Anonymity on the Internet Express Guide

Talk anything about anonymity
User avatar
TheVikingsofDW
Posts: 65
Joined: Thu Feb 01, 2024 5:54 pm

Anonymity on the Internet Express Guide

Postby TheVikingsofDW » Sat Feb 03, 2024 7:17 pm

First and foremost, it is imperative to acknowledge that achieving 100% anonymity on the internet is not feasible; if someone is determined to crack your identity, they will likely succeed. However, we can certainly make it more challenging for them by implementing the following measures:

Measures to navigate the Deep Web:
1. Altering or editing the serial number and name of your computer components, such as the motherboard, hard disk, processor, etc. For instance, if the motherboard consists of 8 digits, simply modify them. Similarly, if you possess a latest-generation Intel i9 processor, you can configure your computer to indicate a third-generation Ryzen 5 processor (it is important to modify the processor name each time the PC is restarted). To modify these parameters, programs like "Hard Disk Serial Number Changer", "AMIDEWIN - AMIBIOS DMI Editor", "DMIEDIT", among others, can be utilized.
2. Utilizing "TMAC Address Changer" or "MacSetup" to replace all MAC addresses with alternative ones.
3. Employing a VPN, preferably one you have created yourself (such as EC2 on AWS). If not, opting for a premium VPN like NortonVPN (always connected to Switzerland).
4. Deactivating the microphone and camera (cover them).
5. Ensuring your premium antivirus (like Norton), firewall and operating system are all up-to-date.
6. Utilizing security-focused operating systems like Tail OS, QuebesOS, or Whonix.
7. Employing Proxy Chains (the more proxies, the greater the anonymity). Like the VPN, it is always better to create your own proxies, but you can still use: "FREEPROXY", "GEONODE", "SPYS", "FREE-PROXY-LIST", "911", "PROXYFIER", among others.
8. Employing encrypted messaging platforms such as "Proton Mail" or "Signal" for communication.
9. Refraining from making payments with cards or PayPal; instead, opting for Bitcoin or XMR.
10. Downloading and properly configuring the following extensions on Tor: "uMatrix", "Random User-Agent (Switcher)", "Self-Destruction-Cookies", "No-Script". "Privacy Badger", and "AdBlock", all collectively.
11. Avoiding browsing in full-screen mode due to screen/monitor dimensions.
12. Running Tails OS on a separate virtual machine, USB Tails, with an obsf4 bridge.
13. Safeguarding your modem or router by altering the administrator credentials, enabling WPA2 or WPA3 encryption, disabling WPS, hiding the WiFi name, deactivating remote or wireless administration, and updating the router's integrated firmware or software.
14. Anonymizing traffic through TOR:
a) Downloading AnonGT from GitHub.
b)

Code: Select all

sudo bash install.sh

c)

Code: Select all

sudo anongt

d)

Code: Select all

sudo anongt start

e) Within this program, one can alter the Tor IP, verify connection status, retrieve IP information, change MAC address, etc. This program is installed within the Linux virtual machine.
15. Avoiding your own ISP internet and instead acquiring chips from any phone chip store, reloading them with internet, and transferring data from a phone (any except personal) to the computer or laptop. Every time you finish browsing, remove the chip, burn it and then use a new one.
16. Change DNS, either manually or with "DNS Jumper".
17. Change the time zone and region of your PC according to the country of your VPN connection (if my VPN is connected on India, my time zone and region should be India).

Measures if you are a carder
Use all of the above and also:
17. Accessing a public network, without a hard drive, and running OS on a separate virtual machine, like USB Tails, with an obsf4 brige.
18. If frequently utilizing the laptop or computer for carding or cyber-attacks, it is advisable to procure a disposable laptop (in case of any incidents, destroy the hard drive, processor, or the entire laptop with a drill and incinerate it).
19. Never deposit money into personal bank accounts; instead, utilize accounts under pseudonyms or consider opening an account in Switzerland for added anonymity.
20. To protect your identity on any cell phone, you need to root the cell phone and change the IMEI (International Mobile Equipment Identity).
In the case of the PC, the MAC. In computer networks, the MAC address is a 48-bit identifier that uniquely corresponds to a network card or device. It is also known as the "Physical Address", and it is unique for each device. CHANGE ONLY IN THE REGISTRY.
MAC address generator: https://miniwebtool.com/es/mac-address-generator/
IMPORTANT NOTE: Never connect to your WiFi network with your phone or your PC having one of these MAC or IMEI if you live in the same country where you are carding or attacking.
21. Activate camouflage, using only portable browsers, or browsers such as the paid SPHERE.
22. Deactivate the WEB RTC which is the one that shows your INTERNAL IP. First you run a test to see if your internal IP is leaking: https://webbrowsertools.com/test-webrtc-leak/
Then you correct it according to your browser: https://www.vpnmentor.com/blog/disable-webrtc-in-seconds/

Measures for social networks and normal internet:
23. Encrypting all files, folders, hard drives, and pendrives with randomly generated passwords exceeding 20 characters in length and disorderly arrangement.
24. Never click on suspicious or unknown links.
25. Never download unofficial or strange apks.
26. Refraining from uploading personal information, family or friend's details, photos of oneself, personal name, locations, interests, hobbies, etc., on social media. Maintaining anonymity and utilizing different nicknames for each social network or websites, avoiding uniformity across platforms.
27. Activate the 2FA on all social media.
28. Deactivate your cell phone's voicemail.
29. Use one phone for personal things, one for work and other disposable ones for whatever you want.

Here it should be at 0%: https://2ip.io/privacy/
And here it should be 100%: https://whoer.net/

BONUS
HOW TO BE ANONYMOUS HACKER
Anonymous hackers are individuals whose identities remain undisclosed, potentially constituting a collective or community. Engaging in hacking activities, their identities remain concealed, thereby evading disclosure. Their anonymity underscores the enigmatic nature of their endeavors, exemplifying the essence of clandestine cyber operations.

To become an anonymous hacker, it is imperative to acquire the requisite skill set:
- About Hacking
- Computer Knowledge
- Advanced Hacking Knowledge
- Website Hacking
- Android Hacking
- Malware Thread
- Social Enginnering
- Social Media Hacking
- Phishing Attacks
- Hacker OS (Kali Linux or ArchLinux).
- Hacking Tools Knowledge
- Bug Hunting
- Ransomware
- Cyber Attacks
- Exploitation
- Cyber Crime
- Proxy
- Proxychains
- VPN
- Anonymity

Learn this skills to be a hacker and use all the tools and measures in the lists above to hide your identity.

Note: It is crucial to bear in mind that even with adherence to these measures and more (like use VPS, RDP, SOCKS, HTTPS, PGP, Cryptography, etc. etc.), achieving 100% anonymity on the internet is unattainable; the more security, the less usability. No one system is safe, and the most effective antivirus is one's own common sense.
Last edited by TheVikingsofDW on Thu Feb 22, 2024 7:54 pm, edited 6 times in total.

User avatar
Barber
Posts: 8
Joined: Wed Aug 30, 2023 8:33 am

Re: Anonymity on the Internet Ultimate Edition

Postby Barber » Sat Feb 03, 2024 9:44 pm

Thank you friend. I will certainly use some of the things in your post to improve my anonymity.


Return to “Discussions about anonymity”