Sunday, March 30, 2014

How to stay Anonymous

There is no such thing as being '100% Anonymous', however you can come pretty close to it. You can learn to become anonymous by taking the time to read this thread.

Table of Contents:
1. Introduction
2. Common Sense
3. Fake Identity
4. VPN's
5. Proxies
6. Tor

Section 1: Introduction
Welcome to my first tutorial! This thread will be teaching you how to be as anonymous as you can possibly be. I will be going over the basics of anonymity, as many of you know there is no such thing as being truly '100% Anonymous', however that doesn't mean you can't come close to it. It's important to hide your identity while online because there will always be somebody there, waiting to exploit even the first mistake you make.

Section 2: Common Sense
First thing you'll have to learn to stay anonymous is.. common sense. You wouldn't believe the amount of 'hackers' who use their first and last name while creating an e-mail account that is linked to all of their illegal activities. If you want to stay anonymous you can NOT create an account with legitimate information that can potentially lead to the discovery of your real identity. Even something as small as your birthday can ultimately lead to your demise. which leads into Section 3 of this thread.

Section 3: Fake Identity
One of the best things to do as a hacker is to have a fake identity. I don't just mean having a screen name or a alias. I'm talking about a complete second identity including fake height, weight, home, address, city, state, country, first name, last name, credit card, and even fake family members. It might be a little bit hard to come up with a fake identity with a legitimate address, but thanks to a website I found called http://www.fakenamegenerator.com you can generate your complete fake identity in less than two seconds. Once you create your fake identity, write it down and start using it when you make accounts that is linked with your hacking activities. However, if you want to look a even more legit.. Create several fake identities and use one of them for most of your accounts another for maybe only one or two. This way your accounts become compromised the hacker will think that you used a fake identity on most of your accounts and they finally found your real identity. You have to think ahead and use reverse psychology for any event that can happen. If you want to go to the extreme of having a fake identity make a Facebook account with the information of the fake identity that you barely use, upload photos of another random account on Facebook and add a couple hundred friends. This way when your hacker tries to dox you, they will find a 'legit' Facebook linked to your 'legit' information. I know this might be a lot to take in but, it'll be worth it in the long run.

Section 4: VPN's
A fake identity will be meaningless if you don't protect your IP Address by using a VPN. An IP Address is a unique number that is assigned to you by the company that provides you internet. This unique number can be traced back to you by the Federal Government or a hacker who uses a technique called 'Social Engineering'. An IP Address will look something like this: 62.101.202.23. You're IP Address is tracked by almost everywhere you go on the internet. There are multiple reasons why you have an IP Address but all you need to now is, if you perform illegal activities on the internet you can get caught. However, there are ways to disguise your IP Address using something called a VPN which stands for Virtual Private Network. Using a VPN will change your IP Address as long as you are connected to it and makes it a lot harder for you to get caught. Unfortunately most VPN's keeps logs (A record of what you do) while you are on that VPN, meaning if the Federal Government asks them for logs they will hand them over and you will get caught. Very few VPN's are offshore and don't keep logs. A lot if not most of these VPN's cost money. Do your research and find a VPN that does NOT keep logs or is offshore. Once you do this, it is almost next to impossible to be traced unless you slip-up and make a mistake.

Section 5: Proxies
A proxy is pretty much the same thing as a VPN however, proxies can be used on a single application like Skype and Google Chrome. Where VPN's are used for the entire system and provide the spoofed IP Address to every application you run. Some prefer to use proxies because they only do illegal activity on one certain application and don't want to slow down their internet speed on the applications that they don't do illegal activities on. A list of proxies can be found here: http://www.hidemyass.com/proxy-list/

Section 6: Tor
Tor is a free internet browser/network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It constantly updates its proxies so you can be tracked while on Tor. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. If you don't have Tor already, I recommend downloading it at https://www.torproject.org/download/down...sy.html.en

No comments:

Post a Comment

Contact Form

Name

Email *

Message *