[–]▶ No.894908>>894964 >>895076 >>895091 >>895419 >>895460 >>899221 >>900316 >>916317 >>934682 [Watch Thread][Show All Posts]
>be me
>be using proxy
>fuckyeah I'm 1337
>googling song lyrics
>"displaying results from my hometown"
what the fuck? How does it know? Should I even try to cover my footprint anymore or am I jerking myself off while only wasting my time?
▶ No.894910>>894912 >>894913 >>894953 >>894978 >>899577 >>908107 >>935388
>stop
>using
>google
google is probably storing location cookies or your account's location is known. If you are serious about leaving no trace install firefox with noscript, ublock or umatrix, block cookies and get a user agent spoofer and set it to the user agent tor browser uses
> Mozilla/5.0 (Windows NT 6.1; rv:31.0) Gecko/20100101 Firefox/31.0
also stop using fucking google.
▶ No.894912>>894914 >>895069 >>900325 >>907094 >>935297
learn to configure your shit
>>894910
fuck off retard. installing a bunch of meme adblockers doesn't reduce your fingerprint
▶ No.894913>>894914 >>894917 >>894966
>>894910
i bet you don't even know what noscript does. it's intended to mitigate CSRF,XSS,clickjacking etc, style vulns. and at that it's still a horrible idea and just bloat. you can literally disable JS in firecox by going to about:blank and setting javascript.enabled to 0
▶ No.894914
a bit of information for op
https://stallman.org/google.html
>>894912 same
yeah just run google's ads goy you won't be tracked.
>>894913 fag
noscript blocks javascript and lets you manage permissions based on websites you trust
▶ No.894915
>google
You deserve everything that comes to you.
▶ No.894917>>894959
>>894913
>about:blank
That's retarded
▶ No.894918
/g/ay thread, neck yourself
▶ No.894922
when this many people sage in your thread you know it's a good time to stop posting.
4chan.org/g/ is where you belong
▶ No.894953>>895011
>>894910
Know a libre user agent switcher for Chromium based browsers?
▶ No.894959
>>894917
I meant about:config
▶ No.894964
>>894908 (OP)
ask on reddit, they should know :^)
▶ No.894966>>894984 >>896564
>>894913
And make it impossible to use a good portion of the net while you're at it.
You need to decide which js to run on a case-by-case basis unless you're willing to go without online shopping or online banking, and that's assuming your government doesn't require you to make your tax report on their spaghetti-code site like mine does.
▶ No.894978
>>894910
This. Degoogle you nog.
▶ No.894984>>935026
>>894966
thats 3. and
>online shopping
ishyggygtdgdsgyght
you can just make 3 firecox profiles:
1 for bank cancer
1 for rest of web
1 for when you really want to go on some cancer site
firefox --ProfileManager
then
firefox -P bank
firefox -P nojs
firefox -P js
using the same instance of firecox for bank as the rest of your browsing is pretty cringy
▶ No.895011
>>894953
Name is something about fire and foxes.
▶ No.895069
>>894912
He didn't suggest that. And the suggestion made actually does improve privacy.
▶ No.895076>>897273
>>894908 (OP)
>proxy
Ur adorable.
Download Tor Browser.
▶ No.895080>>895082 >>895085 >>935910
literally no one cares what faggot music you listen to op. they do care about those vials of 3-MeO-PCP you ordered from the deepweb though
▶ No.895082
>>895080
Only if you ordered a lot of it.
▶ No.895085
>>895080
3-MeO-PCP is legal in most countries.
▶ No.895091
>>894908 (OP)
>He doesn't know what cookie does
,!\ ! \
i \ l \,,..__
,i′ ,\___,,--―l \::゙'冖ーi、、
i :;\::::::::::..l `'‐、、
/__,..;:r---―-、,..__. ,;'il:;} .;:::`L__
,.:f''""゙゙゙´ 、 ̄ヽ,// ...::::::l;;;:;;::::
_/ ...... 、 \//、 ::::::::リ;;:::::::::....
