[ / / / / / / / / / / / / / ] [ dir / abdl / animu / fa / fur / just / mde / vichan / wmafsex ]

/baphomet/ - Raids and lulz

Moralfags out
Winner of the 68rd Attention-Hungry Games
/d/ - Home of Headswap and Detachable Girl Threads

January 2019 - 8chan Transparency Report
Email
Comment *
File
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Embed
(replaces files and can be used instead)
Options
dicesidesmodifier

Allowed file types:jpg, jpeg, gif, png, webm, mp4, pdf
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 5 per post.


No more moralfags allowed. We are now back to being the unapologetic assholes of the internet. Bring on the lulz.

File: 5c6d984f294e4cc⋯.png (1.59 MB, 1140x760, 3:2, 1.png)

 No.126153

Running htop at McDonalds

ITT:

TUTORIALS

OPSEC

TACTICS

Post last edited at

 No.126161

Wow, what a fag board owner it seems

But I guess this is better than nothing

I think this set up is the best

Your PC → VPN of choice (Mullvad or cryptostorm → Tor → box you owned → Internet

That way you can minimize any type of tracing back shit to you

You could even buy those shitty socket wifi repetitor routers and jailbreak them into small ssh machines to put in your local library to act as bridge between you and VPN just in case

Standard shit implies

>no fingertips

>no cameras (although data is deleted every 3 to 6 months)

>no name

>put sticker "no touchy touchy" on the repetitor

Whats with board owner being such a skiddy faggot tho

I genuinely like the effort but god damn, could you do anything else than jewgling the "hacker man image"? Jesus fucking christ

(USER WAS BANNED FOR BEING RETARDED)

 No.126163

Also password managers are for brainlets

Just chain few colorful imaginate creative words that won't go out of your mind and lock it in place by associating that imagery with login/username/website at hand

Let's say something like

>image of "MoistErgodicVeinyMemristor" slapping "Baltazar" while the community of electricalengineers.info.br watches over

See? Already put in your mind


 No.126166

File: 37ecf28569773f1⋯.png (396.5 KB, 499x336, 499:336, glow_in_the_dark_cia_nibbe….png)

Tor a shit.

Tor is made and funded by CIAniggers.

I2P best dark web.


 No.126173

>>126166

Just yelling about CIAniggers will get you nowhere. Saying how they do their niggin will.

Just say that they do time correlation attacks, something everyone knows about. I don't think I2P is immune to that. Not to mention that you can kinda trick time correlation attacks with random fake packets and having a good connection before Tor (Mullvad or cryptostorm in my opinion) that will not leak your info.


 No.126185

>>126166

Explain why Tor is shit.


 No.126203

>>126161

Board Owner sucks dicks. There is a better board.


 No.126274

>>126203

Invasion board? Even shittier BO is there

Wtf you talkin bout


 No.126281

>>126203

Which one?


 No.126311

File: 11f0e5a031820b3⋯.jpg (19.69 KB, 255x255, 1:1, 0ecbc16964cc7bd4c090807713….jpg)

>>126166

Nice dubs. Also stole that rare Terry. Thanks anon. And I agree. I2p best danknets. Anyone have success in setting up an i2p outproxy?


 No.126328

File: 402a703af025ce0⋯.png (129.95 KB, 944x960, 59:60, TOOLS.png)


 No.126330

File: 73fcc5baee06256⋯.gif (284.86 KB, 800x600, 4:3, Rotating Snakes.gif)


 No.126375

File: 555833477a873c6⋯.jpg (30.28 KB, 506x346, 253:173, 5858b8999430773019070c798c….jpg)

>>126328

ITS A TRAP


 No.126376

File: 8e12f11ad7c964d⋯.jpg (869.67 KB, 2765x3686, 2765:3686, atdmrnF.jpg)

Also this


 No.126377

>>126376

>calibri

>spolling mistaces

>unusual Captialisation

Why won't those darned Russians hire a damn translator?


