TOR box, or run your batch of TOR boxes from a VM. Make sure the various VMs are rediculously easy to keep apart. Basically, try to have it that each VM on login goes straight into the application you want to use from that TOR box. If you receive a web link (via email, twitter or what have you) and you really want to click it, don't copy-paste the link to your general web browsing TOR vm but open it from within the TOR vm in which you received the link, otherwise it might happen that the two separate sessions can be linked and 'they' would be one step closer to identifying you.

    Moving on, when you talk to people about anonymity, they tend to leave out real life. Which is BAD. You must never ever admit to knowing anything you did from your TOR box. In fact, nobody can know you even have a TOR box and if you can make them believe you never use TOR, all the better.

    If you performed some amazing hack, you can't tell anybody about it. It never ceases to amaze me the amount of stupid people that feel a need to brag about the crime they got away with and, in doing so, get caught. Like this idiot. Another example was a few years ago here in .nl where a large group of people were arrested for street racing. The police, when interviewing them, said they had the whole thing on tape and could identify everybody easily so it would look better if they just confessed. Only 1 guy held firm and claimed he was innocent. He was the only one to not go to court over this because it turned out the police interrogator lied - there was no tape of the street race but now there were quite a few taped confessions...

    If you do something illegal online and you feel you must do so using some nifty handle (something like, say, deface a website), you use that handle ONCE AND ONLY ONCE! The smart money is on not using a handle at all.

    If you do something illegal simply to impress others, MOVE THE FUCK OUT OF YOUR MOM'S BASEMENT AND GET A FUCKING LIFE! If the only way to impress your friends is to do something illegal, you need better friends.

    And finally, just because something is illegal doesn't mean it's wrong. There are plenty of lists to be found online of stupid laws, drafted in a time when pissing in a bucket was the pinnacle of technological achievement, that make some truly weird things illegal. For instance it's illegal to mispronounce the name Arkansas. Know what you're doing. Know why you're doing it. Understand the law and how it applies to you and be willing to accept the consequences of your actions.

    thank you!! appreciate the clarification on tor and using it better. and perhaps the greatest quote so far haha.

  3. I have skimmed and read a couple of things...I could be wrong here and there.

    TOR as it was is no longer secure the FBI has shutdown the silk road and if not other website's and is monitoring traffic most computer hackers are going to the other platform.

    Which I forget is called since its been so long since I have used a Dark net which basically use's PEER to PEER connections to make a unique anonymous link to the dark net and is what most people are using now and using a IRC function host to host to be able to talk about business or other related things.

    The only reason you should be using a VPN or anything like that is if you are doing illegal business or wanting to find illegal business or finding top secret documents/knowledge. There is about 400 websites that require some computer hacking knowledge to access them last I checked which was a hell of a long time ago.

    There is a point of wanting to protect privacy and just going completely offline because you are trying to steal information.

    ----------------------------------------------------------------------------------------------------------------------------------------------------------

    If you are trying to go completely anonymous make sure you use software that doesn't have to pay to get because then your bank and everything will see that unless you use bitcoin and cyberghostvpn is a good VPN to use since they accept bitcoin as a currency.

    thanks for the post, yeah i just want privacy thats all. and just to understand security from an IT stand point as ive passed my A+, im in Net+ and will be doing Sec+ after my mcsa/mcse on the Microsoft vendor specific side. also considering doing ecouncils ENSA<CEH<LPT but those are just fancy smancy stuff id be happy for just sec+ and alot of lab/virtual hands on stuff in my house.

    heres what ive looked at for vpn from PIA https://www.privateinternetaccess.com/blog/2012/04/how-to-buy-bitcoins-anonymously-in-the-us-instantly/

  4. So long as no one knows you do this, the machine you use has no HDD/Storage, run off live media, and the MAC address is always spoofed, and you never talk to anyone you know, never login to your accounts, and never do anything that can identify you, then yes, you might become more difficult to find, but once someone gets to you in some form and can identify you, all you become then is a moving target they have to predict where you are going to next. It's not impossible, but it's damn near impossible unless you have no one in your life and go it alone forever with no way to tie you to anything you do and are in the real world. Once you cross that boundry, it is then just a matter of how much time and money does someone have to waste on trying to go after you, and unless you are wanted for murder or some large crime, for the most part no one will bother to look for you. You'd need to make an impact that warrants the effort to go after you really, which is why kids in groups like anonymous get popped since they are attacking credit card data, personal and government information that impacts companies, military or such, and when they come looking, they'll put someone down, even if it's the wrong person in the process. It's like first rule of fight club. Don't talk about fight club. Second you do, all shit hits the fan.

