Section 1 security and anonymity settings: remove all Russian applications. Everyone is talking about the drains of Google and Microsoft, but these are pendos, and the hand of Russian security forces will come closer to a Russian person. VKontakte – collects complete information about you, tracks your actions and movements, all correspondence – are stored, and when deleting a message I will reveal a secret, you do not delete them from VKontakte, it just appears a kind of “hiding” function, as well as deleted messages, and media content is available to all users with a link. It is not advisable to use Qiwi even for everyday purchases, look for analogues, use VPN. Only the trash uses completely free VPNs. VPN is computing power that is processed on the other side of the world. No one cares about sharing this resource with you “for free”, so free VPNs make money on leaking data. Also, some free VPNs can be more dangerous than not having them in general, since every request is processed through it, and it’s easier to turn to finished VPN services, as well as information on you will be, if not more, then the same as without VPN.
Normal vpn – Proton, NordVPN , Proton has a free version. Only 3 countries are available there, but this will already increase efficiency, I also advise Mullvad that it does not collect logs, and it costs 300₽/month to use Tor. The top itself is not anonymous, so it would not have developed with complete anonymity, however, a competent privacy setting, and the inclusion of VPN along with the torus, makes it an excellent browser for finding information. delete all your accounts from social networks. Look online to see how it’s done. This will cause a clear suspicion, therefore it is necessary to remove it not immediately, but gradually. Delete any mention, try to take the place of an ordinary user who has no connections with special services – and try to find yourself, search by number, search by full name, search by your nickname / user. If you find something, immediately delete the bar: “Telegram”. Set the minimum bar for communication: applications with privacy no less than telegrams. It follows from this that you need to remove communication tools such as Viber, WhatsApp, and other slag from your device. Since 2021, Vatsapp has finally disgraced itself, and now all your data is read and fully collected, just like with VK. In general, never touch Mark’s communities (the creator of Facebook) – they are all created for the sake of profit and profit over people (Instagram, Facebook, Messenger). The company itself has often been sued for leaking personal data, and the hackers themselves regularly look for loopholes there and use them to leak you. They earn money on YOU for nothing, thanks to you – someone from above gets money for watching ads, or, by default, they use you to improve recommendation systems, something like this tik tok. I would put it in the 5th point, but it deserves special attention. Garbage on all fronts, which, in addition to degradation, again earns on the use of your data, which can be transferred to higher authorities. The data is far from being limited to “like” on the clip, not at all, everything that the phone can collect from you is partly collected by these applications, and using Tik Tok you give open doors to your phone. Tik Tok was also added to Windows 11, and it, in turn, is a failure, and even merges a snapshot of your photo from the same laptop, even when you yourself did not turn on the camera, supposedly demolish Windows to improve something there. Windows is the most convenient system, but it is the most ridiculous. Officially, it costs $300, and at the same time includes a huge spectrum of what you can get at you. Understand that the operating system is a whole machine, it’s not some kind of website or program (which collect minimal information about you), no, it’s essentially all your actions, whether they are on the Internet or playing some game. The Windows code is completely closed, few people only know what scale the operating system stores. Nevertheless, we managed to find out such things: Windows collects absolutely any key that you typed on its servers. Windows by default is interested in what you google to make money on more effective ad promotion, so Windows collects data from your webcam, records your microphone, remembers all visits on the map, and much more. Banal alternative – Linux. Linux is free software, every line of code can be viewed by you and checked. Linux is not difficult to learn, and distributions are completely possible set up for yourself, as well as free “versions” of Linux give you free software that collects practically no data. However, distributions like Debian or Ubuntu are not anonymous, their only “anonymity” – drawing an analogy, is a kind of “lack of a camera” in your apartment, and so where is your apartment, and so on – everyone can know. Therefore, there are anonymous distributions (versions) of Linux: Tails, Qubes Os, Gentoo, and this is just what I can remember. what mistakes you should not make: personal data. Do not give a hint of your former self, try to be new, original. In general, in such cases, it is better not to write in the chat at all, or, as with the last point in the previous section, just be a little quiet, and use permanent mail calmly. There are temporary mails that are safe and will not make up your digital mail for example, for example – @TempMail_org_bot , or the web version – https://temp-mail.org using Get-Contact. A completely draining application, in fact, their databases of numbers are formed due to the fact that you install it on your phone, and after allowing access, it reads all your contacts and adds the database to itself. In other words, you yourself replenish the database, and for example, because of you, when you install a Get Contact, your friend will sign under your full name, or according to some characteristics, since you had exactly this in your notebook. You can also get by with other jokes here – do not just write down the contact under your name, but remember the numbers, or make some kind of reduction that would definitely not burn your friend who trusts you. If you want to see the number in the group of companies, use bots or friends. files . Do not download files from unknown sources while sitting on Windows or on Android – you can easily catch a random remote access virus, do not upload pictures with a . Photos store fun things called “metadata”, they can contain your phone model, camera extension, date of the photo, location of the photo, time the photo was taken, diagonal, camera angle, and other small parameters. By default, Telegram displays metadata only if you send files, not photos (yes, there is a difference), so don’t do this, even if it’s a photo of your house, or created somewhere in the dark – according to the listed parameters, your the search will be simple and not difficult if you accidentally send a photo with your geo, or any other information once. I advise you to use imgur or other hosting for photos. anonymity in Telegram 1. For transactions, use secret chats, they have end-to-end encryption. 2. Use virtual numbers / phishing accounts (you can buy them on lolztim) 3. Be sure to use all the tips described above to maintain anonymity. 4. Disable p2p calls, thanks to them you can track your IP. 5. I recommend the Aloha browser / vpn, it has a free / paid version, it does its job 100%.
