IP address

Arminio marketing

Registered Member
Joined
Jul 29, 2020
Messages
86
Reaction score
38
hello every one i am looking to change my ip address i try to use an VPN but the ip its still the same
i am doing all this to create an gmail / google account without a phone verification can some one help ?
 
If you are using a VPN and your IP does not change, that means you are not using the VPN correctly. And you intend to create a gmail / google account without phone verification ? In that case a VPN will not help, as almost all VPN's IPs are datacenter IPs. To avoid phone verification you will need high quality 4g mobile IPs (proxies), which are usually on the expensive side.
 
Cant simply do that, you could use a mobile hotspot with prepaid sim
 
Do not trust VPN. Install an OS like "Whonix" that connects to TOR relays. (It can also be qubes or tails, which are also specially developed for TOR) If you're planning strict privacy, add yourself a dedicated VPN hardware in addition to this operating system. Sample: https://www.anonabox.com/ (Not necessary, but LINUX using TOR relays for strict privacy is indispensable)
 
Last edited:
Please What is TOR ? I am also interested in Accessing websites without being blocked
Install an OS like "Whonix" that connects to TOR relays. (It can also be qubes or tails, which are also specially developed for TOR)
If you're planning strict privacy, add yourself a dedicated VPN hardware in addition to this operating system. Sample: https://www.anonabox.com/
 
Please What is TOR ? I am also interested in Accessing websites without being blocked

Tor is a network design roughly built on privacy. These network design and relays (servers) are public, managed by hackers and volunteers. Its purpose is to evade the traffic analysis of internet service providers. In a properly configured Tor network, it is theoretically impossible to track a user's IP. (There are also some dangers, such as spy relays, but spy relays are regularly audited by the Tor team) As long as you do not provide vulnerabilities (social engineering vulnerabilities) such as your real e-mail address and phone, it will protect your IP address unrivaled. (For example, an email address obtained over a real ip is a social engineering vulnerability) Even the way you talk and your behavior are among social engineering vulnerabilities.

There are operating systems configured specifically for Tor, such as Whonix, and every connection, including DNS leaks, is directed to Tor servers. In such operating systems, the connection is automatically disconnected if there is an IP or DNS leak. Tor's purpose is real privacy, not actually connecting to banned websites like VPN. Of course it also works for banned websites. If you don't plan on strict privacy, you can download Tor's desktop software and use it on windows.

Here is Tor Official Site And Mirror:
https://www.torproject.orghttps://tor.ybti.net
Linux Versions Specially Configured for Tor:
https://www.whonix.org (It runs on virtual operating system and VirtualBox.) Check the website for installation and use.
https://tails.boum.org (Only works on volatile memory, data is not written to disk)
https://www.qubes-os.org This requires more advanced expertise than others.

The limits of Tor and how much security it can provide will ultimately depend on your ability to use it.
 
you can use other IP changing software like HMA,911,Hotspot Shield,..

Never! In particular, there are claims that "Hotspot Shield" monitors its users and is designed for spying. All VPN software on the market is unreliable and is a big risk. VPN is just a gentle ip mask and can only be used to access banned websites. To say there is more than that means nothing is known about privacy and security. Privacy and security is a specialty. Please don't mislead people about things you are not sure of.
 
hello every one i am looking to change my ip address i try to use an VPN but the ip its still the same
i am doing all this to create an gmail / google account without a phone verification can some one help ?

Hello creating accounts using VPN does not work anymore, Here is q quick tip to create multiple accounts

1. use private/residential or 4g proxy

2. If you have a mobile device and local sim - Activate the Hotspot and connect to that on your pc ( restart mobile device and you will get new IP )

3. IF you are using the router, make sure it is dynamic IP, if not call the ISP and change it from Static to dynamic ( restart the router and wait for 10 seconds, you will get new IP )


to be clear I have been using the above methods to create all my second accounts, It works perfectly even for eBay, Paypal , emails, websites

Important:- above method is only for IP change, however, you will have to think about other aspects too such as browser, user agent, Profile, and most importantly the data you input for an addional account
 
Just dont use TOR. Its not private for years, since the police (different governments) owns like 50% of the tor nodes.

If you want to make gmail accs: use a cheap vpn and get some vip72 with proxifier on bluestacks.

vip72 uses vicsocks. But be careful and use a vpn.
 
free vpns will require phone verification as well.
Maybe just buy an sms activation for like <$0.5?
 
Just dont use TOR. Its not private for years, since the police (different governments) owns like 50% of the tor nodes.

If you don't trust the relays, you can create your own output relay. Those who can install their own output relay are a true networking expert. You cannot prove that the Tor network design is not secure with spy relays. Because Tor is not a ready-made package like VPN. If you want, you can set up your own custom relay. On the other hand, you can request the information of the relay you are connected to and examine the public inspections.

But what you say is completely fictitious and made up. Why is that? Tor's output relays cannot read which traffic the client is connecting to and cannot see the ip address of the previous relay. This is how the design of Tor output relays is approved and made available for use. Install an output relay where traffic monitoring is possible and send it to the tor team for operation. The Tor team will reject this relay you sent.

Don't be swayed by internet gossip without knowing Tor's network design and philosophy. My area of expertise is network security and I'm pretty sure what Tor is. Currently there is no network design superior to Tor. Tor is a magic weapon in the hands of a skilled user. And an expert user will confirm whether has entered the spy relay or not. There are indeed spy relay risks, but Tor's network engineering design is unrivaledly strong. The network engineering Tor uses for privacy is unrivaled, never compared to a vpn. Because the network design of VPN and Tor is in no way similar and uses very different ways.

A paranoid Tor user can set up their own custom exit relay. This engineering design can make its user a real ghost, depending on the user's abilities. A tor user can really be a ghost if social engineering doesn't introduce vulnerabilities. I speak as a network security expert who has studied Tor's network design and has relay experience. I am not based on gossip or media rumors.
 
Back
Top