 No.126381

File: eec48d551d6b3fa⋯.jpg (Spoiler Image, 84.17 KB, 736x1087, 736:1087, you.know.jpg)

>>126161

>wifi repetitor routers

just. wow.


 No.126392

>>126381

What is so shocking? You didn't know they existed or?


 No.126395

>>126161

>VPN Before Tor

Are you fucking retarded or something?


 No.126396

>>126161

Hacked Network > OBFS4 Bridge > Tor > Mullvad/Cryptostorm/Ovpn.se/R4aw > Box Owned > Internet >Target


 No.126419

>>126376

we are anomoles

forgive and forget


 No.126460

>>126376

>>126377

>Russians

>costumers

is poo in street Pajeet, most definitely fine sir i am telling you.


 No.126461

>>126407

This nigger gets it. no glow.


 No.126462

>>126460

stop being butthurt, Ivan, I can tell it was you

smells like rubbing alcohol and urine, not curry and feces


 No.126466

>>126395

Won't they just see what your ISP would if you connected directly?


 No.126467

>>126173

What about PIA?

Crypto seems to have slightly better opsec, yet it's reportedly very slow (I'd say PIA is just slow not very slow)


 No.126476

>>126471

Then this topic is not for you.


 No.126511

>>126471

here's a good starter

http://lmgtfy.com/?q=opsec


 No.126513

Anyone in the UK? Is it possible to buy a prepaid mobile phone anonymously anymore? By anonymously I mean without having to hand over name and address and payment details. I think being caught on a surveillance camera while buying is probably unavoidable.


 No.126516

>>126513

ebay

semi anonimous I guess


 No.126530

>>126513

Buy burner phone with fake info without getting caught.


 No.126533

>>126513

Get a homeless man to buy it

You'll have to offer more in return than the phones with, else he'll likely steal your money


 No.126535

>>126163

Use your own password store: passwordstore org

Signed with PGP keys; Which you should be signing with a dedicated offline device (ie trezor). Push to bitbucket, github, google drive- doesn't matter, because if gpg is fucked, then you're fucked anyways.


 No.126543

>>126516

I need it to make unpleasant calls to someone which could possibly see me arrested or at the very least attract unwanted police attention to me, so anything that can be linked to my address is a non starter.

>>126530

This is what I want, I just wasn't sure they were still available anymore. Turns out they might be

https://archive.is/u52Ca

I'm a bit concerned about point #9 though. Last time I bought a cheap phone it came with a card which had to be linked to my bank account in order to top up. I can't remember if I had to activate the credit by registering before I can use it or not. If not that's good, otherwise it's a waste of money.

>>126533

Actually not a bad idea.


 No.126661

>>126543

burner phones need fucking credit cards now? what the fuck everything is a bloody botnet, i'm seriously considering going to a third world country

i could have decent internet access without big brother watching my every move, what do anons think ?


 No.126662

>>126661

Set up VPN in said country. You don't need to move there


 No.126663

>>126662

how will a vpn protect me from physical tracking and all the data keeping … every move you make is logged somewhere these days, why wouldn't i go somwhere where this isn't the case and setup a vpn over here


 No.126669

>>126663

Use good encryption.


 No.126809

Testing,, no b& pls

Doxxing


 No.126810

What happened to the word filter


 No.126811

It should say ban me mods I suck coxx.

If we don’t hold our traditions sacred then what are we?


 No.126812

Doxx


 No.126813

Welp you guys are officially un cool.


 No.126859

>>126541

The problem is time correlation attacks

90% of tor exit nodes are owned by US marines and I dont think its hard for NSA to ask spy agencies of other countries to push on ISPs to give info.

Basically they don't need to ask VPN service for anything, just look at traffic from tor exit nodes going into that particular VPN and time correlating the packets to see who it is on the beggining of the Tor network

If more people used VPN (and your VPN in particular) over Tor sure, but most people don't.