what to use: 1. Your VPN – Mullvad All incoming and outgoing traffic from your computer passes through an encrypted tunnel to the VPN server, and from there it is sent to the site you are visiting. Thus, the website only sees the VPN server, not you. And none of the information that the ISP records can be directly linked to you. This VPN has never been leaked to the Federal Security Service or any other cybersecurity agency. 2. Virtual Machine – Use Kali Linux which has Whonix traffic with a fully wrapped Tor network. How to do it – https://www.youtube.com/watch?v=XbBLpDZeLPE 3. Your browser and setting it up. If you want some kind of anti-detect browser with a built-in proxy I would recommend Incogniton , Tor but it’s important to note that they only pass the network through the proxy and do not encrypt it. Personally, I use the LibreWolf browser, it is based on firefox only better configured. You will need extensions for your browser. 1. Ublock Origin blocks cookies. 2. Cookie Manager can monitor and clear cookies in a click. 3. CanvasBlocker blocks fingerprint. 4. Canvas FingerPrint Defender replaces fingerprint. 5 Switch User-Agent helps to fake user agent. 4. Data encryption – I will advise you the VeraCrypt application. How to configure and download it will be thrown off below. https://telegra.ph/VeraCrypt-10-12 (The article is not mine.) 5. O&O ShutUp 10 – Disables telemetry on your Windows. 6. KeePassXC – An application that allows you to securely store passwords and logins from your accounts. 7. In principle, now you can start creating a personality and your link. Buy a virtual number under the anonymity chain, and then register your account. The main thing is that you do not mention your past personalities anywhere and do not use the same nicknames in social networks. networks, mail wherever possible, because even an inexperienced doxer now knows how to search by nickname. In real life, don’t tell anyone about your activities, be it swatting, doxxing, scamming. You are required to always go to telegrams and generally roam the Internet with everything that I have listed.
8. It’s better not to use any bots that ask you to confirm, that is, give the bot your number, otherwise it may then be searched in these bots when you already get into the database of these bots, give out your past users, numbers, mail, logs. 9. Delete your old accounts, your parents. So that there are fewer leads to reveal your identity. By hiding your information in different search engines, bots. Have virtual numbers wherever possible. And if we are already talking about this, then I would not advise ordering home delivery from popular services, as you can get into the database. But even with all the rules, there is no complete anonymity on the Internet. I will probably not insert the manuals of the feds here, how they work and look for information, since this is already merged and you can see it if you search the Internet carefully. additional anonymity chains that can also be used: MAIN OC > Kali Linux > Mullvad vpn > VMware > Tails/whonix > tor / FireFox Mozilla / LibreWolf more anonymous chain MAIN OC > Kali Linux > Mullvad vpn > Dns Crypt > Proxychairs > ssh tunnel > VMware > Tails/Whonix > Tor security > Tor
anonymity chains client > VPN/TOR/SSH tunnel > target. Client > VPN Mullvad > Tor > Target Client > VPN > Remote Desktop (via RDP/VNC) > VPN Mullvad > Target Client > Double VPN (in different data centers but next to each other) > Remote Desktop + Virtual Machine > VPN > purpose explanation: The proposed scheme is a primary connection to the VPN and a secondary connection to the VPN (in case the 1st VPN is compromised, through some kind of leak), to hide traffic from the provider and in order not to give out your real IP address in the data center with a remote workplace. Next installed virtual machine on this server. Why do I need a virtual machine, I think it’s clear? – To roll back to the most standard and banal system with a standard set of plug-ins for each download. It is on a machine with a remote workplace, and not locally. People who used the virtual machine locally, and from under it TripleVPN on elliptic curves, once visiting whoer.net, were very surprised to see their real and real IP address in the WebRTC graph. What kind of trap will be implemented tomorrow, updating your browser, no one knows, the main thing is not to keep anything local. Let’s say you are physically located in Moscow, so build the scheme so that the first VPN is also in Moscow, the second, for example, in Milan, and the remote workplace, for example, in Italy, and the final VPN, for example, in Belarus. The construction logic should be such that it is not worth using all the servers inside, for example, the eurozone. The thing is that there is a well-established cooperation and interaction of various structures, but at the same time they should not be spread far from each other. Neighboring states that hate each other – this is the key to the success of your chain. To be ultra-invulnerable – you can also add automatic visits to websites in the background, from your real machine as an imitation of surfing, so that there is no suspicion that you are using any that means anonymization. Since traffic goes to only one IP address and through one port. You can add the use of Whonix / Tails OS, access the Internet via public Wi-Fi in a cafe (almost all passwords are in the Wi-Fi Map application), while changing the network adapter data, which can also lead to deanonymization. If the matter is very serious, then there is a need to change appearance (we remember about glasses, a grandmother’s scarf and even false mustaches and wigs) so as not to be identified by the face in the same cafe. Technologies have already been introduced that allow you to do it. Unfortunately, this is the future and it is already here. You can be identified as having location coordinates in a photo file taken by your phone prior to diagnosing a particular writing style. Just remember this.
