Results 1 to 19 of 19

Thread: [Tutorial] How To Hide Your Identity Online [Detailed]

  1. #1
    Join Date
    Nov 2011
    Location
    Deep Space
    Posts
    54
    Organisation
    Marxist
    Blog Entries
    2
    Rep Power
    5

    Talking [Tutorial] How To Hide Your Identity Online [Detailed]

    Sites like revleft are usually watched by other people who aren't on our side so here you will learn how to hide your real IP (Internet Protocol) from such people,and protect your rightful privacy.

    + YouTube Video
    ERROR: If you can see this, then YouTube is down or you don't have Flash installed.

    This is just some music that will help you read

    [FONT="Comic Sans MS"]Introduction of the programs/tools and what they do[/FONT]

    1. Using VPN's
    VPN = Virtual private network. They are tools that are used to create point to point connections, like tunnels in a computer network, like the internet. VPN's are used to encrypt your information in these tunnels, so nobody else can get a hold of your information.

    Some good VPN's:
    http://cyberghostvpn.com/
    http://openvpn.net/
    https://www.ultravpn.fr/download.htm

    1. Using Proxy Servers
    What is an proxy Server
    http://en.wikipedia.org/wiki/Proxy_server
    It is better than nothing but they are less secured than a VPN

    This proxy Program is the best free one you will get (very fast and secured)
    http://anonymous-proxy-servers.net/en/jondo.html


    3. Chanching The MAC Address
    http://en.wikipedia.org/wiki/MAC_address
    Downlaod TMAC
    http://www.technitium.com/tmac/index.html


    4.Communitcation:
    Never use MSN. Use ICQ, all the conversations are p2p encrypted, or better; use Jabber. Jabber does not keep any of your conversations, and if you use Jabber with OTR encryption, noone will be able to know what you are talking about. If you are a vendor of some illegal stuff (you know what I mean), you shouldn't use MSN.


    Some other programs you should use
    FireWall: Comodo
    http://personalfirewall.comodo.com
    A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.
    Wiki

    KeyScrambler:
    http://www.qfxsoftware.com
    Protects your secrets from keyloggers & keylogging malware attacking your computer.



    Malwarebytes:
    http://www.malwarebytes.org
    Malwarebytes Anti-Malware helps you defeat Malware once and for all. Relay great Virus scanner you get updates daily,its 100% free,fast you should realy try it.



    Tutorial how to use this programs and how to get started

    + YouTube Video
    ERROR: If you can see this, then YouTube is down or you don't have Flash installed.

    music that will help you read

    We have two options now:
    1. Erase Your hole computer and re-install windows
    2. Install this programs on your computer and run them

    now first for the explaining why is erasing your computer good. ( you can only do this if you have some knowledge,and if you own some windows cd's)
    When you erase you will delete all files all programs all pictures,.... and with this all viruses from your computer(this will make it even to run faster)
    and when entering your new computer just install all those programs i mention
    and start them. When you do this you it will be very hard to infect your computer (even if you download porno/programs from piratebay you will get infected very soon so avoid piratebay and other torrent sites.)


    ok now for the second option installing those programs right now. Some viruses get so deep in your system that it is very hard to "kill" them. Even if you buy private av that cost around 50 dollars/euro even they will have problems removing it.

    I dont want all this programs on my computer but i still want to be save and virus free.


    Well friends this is your lucky day. There are OS(operation systems) that are 100% secured and they are FREE and their name is ¦¦¦LINUX¦¦¦

    Ok something about Linux: First created by Linus Torvalds
    Linus Torvalds
    (and he is an communist) What an great man.

    Linux is a Unix-like computer operating system assembled under the model of free and open source software development and distribution. The defining component of any Linux system is the Linux kernel, an operating system kernel first released October 5, 1991 by Linus Torvalds.
    Linux runs on a wide variety of computer hardware, including mobile phones, tablet computers, network routers, televisions, video game consoles, desktop computers, mainframes and supercomputers. Linux is a leading server operating system, and runs the 10 fastest supercomputers in the world. In addition, more than 90% of today's supercomputers run some variant of Linux.

