What steps have you personally taken to stay out of 'botnets' and protect your online privacy?

What steps have you personally taken to stay out of 'botnets' and protect your online privacy?

Other urls found in this thread:

youtube.com/watch?v=XtKydtoLucc
privacytools.io/
browserleaks.com/
browserprint.info/
jcarlosnorte.com/assets/ubercookie/
twitter.com/SFWRedditImages

There are no steps you can take.If you think you can hide from the ever watchful eyes of Big Brother you're just wasting your time and effort.

This person is right. Give up.

Privacy, not anonymity.

These people are correct. Give up and do not try to resist hiding from them.

I use an emachine running Windows 95 that hasn't been updated for 15 years.

nsa pls

These people are not wrong. Submit to Microsoft and the NSA.

I'm using the incognito mode.
COME AT ME, NSA.

No. 259873582 had a private conversation with No. 247837579, a suspected terrorist, on 10/1/2023.
youtube.com/watch?v=XtKydtoLucc

Only on Sup Forums....

Hypothetically:
Abandon google services
Abandon windows
Use ghostery/noscript
Use VPN
Use cheap cellphone

Actually:
I have nothing to hide
I love being spied because it makes me feel I'm not lonely ;_;

privacy != have something to hide

>""online privacy""

Forget it there's no such thing as online privacy when the whole Internet is being analyzed and the only way to avoid it is to go off the frid

What you can do is reduce the reliance on known data mining companies services

It's until you realize that if you want to keep something private, you have to hide it.

>stick to win7 with telemetry updates disabled
>never use identifiable info such as email with real name
>don't use social media
>ublock with disconnect filter
>only store session cookies except for a few frequently visited sites
>flash cookie remover
>https everywhere
>use noscript and block 3rd party shit that's not essential
>firefox with the "block dangerous sites" feature that runs your every search through google disabled
>some about:config settings including referrer disabled
>use startpage when searching anything I wouldn't wanna explain to my own mother
>occasionally use VPN

The basics, yet imo infinitely better than doing everything through your google account on chrome, registered with you real name.

What are the best measures to take if you want to evade a ban from a site? Is clearing all your browser data, changing your IP, spoofing your user agent and keeping your mouth shut enough?

>stick to win7
you got the most obvious one wrong

windows 7 is fine you sperg, it's anything afterwards (especially 10) that you should steer clear from

To all those people who say they have nothing to hide.
It's not about having no data worth hiding, it's about what others can do with whatever data they can get on you.
people can manipulate your identity to make you look much worse than you actually are and the harder you make it to get your data the less they can do.
If you don't think this is real, then you shouldn't talk about a topic you haven't looked into.

Yes. If moderators are actively looking for previously banned users, change your nickname and other infos (switch gender, like the tumblr cuck you are) and change the way you write.

That's quite the dedication, there. And they actually do this for free?

Sounds good. Anything else to note? Sup Forums is obviously incredibly easy to ban evade on, but some sites have more autistic staff than others.

What about torrent trackers?

Have you personally reviewed the source code or has someone else proved that windows is botnet free

Guys, you can't hide your browsing history from your ISP, and the ISP can't hide your browsing history from law enforcement.

Use of Linux, Firefox plug-ins, deleting cookies etc, does not make any difference to these basic facts.
All you can do is spitefully cut down on the data large online enterprises can collect about you, which is pretty dumb and ungrateful considering they use that data to provide you with great services like streaming porn and search engines.

Simple fix, just create your own ISP.

way to miss the point you power-tripping slut

That's what VPNs are for, no? They can see I'm using a VPN, but they don't know what for.

This makes me think: use a public wifi instead of your home connection because:
>timing attacks

That's how the fucktard in Harvard got caught while still using Tor.

Also, guys, don't forget to check about DNS leak.
And disable WebRTC.

fpbp

Where's your VPN provider based?

>Win7
You already lost
They're just laughing at you because you think you are protecting yourself.

Panama (NordVPN)

You really think win7 is anywhere close to being the weakest chain in the link when browsing the web normally with some addons and generally trying to keep things decentralized?

>weakest chain in the link
>a link of chains
man.

...

Use a fake name.

Not that guy, but I'll bite. Yes, I do think it's one of the weakest chains in the link.

man, i didn't take any fuck this

throw away the key

None, the best way to hide yourself is to expose yourself.

