IT TRULY IS THE WILD WEST. WHILE THERE ARE MILLIONS OF VALUABLE , REPUTABLE VENDORS AND WEBMASTERS, THERE TOO ARE LOTS OF SCAMS. I WANT TO STEER YOU CLEAR OF SCAMS , FRAUDS , AND LOSS OF SENSITIVE PERSONAL INF0RMATION. BITCOIN INFORMATION
Dangerous Google - Incredible potential for revealing secrets. How is this possible? How is it accomplished?
Sensitive personal information that should be encrypted, is often publicly available because of ignorance or flat out carelessness. So a lot of confidential data is freely accessible online. Although there is an obvious potential to use this information maliciously, I would encourage you to use these strategies and tricks to research your own footprint (paper trails, auto-fill, sensitive personal information).
So, what will you learn?
how to use Google to find sources of personal information and other confidential data
how to find vulnerable systems and services
how to access publicly available devices
Background Basics
A few things to do first!
Read my post on basic HTTP operations and parameters. (coming today!)
Learn tricks for using your web browser (coming soon!)
Download (safe https) for free and read the PDF below - "Dangerous Google - Incredible potential for revealing secrets. How is this possible? How is it accomplished?"
EVERY SECOND MEDIA NETWORKS , AND INTERNET DEVICES OFF ALL TYPES ARE BEING OVERWHELMED WITH CASES OF WHISTLE BLOWERS, SPIES, CELL PHONE HACKING , AND SO MUCH MORE. TO TOP IT OFF, THE U.S. GOVERNMENT IS USING THE PRISM PROGRAM, A MASSIVE EXPANSION OF THREADLINE TO SPY ON EVERYBODY AND NO IT'S NOT JUST META DATA THAT THEY ARE STEALING FROM YOU.
BECAUSE OF ALL THIS INDIVIDUALS AND CORPORATIONS ALIKE ARE PUTTING MORE EMPHASIS ON PRIVACY. WE WANT TO AVOID BEING TRACKED , FOLLOWED AND SPIED ON DURING ONLINE ACTIVITIES.
BEFORE YOU READ MORE, PUT A SMALL PIECE OF ELECTRICAL TAPE OVER YOUR BUILT-IN CAMERA. HACKERS CAN REMOTELY ACTIVATE YOUR WEBCAM AND OTHER FUNCTIONS ON YOUR DEVICES. THERE ARE TECHNIQUES THESE PEOPLE USE TO AVOID DETECTION. THERE ARE MANY WAYS TO PROTECT YOURSELF FROM THE PROWLING EYES OF BIG BROTHER AND OTHERS WHO PROFIT BY FOLLOWING YOUR EVERY CYBER ACTION.
STAY TUNED TUNED FOR THE NITTY GRITTY
Use a burner laptop and cell phone.
A ‘burner’ laptop or cellphone is a normal device. You can purchase a ‘burner’ like you normally would purchase a computer or cell phone. Choose whichever is in your price range, but the cheaper the better. For a ‘burner’ cell phone, choose a pre-paid version and pay only in cash. The ‘burner laptop’ is the only laptop you will ever use to connect to the internet. That includes streaming YouTube, Hulu, Netflix, or social networking sites. All internet access should go through this laptop, if you are intent on avoiding being tracked online. You can keep a computer for personal documents, diary entries, numbers, spread sheets or other personal files. Never save anything to the burner laptop. Once a month re-install the operating system you’ve chosen, and completely re-format the drive.
So, what next?
With or without a burner there are still some additional necessities.
use sock 5 IP address proxy
get Bitcoins (so u can buy stuff anonymously)
use Antidetect browser with Spoof-it Anti-Canvasing
uninstall and disable all Flash, Cookies, and Java
clear cookies and history after every single session
WHERE ARE BITCOIN? HOW TO GET THEM QUICK USING A CREDIT CARD or Bank Account.
HELLO,
AT SOME POINT EARLY IN YOUR DEEP NET JOURNEY YOU WILL DEFINITELY NEED BITCOINS. THEY ALSO MAKE A GREAT INVESTMENT. WHILE IDEALLY THEY SHOULD BE EASY TO OBTAIN, THE ANONYMOUS NATURE OF BITCOINS MAKES THEM A FOCAL POINT FOR SCAMMERS. SO LISTEN UP, AND YOU CAN HAVE BITCOINS WHILST AVOIDING COMMON PITFALLS.
FIRST GET A BITCOIN WALLET AT BLOCKCHAIN.INFO. SAVE ALL THE INFO THEY GIVE YOU AND YOU GIVE THEM.
THERE ARE TONS OF WAYS OF GETTING BITCOINS. MOST OF THESE HOWEVER, REQUIRE ID SCANS, PROOF OF ADDRESS, A BANK ACCOUNT AND SO FORTH.
Coinbase has simplified and streamlined the process!
Alphabay and Hansa dark markets have been seized By the DEA. The Feds are Sitting on Dream Market already. Valhalla Market has much more impenetrable security and is very safe and reliable.Valhalla invite URL: Copy Link into Tor Onion Network.
SO YOU NEED A WAY TO BUY BITCOINS USING A CREDIT CARD. A PRE-PAID, WITH CASH, VISA CARD IS IDEAL. SO GO GET CASH AND PUT IT ON A PRE-PAY, RELOADABLE VISA CARD.
WHO WILL SELL BITCOINS TO A CREDIT CARD? MANY COMPANIES AVOID THIS BECAUSE OF MERCHANT CHARGE BACK POTENTIAL (i.e. fraud). Coinbase is the place to go. It's tried and trusted for years!