Welcome to our New Forums!

Our forums have been upgraded and expanded!

Welcome to Our New Forums

  • Our forums have been upgraded! You can read about this HERE

Anonymity 101

Mastermind

New member
Joined
Sep 21, 2021
Messages
487
Location
[email protected]
Hi everyone. First post so don't be too harsh on me. :ugeek:

Importance
Most people have no idea how hard it is to be anonymous nor how important it is especially when money is involved.
Most people wrongly assume that if they have nothing to hide, they have nothing to worry about.
Governments and corporations (which are really the same https://foundationfortruthinlaw.org/Files/United-States-is-a-corporation.pdf) spend billions of dollars every year to spy on people. They would not be doing it if it wasn't lucrative.

Example
Lets say that Joe earns $100k per year and that he has a mortgage on a $1 million house that he almost paid off. Only one more year to pay it off. What do you think is going to happen? The bank that he owes money to is going to buy all the information they can on him from the intelligence community. If they see that he is dangerously close to paying off his debt, they will do everything in their power to stop him. They will make him lose his job. Blackmail him. Throw him in prison. Ruin his marriage. Whatever they can in order to make him default on the loan. Then they evict him from his house and sell it on the market. He lost everything.
Do not be Joe. If the enemy succeeds in gathering full intel on you then you are done.

Strategy
Hiding your power level is extremely important.
Appear weak when you are strong, and strong when you are weak — Sun Tzu.
All attacks start small to try to understand how strong the opponent is. Then it slowly escalates.
If you have power, try to always appear weaker than you are so that your enemies will not use their full strength on you. This way you will be able to survive their attacks and make plans for the next ones.
If you have very little power, it is desirable to appear strong so that the enemy attacks you with more force than necessary. You lose very little while they waste a lot of valuable time and resources without gaining anything. This will make them reluctant to attack you later.
It is desirable to lose some inconsequential battles in order to deceive the enemy into a false sense of safety.

It is extremely important that nobody knows:
- how much money you have
- how many assets you have
- how much you make
- where and how you make it
- who you know and who knows you
- your movements
- your beliefs
- your plans
- your intelligence and knowledge level

If others know what you know, then they also know what you don't know and you open yourself to being attacked. Information is powerful and most of it we lose it through our electronic devices.

Computer anonymity
It is impossible to obtain 100% anonymity using any electronic device. If the intelligence agencies want your information badly enough, they will get it. How badly they want it depends on your power level. The less powerful you appear to be, the less they will want your information.
However, having zero anonymity makes it impossible to hide the power level, thus making it very hard to keep power and even harder to increase it.

Misinformation
One of the best ways to throw people off is to create a false persona on a bait computer. Make a youtube account and subscribe to all the popular channels. Open CNN and put it on autoplay. Make a facebook account and start liking all the garbage. Write stupid stuff on your social media. Make people think you are xtian.

Recommendations for anonymity
Here are my recommendations when it comes to the important stuff.
- Buy a laptop with cash only on which you can install libreboot, then install libreboot on it yourself. https://www.youtube.com/watch?v=HNwWQ9zGT-8
- De-solder the camera, microphone, wifi and bluetooth.
- Use only open source software. https://www.fsf.org
- Install the open source operating system on an external USB 2.0 hard drive or SSD. Make sure to encrypt everything. Keep a backup of your data on another USB drive in another location. SATA, PCIe and USB 3.0 are not safe as all the contents of RAM are exposed through DMA (Direct Memory Access). Hard drives and SSDs are small independent computers. They have the ability to read (and write) all the contents in RAM and store it in space that is not accessible to the user. Including the decryption keys. SSDs advertised as 1 TB probably contain 9 TB of hidden storage where they can hide data for later retrieval by the govt. If you use USB 2.0 then you are safe. https://spritesmods.com/?art=hddhack
- Use only USB 2.0 peripherals. If you must use a USB 3.0 peripheral, make it go through a USB 2.0 adapter, or buy a laptop that has only USB 2.0.
- Use only wifi adapters that have open source firmware and drivers. https://ryf.fsf.org/categories/wireless-adapters
- Do not do important stuff on your bait computer
- Buy a printer second hand, cash only. If you need to print documents.
- Use Tor for everything, even youtube
- Make sure you have multiple hidden partitions on the hard drive. If you are caught with an encrypted hard drive, you will need to give up at least 2 encryption keys. Prepare the 2 partitions with stuff that appears important. https://defuse.ca/truecrypt-plausible-deniability-useless-by-game-theory.htm
- Use a different email, different username and different password for all websites
- Do not use third party password managers. Use a text file and keep track of passwords yourself
- Use alternative search engines. https://gigablast.com https://yandex.com/ https://en.wikipedia.org/wiki/Search_engine
- Save the IP address of important websites. If their DNS is banned you will be able to access them through their IP address. Except those that use cloudflare.
- Use GPG for communications https://emailselfdefense.fsf.org/en/
- Save everything that is important to you and future generations. Books (especially history books). Videos. Music. Games. News articles. Get it now or lose it. https://www.reddit.com/r/DataHoarder/ https://tpb.party/browse/601
- Have an encrypted backup of your data.
- Use Monero for transacting as much as possible.
- Form local communities and secret parallel societies. Use a fake persona. Do not be alone.
- Do not write on public forums as you would do normally. Your writing style can be used to identify you.

Good anonymity information sources:
https://www.youtube.com/c/MentalOutlaw
https://www.youtube.com/c/BraxMe
https://www.youtube.com/c/BlackHatOfficialYT

Feel free to add to this thread.
 
AgainstAllAuthority said:
Hi everyone. First post so don't be too harsh on me. :ugeek:

Importance
Most people have no idea how hard it is to be anonymous nor how important it is especially when money is involved.
Most people wrongly assume that if they have nothing to hide, they have nothing to worry about.
Governments and corporations (which are really the same https://foundationfortruthinlaw.org/Files/United-States-is-a-corporation.pdf) spend billions of dollars every year to spy on people. They would not be doing it if it wasn't lucrative.

Example
Lets say that Joe earns $100k per year and that he has a mortgage on a $1 million house that he almost paid off. Only one more year to pay it off. What do you think is going to happen? The bank that he owes money to is going to buy all the information they can on him from the intelligence community. If they see that he is dangerously close to paying off his debt, they will do everything in their power to stop him. They will make him lose his job. Blackmail him. Throw him in prison. Ruin his marriage. Whatever they can in order to make him default on the loan. Then they evict him from his house and sell it on the market. He lost everything.
Do not be Joe. If the enemy succeeds in gathering full intel on you then you are done.

Strategy
Hiding your power level is extremely important.
Appear weak when you are strong, and strong when you are weak — Sun Tzu.
All attacks start small to try to understand how strong the opponent is. Then it slowly escalates.
If you have power, try to always appear weaker than you are so that your enemies will not use their full strength on you. This way you will be able to survive their attacks and make plans for the next ones.
If you have very little power, it is desirable to appear strong so that the enemy attacks you with more force than necessary. You lose very little while they waste a lot of valuable time and resources without gaining anything. This will make them reluctant to attack you later.
It is desirable to lose some inconsequential battles in order to deceive the enemy into a false sense of safety.

It is extremely important that nobody knows:
- how much money you have
- how many assets you have
- how much you make
- where and how you make it
- who you know and who knows you
- your movements
- your beliefs
- your plans
- your intelligence and knowledge level

If others know what you know, then they also know what you don't know and you open yourself to being attacked. Information is powerful and most of it we lose it through our electronic devices.

Computer anonymity
It is impossible to obtain 100% anonymity using any electronic device. If the intelligence agencies want your information badly enough, they will get it. How badly they want it depends on your power level. The less powerful you appear to be, the less they will want your information.
However, having zero anonymity makes it impossible to hide the power level, thus making it very hard to keep power and even harder to increase it.

Misinformation
One of the best ways to throw people off is to create a false persona on a bait computer. Make a youtube account and subscribe to all the popular channels. Open CNN and put it on autoplay. Make a facebook account and start liking all the garbage. Write stupid stuff on your social media. Make people think you are xtian.

