Jump to content

Killer Internet Stealth


Barnes

Recommended Posts

It's got to be Tails & Tor yeah? Can't see any problems with that? I mean VPN the shit all you like but it doesn't stop traders getting fisted by the feds over on the d. ark net. does it?

 

What gives?

 

I just want it to be like Mad Max if im honest crossed with the Matrix

Link to comment
Share on other sites

I use a linux os  running pia vpn with a virtual box running another linux os that is using surfsharkIf i want to use onion router i use whonix which is the most secure way of using tor.

Link to comment
Share on other sites

I don't really care about internet stealth, to be honest, I doubt the feds give a toss that I grow a bit of pot (badly) for personal consumption, rant on message boards when I'm drunk and watch a bit of fairly mainstream porn lol

  • Like 13
Link to comment
Share on other sites

Just now, Boojum said:

I don't really care about internet stealth, to be honest, I doubt the feds give a toss that I grow a bit of pot (badly) for personal consumption, rant on message boards when I'm drunk and watch a bit of fairly mainstream porn lol

If you got a smartphone, you've got Bob Hope. You are making tracks of different data all the time, and if the powers that be see gaps in those tracks by obvious obfuscation, their curiosity will fill those gaps. The best stealth is to be normal, just like you are doing. It's unique behaviour patterns that draw attention and discriminate you from the masses.

Edited by catweazle1
  • Like 7
Link to comment
Share on other sites

Those traders on the dark web are using TOR because you can only access the dark web through TOR.

 

Edited by Phillybonker
Link to comment
Share on other sites

Just now, catweazle1 said:

If you got a smartphone, you've got Bob Hope. You are making tracks of different data all the time, and if the powers that be see gaps in those tracks by obvious obfuscation, their curiosity will fill those gaps. The best stealth is to be normal, just like you are doing. It's unique behaviour patterns that draw attention and discriminate you from the masses.

 

Grey Man.

  • Like 2
Link to comment
Share on other sites

Just now, catweazle1 said:

If you got a smartphone, you've got Bob Hope. You are making tracks of different data all the time, and if the powers that be see gaps in those tracks by obvious obfuscation, their curiosity will fill those gaps. The best stealth is to be normal, just like you are doing. It's unique behaviour patterns that draw attention and discriminate you from the masses.

 

 

I don't own a mobile phone, never have and never will. Nor a 'smart' TV, one of those voice activated speaker things or any of that shit.

 

Fuck that nonsense.

  • Like 5
Link to comment
Share on other sites

have always bought everything online over the last 20 years, all my grow gear and seeds. big brother is not interested in little fish

  • Like 4
Link to comment
Share on other sites

Just now, stu914 said:

 

:rofl:

 

Maybe we should start a Luddite thread bud...?:rofl:

 

 

lol If you want to get in touch with me send me an email. Or better yet a letter lol I'll get back to you eventually. Why is everyone so impatient ?

  • Like 4
Link to comment
Share on other sites

6 hours ago, stu914 said:

Maybe we should start a Luddite thread bud...?:rofl:

 

Can we meet up at supermarket self checkouts and do our luddite thing there?  

 

  • Like 1
Link to comment
Share on other sites

I'm the same, if my life is that valuable to them for info, they're welcome to it. We'll all soon be dead so carry on as normal. :yep:

 

  • Like 1
Link to comment
Share on other sites

@Barnes

Learning a little about how it all works would be more useful.

 

Grasp basic networking, basic command line tools - simple stuff, first, I'd suggest. Without that... well, it's just a black box/magical mystery ride for your data, isn't it? You couldn't tell right now what's 'secure' and what isn't. :)

 

ETA

I could tell you how to set up your terminal - now you're a linux user - to 'look like a hacker', if you'd like. I have a screen I tab to when working with others, so people who don't know about computers leave me alone if I stare at it intently :D It's meaningless bollocks, but they can't tell the difference.

 

You'll need a 'terminal multiplexer'. Look it up.

 

Edited by j.o.i.n.t
  • Like 1
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue. Privacy Policy Terms of Use