That is why I said to put your VPN before Tor and put your box after Tor


 No.126870

>>126541

live iso -> ssh bareback into dead dropped board on mesh net -> war drive wifi -> *.*.*.*

You can fill in the blanks. I've told you too much


 No.126890

why is it bad to use tor browser ? what do you use instead ?


 No.126937

>>126890

it's not bad.


 No.127040

>>126927

>>126927

>126511

It isn't easy to trace online, but it has a flaw, if someone who knows their shit casualy find the hotspot, he can own you hard, so you MUST be really careful while cooking the pie.>>126927


 No.127557

>>126166

This is true, but only for darknet/hidden services. Its also good for p2p sharing with i2psnark. It's not good however for anonymity on the clearnet. It's purpose built as its own anonymous network seperate from the wider internet.

>>126927

You're on the right track. The idea would be to have a raspberry pi setup as a Tor gateway then bridge your machine to that gateway. It would be similar in concept to whonix (look this up if you don't know what it is) except using physical devices (your raspberry Pi) instead of virtual machines.


 No.127603

>>126161

New BO here. I ran /baph/ back then too. Before that KingOfPol faggot made rumors /baph/ was breaking massive federal laws (when it was /cow/ and his gay ass) there was hacking shit everywhere. You had options then and VPN to Tor leads you to jail.

Womp womp. Play stupid games, win stupid prizes.


 No.127621

>>127603

>VPN to Tor leads you to jail

right… even if VPN faggots were keeping logs, what could they prove beyond that you were connecting to TOR via VPN?


 No.127626

>>127621

Absolutely nothing.


 No.127629

>>127626

Doesn't sound like a very strong case to me.


 No.127630

>>127626

if you're thinking of traffic correlation, well I don't think that has ever been presented in court as evidence(if you know some cases that prove otherwise, please share). also, since all packets are routed through a single connection with guard node, it's possible to obfuscate naughty traffic by adding dummy packets to the stream.


 No.127633

>>127630

It hasn't. Pretty soon, I will drop my darknet info.


 No.127634

So you need out the states eh? Your in america, find your shady mexicans at your local gas station and get one of them to help you secure passage to mexico, its a more realistic hop, not the best of choices but beats that 8x11 cell with big bubba.

Location Options:

Bangladesh

Belarus

Botswana

Brunei

Burkina Faso

Burma

Burundi

Cambodia

Cameroon

Cape Verde

Central African Republic

Chad

China (except Hong Kong)

Comoros

Congo (Kinshasa)

Marshall Islands

Mauritania

Micronesia

Moldova

Mongolia

Morocco

Mozambique

Namibia

Nepal

Niger

North Korea

Oman

Qatar

Russia

Rwanda

Samoa

São Tomé & Príncipe

Saudi Arabia

Senegal

Somalia

Sudan

South Sudan

Togo

Tunisia

Uganda

Ukraine

United Arab Emirates

Uzbekistan

Vanuatu

Vatican City

Vietnam

Yemen

Post last edited at

 No.127635

"use lengths of pvc piping… you can pick up some of the larger gauge pipe sections with end caps (threaded or not), a lil plumbers tape and/or silicone caulk and you're good to go, lol…. you'd be surprised at how much useful gear can be stowed in a section of 6"/ 8" / 12" pvc pipe… and you can weigh these fuckers down with a hunk of metal or a cinder-block and keep your cache at the bottom of a pond/lake, lol…. i know a cat who does exactly that, underwater is his preferred places to stow a cache of gear-

you can break down almost any rifle and/or a fire ready shotgun and they'll easily fit into a section of pvc pipe as big round as your leg… tents, compression sleeping bags, ammunition, cash, documents… seriously, almost fucking anything will fit, you'd be surprised-

another great option, tho it does cost a few bucks… http://www.pelican.com/ makes some of the highest quality gear containers available…. waterproof, tight, tough and they come in all shapes and sizes…. they're salty, but you seriously can't find better containers for long term gear storage… the military and many/most of the contracting outfits i've worked for throughout the world uses these containers… but they're just so fucking expensive, lol… most of the pelican cases i own, came from companies i've worked for, hahahaha-

likely the best option for low cost secure storage of damn near anything you'd need/want to cache, is the pvc piping…. find yourself a hardware/home improvement/plumbing supply store with a nice selection of piping… just imagine what you can stow in a 4' section of 18" pvc pipe."


