Axiom34 wrote:Hey guys,
I thought this might be the best place to ask this. Whats the best way to hide yourself online so that people who might be looking for you can't track you when your doing "stuff"? ok I guess I don't care if they know I'm online... I just don't want them to be able to track me.
I don't want to sound like a douche or anything, but...
Learn how to use the search function for the forums, seriously. It's not hard to figure out, and you can surprisingly find the answers to a lot of typical questions.
The first thing you want is a handle, (user name) of course. Make sure this handle has no ties to you whatsoever. An example is that if I was a football player, I wouldn't have things like football, running back, tight end, etc in my handle. Same goes for anything else such as birthdays or favorite numbers. Leave this stuff out, the less information they know of you, the best you will remain hidden. Another tricky solution is to pick out someone else's handle and use that, if available, for instance on here, you may be able to use the handle th3_j35t3r, and one might take an assumption that this is the real jester, making them wander off and spend wasted time on someone else.
Next up, you will want to give off false trails every once in a while for no reason. This is great for making people second guess who you actually are, and makes a doxer's job that much more harder.
You also want to keep your IP hidden while surfing the web, or using applications. There are several ways to do this, which can be done together, for the greatest security.
One way to do this is of course to get a VPN (virtual private network) something like openVPN works perfectly fine.
Next you will want to grab the tor bundle and/or tor with the vidalia panel. You can configure your browser to connect through the tor nodes through the proxy settings, which is usually 127.0.0.1:9050 and you need to specify it as a socks proxy most of the time, unless configured otherwise through something like polipo. Next, you can allow any application to be run through tor by using proxychains, and have it work through the tor port on 9050.
Another good idea is to change your mac address before doing anything as well, which can be done with the tool macchanger on some linux os such as Kali or Backtrack. You can do this by signaling your wifi down, using the command, bringing it back up, and reconnecting. i.e.
- Code: Select all
sudo ifconfig wlan0 down
sudo ifconfig wlan0 up
You would then reconnect. The -r option will give you a random mac address, to specify your own, just use -m instead of -r such as "macchanger -m 00:11:22:33:44:55:66"
Initiating attacks could be done over a VPN / VPS / Compromised Networks, just ensure that you leave no traces to the logs of these places when connecting or operating from them. Also, try and remove any existence of being there on the logs if possible. This could easily be done with some sed / awk work on the log files to only remove specific lines of the file, so that the logs remain in normal looking conditions.
Remember that when doing things from another machine the best goal in remaining hidden is to leave the machine in a state that is almost identical to how it was before you were there. So, you don't want to slow the machine down, clog up the logs, or make any other noticeable changes to the system which can be identified if possible.
I hope this helps...
but seriously bro, do you even search?