Recommendations for anonymity
Here are my recommendations when it comes to the important stuff.
- Buy a laptop with cash only on which you can install libreboot, then install libreboot on it yourself. https://www.youtube.com/watch?v=HNwWQ9zGT-8
- De-solder the camera, microphone, wifi and bluetooth.
- Use only open source software. https://www.fsf.org
- Install the open source operating system on an external USB 2.0 hard drive or SSD. Make sure to encrypt everything. Keep a backup of your data on another USB drive in another location. SATA, PCIe and USB 3.0 are not safe as all the contents of RAM are exposed through DMA (Direct Memory Access). Hard drives and SSDs are small independent computers. They have the ability to read (and write) all the contents in RAM and store it in space that is not accessible to the user. Including the decryption keys. SSDs advertised as 1 TB probably contain 9 TB of hidden storage where they can hide data for later retrieval by the govt. If you use USB 2.0 then you are safe. https://spritesmods.com/?art=hddhack
- Use only USB 2.0 peripherals. If you must use a USB 3.0 peripheral, make it go through a USB 2.0 adapter, or buy a laptop that has only USB 2.0.
- Use only wifi adapters that have open source firmware and drivers. https://ryf.fsf.org/categories/wireless-adapters
- Do not do important stuff on your bait computer
- Buy a printer second hand, cash only. If you need to print documents.
- Use Tor for everything, even youtube
- Make sure you have multiple hidden partitions on the hard drive. If you are caught with an encrypted hard drive, you will need to give up at least 2 encryption keys. Prepare the 2 partitions with stuff that appears important. https://defuse.ca/truecrypt-plausible-deniability-useless-by-game-theory.htm
- Use a different email, different username and different password for all websites
- Do not use third party password managers. Use a text file and keep track of passwords yourself
- Use alternative search engines. https://gigablast.com https://yandex.com/ https://en.wikipedia.org/wiki/Search_engine
- Save the IP address of important websites. If their DNS is banned you will be able to access them through their IP address. Except those that use cloudflare.
- Use GPG for communications https://emailselfdefense.fsf.org/en/
- Save everything that is important to you and future generations. Books (especially history books). Videos. Music. Games. News articles. Get it now or lose it. https://www.reddit.com/r/DataHoarder/ https://tpb.party/browse/601
- Have an encrypted backup of your data.
- Use Monero for transacting as much as possible.
- Form local communities and secret parallel societies. Use a fake persona. Do not be alone.
- Do not write on public forums as you would do normally. Your writing style can be used to identify you.

Good anonymity information sources:
https://www.youtube.com/c/MentalOutlaw
https://www.youtube.com/c/BraxMe
https://www.youtube.com/c/BlackHatOfficialYT

Feel free to add to this thread.

Some good adviced you have given, but I always thought you can´t use tor with youtube, because youtube requires java script

"FYI - in terms of being vulnerable, if you have javascript enabled on Tor, then that is the same as not using Tor at all.

I don't, but thanks for reminder

No problem. Some people want to watch youtube videos through Tor; javascript being enabled is required for that. I think javascript is also needed for Mega on browsers." FancyMancy https://www.ancient-forums.com/viewtopic.php?f=3&t=43136&p=184607&hilit=tor+youtube#p184607
 
Fuchs said:
Some good adviced you have given, but I always thought you can´t use tor with youtube, because youtube requires java script

"FYI - in terms of being vulnerable, if you have javascript enabled on Tor, then that is the same as not using Tor at all.

I don't, but thanks for reminder

No problem. Some people want to watch youtube videos through Tor; javascript being enabled is required for that. I think javascript is also needed for Mega on browsers." FancyMancy https://www.ancient-forums.com/viewtopic.php?f=3&t=43136&p=184607&hilit=tor+youtube#p184607

For youtube you have to use VPN over Tor (and not Tor over VPN) as youtube has banned all Tor exit nodes.
Make sure that your VPN provider does not know your identity or has a false one.

Here are some links to help you set it up:
https://www.wikihow.com/Route-All-Network-Traffic-Through-the-Tor-Network
https://www.youtubepp.com/watch?v=jfyt5ueyWN8
https://exposingtheinvisible.org/en/guides/vpn-over-tor/

Note the added "pp" at the end of the youtube link. It's a redirect to y2mate.com
 
AgainstAllAuthority said:
SSDs advertised as 1 TB probably contain 9 TB of hidden storage where they can hide data for later retrieval by the govt. If you use USB 2.0 then you are safe. https://spritesmods.com/?art=hddhack

(I like your name as we NS/SS are Triple-A: Against All Authority except our own even Hitler states the revolutionary statements as to why the NS is more revolutionary to themselves and why the Parliamentarians state so. We NS are called Revolutionaries because we are willing to do the job the Parliamentarians who were elected were told to do. Since they don't do their job and we are willing we are labelled Revolutionary. In other words NS = Do your fucking job, like Hitler states in Dalton edition of Mein Kampf: You see the Parliamentarian make his treacherous journey to the government institute building only to stand on the hallway waiting for his name to be called so he can state "Here" and collect his check for a job well done.)

Funny if this was the case the lawsuits that would start flying from the privacy focused groups would be hilarious. As a matter of fact on an open way IF an SSD DID have 9TBs of data. That would not fly with certain people.

9TB is a lot even our GPUs for the current 2XXX-3XXX Nvidia and Radeon 5XXX-6XXX have only gotten to like Tb/TB levels in these recent years.

If all of a sudden someone discovered a hidden 9TB of storage or a SSD compressing 9TB flawlessly and exposed it all of a sudden the HDD industry would collapse quite quickly. Just recently Seagate mentioned pushing 30TB in 2023 and 100TB by 2030.

Funny a SSD with 9TB of data would crush even a moderately priced recently released high-TB HDD. If people can hack this stuff and expose it through driver modifications. Even the most diehard HDD user who NEEDS the storage would opt for SSD.

There's a reason why places and people from websites like [H]ardOCP and Overclock.net and others call HDD spinning rust. Even the Mach.2 and Multi-actuator arm from Seagate and their CMR/PMR/Magnetic/Heat-Laser writing heads which push Sequential to near SSD speeds 300-400-500MB/s is pointless. It's like the recent Plextor M10P, it's considered the Optane of SSD because in certain key benchmarks it's as fast or faster than Optane and on top of that in low-QD performance in one particular one used by a lot of OSs it reaches far faster than Optane actually far faster than any SSD ever made.

Mind explaining this hidden storage of 9TB seems very interesting?

Do you mean 9TB of hidden space in the nand-flash chips or 9TB of some sort of highly advanced hidden algorithm that compresses on the fly flawlessly and is meant to store data for retrieval. If so that would be a hilariously advanced multi-terrabyte compressor. Funny it would outshine even video encoding/decoding software. Companies would kill for 4K/8K/16K compression of said quality if high range video data blasts out at Giga and Terra levels this compressor would make all other compressors laugh. It be considered the blockchaining of technologies when Bitcoin popped up back earlier int he decade.
 
Gear88 said:
Mind explaining this hidden storage of 9TB seems very interesting?

"The idea would be to modify the firmware of a particular hard drive so that it normally only recognizes, say, half of its available space," the document reads. "It would report this size back to the operating system and not provide any way to access the additional space." Only one partition of the drive would be visible on the partition table, leaving the other partitions---where the hidden data was stored---invisible and inaccessible.

https://www.wired.com/2015/02/nsa-firmware-hacking/
 
AgainstAllAuthority said:
Gear88 said:
Mind explaining this hidden storage of 9TB seems very interesting?

"The idea would be to modify the firmware of a particular hard drive so that it normally only recognizes, say, half of its available space," the document reads. "It would report this size back to the operating system and not provide any way to access the additional space." Only one partition of the drive would be visible on the partition table, leaving the other partitions---where the hidden data was stored---invisible and inaccessible.

https://www.wired.com/2015/02/nsa-firmware-hacking/
This is different how you laid it out to be. There is no hidden spacce in storage devices out of the box, as you make it to be. This would be very costly for the manufacturers since the space would have to be on the chip, but it never gets used. Imagine billions of devices having only 10% space available for use. Does not make sense.

Instead the case is that altered firmware by malicious code will increase the size reserved for the firmware. Making it possible to hide data in this sector. It's not excactly undetectable, and "9TB on 1TB disk".
 
Henu the Great said:
AgainstAllAuthority said:
Gear88 said:
Mind explaining this hidden storage of 9TB seems very interesting?

"The idea would be to modify the firmware of a particular hard drive so that it normally only recognizes, say, half of its available space," the document reads. "It would report this size back to the operating system and not provide any way to access the additional space." Only one partition of the drive would be visible on the partition table, leaving the other partitions---where the hidden data was stored---invisible and inaccessible.

https://www.wired.com/2015/02/nsa-firmware-hacking/
This is different how you laid it out to be. There is no hidden spacce in storage devices out of the box, as you make it to be. This would be very costly for the manufacturers since the space would have to be on the chip, but it never gets used. Imagine billions of devices having only 10% space available for use. Does not make sense.

Instead the case is that altered firmware by malicious code will increase the size reserved for the firmware. Making it possible to hide data in this sector. It's not excactly undetectable, and "9TB on 1TB disk".