    thank you for your imput! yeah, thats a sad life to live. but even more sad that to thee extent one would have to go to NOT be a variable or a piece of data to analyze/trace and profile.

    i more or less am just trying to learn more about security thats all. my a+ and even now net+ classes obviously briefly skimmed over that because it wasnt the foundation/course meant to be taught. once i get to sec+ and have some hands on with some labs/vms ill start feeling more at ease. you can never learn enough, nor have the time to but its what effort can i put into learning the most core fundamental/crucial bits of information within the period of my prime intellectual mind.

  5. Why did you use the Tor browser to register? You seem to be connecting in without it now so invalidates using it in the first place.

    because i was trying to seperate my true me from this me. but as just this information/conversations concerned its nothing earth shattering and no more conscpicuous than the rest of my past online preferences.

    i was asking in general, what are some ways on tightening up my personal security. not specifically for this forum how can i anonymously converse this information to you all. more or less, yes your right. it invalidates the purpose, its the principle of how much effort vs. the goal/point of why your trying. my goal here is just to aqquire information. behavior patterns can be manipulated everyday. who knows, i could stay off technology for a year, change address, have someone else buy a computer in cash for me, and wardrive on wifi and not connect to a single non-secure/tor browser or site.

  6. It's funny you say that about the island, cuz i was gonna make a joke about buying a boat and becoming a pirate in my rant =P

    The thing about TOR is it really is an effective proxy except in the 2 most important places, checking in and checking out. Checking out is the point where you're vulnerable and why the government started creating their own exit nodes. And there's nothing you can do to change your odds of getting a "legit" exit node. Otherwise darknet wouldn't be darknet, it's random. So chances are, if you're constantly using TOR to block yourself, SOME of those times, a federal agent that had no idea who you were before, now has a .cap file with whatever you were doing there.

    So there's 2 perspective's, mask yourself by using TOR for EVERYTHING, so the fact that you're there doesn't mean your doing something bad. Which would take forever to do anything cuz TOR=SLOW

    Or.... Use it VERY sparsely so hopefully you won't catch a fed exit node. I personally haven't used it since the first raid on Silk Road, and even then i just browsed around the forums a few times cuz i was curious.

    "i was thinking, tails linux on VM<(VPN(private internet access ect)/My own onion router using pi 2, tor browser."

    If you can find a logless VPN company it would help, but most companies cooperate with the fbi, it's just how it is. So you really need to think how bad you need to keep your activity private. If you could find the most trustworthy VPN company in the world and exit through them....

    I don't know you, and i don't judge people, but your considering doing alot of stuff that in the end would probly keep your info from everybody except the people you're trying to hide from. If you're doing something on the scale that the N$4 would be interested, you're not hiding from them. There's no scenario, it's just how it is.

    Hammond was a friggin beast, and he still caught 10 years. You think he wasn't doing everything possible to hide his actions? How about Sabu? Yes he's a punk-ass-snitch, but at one point he was an extremely intelligent cyber criminal... Probly one of the only "Criminals" out of everybody that he sent to prison ironically. I forget which member of the Lulz boat that stayed using other people's wifi -> TOR, so they ended up following the wifi signals to pinpoint where his bedroom was to prove it was him. Literally the wifi frequencies in the air....

    I mean it's possible to be a ghost "hacker" MAYBE, but not an anonymous person who uses the internet.

    If you were trying to get away with stuff, i mean, laptops that can in no way trace back to you or anyone you know buying them. Getting prepaid wifi cards from some magical place that doesn't have security cameras....Never hacking from the same location twice.....stealing like a new laptop every week or month and bleaching the data daily just in case... You'd have to be pretty dedicated to it. If they're looking for you, it only takes one slip. Log into you're email from your home computer one time by accident cuz you forgot it was your "other" account, that's it, they know you now. Please understand "EVERYBODY" i'm speaking hypothetically here for the sake of conversation.

