I'm interested in acquiring an email address that I will use for purposes I wish to remain separate from my personal...

I'm interested in acquiring an email address that I will use for purposes I wish to remain separate from my personal life, and discrete, so therfore, if I should do anything illegal with it, it would be impossible to pin its origin.

Any suggestions?

Other urls found in this thread:

darkwebnews.com/anonymous-email/
twitter.com/SFWRedditGifs

yahoo mail

I'd like to customize the address entirely, that way it looks like it came from somewhere really obscure.

Like this...

[email protected]

I haven't made a burner address in a long time, so I forget a lot of the old websites this was good for..

Fabambpf

...

...

Tech advice thread? My gf keeps finding my porn history, can I prevent her from seeing this? Thanks in advance hackermen

...

openmailbox, riseup, or some weird ass tor email service

Go incognito
Make sure after you're finished you check the history tabs as well as delete cache and cookies.

It will look suspicious if she looks and sees the cache and cookies deleted, but at least it won't be porn specific.

If you do incognito correctly, shouldn't be an issue regardless. While you're in incognito, if it asks you to leave for any reason, don't. Copy url and paste to separate incognito window. Chrome is good for that.

try post from mars, only a maybe

Thanks for the input user

Still open for any other suggestions, I might have to make multiples.

darkwebnews.com/anonymous-email/

ProtonMail

lol

use another browser and something like safari on a PC that she won't look for. delete the default icon/shortcut etc. have a shortcut somewhere hidden. delete cookies and cache every time...

doesn't igcognito automatically not save cache/cookies? at least in firefox

Excellent, this is turning into a very productive thread, indeed, yeesssss

[email protected]

tutanota

>please tell me exactly how to be clandestine, as if tactics of secrecy are something you can write down and repeat like an autistic delivery order

buy a fidget spinner OP

obscurity is what you want. churning addresses on a regular basis and where you connect from is more important than where the mail is stored

you can only send with those kinds of addresses

It does.
Sometimes I find, however, you can accidentally open a spare window outside of incognito you didn't intend on opening. This is due to the website forcing pop-ups. That's why it's still important to check, every time.
Also what this user said. Keep the browser icon as hidden as possible.

the phrase you're looking for is "non continuity" obscurity is just being vague.

its not vague. security through obscurity is a known, commonplace phrase in certain circles

Ah i see, the database is slowly filling up with cyber nukes and coded ammo for the upcoming cybernam.

Yeah, I thought about this...
I don't know how to proxy or change my ip address at will...
I could dip into a ton of places to siphon internet tho...

obscurity is being obscure, obscuring. To obscure. It isn't a practice it is a specific action.

yes, it's vague. that's why when you barely describe something people say, "don't be so obscure"

you're talking about throwing highly detailed, but wrong information. Non continuity.

but sure skiddy, enjoy yer thread

was writing sound drivers in fedora before you knew about computers

Cyber warfare is already a thing.
But the big one is probably right around the corner.

Any provider, but always access it from TOR. Any other answer is false.

Okay... TOR...
I'll look into this

...

its so cringy posting hooded men

fuck nigg

it's a known phrase
all you're demonstrating is that you don't know the language, which is fine. you wrote drivers, I wrote buffer overflows and slip stream exploits for ugh, research purposes and bug tracking.

different strokes, I mean different strokes for different folks if I'm being too vague you angsty faggot

This list of email providers was in the link user posted

AnonEmail
SilentSender
AnonymousFeedback
AnonymousSpeech
SendAnonymouseMail
GuerrillaMail
TorGuard
TorMail
AnonymouseMail
5ymail
CyberAtlantis
HideMyAss
Hushmail
MyTrashMail
NotSharingMy.Info
Mailnesia
Mailinator
Spambog
TempInbox

I'm so desensitized to cringe due to cringe threads and what not, hooded men is like child's play

...

...

Half of those don't work in 2018 and the other half are run by the F.B.I.

Drive close to a library on the other side of town. Go somewhere discrete and change into a disguise. Go to a library and use one of their computers to make an email from mail.com

war drive
sniff
spoof

or were we just offering OBSCURE, circlejerkable advice? what in the ever loving fuck is a different email server going to do?

You an your thread are retarded.

>leave your mac everywhere

retarded

>760514443

What?