Come back to this thread in 5 years. By then we will have access to 10 TB SSDs that cost the same and are the same size as current 1 TB SSDs. By then there could be 90 TB of hidden storage.
The cost to the manufacturer is almost the same to produce 1 TB or 10 TB.
 
AgainstAllAuthority said:
Henu the Great said:
AgainstAllAuthority said:
https://www.wired.com/2015/02/nsa-firmware-hacking/
This is different how you laid it out to be. There is no hidden spacce in storage devices out of the box, as you make it to be. This would be very costly for the manufacturers since the space would have to be on the chip, but it never gets used. Imagine billions of devices having only 10% space available for use. Does not make sense.

Instead the case is that altered firmware by malicious code will increase the size reserved for the firmware. Making it possible to hide data in this sector. It's not excactly undetectable, and "9TB on 1TB disk".

Come back to this thread in 5 years. By then we will have access to 10 TB SSDs that cost the same and are the same size as current 1 TB SSDs. By then there could be 90 TB of hidden storage.
The cost to the manufacturer is almost the same to produce 1 TB or 10 TB.
When you make as bold claim as that only 10% of storage space is available for all drives, you should back it up better than showing an article mentioning malicious code hidden in firmware in less than hundred MB of disk space. Given that it was several years ago, it has probably increased in size, but not like you claim.

If what you claim is reality then there should be articles by people revealing this hidden space.
 
I always thought Tor browser was configured with no Java Script within its standard install. So I don't think you have to worry about that unless you specifically turn it on to access certain sites like jewtube, which you shouldn't be anyways. Also don't log into anything with Tor.

For VPN, if you want to be absolutely certain they do not have your identity, use a provider that accepts cash and outside the 14 eyes. I know quite a few that do. I use ProtonVPN for this very reason.
 
Henu the Great said:
AgainstAllAuthority said:
Henu the Great said:
This is different how you laid it out to be. There is no hidden spacce in storage devices out of the box, as you make it to be. This would be very costly for the manufacturers since the space would have to be on the chip, but it never gets used. Imagine billions of devices having only 10% space available for use. Does not make sense.

Instead the case is that altered firmware by malicious code will increase the size reserved for the firmware. Making it possible to hide data in this sector. It's not excactly undetectable, and "9TB on 1TB disk".

Come back to this thread in 5 years. By then we will have access to 10 TB SSDs that cost the same and are the same size as current 1 TB SSDs. By then there could be 90 TB of hidden storage.
The cost to the manufacturer is almost the same to produce 1 TB or 10 TB.
When you make as bold claim as that only 10% of storage space is available for all drives, you should back it up better than showing an article mentioning malicious code hidden in firmware in less than hundred MB of disk space. Given that it was several years ago, it has probably increased in size, but not like you claim.

If what you claim is reality then there should be articles by people revealing this hidden space.

I never claimed that only 10% of storage space is available for all drives.
I claimed that it could be the case and there's no way to verify that it isn't. I wrote this thread for the paranoid, which tend to assume the worst case scenario and put in place countermeasures to avoid the possibility of such a scenario playing out. If you are not paranoid then good for you however you won't be able to change the fears of the paranoid without proving that spying is not going on, which could only be done by taking apart an SSD, exposing the NAND cells and counting them with an electron microscope to ensure that what is advertised corresponds to reality which some people do btw, just not with SSDs https://www.youtube.com/watch?v=fWqBmmPQP40.
Maybe I should phone the NSA and ask them to write an article where they claim that they are not paying SSD manufacturers to reserve space on SSD drives for their spying activities. If they claim that they do no such thing, of course we can take them at their word. /sarcasm

https://www.seagate.com/de/de/tech-insights/ssd-over-provisioning-benefits-master-ti/
 
AgainstAllAuthority said:
Henu the Great said:
AgainstAllAuthority said:
Come back to this thread in 5 years. By then we will have access to 10 TB SSDs that cost the same and are the same size as current 1 TB SSDs. By then there could be 90 TB of hidden storage.
The cost to the manufacturer is almost the same to produce 1 TB or 10 TB.
When you make as bold claim as that only 10% of storage space is available for all drives, you should back it up better than showing an article mentioning malicious code hidden in firmware in less than hundred MB of disk space. Given that it was several years ago, it has probably increased in size, but not like you claim.

If what you claim is reality then there should be articles by people revealing this hidden space.

I never claimed that only 10% of storage space is available for all drives.
I claimed that it could be the case and there's no way to verify that it isn't. I wrote this thread for the paranoid, which tend to assume the worst case scenario and put in place countermeasures to avoid the possibility of such a scenario playing out. If you are not paranoid then good for you however you won't be able to change the fears of the paranoid without proving that spying is not going on, which could only be done by taking apart an SSD, exposing the NAND cells and counting them with an electron microscope to ensure that what is advertised corresponds to reality which some people do btw, just not with SSDs https://www.youtube.com/watch?v=fWqBmmPQP40.
Maybe I should phone the NSA and ask them to write an article where they claim that they are not paying SSD manufacturers to reserve space on SSD drives for their spying activities. If they claim that they do no such thing, of course we can take them at their word. /sarcasm

https://www.seagate.com/de/de/tech-insights/ssd-over-provisioning-benefits-master-ti/

Are you implying overprovisioning for SSD which funny enough is an old HDD trick with spinning platters. Is being used as a free-point to move data and phone home some data center to take your information?

I think with how extreme some people get in computing World many hackers would have discovered data being pinged to a location from their SSD/HDD. They'd ask why is this location being pinged multiple times per day sending data to there.

The over-provisioning in HDD merely speeds up the HDD by a few tens of Mebibytes maybe upwards of a Hundred Mebi on the old high end 15K Barracuda drives before SSDs crushed the shit out of the old Barracudas about the time when the old Jmicron controllers were being removed and the first higher end Intel, Sandisk, and a few other custom controllers came on the market circa "2011" or so.

It seems that with the way some people have become suspicious on computing and software such phenomena would net you some data for some time before some hacker discovers it. There's a reason why some people tell you to only use the TOR or Deep web with linux or some obscure compatible operating system. Hell even some people don't just go linux but install a hacker distro such as Kali or if Backtrack is still operated from then that one despite Kali overtaking Backtrack as a major fork.

It seems plausible to take data from overprovisioning or as HDDs used it they shrink the data point to spin on the inner platter thus using faster speed data by impregnating the outer plate with raw, unused data. On HDD the raw unused, unformatted data is merely used for keeping the data tight on the inner platter. On SSDs the overprovisioning is merely used for garbage collection duties and keeping the SSD healthy. It would seem with some extreme overprovisioning that some companies require there SSDs to be 25-50% overprovisioned it would seem like companies would want to keep their data in tact and not like others to steal their data.

I'm starting to think your not making a good argument and are merely paranoiacal for the sake of not understanding technology and software development.

Yes you make a good point there are myriad of things Governments of the World due to stupid reasons, lots of stupid and scared pussies who express too much pusillanimity. But overprovisioning is like one of the oldest most well thought out ways on increasing performance on a drive even if it's just a tiny percentage more but in many cases it works wonders especially early on with the early 2009-2012 SSD era.
 
AgainstAllAuthority said:
Henu the Great said:
AgainstAllAuthority said:
Come back to this thread in 5 years. By then we will have access to 10 TB SSDs that cost the same and are the same size as current 1 TB SSDs. By then there could be 90 TB of hidden storage.
The cost to the manufacturer is almost the same to produce 1 TB or 10 TB.
When you make as bold claim as that only 10% of storage space is available for all drives, you should back it up better than showing an article mentioning malicious code hidden in firmware in less than hundred MB of disk space. Given that it was several years ago, it has probably increased in size, but not like you claim.

If what you claim is reality then there should be articles by people revealing this hidden space.

I never claimed that only 10% of storage space is available for all drives.
I claimed that it could be the case and there's no way to verify that it isn't. I wrote this thread for the paranoid, which tend to assume the worst case scenario and put in place countermeasures to avoid the possibility of such a scenario playing out. If you are not paranoid then good for you however you won't be able to change the fears of the paranoid without proving that spying is not going on, which could only be done by taking apart an SSD, exposing the NAND cells and counting them with an electron microscope to ensure that what is advertised corresponds to reality which some people do btw, just not with SSDs https://www.youtube.com/watch?v=fWqBmmPQP40.
Maybe I should phone the NSA and ask them to write an article where they claim that they are not paying SSD manufacturers to reserve space on SSD drives for their spying activities. If they claim that they do no such thing, of course we can take them at their word. /sarcasm

https://www.seagate.com/de/de/tech-insights/ssd-over-provisioning-benefits-master-ti/
Alright, fair enough.

In your post that I was replying to, you wrote: "probably" so that's quite a supposition to go with.