    Wiki

    What is Open Source?:

    Linux community is made up of millions and millions and millions of people who takes their time to built and share their knowledge with others. They share their time and skills to make sure that Linux distributions keeps getting better and better. From IBM to Google, Firefox to Wikipedia – some of today's best software is based on an open-source model. Shared efforts. Shared principles. No cost.

    What is Distributions?:
    A Linux distribution is a member of the family of Unix-like operating systems built on top of the Linux kernel. Such distributions (often called distros for short) are operating systems including a large collection of software applications such as word processors, spreadsheets, media players, and database applications
    Wiki

    For every beginner in linux you should read why is linux better than windows.
    http://www.whylinuxisbetter.net/

    Ok now im going to number the biggest linux distros

    1.Ubuntu (200 million users):
    http://www.ubuntu.com/

    2. Linux Mint
    http://linuxmint.com/

    3. Fedora
    http://fedoraproject.org/

    4.OpenSuse
    http://www.opensuse.org/en/


    How to Get Linux?


    Just Follow this pictures,in every linux distro you have similar ways to download it
    im going to show this on ubuntu site




    Just make shure that all the formats are in .ISO files.

    How to burn the iso file to a cd/dvd?
    Just open your Favorite cd/dvd burning program copy the image file to the cd and burn it. (you have millions of tuts online for this)


    Linux gives you an option that you can boot from a cd/dvd and not changing your computer so if you dont like it just restart the computer and take off the cd and you didnt harm any of your files. You can also make and dual boot so you can install linux and windows side by side.

    You can also try Ubuntu online :
    http://www.ubuntu.com/tour/
    But it has some futures cut of and it doesnt run so fast as on your computer

    this is how it looks ubuntu tour online
    and this is how it looks when you boot it form an dvd/cd or when you install it




    http://www.linuxbsdos.com/2011/10/13...0-screenshots/

    So this is it stay save stay free, if you need any help post here or pm. Im also happy to help anyone who switches from windows to linux you will get full time support from me if you will do this.And dont forget to leave an repley

    -Inner peace
    Last edited by Inner Peace; 27th November 2011 at 15:09.
    [FONT="Arial Black"]
    Animals are my friends... and I don't eat my friends.
    [/FONT]

  2. The Following 4 Users Say Thank You to Inner Peace For This Useful Post:


  3. #2
    Join Date
    Jul 2011
    Posts
    474
    Rep Power
    9

    Default

    Knew these already but comrade I very appreciate the time you have put into making this.
    WORKERS OF THE WORLD,UNITE!


    LONG LIVE THE CUBAN REVOLUTION!



  4. #3
    Join Date
    Nov 2011
    Location
    Deep Space
    Posts
    54
    Organisation
    Marxist
    Blog Entries
    2
    Rep Power
    5

    Default

    I do this only for helping others around me this didn't cost me anything just some hours of work but i got my price happiness of other people who i helped.
    [FONT="Arial Black"]
    Animals are my friends... and I don't eat my friends.
    [/FONT]

  5. #4
    Join Date
    Feb 2009
    Location
    Oklahoma
    Posts
    214
    Rep Power
    11

    Default

    Installing ubuntu is probably one of the best things a non-technical person can do for themselves on their computer. Once you work out the kinks (if any) and learn to use google when common issues arise (and learning some command line basics), you'll find yourself with a stable, easy to use and virus free system. I've installed it on several friends' computers, haven't heard any complaints and they haven't met any challenges they couldn't overcome on their own (and google)

  6. #5
    Join Date
    Jan 2012
    Location
    South Carolina
    Posts
    47
    Rep Power
    0

    Default

    It's all great info. I don't know much about computers but I may just use some of these.

    Thank you.

