Is there anyway to become 100% Anonmyous or untrackable? : HiddenService | Torhoo darknet markets
Just a question is there anyway to become 100% untrackable?I dont think its possible though my friend asked me i mean we can be harder to track but not 100% impossible to track?antidetect or vpn or rdp i dont really think anything can make us 100% untrackable...
You will not be able to get any 100 percent security from anything but using Qubes is what we would consider to be reasonably secure if used with best security practices. This documentation is a great start. :) Read through everything here and start using Qubes.
In addition, there are systems like the Libreboot 400t that you can order with security mods
https://minifree.org/product/libreboot-t400/
https://minifree.org/product/security-mods/
This hardware has no wireless radios, no speakers, no microphone, and no ports that allow for direct memory access. If you want these enhacements you must add these to your cart for 100 euro along with the laptop which will cost 198 for the cheapest model with 4GB of RAM. I would get the 8GB model though so that you can run more virtual machines.
https://globotron.nz/collections/frontpage/products/usg-v1-0-hardware-usb-firewall
you can order this USB firewall as well to plug your USB devices in that you do not trust. These steps will get you started in the direction of having much better opsec. I would skip the VPNs altogether and just use Whonix with bridges and i2p.
i dont think we can buy any hardware regarding privacy etc though yeah i do agree i doubt we can be 100% untrackable by any means..but what u meant by hardware?
i assume what you're describing is impossible in the digital world. you can add hops and become extremely difficult to trace, but if all resources were spilled into finding you...hey ross we see you at the library!
if you wanna hide behind an insane amount of hops, dont forget vps, you can. but someone will be able to see the data, logs or not. they could theoretically go to the office of the vpn and find the information in real time. if your vps is compromised, your entry is busted. proxychain can do so much, and regular hackers and skids couldnt get to ya.
youre talking ground up identity theft, legal documents stating you are someone else (with no criminal history, fingerprints on file, preferably mugshots, etc), purchasing devices as that person, with cash, leaving no physical trace so winter with gloves and cash if youre really looking at your threat model, then pray when they discover you they give you a bail and you have enough to burn your prints off and change appearanve ancd become you again...
Tail + TOR + PGP + a total barrier between your cleanet and darknet identities (+ a trusted VPN with no log and a killing function in case of service deconnection)
You will not be able to get any 100 percent security from anything but using Qubes is what we would consider to be reasonably secure if used with best security practices. This documentation is a great start. :) Read through everything here and start using Qubes.
In addition, there are systems like the Libreboot 400t that you can order with security mods
https://minifree.org/product/libreboot-t400/
https://minifree.org/product/security-mods/
This hardware has no wireless radios, no speakers, no microphone, and no ports that allow for direct memory access. If you want these enhacements you must add these to your cart for 100 euro along with the laptop which will cost 198 for the cheapest model with 4GB of RAM. I would get the 8GB though to run more virtual machines.
https://globotron.nz/collections/frontpage/products/usg-v1-0-hardware-usb-firewall
you can order this USB firewall as well to plug your USB devices in that you do not trust. These steps will get you started in the direction of having much better opsec. I would skip the VPNs altogether and just use Whonix with bridges and i2p.
Think like a mob boss, pay other people you trust to anonymously do stuff for you. There are many russians who provide such services. Use tails on a machine with no hard drive. Buy exchange/bank accounts created with fullz or use cashout services. Use public wifi. Leave red herrings everywhere. Its not hard to be anonymous once you get the hang of it.