// ......:;::::::::::::. ヽ、\ ゙ヽ ヘ ● ....:::::::::i';;;;::::::::::::
;;/ ::::::::::::;;;;;ノ ̄\:: 〉 〉゙'、 `ヽ_ノ ......:::::::.;;;:ノ:;;;:::::::::::::
/ ..::::、__;;ノ;;;`ヽ_/: / /⌒)メ、_ノ/ .....:::::;;;/;;;:::::;;:::::::::
..:::イ;;.ヽ::;;;;;;;;;(__ノ /'"..:::::::::::::/ ...............:::::::::::;;;,;ノ;;::::::::::::::::
:::::::l;;;;;;;;;\;;;;;;;,.(__ノ;.;:.\:::::::::/::::::::::::::::::::::::::::;;;;;/;:::::::::::::::::
::::::::,!::;;;;;;;;;;:.`゙'-、、 ::: \_/::::::::::;;;___,.;-―''"::::::::::::::::::::::::
..::::::::::,!;;;;;:;;;;;:::;;;;;:::;;;;;;`゙ ̄'''冖''―--―'";;;;;;;;;:::::::::::::::::::::::::
▶ No.895092
Flash player bypass proxy settings.
▶ No.895419
>>894908 (OP)
and still not a single mention about location services
I'm assuming you're on a phone that that phone is connected through cell service and not wifi-only. If that's the case, the towers that you connect to are leaking a less precise location of yours.
▶ No.895425
>proxy
What is this, 2007? Your ISP snooped on your unencrypted traffic and sold it to Google immediately.
▶ No.895460
>>894908 (OP)
You are probably still leaking your ipv6. Just go and disable it for your network, unless your router is retarded and requires it.
▶ No.896564
>>894966
>and that's assuming your government doesn't require you to make your tax report on their spaghetti-code site like mine does.
Be happy yours supplies a website instead of a Winblows-only binary app.
▶ No.897273>>897300 >>934683
>>895076
>mocks proxy user
>uses obvious kike honeypot browser developed from a browser written by retarded SJWs
▶ No.897300>>897354
>>897273
>t. obvious kike shill
▶ No.897354
>>897300
T. oblivion kite shield
▶ No.897365>>898146 >>927225 >>935007
>be me
>be using NordVPN
>fuckyeah i'm niggercattle
>checking my server IP
uhm excuse me sweetie what is this?
▶ No.898144>>898164 >>908101
>>897222
>RAM Disk
What is the utility of RAM Disk in privacy situations ?>>897365
▶ No.898146
>>897365
I like more Mullvad is so fucking good
▶ No.898164
>>898144
It's more of a "if shit hits the fan" situation.
▶ No.899022
>Should I even try to cover my footprint anymore or am I jerking myself off while only wasting my time?
Yeah in my opinion it's a waste of time. If you give a fuck use adnauseam.io or ublock.
▶ No.899202>>899203 >>935034
>doesn't know his Internet provider is affiliated with google and the ISP is spoofing google's certs and routes to simulate and fake lower latency.
I suggest directly tampering the DNS servers in your router although DNS combination (dns1 dns2) can be fingerprinted so don't use a fallback (only fill up dns1 or fill the same values).
▶ No.899203
>>899202
it has to be done in the router otherwise non-failsafe events or botnet wlan cards will and can leak out requests which will bypass your ring3-level computer dns settings
▶ No.899221
>>894908 (OP)
Clear cookies and local storage, disable WebRTC. Use SOCKS5 and you must proxy DNS as well which is a common detection mechanism. Now check ipleak.net or similar.
▶ No.899354
What is browser fingerprinting
and stuff like google safe browsing = every dns request you do is sent straight to google with your browser installation id ..
▶ No.899577
>>894910
>Firefox 31.0
>changing your user agent to a little used version of Firefox
you're much better blending in with the crowd
▶ No.899622>>899623 >>899819 >>908107 >>934683
Easy answer.
Your browser knows your wireless BSSID and google street view not only toke pictures of your house, but also scan wireless networks and store their BSSID.