  7. #6
    Join Date
    Jul 2011
    Location
    Southeastern US
    Posts
    863
    Organisation
    Cult of Neil Young
    Rep Power
    33

    Default

    I'll suggest two more VPNs:

    http://www.ipredator.se
    http://prq.se/?p=tunnel&intl=1

    Secure Web Hosting / Anonymous Domain Registration (more expensive than normal)
    http://www.prq.se

  8. #7
    Join Date
    Oct 2008
    Location
    The frozen peaks...
    Posts
    2,113
    Organisation
    Orda Barbarica
    Rep Power
    54

    Default

    A few additions:

    - TOR - Onion routing proxy, especially the Vidalia bundle

    - (Full) Disk encryption: Truecrypt

    - E-mail encryption: GnuPG or for Windows users Gpg4win

    - Tech-tools for activists booklet

    - Activist Security Manual
    "Of Man's first disobedience, and the fruit
    Of that forbidden tree..."
    - John Milton -

    "The place of the worst barbarism is that modern forest that makes use of us, this forest of chimneys and bayonets, machines and weapons, of strange inanimate beasts that feed on human flesh"
    - Amadeo Bordiga

  9. #8
    Join Date
    Jul 2011
    Location
    Southeastern US
    Posts
    863
    Organisation
    Cult of Neil Young
    Rep Power
    33

    Default

    Quote Originally Posted by Ravachol View Post
    A few additions:

    - TOR - Onion routing proxy, especially the Vidalia bundle

    - (Full) Disk encryption: Truecrypt

    - E-mail encryption: GnuPG or for Windows users Gpg4win

    - Tech-tools for activists booklet

    - Activist Security Manual
    On this note, if you use TOR, look into torify and/or proxychains to route any specific application's connection through the TOR network (linux only).

    Proxychains can be used to ... chain proxy servers together (its original intention). Make sure the listed proxies are anonymous proxies. The bonus is you can list tor as one of the proxies to use.

  10. #9
    Join Date
    Aug 2005
    Posts
    6,021
    Organisation
    IWW
    Rep Power
    98

    Default

    Excellent thread and should be stickied immediately. Thank you for all the information.

    - August
    If we have no business with the construction of the future or with organizing it for all time, there can still be no doubt about the task confronting us at present: the ruthless criticism of the existing order, ruthless in that it will shrink neither from its own discoveries, nor from conflict with the powers that be.
    - Karl Marx

  11. #10
    Join Date
    Jan 2011
    Location
    The Netherlands
    Posts
    8,045
    Rep Power
    0

    Default

    Quote Originally Posted by AugustWest View Post
    Excellent thread and should be stickied immediately. Thank you for all the information.

    - August
    I agree...and done

  12. The Following 2 Users Say Thank You to PhoenixAsh For This Useful Post:


  13. #11
    Join Date
    Apr 2011
    Location
    London
    Posts
    593
    Blog Entries
    1
    Rep Power
    16

    Default

    Think I might dedicate some of my hard drive to Linux.
    [FONT=Trebuchet MS]Politics For Dummies (Brainwashed Capitalist Edition)[/FONT]

    [FONT=Trebuchet MS] Socialism: any country providing free healthcare for its citizens.[/FONT] [FONT=Trebuchet MS] Communism: a dictatorship providing free healthcare for its citizens.[/FONT] [FONT=Trebuchet MS] Anarchism: a system involving no government, invented by the Sex Pistols.[/FONT]

    Political compass:
    Social: -957 million
    Economic: -55 billion

  14. The Following User Says Thank You to Lanky Wanker For This Useful Post:


  15. #12
    Join Date
    Jul 2011
    Location
    Southeastern US
    Posts
    863
    Organisation
    Cult of Neil Young
    Rep Power
    33

    Default

    Quote Originally Posted by Lanky Wanker View Post
    Think I might dedicate some of my hard drive to Linux.
    Ubuntu's pretty good for people new to the Linux world. Although, I highly recommend taking the "plunge" eventually and setting up a more manual distro. It's fun in a geeky, quasi-masochistic way.
    GourmetPez: Don't you know anything about
    communism? We're for the enslavement of the Aryan
    race by a global semitic reptilian dictatorship. Black
    people will own white slaves, homosexuality will be
    taught in schools, mad blunts will be smoked.

