[FAQ] Anonymity on the net who are following us, and what action to take

View this thread on: d.buzz | hive.blog | peakd.com | ecency.com
·@hofman386·
0.000 HBD
[FAQ] Anonymity on the net who are following us, and what action to take
<p>This theme will be useful to anyone who is engaged in any activity in the network, and so who are following us?</p>
<p><br /></p>
<p>Providers - have access to all registration data and pass the request on to law enforcement authorities.</p>
<p><br /></p>
<p>Trojans - gathering your data, please SMS payment, the conversion of the ip proxy con you into thefts, sell your data.</p>
<p><br /></p>
<p>Polymorphic viruses - the danger is that they will not find, used by organizations such as Echelon COPM and penetrate to you and record all your actions, passwords, etc. If the organization pay attention to you, it is impossible to avoid infection.</p>
<p><br /></p>
<p>Rootkits - are also used special. services, a process that hides you from Trojans, antiviruses do not detect.</p>
<p>Division K - is the charge of the state, not a few hackers, carders and other cyber criminals caught in their paws. In many cases, they are turning to COPM assistance for these criminals. They are only to come to your home.</p>
<p><br /></p>
<p>In the network there are many resources on which to focus special. service. Such resources often are not pure services, forums, etc. COPM monitors over those resources and get all of the data Data resource users.</p>
<p><br /></p>
<p>What the COPM and how it works?</p>
<p><br /></p>
<p>This is special. equipment, its main components!</p>
<p><br /></p>
<p>Hardware and software Part (set from your service provider);</p>
<p><br /></p>
<p>REMOTE CONTROL POINT (set by the law enforcement agencies);</p>
<p><br /></p>
<p>CHANNEL (S) DATA (provided by ISP to establish a connection with the item REMOTE CONTROL).</p>
<p><br /></p>
<p>Take for example the provider, he set specials. a device that intercepts and forwards all traffic COPM, and connects to the ISP equipment COPM, thus all of the traffic may be intercepted at any time by law enforcement agencies.</p>
<p><br /></p>
<p>COPM may share your information in a static mode, and complete.</p>
<p><br /></p>
<p>There COPM-1 which monitors the analog connection, telephone calls.</p>
<p><br /></p>
<p>COPM-2 is designed for wiretapping mobile and internet monitoring.</p>
<p><br /></p>
<p>COPM-3 about it I can not say much, it is a new, secret version that was created because of the problems that many people began to use a VPN and other security measures. It provides control over the set vpn server for its FSB agent will listen to Skype from this year, ICQ, etc.</p>
<p><br /></p>
<p>Its main goal to unite all directions COPM the global database which will be interconnected and globally monitor the traffic in our country and other countries where there COPM system.</p>
<p><br /></p>
<p>COPM is everywhere, it is service providers, data centers, all your favorite social. network program icq and skype similarity, they are introducing to your bookmarks that to be able to listen to, I advise you not to use the updated versions qip, Icq and skype. All of these programs would not work if they were not included bookmarks, they are simply not allowed to work.</p>
<p><br /></p>
<p>By accessing the network, you get just under the COPM-2 surveillance due to its provider, all the resources that you access all of your registration, etc. have your provider which stores logs of 3 years, and not on a formal agreement with the COPM 10 years. This is one of the conditions COPM-2, without this provider does not receive a license for the provision of services.</p>
<p><br /></p>
<p>SORM 2 stands on all the search engines, all your requests are sent directly to the COPM, and Sobieraj all your settings for the cookies, the user's picture is drawn up according to your needs and passwords. For example, when you enter your password, the operator COPM, the program displayed all where ever you entered, as COPM was introduced almost everywhere.</p>
<p><br /></p>
<p>Take for example, web money, it completely scans your PC and registers in the registry bound to your Mac, and serial number of the equipment and the data that you have left at registration, all this makes the web money but the information is automatically sent to the COPM, and this applies to the mailboxes , soc. networks, various services, etc. All of your data gets into a single database which is easy to draw an analogy, and to find out who is behind this or that act.</p>
<p><br /></p>
