How do I stay hidden while phishing? Is a VPN based in China enough?

How do I stay hidden while phishing? Is a VPN based in China enough?

Attached: gmailchinabig.jpg (620x320, 78K)

What makes you think a VPN in china is safe

fuck off pajeet

*laughs in Chinese*

Maybe don’t phish others, you turd

A VPN based in a different country like China would prove to be more difficult to carry out a subpoena, unlike how a VPN based in France in which subpoenas would be respected.

Where's the fun in that?

depends.
A commercial VPN will most likely log your IP and everything you do.
If you buy your own VPS in china, you'd need a Chinese phone number and to verify ID n' shit.

Just use Tor you faggot

Just get a Russian VPN. Nobody speaks English there and they are butthurt as fuck at any accusation of hacking, so any request from the foreign authorities would just get dusted in the bin.

>A commercial VPN will most likely log your IP and everything you do.
wrong, you clueless fucking faggot. there are plenty of VPNs that DON'T LOG ANYTHING. it defeats the fucking purpose of running a VPN service.
>A VPN based in a different country like China would prove to be more difficult to carry out a subpoena
you're unbelievable retarded. this is extreme retard logic.

Yeah if I were going to do this I'd connect to TOR through a hacked machine on public wifi. Nothing is safe but the more effort they have to make to bust your ass the less economically feasible for them it is. Just think long and hard about who your targets are first. If you're phishing politicians and doing some shit like swatting it's a different story. Just like shooting a cop is totally different than shooting a prostitute.

> Just get a Russian VPN
your IQ is lower than OP's.

>VPN in China

Attached: 1492486240536.png (680x680, 413K)

>there are plenty of VPNs that DON'T LOG ANYTHING
You can't prove or disprove that, faggot.

Why is it retarded? Will China actually let the U.S subpoena their companies, let alone force their companies to comply?

I know there are some, but most fucking do, especially lesser known/based in China.

Most normal people use a VPN for watching their weird porn because they are too scared of their ISP knowing and or for maybe watching movies, but nothing directly illegal...

If you want to go phishing, use tor or I2P
no one said you had to use a public wifi or anything. Using tails or Whonix will do just fine in most cases....

Enjoy PRISM up your ass, retard.

It's easy to do it from long distances so when I'm having fun on the internet it's something I like to have in the toolkit. Because I can, not because I absolutely have to. I also spoof my connection so it looks like one of the other clients I've seen on the network before. Again, because I can.

If you're going to use VPNs use stolen accounts. Figure out how to get them yourself (if you're going phishing you probably can figure it out) or you can purchase them very cheaply with a "warranty." One of the biggest worries you should have is the fact that simply purchasing the VPN account can be traced back to you. Just because they don't keep logs doesn't mean there aren't logs someplace else. Ever hear of parallel construction? Keeping as much distance as possible between your identity and the money used to finance your crimes is key.

you're a fucking retard lmao

>Because I can, not because I absolutely have to
1337

>also spoof my connection so it looks like one of the other clients I've seen on the network before. Again, because I can.
spoofing what? MAC address? User-agent? Geo-location? Canvas?
By default, this will all be spoofed just using Tor (regarding remote connections), and for the local network, MAC address spoof will be done in Tails and Whonix.

Stop being a windows skid

Attached: 1546081173705.jpg (399x582, 29K)

I'm not using Windows. I don't really care about any e-peen bullshit either. The point isn't to show off how much of a haxx0r I am on Jow Forums. If it was I would be bragging about some entirely different things. The point is not getting my fucking house raided.

Then why use a fucking commercial VPN?
Tor is literally a VPN (well proxy), that's 1000 times more secure than ANY of your shitty commercial ones..
Go look up the technicals behind tor.... It's more secure and anonymous... Why would you EVER use a commercial VPN for anything other than watching your weird porn? Ya dumb fuck

Attached: tor.png (317x159, 7K)

When you're using TOR it's detected as TOR. VPNs have similar problems but not as bad as TOR. Using TOR+something else that doesn't give you a fucking TOR ip is preferable. Most of the time I would use a residential IP that doesn't have an obvious open proxy running on it.

Curiously enough in many languages a laugh is still pronounced as hahaha haha, Chinese being one of them

the fuck are you on about.
The written way you "laugh" in chinese is "hhhhhhh" not "hahahaha"

kys fag

Attached: 00219705.0001.png (180x175, 34K)

That's not even a thought until the feds are knocking on my door.

The only safe VPN is a VPN hosted in Panama that doesn't keep records of anything.

What kind of phishing would you want to do?
Why does it matter if the IP is tagged as a Tor IP?
If you're doing casual email phishing then wtf is the problem? They won't ever know your IP.
if you're doing hosting you should get a VPS bought with XMR anyway

Tor is blocked by most services because it turns out the webservices actually wants to identify you because you are their product to sell advertisers.

depends on the service you dumb fuck.
99% of services AREN'T blocked by Tor...
The only main problem is ReCaptcha might take a little longer to solve

>Why does it matter if the IP is tagged as a Tor IP?
The end result of any successful phishing campaign is logging into people's accounts right? What's it going to look like when you're doing that with a hostname of torserv1.freedumbkomputerklub.de? Also do you want the guy running the exit node to have any clue what you're up to? Doesn't matter if he doesn't know who you are and what your IP is, could still be some honeypot type shit going on and it could spoil your operation.
>If you're doing casual email phishing then wtf is the problem? They won't ever know your IP.
Again they'll still see what IP you're logging into things with. Even for simple non illegal things that can get you flagged, have you encounter blocks on sites you need to access, and lots of other annoying things. It helps not to be a sore thumb when you're doing obviously suspicious shit. You can take it further than just some random residential IP too but that's not the point of this post.

Depends on the phishing you dumb fuck
If you just want CC then you don't need to login......

Define exactly what kind of phisinh you plan to do

Most of the services are anyway behind cloudflare which captcha can't be passed behind tor and even if you manage that there is captcha in service itself. Great experience would not recomend

I'm not OP so I'm not looking to phish anyone. I'm just saying what I would do in any hypothetical situations and what I learned from experience. Trying to log into some guy's Netflix account is totally different than breaking into his gmail. How much effort depends on what it is but it's good to at least have a bare minimum of effort. Sloppy work gets sloppy results.

why phish a netflix account when you can just make a bruteforcer to try a combo list?

The phished account has a better chance of lasting long term. I only used Netflix as an example because their security is dogshit. Much like the quality of the video itself.