Anyway. I do have past expierence with paranoia related to tech having my fair share of planetary transits that played into it and also some intruders on my pc, maybe multiple times. And also, let's not forget that all the microjew products ping to data collection centers all the time, so there is that.

What I wondered after one of my posts that you did not mention the possibility of rewriting firmware on motherboard chips. This too, would be undetectable by convetional methods. And it would make the input/output system exposed to the intruder completely. However such things are not very relevant to everyday users, in anyway. This requires massive effort and is most likely used against high level targets on particular cases, not on civilians. Most of the data gathering is metadata gathering anyway, and this does not require anyone to access computers, but works by compiling and reading the data over at massive data centers which are connected to big communication lines.

Also something else that you did not cover, which admittetly does not affect us civilians, but could potentially used against any tech user is radio frequencies over distance. Military tech exists for this, but the name of the system eludes me now as it has been several years since I read about it, but civilian applications are done too. As you might know every device emit electomagnetic frequencies and through those anyone with tech and knowhow can penetrate systems that are turned on, even those not connected to internet. All that is required is a system that is on, and a frequency receiver with software.

Anyway, I want to end this with something about paranoia. It has to do with unbalance in regards to emotions. Unkowns are frightening and when there is some unbalance in the mind it will result in paranoia. This can be worked on by magick, since some of the effects can come from planetary influences not every solution can be achieved by sheer willpower. You are posting about paranoia here on SS forums, so I ought to bring this up.
 
You missed the most important part of staying anonymous online.

Correlation Data. Information like, "I have a tattoo of a bald eagle", "I went to jail back in october 2012 for battery charges", "I am white", "I have red hair", "I live in michigan", "I have green eyes", and so on and so forth are all tiny little miscalanious pieces of data which can't be used to identify you, but when combined. How many people are white, with red hair, green eyes, live in michigan, have a tattoo of a bald eagle, AND went to jail in october 2012 for battery charges? Well, I can assure you that the number isn't going to be very high.

Be very careful with what you say and what you share online. For instance, recently I wrote a post about my past abuse and trauma, if someone was investigating my real life identity and also trying to figure out my identity online. Just the fact that I was abused for 6-7 years would make it much easier to link my online and in person identity than without any information. However, I shared that information because I needed advice, and as such, appropriate risk with appropriate reward.

Be careful, correlation data is a BITCH.
 
Monarch said:
You missed the most important part of staying anonymous online.

Correlation Data. Information like, "I have a tattoo of a bald eagle", "I went to jail back in october 2012 for battery charges", "I am white", "I have red hair", "I live in michigan", "I have green eyes", and so on and so forth are all tiny little miscalanious pieces of data which can't be used to identify you, but when combined. How many people are white, with red hair, green eyes, live in michigan, have a tattoo of a bald eagle, AND went to jail in october 2012 for battery charges? Well, I can assure you that the number isn't going to be very high.

Be very careful with what you say and what you share online. For instance, recently I wrote a post about my past abuse and trauma, if someone was investigating my real life identity and also trying to figure out my identity online. Just the fact that I was abused for 6-7 years would make it much easier to link my online and in person identity than without any information. However, I shared that information because I needed advice, and as such, appropriate risk with appropriate reward.

Be careful, correlation data is a BITCH.

If they want to look at anything online they can, if they want to listen to your phones they will also.
 
Just found an easy way to watch youtube using the Tor browser set to safest (no javascript).
There is an open source front end for youtube called invidious, which can be downloaded from invidious.io and put on an anonymous webserver (bought using crypto or cash only!).
Alternatively one can use someone else's invidious front end. This one for example: https://vid.puffyan.us which is also reachable by http://grwp24hodrefzvjjuccrkw3mjq4tzhaaq32amf33dzpmuxe7ilepcmad.onion

Enjoy :)
 
Rumor is going around that recently manufactured hard drives and SSDs (10 years and less) can be wiped remotely with a radio broadcast from a satellite.
There is a risk that the powers-that-shouldn't-be are going to wipe all the information from all computers in the world, kill the internet and bring us back into the dark ages.
I urge everyone to have a backup of your data on hard drives that are unpowered. Even better if unpowered and enclosed in a faraday cage.
 
PGP 101: https://ancient-forums.com/viewtopic.php?f=3&t=65885

The least you should do is create a PGP key and share the key fingerprint. The earlier this is done the better. You don't need to know all the details about PGP. You don't need to share the full public key nor upload it to a key server.
With a key fingerprint, you'll be able to authenticate yourself at a later point in time no matter the means of communication.
 
Gear88 said:
AgainstAllAuthority said:
SSDs advertised as 1 TB probably contain 9 TB of hidden storage where they can hide data for later retrieval by the govt. If you use USB 2.0 then you are safe. https://spritesmods.com/?art=hddhack

(I like your name as we NS/SS are Triple-A: Against All Authority except our own even Hitler states the revolutionary statements as to why the NS is more revolutionary to themselves and why the Parliamentarians state so. We NS are called Revolutionaries because we are willing to do the job the Parliamentarians who were elected were told to do. Since they don't do their job and we are willing we are labelled Revolutionary. In other words NS = Do your fucking job, like Hitler states in Dalton edition of Mein Kampf: You see the Parliamentarian make his treacherous journey to the government institute building only to stand on the hallway waiting for his name to be called so he can state "Here" and collect his check for a job well done.)

Funny if this was the case the lawsuits that would start flying from the privacy focused groups would be hilarious. As a matter of fact on an open way IF an SSD DID have 9TBs of data. That would not fly with certain people.

9TB is a lot even our GPUs for the current 2XXX-3XXX Nvidia and Radeon 5XXX-6XXX have only gotten to like Tb/TB levels in these recent years.

If all of a sudden someone discovered a hidden 9TB of storage or a SSD compressing 9TB flawlessly and exposed it all of a sudden the HDD industry would collapse quite quickly. Just recently Seagate mentioned pushing 30TB in 2023 and 100TB by 2030.

Funny a SSD with 9TB of data would crush even a moderately priced recently released high-TB HDD. If people can hack this stuff and expose it through driver modifications. Even the most diehard HDD user who NEEDS the storage would opt for SSD.

There's a reason why places and people from websites like [H]ardOCP and Overclock.net and others call HDD spinning rust. Even the Mach.2 and Multi-actuator arm from Seagate and their CMR/PMR/Magnetic/Heat-Laser writing heads which push Sequential to near SSD speeds 300-400-500MB/s is pointless. It's like the recent Plextor M10P, it's considered the Optane of SSD because in certain key benchmarks it's as fast or faster than Optane and on top of that in low-QD performance in one particular one used by a lot of OSs it reaches far faster than Optane actually far faster than any SSD ever made.

Mind explaining this hidden storage of 9TB seems very interesting?

Do you mean 9TB of hidden space in the nand-flash chips or 9TB of some sort of highly advanced hidden algorithm that compresses on the fly flawlessly and is meant to store data for retrieval. If so that would be a hilariously advanced multi-terrabyte compressor. Funny it would outshine even video encoding/decoding software. Companies would kill for 4K/8K/16K compression of said quality if high range video data blasts out at Giga and Terra levels this compressor would make all other compressors laugh. It be considered the blockchaining of technologies when Bitcoin popped up back earlier int he decade.

I am not sure whether the claim about hidden space is legit. However, I am pretty sure this is unrelated to the current capacity of storage system. One should remember that the public is always at a minimum of 20 years behind certain government branches and top companies behind the scenes. I wouldn't be surprised if they managed to create storages that breach 1 PB or even 1 EB by now.
 
Stormblood said:
I am not sure whether the claim about hidden space is legit. However, I am pretty sure this is unrelated to the current capacity of storage system. One should remember that the public is always at a minimum of 20 years behind certain government branches and top companies behind the scenes. I wouldn't be surprised if they managed to create storages that breach 1 PB or even 1 EB by now.

We have 1 TB microSD cards, which are many orders of magnitude smaller than a SSD drive. One could put 397 microSD cards in the same volume that a SSD drive takes.
I believe that it's very possible that they could sneak in 10 TB of hidden storage in an SSD.
 
Windows 10 and + , and apple products, all cell phones, are spy enabled.

Windows 7 or so was the last of the free world OS.
 
Idyelle said:
Windows 10 and + , and apple products, all cell phones, are spy enabled.

Windows 7 or so was the last of the free world OS.

Windows 7 and anything proprietary is not free nor open.
The only "free" OS from Microsoft is Windows XP as someone illegally leaked the source code. Everything else is not to be trusted. Even if you could trust that it doesn't contain backdoors, you can't change the code. Don't like something? Nothing you can do about it with proprietary closed code.

