[ / / / / / / / / / / / / / ] [ dir / 2hu / christ / fast / hkon9 / just / komica / tacos / trap ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Email
Comment *
File
Select/drop/paste files here
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

New Volunteer

File (hide): 453e79f9721e974⋯.png (257.53 KB, 635x457, 635:457, 1517296822562.png) (h) (u)

[–]

 No.894908>>894964 >>895076 >>895091 >>895419 >>895460 >>899221 >>900316 >>916317 >>934682 [Watch Thread][Show All Posts]

>be me

>be using proxy

>fuckyeah I'm 1337

>googling song lyrics

>"displaying results from my hometown"

what the fuck? How does it know? Should I even try to cover my footprint anymore or am I jerking myself off while only wasting my time?

 No.894910>>894912 >>894913 >>894953 >>894978 >>899577 >>908107 >>935388

>stop

>using

>google

google is probably storing location cookies or your account's location is known. If you are serious about leaving no trace install firefox with noscript, ublock or umatrix, block cookies and get a user agent spoofer and set it to the user agent tor browser uses

> Mozilla/5.0 (Windows NT 6.1; rv:31.0) Gecko/20100101 Firefox/31.0

also stop using fucking google.


 No.894912>>894914 >>895069 >>900325 >>907094 >>935297

learn to configure your shit

>>894910

fuck off retard. installing a bunch of meme adblockers doesn't reduce your fingerprint


 No.894913>>894914 >>894917 >>894966

>>894910

i bet you don't even know what noscript does. it's intended to mitigate CSRF,XSS,clickjacking etc, style vulns. and at that it's still a horrible idea and just bloat. you can literally disable JS in firecox by going to about:blank and setting javascript.enabled to 0


 No.894914

a bit of information for op

https://stallman.org/google.html

>>894912 same

yeah just run google's ads goy you won't be tracked.

>>894913 fag

noscript blocks javascript and lets you manage permissions based on websites you trust


 No.894915

>google

You deserve everything that comes to you.


 No.894917>>894959

>>894913

>about:blank

That's retarded


 No.894918

/g/ay thread, neck yourself


 No.894922

when this many people sage in your thread you know it's a good time to stop posting.

4chan.org/g/ is where you belong


 No.894953>>895011

>>894910

Know a libre user agent switcher for Chromium based browsers?


 No.894959

>>894917

I meant about:config


 No.894964

>>894908 (OP)

ask on reddit, they should know :^)


 No.894966>>894984 >>896564

>>894913

And make it impossible to use a good portion of the net while you're at it.

You need to decide which js to run on a case-by-case basis unless you're willing to go without online shopping or online banking, and that's assuming your government doesn't require you to make your tax report on their spaghetti-code site like mine does.


 No.894978

>>894910

This. Degoogle you nog.


 No.894984>>935026

>>894966

thats 3. and

>online shopping

ishyggygtdgdsgyght

you can just make 3 firecox profiles:

1 for bank cancer

1 for rest of web

1 for when you really want to go on some cancer site

firefox --ProfileManager

then

firefox -P bank

firefox -P nojs

firefox -P js

using the same instance of firecox for bank as the rest of your browsing is pretty cringy


 No.895011

>>894953

Name is something about fire and foxes.


 No.895012>>916290

Install gentoo


 No.895069

>>894912

He didn't suggest that. And the suggestion made actually does improve privacy.


 No.895076>>897273

>>894908 (OP)

>proxy

Ur adorable.

Download Tor Browser.


 No.895080>>895082 >>895085 >>935910

literally no one cares what faggot music you listen to op. they do care about those vials of 3-MeO-PCP you ordered from the deepweb though


 No.895082

>>895080

Only if you ordered a lot of it.


 No.895085

>>895080

3-MeO-PCP is legal in most countries.


