The ability to admit having been wrong is perhaps the best test of intelligence IMO. Not that you were wrong on facts, because you were mainly correct (that is that there is no silver bullet anonymity tool that keeps you magically secure even against your own stupidity). It is a sad fact, though, that all the privacy tools in the world don't stop you from outing yourself through your own words. If you have long-term adversaries, like Scientology, and you've been at it a while and already outed, you can sock up but they're always going to know who you are when you hit your usual themes and write enough words in your usual style. You might sock up and waste their investigative resources for a while, but eventually, if you're enough of a nuisance, someone in the organization will know you by name (hi Lynn Farny!). Most OGs are namefagged in this way and a large portion of Chanology people. Nobody who has been at this for a while who hasn't maintained near-total security should assume they're actually anonymous. This balance is really a problem. A cohesive resistance movement, to some extent, relies on personal loyalties to the group. A movement utterly resistant to counter-attacks relies on anonymity. Not to be too much of a jerk, but most of us (including me) have failed at anonymity, at least with respect to the cult. It's important to maintain it on any future projects where it's more important. Scientology is the Glass Joe of Internet opponents. The consequences for failing in the future will be higher. Sorry for such a dumb response. I deleted some tl;dr.
getting slightly tired of all this condescending bull if im honest however, thank you to all who have ACTUALLY contributed to the thread I am learning alot from those posting valuable opinions and ideas....... ^^^^^^^^^^^^^^^^^^ and to every one else
To whoever wants to go the complicated way; http://themostboringblogintheworld....onymity-with-tor-ssh-and-socks-n00b-approved/ Old but effective
i followed the cyberguerilla instructions and set up a virtual ubuntu machine plugged into dsl (damn small linux), inside of a truecrypt volume running through my kubuntu OS. i am now behind four firewalls if i include my router. the instructions and explanations on cyberguerilla made sense, but, i have a few issues with this. one, the fact that anyone who does an analysis of my machine should certainly be able to figure out that there is an encrypted volume on my machine by analyzing the used disc space. two, the text file used to mount the hidden volume is present and proves the existence of a hidden volume. even if i give them the decoy password they will be able to figure out that there is more to the hidden volume than i have revealed to them. this could possibly land you in a fema camp for refusing to reveal the password for the true hidden volume. i'm sure that the piggies know all about cyberguerilla and have read the same instructions i used so trying to tell them that there is no hidden volume would be a waste of breath, they would not believe you. three, unless you use a VPN tunnel between your machine and the TOR entry and exit nodes, anything sent and received can be intercepted and analyzed. i can't afford a VPN service and don't know of any reliable free ones. TOR, virtualbox, and truecrypt are all good things but they are not enough anymore. the plausible deniability offered by truecrypt doesn't mean squat if they can lock you up for suspicion. they might not be able to get your encrypted data but will that really matter to you if you are locked up in a fema camp? the only way to remain completely anonymous is to do all of the above and then jump in your car and cruise around looking for hotspots. do what you must on the hotspot's internet connection, and then get the hell out of there. make sure to spoof your mac address. doing anything sensitive from home can be traced back to you. just a few thoughts on the subject. your thoughts and ideas are appreciated.
I was the one that called you out earlier, so I wanted to respond to this and say thank you. This is very much appreciated. Srsly. Plox continue thread. /derail
surly as long as your pc is not full of WMD codes or illegal or threatning documents you should be safe ? i mean this seems good security to me although i am only a novice so correct me if im wrong but that sounds like a great set up ?
Have you tried CyberGhost VPN? It has a pay service but also a free service that gives you about 6 hrs of free time. Edit: I meant to say that you get 6 hrs per day.
CyberGhost VPN is also a good way to stay anonymous. Its services give you complete privacy when surfing, downloading, and sharing files on the Internet!
the cyberguerrilla website's account has been suspended! they are being censored. this really sucks as i need some info from that site. does anyone have the cached pages?
not up to anything as of this moment. just trying to stay secure. btw, i found another link to the blackhat set up guide http://anonix.org/?page_id=81. i am also in the process of taking screenshots of the whole guide. probably won't be long before it's gone too.
i doubt the site was suspended because of this thread. it was probably being watched by DHS-fags for a while. or, maybe they didn't pay their bill. what would be a good way to share this? i could post the text file here but it's biiiiiiiiig and i'd get e-slapped by a dragon if i did that. same with the png file, 37 of em. i'd rather not post them on my imgur account. btw, i am sort of a newfag but i'm one of the lurk and learn newfags. i can figure things out if i have a starting point.
Hmmm, just an idea this; Put them in a zip file and place that on mediafire to share? just a suggestion ofcourse...
thnx for the starting point. i will post link here when i figure this zip thingy out. i'm used to downloading and unzipping and most of my computerology experience is with audio and GA programs like fireworks (which i really miss since converting to linux), GIMP, photosuck (which i don't miss one bit since GIMP) and the like. i'm sure making a zip file and uploading it is easy enough, i just haven't had the need to do it before this. like i said, newfag here, but i'm lrning.
1.Select files, Copy to compressed (zipped) folder 2. Upload that file to mediafire 3. ???? 4. profit!
I hope it was taken down by the author and not anyone else: View attachment 1984-was-not-supposed-to-be-an-instruction-manual. any chance of people getting the file back online in blog form as it is easy access to all ? i dont mind reblogging myself once i have a hard copy of it?
well, lets see if i did that right. if i did, you should see the link here> http://www.mediafire.com/?z1y1e2tfd9h7c64 file name cyberanon7z someone plz check it to see if it's all there.
link> http://www.mediafire.com/?z1y1e2tfd9h7c64 file name cyberanon7z let me know if it works. this computerology thing isn't that hard after all!
maybe must needs be opened in kate, using linux here and worked for me. all the same info is in png's so = win?
yes, spread it far and wide, to the four corners of the known world! btw, the whole virtual machine thing is overkill for most peeps but it is good to have the know how. i don't get in on @##@ raids or any other questionable shenanigans but i like having secure options.
Here's a link to the cache file that was so illusive for the last 24 hours: http://www.mediafire.com/?7977z77jx8oyfqa
How to secure your computer and surf fully Anonymous BLACK-HAT STYLE is back online at>http://www.cyberguerrilla.info/?p=3322
It's funny to see how sites like stayinvisible.com not only show your real IP, but even detect the fact of using Tor, when you just use the default install of Vidalia without any hacks. Tor is dangerous because it creates an illusion of anonymity for many average users.
Honestly, I was too lazy to read the replies to this thread, but I would like to say that Tor and many other IP changers does not totally block your IP address. There are many ways people can find out your address, and usually they can still go through the hosting computer (of Tor's) and find your address if really needed. Tor is a way to unblock some government (like China's) firewall, but it should not be used for illegal activities that cause harm to another company / person, because your IP address can still become found out. The only way you can make yourself "anonymous" is rerouting everything and then after the deed is done, destroying your computer. Just saying.
just to point out, stayinvisible.com, the site mentioned above, will only report your IP adddress and location if you're not using Tor proxy. With Tor, it will only detect you're using it, and not the other stuff.
No one was really thinking of illegal action through TOR ( I don't think) the thread was not created to help "cyber crime" the reason Anonymity is important is becuase there is something very wrong with being policed and watched while surfing the net whether im just checking my emails or commenting on some LOL CATS. As discussed in this thread TOR seems to have many flaws some you have pointed out and some others have if you are interested the best thing in my opinion what came out of this thread was: http://www.cyberguerrilla.info/?p=3322