  16. #13
    Join Date
    Jul 2011
    Location
    Southeastern US
    Posts
    863
    Organisation
    Cult of Neil Young
    Rep Power
    33

    Default

    Just wanted to add some more TOR shit

    Install Torbrowser if you're unfamiliar with what's necessary to configure a browser to keep you anonymous while using Tor. It's just easier if you're new to this whole thing.

    then here's a search engine to get you started:
    http://nstmo7lvh4l32epo.onion/ called "The Abyss" (oooh scary)

    http://jhiwjjlqpyawmpjx.onion anonymous email. will be @tormail.org ... but you should never, ever connect this with any non-deep-web identity that belongs to you or can be traced to you. Ex, don't email your "civillian" gmail account to make sure it works. Don't use it to sign up for anything outside of the deep web. Don't use a pseudonym that can be linked to you in the 'real world' or the 'civillian web'

    http://xqz3u5drneuzhaeo.onion/ web hosting for your own hiddensite

    http://4eiruntyxxbgfv7o.onion ImgZapr, an image uploader for use on the deepweb. Like tinypic or imageshack or imgur
    GourmetPez: Don't you know anything about
    communism? We're for the enslavement of the Aryan
    race by a global semitic reptilian dictatorship. Black
    people will own white slaves, homosexuality will be
    taught in schools, mad blunts will be smoked.

  17. The Following User Says Thank You to PC LOAD LETTER For This Useful Post:


  18. #14
    Join Date
    Jan 2013
    Posts
    1
    Rep Power
    0

    Default

    I have quite a lot I could add to this and I am willing to help people become more secure. One thing I do is run everything off a USB/SD card, this way I don't leave traces on the computer. Possibly the next step is to run a persistent Linux distro from a USB/SD that is contained within a Truecrypt hidden partition. Next is Arch distro... Riseup(DOT)net supply good email addresses and free VPN. Though you need two invites. Also your browser can give away a lot; check ip-check(DOT)info, if help is needed with securing any parameters I am willing to help. I will get a list of browser mods that can be made to avoid these leaks when I am less tired. On top of GPG/PGP use privnote (emails self destruct after being read or after an expiration date). Avoid hushmail and cyber-rights email as they encrypt for you (not host end encryption) and have a history of cooperating with law enforcement. Safe-mail also have their downfalls such as IP recording. I suggest setting up multiple emails with different degrees of security depending on who you are in contact with or what purpose it serves. Consider your name on the board and how easy it is to find using a search engine. My name will be easy to locate however I plan on only being this name for this purpose. A username such as cupcake will be very hard to isolate in a search engine and would be hard to link to revleft. I noticed the deferrer which is good! Anyway need sleep! Very glad to have found this place! The info is unreal and I feel less isolated by my moral/political beliefs! Thanks!

  19. The Following User Says Thank You to Zer0Zer0 For This Useful Post:


  20. #15
    Join Date
    Mar 2014
    Posts
    4
    Rep Power
    0

    Exclamation

    Quote Originally Posted by PC LOAD LETTER View Post
    On this note, if you use TOR, look into torify and/or proxychains to route any specific application's connection through the TOR network (linux only).

    Proxychains can be used to ... chain proxy servers together (its original intention). Make sure the listed proxies are anonymous proxies. The bonus is you can list tor as one of the proxies to use.
    The Tor Browser Bundle is designed to provide you optimal security out-of-the-box. Chaining Tor together with other proxies can actually diminish your anonymity by giving your connections a "long-tail". Tor automatically re-routes your connection every so often. The anonymity gained by that is lost if you consistently route through the same proxy/VPN on top of or in addition to Tor.

    On a real note though, Tor is some incredible software that needs to be more widely promoted in our circles.

  21. The Following User Says Thank You to kingkobra For This Useful Post:


  22. #16
    Join Date
    Jul 2011
    Location
    Southeastern US
    Posts
    863
    Organisation
    Cult of Neil Young
    Rep Power
    33

    Default

    Quote Originally Posted by kingkobra View Post
    The Tor Browser Bundle is designed to provide you optimal security out-of-the-box. Chaining Tor together with other proxies can actually diminish your anonymity by giving your connections a "long-tail". Tor automatically re-routes your connection every so often. The anonymity gained by that is lost if you consistently route through the same proxy/VPN on top of or in addition to Tor.