 No.895091

>>894908 (OP)

>He doesn't know what cookie does

           ,!\          !    \
         i  \         l      \,,..__
          ,i′  ,\___,,--―l       \::゙'冖ーi、、
        i     :;\::::::::::..l              `'‐、、
       /__,..;:r---―-、,..__.     ,;'il:;}          .;:::`L__
   ,.:f''""゙゙゙´          、 ̄ヽ,//           ...::::::l;;;:;;::::
  _/       ......  、   \//、            ::::::::リ;;:::::::::....
//       ......:;::::::::::::. ヽ、\ ゙ヽ  ヘ    ●      ....:::::::::i';;;;::::::::::::
;;/    ::::::::::::;;;;;ノ ̄\:: 〉 〉゙'、 `ヽ_ノ       ......:::::::.;;;:ノ:;;;:::::::::::::
/    ..::::、__;;ノ;;;`ヽ_/: / /⌒)メ、_ノ/         .....:::::;;;/;;;:::::;;:::::::::
     ..:::イ;;.ヽ::;;;;;;;;;(__ノ /'"..:::::::::::::/  ...............:::::::::::;;;,;ノ;;::::::::::::::::
     :::::::l;;;;;;;;;\;;;;;;;,.(__ノ;.;:.\:::::::::/::::::::::::::::::::::::::::;;;;;/;:::::::::::::::::
    ::::::::,!::;;;;;;;;;;:.`゙'-、、  ::: \_/::::::::::;;;___,.;-―''"::::::::::::::::::::::::
   ..::::::::::,!;;;;;:;;;;;:::;;;;;:::;;;;;;`゙ ̄'''冖''―--―'";;;;;;;;;:::::::::::::::::::::::::


 No.895092

Flash player bypass proxy settings.


 No.895419

>>894908 (OP)

and still not a single mention about location services

I'm assuming you're on a phone that that phone is connected through cell service and not wifi-only. If that's the case, the towers that you connect to are leaking a less precise location of yours.


 No.895425

>proxy

What is this, 2007? Your ISP snooped on your unencrypted traffic and sold it to Google immediately.


 No.895460

>>894908 (OP)

You are probably still leaking your ipv6. Just go and disable it for your network, unless your router is retarded and requires it.


 No.896564

>>894966

>and that's assuming your government doesn't require you to make your tax report on their spaghetti-code site like mine does.

Be happy yours supplies a website instead of a Winblows-only binary app.


 No.897222>>898144 >>899855 >>916305 >>926604

Trying to make a checklist for security hardening.

The guides might not all be the best, but is there anything I've missed? Some of it is straight up miscellaneous shit.

BIOS------------------------------------------------------------------------------------------------------

Coreboot

https://www.coreboot.org/Build_HOWTO

Libreboot Hardware Support and Set Up

https://libreboot.org/docs/install

Pre Compiled Libreboot ROMS

https://mirror.math.princeton.edu/pub/libreboot/

VPN--------------------------------------------------------------------------------------------------------

VPN Reviews

https://www.pcmag.com/article2/0,2817,2403388,00.asp

https://www.cnet.com/best-vpn-services-directory/

https://www.pcworld.com/article/3198369/privacy/best-vpn-services-apps-reviews-buying-advice.html

OpenVPN Set Up

https://openvpn.net/index.php/open-source/documentation/howto.html

https://torguard.net/knowledgebase.php?action=displayarticle&id=53

WebRTC Detection

https://ipleak.net/

Filesystem Encryption--------------------------------------------------------------------------------------

https://www.cyberciti.biz/hardware/howto-linux-hard-disk-encryption-with-luks-cryptsetup-command/

RAM Disk---------------------------------------------------------------------------------------------------

https://www.techrepublic.com/article/how-to-use-a-ramdisk-on-linux/

https://www.howtoforge.com/storing-files-directories-in-memory-with-tmpfs

Malware Detection------------------------------------------------------------------------------------------

https://www.howtoforge.com/tutorial/configure-clamav-to-scan-and-notify-virus-and-malware/

https://www.howtoforge.com/tutorial/how-to-scan-linux-for-malware-and-rootkits/

Firewall---------------------------------------------------------------------------------------------------

IP Tables

https://www.howtogeek.com/177621/the-beginners-guide-to-iptables-the-linux-firewall/

https://www.booleanworld.com/depth-guide-iptables-linux-firewall/

https://www.digitalocean.com/community/tutorials/how-to-set-up-a-basic-iptables-firewall-on-centos-6

https://www.digitalocean.com/community/tutorials/how-to-set-up-a-firewall-using-iptables-on-ubuntu-14-04

UFW

https://www.digitalocean.com/community/tutorials/how-to-set-up-a-firewall-with-ufw-on-ubuntu-14-04

Security Modules-------------------------------------------------------------------------------------------

