Newfag here. What do I need to use to be as safe, anonymous, and secure on the internet?

Newfag here. What do I need to use to be as safe, anonymous, and secure on the internet?

Attached: Hair2.jpg (564x564, 42K)

Other urls found in this thread:

privacytools.io/
twitter.com/SFWRedditGifs

Install Gentoo.

A wizard

Attached: 1565574075093.jpg (570x856, 66K)

click the Off button on your router

A failed connection.

What else? VPN? Email service? Totally serious here, not trolling.

I meant to say "as safe anonymous, and secure as possible on the internet"

no, newfag (((not glownigger)))
just install gentoo and you will know why it is all you need

Fair enough. That gets me started anyway, after I research it.. Thanks for the lead. And no, not (((glowie))).

If you want to go full autism, only use tour browser. Never enable JavaScript. Never change the size of the browser window. Avoid creating accounts. Never use the same name or password. If you must have JavaScript for web, only use iridium browser or brave. Never ever use discord. Only xmpp or irc. Don't use gmail, outlook, yahoo, etc. Only use private mail services like cock.li. NEVER use windows. Avoid Mac. These two report lots of info about your system and activities. Only use GNU/Linux or *BSD systems.

Shit meant tor browser

Sure, I knew Java is terrible. But use Tor? I've heard the Russkies have compromised the Tor network. If they have, then (((they))) have. Are there any other alternatives?

> safe
Basement.
> anonymous
Mask, beard and fedora.
> secure
Stay on Jow Forums and you'll find out.

More seriously, this is really not easy. Vpn and fingerprinting resistant browser are not easy, tor is not easy, and so on. Sandboxed browsers on updated Linux will prevent pretty much any ransomware / virus etc. attack ever seen in the wild, though.

Ok. I will stick around. Which Gentoo stage should I use? And what about Kali, is that not a thing any more?

Tor is not compromised, by anyone. The whole idea is you can send a message to someone and, if the message is intercepted, nobody can tell who sent it or who was supposed to receive it. Intercepting should be pretty practically impossible, as well.

Until a real vulnerability or credible instance of an unexplained hack happens, and this has never happened to Tor, then claiming it is compromised is a meme.

There have been instances of people on Tor sending child porn around and they got shut down, however there is no evidence Tor was compromised. We're talking a couple hundred pedophiles trying to freely exchange files to each other, there's any number of other attack vectors that can explain this. It's much more likely someone got caught with kiddy porn for other reasons and the FBI found out about their network, then just sent viruses.

Ok. I'm looking forward to learning more about this.

Don't forget to delete your system32 folder before installing Gentoo.

And thanks for the advice Guise. I appreciate it.

Why? Doesn't the install format the drive?

JavaScript isn't just terrible. Its used to deanonymize users and is extremely effective at doing so. Basically there is no point to incognito mode anymore.
>I've heard the Russkies have compromised the Tor network
They haven't. The issue is much more complicated. Basically the best that exists is a timing vector. "Hey when this person is on tor this user always posts"

I stopped using Java a few years ago, as well as Flash.

Yeah user is just fucking with you. If you stay, you'll need to learn enough to sift out the noise.

Thought so.

Java is is not JavaScript. They may have a similar name but they are night and day. JavaScript is the programming language the web uses and has used for a long time now. Flash has fallen out of style because JavaScript is good enough now. JavaScript is responsible for why webpages are interactive. Needless to say don't enable Java or Flash either.

Right ok. I need to get more familiar with programming languages as well.

Java allows applets to be embedded into a webpage. JavaScript on the other hand actually manipulates the webpage itself. The two languages are very different. They share a similar name only for marketing reasons.

They're both from Oracle though, right?

God I wish I could grow a beard like that. :(

Attached: 1519874125467.gif (400x220, 2.78M)

No, JavaScript was invented by Netscape. They called it JavaScript so people would think dynamic content but without the Java. And by dynamic, I mean even just a square moving across the screen. Nowadays, you could do that in CSS.

Wow, Netscape. That's a name I haven't heard in a long time. I bought a copy of that once.

Intel processors made since 2006 all have vulnerabilities that can be attacked by a class of viruses called Meltdown viruses. CPUs have a little bit of internal memory they use for saving some data, instructions, etc. What Meltdown viruses do is they will make the Intel CPU urp up whatever is in memory, which can be anything you've recently done, including typed in a password.

These viruses can be delivered by Javascript. So this means someone can make a malicious website, you visit it, your CPU gives the hacker everything in its memory, and you don't even know it happened. He then parses it for sensitive information. There is no real defense against this because the vulnerability is in the CPU itself, though you can download mitigations that MIGHT protect you.

So you use stuff like noscript, because Javascript is the most likely means a hacker would attack an Intel CPU.

Yeah JavaScript is old. Going to bed now.

So I should also not use an Intel CPU?

Probably not. FYI if you are using an Intel CPU, you are more vulnerable if you have hyperthreading enabled. If you have an Intel CPU with hyperthreading, and your computer's bios can turn that off, it might be a good idea to turn that off. It'll make your computer slower if you do this.

Well shit. Both my gaming machine and my laptop have Intel procs. I intend to put Gentoo on the laptop, but I don't want to turn Hyperthreading off on my gamer. So I guess a new build is on the horizon, with an AMD.

>I intend to put Gentoo on the laptop

Attached: 1228376120165.jpg (600x450, 46K)

Muh baybay.

Old friend here just use a cheap wifi condom on your wifi cable.

>IRC Is secure

Attached: a5f.png (655x653, 297K)

Never use Intel and avoid amd.

Always use ARM.