<p>Also COPM-2 is on the VPN and proxy, not all but many, especially in the legal. Many proxy COPM-2 system, others give your logs on request or simply come as you have deposited, although many people say that do not keep logs, do not believe.</p>
<p><br /></p>
<p>It does not matter how many proxies you use enough to come to another country and all logs will have a big brother.</p>
<p><br /></p>
<p>All proxies are logs and through their promotion sooner or later will come to you, you can only win time. Also the case with data centers, security need your own server and their own people in the data center, and it is desirable to dsDNA abroad.</p>
<p><br /></p>
<p>If the domain registration penetrate human reality, if it is determined that the data is not valid, the domain is put on the note.</p>
<p><br /></p>
<p>COPM also uses a network of TOR that listen passing through them traffic.</p>
<p><br /></p>
<p>Echelon - a much more sophisticated equipment, such a system is installed on Google, embedded in Windows as tabs on all the optical cables and data centers around the world, with the desire tier operator, he uses satellite and look at you in real time in the monitor. Owner Echelon CIA. Russian special. Service does not have access to this system, but it may require information at the official request.</p>
<p><br /></p>
<p>Here I will briefly describe what a user can do to ensure anonymity</p>
<p><br /></p>
<p><br /></p>
<p>1. Use a virtual operating system</p>
<p><br /></p>
<p>2. Protection from viruses, Trojans, viruses and Rukieten use complex programs separately and only the latest version</p>
<p><br /></p>
<p>-antivirus NOD 32</p>
<p><br /></p>
<p>-Anti Trojan Elite</p>
<p><br /></p>
<p>-Antirutkit UnHackMe</p>
<p><br /></p>
<p>- From viruses to use public car virtuplnuyu proxy and always with the virtual keyboard</p>
<p><br /></p>
<p>-use EToken</p>
<p><br /></p>
<p>-use antikeylogger</p>
<p><br /></p>
<p>3. Firewall Protection</p>
<p><br /></p>
<p>-ispolzuem Outpost Firewall Pro, configure, scan ports, open and close</p>
<p><br /></p>
<p>4. Encrypt and hide</p>
<p><br /></p>
<p>-True Crypt</p>
<p><br /></p>
<p>-for hide Steganos Privacy Suite</p>
<p><br /></p>
<p>5. Global Data Hiding</p>
<p><br /></p>
<p>-Proxy</p>
<p><br /></p>
<p>-VPN</p>
<p><br /></p>
<p>-Open VPN</p>
<p><br /></p>
<p>- SSH-tunneling</p>
<p><br /></p>
<p>-JAP</p>
<p><br /></p>
<p>-TOR (There have been cases of arrest dwell under TOR)</p>
<p><br /></p>
<p>6. Ispolzozuem access to the Internet is not a home provider</p>
<p><br /></p>
<p>Here I will describe those processes that can reveal your ip</p>
<p><br /></p>
<p>Cookies - IP using cookies do not identify, but when you first enter the site, ip address of the client server can be saved in cookies, and the next time you log on to the site is already a proxy server sees that the ip another and draws conclusions, so if you do not disable cookies it is not a proxy will not save you</p>
<p><br /></p>
<p>Java Script- pogramma written in this language can without much difficulty to determine your real IP and any browser settings. To protect only one solution, to turn off completely JAVA.</p>
<p><br /></p>
<p>Active X- are programs that run on your computer, they can find your browser settings, &quot;calculate&quot; your real IP address, and even easily change your proxy settings. Protection against them is a full ActiveX ban.</p>
<p><br /></p>
<p>Abuzaustoychivost</p>
<p><br /></p>
<p><br /></p>
<p>Identifies resource resistance to various types of complaints and SORM-tier court decisions.</p>
<p>In general, by and large all abuznost for serious cases lime, for serious cases the best option data center in China, Malaysia, with his person and with your server or pirate connection to the main fiber. It is important to know that Lushy option for accommodation and their proxies and vpn and their website hosting is abuzaustoychivy.</p>
<p><br /></p>
<p>Social Engineering</p>
<p><br /></p>
<p>For example, you go to the post office and the sites under different nicknames and passwords, but as a search engine, it's a great spy, you can be identified by repeated queries, so you have to act like a different person. If you are in what the share register under their real the ip, then the only thing you can do to throw your nickname, to get a different name, throwing icq, mail and all you lighted upon registration with the real ip. All your information is immediately fall into the COPM-2, its database is 5 Pitabayt have Echelon 70 Pitabayt.</p>
<p><br /></p>
<p>Most standard methods when caught, the person registered on the resource have email, and forget that almost made out with a real ip, or started a new nickname and leave the old ip, etc. cases. The main thing that the virtual profiles do not overlap with your real ip data and iron real PC.</p>
