Guide to Internet privacy

Jason Voorhees

Jason Voorhees

𝕯𝖝𝕯 π–ˆπ–—π–Šπ–œ π•΅π–Šπ–˜π–™π–Šπ–—
Joined
May 15, 2020
Posts
59,314
Reputation
165,791
This thread took some time to make bevause of so much misinformation online and secrecy regarding all these methods were. In this thread I have
coverd all viable methods for regular people* and the risky, advanced techniques used by Russian and Chinese hackers like Turla. Step-by-step, with legal risks and consequences for the shady stuff. You can skip part 2 if you don't want be on CIA's watchlist. And yes I have used chatgpt to summarize, correct grammar errors, paraphrase certain parts but all the points and ideas in this thread are throught my own research.


Part 1: Anonymity Tools for Regular People.

These are legal practical steps anyone can take to protect their digital identity. Perfect for privacy-conscious folks who are not international criminals

Harden Your Operating System

Even before you use VPNs or Tor, your OS leaks data.

Options:

Use privacy-focused Linux distros like:

Tails OS (bootable, routes all traffic through Tor)



Qubes OS (compartmentalized, VM-based


Disable telemetry in Windows/Mac.

Use local accounts, not cloud-linked logins (like Microsoft or Apple ID)

Also always use Brave Browser because your Browser is the biggest privacy hole

1. Use a Reputable VPN

Use paid, audited VPNs that don’t log your data:

NordVPN: https://nordvpn.com/

ProtonVPN: https://protonvpn.com/

Steps:

Subscribe (~$3–$12/month).

Install the app.

Connect to a privacy-friendly country (e.g., Switzerland).

> Avoid free VPNs – most log your data or sell it.

2. Browse with Tor

Download from torproject.org

Steps:

Install Tor Browser.

Use for sensitive browsing (e.g., research, whistleblowing).

Never log into personal accounts on Tor.

Cons:

Slower than regular browsers.

Many sites block Tor.

Exit nodes can be monitored.

3. Explore I2P (Invisible Internet Project)

Get I2P – a decentralized network like Tor but optimized for peer-to-peer communication.

Steps:

Install Java-based I2P software


Run the I2P router in the background.Configure the I2P router

Unlike Tor, I2P encrypts all traffic end-to-end and is designed for hidden services (e.g., private file sharing, chats).

>Even slower than Tor, smaller network, complex setup. Illegal if used for illicit activities (e.g. dark pool markets).


4. Use Private Torrent Trackers

Private trackers are invite-only BitTorrent communities with strict rules to avoid tracking.

Steps:

Visit forums like r/OpenSignups.

Get invites to IPTorrents, Redacted, etc.

Use a VPN while torrenting.

Maintain a good seed ratio.

> Legal risk if downloading copyrighted content.

5. Use Virtual Machines (VMs) for Isolation

VMs like VirtualBox (https://www.virtualbox.org) create
isolated environments to browse or open risky files. Great for isolating risky activities.

Steps:

Install VirtualBox or VMware.

Set up a Linux-based VM (e.g., Ubuntu).

Use for risky browsing, suspicious files, etc.

Use snapshots to easily revert state.

6. Use Encrypted Communication Apps

Signal for calls/messages: signal.org

ProtonMail for secure email: protonmail.com

Tips:

Use a burner phone/email for setup.

Enable disappearing messages on Signal.

7. Use Privacy-Focused Search Engines

DuckDuckGo

StartPage

> No tracking or profiling.

8. Use Disposable Emails

For temporary accounts or sketchy sites, use:

Temp Mail

> Don't link these to your real identity.

9. Avoid Smart Devices

Skip Amazon Echo, Google Home, etc. If you have them right now. Toss it in the bin. I was shocked when I found it out that these devices are always listening and are keeping logs of all the conversations it is even in their privacy policies but no one cares to read them

10.DNS Privacy

DNA translates website names (like google.com) into IP addresses.
Even if you're using a VPN or Tor, your DNS queries can still leak revealing what sites you're visiting to.

>Use encrypted DNS like Cloudflare 1.1.1.1 via DNS-over-HTTPS/TLS. Tools like Pi-hole + Unbound block trackers and keep DNS traffic local. Always test for DNS leaks


11. Payment Privacy

Never use your real credit/debit card for private tools or services. Instead, use prepaid debit cards bought with cash, gift cards, or privacy coins like Monero. USAcels can generate burner cards via Privacy.com. For crypto, avoid KYC exchanges and always use a VPN or Tor

Part 2: Russian Hacker Tactics (Satellite Internet & BGP Hijacking)

These are advanced, risky methods used by Russian APTs like Turla. They're not viable for regular people due to illegality and severe consequences but I will still talk about them in detail because of how much I have read about them and spent so much time finding legit info. Doing any of this is directly going to land you on the CIA's watchlist.

1. Satellite Internet Hijacking

Used by Russian APTs to anonymize C2 servers.

Goal: Hijack unencrypted DVB-S satellite traffic to avoid detection.

Requirements:

Satellite dish ($100–$500)

DVB-S card (e.g., TBS-6922SE)

Linux system

Skygrabber software

Steps:

1. Point dish at satellite beams (e.g., over Somalia, Afghanistan).

2. Scan for unencrypted DVB-S frequencies.

3. Sniff traffic using Skygrabber.

> Goal: Find active IP addresses of satellite users.

2. IP Spoofing & C2 Command Routing

Once IPs are identified:

Spoof them to hide C2 servers.

Now that you have acquired spoofed IPs you now use it for malware control/data theft. Route malware commands over the satellite traffic. e.g AcidRain malware

> Makes tracking very hardβ€”looks like legitimate satellite traffic.

3. BGP Hijacking (Bonus)

BGP hijacking is the illegitimate takeover of groups of IP addresses by corrupting Internet routing tables maintained using the Border Gateway Protocol.

Used by: ISPs like Rostelecom, even China Telecom.

Steps:

1. Announce fake ownership of IP blocks (e.g AWS, Google).

2. Route traffic to attacker-controlled servers.

> Example: In 2020, Russian ISPs hijacked BGP routes from Google/Amazon.

Everything in Part 2 is very very illegal.
Doing any of this in this = federal crimes. Think terrorism-level consequences (treason, espionage)

If this were GTA, you'd have 5 stars and a tank after you after you do stuff like this. So don't try to be an edgelord because law enforcement agencies are not playing around when it comes to these things. They take it all very seriously.

Conclusion:

If you just want to stay anonymous legally, stick to:

VPNs

Tor/I2P

Private trackers

VMs

Signal/ProtonMail

Privacy search engines

Don’t do anything in Part 2 unless you enjoy orange jumpsuits and windowless rooms.
 
Last edited:
  • +1
  • Love it
  • Hmm...
Reactions: Shahnameh, amulet, ChadL1te and 31 others
@FaceandBBC @greycel @e1488shciozl @Panzram @loyolaxavvierretard @Bitchwhipper2
 
  • +1
Reactions: Shahnameh, loyolaxavvierretard, vevcred2_0 and 6 others
Alr knew all of this from mental outlaw, mirin effort tho good thread
 
  • +1
Reactions: niggacum492139, vevcred2_0, CEO and 4 others
@wishIwasSalludon @Sonneillon @sigma boii @Beastimmung @deadstock
 
  • +1
Reactions: wishIwasSalludon, vevcred2_0 and greycel
how to get into cybersecurity
 
  • +1
  • JFL
Reactions: Alias!, vevcred2_0, CEO and 3 others
wow
 
  • +1
Reactions: vevcred2_0, playxiing, Jason Voorhees and 1 other person
Clap Reaction GIF


Very high Quality thread, read every word :popcorn:
Bookmarked
 
  • +1
Reactions: vevcred2_0, brownmutt42, FaceandBBC and 2 others
you dont really need vpn when using tor
Some would say its actually worse to use a vpn as it redirects traffic to one source instead of letting it be on multiple like tor
 
  • +1
Reactions: uksucks, vevcred2_0, VV62 and 3 others
@Sprinkles @CEO @sub5outsider
 
  • +1
Reactions: vevcred2_0, CEO and 3links2
Even my phone is always listening and recommending me things based on conversations I had
 
  • +1
Reactions: vevcred2_0, 3links2 and Jason Voorhees
They don't understand the things I say on Twitter
Nigga HH
 
  • +1
Reactions: vevcred2_0, ζˆ‘ιœ€θ¦ι˜΄ιƒ¨ and Jason Voorhees
Bookmarking this:feelsyay:
 
  • +1
  • JFL
Reactions: vevcred2_0, greycel, brownmutt42 and 2 others
@TheLightOfMyLife @mentally_ill_chad
 
  • +1
Reactions: vevcred2_0, TheLightOfMyLife and mentally_ill_chad
need more candids.
Debating if I should stop rotting in my room today and cap some today. Do people even go out on Memorial Day?
 
  • +1
  • JFL
Reactions: playxiing, vevcred2_0 and Jason Voorhees
Debating if I should stop rotting in my room today and cap some today. Do people even go out on Memorial Day?
Tbh bro don’t give in to the depraved lunatics edging you on
You’re the one who will take the fall should anything happen + I would advise against circulating this type of content, gets people into some fucked up fetishes
 
  • +1
  • JFL
Reactions: playxiing, vevcred2_0, Jason Voorhees and 1 other person
@Cleetus Cornfield @It'snotover @vernier @Shahnameh @ζˆ‘ιœ€θ¦ι˜΄ιƒ¨ @imontheloose
 
  • +1
Reactions: Shahnameh, It'snotover, vevcred2_0 and 1 other person
This thread took some time to make bevause of so much misinformation online and secrecy regarding all these methods were. In this thread I have
coverd all viable methods for regular people* and the risky, advanced techniques used by Russian and Chinese hackers like Turla. Step-by-step, with legal risks and consequences for the shady stuff. You can skip part 2 if you don't want be on CIA's watchlist. And yes I have used chatgpt to summarize, correct grammar errors, paraphrase certain parts but all the points and ideas in this thread are throught my own research.


Part 1: Anonymity Tools for Regular People.

These are legal practical steps anyone can take to protect their digital identity. Perfect for privacy-conscious folks who are not international criminals

Harden Your Operating System

Even before you use VPNs or Tor, your OS leaks data.

Options:

Use privacy-focused Linux distros like:

Tails OS (bootable, routes all traffic through Tor)



Qubes OS (compartmentalized, VM-based


Disable telemetry in Windows/Mac.

Use local accounts, not cloud-linked logins (like Microsoft or Apple ID)

Also always use Brave Browser because your Browser is the biggest privacy hole

1. Use a Reputable VPN

Use paid, audited VPNs that don’t log your data:

NordVPN: https://nordvpn.com/

ProtonVPN: https://protonvpn.com/

Steps:

Subscribe (~$3–$12/month).

Install the app.

Connect to a privacy-friendly country (e.g., Switzerland).

> Avoid free VPNs – most log your data or sell it.

2. Browse with Tor

Download from torproject.org

Steps:

Install Tor Browser.

Use for sensitive browsing (e.g., research, whistleblowing).

Never log into personal accounts on Tor.

Cons:

Slower than regular browsers.

Many sites block Tor.

Exit nodes can be monitored.

3. Explore I2P (Invisible Internet Project)

Get I2P – a decentralized network like Tor but optimized for peer-to-peer communication.

Steps:

Install Java-based I2P software


Run the I2P router in the background.Configure the I2P router

Unlike Tor, I2P encrypts all traffic end-to-end and is designed for hidden services (e.g., private file sharing, chats).

>Even slower than Tor, smaller network, complex setup. Illegal if used for illicit activities (e.g. dark pool markets).


4. Use Private Torrent Trackers

Private trackers are invite-only BitTorrent communities with strict rules to avoid tracking.

Steps:

Visit forums like r/OpenSignups.

Get invites to IPTorrents, Redacted, etc.

Use a VPN while torrenting.

Maintain a good seed ratio.

> Legal risk if downloading copyrighted content.

5. Use Virtual Machines (VMs) for Isolation

VMs like VirtualBox (https://www.virtualbox.org) create
isolated environments to browse or open risky files. Great for isolating risky activities.

Steps:

Install VirtualBox or VMware.

Set up a Linux-based VM (e.g., Ubuntu).

Use for risky browsing, suspicious files, etc.

Use snapshots to easily revert state.

6. Use Encrypted Communication Apps

Signal for calls/messages: signal.org

ProtonMail for secure email: protonmail.com

Tips:

Use a burner phone/email for setup.

Enable disappearing messages on Signal.

7. Use Privacy-Focused Search Engines

DuckDuckGo

StartPage

> No tracking or profiling.

8. Use Disposable Emails

For temporary accounts or sketchy sites, use:

Temp Mail

> Don't link these to your real identity.

9. Avoid Smart Devices

Skip Amazon Echo, Google Home, etc. If you have them right now. Toss it in the bin. I was shocked when I found it out that these devices are always listening and are keeping logs of all the conversations it is even in their privacy policies but no one cares to read them

10.DNS Privacy

DNA translates website names (like google.com) into IP addresses.
Even if you're using a VPN or Tor, your DNS queries can still leak revealing what sites you're visiting to.

>Use encrypted DNS like Cloudflare 1.1.1.1 https://one.one.one.one/ via DNS-over-HTTPS/TLS. Tools like Pi-hole + Unbound block trackers and keep DNS traffic local. Always test for DNS leaks

11. Payment Privacy

Never use your real credit/debit card for private tools or services. Instead, use prepaid debit cards bought with cash, gift cards, or privacy coins like Monero. USAcels can generate burner cards via Privacy.com. For crypto, avoid KYC exchanges and always use a VPN or Tor

Part 2: Russian Hacker Tactics (Satellite Internet & BGP Hijacking)

These are advanced, risky methods used by Russian APTs like Turla. They're not viable for regular people due to illegality and severe consequences but I will still talk about them in detail because of how much I have read about them and spent so much time finding legit info. Doing any of this is directly going to land you on the CIA's watchlist.

1. Satellite Internet Hijacking

Used by Russian APTs to anonymize C2 servers.

Goal: Hijack unencrypted DVB-S satellite traffic to avoid detection.

Requirements:

Satellite dish ($100–$500)

DVB-S card (e.g., TBS-6922SE)

Linux system

Skygrabber software

Steps:

1. Point dish at satellite beams (e.g., over Somalia, Afghanistan).

2. Scan for unencrypted DVB-S frequencies.

3. Sniff traffic using Skygrabber.

> Goal: Find active IP addresses of satellite users.

2. IP Spoofing & C2 Command Routing

Once IPs are identified:

Spoof them to hide C2 servers.

Now that you have acquired spoofed IPs you now use it for malware control/data theft. Route malware commands over the satellite traffic. e.g AcidRain malware

> Makes tracking very hardβ€”looks like legitimate satellite traffic.

3. BGP Hijacking (Bonus)

BGP hijacking is the illegitimate takeover of groups of IP addresses by corrupting Internet routing tables maintained using the Border Gateway Protocol.

Used by: ISPs like Rostelecom, even China Telecom.

Steps:

1. Announce fake ownership of IP blocks (e.g AWS, Google).

2. Route traffic to attacker-controlled servers.

> Example: In 2020, Russian ISPs hijacked BGP routes from Google/Amazon.

Everything in Part 2 is very very illegal.
Doing any of this in this = federal crimes. Think terrorism-level consequences (treason, espionage)

If this were GTA, you'd have 5 stars and a tank after you after you do stuff like this. So don't try to be an edgelord because law enforcement agencies are not playing around when it comes to these things. They take it all very seriously.

Conclusion:

If you just want to stay anonymous legally, stick to:

VPNs

Tor/I2P

Private trackers

VMs

Signal/ProtonMail

Privacy search engines

Don’t do anything in Part 2 unless you enjoy orange jumpsuits and windowless rooms.
I have exposed myself too much online allready, the glowniggers know more about me than I do. I know that I am on some sort of a watchlist due to the terrorism related stuff I researched and downloaded, stuff like bomb and explosive making, poison making, assasination guides, guerrila warfare, etc.
 
  • +1
  • JFL
Reactions: vevcred2_0, hopecel and Jason Voorhees
I knew nothing about part 2. Will go more into it thanks
 
  • +1
Reactions: vevcred2_0 and Jason Voorhees
Most people won’t ever do any of this apart from using a vpn, and all the encrypted messaging apps like signal are comprised, so kinda pointless for privacy if ur goal is to hide from the govt
 
  • +1
Reactions: vevcred2_0 and Jason Voorhees
, stuff like bomb and explosive making, poison making, assasination guides, guerrila warfare, etc.
These are average Serbiancel activities so you are all good @mentally_ill_chad @STAMPEDE @hopecel
 
  • JFL
  • +1
Reactions: vernier, vevcred2_0, mentally_ill_chad and 2 others
So I gotta do all that just to shitpost in offtopic? Over
 
  • +1
  • JFL
Reactions: playxiing, loyolaxavvierretard, vevcred2_0 and 2 others
laughs cage GIF



Nigga has his pics out on the website
Doxxed as β€˜Chundar Kummar’ from University of Washington

And talks about β€˜Guide to Privacy’

Funny GIF
 
  • JFL
  • +1
Reactions: playxiing, Alias!, loyolaxavvierretard and 5 others
These are average Serbiancel activities so you are all good @mentally_ill_chad @STAMPEDE @hopecel
you just tagged three non-Serbians πŸ₯ΉπŸ₯Ή btw, shit thread, cyber privacy doesn't exist

bookmarked tho
 
  • +1
Reactions: vevcred2_0 and Jason Voorhees
laughs cage GIF



Nigga has his pics out on the website
Doxxed as β€˜Chundar Kummar’ from University of Washington

And talks about β€˜Guide to Privacy’


Funny GIF
Good luck finding Rajesh in his Mumbai slum talking about Mass Genocide of females or Abdul in his Afghan bunker who cheers for rapes or Rodriguez in his Brazilian favela calling for Total Nigger death
 
  • +1
  • JFL
Reactions: ReadBooksEveryday, loyolaxavvierretard, vevcred2_0 and 1 other person
So I gotta do all that just to shitpost in offtopic? Over
Most people won’t ever do any of this apart from using a vpn, and all the encrypted messaging apps like signal are comprised, so kinda pointless for privacy if ur goal is to hide from the govt
Most privacy blunders come from carelessness, convenience, or blind trust not some nation-state attack. As long as you use common sense and do your due diligence and don't get involved in shady stuff you are mostly fine tbh. For most people, good cyber hygiene and common sense go a long way.
 
  • +1
Reactions: ReadBooksEveryday, rand anon and vevcred2_0
@Snicket
 
  • +1
Reactions: Snicket and vevcred2_0
Good thread
 
  • +1
Reactions: vevcred2_0 and Jason Voorhees
@Alias! @Muttcel foid killer
 
  • +1
Reactions: Alias! and Muttcel foid killer
This thread took some time to make bevause of so much misinformation online and secrecy regarding all these methods were. In this thread I have
coverd all viable methods for regular people* and the risky, advanced techniques used by Russian and Chinese hackers like Turla. Step-by-step, with legal risks and consequences for the shady stuff. You can skip part 2 if you don't want be on CIA's watchlist. And yes I have used chatgpt to summarize, correct grammar errors, paraphrase certain parts but all the points and ideas in this thread are throught my own research.


Part 1: Anonymity Tools for Regular People.

These are legal practical steps anyone can take to protect their digital identity. Perfect for privacy-conscious folks who are not international criminals

Harden Your Operating System

Even before you use VPNs or Tor, your OS leaks data.

Options:

Use privacy-focused Linux distros like:

Tails OS (bootable, routes all traffic through Tor)



Qubes OS (compartmentalized, VM-based


Disable telemetry in Windows/Mac.

Use local accounts, not cloud-linked logins (like Microsoft or Apple ID)

Also always use Brave Browser because your Browser is the biggest privacy hole

1. Use a Reputable VPN

Use paid, audited VPNs that don’t log your data:

NordVPN: https://nordvpn.com/

ProtonVPN: https://protonvpn.com/

Steps:

Subscribe (~$3–$12/month).

Install the app.

Connect to a privacy-friendly country (e.g., Switzerland).

> Avoid free VPNs – most log your data or sell it.

2. Browse with Tor

Download from torproject.org

Steps:

Install Tor Browser.

Use for sensitive browsing (e.g., research, whistleblowing).

Never log into personal accounts on Tor.

Cons:

Slower than regular browsers.

Many sites block Tor.

Exit nodes can be monitored.

3. Explore I2P (Invisible Internet Project)

Get I2P – a decentralized network like Tor but optimized for peer-to-peer communication.

Steps:

Install Java-based I2P software


Run the I2P router in the background.Configure the I2P router

Unlike Tor, I2P encrypts all traffic end-to-end and is designed for hidden services (e.g., private file sharing, chats).

>Even slower than Tor, smaller network, complex setup. Illegal if used for illicit activities (e.g. dark pool markets).


4. Use Private Torrent Trackers

Private trackers are invite-only BitTorrent communities with strict rules to avoid tracking.

Steps:

Visit forums like r/OpenSignups.

Get invites to IPTorrents, Redacted, etc.

Use a VPN while torrenting.

Maintain a good seed ratio.

> Legal risk if downloading copyrighted content.

5. Use Virtual Machines (VMs) for Isolation

VMs like VirtualBox (https://www.virtualbox.org) create
isolated environments to browse or open risky files. Great for isolating risky activities.

Steps:

Install VirtualBox or VMware.

Set up a Linux-based VM (e.g., Ubuntu).

Use for risky browsing, suspicious files, etc.

Use snapshots to easily revert state.

6. Use Encrypted Communication Apps

Signal for calls/messages: signal.org

ProtonMail for secure email: protonmail.com

Tips:

Use a burner phone/email for setup.

Enable disappearing messages on Signal.

7. Use Privacy-Focused Search Engines

DuckDuckGo

StartPage

> No tracking or profiling.

8. Use Disposable Emails

For temporary accounts or sketchy sites, use:

Temp Mail

> Don't link these to your real identity.

9. Avoid Smart Devices

Skip Amazon Echo, Google Home, etc. If you have them right now. Toss it in the bin. I was shocked when I found it out that these devices are always listening and are keeping logs of all the conversations it is even in their privacy policies but no one cares to read them

10.DNS Privacy

DNA translates website names (like google.com) into IP addresses.
Even if you're using a VPN or Tor, your DNS queries can still leak revealing what sites you're visiting to.

>Use encrypted DNS like Cloudflare 1.1.1.1 via DNS-over-HTTPS/TLS. Tools like Pi-hole + Unbound block trackers and keep DNS traffic local. Always test for DNS leaks


11. Payment Privacy

Never use your real credit/debit card for private tools or services. Instead, use prepaid debit cards bought with cash, gift cards, or privacy coins like Monero. USAcels can generate burner cards via Privacy.com. For crypto, avoid KYC exchanges and always use a VPN or Tor

Part 2: Russian Hacker Tactics (Satellite Internet & BGP Hijacking)

These are advanced, risky methods used by Russian APTs like Turla. They're not viable for regular people due to illegality and severe consequences but I will still talk about them in detail because of how much I have read about them and spent so much time finding legit info. Doing any of this is directly going to land you on the CIA's watchlist.

1. Satellite Internet Hijacking

Used by Russian APTs to anonymize C2 servers.

Goal: Hijack unencrypted DVB-S satellite traffic to avoid detection.

Requirements:

Satellite dish ($100–$500)

DVB-S card (e.g., TBS-6922SE)

Linux system

Skygrabber software

Steps:

1. Point dish at satellite beams (e.g., over Somalia, Afghanistan).

2. Scan for unencrypted DVB-S frequencies.

3. Sniff traffic using Skygrabber.

> Goal: Find active IP addresses of satellite users.

2. IP Spoofing & C2 Command Routing

Once IPs are identified:

Spoof them to hide C2 servers.

Now that you have acquired spoofed IPs you now use it for malware control/data theft. Route malware commands over the satellite traffic. e.g AcidRain malware

> Makes tracking very hardβ€”looks like legitimate satellite traffic.

3. BGP Hijacking (Bonus)

BGP hijacking is the illegitimate takeover of groups of IP addresses by corrupting Internet routing tables maintained using the Border Gateway Protocol.

Used by: ISPs like Rostelecom, even China Telecom.

Steps:

1. Announce fake ownership of IP blocks (e.g AWS, Google).

2. Route traffic to attacker-controlled servers.

> Example: In 2020, Russian ISPs hijacked BGP routes from Google/Amazon.

Everything in Part 2 is very very illegal.
Doing any of this in this = federal crimes. Think terrorism-level consequences (treason, espionage)

If this were GTA, you'd have 5 stars and a tank after you after you do stuff like this. So don't try to be an edgelord because law enforcement agencies are not playing around when it comes to these things. They take it all very seriously.

Conclusion:

If you just want to stay anonymous legally, stick to:

VPNs

Tor/I2P

Private trackers

VMs

Signal/ProtonMail

Privacy search engines

Don’t do anything in Part 2 unless you enjoy orange jumpsuits and windowless rooms.
Good thread . When I use this I will feel like a high t bad boy
 
  • +1
Reactions: Jason Voorhees
This thread took some time to make bevause of so much misinformation online and secrecy regarding all these methods were. In this thread I have
coverd all viable methods for regular people* and the risky, advanced techniques used by Russian and Chinese hackers like Turla. Step-by-step, with legal risks and consequences for the shady stuff. You can skip part 2 if you don't want be on CIA's watchlist. And yes I have used chatgpt to summarize, correct grammar errors, paraphrase certain parts but all the points and ideas in this thread are throught my own research.


Part 1: Anonymity Tools for Regular People.

These are legal practical steps anyone can take to protect their digital identity. Perfect for privacy-conscious folks who are not international criminals

Harden Your Operating System

Even before you use VPNs or Tor, your OS leaks data.

Options:

Use privacy-focused Linux distros like:

Tails OS (bootable, routes all traffic through Tor)



Qubes OS (compartmentalized, VM-based


Disable telemetry in Windows/Mac.

Use local accounts, not cloud-linked logins (like Microsoft or Apple ID)

Also always use Brave Browser because your Browser is the biggest privacy hole

1. Use a Reputable VPN

Use paid, audited VPNs that don’t log your data:

NordVPN: https://nordvpn.com/

ProtonVPN: https://protonvpn.com/

Steps:

Subscribe (~$3–$12/month).

Install the app.

Connect to a privacy-friendly country (e.g., Switzerland).

> Avoid free VPNs – most log your data or sell it.

2. Browse with Tor

Download from torproject.org

Steps:

Install Tor Browser.

Use for sensitive browsing (e.g., research, whistleblowing).

Never log into personal accounts on Tor.

Cons:

Slower than regular browsers.

Many sites block Tor.

Exit nodes can be monitored.

3. Explore I2P (Invisible Internet Project)

Get I2P – a decentralized network like Tor but optimized for peer-to-peer communication.

Steps:

Install Java-based I2P software


Run the I2P router in the background.Configure the I2P router

Unlike Tor, I2P encrypts all traffic end-to-end and is designed for hidden services (e.g., private file sharing, chats).

>Even slower than Tor, smaller network, complex setup. Illegal if used for illicit activities (e.g. dark pool markets).


4. Use Private Torrent Trackers

Private trackers are invite-only BitTorrent communities with strict rules to avoid tracking.

Steps:

Visit forums like r/OpenSignups.

Get invites to IPTorrents, Redacted, etc.

Use a VPN while torrenting.

Maintain a good seed ratio.

> Legal risk if downloading copyrighted content.

5. Use Virtual Machines (VMs) for Isolation

VMs like VirtualBox (https://www.virtualbox.org) create
isolated environments to browse or open risky files. Great for isolating risky activities.

Steps:

Install VirtualBox or VMware.

Set up a Linux-based VM (e.g., Ubuntu).

Use for risky browsing, suspicious files, etc.

Use snapshots to easily revert state.

6. Use Encrypted Communication Apps

Signal for calls/messages: signal.org

ProtonMail for secure email: protonmail.com

Tips:

Use a burner phone/email for setup.

Enable disappearing messages on Signal.

7. Use Privacy-Focused Search Engines

DuckDuckGo

StartPage

> No tracking or profiling.

8. Use Disposable Emails

For temporary accounts or sketchy sites, use:

Temp Mail

> Don't link these to your real identity.

9. Avoid Smart Devices

Skip Amazon Echo, Google Home, etc. If you have them right now. Toss it in the bin. I was shocked when I found it out that these devices are always listening and are keeping logs of all the conversations it is even in their privacy policies but no one cares to read them

10.DNS Privacy

DNA translates website names (like google.com) into IP addresses.
Even if you're using a VPN or Tor, your DNS queries can still leak revealing what sites you're visiting to.

>Use encrypted DNS like Cloudflare 1.1.1.1 via DNS-over-HTTPS/TLS. Tools like Pi-hole + Unbound block trackers and keep DNS traffic local. Always test for DNS leaks


11. Payment Privacy

Never use your real credit/debit card for private tools or services. Instead, use prepaid debit cards bought with cash, gift cards, or privacy coins like Monero. USAcels can generate burner cards via Privacy.com. For crypto, avoid KYC exchanges and always use a VPN or Tor

Part 2: Russian Hacker Tactics (Satellite Internet & BGP Hijacking)

These are advanced, risky methods used by Russian APTs like Turla. They're not viable for regular people due to illegality and severe consequences but I will still talk about them in detail because of how much I have read about them and spent so much time finding legit info. Doing any of this is directly going to land you on the CIA's watchlist.

1. Satellite Internet Hijacking

Used by Russian APTs to anonymize C2 servers.

Goal: Hijack unencrypted DVB-S satellite traffic to avoid detection.

Requirements:

Satellite dish ($100–$500)

DVB-S card (e.g., TBS-6922SE)

Linux system

Skygrabber software

Steps:

1. Point dish at satellite beams (e.g., over Somalia, Afghanistan).

2. Scan for unencrypted DVB-S frequencies.

3. Sniff traffic using Skygrabber.

> Goal: Find active IP addresses of satellite users.

2. IP Spoofing & C2 Command Routing

Once IPs are identified:

Spoof them to hide C2 servers.

Now that you have acquired spoofed IPs you now use it for malware control/data theft. Route malware commands over the satellite traffic. e.g AcidRain malware

> Makes tracking very hardβ€”looks like legitimate satellite traffic.

3. BGP Hijacking (Bonus)

BGP hijacking is the illegitimate takeover of groups of IP addresses by corrupting Internet routing tables maintained using the Border Gateway Protocol.

Used by: ISPs like Rostelecom, even China Telecom.

Steps:

1. Announce fake ownership of IP blocks (e.g AWS, Google).

2. Route traffic to attacker-controlled servers.

> Example: In 2020, Russian ISPs hijacked BGP routes from Google/Amazon.

Everything in Part 2 is very very illegal.
Doing any of this in this = federal crimes. Think terrorism-level consequences (treason, espionage)

If this were GTA, you'd have 5 stars and a tank after you after you do stuff like this. So don't try to be an edgelord because law enforcement agencies are not playing around when it comes to these things. They take it all very seriously.

Conclusion:

If you just want to stay anonymous legally, stick to:

VPNs

Tor/I2P

Private trackers

VMs

Signal/ProtonMail

Privacy search engines

Don’t do anything in Part 2 unless you enjoy orange jumpsuits and windowless rooms.
Damn very good guide jason. Bookmarked.
 
  • +1
Reactions: Jason Voorhees
1748284908308

This nigga….. 🀣🀣🀣🀣🀣

NordVPN and proton is not safe at all, they are the most horribly, dangerous options out there if you want privacy

You smooth talks can convince the normies but not experts like me, Ok?
 
Last edited:
Last edited:
View attachment 3773192
This nigga….. 🀣🀣🀣🀣🀣

NordVPN and proton is not safe at all, they are the most horribly, dangerous options out there if you want privacy

You smooth talks can convince the normies but not experts like me, Ok?
no VPN is bulletproof and yeah, NordVPN had a server breach back in 2018, but let’s be real:

It was one server, no user data or traffic was leaked,

And they moved to RAM-only servers after that, so nothing sticks around long enough to steal anymore.


ProtonVPN. People like to throw shade because ProtonMail had to hand over IP info once under Swiss court order. But that was ProtonMail, not the VPN. ProtonVPN still maintains a strict no-logs policy, and the services are technically and legally separate.

If you're doing something super sensitive, you should be on Tor, Tails, or your own VPN setup.
But for everyday privacy β€” NordVPN and ProtonVPN are totally fine. They’re audited, fast, and way more trustworthy than 99% of VPNs out there.

Let’s not pretend Mullvad or IVPN are magically untouchable either.
 
This thread format is horribly, i can barely read it


View attachment 3773213
Wdymm? Duckduckgo sold out years ago

This is a horribly choice too, they are better options
It's called operating under legal pressure. Duckduckgo is still safe SearXNG exists but has too many drawbacks.
 
Water but none of this matters because there's backdoors built into intel and amd cpu's by the nsa as well as into phone chips
Someone can send a radio frequency soundwave from a distance into your motherboard(even if your device is turned off) and extract/add data
If someone wanted you to be found there's nothing you can really do about it
Privacy is a meme
 
  • +1
Reactions: Jason Voorhees
Also jfl at nordvpn
 
  • +1
Reactions: Jason Voorhees
no VPN is bulletproof and yeah, NordVPN had a server breach back in 2018, but let’s be real:

It was one server, no user data or traffic was leaked,

And they moved to RAM-only servers after that, so nothing sticks around long enough to steal anymore.


ProtonVPN. People like to throw shade because ProtonMail had to hand over IP info once under Swiss court order. But that was ProtonMail, not the VPN. ProtonVPN still maintains a strict no-logs policy, and the services are technically and legally separate.

If you're doing something super sensitive, you should be on Tor, Tails, or your own VPN setup.
But for everyday privacy β€” NordVPN and ProtonVPN are totally fine. They’re audited, fast, and way more trustworthy than 99% of VPNs out there.

Let’s not pretend Mullvad or IVPN are magically untouchable either.
Also jfl at nordvpn
 
  • +1
Reactions: The Homelander
Nothing is truly encrypted, encryption is a meme

Humanity's last line of defense to privacy will be our brains but I don't doubt that in the future there will be ways to extract information from that too

Government agencies and private companies will consume every last bit of your privacy all in the name of safety and preventative measures and marketing
 
  • +1
Reactions: Jason Voorhees
Water but none of this matters because there's backdoors built into intel and amd cpu's by the nsa as well as into phone chips
Someone can send a radio frequency soundwave from a distance into your motherboard(even if your device is turned off) and extract/add data
If someone wanted you to be found there's nothing you can really do about it
Privacy is a meme
The vast majority of threats to your privacy come from preventable issues like weak passwords, phishing, data leaks, or overly permissive apps not NSA-level espionage. Just because perfect privacy is impossible doesn't mean all efforts are pointless using encryption, strong authentication, and good digital hygiene dramatically reduces your exposure. Privacy isn't about being invisible it's about making it harder to be exploited, and for most people, that’s entirely achievable
 
  • +1
Reactions: The Homelander
bookmarked
 
  • +1
Reactions: Jason Voorhees

Similar threads

Jason Voorhees
Replies
136
Views
2K
asdvek
asdvek
mcmentalonthemic
Replies
66
Views
2K
mcmentalonthemic
mcmentalonthemic
stefthetics
Replies
34
Views
5K
Brutal4Melo
Brutal4Melo
_MVP_
Replies
9
Views
920
True truecel
True truecel

Users who are viewing this thread

Back
Top