Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 715

4 Ways To Be Anonymous Online

by arredondo2019jose - 30 November, 2020 - 03:59 PM
This post is by a banned member (arredondo2019jose) - Unhide
22
Posts
3
Threads
4 Years of service
#1
1.
Using Proxies A proxy is an address ( IP address ) of a Server (proxy server) that is placed between your computer and the Internet The advantage of a proxy is that your real IP address is Hidden so when you hack your giving the IP address of the proxy sever and not your real IP address Same way if your a normal Internet user the hacker won't get your real IP but the IP of the proxy server.You can use it to enter site or forum that you are IP is banned. To know more about proxies les me know above this post and I will post a full tutotial about it.

2.
Using Tor Tor-proxy is a free proxy-server service that Internet users can use to hide their IP address while surfing the Web. Tor (The Onion Router) is free software for enabling online anonymity. Tor directs Internet traffic through a free, worldwide volunteer network consisting of more than three thousand relays to conceal a user's location or usage from anyone. I have written a complete How to guide on how to use tor - just let me know if you need it

3.
SSH Tunneling SSH tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used to tunnel unencrypted traffic over a network through an encrypted channel.In easy language,you can surf net without being monitored and even surf blocked sites too. To know more about SSH and SSH tunneling let me know if you would like to read: SSH tunneling guide.

4.
Using VPN Virtual Private Network. Basically it’s a private network which lets users to connect to other users or remote sites using a public network usually internet. It uses “virtual” connections routed through the Internet from the company’s private network to the remote site or employee instead of physical connections. In short, it is private network constructed within a public network infrastructure, such as the global Internet. The Biggest difference between proxy and VPN is everything in a VPN is encrypted which gives an additional layer of security.
This post is by a banned member (unbyt3x) - Unhide
unbyt3x  
Supreme
38
Posts
1
Threads
4 Years of service
#2
(This post was last modified: 30 November, 2020 - 04:29 PM by unbyt3x.)
Let me clear some things up to not give anybody false hopes here.
I'm sure a lot of people will read this with the intent of doing some nasty stuff.

1. Using proxies
While proxies redirect your traffic and spoof your IP, they'll most likely hold logs.

These logs don't necessarily need to be created by their own - every service (like OpenVPN) for example naturaly creates logs for debugging. (usually located in /var/log in linux)
Not even will these logs expose you, but you have to blindly trust the proxy service, so using any free proxies found somewhere on the internet is a no-go.

Nevertheless this is the most lightweight approach. If you have a good VPN/proxy provider that gives you access to SOCKS5 proxies, go for it.

2. Using Tor
If you're paranoid, sure. Tor routes your traffic through multiple nodes, making it harder to trace back the traffic to you.

One of the downsides here is that almost every tor node is and will get blacklisted instantly (Spamhaus doesn't tolerate tor-hosting servers) and the speed downgrade.
Total overkill in my opinion, but some services will probably force you to use Tor to connect to them.

3. SSH tunneling
Not suited for beginners or unexperienced users (they shouldn't even start scriptkidding in first place).
Some VPN providers let you tunnel the traffic through SSH for more security and stealth, but you can also use your own server to tunnel through.

A good solution, but again, this doesn't take the liability away from you. Only the traffic between you and the SSH endpoint is encrypted, not the traffic the server will establish for you.
SSH also keeps logs of logins (which you can delete though).

Suitable to bypass geo-blocked/censored content.

4. VPN providers
The good old VPN providers. There are a loooot of false promises and its not easy to find a good provider as a beginner without being overwhelmed by a shit ton of bullshit services.
You should never use a free VPN, and a VPN doesnt automatically make you anonymous, just like any other method here.

Again, this is suitable to bypass geo-blocked/censored content, but if you plan to do some fishy stuff, make sure you go with a good, non-logging VPN provider hosted in a "good" country (Switzerland for instance).

My recommendations are Perfect Privacy and Vypr.
PP (lul) also gives you a bunch of ways to connect through their proxies, including SOCKS5. Really worth the money.

With all of this being said, remember that there are other factors to track you - DNS, WebRTC leaks and canvas fingerprinting only being a few of them.
If privacy is important for you, go for Firefox and install recommended add-ons (uBlock Origin, uMatrix, Privacy Badger, ..) - and take a look at /r/privacy as well as /r/privacytoolsIO.

Personally, I like to use FoxyProxy to bypass geoblocks and stuff because of its ease of switching proxies with a few clicks.
This post is by a banned member (arredondo2019jose) - Unhide
22
Posts
3
Threads
4 Years of service
#3
(30 November, 2020 - 04:26 PM)unbyt3x Wrote: Show More
Let me clear some things up to not give anybody false hopes here.
I'm sure a lot of people will read this with the intent of doing some nasty stuff.

1. Using proxies
While proxies redirect your traffic and spoof your IP, they'll most likely hold logs.

These logs don't necessarily need to be created by their own - every service (like OpenVPN) for example naturaly creates logs for debugging. (usually located in /var/log in linux)
Not even will these logs expose you, but you have to blindly trust the proxy service, so using any free proxies found somewhere on the internet is a no-go.

Nevertheless this is the most lightweight approach. If you have a good VPN/proxy provider that gives you access to SOCKS5 proxies, go for it.

2. Using Tor
If you're paranoid, sure. Tor routes your traffic through multiple nodes, making it harder to trace back the traffic to you.

One of the downsides here is that almost every tor node is and will get blacklisted instantly (Spamhaus doesn't tolerate tor-hosting servers) and the speed downgrade.
Total overkill in my opinion, but some services will probably force you to use Tor to connect to them.

3. SSH tunneling
Not suited for beginners or unexperienced users (they shouldn't even start scriptkidding in first place).
Some VPN providers let you tunnel the traffic through SSH for more security and stealth, but you can also use your own server to tunnel through.

A good solution, but again, this doesn't take the liability away from you. Only the traffic between you and the SSH endpoint is encrypted, not the traffic the server will establish for you.
SSH also keeps logs of logins (which you can delete though).

Suitable to bypass geo-blocked/censored content.

4. VPN providers
The good old VPN providers. There are a loooot of false promises and its not easy to find a good provider as a beginner without being overwhelmed by a shit ton of bullshit services.
You should never use a free VPN, and a VPN doesnt automatically make you anonymous, just like any other method here.

Again, this is suitable to bypass geo-blocked/censored content, but if you plan to do some fishy stuff, make sure you go with a good, non-logging VPN provider hosted in a "good" country (Switzerland for instance).

My recommendations are Perfect Privacy and Vypr.
PP (lul) also gives you a bunch of ways to connect through their proxies, including SOCKS5. Really worth the money.

With all of this being said, remember that there are other factors to track you - DNS, WebRTC leaks and canvas fingerprinting only being a few of them.
If privacy is important for you, go for Firefox and install recommended add-ons (uBlock Origin, uMatrix, Privacy Badger, ..) - and take a look at /r/privacy as well as /r/privacytoolsIO.

Personally, I like to use FoxyProxy to bypass geoblocks and stuff because of its ease of switching proxies with a few clicks.

thnx for adding some extra info broo,,
i always want to learn some extra stuff ;) 

peace

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 2 Guest(s)