AppArmor

https://help.ubuntu.com/lts/serverguide/apparmor.html

https://wiki.archlinux.org/index.php/AppArmor

https://debian-handbook.info/browse/stable/sect.apparmor.html

SELinux

https://wiki.centos.org/HowTos/SELinux

https://www.digitalocean.com/community/tutorials/an-introduction-to-selinux-on-centos-7-part-1-basic-concepts

https://www.digitalocean.com/community/tutorials/an-introduction-to-selinux-on-centos-7-part-2-files-and-processes

https://www.digitalocean.com/community/tutorials/an-introduction-to-selinux-on-centos-7-part-3-users

Miscellaneous---------------------------------------------------------------------------------------------

Disable USB Storage

https://www.cyberciti.biz/faq/linux-disable-modprobe-loading-of-usb-storage-driver/

sudo echo -e "blacklist uas\nblacklist usb_storage" > /etc/modprobe.d/blacklist_usbdrive.conf

Spectre / Meltdown Check

https://github.com/speed47/spectre-meltdown-checker

https://www.cyberciti.biz/faq/patch-spectre-vulnerability-cve-2017-5753-cve-2017-5715-linux/

Generate Random Passwords

https://www.howtogeek.com/howto/30184/10-ways-to-generate-a-random-password-from-the-command-line/

Secure Delete and Test Recovery

https://github.com/gordonrs/thc-secure-delete

https://github.com/cgsecurity/testdisk

Anonymity Network

https://www.torproject.org/

Email Encryption

https://www.openpgp.org/software/

Security-Enhanced Linux Distribution for Servers

http://openwall.com/Owl/

Live OS

https://tails.boum.org/

CentOS

https://www.centos.org/

https://www.centos.org/docs/5/html/Deployment_Guide-en-US/rhlcommon-chapter-0001.html


 No.897273>>897300 >>934683

>>895076

>mocks proxy user

>uses obvious kike honeypot browser developed from a browser written by retarded SJWs


 No.897300>>897354

>>897273

>t. obvious kike shill


 No.897354

>>897300

T. oblivion kite shield


 No.897365>>898146 >>927225 >>935007

File (hide): 19e768097ac4a87⋯.png (37.31 KB, 651x648, 217:216, dataminers.png) (h) (u)

>be me

>be using NordVPN

>fuckyeah i'm niggercattle

>checking my server IP

uhm excuse me sweetie what is this?


 No.898144>>898164 >>908101

>>897222

>RAM Disk

What is the utility of RAM Disk in privacy situations ?>>897365


 No.898146

>>897365

I like more Mullvad is so fucking good


 No.898164

>>898144

It's more of a "if shit hits the fan" situation.


 No.899022

>Should I even try to cover my footprint anymore or am I jerking myself off while only wasting my time?

Yeah in my opinion it's a waste of time. If you give a fuck use adnauseam.io or ublock.


 No.899202>>899203 >>935034

>doesn't know his Internet provider is affiliated with google and the ISP is spoofing google's certs and routes to simulate and fake lower latency.

I suggest directly tampering the DNS servers in your router although DNS combination (dns1 dns2) can be fingerprinted so don't use a fallback (only fill up dns1 or fill the same values).


 No.899203

>>899202

it has to be done in the router otherwise non-failsafe events or botnet wlan cards will and can leak out requests which will bypass your ring3-level computer dns settings


 No.899221

>>894908 (OP)

Clear cookies and local storage, disable WebRTC. Use SOCKS5 and you must proxy DNS as well which is a common detection mechanism. Now check ipleak.net or similar.


 No.899354

What is browser fingerprinting

and stuff like google safe browsing = every dns request you do is sent straight to google with your browser installation id ..


 No.899577

>>894910

>Firefox 31.0

>changing your user agent to a little used version of Firefox

you're much better blending in with the crowd


 No.899622>>899623 >>899819 >>908107 >>934683

File (hide): 5073d7a51bd7d79⋯.jpg (34.47 KB, 586x1013, 586:1013, 1511457771748.jpg) (h) (u)

Easy answer.

Your browser knows your wireless BSSID and google street view not only toke pictures of your house, but also scan wireless networks and store their BSSID.

You can actually do a reverse BSSID using google to know, with a decent precision, where the fuck you are. Also, google not only watch your BSSID but also your neighbors, just reconfigure your AP will not do shit because you are sending your neighbors location which allowed them to pin point you.