Don't try to hide, try to blend in with the normies. Oh wait, they're watching this site.

>it's too late

Thats what we shoud prohibit if we want to live in progressive and prosperous society.

None. I don't value my privacy. We are all a part of society.

Fsociety, AMIRIT?? XDDD

i allow scripts on every site i browse, i own a google phone and i have every single interest and location tracking setting enabled. i've installed just about every google app that exists and i give every app full permissions.

>Use GNU/Linux on my personal computers
>Use OpenBSD for routing, all traffic routed through an L2TP/IPSec VPN
>Unbound with OpenNIC root for DNS
>All hard drives encrypted, requiring separate keyfiles from USB drives stored in a safe
>All personal data stored on an airgapped machine

buy a used laptop w/ cash, install debian, use duckduckgo, use a vpn, delete facebook

that's as much as I'm willing to do

>ghostery
It's botnet tier. Don't use this shit. The guys that does this shit used to sell their users data. Don't trust those fuckers.

My real life persona is tied to numerous botnet services because they work and I have nothing to hide. Do you really care if I bought lube on Amazon and sent lingerie to some cam girl and read a book about chakras? I don't care if you know those things.

You can hide yourself if want though.

>>All you can do is spitefully cut down on the data large online enterprises can collect about you
Yeah, that's a big part of the point of doing it
>which is pretty dumb and ungrateful considering they use that data to provide you with great services like streaming porn and search engines.
why are you such a fucking cuck. I don't owe them shit.

Put as many ads in my chrome browser as you want, I still don't buy anything. I got my chromebook for $40 at the thrift store.

If they're going to lock up political dissidents any time soon, everyone running secure systems will be V& anyhow.

Cancel your phone plan and internet plan.

god dammit son quit that shit, it doesn let me do my work

So, user, why exactly you go though all this trouble? Anything you wanna admit? We're all friends here. You can talk openly.

privacytools.io/
Start at the top. Work your way through it. Still not perfect, but this is as good as it gets.

>get laptop
>burn hardrive
>using i2VPN make tails usb
>use a router to make everything go through i2vpn before TOR
>become what the nsa called in its docs a "catastrophe"

there u go.

Reposting from elsewhere, don't feel like editing it but it goes over both government spying in the context of mass warrantless data collection (not targeted surveillance) and datamining by corporations.
>ditch all social media, all of it
>practice OPSEC online all the time
>fuck cellphones, completely (see pic related, cell providers sell some of that information like your location data to 3rd parties and all of that data is retained by the NSA for even longer with full SMS messages by retained for a year in the DISHFIRE database even if they don't have a warrant), get a landline
>if you absolutely have to use a cell phone for your job, use either a dumb phone or a smartphone running a custom ROM without GApps and without any software that mentions collecting information about you unless doing so for your job is impossible, leave it at home turned off whenever you aren't on call for your job and don't use it for anything other than your job
>if you need a cell phone for emergencies (vehicle breaking down, dealing with police when a crime is committed), get a prepaid one and leave it off at all times that aren't an emergency, if you have a phone for your job that isn't locked down without GApps and without apps that spy on you this should be a separate cell phone
>for dealing with texting, use email (not ideal but better than dealing with a cell phone), all cell service providers in the US offer SMS email bridges for free
>get an email provider that actually respects your privacy or host your own email
>use PGP with email whenever possible
>run your internet traffic through Tor whenever possible (better to end up on the "Tor user list" than have the NSA have access to your browsing history)
>preferably use different Tor sessions for different things if you are the type of person who multitasks a lot, as services like CloudFlare can track you between Tor circuits in the same session and admit to selling that information to advertisers

