5 Ways to become Anonymous(jumpstart)


Being Anonymous is not bad ,it more secured and safe, but being Identical is cool until your suffer from your madness

1) Don’t use Windows or any other popular and none community based os

Windows is full of holes that can be exploited. Every month Microsoft issues a security patch with the latest fixes. These holes may allow spyware to infest, completely overcoming all your anonymity efforts. Any hacker worth his salt avoids Windows like the plague. Instead, they use security hardened open-source operating systems, such as Debian, OpenSUSE, however you need to be fully secured with anonymity, I recommend  as Tails and Whonix. Tails is very active than Whonix, beacuse it depend os Debian, Debian is the largest community based opensource OS

2) Don’t connect directly to the Internet:
Avoid anyone tracking down you’re real IP address through using VPN services and TOR.

VPN enables users to create a encrypted private tunnel. Anyone attempting to trace from the internet side can only see the address of the VPN server, which could be a server located in any country around the world you choose. But real is VPN service provider can see what actually are doing, Because a VPN in this sense is just a glorified proxy. The VPN provider can see all your traffic, and do with it what they want – including logging.

But my provider doesn’t log!

Yup, I know,but who can trust. If you can trust, it’s not a problem anymore, 

Don’t ask me “then how we connect to the internet ?”,

3) Don’t use a real email address:
Dont use common free email service like Gmail, Outlook, ymail etc, We know they protect our data, but remember SilkRoad, world largest DeepWeb exchange site
Instead, use anonymous email services or remailers. Anonymous email services allow you to email someone without any trace back to you, especially if coupled with VPN or TOR access. Remailers are a service whereby you can send from a real email account and the remailer will forward it on anonymously. Some remailers enable return mail, but the risk is if the remailer itself is ever compromised, it would have a record of your real email address. However, remailers can be chained together for additional layers of anonymity.
4) Don’t use Google:
Everything is google, Google makes it their business to track everything you do in order to serve up adverts that you might click on. Just lookaround the web site’s ads, they are related to your searcg , . And as useful as the search engine is, there are ways to get the best out of it without compromising your identity. Services such as StartPage serve up google results but doesn’t store IP addresses, cookies or records of your searches. DuckDuckGo provides a similar service. I recommend DuckDuckGo its works on both (including deepweb) 
5) Don’t use public wifi:
Two issues here. The first is having your computer’s unique MAC address recorded by the router of the public location, although this is avoidable by MAC spoofing. If you’re ever traced back to your real MAC address then you can be linked to your original computer. Add to this any in-store CCTV and you’re busted! Secondly, wifi hacking attacks are commonplace. A man-in-the-middle attack over wifi will bypass all your hard earned anonymity. Admittedly, the other hacker would need to be on the same physical wifi network already, so he probably knows who you are anyway!

Real-world hackers add on may more layers of security to anonymise their activities. However, the above cant give you the full anonymous environment, but I thought It’s usefull

Leave A Reply

Your email address will not be published.