In a hypothetical , /g/ - what combination of
1) Browser(s)
2) VPN/(s) & or Onion Router + what config, or VPN protocol in general, what kind of VPN source sas well (vpngate.net?)
3) Addons to the browser(s) for security such as disabling canvas, hiding your font count, screen size, .. anything visible a tleast on www.browserleaks.com
4)a Would you disable ipv6 altogether including tunneling or something similar so that your outgoing ipv6 didn't show up anywhere by mistake or would oyu prefer to leave ipv6 fully functional and actually get the VPN's ipv6 assuming the VPN has one.. (assuming it's TOR rather than a VPN and not both)
b. Would you spoof your MAC address and how? linux with macchanger -br <dev> or TMAC?
5) Importantly - What would you do for access point connection? Use a nearby or even remote ISP public hotspot like xfinitywifi ones wihch give out free 1 hour trials per MAC per day? Or perhaps just work on hacking into a neighbor's wifi.. go aorund looking for open ones that aren't honeypots of some kind.
Lastly is there any system info you'd spoof like CPUID and such, and how would you do it? Stuff other than what I've mentioned...
IF
You were going to make a bomb threat for lulz to some government or other institution to shut them down. Seriously, I'm not planning anyhting like this, but I'm curious .. having a crminal 'mind' I guess, how it could THEORETICALLY be executed as to not be traced by even the FBI...
Thanks.
Phone booth
1. Self-compiled Firefox or TOR Browser with security patches and deleted bloatware.
2. Your own VPN-running system on encrypted drive on a good VPS in non-NATO country. TOR exit node-proxying.
3. uBlock for normieblocking, Noscript or uMatrix for advanced. Firefox about:config, user.js fixes. Browser kill switch + ramdisk for evercookies.
4. a) You may disable it if you don't need it.
b) Spoof or reflash the wifi module firmware
5. DNS-tunnelling + compression proxy to bypass non-free javascript running captive portals.
6) You can reflash BIOS to change some hardware IDs.
7) Run your Internet-connected programs in a virtualized container for extra security, block all other ingoing or outgoing connections in iptables.
8) Yoa re already on a watchlist.
>>55990104
Sounds pretty sensible, in a criminal way of course ;)
Thanks, anon. OP here, btw. And so are you!
Nah probably not.. I'm pone of those maniacs who literally emails the NSA and FBI on a regular basis. The serial killer type who like to ham gout with cops to pretend they can empathize with that father figure type.
But, as I always say:
give peace a rest.
I'll have to look into a lot of wha you posted as it was a bit over my head. just learned a bit about chimney offloading as it was slowing my laptop to a crawl.