banner
andrewji8

Being towards death

Heed not to the tree-rustling and leaf-lashing rain, Why not stroll along, whistle and sing under its rein. Lighter and better suited than horses are straw sandals and a bamboo staff, Who's afraid? A palm-leaf plaited cape provides enough to misty weather in life sustain. A thorny spring breeze sobers up the spirit, I feel a slight chill, The setting sun over the mountain offers greetings still. Looking back over the bleak passage survived, The return in time Shall not be affected by windswept rain or shine.
telegram
twitter
github

Revisiting Internet Anonymity

Today, we will discuss internet anonymity and privacy:

How to hide your real identity.

  1. What is TOR.
    How to perform tasks in a completely anonymous manner.
    How to use proxy chains.
    How to stay one step ahead in terms of anonymity.
    How to maintain anonymity using specific operating systems.

Conclusion, how to achieve internet anonymity and privacy:

Always use TOR + PROXYCHAIN when necessary.

Spending money is better than not spending money.

Please forget about VPN.

Disable cookie settings.

Do not use any browser extensions in the TOR browser.

A physical PC is more helpful in enhancing anonymity than a virtual machine.

Make some changes:

☆ Chrome ➡️ switch to Brave, TOR.

☆ Google ➡️ switch to DuckDuckGo.

☆ Gmail ➡️ switch to Protonmail, Fastmail, Tutanota Mail.

☆ Windows ➡️ switch to Linux, Tails, Qubes, Whonix.

☆ Whatsapp ➡️ switch to Signal, Telegram.

☆ Paypal ➡️ switch to Bitcoin.

The Tor browser is specifically designed for anonymous internet access.

The Tor browser isolates each website you visit, preventing third-party trackers and ads from tracking you. All cookies are automatically cleared when you finish browsing. The same goes for your browsing history.

The Tor browser prevents anyone monitoring your connections from knowing which websites you are visiting. Anyone monitoring your browsing habits can see that you are using Tor.

Your traffic is relayed and encrypted three times when passing through the Tor network. The network consists of thousands of volunteer-run servers called Tor relays.

Download link: https://www.torproject.org/

DuckDuckGo is an internet privacy company that provides services for those who are tired of hiding online tracking and want to regain their privacy immediately.

Download link: https://duckduckgo.com

ProxyChain is a tool that redirects internet traffic through multiple proxy servers.

Before learning more about proxy chains, we first need to know what a proxy server is.

A proxy server is a system or router that acts as a gateway between a user and the internet. It helps prevent network attackers from entering private networks.

There are three types of proxy servers.

Socks proxy server: This type of proxy server provides a connection to a specific server.

HTTP proxy server: This proxy was developed to handle one-way requests to web pages using the HTTP protocol.

SSL proxy server: This type of server was developed using the TCP relay concept used in the SOCKS proxy protocol to allow requests for web pages.

✯ How to use proxy chains ✯

First, you need to install TOR SERVICE using the command:

sudo apt-get install tor

To use ProxyChain, follow these steps. ☟

Jump to your terminal and enter:

sudo nano /etc/proxychain.conf

Open the proxychain configuration file:

image

There are three types (remove # to enable):

Dynamic chain (dynamic)

Strict chain (recommended *)

Random chain (random)

image

"proxy_dns" must be enabled:

ProxyType < IP >  < PORT >  < USER >  < PASSWORD > 

socks5 192.168.67.78 1080 lamer Secret 

# ProxyType = socks5 
# IP = 192.168.67.78 
# PORT = 1080 
# USER = lamer 
# PASSWORD = Secret

Proxy configuration format:

image

Tor connects with the given proxy, and ProxyChain will start with the TOR service.

Proxy resources (free):

https://www.freeproxy.world/

https://geonode.com/free-proxy-list

https://spys.one/proxys/DE/

https://free-proxy-list.net/

https://www.freeproxylists.net/

Burner Phone:
A cheap, temporary, disposable mobile phone that is not associated with any type of identity. Of course, this does not comply with the relevant laws and regulations on information and communication management in our country. Please do not buy, sell, or use any burner phones in China. In foreign countries, they are often obtained through Walmart, Target, eBay, Amazon, etc., or through foreign mobile virtual network operators.

Of course, there are many advantages to having a temporary phone in life, such as hiding and protecting your identity, location, and communication, being untraceable, and avoiding harassment from junk communication.

Kali-Whomi Tool:

image

Kali whoami-project is the most useful tool for enhancing your privacy when browsing anonymously.

Anti-man-in-the-middle attacks

Log killer (destroy log files on the system)

IP changer (hide real IP by redirecting traffic through TOR)

DNS changer (change the DNS server provided by the ISP)

MAC changer (change MAC address)

Cold boot prevention (avoid RAM dumps)

Time zone change

Hostname change

Browser anonymization (configure the browser to prioritize privacy)

Download link: https://owerdogan.github.io/whoami-project/

Secure systems:

Tails, Qubes, and Whonix operating systems are the most secure operating systems ever. - Edward Snowden

Privacy and anonymity-based operating systems

Tails: Protect online privacy using the Tor network.

https://tails.boum.org/

Qubes OS: A free, open-source, security-focused single-user desktop computing operating system that uses Xen virtualization to create and manage isolated compartments called qubes.

https://www.qubes-os.org/

Whonix: A privacy-focused Linux distribution based on Kicksecure, providing strong privacy and anonymity on the internet, with all communication forced through the Tor network.

https://www.whonix.org/

  1. Encrypted email:
    No need for much explanation: Protonmail, Fastmail, Tutanota mail
Loading...
Ownership of this post data is guaranteed by blockchain and smart contracts to the creator alone.