Course Hero Logo

Snitches never tell anyone on darknet your real name

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 11 - 15 out of 121 pages.

Snitches- NEVER tell anyone ondarknet your real name or reveal anydetails about you. This is the #1 way p eople get caught. One of yourvendors, etc. will getcaught and to lessen histimewillturnyouin.Never meetinpublic,never call(voices canbe uniquely identified).Never sendemailfromclearnet.Ifyouwanttoreadmore aboutallthis informationsuch as browser fingerprinting, IPaddress, HTML5 Canvasing and soforth,go to this site: browserleaks.comFor checking setups after you have setup all your security layers to keep you
safe, go to whoer.net andcheck2ip.com andseeifyoursetupisperfect. Tocover yourinternal IP's, type in on the search bar in Firefox"about:config". You then type inmedia.peerconnection.enabledandset ittofalse. Now youhave blocked your internal IPfrom showing(whichis a goodthing).Now lets talk about how to properly clean everything upwhen you aredone working on all your illegal shit, make sure you run Bleachbit orCCleaner when you are done, run it on all your virtual machines andhostbefore you disconnect anything. Solets say you are on your RDP,runCCleaner tocleanalllogs.Thendisconnect, nowyouareon yourWhonix- Workstation(or other OS),runBleachbit toclean alllogs,cache, cookies andso forth. All otherVM’srunninginyourVMwareWorkstation, runBleachbit orCCleanerthrough them. ExitoutofVMware Workstation, dismountyourvolume. Then runBleachbit on yourhost to clean everything.Now youcandisconnect from your VPN andturnoffyour computer.Youdon't want yourcookiesorcache floatingaroundeverywhere. You wantnotracesonyourcomputer.Don’t worry-this isjustthe start, and when youcardyou willuse acompletely separate laptop, butasyoucan see, ifyoujustusetails forallyour“normal Browsing activities” you arepretty goodandcanavoid all of theaboveif you wish.
4.SecureemailsProtonmail.comWould I notrecommend at allsincethe setup is a bit fishy.safe-mail.netbased in Israel and allegedly cooperates with the NSAI personally do not use thisservice.safe-mail.nlBased in Holland and recommendedcountermail.combased inSwedenand recommendedsecmailw453j7piv.onionIs widelyused and quitesecurebutthereare questionmarks raisedbysomepeople.riseup.net recommendedtutanota.com Germanbased and good oneEmail clientgpg4win.orgalso has averygooddocumentationfor newbiesDownload their documentation to learn PGPhere:\gpg4win.org/documentation.htmlAlways encryptallyouremails with PGP-always.Ifsomeoneget hold of your text emails it does notmatter,theycan not readthemif encrypted. That is a goodsecuritystep.
5.WebBrowserandconfigurationMozillaFireFox/TorBrowserI recommend Mozilla FireFox to everyone. It offers many add-ons and isvery easy toconfigure. FireFoxis opensourceand is available fordownloadheremozilla.rog/en-us/firefox/alltorproject.orgAfterthedownloadand the installation the WebBrowseris notconfiguredyetsecure.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 121 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
Kenny Smith

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture