January 10, 2024

Security and Anonymity in 2024.

- Let's imagine such a situation that you quietly and peacefully lie in your bed and then people from law enforcement agencies start knocking on your door unpleasantly yes? So in order to avoid the consequences of the search and partially prevent such a situation and possibility I wrote this article.

P.S. If you've already been knocked on the door, it means you've already got a file on you and you've been found on some trace.

Encryption DATABASE

- And so that in the case of search and seizure of all electronics you can not worry about the fact that there may be found that you need to encrypt all the data on the computer and in this we will help us such a wonderful program as VeraCrypt and generated by all the rules of the password

- Let's start with VeraCrypt, you can install this program on the official website https://www.veracrypt.fr/ (it is the one listed on Wikipedia). I will not tell you how to install VeraCrypt on the Internet there are many video installation guides as an example I can give https://www.youtube.com/watch?v=L3i9lKiCNUA. The encryption algorithm should be SHA-256.

Example of parameters that should be enabled during password generation.

- Regarding the password, the password should be between 15 and 30 characters and you should have a different password on each site.

INTERNET SECURITY

- And so you have all your electronics taken away and you know that your computer is encrypted and nothing will be found there, but there is still your router yes this little box that constantly flickers because it transmits all your traffic to the ISP servers and you ask what can I do to strengthen my security on the network.First of all, I advise you to buy a router that fits OpenWrt firmware

- Information on how to install it and where to find a table with suitable routers

https://www.youtube.com/watch?v=THgC0cHXRaQ

https://openwrt.org/toh/views/toh_available_16128

- Then, following the YouTube tutorials, pass all traffic through proxy/Tor and there you have it.

- All traffic travels over a secure network.

INTERNET WORK

- And now you have all the traffic through proxy or Tor your computer is encrypted with the strongest password, but all this does not make much sense if you do not follow the rules written below, because if you follow these rules to you are unlikely to knock at 6 am with a request to open the door and so memorize these rules like it's our father.

- The most important rule that will help to avoid 99% of all problems do not work in the CIS and Ukraine and all countries of the former Soviet Union as a minimum it is not ethical and we are homeless on the news mainly show only people who worked in their country.

- Do not use their real nicknames yes yes you may like your nickname from stym Analniymagistr2002 but very often there are situations when even people with large turnovers deanonnyat the first link in Google after searching for his nickname on the forum.

- Don't use mail like gmail.com / hotmail.com you can use proton but from the experience of some people I know it can delete your mail.Use 2fa everywhere I don't think it's necessary to write anything else here.

- Do not use personal mail for registration in all sorts of shops yes you to it can be registered all accounts on forums.

- Never think that I have a small turnover and they will not come to me NO it does not work that way better to spend time and a little money for your safety now than in a couple of months to run and look for a lawyer.Now I want to touch on such a topic as Messengers.If you have an extra 200-300$ and you work and communicate in Telegram, buy a number for Ton from Durov.

- If there is no such possibility then use sms activators but there is a big chance to lose access to the account or it will be deleted take this into account.

- Also do not advise to keep Telegram on your phone as a minimum you can lose it and as a maximum as soon as the seizure of equipment will begin you will take away the phone, so I advise to keep the session Telegram only on the computer Yes it may be inconvenient and you will not always be able to answer people but it will very much protect you.

- As for the people who use Jabber, do not shine your contacts and give them out when asked in the lis on the forum because otherwise you will constantly fly spam and your account is likely to put on brutus.

- Another very important tip is to install a virtual machine or better 2 under all kinds of programs because often you will be working with software with closed source code, it is better it will stand on a virtual machine or a dedicke.

WORK IN PHONE

There are 2 types of work with Android

Work through the browser and work through the app but in any case the first thing we have to do is to get root rights on our phone

A list of programs that will help us :

1. Proxy droid for proxy connection.

2. Location cheater.

3. Ccleaner.

4. Device id changer pro.

Our recommendations

1. Прежде чем покупать что либо, работать с новым человеком - которого вы не знаете , советую проверять информацию о нем в поиске [ @ username ]

2. Always use escrow, it's better to pay 4-10% escrow than to lose all your 100% of the funds.

3. Before you sit down and work at your computer or phone, check your connection to the proxy and other security methods.


OUR LINK - https://t.me/links_GW