So, you want to become anonymous? well let me give you everything I know (or at least most of it) to you.
Introduction Part:
So this is a serious only about being anonymous on the internet and while hacking.
- This series will cover: (further steps might be added if I decide to)
- Your Real Identity
- Tor
- VPN's
- Proxies
- I2P
- Tails
- Whonix
- Browsing habits
- NSA
- Anonymous
These steps won't be in order, so that way it will also come more as a surprise to you.
Quick Info:
So, I want you to consider every title as a step. It is a step that you can choose to furfill in order to remain anonymous, or you can choose not to do it. And remember not every step has to be done if you dont want to. Obviously the more steps you do the more anonymous you will become.
Your Real Identity:
Your real identity is already a major obstacle when it comes to being anonymous. If you want to become anonymous like people on The Deep Web are, (at least some of them) we're talking next level stuff here.
Imagine a hacker who continuously cracks major corporations systems one after one. Hits every news station every week, but is never caught. What if I told you that some hackers, doesn't have a 'personal identity', they have sorta say erased themselves from the real world.
Which means they dont own the usual social accounts like you probably do. Facebook Twitter YouTube Amazon Gmail? No, delete that erase it. You would need to delete the account. many apps allows this option while Gmail for example doesn't. (as far as im concerned) perhaps you could contact support and have them delete it. But you could also just spam your own email with an email bomber so the data will be lost and then change password to something more than 30 characters.
Once you have erased all your accounts you move on to the more advanced area.
Keep in mind when deleting your social accounts, if your a person who posts a lot on the media and posts a lot you would need to erase that first as your content could be found even though your profile doesn't exist. There might be trails in the companies server that could lead to your deleted account.
Files:
Bread crumbs. Let me explain with a different example.
- HDD
If you own a HDD or external HDD and you one day find out that your hacking identity could be blown, you immediately have to wipe all your shit. So you delete all your files from your HDD but let me tell you something right now, that data isn't lost. It can easily be recovered with enough skill of course.
- SNAPCHAT
Just like many companies TOS (Terms of Service) They keep your data like Snapchat for example. Who recently updated their policy and are now legally allowed to keep modify promote and 10 more of these words with your data. When you delete something, ask yourself; is it really gone?
- SSD
However the SSD drive is more complex than that. If you delete something on there, it will be lost, but it is possible to recover it, but will be much harder, much harder.
And thats the whole point of hacking right? Making everything pointless to even try and recover. Which is another thing ill get into in a different post.
So back to what we we're talking about.
Bread Crumbs:
Bread crumbs are basically deleted files that can potentially be recovered again with enough skill, a lot of fucking skill. And thats how your deleted account could possible be recovered if you don't take proper precautions.
- SIDE NOTE: Bread crumbs might be known under a different term, but this is the term I believe it's known as.
Closing:
That was it for the first step in my series. There will obviously be a lot more to come, and I hope you will stay tuned for the rest, because being anonymous is a big part of being a hacker.
Comments
No Comments Exist
Be the first, drop a comment!