 No.899623>>934683

>>899622

If you guys think i am a lier, here is the google API to use geolocation.

https://developers.google.com/maps/documentation/geolocation/intro


 No.899819>>934683

>>899622

>Your browser knows your wireless BSSID

It has no business knowing it. The web browser has nothing to do with connecting to or disconnecting from a specific BSSID. If it collects such information that simply means it snoops around your system and collects data it has no business collecting.


 No.899855

>>897222

>placebo

>botnet

>honeypot

>etc.


 No.900316>>900322

>>894908 (OP)

>leave email client running

>client auto-checks mail over VPN

>now Google knows which VPN you're using


 No.900322

>>900316

>even using google

come on now


 No.900325

>>894912

TURN OFF THAT PESKY ADBLOCK


 No.900354

Using jewgoogle while logged into youtube and on a VPN? Facebook? Twitter? EVER? pure pwnage son.


 No.900363

File (hide): ae629cd734d206a⋯.jpg (173.94 KB, 800x600, 4:3, 0_952ea_b49c94d8_XL.jpg) (h) (u)

<having gmail


 No.906888>>906913 >>906914 >>906917 >>916530

Everyone's saying don't use google, but how is google getting your location if you're using a vpn? I thought that was the whole point of the vpn


 No.906913

>>906888 (heiled)

Is javascript enabled?


 No.906914>>906917 >>908107 >>934669

>>906888

Browser Fingerprinting (cookies, user-agent, JS, screen resolution, etc.)

panopticlick.eff.org


 No.906917

>>906888

This >>906914

Also check for DNS leaks and make sure you've got dropout protection.


 No.906976

webrtc botnet leakage


 No.907088

this would not happen if you used Tor Browser


 No.907094

>>894912

>found the jew

>not even the first post

you gotta try harder, shlomo


 No.907104

How does 8ch track users? I don't keep cookies and scripts are blocked but my posts still get marked. Does it tie posts with ip?


 No.907110>>908115 >>916283

>VPN

>not just using TOR


 No.907139

use hammers, shotguns, lava


 No.908087

YOU NEED TO GO DEEPER


 No.908101>>916307

>>898144

Use your imagination. One thing I do with RAM disk is run Firefox from it. I set firefox user's home directory to /tmp/whatever, and have a wrapper script that wipes and re-creates that directory, then runs firefox. So it never gets any kind of permanent storage. Every session is 100% from scratch.


 No.908107>>934683 >>934690

>>894910

>Mozilla/5.0 (Windows NT 6.1; rv:31.0) Gecko/20100101 Firefox/31.0

the user agent Tor Browser uses (last time i checked) is:

Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0

>>899622

which browser gives gives out your BSSID? i don't want these nigger features within 10 miles of me

>>906914

letting websites query what screen resolution you use

lol kys


 No.908115>>908124

>>907110

Some people want to pass packets over a network faster than you can walk them there.


 No.908124>>908127

>>908115

>thinks tor is slow

found the web shotter


 No.908127

>>908124

You're embarrassing yourself m8


 No.916283>>916469

>>907110

>Attention Required!

>Attention Required!

>Attention Required!


 No.916290

>>895012

brb brah. Yo boss gimme 2.5 days off so I can spend it installing Gentoo. WTF is Gentoo? Only the bestest OS ever.


 No.916305

>>897222

>Live OS:tails

heads is the same as tails but without systemdick, a de-blobbed kernel hardened with grsecurity, and awesome WM.


 No.916307

>>908101

firejail --private firefucks

less work but not as fast as RAM


 No.916317

>>894908 (OP)

Cookies, browser fingerprints, and you're probably using a shit proxy


 No.916332

X-Forwarded-For


 No.916469>>916516 >>916523

>>916283

that doesn't happen anymore as of the last year or so since cuckflare whitelisted tor browser


 No.916516>>916523 >>916524

>>916469

That's not true. They just provided an OPTION to whitelist Tor. But THE SAME OPTION also allows sites with cloudflare to completely block Tor users.


 No.916523>>916526

>>916469

>>916516

opt-in or opt-out?


 No.916524>>916526

>>916516

all cuckflare sites now allow tor browser users to view them without needing to fill a captcha. by default. an option to block tor users isn't even relevant as people do this just as often without cuckflare. the main problem with cuckflare is that when your IP is blocked you need to change headers to match tor browser, which is retarded and is against web standards (which are already very low to begin with)


 No.916526>>916533

>>916523

>>916524

https://support.cloudflare.com/hc/en-us/articles/203306930-Does-CloudFlare-block-Tor-

"The IP addresses of Tor exit nodes may earn a bad reputation, elevating their Cloudflare threat score. Our basic protection level issues CAPTCHA-based challenges to visitors whose IP address has a high threat score"

So Tor traffic is blocked BY DEFAULT if it was determined to be "malicious". Of which 94% is (source: https://darkwebnews.com/anonymity/tor-malicious-cloudflare/)

And not only that, but "Since late February 2016, Cloudflare treats Tor exit nodes as a "country" of their own. There's no geography associated with these IPs, but this approach lets Cloudflare customers override the default Cloudflare threat score to define the experience for their Tor visitors."

and

"The options for Tor are:

Whitelist (trust)

CAPTCHA (visible challenge which the visitor must interact with to pass)

JavaScript Challenge (visible challenge with less friction, testing the browser)

Block (blacklist -- available only to Cloudflare Enterprise customers)"

So 94% of Tor traffic will be served a captcha AUTOMATICALLY, and even if it was not determined to be "malicious", a Cloudflare customer can still choose to Captcha or block ALL OF IT.


 No.916530>>916535

>>906888

IP address is just one piece of the puzzle.

A lot of sites use canvas fingerprinting and other methods to track people these days. It's why the Tor browser does a lot more than just change your IP address.


 No.916533>>916535

>>916526

Yeah that's old news. Right now when a tor node is blocked, you can get around it by using Tor Browser. or making a request that looks like this (example from tor browser):
GET / HTTP/1.1
Host: niggers.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: keep-alive
Upgrade-Insecure-Requests: 1

>a Cloudflare customer can still choose to Captcha or block ALL OF IT.

Yeah but that's largely a small issue. Only a few autists explicitly go into their configuration to block tor. They've been doing this since the early 2000's without cuckflare. Like I said, the main problem with cuckflare is that it blocks tor by default (but you can get around it as of this year).


 No.916535>>916538

>>916530

There's still ways to bypass even that. Years ago I heard they were working on identifying people through the way they write their forum posts. I guess it's probably advanced now.

>>916533

Really? I've never heard of that and even searching now I find nothing. Where can I read about it?


 No.916538>>916549

>>916535

>Years ago I heard they were working on identifying people through the way they write their forum posts

I get the idea they started doing this a millenium ago.

>Really? I've never heard of that and even searching now I find nothing. Where can I read about it?

No idea, I figured it out myself after about 6 years of filling out cuckflare captchas. Basically just using that User-Agent will bypass the captcha in most cases.


 No.916549

>>916538

Haha. Such a hacker you are (no really, I'm impressed).


 No.926604

>>897222

decent list


 No.926752

websites can request your real IP if that's a tranparent proxy (iirc).


 No.927225

>>897365

>not knowing public VPNs sold long ago

VPNs are high integrity data mines these days.


 No.934669

File (hide): 61e1f1610b414d1⋯.png (96.98 KB, 1024x743, 1024:743, Screenshot_2018-06-24.png) (h) (u)

>>906914

There are some new features since I last looked there. Nice.


 No.934682

>>894908 (OP)

>how does it know?

There are many ways. Essentially it is botnet.

Your browser will have a lot of info stored on you already. Make a separate user for your 1337 browsing, or use a virtual machine (with NAT connection, not bridged NAT!), and ensure your firewall doesn't leak when the proxy disconnects by 'accident' (this means adding firewall rules that blocks ANY internet connection (outbound traffic particularly) UNLESS connected to the proxy. Look up "VPN leaks and how to avoid them" for more on this. So you switch it off to connect, then switch those firewall rules on once connected to the proxy. If the connection to your proxy hangs up for any reason you don't continue Internetting through your normal connection while leaking your normal IP and location as you do so.

Browsers also phone home. Some you can turn off, but there no way to be 100% certain.

https://support.mozilla.org/en-US/kb/how-stop-firefox-making-automatic-connections

Plus use non jewgle service replacements like startpage.com


 No.934683>>934690 >>934996

>>897273

>buzzwords

wew

>>899622

>>899623

You're a fucking retard. Literally all geolocations services use WiFi names to better approximate your location. The data about WiFi networks and cellular towers is downloaded from their server (obviously) but the calculations are done locally on your machine.