Listen to some lectures from Richard Stallman and you'll get a better idea of what free/libre software is:
https://www.bitchute.com/video/O1oyC23Ym7aj/
 
AgainstAllAuthority said:
Hi everyone. First post so don't be too harsh on me. :ugeek:

Importance
Most people have no idea how hard it is to be anonymous nor how important it is especially when money is involved.
Most people wrongly assume that if they have nothing to hide, they have nothing to worry about.
Governments and corporations (which are really the same https://foundationfortruthinlaw.org/Files/United-States-is-a-corporation.pdf) spend billions of dollars every year to spy on people. They would not be doing it if it wasn't lucrative.

Example
Lets say that Joe earns $100k per year and that he has a mortgage on a $1 million house that he almost paid off. Only one more year to pay it off. What do you think is going to happen? The bank that he owes money to is going to buy all the information they can on him from the intelligence community. If they see that he is dangerously close to paying off his debt, they will do everything in their power to stop him. They will make him lose his job. Blackmail him. Throw him in prison. Ruin his marriage. Whatever they can in order to make him default on the loan. Then they evict him from his house and sell it on the market. He lost everything.
Do not be Joe. If the enemy succeeds in gathering full intel on you then you are done.

Strategy
Hiding your power level is extremely important.
Appear weak when you are strong, and strong when you are weak — Sun Tzu.
All attacks start small to try to understand how strong the opponent is. Then it slowly escalates.
If you have power, try to always appear weaker than you are so that your enemies will not use their full strength on you. This way you will be able to survive their attacks and make plans for the next ones.
If you have very little power, it is desirable to appear strong so that the enemy attacks you with more force than necessary. You lose very little while they waste a lot of valuable time and resources without gaining anything. This will make them reluctant to attack you later.
It is desirable to lose some inconsequential battles in order to deceive the enemy into a false sense of safety.

It is extremely important that nobody knows:
- how much money you have
- how many assets you have
- how much you make
- where and how you make it
- who you know and who knows you
- your movements
- your beliefs
- your plans
- your intelligence and knowledge level

If others know what you know, then they also know what you don't know and you open yourself to being attacked. Information is powerful and most of it we lose it through our electronic devices.

Computer anonymity
It is impossible to obtain 100% anonymity using any electronic device. If the intelligence agencies want your information badly enough, they will get it. How badly they want it depends on your power level. The less powerful you appear to be, the less they will want your information.
However, having zero anonymity makes it impossible to hide the power level, thus making it very hard to keep power and even harder to increase it.

Misinformation
One of the best ways to throw people off is to create a false persona on a bait computer. Make a youtube account and subscribe to all the popular channels. Open CNN and put it on autoplay. Make a facebook account and start liking all the garbage. Write stupid stuff on your social media. Make people think you are xtian.

Recommendations for anonymity
Here are my recommendations when it comes to the important stuff.
- Buy a laptop with cash only on which you can install libreboot, then install libreboot on it yourself. https://www.youtube.com/watch?v=HNwWQ9zGT-8
- De-solder the camera, microphone, wifi and bluetooth.
- Use only open source software. https://www.fsf.org
- Install the open source operating system on an external USB 2.0 hard drive or SSD. Make sure to encrypt everything. Keep a backup of your data on another USB drive in another location. SATA, PCIe and USB 3.0 are not safe as all the contents of RAM are exposed through DMA (Direct Memory Access). Hard drives and SSDs are small independent computers. They have the ability to read (and write) all the contents in RAM and store it in space that is not accessible to the user. Including the decryption keys. SSDs advertised as 1 TB probably contain 9 TB of hidden storage where they can hide data for later retrieval by the govt. If you use USB 2.0 then you are safe. https://spritesmods.com/?art=hddhack
- Use only USB 2.0 peripherals. If you must use a USB 3.0 peripheral, make it go through a USB 2.0 adapter, or buy a laptop that has only USB 2.0.
- Use only wifi adapters that have open source firmware and drivers. https://ryf.fsf.org/categories/wireless-adapters
- Do not do important stuff on your bait computer
- Buy a printer second hand, cash only. If you need to print documents.
- Use Tor for everything, even youtube
- Make sure you have multiple hidden partitions on the hard drive. If you are caught with an encrypted hard drive, you will need to give up at least 2 encryption keys. Prepare the 2 partitions with stuff that appears important. https://defuse.ca/truecrypt-plausible-deniability-useless-by-game-theory.htm
- Use a different email, different username and different password for all websites
- Do not use third party password managers. Use a text file and keep track of passwords yourself
- Use alternative search engines. https://gigablast.com https://yandex.com/ https://en.wikipedia.org/wiki/Search_engine
- Save the IP address of important websites. If their DNS is banned you will be able to access them through their IP address. Except those that use cloudflare.
- Use GPG for communications https://emailselfdefense.fsf.org/en/
- Save everything that is important to you and future generations. Books (especially history books). Videos. Music. Games. News articles. Get it now or lose it. https://www.reddit.com/r/DataHoarder/ https://tpb.party/browse/601
- Have an encrypted backup of your data.
- Use Monero for transacting as much as possible.
- Form local communities and secret parallel societies. Use a fake persona. Do not be alone.
- Do not write on public forums as you would do normally. Your writing style can be used to identify you.

Good anonymity information sources:
https://www.youtube.com/c/MentalOutlaw
https://www.youtube.com/c/BraxMe
https://www.youtube.com/c/BlackHatOfficialYT

Feel free to add to this thread.


This a great post
 
$ignificant$un said:
I always thought Tor browser was configured with no Java Script within its standard install. So I don't think you have to worry about that unless you specifically turn it on to access certain sites like jewtube, which you shouldn't be anyways. Also don't log into anything with Tor.

For VPN, if you want to be absolutely certain they do not have your identity, use a provider that accepts cash and outside the 14 eyes. I know quite a few that do. I use ProtonVPN for this very reason.

i like your picture it has cool optical illusion effect
 
Mastermind said:
Hi everyone. First post so don't be too harsh on me. :ugeek:

Importance
Most people have no idea how hard it is to be anonymous nor how important it is especially when money is involved.
Most people wrongly assume that if they have nothing to hide, they have nothing to worry about.
Governments and corporations (which are really the same https://foundationfortruthinlaw.org/Files/United-States-is-a-corporation.pdf) spend billions of dollars every year to spy on people. They would not be doing it if it wasn't lucrative.

Example
Lets say that Joe earns $100k per year and that he has a mortgage on a $1 million house that he almost paid off. Only one more year to pay it off. What do you think is going to happen? The bank that he owes money to is going to buy all the information they can on him from the intelligence community. If they see that he is dangerously close to paying off his debt, they will do everything in their power to stop him. They will make him lose his job. Blackmail him. Throw him in prison. Ruin his marriage. Whatever they can in order to make him default on the loan. Then they evict him from his house and sell it on the market. He lost everything.
Do not be Joe. If the enemy succeeds in gathering full intel on you then you are done.

Strategy
Hiding your power level is extremely important.
Appear weak when you are strong, and strong when you are weak — Sun Tzu.
All attacks start small to try to understand how strong the opponent is. Then it slowly escalates.
If you have power, try to always appear weaker than you are so that your enemies will not use their full strength on you. This way you will be able to survive their attacks and make plans for the next ones.
If you have very little power, it is desirable to appear strong so that the enemy attacks you with more force than necessary. You lose very little while they waste a lot of valuable time and resources without gaining anything. This will make them reluctant to attack you later.
It is desirable to lose some inconsequential battles in order to deceive the enemy into a false sense of safety.

It is extremely important that nobody knows:
- how much money you have
- how many assets you have
- how much you make
- where and how you make it
- who you know and who knows you
- your movements
- your beliefs
- your plans
- your intelligence and knowledge level

If others know what you know, then they also know what you don't know and you open yourself to being attacked. Information is powerful and most of it we lose it through our electronic devices.

Computer anonymity
It is impossible to obtain 100% anonymity using any electronic device. If the intelligence agencies want your information badly enough, they will get it. How badly they want it depends on your power level. The less powerful you appear to be, the less they will want your information.
However, having zero anonymity makes it impossible to hide the power level, thus making it very hard to keep power and even harder to increase it.

Misinformation
One of the best ways to throw people off is to create a false persona on a bait computer. Make a youtube account and subscribe to all the popular channels. Open CNN and put it on autoplay. Make a facebook account and start liking all the garbage. Write stupid stuff on your social media. Make people think you are xtian.