<p><br /></p>
<p>DNS for your domain information is not hidden as easy as ip, VPN hides in other cases require special settings or special programs soksifikatorov traffic - just below I will give them.</p>
<p><br /></p>
<p>MAC address of the NIC</p>
<p>Internal address of the network card that is tied to your ip address on the principle of SORM as well as banks, e-commerce solutions define your ip, even after his replacement.</p>
<p><br /></p>
<p>system IDs</p>
<p>Various characteristics of the processor number, HDD number, OS type, OS language, browser and a lot of parameters on which the server determines your uniqueness and stores these parameters.</p>
<p><br /></p>
<p>What's all the same needs to be done for your safety, which would provide for themselves by COPM</p>
<p><br /></p>
<p>- Use a bot network and personally asked, the more the better</p>
<p><br /></p>
<p>- Use a personal VPN triple</p>
<p><br /></p>
<p>- Surf proksifikatsii all programs use Proxifier Portable</p>
<p><br /></p>
<p>- To hide the virtual machine to use the poppy</p>
<p><br /></p>
<p>- For e-commerce put patches on a virtual machine</p>
<p><br /></p>
<p>- Using True Crypt to encrypt the partition, and create several hidden sections have been the case when people imprisoned because they did not provide the password from True Crypt, to do this hidden</p>
<p><br /></p>
<p>-Razmeschaem Encrypted on removable section of virtual machine images + control on biometrics - iris</p>
<p><br /></p>
<p>-Ispolzuem Program plugins for mail encryption, Skype, etc.</p>
<p><br /></p>
<p>- Place 10 Virtual Profiles, 2 hardware for zaputovanie social engineering</p>
<p><br /></p>
<p>-For Better security to use a cluster of 5 or more VPN servers with internal tunneling and mirroring, is actually not treatability</p>
<p><br /></p>
<p>- Using a netbook (which do not use anywhere else) and sham contract for Wi Max (better) Wi-Fi GSM (worse) get into a taxi and go to the dense stream of cars, work no more than 30 minutes. Periodically change the sim cards and phone reflash IMEA</p>
<p><br /></p>
<p>- As an option for 100 mb line, prepare a contract for the old lady, or either connect to an existing &quot;teapot&quot; to the LAN line option is more expensive, we conclude a contract of lime LE with data center to channel rent, from the basement or from rented premises in difficult accessible place doing the junction box and cable outlet at 100 or 1000 - 5000 m (for extension have cheap switches) on the junction box and the apartment &quot;bum&quot; put signalization on traffic or jerk the wires and put the 2 - 3 places web-camera. Upon detection guests promptly chopped off the cable and throwing, but if properly carry out its ends two days will look. As the network and the building you do not all the time, there must be a person or a system configured with the erosion of the cable and its winding-- it's not so difficult. Of course variants are possible, the main thing to understand that independent lines of communication are not tied to your real data - it's your extra trump card</p>
<p>If you fulfill all these conditions, you get the complete anonymity of the COPM, but also want to tell you that more than 30 years under the banner of the Soviet secret COPM crept to this technology. So all LCD monitors, plasma - are based on what? Correctly transistors, the entire area of ​​the display matrix is ​​the number of oromnoe trazistorov that govern the pixels. By and large, all of our PC monitors and spies of the enemy. In short there is program complex &quot;Medusa&quot; which will determine your ip (or simply via radio to a distance of 2 km), interacts with the display driver, and turns it in fact an active fazirovnnuyu grille radiator. Or a giant matrix video cameras that emit weak signals takes them back from the surrounding space and forms an image, but the image and the quality is not super, but your photograph may well make.</p>
<p><br /></p>
<p>Complete anonymity network in 2 minutes</p>
<p><br /></p>
<p>This method of anonymity includes all of the above steps to ensure your safety, everything is already set up and you only remains to connect to the computer, which is protected by 100% through the TeamViewer program wishes to establish antikeylogger for safety input text by similar services and work for pleasure .</p>
<p><img src="//bm.img.com.ua/berlin/storage/news/orig/7/cb/3a599097421297f33ebd4a1407c5ecb7.jpg" /></p>
👍 , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,