That API is for smartphones. There are other services from Apple, Mozilla and other providers. See UnifiedNlp for more information.

>>899819

>>908107

No browser knows this nor do they send that information (well, at least not free software ones.)


 No.934690>>934722 >>935277

>>908107

>letting websites query what screen resolution you use

>lol kys

>>934683

>No browser knows this nor do they send that information

lel.

Step 1: Maximize browser window.

Step 2: There is no step 2. You've already finished.

Well done, you've just told the website what screen resolution you use.

HTTP request has UserAgent info = OS and hardware to a fair degree of certainty.

+ maximized window can be used to calculate screen size and resolution.


 No.934692

a) Don't use Google

b) Use a SOCKS proxy and tunnel your DNS through it if you're using a Mozilla based browser (ex. Icecat, Firefox, Pale Moon, etc).


 No.934722>>934996

>>934690

If you use a firefox based browser press CTRL and + or CTRL and - to change reported resolution. There goes that fingerprinting method.

>HTTP request has UserAgent info = OS and hardware to a fair degree of certainty.

Then use a useragent switcher and disbale special functions that still report said information like webRTC and firefox's canvas.


 No.934996>>935277

>>934722

Yes anon, those are the bypasses, but the fact that any bypass is needed is the issue. I was confirming the fact that the screen resolution is snooped that >>934683 denied happens.


 No.935007

>>897365

>NordVPN

AHAHAHAHAHA

If it has an ad, it's bound to be bad.


 No.935020

Anonimity!! If you want to go dark, drop all wrired/wireless devices. That's the only sane way. I've been swimming in this "connected world" long enough to learn about detox. Leave for trees and rocks and real life - Meaningful things, the rest is all rotten.

You want to go low on your electronic imprint, deactivate all of your actual profiles: Gmail, Facebook, Twitter, ... They won't be deleted but at least inactive. All to the garbage bin. Create an new email address without your real info (protonmail & gmx are good choices). Never conduct any family or real identity related business on it - keep IRL for IRL. Never connect to it from the vacinity of your home (if you still decide to keep your home internet wire alive - I would suggest a new ISP or even moving from your actual home to another). Use hardware that YOU and only YOU can configure and that doesn't do too much. A router should route, not make coffee from a shiny Web2.0 HTML5 NeuralNetworked interface. Of course, No WiFi, No Bluetooth, Chromecast, Connected doorlocks, ... Wires only, if necessary. Deactivate IPv6. If you want to set up a WiFi spot: 1) make it hidden, 2) put on a "passphrase", 3) set up a mac address filter or an ACL of some sort.

Use VERY long passwords and use an offline pocket password manager locked with at least a +7 digit pin that you keep close.

Use a VPN for whatever you want to do on the net. Pick a VPN provider and roll around their servers everyday; choose the strongest crypto configuration available.

If you run any other OS but a serious Linux based system (forget Ubuntu, Mint, ...), it's time to switch.

I would recommend ArchLinux + X11 + i3 = Minimalism. There's no truly hermetic system, it's all about how tight you are regarding OpSec. What is life in this connected 21st century world but constant OpSec? You can also use live distros booting from USB - reflash the drive every now and then.

If you have a laptop, use WiFi dongles (5 - roll them around randomly) and keep your laptop's WiFi card off - remove the drivers (same for devices you won't use, ie. webcam). If you can buy the dongles in cash, that would be great. BTW, if you can buy all the hardware in cash without having to provide any ID, you're doing it right. Try to choose least common hardware, stuff few poeple care or know how to break into or track. If you can & know how, make your own :) [ie. I'm running my own routers using my own chip design on an FPGA with my own implem. of all protocols and stacks + my own IDS and filters + crypto]

Another trick is to always use a VM rather than the native OS, which in this case serves only to run the VM Manager. You can change the hardware configuration of the VM as you wish and after some time delete it and use a backed up copy to go back to 0.

Configure your browser for no history, no cookies, no ads, no scripts, ... no flash player, ...

Or, use lynx in command line mode for HTML only. You can use Tor browser if you wish.

If you run a smart device, keep your identity away from it - no personal email, ... Use Orbot & Orfox if you go for an Android device. Configure VPN and always turn WiFi/BT/4G/... off if you're not online eyes on screen. Turn all auto-whatever off. Make sure you can take off the battery of the smart device before you buy it. Devices with in-built batteries are a huge scam, fruit for thought.