Recommendations for anonymity
Here are my recommendations when it comes to the important stuff.
- Buy a laptop with cash only on which you can install libreboot, then install libreboot on it yourself. https://www.youtube.com/watch?v=HNwWQ9zGT-8
- De-solder the camera, microphone, wifi and bluetooth.
- Use only open source software. https://www.fsf.org
- Install the open source operating system on an external USB 2.0 hard drive or SSD. Make sure to encrypt everything. Keep a backup of your data on another USB drive in another location. SATA, PCIe and USB 3.0 are not safe as all the contents of RAM are exposed through DMA (Direct Memory Access). Hard drives and SSDs are small independent computers. They have the ability to read (and write) all the contents in RAM and store it in space that is not accessible to the user. Including the decryption keys. SSDs advertised as 1 TB probably contain 9 TB of hidden storage where they can hide data for later retrieval by the govt. If you use USB 2.0 then you are safe. https://spritesmods.com/?art=hddhack
- Use only USB 2.0 peripherals. If you must use a USB 3.0 peripheral, make it go through a USB 2.0 adapter, or buy a laptop that has only USB 2.0.
- Use only wifi adapters that have open source firmware and drivers. https://ryf.fsf.org/categories/wireless-adapters
- Do not do important stuff on your bait computer
- Buy a printer second hand, cash only. If you need to print documents.
- Use Tor for everything, even youtube
- Make sure you have multiple hidden partitions on the hard drive. If you are caught with an encrypted hard drive, you will need to give up at least 2 encryption keys. Prepare the 2 partitions with stuff that appears important. https://defuse.ca/truecrypt-plausible-deniability-useless-by-game-theory.htm
- Use a different email, different username and different password for all websites
- Do not use third party password managers. Use a text file and keep track of passwords yourself
- Use alternative search engines. https://gigablast.com https://yandex.com/ https://en.wikipedia.org/wiki/Search_engine
- Save the IP address of important websites. If their DNS is banned you will be able to access them through their IP address. Except those that use cloudflare.
- Use GPG for communications https://emailselfdefense.fsf.org/en/
- Save everything that is important to you and future generations. Books (especially history books). Videos. Music. Games. News articles. Get it now or lose it. https://www.reddit.com/r/DataHoarder/ https://tpb.party/browse/601
- Have an encrypted backup of your data.
- Use Monero for transacting as much as possible.
- Form local communities and secret parallel societies. Use a fake persona. Do not be alone.
- Do not write on public forums as you would do normally. Your writing style can be used to identify you.

Good anonymity information sources:
https://www.youtube.com/c/MentalOutlaw
https://www.youtube.com/c/BraxMe
https://www.youtube.com/c/BlackHatOfficialYT

Feel free to add to this thread.

Superb OP mate loved this.
 
Encrochat phones honey trap.

Something similar in OZ an app called ANon.


They are very clever.
 
Not sure if It's been mentioned in any of the tech related posts. But I hadn't seen it. Has anyone used Tails OS? You can install the whole operating system on a flashdrive and as far as I could tell it does quite well for the whole Anonymity thing.


https://tails.boum.org/
 
https://anonfiles.com/G8C5g117y9/cyber_security_advice_pdf


The above gives one a comprehensive step-by-step instruction for cyber security. Feel free to spread it around.
 
SerenaMousse said:
Not sure if It's been mentioned in any of the tech related posts. But I hadn't seen it. Has anyone used Tails OS? You can install the whole operating system on a flashdrive and as far as I could tell it does quite well for the whole Anonymity thing.


https://tails.boum.org/

Tails is basically just Tor. And Tor is not perfectly private or secure. And also takes a very long time for anything to load.
 
DeusDemon said:
https://anonfiles.com/G8C5g117y9/cyber_security_advice_pdf


The above gives one a comprehensive step-by-step instruction for cyber security. Feel free to spread it around.

Saying this is a dodgy link pal
 
great post... are u still in the community?

EnkiUK55 said:
Mastermind said:
Hi everyone. First post so don't be too harsh on me. :ugeek:

Importance
Most people have no idea how hard it is to be anonymous nor how important it is especially when money is involved.
Most people wrongly assume that if they have nothing to hide, they have nothing to worry about.
Governments and corporations (which are really the same https://foundationfortruthinlaw.org/Files/United-States-is-a-corporation.pdf) spend billions of dollars every year to spy on people. They would not be doing it if it wasn't lucrative.

Example
Lets say that Joe earns $100k per year and that he has a mortgage on a $1 million house that he almost paid off. Only one more year to pay it off. What do you think is going to happen? The bank that he owes money to is going to buy all the information they can on him from the intelligence community. If they see that he is dangerously close to paying off his debt, they will do everything in their power to stop him. They will make him lose his job. Blackmail him. Throw him in prison. Ruin his marriage. Whatever they can in order to make him default on the loan. Then they evict him from his house and sell it on the market. He lost everything.
Do not be Joe. If the enemy succeeds in gathering full intel on you then you are done.

Strategy
Hiding your power level is extremely important.
Appear weak when you are strong, and strong when you are weak — Sun Tzu.
All attacks start small to try to understand how strong the opponent is. Then it slowly escalates.
If you have power, try to always appear weaker than you are so that your enemies will not use their full strength on you. This way you will be able to survive their attacks and make plans for the next ones.
If you have very little power, it is desirable to appear strong so that the enemy attacks you with more force than necessary. You lose very little while they waste a lot of valuable time and resources without gaining anything. This will make them reluctant to attack you later.
It is desirable to lose some inconsequential battles in order to deceive the enemy into a false sense of safety.

It is extremely important that nobody knows:
- how much money you have
- how many assets you have
- how much you make
- where and how you make it
- who you know and who knows you
- your movements
- your beliefs
- your plans
- your intelligence and knowledge level

If others know what you know, then they also know what you don't know and you open yourself to being attacked. Information is powerful and most of it we lose it through our electronic devices.

Computer anonymity
It is impossible to obtain 100% anonymity using any electronic device. If the intelligence agencies want your information badly enough, they will get it. How badly they want it depends on your power level. The less powerful you appear to be, the less they will want your information.
However, having zero anonymity makes it impossible to hide the power level, thus making it very hard to keep power and even harder to increase it.

Misinformation
One of the best ways to throw people off is to create a false persona on a bait computer. Make a youtube account and subscribe to all the popular channels. Open CNN and put it on autoplay. Make a facebook account and start liking all the garbage. Write stupid stuff on your social media. Make people think you are xtian.

Recommendations for anonymity
Here are my recommendations when it comes to the important stuff.
- Buy a laptop with cash only on which you can install libreboot, then install libreboot on it yourself. https://www.youtube.com/watch?v=HNwWQ9zGT-8
- De-solder the camera, microphone, wifi and bluetooth.
- Use only open source software. https://www.fsf.org
- Install the open source operating system on an external USB 2.0 hard drive or SSD. Make sure to encrypt everything. Keep a backup of your data on another USB drive in another location. SATA, PCIe and USB 3.0 are not safe as all the contents of RAM are exposed through DMA (Direct Memory Access). Hard drives and SSDs are small independent computers. They have the ability to read (and write) all the contents in RAM and store it in space that is not accessible to the user. Including the decryption keys. SSDs advertised as 1 TB probably contain 9 TB of hidden storage where they can hide data for later retrieval by the govt. If you use USB 2.0 then you are safe. https://spritesmods.com/?art=hddhack
- Use only USB 2.0 peripherals. If you must use a USB 3.0 peripheral, make it go through a USB 2.0 adapter, or buy a laptop that has only USB 2.0.
- Use only wifi adapters that have open source firmware and drivers. https://ryf.fsf.org/categories/wireless-adapters
- Do not do important stuff on your bait computer
- Buy a printer second hand, cash only. If you need to print documents.
- Use Tor for everything, even youtube
- Make sure you have multiple hidden partitions on the hard drive. If you are caught with an encrypted hard drive, you will need to give up at least 2 encryption keys. Prepare the 2 partitions with stuff that appears important. https://defuse.ca/truecrypt-plausible-deniability-useless-by-game-theory.htm
- Use a different email, different username and different password for all websites
- Do not use third party password managers. Use a text file and keep track of passwords yourself
- Use alternative search engines. https://gigablast.com https://yandex.com/ https://en.wikipedia.org/wiki/Search_engine
- Save the IP address of important websites. If their DNS is banned you will be able to access them through their IP address. Except those that use cloudflare.
- Use GPG for communications https://emailselfdefense.fsf.org/en/
- Save everything that is important to you and future generations. Books (especially history books). Videos. Music. Games. News articles. Get it now or lose it. https://www.reddit.com/r/DataHoarder/ https://tpb.party/browse/601
- Have an encrypted backup of your data.
- Use Monero for transacting as much as possible.
- Form local communities and secret parallel societies. Use a fake persona. Do not be alone.
- Do not write on public forums as you would do normally. Your writing style can be used to identify you.

