Scandal-plagued former Gilgo Beach police chief arrested for soliciting sex from undercover officer in park
Ex-police chief is accused of exposing himself to a Suffolk County park ranger
More results...
Ex-police chief is accused of exposing himself to a Suffolk County park ranger
Russian president Vladimir Putin was seen at a concert as reports circulated that Wagner chief Yevgeny Prigozhin was on a plane that crashed near Moscow, killing everyone onboard.
India becomes only the fourth country to land a probe on the moon after the US, Russia and China.
Online footage appears to show a plane falling from the sky, the BBC has been able to verify the location.
The hazards are many. And they seem to come in all forms. From a report: The southwestern U.S. is reeling from record rainfall and extensive flooding from a rare tropical storm. Much of the central and southern parts of the country are in the grips of …
Let me first offer a brief apology. I agreed to share a basic anonymity guide without really considering my current workload; I own a full-blown startup company and am working 14-plus hours a day, all week long. I should have thought about that before offering to create the guide. Haha.
Anyway, as promised… the guide. It’s not as comprehensive as I’d have liked, but I am still available to answer questions or point you in the right direction.
I don’t think I need to say this, but this is for educational and/or research purposes only. What you do with this guide, or how far you take the information or tips in the guide are entirely on you. I’m offering this as a way to combat the invasions of privacy we all deal with daily.
Please, keep in mind I am developing a legitimate company with the aim of helping provide parity to blockchain security and development in a tangible way. I am a privacy advocate, but I am also a human with a business and a passion. Keep that in mind… please. I’m only trying to help; don’t make this into anything that it isn’t.
Finally, I am not endorsed or sponsored by any of these companies or tools. If I’ve mentioned it here it’s because I’ve either used it myself, audited it myself, or both.
Privacy today requires a certain amount of nuance, and unfortunately, it’s required at every corner; professionals will appreciate this. For beginners, just be patient and understand what it is that you’re doing so that you may improve or perfect your OPSEC. Do not ever attempt to learn something while trying to complete a mission. Practice.
Be safe. DMs are open for legit questions, but don’t be fucking lazy.
—
**Introduction**
I’m not a great teacher. It’s easiest for me to use my own set-up as a starting point for teaching. Having said that, I want to make something clear right away.
I use four different machines weekly:
A) My normie machine – MBP. I still encrypt everything. I still use my VPNs and exclusive networks. I still use a password manager and monitor my systems… but it’s a daily-use machine. I’m a full-stack developer, and this is my daily working tool. All 2FA. All unique passwords. Security is as high as it gets. Drives are encrypted. I completely control this machine as if it were an extension of me.
B) My ML/Compute – 2x Mac Studios. Loaded. Stripped to the bare metal, basically… as much as possible, anyway. These machines are like Fort Knox because my proprietary code and datasets exist here. It’s hardwired to my router; ported; and connects to less than 20 different servers. These are domain-specific machines that no one in their right mind needs. In fact, if you’re in ML/AI… don’t build a machine. Lease bigger, faster tools in the cloud for a year privately for the same money. Learning lesson.
B) My secondary machine – an XPS running Kali; TailsOS. I use this for everything else. The same rules apply here, but doubly so. This is pretty locked down. It also takes me about 60 seconds from boot to totally secure. I can brick this machine with keystrokes in the event I need to. It’s not super secure, but it’s a modified “sudo dd” command that will do it 99.5% of the time.
C) My dark machine. This aLmost NEVER connEcts to the internet; the webcam and microphone have been removed. It’s wiped after use – every single time. It’s also nEver more than 12 months old. Use your imaginaTion.
For the majority of this guide, you can think of the guide in reference to either my daily driver or secondary machines. These are the categories 99% of the people interested in the guide will fall into.
**Hardware**
Use dedicated machines. It’s as simple as that. It doesn’t need to be illegal; it’s simply a machine you make sure keeps you anonymous. Period. It’s not as difficult as it seems to secure anonymous hardware. The tin-foil crowd will say that global supply chains can’t be trusted, and you know what… maybe they’re right. The thing is, 99.5% of us don’t have the capacity to solve that… so we do the best we can in the real world with real tools. I can say with some confidence that TAO has lost the Intel access they’ve held for over a decade; I don’t know if that makes the tin-foil crowd’s point more or less valid. You be the judge of all that. You can have a single machine and STILL remain anonymous; the rules just apply to that machine. You don’t need a ton of money or anything else to accomplish this.
** Any hardware purchased via the dark web or P2P needs to be wiped as soon as you receive it. In the past, I’ve installed a new SSD/HD and a new OS before I used it for anything at all.
**Software**
Use safe OSs like Tails, Qubes, or Whonix. Use TOR, and use the TOR Project itself to download the browser. If you’re ultra concerned about the age-old rumor of being “flagged” by your ISP on the download of TOR… be creative. Use public Wi-Fi to download the package; install it via portable drive. Here is a link to accomplish this: https://tb-manual.torproject.org/make-tor-portable/. I am not a huge fan of VMs, but they ARE another tool that can be used to remain anonymous if you’re competent. I don’t use them except in situations where I haven’t a choice, but they should at least be mentioned. Many people use them to great effect.
I want you to remember that the weak link is always the human using the machine or tools. If you make sloppy, rushed mistakes… the best tools or software in the world are useless. Be patient, and do it properly the first time. It will make moving from one machine or operating system to the next much easier.
**Connections**
This is a REALLY brief overview of connections. It’s a set of simple, hard, and fast rules that everyone should follow. Automate as much of this as possible. Most tools (NordVPN, for example) allow you to configure the automatic connection. Keep in mind, most Clearnet VPN providers DO STORE LOGS and they WILL COOPERATE WITH LE. That doesn’t mean they’re useless. People can still use them to remain anonymous… but they’re not bulletproof.
**Browsing**
Use privacy-focused web browsers like Brave or Firefox. Do not bring me the Brave story from three years ago about boosting paid ads to crypto users. It’s not relevant, at all. Brave is the best publicly updated and used browser, IMO. This is based on a ton of research and actual use. Of course, it’s literally only as strong as your settings. Take the time to do it right. Enable private browsing mode and regularly clear your browsing history, cookies, and cache. Consider using browser extensions like uBlock Origin and HTTPS Everywhere for additional privacy… if you’re using Firefox, that is. Brave eliminates the need to trust any third-party extensions.
**Email/Comms**
Use encrypted email services like ProtonMail or Tutanota. Enable 2FA for your email accounts and use strong, unique passwords. Use encryption tools like GNU and learn to use them from the clipboard to avoid making the mistake of leaving un/encrypted files stored on your machine. The commands are simple to run and memorize.
These are basics, but you should all already know how to use TG/Signal. Do not trust them implicitly. Everything is cool until it isn’t and some random government starts forcing backdoor encryption access that isn’t made public until it’s WAY too late. Be smart. Don’t just assume blind trust – ever.
**Crypto**
This is another section where I could write a literal book, but I just do not have the resources or time to do so. Having said that, I’ll try to keep it as brief and to the point as possible.
The everyday stuff still matters. Privacy is about building strong chains of security across the exposure you have to the Internet. This means that your very normal, very natural usage needs to be protected, as well. These are a few places to begin.
**Social Media**
Review and adjust your privacy settings on social media platforms to limit the amount of personal information that is publicly visible. Be cautious about sharing personal information and avoid accepting friend requests from unknown individuals. Contrary to popular belief… it is possible to use social media while remaining relatively private. Use second phone numbers via Burner apps, Google Voice, or whatever tool you normally use. Ensure that you’re following the above rules. Most importantly…
**Everything Else**
That’s all for now, fam. I’m sorry if I’ve missed obvious stuff, or I’ve made errors. I will check in to correct mistakes or clarify as the comments or requests come in. Let’s try to keep as much of the Q&A inside this thread so that everyone can access it… If it’s a really tricky question, the DM option works… but remember that I’m super busy.
This guide is nothing more than a place to gain some knowledge and ideas. How you implement or use it, what tools or access you choose to set, etc. is really up to you. A helpful tip to beginners… everyone here with an answer for you has earned these answers through reading, practicing, studying, and usually fucking failing. No one wants to just hand over their hard work for you to skip the paces. Read. Practice. Google. Learn. THEN come ask questions.
I’ve gotta run. Feel free to pick it apart! Let’s get it cleaned up via crowd-sourcing / Q&A so that everyone can use it. Talk soon.
I’m here for every single one of us until I’m not. Talk soon, mates.
Cheers.
submitted by /u/LoadingALIAS
[link] [comments]
Russia-Ukraine war: List of events, day 552 Al Jazeera EnglishUkraine war: Night time drone attacks on Moscow, Russian defences detailed, Ukrainian elections euronewsAugust 28, 2023 – Russia-Ukraine news CNNUkrainian so…
The Russian President’s swift exit comes after mercenary chief Yevgeny Prigozhin was on the passenger list of a private jet that crashed into a ball of flames en route to St. Petersburg from Moscow.
A private jet with 10 people on board has crashed in Russia – with the man who led a short-lived mutiny against the country’s top brass on the passenger list.