Keep your real life activity away from your cyber activity. Use encryption whenever you see fit (always), make it hard for anybody to use anyhting you leave out there against you or even link it to you. Your activity has to look mundane and make no sense for it to be lost in the infinity of the cyberverse.

Y


 No.935026

>>894984

How do you make separate profiles like you are suggesting in Firefox? Can I do it on Pale Moon as well, I assume so.


 No.935034

>>899202

>although DNS combination (dns1 dns2) can be fingerprinted so don't use a fallback (only fill up dns1 or fill the same values).

What does this mean?


 No.935054

dnscrypt


 No.935129

Privacytools.io

Pretty informative resource


 No.935277

>>934690

>>934996

I wasn't talking about screen resolutions, I was talking about that retard saying that the browser somehow sends to Google your BSSID.

Websites cannot know your screen resolution per sé, all they get is the drawable surface inside your browser. Changing the bottom bar's height, adding a bookmarks bar, adding a bigger window bar or changing your zoom changes the resolution reported to websites. If you really care about this, just look for the most common screen resolution and adjust your window for it.


 No.935297>>935321

>>894912

the anon whos too lazy to install extensions


 No.935321>>935370

>>935297

>replying to a 3 month old post

FUCKING NEWFAGS


 No.935370

>>935321

So what?! You know better? Wake up and go dump that ego in a shithole.


 No.935388>>935436

File (hide): 2ce9cad39f92be6⋯.png (593.68 KB, 785x820, 157:164, 1514837783546.png) (h) (u)

>>894910

>If you are serious about leaving no trace install firefox with noscript


 No.935436

>>935388

you left out more than half of his sentence you nitwit


 No.935910

File (hide): dc1393ab6e686a4⋯.webm (3.78 MB, 746x1080, 373:540, gondolaStars.webm) (h) (u) [play once] [loop]

>>895080

Why take 3-MeO-PCP, when you could take 4-AcO-DMT?


 No.935922>>935923

File (hide): cd469cad070e7dc⋯.jpg (11.54 KB, 196x225, 196:225, 1505480298715.jpg) (h) (u)

>not using a virtual machine

>not isolating that virtual machine in a network namespace

>not using a vpn

>not forwarding dns requests through the vpn

>not using google public dns through the vpn

>not sandboxing the vpn instance in another network namespace and using a veth pair to give the virtual machine network access only over the vpn

>using computers at all

Pick a mistake. You made all of them.


 No.935923>>935926

File (hide): a9c9a80efd5bd66⋯.png (85.56 KB, 273x240, 91:80, 1520968091276.png) (h) (u)

>>935922

>not using google public dns through the vpn


 No.935926>>935960

>>935923

Google public forwards dns queries to the isp dns servers of whatever country the vpn exit resides in.


 No.935960>>935963

File (hide): 1674ef87abc45ed⋯.png (120 KB, 400x297, 400:297, 1520968091275.png) (h) (u)

>>935926

>using ISPs DNS


 No.935963>>935975

File (hide): 2757eebdf0cea7c⋯.png (1.74 MB, 1920x1080, 16:9, mpv-shot0044.png) (h) (u)

>>935960

>using ISPs DNS


 No.935974

>not downloading all IANA DNS database to your mainframe and accepting only DNSSEC-signed domains for queries


 No.935975>>935976

>>935963

>using tcp/ip


 No.935976>>935977

>>935975

>using networking


 No.935977>>935978

>>935976

>using computers


 No.935978>>935979

>>935977

>using electricity


 No.935979>>942346

>>935978

>physical existence


 No.936108

>googling

There's yer problem right thar, bo


 No.942343

File (hide): 49a142ebdc3a9d1⋯.jpg (32.71 KB, 304x237, 304:237, implying.jpg) (h) (u)


 No.942346>>942765

>>935979

>vibrating space-time continuum


 No.942373

I take no precaution whatsoever except noscript (which is more a matter of making www navigation bearable), do not use wifi, google thinks i am 120-200km south of my actual location.

> o wait i am using linux, OP possibly is cucked by the OS.


 No.942765




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
121 replies | 12 images | Page ?
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / 2hu / christ / fast / hkon9 / just / komica / tacos / trap ][ watchlist ]