 No.127636

"Local power transformers and high voltage power lines are your bet. In most cases power transformer stations are indeed a bloody bunkers. Guess why? Because no one wants some dreck-heads like you and me to cause blackout.

However the power lines are more vulnerable - power lines pylons (towers) in particular. You will need several demolition or termite charges to cut the legs. Get industrial grade stuff, not homemade fireworks.

If you still want to stick to keyboard, then you need to learn something about industrial software that controls power plants and find some vulnerabilities. It is really interesting topic and it is hard to come by any kind of such software in a wild for analysis. Again - no one wants some dreck-heads like you and me to cause blackout. But even if you get some of this software it will be hard to revers-engineer without specific power plant equipment.

Also all key buildings that are exposed to possible powerloss has generators that kick in when the main line is cut off. Take it into consideration if you plan to blackout bank or other bold target."


 No.127637

"You should first get some cash. Enough to cover both a burner phone and a burner SIM, + double

that and a little more (assuming you got enough money, or replace the other half with some drugs).

Find a homeless guy, ask him to go buy the burner phone and SIM and as reward he would get this

money (should be more than what the phone and SIM costs or he'd just steal)/drugs(if he's an addict)

in return. Activate SIM and phone outside a 50 mile radius of any place associated with you. Make

the calls there too. When you're done, there will most likely be money left on the SIM, so give it

to another homeless guy and have him obfuscate trails. The phone's can be bought at any electronics

store, and the SIMs, are easy to find. Kiosks will usually advertise a vendor like Lebara or the like.

Hope this helps, and watch out for CCTV.

To briefly summarize the comments below:

- Leave your own phone at home and turned ON

- Travel by bike if possible, otherwise use public transportation (watch out for CCTV)

- Do not travel with your own car (stolen is O.K.) to avoid CCTV and ALPR (Automatic License Plate Registration)

A little extra (Apply if necessary):

Depending on your threat model/adversary's capabilities or if you are currently

facing/suspecting any physical threats, I would strongly recommend to employ

surveillance detection and surveillance evasion if needed. This way you can be

sure your adversary cannot confirm you were at a specific place and time when the

calls were made.

You don't know if the ISP/NSA/etc., or your adversary is recording the calls and

to avoid voice-recognition or voice-analysis, I recommend getting a device that

will change your voice when you speak.

After use, wipe the phone, its battery + SIM and clean those with a piece of cloth

or similar(including the phone's interior which is immediately accessible when you

pop off the back). It is best to avoid having your fingerprints or other DNA, on the device.

If you need to transport the phone outside of the 'secure' location, take out the battery and

SIM and travel with that. If you have it, put it in a faraday bag. Re-assemble only at 'secure' location.

I'd add is to never bring your real mobile phone with you for any of these steps as it can reveal your location

and help correlate the anonymous call to you. In clandestine operations always leave your personal electronics

at home - consider using public transport for the op as well so that any CC cameras can't capture your car's number plate.

Good point. Don't know why I didn't include that. Important though is, leave the phone at home and turned ON. So if the

carrier or the police look at connection logs, it would appear as if you were home the entire time."


 No.127638

Spoof your user agent, your MAC too, don't hack/dox/DDoS/DoS/research /baph/ & /baphomet/-tier shit from home, If you need a VPN or Tor, don't do it from home, be aware the NSA sees everything.

