@D4rkhunt3r DO NOT EVER DO THAT. YOUR FREEDOM IS WORTH MORE THAN A COUPLE DOLLARS. Its not worth sitting in jail missing time with your loved ones. Watching holidays and birthdays pass you by. you do not get that time back its gone forever.
Look , what is the use of making encrypted connections . These are just for preventing the data to leaked while the agencies try to tap into the data even though they capture the data . Encrypted connections are used every where . WhatsApp is the best example . Now when you capture the data by positioning yourselves in between the two parties A and B then even if you capture the data . You just canât read it . Similarly if you use an encrypted connection the ISP canât read the data but can redirect the data to the destination server where the data is decrypted . Now the agencies can simply track the traffic and reach to the destination server where they can easily read the decrypted data.
So what is the option to get rid of this problem? Use VPN+Tor browser+personal connection except WiFi and use a public wifi as we already discussed.
Make use of tails operating system inside a virtual machine along with tor , vpn and proxychainsâŚ
Ive acttually read about this. Seems neat.
Now there is a major point here which it the internet speed itself
I really mean it when i say that the fastest public wifi around me is 4mbps
+Tor and VPN that will decrease the speed (but i still prefer proxychains more than VPN cuz i dont believe the âno log savedâ as they claim and it will be harder to be traced back)
Your experience with the VPS will be horrible
But i must say that your way is pretty good
For me i just can just buy a laptop+a beast wireless card
Burn the system into a usb
Encrypt the system
Tor+Proxychains (a good mix between paid and free proxies)
And when i need to i can just destroy the usb and the laptop so it can be impossible foe the data to be recovered
If you think my method is too obvious or there is a weak point please tell me.
Best method is:
- Buy a new hdd
- Go to your girlfriend house
- Use her network
- When u are done burn that HDD and breakup with her
thanks me later
yeahh but not the last step because she got my back
Oh for crying out loud⌠I am seriously not supposed to say this but here it goes⌠get an alpha ag2424 (alpha grid antenna) find a public wifi and connect to it. Combine a vpn payed by a cryptocurrency and there
⌠Or get an anonymous sim card and load it up with data and but the cheapest used 4g phone device with android. Make it a hotspot. Triangulation is possible yes but in order for someone to ask for triangulation you have been doing some serious damage. Change the device (recommend used ones that have been registered on a cellphone network previously) and sim cards⌠there. Never try the above and I do not recommend it.
What about using kali live USB?
I donât get all these posts. i canât even decrypt my own traffic,âŚhow are âagenciesâ doing it? instead of all these VPNs, Tor, proxychains why not figure out what tools they use and get ppl on Git to build better ones? problem solved
what i dont get is if you are using HTTPS how is it being decrypted at he ISP? Can we consider then all ISPs = Agencies aka FBI/MI6/NSA?
Yah i donât get some ppl. I think ppl are just paranoid when it comes to learning new things on âyourâ networkâŚ
ppl, do you really think Police or some local cop is going to come knocking on your door cause you were able to PSK your neighbors networks? This takes me to the days of Satellite hacking with DirectTV and othersâŚwhen you go to court just use this, âtell xxxxx to stop sending me the signalââŚits like breathing air, you gonna tell someone we canât breath air, no different from WiFi signalsâŚthen again, if you live in USA, the NSA seeâs all this shit anywaysâŚânsaâŚnothing happening hereâŚmove on to someone whoâs a threatâ
peace!
@MoNsTeR Does using home wifi with tor and proxychains enabled makes sense? I mean i think it still can be traced back to wifi router ip address. KIndly correct me if i am wrong here.
@D4rkhunt3r Personally I never contact the internet without a being behind a VPN. Running ToR inside of proxy chains while being connected to a VPN is a very good practice. If anyone is having doubt or has to ask if its okay to hack from home âYOUâ probably shouldnât be doing it. We are all adults and there comes a time you have to make the choice is this worth it. What are the risks involved? Am I willing to face the consequences? At that point you make an educated choice âpress Y to continue or ctrl+c to stopâ
@MoNsTeR Man you are absolutely right !. There will be no chance of getting caught when we randomize our mac addresses (Physical address) with the macchanger and connecting to the public wifi like coffee shop or restaurant etc⌠where all the people connected in, with the help of masking our ip address by TOR +VPN⌠eventhough they keep analyzing the ip logs and history of our ip address âŚthey couldnât able to catch the hacker! thatâs indeed because weâve been accessing the internet via public wifi ⌠perhaps if the mac address has been traced by the digital forensic investigator with the very hard perseverance that wouldnât be ours anymoreâŚwe were already masked our physical layer identity .In this kinda situation itâs impossible to catch or fetching the invincible HACKER we just need to shred all the logs after all the things done as @MoNsTeR says ⌠you just hit the nail on the head precisely ! and also all of the transactions must be performed in the terms of crypto currencies âŚ
Well there is different methods most hackers use. Some hacker use to hack other personâs wifi then use it to hack. while some hacker use combination of vpn + tor + vpn, the connection first connect to a vpn then to tor then then again to another vpn, the first vpn will hide ur ID from tor and then tor will hide your ID from 3rd vpn . you can use this technique with different server for both vpn and tor and choose different countries with good privacy rules.
Some hacker also use VPS hopping. You have to use different vps and have to connect through them using ssh connection. You can run wireshark anytime to check is their any leaking or notâŚ
Its based on best of knowledge , well no one can guarantee absolute anonymity.
(One request please follow my instagram page : @localhost_127)
Thank you !!