OP 06 April, 2022 - 04:25 PM
(This post was last modified: 06 April, 2022 - 04:48 PM by D4RK_INJ3CT. Edited 3 times in total.)
The main method
1) Find a recently leaked Yahoo log (it is better if you can crack your own private log or buy a private log not released before).
2) TURN ON YOUR VPN (VERY IMPORTANT)
3) After this you need to do a little bit of work. Log in to multiple Yahoo accounts and look for instances where the original user may have completely (or partially) abandoned their Yahoo account. Works much better if the user is over the age of 50 because they are more likely to be technologically dumb and probably do not care. Now you have a free e-mail which is not associated with you.
4) Use the Yahoo e-mail to create a new account on Twitter and verify the email (remember to keep your VPN always on). You can also look for abandoned Twitter accounts associated with these emails and reset their password. Even if the owner has not abandoned their Yahoo account completely, you can still create a new Twitter account but delete all evidence of account creation from their e-mail after verifying it, to avoid raising suspicion. But you must always connect your VPN to the original user's country to prevent getting flagged by Twitter's algorithm.
6) Now you have an anonymous and email-verified Twitter account which cannot be tied to you.
Benefit of this method
1) If you create Twitter account with throwaway email, Twitter will at some point flag you for suspicious activity and ask you for further verification such as phone verification. By creating Twitter with an existing abandoned e-mail which was created by someone else, you have successfully managed to stay anonymous.
2) To prevent getting flagged for suspicious activity, try to use a paid VPN service like ExpressVPN or NordVPN, and always connect VPN to the e-mail owner's country of residence.
3) Twitter keeps flagging Tor browsers for suspicious activity. Using this method, you can use any normal browser and still remain anonymous. Twitter will not flag you unless you break any of their terms of services or rules.
Precautions
1) Never use this anonymous social media account to connect with real life contacts or else you will risk giving away your identity.
2) You can also give away your identity through your social media usage habits such as search history, following, interactions, and a lot more. Although you will still be anonymous but your location can be guessed. So use with caution.
3) If the user has not abandoned their Yahoo account and finds out that someone logged into their e-mail, you can possibly lose access to your Twitter account. So this method is only good for some short-term purposes.
DISCLAIMER: This is for educational purposes or for the purposes of maintaining your anon. I don't encourage anybody to misuse such methods to bully or harass other people online. Just being anonymous does not give you the right to be a d!ck to someone!
1) Find a recently leaked Yahoo log (it is better if you can crack your own private log or buy a private log not released before).
2) TURN ON YOUR VPN (VERY IMPORTANT)
3) After this you need to do a little bit of work. Log in to multiple Yahoo accounts and look for instances where the original user may have completely (or partially) abandoned their Yahoo account. Works much better if the user is over the age of 50 because they are more likely to be technologically dumb and probably do not care. Now you have a free e-mail which is not associated with you.
4) Use the Yahoo e-mail to create a new account on Twitter and verify the email (remember to keep your VPN always on). You can also look for abandoned Twitter accounts associated with these emails and reset their password. Even if the owner has not abandoned their Yahoo account completely, you can still create a new Twitter account but delete all evidence of account creation from their e-mail after verifying it, to avoid raising suspicion. But you must always connect your VPN to the original user's country to prevent getting flagged by Twitter's algorithm.
6) Now you have an anonymous and email-verified Twitter account which cannot be tied to you.
Benefit of this method
1) If you create Twitter account with throwaway email, Twitter will at some point flag you for suspicious activity and ask you for further verification such as phone verification. By creating Twitter with an existing abandoned e-mail which was created by someone else, you have successfully managed to stay anonymous.
2) To prevent getting flagged for suspicious activity, try to use a paid VPN service like ExpressVPN or NordVPN, and always connect VPN to the e-mail owner's country of residence.
3) Twitter keeps flagging Tor browsers for suspicious activity. Using this method, you can use any normal browser and still remain anonymous. Twitter will not flag you unless you break any of their terms of services or rules.
Precautions
1) Never use this anonymous social media account to connect with real life contacts or else you will risk giving away your identity.
2) You can also give away your identity through your social media usage habits such as search history, following, interactions, and a lot more. Although you will still be anonymous but your location can be guessed. So use with caution.
3) If the user has not abandoned their Yahoo account and finds out that someone logged into their e-mail, you can possibly lose access to your Twitter account. So this method is only good for some short-term purposes.
DISCLAIMER: This is for educational purposes or for the purposes of maintaining your anon. I don't encourage anybody to misuse such methods to bully or harass other people online. Just being anonymous does not give you the right to be a d!ck to someone!