>block all JS unless it's absolutely necessary for the website you are going to to function and you can't get that information from another website (with modern browser fingerprinting techniques it's possible to fingerprint Tor users, which can allow your activity to be tracked across sessions)
>ensure HTTPS is being used whenever possible when not using Tor (NSA might be able to get through it but ISPs who do deep packet inspection like Comcast and AT&T won't)
>depending on the final outcome of the whole Playpen cheese pizza case (which currently has a ton of nasty lower court rulings that give the government anywhere from extremely broad hacking abilities with a warrant to completely removing the need for a warrant to hack a machine), be prepared to do your browsing from either VMs or separate computers without persistence (ie, boot read only and don't allow you to save anything to the machine) in both cases and be prepared for feds to try to violate your anus with nasty persistent malware
>for computer hardware, avoid anything with Intel's Management Engine (basically all Intel desktop hardware capable of modern levels of performance with the exception of older Xeons, not sure when the cutoff for good performance is for laptops/mobile hardware) or AMD's Platform Security Processor (anything newer than Piledriver or Jaguar), both are a court ruling away from being potential hardware backdoors if the US government keeps pushing what they were with Apple after the San Bernardino attack
>some ARM devices have similar separate management processors, though that can vary based on manufacturer
>research any other processor architecture you may consider to ensure it doesn't have that bullshit
>if you live in a large city where license plate scanners are common, consider an alternate mode of transportation that doesn't have a license plate if you don't want the police (and anyone higher up the food chain) having a log of your movements

>That's how the fucktard in Harvard got caught while still using Tor.
>Believing Tor is secure
Sorry to burst your bubble, but the majority of the nodes are compromised and the bulk of the traffic leads to honeypots.

Keeping his precious anime collection secure.

Truth is, doing half of that is going to get you on a short list and doing all of it is going to get you on a really short list.

Assuming you have no internet activity that's explicitly illegal, you'd be a lot less suspicious just being another one of millions of normies with an activity sheet.

Contrary to what you might think, being on the Tor list probably is more dangerous for the average person than being a documented small-time software pirate, Sup Forumslack racist, or other minor issues.

Being a regular user of Tor groups you immediately in with the total degenerates who rely on it. I certainly don't see the upside of having that kind of association instead of just being tracked like everyone else.

shit dude, I'm using ghostery. What's your favorite alternative?

>you'll be put on a scary list
And what will they do? Try to collect more information on you that they can't actually get because you aren't giving it out?

Hello Mr. NSA

Privacy is only meaningful when you want it

If you don't care, your privacy isn't being violated

I'm not having my freedom raped every time I use a cell phone because i'm free to put it in a foil bag or use burner nokias

I set noscript to blacklist mode.

* Force encryption where possible (e.g. torrents)
* VPN running on a cheap VPS (all HTTP traffic goes through this)
* Avoid using SaaS services where realistic; host my own services instead
* If I do use SaaS, distribute my use over several providers
* Use different accounts for each service and use false data in creating them
* Use uMatrix and other plugins to avoid browser fingerprinting as much as possible
* Using FOSS where possible

How do I rank, Sup Forums?

>Force encryption where possible (e.g. torrents)
>Force encryption
>torrents
This doesn't do shit. Also use anonymous mode.

I'm sure he's just meming. Ghostery has an opt-in/out for data collection. But I'd use uBlock Origin with disconnect filter since it's lighter weight than using ghostery and a separate adblocker.

Just get a uBlock and also learn how to use uMatrix.

It prevents MITM snooping. If someone starts intercepting my TLS traffic, I'm going to know very quickly because my browser is going to break.

I'd argue that "anonymous mode" (seems to be a qBittorrent feature?) is far less useful. No one's going to bother fingerprinting me with layer 7 data if all they have to do is look at my IP address. Using a VPN isn't practical for me due to the amount I download.

What are some good sites or methods to test your integrity/security/fingerprint/leakage and such?

>used to use emails, accounts, etc. tied to my real identity as a kid
>have sort of gotten better at remaining more anonymous, but ultimately feel it's pointless since I already fucked up in the past

>fingerprint
browserleaks.com/
browserprint.info/
jcarlosnorte.com/assets/ubercookie/

Why? I don't recall ever hearing about windows being the breaking point in cases where they tried to track someone down on the internet. If someone is shitposting through a VPN and attract the attention of the party van, it won't roll up to microsoft and ask them to preform magic tricks. They honk at the VPN provider and the sites where said shitposting took place to demand sauce. If that fails because of deleted logs, they're reached dead end.

>I don't recall ever hearing about windows being the breaking point
Because they'd never admit that, they'll find out who you are and then collect plausible evidence using other methods in parallel.

That's pretty tinfoil. Has there been any leaked documents pointing towards OS backdoors being this effective?

It always seems to be obvious breaches in opsec which brings someone down: like logging in to an account with both your VPN and own IP, and generally not keeping things clean and separate.