Fingerprints, as well as attempts to determine the use of a VPN, by means of measuring the time a packet is sent from a user to a website and from a website to the user’s IP address (not taking into account such a “crutch” as blocking only incoming requests of a certain type) is not so easy to bypass. It is possible to deceive something, one or another check, but there are no guarantees that another “evil” will not appear tomorrow. That’s why you need a remote workplace, that’s why you need a clean virtual machine, that’s why this is the best advice you can give at the moment. The cost of such a solution can start from as little as $40 per month. But keep in mind that for payment, you should use only crypto. Understanding what an IP address is and how it works is of paramount importance, since the use of the Internet is the cornerstone in many fraudulent schemes. An IP address (Internet Protocol address) is a unique identification number that is assigned to each computer when accessing the Internet. It is a sequence of 4 digits in the range from 0 to 255, alternating through a dot. For example, 178.218.36.0. An IP address is assigned to a computer by its Internet provider at the moment of the beginning of the Internet session – the opening of the first Internet page, and ends with the closing of the Internet session – the closing of the last Internet page. The process of connecting a computer to a site in a simplified form is as follows: The computer, by pressing the mouse button, makes a request to the site using the IP protocol. The site, using the IP protocol, provides an answer in the form of the displayed page. Thus, on each site (Vkontakte, Avito , Yula, etc.) stores the history of connections with its users, and hence their IP addresses. With each access to the Internet, the scammer leaves his “trace” by which he can be calculated. Just like a subscriber number, an IP address has its own numbering resource, that is, each Internet provider is allocated a certain number of IP addresses in a specific range. Using the Internet resource http://www.2ip.ru (direct link: http://www.2ip.ru/whois/), knowing the IP address, you can easily determine the provider. Let’s consider the IP address as an example: 178.218.36.0: It has been established that the IP address 178.218.36.0 belongs to the “Atex plus” provider in Rybinsk (the request should be sent to the address of the specified provider).
CONCLUSION: by setting the IP address and the exact time of its use on the Internet, the employee can find out the address of the personal computer from which the attacker worked (address of an apartment, private house or cafe). Knowing IP addresses makes it harder for scammers to use readily available online anonymization tools called VPNs (Virtual Private Networks). The meaning of a virtual private network is that the Internet user, before accessing the site, connects to the server of a third party, usually located in the territory of another state. Schematically, the operation of a virtual private network is as follows. In fact, a request to an Internet site proceeds in the same way as described earlier, however, in the connection history of the site, not the real IP address of the user remains, but the IP address of the VPN server used by him, which, as practice shows, in most cases it belongs to foreign Internet providers, to which it is not possible to send a request within the Russian legal framework. how to get around this attempt by a fraudster to hide himself on the network, we will talk later in the subsection “The concept of cookies”. The concept of cookies as a means of deanonymizing a scammer on the Internet, we talked about the concept of an IP address and the most popular anonymization service on the Internet – VPN. This section will explain the concept of cookies as a way to bypass fraud protection. I think many have noticed that it is worth typing a query about a certain type of product into the Yandex or Google search string, as the browser starts to display ads about it. For example, by writing “Buy a cheap stroller,” a bunch of pop-ups appear with ads for strollers, baby food, toys, and other things on this topic. The thing is that many Internet sites (but not all) store information about their users. This information is collected and analyzed through cookies. A cookie is a piece of data that a website sends to the Internet browser (Google Chrome, Mozilla Firefox, etc.) of its new user in order to “remember” it. The next time you visit this site, he will already “know” a number of information about the connected user, which will grow with each subsequent visit: the site remembers your logins and passwords – it is thanks to Cookies that you do not need to re-enter passwords on social networks every time and other sites;
the site remembers your logins and passwords – it is thanks to cookies that you do not need to re-enter passwords every time on social networks and other sites; – the site remembers your preferred language; the site remembers the last pages you view; the site remembers the history of your visits (this Cookie function is of key importance to us). Schematically, a cookie works like this: When you visit a site for the first time, it sends a cookie to your browser. At all subsequent logins to this site, the browser marks the cookie file received from it for identification. An important feature of cookies is their immutability – a fraudster can change his IP address through VPN as many times as he likes, register from different subscriber numbers, but the site still will understand that all this time the same user is connecting to it, that is, the browser of the same personal computer is used. How can this help in the investigation of providing information about the person who posted this fraudulent