You can actually do a reverse BSSID using google to know, with a decent precision, where the fuck you are. Also, google not only watch your BSSID but also your neighbors, just reconfigure your AP will not do shit because you are sending your neighbors location which allowed them to pin point you.
▶ No.899623>>934683
▶ No.899819>>934683
>>899622
>Your browser knows your wireless BSSID
It has no business knowing it. The web browser has nothing to do with connecting to or disconnecting from a specific BSSID. If it collects such information that simply means it snoops around your system and collects data it has no business collecting.
▶ No.899855
>>897222
>placebo
>botnet
>honeypot
>etc.
▶ No.900316>>900322
>>894908 (OP)
>leave email client running
>client auto-checks mail over VPN
>now Google knows which VPN you're using
▶ No.900322
>>900316
>even using google
come on now
▶ No.900325
>>894912
TURN OFF THAT PESKY ADBLOCK
▶ No.900354
Using jewgoogle while logged into youtube and on a VPN? Facebook? Twitter? EVER? pure pwnage son.
▶ No.906888>>906913 >>906914 >>906917 >>916530
Everyone's saying don't use google, but how is google getting your location if you're using a vpn? I thought that was the whole point of the vpn
▶ No.906913
>>906888 (heiled)
Is javascript enabled?
▶ No.906914>>906917 >>908107 >>934669
>>906888
Browser Fingerprinting (cookies, user-agent, JS, screen resolution, etc.)
panopticlick.eff.org
▶ No.906917
>>906888
This >>906914
Also check for DNS leaks and make sure you've got dropout protection.
▶ No.906976
▶ No.907088
this would not happen if you used Tor Browser
▶ No.907094
>>894912
>found the jew
>not even the first post
you gotta try harder, shlomo
▶ No.907104
How does 8ch track users? I don't keep cookies and scripts are blocked but my posts still get marked. Does it tie posts with ip?
▶ No.907110>>908115 >>916283
▶ No.907139
use hammers, shotguns, lava
▶ No.908087
▶ No.908101>>916307
>>898144
Use your imagination. One thing I do with RAM disk is run Firefox from it. I set firefox user's home directory to /tmp/whatever, and have a wrapper script that wipes and re-creates that directory, then runs firefox. So it never gets any kind of permanent storage. Every session is 100% from scratch.
▶ No.908107>>934683 >>934690
>>894910
>Mozilla/5.0 (Windows NT 6.1; rv:31.0) Gecko/20100101 Firefox/31.0
the user agent Tor Browser uses (last time i checked) is:
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
>>899622
which browser gives gives out your BSSID? i don't want these nigger features within 10 miles of me
>>906914
letting websites query what screen resolution you use
lol kys
▶ No.908115>>908124
>>907110
Some people want to pass packets over a network faster than you can walk them there.
▶ No.908124>>908127
>>908115
>thinks tor is slow
found the web shotter
▶ No.908127
>>908124
You're embarrassing yourself m8
▶ No.916283>>916469
>>907110
>Attention Required!
>Attention Required!
>Attention Required!
▶ No.916290
>>895012
brb brah. Yo boss gimme 2.5 days off so I can spend it installing Gentoo. WTF is Gentoo? Only the bestest OS ever.
▶ No.916305
>>897222
>Live OS:tails
heads is the same as tails but without systemdick, a de-blobbed kernel hardened with grsecurity, and awesome WM.
▶ No.916307
>>908101
firejail --private firefucks
less work but not as fast as RAM
▶ No.916317
>>894908 (OP)
Cookies, browser fingerprints, and you're probably using a shit proxy
▶ No.916332
▶ No.916469>>916516 >>916523
>>916283
that doesn't happen anymore as of the last year or so since cuckflare whitelisted tor browser
▶ No.916516>>916523 >>916524
>>916469
That's not true. They just provided an OPTION to whitelist Tor. But THE SAME OPTION also allows sites with cloudflare to completely block Tor users.
▶ No.916523>>916526
>>916469
>>916516
opt-in or opt-out?