    I love to learn about security, but i really don't do anything that would piss off the government. So i can't give you first hand experience how to evade. I've read some great articles about OP-Sec and seen some great speeches about it.....I mean, you need to understand, this conversation where having now, by tomorrow Google, Facebook, Amazon and any other interested parties will probly have it logged on their server. If you're interested in getting away with something, you've already exposed yourself by posting here without being anonymized. It's like leading 2 lives that can never in any way intersect. Its risky, and don't sound fun. If you wanted to be a black-hat, it's your seperate identity that has no connection to you.

    For instance like alot of the Anonymous members who got locked up, had no business being arrested in the first place. Except they pissed off the government. Some of them cats really were freedom-fighters trying to help. It's still crazy to me that the biggest criminal amongst them flipped in an hour and got no jail time.... If you check out that vid i posted earlier, that guy actually works for the government. He references a book called like "5 crimes a day". He says there isn't a person in the world, that if he's targeting you he can't find at least 5 crimes a day he could charge you for. Like even your grandma.

    So if you're like coming from the perspective of like, "this" or "this" seems like a good hustle, i wouldn't recommend it. And if you're gonna do something, don't try to get rich.....hypothetically. If you're not worth anybodies time......maybe

    Even Kevin Poulson got caught, and he WORKED for them.

    This is a white-hat forum tho, and i feel like i'm bordering on violating TOS...

    very awesome, in-depth post my friend! yeah i used tor browser to create disposable email which sucked trying to pass captcha when creating my account for this site. its all a charade of interconnectivity and not being able to see the bars in front of us. the internet was never created for privacy, online banking, personal information to be anonymized ect.. its just scary the times we live in and the direction that technology as a whole is going. let alone all the specifics. yeah swartz documentary was truely sad. im not doing anything more than the average american i guess you could say. if there was something i was doing wrong it is asking questions, not being complacent with whats happening in the world, and formulating my own take on the world and what purpose my life is to impact it for the greater good. and those are beliefs worth dying for.

  7. It's impossible to remain completely anonymous and be "100% SURE" about it nowadays. I'd say VPN + TOR + Proxychains is your best shot, but TOR's nowhere near as anonymous as it used to be. No idea what percent of exit nodes is actually feds now, but i bet it's a high number. I don't wanna go into a rant about the N$4/Trapwire/Datamining, but we live in an age where everything that you're paranoid about the government doing is 10 years late and now Google and Facebook actually have all that technology too. It's one big circle-jerk of trading/selling data

    If you're worried about things like keeping your CC & Banking info safe, buy Lifelock. If you want privacy, my best advice would be to start researching time travel maybe.... Everything that Anonymous was fighting for years ago is already in the past and too late to do anything about. If you really wanted to be anonymous you'd have to be an excellent criminal that stole your computer, uses a giant proxychain of the 30 nearest wifi signals you can hack before you even open your browser, never use google/facebook/twitter, keep electrical tape over the camera of every phone and laptop you own.... I mean even the Amazon Fire Tv STB has a microphone in the remote designed so you can never turn it off.

    It's sad to say that it's best to just accept it. If google wants to sell facebook and fbi proof that i watch porn and know how to use linux, good for them. I just do my best to stop buying products made by companies that profit off of spying.on me. The only exception is the fact i'll always have an Android phone so google will always get my business there. But other than that, if i know a company is making money off of data-mining me, i'm not also gonna give them MY money by buying their products.

    Chances are if you have a reason to hide something it's already not a secret. That's my opinion on the subject anyway....

    This is a good video on the topic of how far gone anonymity is

    (Ok i ranted a little, sorry =P)

    its OK TO RANT!! i love rants, thats how i know im getting someones honost opinion.

    i was thinking, tails linux on VM<(VPN(private internet access ect)/My own onion router using pi 2, tor browser.

    does anyone want to collectively save up our bitcoins and buy a large island landmass and we can start everything over? :p

  8. Hello all! im going to be asking probably some of the most FAQ's regarding personal home networking privacy and what we call thee Internet.


    What are peoples position regarding anonymity and browsing the internet? i realize there will never be true anonymity but i just want to be able to give myself the best shot.


    From using VM's with 'Tails distro, personally created or paid VPN(PIA ect) following, onion routing as an alternative to either personally or paid VPNS.


    These are just some of my thoughts on what im considering/read.

    i realize primarily Linux would be the preferred method of any internet activity but i would especially like to hear for windows as well.


    Thanks!

×
×
  • Create New...