Dangerous Google - Incredible potential for revealing secrets. How is this possible? How is it accomplished?

Dangerous Google - Incredible potential for revealing secrets. How is this possible? How is it accomplished?

Sensitive personal information that should be encrypted, is often publicly available because of ignorance or flat out carelessness. So a lot of confidential data is freely accessible online. Although there is an obvious potential to use this information maliciously, I would encourage you to use these strategies and tricks to research your own footprint (paper trails, auto-fill, sensitive personal information). 

So, what will you learn?

  • how to use Google to find sources of personal information and other confidential data
  • how to find vulnerable systems and services
  • how to access publicly available devices

Background Basics

A few things to do first!


  • Read my post on basic HTTP operations and parameters. (coming today!)
  • Learn tricks for using your web browser (coming soon!)
  • Download (safe https) for free and read the PDF below - "Dangerous Google - Incredible potential for revealing secrets. How is this possible? How is it accomplished?" 

Safe secure https download below:

https://mega.nz/#!G1dk3axQ!Q4qDUVlPwAr28M1mI2GV8wTJxQhncMmz5oBuclXgK9w

WHO'S WATCHING YOU? BASICS OF ONLINE ANONYMITY - USEFUL INFORMATION HEREIN




WHO'S WATCHING YOU?


EVERY SECOND MEDIA NETWORKS , AND INTERNET DEVICES OFF ALL TYPES ARE BEING OVERWHELMED WITH CASES OF WHISTLE BLOWERS, SPIES, CELL PHONE HACKING , AND SO MUCH MORE. TO TOP IT OFF, THE U.S. GOVERNMENT IS USING THE PRISM PROGRAM, A MASSIVE EXPANSION OF THREADLINE TO SPY ON EVERYBODY AND NO IT'S NOT JUST META DATA THAT THEY ARE STEALING FROM YOU.
BECAUSE OF ALL THIS INDIVIDUALS AND CORPORATIONS ALIKE ARE PUTTING MORE EMPHASIS ON PRIVACY. WE WANT TO AVOID BEING TRACKED , FOLLOWED AND SPIED ON DURING ONLINE ACTIVITIES.
BEFORE YOU READ MORE, PUT A SMALL PIECE OF ELECTRICAL TAPE OVER YOUR BUILT-IN CAMERA. HACKERS CAN REMOTELY ACTIVATE YOUR WEBCAM AND OTHER FUNCTIONS ON YOUR DEVICES. THERE ARE TECHNIQUES THESE PEOPLE USE TO AVOID DETECTION. THERE ARE MANY WAYS TO PROTECT YOURSELF FROM THE PROWLING EYES OF BIG BROTHER AND OTHERS WHO PROFIT BY FOLLOWING YOUR EVERY CYBER ACTION.
STAY TUNED TUNED FOR THE NITTY GRITTY

Use a burner laptop and cell phone.

A ‘burner’ laptop or cellphone is a normal device. You can purchase a ‘burner’ like you normally would purchase a computer or cell phone. Choose whichever is in your price range, but the cheaper the better. For a ‘burner’ cell phone, choose a pre-paid version and pay only in cash. The ‘burner laptop’ is the only laptop you will ever use to connect to the internet. That includes streaming YouTube, Hulu, Netflix, or social networking sites. All internet access should go through this laptop, if you are intent on avoiding being tracked online. You can keep a computer for personal documents, diary entries, numbers, spread sheets or other personal files. Never save anything to the burner laptop. Once a month re-install the operating system you’ve chosen, and completely re-format the drive.

So, what next? 

With or without a burner there are still some additional necessities. 

  • use sock 5 IP address proxy
  • get Bitcoins (so u can buy stuff anonymously)
  • use Antidetect browser with Spoof-it Anti-Canvasing
  • uninstall and disable all Flash, Cookies, and Java
  • clear cookies and history after every single session
  • don't click on or answer spam
  • change your IP address in BIOS 

Bitcoins Bitcoins Bitcoins - WHERE ARE THEY? HOW TO GET THEM QUICK USING A CREDIT CARD or Bank Account.

WHERE ARE BITCOIN? HOW TO GET THEM QUICK USING A CREDIT CARD or Bank Account.

HELLO,

AT SOME POINT EARLY IN YOUR DEEP NET JOURNEY YOU WILL DEFINITELY NEED BITCOINS. THEY ALSO MAKE A GREAT INVESTMENT. WHILE IDEALLY THEY SHOULD BE EASY TO OBTAIN, THE ANONYMOUS NATURE OF BITCOINS MAKES THEM A FOCAL POINT FOR SCAMMERS. SO LISTEN UP, AND YOU CAN HAVE BITCOINS WHILST AVOIDING COMMON PITFALLS.

FIRST GET A BITCOIN WALLET AT BLOCKCHAIN.INFO. SAVE ALL THE INFO THEY GIVE YOU AND YOU GIVE THEM.

THERE ARE TONS OF WAYS OF GETTING BITCOINS. MOST OF THESE HOWEVER, REQUIRE ID SCANS, PROOF OF ADDRESS, A BANK ACCOUNT AND SO FORTH.

Coinbase has simplified and streamlined the process!


bitcoin


Alphabay and Hansa dark markets have been seized By the DEA. The Feds are Sitting on Dream Market already. Valhalla Market has much more impenetrable security and is very safe and reliable.Valhalla invite URL: Copy Link into Tor Onion Network. 



    SO YOU NEED A WAY TO BUY BITCOINS USING A CREDIT CARD. A PRE-PAID, WITH CASH, VISA CARD IS IDEAL. SO GO GET CASH AND PUT IT ON A PRE-PAY, RELOADABLE VISA CARD.


    WHO WILL SELL BITCOINS TO A CREDIT CARD? MANY COMPANIES AVOID THIS BECAUSE OF MERCHANT CHARGE BACK POTENTIAL (i.e. fraud). Coinbase is the place to go. It's tried and trusted for years!

    Coinbase Invite URL:









    ALPHABAY , DREAM MARKET, AND VALHALLA ALL TAKEN DOWN BY THE DEA



    A FEW NOTEWORTHY INVITE URL'S IN TORLAND - ALPHABAY ,  DREAM MARKET, AND VALHALLA - ALL REPUTABLE

    ALPHABAY ---- TAKEN OVER BY DEA


    DREAM MARKET -- TAKEN OVER BY DEA

    VALHALLA --- DEA

    REMEMBER YOU MUST BE IN TORLAND FOR THESE LINKS TO FUNCTION

    FOR HELP ACCESSING TORLAND WATCH VIDEO AT LINK BELOW
    https://www.youtube.com/watch?v=PiZYj5KuWZU


    Wall Street Market is the Place to be. Join the wave of freedom! Get the best of the dark web, USE WALL STREET MARKET .

    Wall Street Drug Market - Buy Drugs ONLINE

    Featured Post

    Get Free Bitcoin From Coinbase

    INVITE FRIENDS AND GET FREE BITCOIN Invite a friend who buys or sells $100 of digital currency or more, and you'll both earn $10 of f...