▶ No.916524>>916526
>>916516
all cuckflare sites now allow tor browser users to view them without needing to fill a captcha. by default. an option to block tor users isn't even relevant as people do this just as often without cuckflare. the main problem with cuckflare is that when your IP is blocked you need to change headers to match tor browser, which is retarded and is against web standards (which are already very low to begin with)
▶ No.916526>>916533
>>916523
>>916524
https://support.cloudflare.com/hc/en-us/articles/203306930-Does-CloudFlare-block-Tor-
"The IP addresses of Tor exit nodes may earn a bad reputation, elevating their Cloudflare threat score. Our basic protection level issues CAPTCHA-based challenges to visitors whose IP address has a high threat score"
So Tor traffic is blocked BY DEFAULT if it was determined to be "malicious". Of which 94% is (source: https://darkwebnews.com/anonymity/tor-malicious-cloudflare/)
And not only that, but "Since late February 2016, Cloudflare treats Tor exit nodes as a "country" of their own. There's no geography associated with these IPs, but this approach lets Cloudflare customers override the default Cloudflare threat score to define the experience for their Tor visitors."
and
"The options for Tor are:
Whitelist (trust)
CAPTCHA (visible challenge which the visitor must interact with to pass)
JavaScript Challenge (visible challenge with less friction, testing the browser)
Block (blacklist -- available only to Cloudflare Enterprise customers)"
So 94% of Tor traffic will be served a captcha AUTOMATICALLY, and even if it was not determined to be "malicious", a Cloudflare customer can still choose to Captcha or block ALL OF IT.
▶ No.916530>>916535
>>906888
IP address is just one piece of the puzzle.
A lot of sites use canvas fingerprinting and other methods to track people these days. It's why the Tor browser does a lot more than just change your IP address.
▶ No.916533>>916535
>>916526
Yeah that's old news. Right now when a tor node is blocked, you can get around it by using Tor Browser. or making a request that looks like this (example from tor browser):
GET / HTTP/1.1
Host: niggers.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: keep-alive
Upgrade-Insecure-Requests: 1
>a Cloudflare customer can still choose to Captcha or block ALL OF IT.
Yeah but that's largely a small issue. Only a few autists explicitly go into their configuration to block tor. They've been doing this since the early 2000's without cuckflare. Like I said, the main problem with cuckflare is that it blocks tor by default (but you can get around it as of this year).
▶ No.916535>>916538
>>916530
There's still ways to bypass even that. Years ago I heard they were working on identifying people through the way they write their forum posts. I guess it's probably advanced now.
>>916533
Really? I've never heard of that and even searching now I find nothing. Where can I read about it?
▶ No.916538>>916549
>>916535
>Years ago I heard they were working on identifying people through the way they write their forum posts
I get the idea they started doing this a millenium ago.
>Really? I've never heard of that and even searching now I find nothing. Where can I read about it?
No idea, I figured it out myself after about 6 years of filling out cuckflare captchas. Basically just using that User-Agent will bypass the captcha in most cases.
▶ No.916549
>>916538
Haha. Such a hacker you are (no really, I'm impressed).
▶ No.926604
▶ No.926752
websites can request your real IP if that's a tranparent proxy (iirc).
▶ No.927225
>>897365
>not knowing public VPNs sold long ago
VPNs are high integrity data mines these days.
▶ No.934669
>>906914
There are some new features since I last looked there. Nice.
▶ No.934682
>>894908 (OP)
>how does it know?
There are many ways. Essentially it is botnet.
Your browser will have a lot of info stored on you already. Make a separate user for your 1337 browsing, or use a virtual machine (with NAT connection, not bridged NAT!), and ensure your firewall doesn't leak when the proxy disconnects by 'accident' (this means adding firewall rules that blocks ANY internet connection (outbound traffic particularly) UNLESS connected to the proxy. Look up "VPN leaks and how to avoid them" for more on this. So you switch it off to connect, then switch those firewall rules on once connected to the proxy. If the connection to your proxy hangs up for any reason you don't continue Internetting through your normal connection while leaking your normal IP and location as you do so.