Come on dumbass, post more shit so I can call it retarded

Do you know what a mac is?

Are you able to extrapolate what kind of security measures are instituted at libraries when your checkout records have been available to the FBI for 40 years?

So, basically, you need to find yourself a hacker teacher who actually likes you to learn anything about remaining user on the internet.

No one has a link with some useful, credible literature I can read?

good luck getting that

technology changes far too fast for simple instruction following

You have to know how to overcome current technology, at this time.

Meaning nothing is written until it is half obsolete

Tell me what you want it for

Make sure you’re using the latest version when you use it going forward.

Interesting..
I don't really know...
I guess to just pirate movies and music and software. Getting books for free.

Nothing harmfully criminal I guess.

Oh yeah, video games n whatnot

Let me start over.
Drive to the other side of town.
Change into a disguise somewhere discrete.
Go into a pawn shop and buy a laptop (or rob someone)
Make an email on mail.com using a vpn you bought by using a visa gift card (cash) where you don't have to show I.D. Use public wifi in an alley behind a coffeeshop when making email. Oh and spoof mac. FUCK

2018 and you think "anonymity" exist on the web.

Lol.

Go back to 2001.

You can do that without any security measures. You won't get in trouble unless you sell, distribute, reproduce for public display AND someone tells on you.

When it's wrong it simply won't be available anymore. Like patreon/good loli. Just suddenly happened quietly. No biggie you're fine lil man.

Not even patronizing you. The amount of effort required for true anonymity means it has to be worth it, and at the same time there are people way smarter than you out there. Presenting that level of security is like putting tons of cameras on your garage. Now everyone knows there is something good in there.

you need to know your hardware WELL and spoofing entirely eliminates the need to obscure hardware ownership.

Hacking isn't an app. A LOT of laptop hardware is designed around not supporting it.

Actually, here's a good reason.
Is probably moot to argue with people on Twitter. But I want a completely anonymous account with Twitter so when something pisses me off I can rant and not have to worry about my personal credentials being affiliated with it.

For the record I hate Twitter and the book Instagram and whatever is like it, I wish we could send the social media back to the technological stone age. But when I read news online, recently it seems that are always quoting some Twitter post... Some articles are just Twitter posts by people I don't know and I don't wanna know. It's sickening to me that people read through that crap and then consider it news... And the way people let social media take over their lives, and getting addicted to it, it makes me rage. I guess I'm just trying to give them a peice of my mind. There's no way to fight social media... So I'm just improvising, trying to use it against them, somehow... I dunno, just trying to find A jumping off point.

I doubt you'll be arguing with any sort of tech genius or even above average person on twitter.

You can use normal anonymity measures. No one is going to dox you just to win an argument, even if they had the ability.

It's like people who can machine a firearm. They didn't learn that level of engineering to become a petty gun nut. It's perfectly legal to make your own gun because the level of responsibility it takes not to blow your face off keeps out the riff raff.

I see.
The more you draw attention to yourself (ironically) by trying to prevent a digital footprint, the more obvious it is you're hiding something potentially illegal or nefarious...

also you're going to try to avoid becoming addicted yourself by joining in?

Tell me about the difference between regular hardware and hacking hardware...

Protonmail

vivaldi.net

gorilla mail.

proton mail got ddosed by israel or some shit to catch terroists dont use proton mail anymore.

>Sometimes I find, however, you can accidentally open a spare window outside of incognito you didn't intend on opening. This is due to the website forcing pop-ups. That's why it's still important to check, every time.

sounds like you've found a bug if true. incognito pages should not be able to spawn normal pages as children.
that said, ghostery+ublock origins will handle 99% of your popup problems for you.

Do you know what ddos is and does?

Haha, the ones who try and fail and blow themselves up are the ones who can't handle the responsibility. Nice metaphor

...

control + shift + n

Freenet.de, you'll not need a phone number if you give another address to verify, i had luck with an 1-Time throw away adress. Also they don't block tor users.

In looking at it from a "fight fire with fire" perspective.
You're right though, there's no way to change the course of social media evolution. It's pretty much impossible.
It's gotten so out of hand, I'm getting desperate.

It's abilities. Some hardware is open source firmware, it can be made to do whatever you want within its operating ability.

Some hardware is proprietary and will only do whatever its sponsor specified. So the CIA goes to windows/acer/whatever and says, "You get full government contract if you force the platforms that you support to operate in this way..."