If you shut the fuck up then you don't need to explain it or encrypt it when telling someone about what you have done. i.e. Don't announce your plans, don't tell people what you do, avoid IRC, don't tell people about the weather or the time zone, local politics, local events, don't tell people how you do what you do, the people who know you should not know about what you do and the people who know about what you do should not know you. Codes can be broken but cryptonyms are okay. Kill all logs. Definitely kill syslog. Encrypt every textfile with PGP, use MAT to clean any screenshots, pictures, MP3s, etc, clean your system with Bleachbit, never keep regular hours, etc

Example: I would like five purple elephants with extra ingredient X

^Completely fucking retarded code^

Cryptonym Example:

Today, you and me should go bird-watching today. We will find a garden. We will pick some flowers. We will later give these flowers to Athena. Athena is not well so this will cheer her up and make her mood better.

https://www.youtube.com/watch?v=9XaYdCdwiWU

Never carry a cell phone with you when you plan to do something irl, never own a car with GPS, never use Facebook/Social Media, use OBFS4 bridges, be proactively paranoid, never trust anyone, don't be stupid/arrogant online, etc, etc. Basic stuff.


 No.127896

hey bo can you enable name + email field, tripfags are bad but if someone is dumb enough to put their real name/email on 8ch let them


 No.127904

>>127638

Hey you sound like you actually know your shit compared to the last guy that ran this place (Benji). First time here in 3 years. Anything fun still going on?


 No.127909

>>126328

Each and everything is a reverse shell msf payload.


 No.128015

>>126812

Oh Yes it means to break the life of a faggot from Africa


 No.128034

>>126395

Your ISP can see if you access tor if you don't route it through a VPN first, it has been used to catch people who have sent bomb threats as they were the only ones using tor on the network at the time the message was sent.


 No.128088

>>126467

They have cooperated with LE and based in America. Stay away.


 No.128109

>>128088

No they haven't you stupid faggot and it's even been shown in recent court documents twice already. Go fucking kill yourself cocksucker.

Also Cryptostorm is shit, the forum is just some neckbeard furfaggot making long posts full of empty-speak and they're insecure and mess with your traffic and until recently people weren't isolated from each other and able to packet sniff the whole server. The guy is a dumb as dogshit dogfucker.


 No.128110

PIA and NORD vpn is fine. PIA has best speed if you don't need the extra nord features like the double vpn and tor servers.


 No.128211

So why does VPN -> Tor fuck you over?


 No.128228

:)


 No.128418

>>128110

>Nord VPN

What do you think of this? http://vpnscam.com/is-nordvpn-a-honeypot/


 No.128514

What's magnum condom?


 No.128517

>>128418

Fuck, I've been using proton mail before this whole nordvpn shit happened.

What should I do?


 No.128523

Dox this dumbfuck he supports a 24 year old fatfuck pedophile that has nothing but kids under the age of 12 in his clan.

Califasx3818@gmail.com

Have fun anons


 No.128546

>>128418

Lol. they buy ads, so what? Every VPN that is big enough to have quality service is going to buy ads. This is how businesses work, especially ones that don't have big word of mouth. When is the last time you talked to someone IRL about what VPN they use? So they're getting zero business from referrals. (They actually will pay you money if you refer people.) No shit they're going to buy ads.

As far as the NSA having access? Of course they do. Has anyone looked at the vault7/8 leaks? They can infect literally anything. They have heaps of 0 days sitting on a shelf for a rainy day. Any person or network with interesting traffic is going to get backdoored.


 No.128574

>>126661

The NSA monitors everything. Third world countries are actually much easier to tap into since security personnel there are incompetent. Just look at the countries included in MYSTIC.


 No.128582

File: 551790867e72804⋯.png (101.88 KB, 500x450, 10:9, Baphomet.png)


 No.128668

>>126859

>90% of tor exit nodes are owned by US marines

no, this is just wrong. don't simply pull numbers out of your ass.


 No.128670

>>126376

You must pay….

>no address provided


 No.128805

>>126328

metasploit reverse shell payloads… how retarded do you think i am




[Return][Go to top][Catalog][Nerve Center][Cancer][Post a Reply]
[]
[ / / / / / / / / / / / / / ] [ dir / abdl / animu / fa / fur / just / mde / vichan / wmafsex ]