Browsers also phone home. Some you can turn off, but there no way to be 100% certain.
https://support.mozilla.org/en-US/kb/how-stop-firefox-making-automatic-connections
Plus use non jewgle service replacements like startpage.com
▶ No.934683>>934690 >>934996
>>897273
>buzzwords
wew
>>899622
>>899623
You're a fucking retard. Literally all geolocations services use WiFi names to better approximate your location. The data about WiFi networks and cellular towers is downloaded from their server (obviously) but the calculations are done locally on your machine.
That API is for smartphones. There are other services from Apple, Mozilla and other providers. See UnifiedNlp for more information.
>>899819
>>908107
No browser knows this nor do they send that information (well, at least not free software ones.)
▶ No.934690>>934722 >>935277
>>908107
>letting websites query what screen resolution you use
>lol kys
>>934683
>No browser knows this nor do they send that information
lel.
Step 1: Maximize browser window.
Step 2: There is no step 2. You've already finished.
Well done, you've just told the website what screen resolution you use.
HTTP request has UserAgent info = OS and hardware to a fair degree of certainty.
+ maximized window can be used to calculate screen size and resolution.
▶ No.934692
a) Don't use Google
b) Use a SOCKS proxy and tunnel your DNS through it if you're using a Mozilla based browser (ex. Icecat, Firefox, Pale Moon, etc).
▶ No.934722>>934996
>>934690
If you use a firefox based browser press CTRL and + or CTRL and - to change reported resolution. There goes that fingerprinting method.
>HTTP request has UserAgent info = OS and hardware to a fair degree of certainty.
Then use a useragent switcher and disbale special functions that still report said information like webRTC and firefox's canvas.
▶ No.934996>>935277
>>934722
Yes anon, those are the bypasses, but the fact that any bypass is needed is the issue. I was confirming the fact that the screen resolution is snooped that >>934683 denied happens.
▶ No.935007
>>897365
>NordVPN
AHAHAHAHAHA
If it has an ad, it's bound to be bad.
▶ No.935020
Anonimity!! If you want to go dark, drop all wrired/wireless devices. That's the only sane way. I've been swimming in this "connected world" long enough to learn about detox. Leave for trees and rocks and real life - Meaningful things, the rest is all rotten.
You want to go low on your electronic imprint, deactivate all of your actual profiles: Gmail, Facebook, Twitter, ... They won't be deleted but at least inactive. All to the garbage bin. Create an new email address without your real info (protonmail & gmx are good choices). Never conduct any family or real identity related business on it - keep IRL for IRL. Never connect to it from the vacinity of your home (if you still decide to keep your home internet wire alive - I would suggest a new ISP or even moving from your actual home to another). Use hardware that YOU and only YOU can configure and that doesn't do too much. A router should route, not make coffee from a shiny Web2.0 HTML5 NeuralNetworked interface. Of course, No WiFi, No Bluetooth, Chromecast, Connected doorlocks, ... Wires only, if necessary. Deactivate IPv6. If you want to set up a WiFi spot: 1) make it hidden, 2) put on a "passphrase", 3) set up a mac address filter or an ACL of some sort.
Use VERY long passwords and use an offline pocket password manager locked with at least a +7 digit pin that you keep close.
Use a VPN for whatever you want to do on the net. Pick a VPN provider and roll around their servers everyday; choose the strongest crypto configuration available.
If you run any other OS but a serious Linux based system (forget Ubuntu, Mint, ...), it's time to switch.
I would recommend ArchLinux + X11 + i3 = Minimalism. There's no truly hermetic system, it's all about how tight you are regarding OpSec. What is life in this connected 21st century world but constant OpSec? You can also use live distros booting from USB - reflash the drive every now and then.