For instance most wireless modules used to be dual ported antennas in order that they could support transmit/read, and monitor mode at the same time. Monitor buses were made easily interruptable so you could live record your screen easily.

Operating systems used to come prepackaged with "power shell" programming. For a short time we tried to make computers more and more capable. And then it went too far. You no longer needed an engineering degree to mill a rifle and "hacking" moved out of the hands of duly responsible individuals.

Then we censored it in response. Like always. Does that answer your question sorta?

True, usually they will ask if you wanna leave incognito.

Oh i dunno which provider supports this (none should).if you use your own smtp or find an unsecured one, your mails might get rejected still bc of dns-issues.

Thank you user. I'm not trying to be a pretentious ass I would like people to understand they're asking for a summary on a huge scope of information.

>other half are run by the FBI

Run by the FBI, Just like this thread?

Stop looking at it my dude

Yasss but I'm already confirmed a non threat so within reason I can say whatever I want.

Even if you were, FBI is too busy hiding Hillary’s crimes

I wrote a few paragraphs of response to this before realising you're wrong in so many ways answering you would take an hour.

suffice to say: you have alternate OSes if you want power, you have cherry-picked some interesting examples from tabloid news the last few years, and I'm not sure what you're getting at from 'hacking hardware'. unless you control the supply chain completely you run the risk of back doors.

sorta...

Basically, regulating versatility in hardware and software came about because you're average joe(generally speaking) was becoming savvy but reckless with the hardware in the ways a responsible "hacker" would show restraint and subtly.
I guess that's why we can't have nice things lol

have you watched the news?

They don't hide anything. They just constantly misinterpret their info and are getting really useless.

But if you advertise long enough they will get you. I once used the same hacktop for 5 years. Right after I got the full aurora co dual mono radio traffic off of someone it fried itself in 7 seconds on an "unhackable" OS. Someone had been building shell dependancies on my display manager for half a year. Then they flipped the switch and it was gone.

I wasn't going to expose shit I just enjoyed collecting

I like you user

I always don't.
I go out of my way to avoid it, ya know?
But I can't search the internet without having to see it shoved in my face.
I just wish someone would come along and get rid of all of it, or people would just lose interest...

Is like in the matrix: everyone who is plugged into the matrix (social media), is an individual who can be unplugged and essentially "saved", but until they are unplugged, they are potentially your enemy...
Then you got guys like Cypher who want to be plugged into the matrix and remain ignorant.

exactly
I tried
i hate the term "hacking" im just using it to go with the thread flow. Think what you like I made it perfectly understandable for the first guy I responded to.He/she is now more aware than you are.

hacking is hard to learn I've tried and failed

you are whining about internet bullying user, seriously look at yourself

Waaat, that's crazy.
So they essentially used a computerized "weapon" against your computer?
That's wild
Who do you think did it?

No no no, not internet bullying...
I'm talking about ignorance, jack.
Apathy.
A useless peice of tech to keep people stupid and detached, however, with the illusion of being connected.

Impossible to say. They broke my algorithm keyring on the way out and I was barely able to recall the debug dump to determine as much as I have already shared.

Someone incredibly smart and well paid for their effort.

That you have to willingly connect to in order to be pained by.

Internet bullying. Turn it off.

In the matrix, they broadcast a pirate signal to connect to the matrix and go into it, to fight the machines that were manipulating the human race.
It's a loose metaphor for a plethora of social aspects in our lives today. you could Neo your way into the system and shut it down by using it's own platform against itself, if there's an actual way. It's a stretch but, what if you could insert a virus (the anomaly) into the coding and make it essentially "eat itself" causing an implosion of corrupted code that would delete the platform entirely...

The world is built on making smart people argue. Government knows they could never make advancements/progress that would outpace a small team of dedicated people with a passion from doing whatever they want.

cidica anyone?

Money is spent to obscure the truth not because it's deadly or amazing, but because dissent is profitable.

They could relaunch the application again. But all that information stored up over time would just be gone...
And then attack the new platforms the same way you did it the previous times.
Sounds like science fiction, but hopefully one day some smart user who actually cares enough will do it.

*rubs temples*

You know a virus that destroys photomechanically seperated sections of fiber optic cable?

Cyber black-out lol