Good anonymity information sources:
https://www.youtube.com/c/MentalOutlaw
https://www.youtube.com/c/BraxMe
https://www.youtube.com/c/BlackHatOfficialYT

Feel free to add to this thread.

Superb OP mate loved this.
 
Queen of the Stars said:
great post... are u still in the community?

EnkiUK55 said:
Mastermind said:
Hi everyone. First post so don't be too harsh on me. :ugeek:

Importance
Most people have no idea how hard it is to be anonymous nor how important it is especially when money is involved.
Most people wrongly assume that if they have nothing to hide, they have nothing to worry about.
Governments and corporations (which are really the same https://foundationfortruthinlaw.org/Files/United-States-is-a-corporation.pdf) spend billions of dollars every year to spy on people. They would not be doing it if it wasn't lucrative.

Example
Lets say that Joe earns $100k per year and that he has a mortgage on a $1 million house that he almost paid off. Only one more year to pay it off. What do you think is going to happen? The bank that he owes money to is going to buy all the information they can on him from the intelligence community. If they see that he is dangerously close to paying off his debt, they will do everything in their power to stop him. They will make him lose his job. Blackmail him. Throw him in prison. Ruin his marriage. Whatever they can in order to make him default on the loan. Then they evict him from his house and sell it on the market. He lost everything.
Do not be Joe. If the enemy succeeds in gathering full intel on you then you are done.

Strategy
Hiding your power level is extremely important.
Appear weak when you are strong, and strong when you are weak — Sun Tzu.
All attacks start small to try to understand how strong the opponent is. Then it slowly escalates.
If you have power, try to always appear weaker than you are so that your enemies will not use their full strength on you. This way you will be able to survive their attacks and make plans for the next ones.
If you have very little power, it is desirable to appear strong so that the enemy attacks you with more force than necessary. You lose very little while they waste a lot of valuable time and resources without gaining anything. This will make them reluctant to attack you later.
It is desirable to lose some inconsequential battles in order to deceive the enemy into a false sense of safety.

It is extremely important that nobody knows:
- how much money you have
- how many assets you have
- how much you make
- where and how you make it
- who you know and who knows you
- your movements
- your beliefs
- your plans
- your intelligence and knowledge level

If others know what you know, then they also know what you don't know and you open yourself to being attacked. Information is powerful and most of it we lose it through our electronic devices.

Computer anonymity
It is impossible to obtain 100% anonymity using any electronic device. If the intelligence agencies want your information badly enough, they will get it. How badly they want it depends on your power level. The less powerful you appear to be, the less they will want your information.
However, having zero anonymity makes it impossible to hide the power level, thus making it very hard to keep power and even harder to increase it.

Misinformation
One of the best ways to throw people off is to create a false persona on a bait computer. Make a youtube account and subscribe to all the popular channels. Open CNN and put it on autoplay. Make a facebook account and start liking all the garbage. Write stupid stuff on your social media. Make people think you are xtian.

Recommendations for anonymity
Here are my recommendations when it comes to the important stuff.
- Buy a laptop with cash only on which you can install libreboot, then install libreboot on it yourself. https://www.youtube.com/watch?v=HNwWQ9zGT-8
- De-solder the camera, microphone, wifi and bluetooth.
- Use only open source software. https://www.fsf.org
- Install the open source operating system on an external USB 2.0 hard drive or SSD. Make sure to encrypt everything. Keep a backup of your data on another USB drive in another location. SATA, PCIe and USB 3.0 are not safe as all the contents of RAM are exposed through DMA (Direct Memory Access). Hard drives and SSDs are small independent computers. They have the ability to read (and write) all the contents in RAM and store it in space that is not accessible to the user. Including the decryption keys. SSDs advertised as 1 TB probably contain 9 TB of hidden storage where they can hide data for later retrieval by the govt. If you use USB 2.0 then you are safe. https://spritesmods.com/?art=hddhack
- Use only USB 2.0 peripherals. If you must use a USB 3.0 peripheral, make it go through a USB 2.0 adapter, or buy a laptop that has only USB 2.0.
- Use only wifi adapters that have open source firmware and drivers. https://ryf.fsf.org/categories/wireless-adapters
- Do not do important stuff on your bait computer
- Buy a printer second hand, cash only. If you need to print documents.
- Use Tor for everything, even youtube
- Make sure you have multiple hidden partitions on the hard drive. If you are caught with an encrypted hard drive, you will need to give up at least 2 encryption keys. Prepare the 2 partitions with stuff that appears important. https://defuse.ca/truecrypt-plausible-deniability-useless-by-game-theory.htm
- Use a different email, different username and different password for all websites
- Do not use third party password managers. Use a text file and keep track of passwords yourself
- Use alternative search engines. https://gigablast.com https://yandex.com/ https://en.wikipedia.org/wiki/Search_engine
- Save the IP address of important websites. If their DNS is banned you will be able to access them through their IP address. Except those that use cloudflare.
- Use GPG for communications https://emailselfdefense.fsf.org/en/
- Save everything that is important to you and future generations. Books (especially history books). Videos. Music. Games. News articles. Get it now or lose it. https://www.reddit.com/r/DataHoarder/ https://tpb.party/browse/601
- Have an encrypted backup of your data.
- Use Monero for transacting as much as possible.
- Form local communities and secret parallel societies. Use a fake persona. Do not be alone.
- Do not write on public forums as you would do normally. Your writing style can be used to identify you.

Good anonymity information sources:
https://www.youtube.com/c/MentalOutlaw
https://www.youtube.com/c/BraxMe
https://www.youtube.com/c/BlackHatOfficialYT

Feel free to add to this thread.

Superb OP mate loved this.

Always Kid


Oh you mean Mastermind.

Fn great post by him.
 
Hi mastermind,

“If you have power, try to always appear weaker than you are so that your enemies will not use their full strength on you”

so would you always advise to dress moderately , never to wear expensive jewelry, or clothes ?

Wear and buy practical things? Nothing for status?

Hail Satan!

Mastermind said:
Hi everyone. First post so don't be too harsh on me. :ugeek:

Importance
Most people have no idea how hard it is to be anonymous nor how important it is especially when money is involved.
Most people wrongly assume that if they have nothing to hide, they have nothing to worry about.
Governments and corporations (which are really the same https://foundationfortruthinlaw.org/Files/United-States-is-a-corporation.pdf) spend billions of dollars every year to spy on people. They would not be doing it if it wasn't lucrative.

Example
Lets say that Joe earns $100k per year and that he has a mortgage on a $1 million house that he almost paid off. Only one more year to pay it off. What do you think is going to happen? The bank that he owes money to is going to buy all the information they can on him from the intelligence community. If they see that he is dangerously close to paying off his debt, they will do everything in their power to stop him. They will make him lose his job. Blackmail him. Throw him in prison. Ruin his marriage. Whatever they can in order to make him default on the loan. Then they evict him from his house and sell it on the market. He lost everything.
Do not be Joe. If the enemy succeeds in gathering full intel on you then you are done.

Strategy
Hiding your power level is extremely important.
Appear weak when you are strong, and strong when you are weak — Sun Tzu.
All attacks start small to try to understand how strong the opponent is. Then it slowly escalates.
If you have power, try to always appear weaker than you are so that your enemies will not use their full strength on you. This way you will be able to survive their attacks and make plans for the next ones.
If you have very little power, it is desirable to appear strong so that the enemy attacks you with more force than necessary. You lose very little while they waste a lot of valuable time and resources without gaining anything. This will make them reluctant to attack you later.
It is desirable to lose some inconsequential battles in order to deceive the enemy into a false sense of safety.

It is extremely important that nobody knows:
- how much money you have
- how many assets you have
- how much you make
- where and how you make it
- who you know and who knows you
- your movements
- your beliefs
- your plans
- your intelligence and knowledge level

If others know what you know, then they also know what you don't know and you open yourself to being attacked. Information is powerful and most of it we lose it through our electronic devices.

Computer anonymity
It is impossible to obtain 100% anonymity using any electronic device. If the intelligence agencies want your information badly enough, they will get it. How badly they want it depends on your power level. The less powerful you appear to be, the less they will want your information.
However, having zero anonymity makes it impossible to hide the power level, thus making it very hard to keep power and even harder to increase it.

Misinformation
One of the best ways to throw people off is to create a false persona on a bait computer. Make a youtube account and subscribe to all the popular channels. Open CNN and put it on autoplay. Make a facebook account and start liking all the garbage. Write stupid stuff on your social media. Make people think you are xtian.

