Create an account

Very important

  • To access the important data of the forums, you must be active in each forum and especially in the leaks and database leaks section, send data and after sending the data and activity, data and important content will be opened and visible for you.
  • You will only see chat messages from people who are at or below your level.
  • More than 500,000 database leaks and millions of account leaks are waiting for you, so access and view with more activity.
  • Many important data are inactive and inaccessible for you, so open them with activity. (This will be done automatically)


Thread Rating:
  • 493 Vote(s) - 3.52 Average
  • 1
  • 2
  • 3
  • 4
  • 5
The Hitchhiker's Guide to Online Anonymity

#1
Introducing: The Hitchhikers Guide to Online Anonymity v1.1.8-pre.1
Releases are now a thing. This is v1.1.8-pre.1.

- View it here:

[To see links please register here]

- Download the source here:

[To see links please register here]


This is a cool project I'm helping to work on with some like-minded individuals. It is aimed at helping provide security, anonymity and privacy online for journalists, dissidents, whistle-blowers, lawyers, etc. I was hoping some of you might like it. I wanted to give it some exposure and hopefully also gather some content requests. We're currently looking to have both technical and non-technical submissions for things in the guide that will be public domain and explained in a way that anybody can understand. It currently details things like signing up to services anonymously, browsing privately, hardening home networks, setting up servers (both on-prem and cloud) for storage, and many other topics.

[To see links please register here]

[To see links please register here]

[Image: 1.png]
[Image: 2.png]
[Image: 3.png]
Reply

#2
this was a great find, thanks for this
Reply

#3
This is a CERTIFIED HOOD CLASSIC
Reply

#4
An excellent tutorial to say the least.

I plan on checking It out In detail tonight.
Reply

#5
Yo thank you for sharing this!
Reply

#6
BUMP for update - the guide is going strong and has tons of new info you won't find anywhere else!
Reply

#7
is this good for social engineering too?
Reply

#8
Quote:(08-02-2022, 05:34 PM)Andrea Bang Wrote:

[To see links please register here]

is this good for social engineering too?

No, the guide covers privacy and security using Windows 10/11 and Mac and some aspects of mobile operating systems. It doesn't involve any sort of social engineering.
Reply

#9
Quote:(08-03-2022, 04:30 AM)Hidden Signals Wrote:

[To see links please register here]

Quote: (08-02-2022, 05:34 PM)Andrea Bang Wrote:

[To see links please register here]

is this good for social engineering too?

No, the guide covers privacy and security using Windows 10/11 and Mac and some aspects of mobile operating systems. It doesn't involve any sort of social engineering.
They probably meant if this security would help protect a SEer
Reply

#10
Quote:(08-03-2022, 07:17 PM)Canadian Moose Wrote:

[To see links please register here]

Quote: (08-03-2022, 04:30 AM)Hidden Signals Wrote:

[To see links please register here]

Quote: (08-02-2022, 05:34 PM)Andrea Bang Wrote:

[To see links please register here]

is this good for social engineering too?

No, the guide covers privacy and security using Windows 10/11 and Mac and some aspects of mobile operating systems. It doesn't involve any sort of social engineering.
They probably meant if this security would help protect a SEer

Yes, this guide has information on DNS, threat modeling, network security, physical OPSEC and other highly technical subjects, but explained in such a way that makes it easy to understand from any perspective, including non-technical ones directed toward the average internet user. The information is presented only as facts that we've discovered over a long time in our fields of research and as regular people just trying to be anonymous or private.

There are also many areas where we recommend other researchers that we've vetted and whose information we found to fit our own threat model: journalists, whistleblowers and the like.

Feel free to submit a PR with any updated or new information - keep in mind this is all information that is highly sought after for certain threat models and will likely be updated constantly, and that's what we're aiming to do. You can find other research such as malware protection, document sanitation, using Qubes OS, Tails & Whonix, etc.

TL;DR - I'm not a social engineer but the guide will be useful to someone like that to some extent.
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

©0Day  2016 - 2023 | All Rights Reserved.  Made with    for the community. Connected through