Marabunta
BANNED
- Dec 9, 2019
- 59
- 21
I wonder, even though anonymity services and open source innovation has brought annoymous browsing to the mainstream retail scene - do big companies like Cisco that designed these technologies - would they still be able to track you?
For example lets say you want to put annonymity to the test So:
- You pay someone (you have never officially met) to buy two second hand laptops you bought from two different recycling/refurbishing center in two different cities
- you remove the hard drive from one and boot via tails (which you bought from someone you have never officially met) and you pay for it in cash too
- then you boot up and create an alias email on some cruddy provider like mail ru you created (anonymously) through a public wi-fi 40 miles from your house - you didn't go on the premises, but found a good spot in a public park outside there and hookup through tor and made a simple email account
- You then go to another wi-fi spot in another city and use the same tails-tor procedure to set up an account with a good zero-log VPN using the alias email account and bitcoin that you pay (someone you have never officially met) in cash to pay for via bitcoin
- You download the software and configuration files for OpenVPN onto usb drive
You then destroy the laptop
- You wait a couple of weeks and then boot up second laptop
- Rather than jumping from nearby city to city at day of event which looks suspicious , lets say at my home, I have a static IP from a separate service already configured to my router . Then you sign in with your second laptop you boot up the same way, you disable js and WebRTC and load openvpn and configure files - then from here you fell you are UNTRACEABLE
and proceed with whatever you have in mind
All the re-routing might make it a bit slow, but let's disregard this for a moment or even if you feel confident with the setup to connect via ethernet - where can it go wrong?
Oh, and also I disable sleep / hibernate mode from the computer
For example lets say you want to put annonymity to the test So:
- You pay someone (you have never officially met) to buy two second hand laptops you bought from two different recycling/refurbishing center in two different cities
- you remove the hard drive from one and boot via tails (which you bought from someone you have never officially met) and you pay for it in cash too
- then you boot up and create an alias email on some cruddy provider like mail ru you created (anonymously) through a public wi-fi 40 miles from your house - you didn't go on the premises, but found a good spot in a public park outside there and hookup through tor and made a simple email account
- You then go to another wi-fi spot in another city and use the same tails-tor procedure to set up an account with a good zero-log VPN using the alias email account and bitcoin that you pay (someone you have never officially met) in cash to pay for via bitcoin
- You download the software and configuration files for OpenVPN onto usb drive
You then destroy the laptop
- You wait a couple of weeks and then boot up second laptop
- Rather than jumping from nearby city to city at day of event which looks suspicious , lets say at my home, I have a static IP from a separate service already configured to my router . Then you sign in with your second laptop you boot up the same way, you disable js and WebRTC and load openvpn and configure files - then from here you fell you are UNTRACEABLE
and proceed with whatever you have in mind
All the re-routing might make it a bit slow, but let's disregard this for a moment or even if you feel confident with the setup to connect via ethernet - where can it go wrong?
Oh, and also I disable sleep / hibernate mode from the computer