    On a real note though, Tor is some incredible software that needs to be more widely promoted in our circles.
    I was clearly talking about applications other than your web browser that don't normally allow you to specify proxy servers.

    Also, if you use proxy servers that are not actually connected to you through some kind of cash or electronic paper trail, and change them regularly, it's perfectly fine. It can also be useful for getting around site bans on tor (like forum registration) while still using it. Tor + 1 proxy and they won't know you're using tor as you won't be coming directly from an exit node.

    If you don't know what you're doing just stick to the browser bundle, though, yes, because it's great for just web browsing, but set noscript to block everything and make sure you keep it updated. If I use TBB, I run a second instance of TOR in the background so I can tunnel other applications without refuxing my proxychains config because TBB uses a randomized port instead of the usual 9050.
    Last edited by PC LOAD LETTER; 23rd March 2014 at 20:05.
    GourmetPez: Don't you know anything about
    communism? We're for the enslavement of the Aryan
    race by a global semitic reptilian dictatorship. Black
    people will own white slaves, homosexuality will be
    taught in schools, mad blunts will be smoked.

  23. #17
    Join Date
    Sep 2002
    Posts
    6,039
    Blog Entries
    7
    Rep Power
    57

    Default

    I used this VPN for a few months, because HBO kept sending DMCA notices to my ISP. (Just trying to see how many acronyms I could fit in a single sentence.) Cheaper than Netflix, anyway, although it seemed to cut my download speed by about 30%.
    "to become a philosopher, start by walking very slowly"

  24. #18
    Join Date
    May 2014
    Location
    U.S. of A.
    Posts
    18
    Rep Power
    0

    Default

    I love this thread.

  25. #19
    Join Date
    Dec 2013
    Posts
    1,047
    Rep Power
    0

    Default

    Don't install anything on your actual computer. Install linux on a flash drive that you can destroy later with magnets, sledgehammers, or your digestive tract. If you wouldn't prefer getting sentenced for obstructing justice/tampering with evidence/legal bullshit, you probably don't need this anyway. Access tor not through the actual linux on the flash drive, but through a virtualbox linux OS hosted on the flash drive. Encrypt all of it with truecrypt (the drive, the folder with virtualbox, and then again the new OS) and make use of their hidden encryption. You can have it so where giving two separate passwords opens up different things, but they won't be able to prove there is any more than one. You can squeal, give them the wrong password, and it opens up to a bunch of useless garbage. But, of course, it shouldn't even get that far, because you thought ahead and destroyed the evidence. Oh, and don't just use regular tor bundle vanilla. Disable everything. I don't even let images load unless they're mandatory for whatever I'm doing; and yes they do pose a security risk. No scripts, no flash, no nothing. No exceptions.

    guerrillamail.com is nice for throwaway emails. It auto-scrambles the address and redirects it to your inbox so that the person getting the email doesn't know what your actual email that you're using on their site even is. So, for example, you can be communer@guerrillamail.com (no I don't use this), and it might show up as 58fe3uhF+4389fh@guerrillamail.com. That way it is easy for you to remember and access, but nobody else can go to the site and access it. There is another leftist website that gives out emails to ancoms but I can't remember it. I'm not sure I trust them anyway and they claim to not want you to use it for buying drugs or other shit like that. A quick google should find it.

    When torrenting... turn off distributed hash tables (DHT). Force encryption and a proxy is not necessary because they can only see that you are sending data, not what is being sent, because it is encrypted. Most torrent clients offer a blocklist-type addition which will block all known law enforcement, etc. IP ranges from connecting to you. Because most private trackers (see: good trackers) require you to not use a proxy, this is about as safe as you can be torrenting.

Similar Threads

  1. Hi Im New Here.Tutorial On....
    By FreeMe in forum Introductions
    Replies: 10
    Last Post: 27th June 2008, 09:49
  2. MS paint tutorial
    By Dr Mindbender in forum Plastic & Graphic arts
    Replies: 3
    Last Post: 15th September 2007, 09:31
  3. do we need a more detailed manifesto
    By crazy comie in forum Theory
    Replies: 4
    Last Post: 20th August 2003, 16:40

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •