TLDR: Nothing is safe, for complete privacy, move inna woods and live like a caveman
TLDR2: If you're not a glowie, currently the most private setup is to have a 2nd hand laptop, running non-persistent Tails on starbucks wifi. Never use your home internet, real name, don't reuse usernames or passwords. Memorise as much as possible, don't write shit down anywhere.
Ok, so for most of us that isn't possible. However I do see a lot of posts on this forum that are, unfortunately, wrong, or at least unintentionally misleading, so I want to try clear things up a bit.
Specifically, questions like "best VPN", "best cloud storage" etc. seem to come from people who are quite new to online privacy, and tend to come from the wrong mindset. Namely, that any data you store on networked hardware, or anything 'cloud', then you must assume that it has been harvested by LE and will be available for them to review at any point in the future. The old adage of "there is no cloud, it's just someone elses computer" applies here.
Are you a fat pedo with 100TB of CP? Are you a darknet heroin seller? Are you a journalist in China? Are you a (god forbid) free-thinking citizen who does not 100% agree with the current narratives?
This matters, and does dictate the level of opsec you need to implement.
IF YOU ONLY CLICK ONE LINK, MAKE IT THIS ONE This is quite a comprehensive guide, which covers most privacy basics -
KICK JACK & ZUCK OUT OF YOUR LIFE FOR GOOD List of alternatives to big tech platform, fediverse etc
If you have more time, understand that cybersec is always evolving faster than any individual can keep up with. Get to know the history of the field, the motivations of LE which make our lives oh so wonderful, and learn how to mitigate against them.
These are good places to start:
I'M NOT A CRIMINAL THOUGH neither were Charlie Chaplin, Princess Di or John Lennon... but they're on this list:
INCENSER, aka intercepting traffic from the backbone of the internet
DARKWEB Safer - never use JS, never maximize the Tor window, assume that one day you'll be caught anyway. Not going to hold your hand here but d/Opsec and d/DNMbusts are good places to start (d/DNMbusts seems to be down currently)
Start here, you're on your own from there on -
or its dn address:
Even then, you're not safe, know that a lot of universities, LE and other people that don't know how to have fun spend a lot of time trying to 'disrupt' the dark web.
Pastebin link discussing how people are deanon'd on the DN:
and how this was done:
Using AI to track people in TOR:
Shit can, and will, come around to bite you in the ass. Here's a guy that got sentenced in 2021 for doing something in 2011:
Understand the importance of FUD and the emotional techniques behind it - you can only defend yourself against it if you know what it is and how it works.
FREE SOFTWARE Only use open source software you can audit yourself. If you absolutely need to open a binary, scan it with something like Malwarebytes, open it in a VM, run it through Ghidra, thanks to the boys at the NSA
That's all I have for now. Please let me know if I got anything wrong, feel free to share this. (If you really want to know, I think Mullvad is the best VPN). Also happy to answer any questions, but just know that I'm no cybersec professional, just a retard with a keyboard
And remember - you just run them over
The reason is because I don't want any of the smart phone manufacturers or associated software companies logging where I am and where I look up directions to, or what speed I'm going, or any of that shit.
At first I mounted it on the left of the driver's seat on the windshield but that blocked my view for turning left, so moved it to the middle of the windshield into a "notch" in my dash that's a little lower than the rest, so it connects to the windshield but doesn't really obscure my vision of much. I might have to watch a LITTLE more closely when changing lanes to the right, maybe keep an eye out for motorcycles a little more carefully.
The sound is fine, I can adjust it independent of what's going on with my mp3 player (yes, a separate and standalone mp3 player) for books on tape and podcasts, and now I'm not being tracked by my GPS and I'm not sending information on what I'm listening to straight to the FBI.
The screen is significantly bigger than my iphone7s, which is nice. Data is quick and easy. Up to date information on traffic and weather, update "forever" whatever that means.
On 28 December 2014, Der Spiegel published slides from an internal NSA presentation dating to June 2012 in which the NSA deemed Tails on its own as a "major threat" to its mission, and when used in conjunction with other privacy tools such as OTR, Cspace, RedPhone, and TrueCrypt was ranked as "catastrophic," leading to a "near-total loss/lack of insight to target communications, presence..."
Install Tails OS:
Chat XMPP OTR over Tor Pidgin in Tails:
The default IRC accounts no longer there so don't have to remove them.
I feel good knowing they can't be tracked with that ultrasound thing that's going around now. I can't believe how far they've gone in surveilling us.
I never would have agreed to any of this shit had I known in the beginning. I'd still have my stereo in stereo, and read books under a kick ass halogen lamp and been happy as fuck.
Now I have to take my dang TV apart to see if it's watching my children.
Firefox has an exploit where it leaks DNS requests. This is critical if you don't use a system-wide VPN which is the case in many configurations.
Normal DNS tests don't pick this up, but Astril VPN's website has a test that does, and Firefox and Waterfox fail.
Combined with the fact that Mozilla is looking pretty compromised these days, it seems the best browsers are based on degoogled builds of Chromium, which is sad. What are your conclusions regarding the most private browsers?
Asking for a fren...
Do any of you have a recommendation for a wifi extender? I need it for an external building that needs internet but have read about some terrible privacy policies that send your data to a third party.
I'm doing my own research, but would be grateful if anyone had advice.
Buy a burner phone at WalMart and use Tracfone or AT&T or whatever reseller that has cards hanging on the display. $35 a month for a certain amount of wifi hotspot data.
Buy a small inexpensive and totally disposable laptop, the Hyundai 8gb laptop is plenty. Install Linux Tails on an SD card and run this version while you're on your hotspot, it's super secure and hard to find a way to trace it back to you.
Without turning the laptop on, open the display frame and physically disconnect the camera and microphone. Leave everything in place and button the frame back up.
Now you're on a laptop that's not associated with your house or your office or anything that's in either place, on wifi that's paid for with "cash" and can't be tracked back to you. It's not private, but it's not connected to YOU and that makes it anonymous. No sneaky cameras or microphones, no thing to turn on and watch you remotely. Who cares if anyone follows what your anonymous setup does?
Very important is to disable or turn off all bluetooth and wifi from your car, even from your car stereo, so your laptop won't pick up a bluetooth signal from your car. Once your car knows your laptop your cover is blown, you have to sell your car and your laptop to get private again.
The phones are $40 and you can let the service run out on one carrier and then activate with another. Go back and forth a few times then throw it in the garbage and get a new phone and a new plan. Nobody's all that interested in you anyway, this is just a way to throw the trail off.
People on this site keep posting links to this site but it keeps telling me refused to connect. I don't wanna risk turning my VPN off. Is it only accessible by like TOR or something? I'm using the brave browser.
Look at the drama with DDG, and there's already been some liberal messaging surfacing out of the Tor team.
Eventually they'll feel the greater good is to undermine their own system to out their political opponents.