Attached: cassette3.gif (475x500, 617K)

nothing, even the most well protected agencies get hacked from time to time, you don't have better security tools than they do, as better tools don't exist

privacytools.io/

1.) custom minimalist linux distro (alpine,arch,void,gentoo)
2.) FULL DISC ENCRYPTION
3.) dont use wifi
4.) set up YaCy search engine
5.) stop using clarnet directly
6.) Tor, I2P, IPFS, Freenet, GNUnet, UseNet, ZeroNet

Based site.

Mobile phone with the SIM card which you've bought on a street.

Encrypt your messages.
Use a malware tool.
Set up a hardware firewall.
Filter ads and malicious websites.
Apppy WPA2 protection.
Set up a VPN.
Use internet cafes and liveboot Linux for anonymous posting.
Avoid posting personal information or reply to attempts of personal communication.
Remote-access other peoples devices and use their desktop.
Pick up an identity from a dead person.
Restrict your ports and protocols.
Move to a place where the local law enforcement has better things to do than fighting hackers.

But most importantly, do safe stuff on the internet that everyone does, blend in with the crowd.

Don't pay your electricity bill's

Wrong.

Avoid VPNs like the plauge. Make Tor your default DNS resolution service and connect via a bridge relay.

VPNs are just datamines for the glow niggers.

The only VPN worth a damn is riseup.net

Attached: tenor.gif (300x164, 410K)

>VPNs are just datamines for the glow niggers.
proof?
oh right just bs
not once has anyone been busted solely for using a vpn

LMAOOO IMAGINE BELIEVING THIS.

READ UP NEWFAG: Ghostry went down specifically for this.

Why would you ever trust a random person you don't know with ALL of your information? They're lying to you retard.

Holy fuck Jow Forums/g/ is filled with tards.

Attached: d5sn9fy-c87f2155-b27b-4c30-ba4f-ee82178af495(2).jpg (1024x768, 127K)

Why? He looks like a fucking try-hard goofball. If he lost the beard, he'd clearly be a certified chad

>newfag
Stopped reading right there.

Attached: 1544980774770.jpg (768x1024, 234K)

>VPNs are just datamines for the glow niggers.

You can set up a custom VPN, no need for third party vendors.

>safe
Don't use the internet.

>anonymous
Don't use the internet.

>secure
Don't use the internet.

No joke.

remove hipster beard would be the first thing of security, newfag.

How do you set up one to access the internet? I know how to set one up so that if you are in a remote location away from your home you can connect to your home PC via your own VPN. That's easy at least. When you set up an outgoing VPN there's always an end point somewhere with your name on it. You'd need to have your own ISP too.

he looks like a pretentious dwarf that hasn't had a pussy since highschool where he decided to be gay.

pour milk on your router, helps a lot and works every time.

that's right, user! you're on the good track!

Attached: 20170703_153204.jpg (1228x1361, 915K)

why, what do you have to hide op?

Correlation attacks are avoidable too. It all depends how much effort you put into it. Dont use Tor on your main pc /network. Dont use same nicknames/personas. Dont use Tor to do your regular browsing shit just what you want to stay hidden. Get a laptop, run tails+ tor on it and roam around connecting to random wifis or open hotspots.

>java = javascript
and you're here talking about privacy and security?
even if they did monitor exit nodes they would still have a hard time tracking the people themselves down, but I doubt they do monitor exit nodes. Also, if you visit a site with https your traffic is encrypted from the exit node to the site's servers making monitoring exit nodes useless. And if you visit an onion site, you never actually leave the tor network and never go through a tor exit node and therefore your traffic is encrypted from the very start of the circuit (your PC) to the very end until it reaches the server.

>That's easy at least.

That's what I meant. But when ordering a VPN service, you basically do the same afaic.

>You'd need to have your own ISP too.

Agree. However, you can setup in a remote area and if your VPN gets taken down, doesn't mean you get taken down.

Making your own ISP in my area is cost prohibitive. Lowest price is just over $10k to start up and $1k per month for the cheapest connection. I have my own wifi intranet that's a couple miles wide at least. The problem is that there's always another ISP you have to purchase access from. They are like tiers of ISPs. Like your normal ISP buys their connection from a higher tier ISP. Though, it depends on many factors. You can't really become a tier one single home ISP for yourself. That's because someone else always owns the lines in your area. An intranet is the best you can hope for and making that wifi is the cheapest you can do.

Attached: 1000px-Internet_Connectivity_Distribution_&_Core.svg.png (1000x583, 138K)

>However, you can setup in a remote area and if your VPN gets taken down, doesn't mean you get taken down.
That doesn't make sense, because that would be your hardware that the VPN runs on. You'd still need cloud services to make a remote one. Which then becomes the problem point.

Anything some agency might consider criminal material - political literature, economical redpills, conversations about breaking the law, historical data that compromises someone, instructions how to perform civil resistance or terrorist uprising, child porn, weapon lists.

Not that I am in favor of any of this - but consider the following: your competitor has created an elaborate plan to shut you down by compromising your network and, ie, putting offensive content of the above list on your system and contacting local law enforcement to set you up.

Would your "nothing to hide" argument still make sense in this scenario? Basic security would protect and alibi you, naive trust and no privacy concerns would make you vulnerable for easy infiltration.

>That doesn't make sense, because that would be your hardware that the VPN runs on.

But you don't sit in front of it, and your name doesn't appear as a user of some common VPN company.

We are talking about YOU making your own VPN. Not using someone else's VPN. No only that, but the method you state isn't even """secure & safe""" either. There is no legal way to get online and have 100% anonymity and safety. Do you know anything about this shit?

Identify theft is a major problem today. It is one of the #1 cyber crimes in the modern age. More companies that have your information or access to your information means more chances identity theft will happen to you. Identity theft can ruin your life and has ruined many lives already.