Recommendations for anonymity
Here are my recommendations when it comes to the important stuff.
- Buy a laptop with cash only on which you can install libreboot, then install libreboot on it yourself. https://www.youtube.com/watch?v=HNwWQ9zGT-8
- De-solder the camera, microphone, wifi and bluetooth.
- Use only open source software. https://www.fsf.org
- Install the open source operating system on an external USB 2.0 hard drive or SSD. Make sure to encrypt everything. Keep a backup of your data on another USB drive in another location. SATA, PCIe and USB 3.0 are not safe as all the contents of RAM are exposed through DMA (Direct Memory Access). Hard drives and SSDs are small independent computers. They have the ability to read (and write) all the contents in RAM and store it in space that is not accessible to the user. Including the decryption keys. SSDs advertised as 1 TB probably contain 9 TB of hidden storage where they can hide data for later retrieval by the govt. If you use USB 2.0 then you are safe. https://spritesmods.com/?art=hddhack
- Use only USB 2.0 peripherals. If you must use a USB 3.0 peripheral, make it go through a USB 2.0 adapter, or buy a laptop that has only USB 2.0.
- Use only wifi adapters that have open source firmware and drivers. https://ryf.fsf.org/categories/wireless-adapters
- Do not do important stuff on your bait computer
- Buy a printer second hand, cash only. If you need to print documents.
- Use Tor for everything, even youtube
- Make sure you have multiple hidden partitions on the hard drive. If you are caught with an encrypted hard drive, you will need to give up at least 2 encryption keys. Prepare the 2 partitions with stuff that appears important. https://defuse.ca/truecrypt-plausible-deniability-useless-by-game-theory.htm
- Use a different email, different username and different password for all websites
- Do not use third party password managers. Use a text file and keep track of passwords yourself
- Use alternative search engines. https://gigablast.com https://yandex.com/ https://en.wikipedia.org/wiki/Search_engine
- Save the IP address of important websites. If their DNS is banned you will be able to access them through their IP address. Except those that use cloudflare.
- Use GPG for communications https://emailselfdefense.fsf.org/en/
- Save everything that is important to you and future generations. Books (especially history books). Videos. Music. Games. News articles. Get it now or lose it. https://www.reddit.com/r/DataHoarder/ https://tpb.party/browse/601
- Have an encrypted backup of your data.
- Use Monero for transacting as much as possible.
- Form local communities and secret parallel societies. Use a fake persona. Do not be alone.
- Do not write on public forums as you would do normally. Your writing style can be used to identify you.

Good anonymity information sources:
https://www.youtube.com/c/MentalOutlaw
https://www.youtube.com/c/BraxMe
https://www.youtube.com/c/BlackHatOfficialYT

Feel free to add to this thread.
 
Dont some people pray on people that look weak,

Can fight, don’t know their rights...

Doesn’t it invite trouble sometimes , when looking weak ?

quote="Artoria Pendragon" post_id=383314 time=1661327771 user_id=72969]
Hi mastermind,

“If you have power, try to always appear weaker than you are so that your enemies will not use their full strength on you”

so would you always advise to dress moderately , never to wear expensive jewelry, or clothes ?

Wear and buy practical things? Nothing for status?

Hail Satan!

Mastermind said:
Hi everyone. First post so don't be too harsh on me. :ugeek:

Importance
Most people have no idea how hard it is to be anonymous nor how important it is especially when money is involved.
Most people wrongly assume that if they have nothing to hide, they have nothing to worry about.
Governments and corporations (which are really the same https://foundationfortruthinlaw.org/Files/United-States-is-a-corporation.pdf) spend billions of dollars every year to spy on people. They would not be doing it if it wasn't lucrative.

Example
Lets say that Joe earns $100k per year and that he has a mortgage on a $1 million house that he almost paid off. Only one more year to pay it off. What do you think is going to happen? The bank that he owes money to is going to buy all the information they can on him from the intelligence community. If they see that he is dangerously close to paying off his debt, they will do everything in their power to stop him. They will make him lose his job. Blackmail him. Throw him in prison. Ruin his marriage. Whatever they can in order to make him default on the loan. Then they evict him from his house and sell it on the market. He lost everything.
Do not be Joe. If the enemy succeeds in gathering full intel on you then you are done.

Strategy
Hiding your power level is extremely important.
Appear weak when you are strong, and strong when you are weak — Sun Tzu.
All attacks start small to try to understand how strong the opponent is. Then it slowly escalates.
If you have power, try to always appear weaker than you are so that your enemies will not use their full strength on you. This way you will be able to survive their attacks and make plans for the next ones.
If you have very little power, it is desirable to appear strong so that the enemy attacks you with more force than necessary. You lose very little while they waste a lot of valuable time and resources without gaining anything. This will make them reluctant to attack you later.
It is desirable to lose some inconsequential battles in order to deceive the enemy into a false sense of safety.

It is extremely important that nobody knows:
- how much money you have
- how many assets you have
- how much you make
- where and how you make it
- who you know and who knows you
- your movements
- your beliefs
- your plans
- your intelligence and knowledge level

If others know what you know, then they also know what you don't know and you open yourself to being attacked. Information is powerful and most of it we lose it through our electronic devices.

Computer anonymity
It is impossible to obtain 100% anonymity using any electronic device. If the intelligence agencies want your information badly enough, they will get it. How badly they want it depends on your power level. The less powerful you appear to be, the less they will want your information.
However, having zero anonymity makes it impossible to hide the power level, thus making it very hard to keep power and even harder to increase it.

Misinformation
One of the best ways to throw people off is to create a false persona on a bait computer. Make a youtube account and subscribe to all the popular channels. Open CNN and put it on autoplay. Make a facebook account and start liking all the garbage. Write stupid stuff on your social media. Make people think you are xtian.

Recommendations for anonymity
Here are my recommendations when it comes to the important stuff.
- Buy a laptop with cash only on which you can install libreboot, then install libreboot on it yourself. https://www.youtube.com/watch?v=HNwWQ9zGT-8
- De-solder the camera, microphone, wifi and bluetooth.
- Use only open source software. https://www.fsf.org
- Install the open source operating system on an external USB 2.0 hard drive or SSD. Make sure to encrypt everything. Keep a backup of your data on another USB drive in another location. SATA, PCIe and USB 3.0 are not safe as all the contents of RAM are exposed through DMA (Direct Memory Access). Hard drives and SSDs are small independent computers. They have the ability to read (and write) all the contents in RAM and store it in space that is not accessible to the user. Including the decryption keys. SSDs advertised as 1 TB probably contain 9 TB of hidden storage where they can hide data for later retrieval by the govt. If you use USB 2.0 then you are safe. https://spritesmods.com/?art=hddhack
- Use only USB 2.0 peripherals. If you must use a USB 3.0 peripheral, make it go through a USB 2.0 adapter, or buy a laptop that has only USB 2.0.
- Use only wifi adapters that have open source firmware and drivers. https://ryf.fsf.org/categories/wireless-adapters
- Do not do important stuff on your bait computer
- Buy a printer second hand, cash only. If you need to print documents.
- Use Tor for everything, even youtube
- Make sure you have multiple hidden partitions on the hard drive. If you are caught with an encrypted hard drive, you will need to give up at least 2 encryption keys. Prepare the 2 partitions with stuff that appears important. https://defuse.ca/truecrypt-plausible-deniability-useless-by-game-theory.htm
- Use a different email, different username and different password for all websites
- Do not use third party password managers. Use a text file and keep track of passwords yourself
- Use alternative search engines. https://gigablast.com https://yandex.com/ https://en.wikipedia.org/wiki/Search_engine
- Save the IP address of important websites. If their DNS is banned you will be able to access them through their IP address. Except those that use cloudflare.
- Use GPG for communications https://emailselfdefense.fsf.org/en/
- Save everything that is important to you and future generations. Books (especially history books). Videos. Music. Games. News articles. Get it now or lose it. https://www.reddit.com/r/DataHoarder/ https://tpb.party/browse/601
- Have an encrypted backup of your data.
- Use Monero for transacting as much as possible.
- Form local communities and secret parallel societies. Use a fake persona. Do not be alone.
- Do not write on public forums as you would do normally. Your writing style can be used to identify you.

Good anonymity information sources:
https://www.youtube.com/c/MentalOutlaw
https://www.youtube.com/c/BraxMe
https://www.youtube.com/c/BlackHatOfficialYT

Feel free to add to this thread.
[/quote]
 
Thanks comrade, that precisely what drew me too it :)
[/quote]

i like your picture it has cool optical illusion effect
[/quote]
 
As for Anonimity, I may add the usage of ProtonMail and also Tutanota email service.

Both are very good in my opinion.

If necessary, you can also use PGP for Windows and encryption documents with it.

Just my suggestions for now.
 

Al Jilwah: Chapter IV

"It is my desire that all my followers unite in a bond of unity, lest those who are without prevail against them." - Satan

Back
Top