If you have a laptop, use WiFi dongles (5 - roll them around randomly) and keep your laptop's WiFi card off - remove the drivers (same for devices you won't use, ie. webcam). If you can buy the dongles in cash, that would be great. BTW, if you can buy all the hardware in cash without having to provide any ID, you're doing it right. Try to choose least common hardware, stuff few poeple care or know how to break into or track. If you can & know how, make your own :) [ie. I'm running my own routers using my own chip design on an FPGA with my own implem. of all protocols and stacks + my own IDS and filters + crypto]
Another trick is to always use a VM rather than the native OS, which in this case serves only to run the VM Manager. You can change the hardware configuration of the VM as you wish and after some time delete it and use a backed up copy to go back to 0.
Configure your browser for no history, no cookies, no ads, no scripts, ... no flash player, ...
Or, use lynx in command line mode for HTML only. You can use Tor browser if you wish.
If you run a smart device, keep your identity away from it - no personal email, ... Use Orbot & Orfox if you go for an Android device. Configure VPN and always turn WiFi/BT/4G/... off if you're not online eyes on screen. Turn all auto-whatever off. Make sure you can take off the battery of the smart device before you buy it. Devices with in-built batteries are a huge scam, fruit for thought.
Keep your real life activity away from your cyber activity. Use encryption whenever you see fit (always), make it hard for anybody to use anyhting you leave out there against you or even link it to you. Your activity has to look mundane and make no sense for it to be lost in the infinity of the cyberverse.
Y
▶ No.935026
>>894984
How do you make separate profiles like you are suggesting in Firefox? Can I do it on Pale Moon as well, I assume so.
▶ No.935034
>>899202
>although DNS combination (dns1 dns2) can be fingerprinted so don't use a fallback (only fill up dns1 or fill the same values).
What does this mean?
▶ No.935054
▶ No.935129
Privacytools.io
Pretty informative resource
▶ No.935277
>>934690
>>934996
I wasn't talking about screen resolutions, I was talking about that retard saying that the browser somehow sends to Google your BSSID.
Websites cannot know your screen resolution per sé, all they get is the drawable surface inside your browser. Changing the bottom bar's height, adding a bookmarks bar, adding a bigger window bar or changing your zoom changes the resolution reported to websites. If you really care about this, just look for the most common screen resolution and adjust your window for it.
▶ No.935297>>935321
>>894912
the anon whos too lazy to install extensions
▶ No.935321>>935370
>>935297
>replying to a 3 month old post
FUCKING NEWFAGS
▶ No.935370
>>935321
So what?! You know better? Wake up and go dump that ego in a shithole.
▶ No.935388>>935436
>>894910
>If you are serious about leaving no trace install firefox with noscript
▶ No.935436
>>935388
you left out more than half of his sentence you nitwit
▶ No.935910
>>895080
Why take 3-MeO-PCP, when you could take 4-AcO-DMT?
▶ No.935922>>935923
>not using a virtual machine
>not isolating that virtual machine in a network namespace
>not using a vpn
>not forwarding dns requests through the vpn
>not using google public dns through the vpn
>not sandboxing the vpn instance in another network namespace and using a veth pair to give the virtual machine network access only over the vpn
>using computers at all
Pick a mistake. You made all of them.
▶ No.935923>>935926
>>935922
>not using google public dns through the vpn
▶ No.935926>>935960
>>935923
Google public forwards dns queries to the isp dns servers of whatever country the vpn exit resides in.
▶ No.935974
>not downloading all IANA DNS database to your mainframe and accepting only DNSSEC-signed domains for queries
▶ No.935975>>935976
▶ No.935976>>935977
>>935975
>using networking
▶ No.935977>>935978
▶ No.935978>>935979
>>935977
>using electricity
▶ No.935979>>942346
>>935978
>physical existence
▶ No.936108
>googling
There's yer problem right thar, bo
▶ No.942346>>942765
>>935979
>vibrating space-time continuum
▶ No.942373
I take no precaution whatsoever except noscript (which is more a matter of making www navigation bearable), do not use wifi, google thinks i am 120-200km south of my actual location.
> o wait i am using linux, OP possibly is cucked by the OS.
▶ No.942765