Greetings, dear IP members, I see that many forum members, especially new members of the forum, do not have enough knowledge on this subject. Even those who do act very carelessly because they do not have sufficient awareness. That's why I will try to inform you about this subject as much as I can, based on my experience and research.
Note: The information I will give here will be about internet privacy, not carding privacy. Some of the methods I will give here in Carding may cause you to get caught in fraud etc.
1) OPERATING SYSTEM
Many of our friends stick to the norms and use Windows or Kali Linux. Of course, these usage preferences are also affected by the ease of the operating system and the tools it contains. But today I will tell you about the Tails OS operating system.
Why Tails OS?
-Tails is an operating system that is generally installed on a USB memory stick or Micro SD card and takes up very little space.
-The operations you perform on Tails are irretrievably deleted as soon as you shut down the system. For example, did you download a file or search for something in your browser? As soon as you turn it off without realizing it, the system will reset itself and the next time you turn it on, it will start from scratch. Of course, you can also create a permanent volume as you wish. These permanent volumes are protected by a password that is very difficult to crack. But remember that no password is unbreakable.
-It is programmed to do all internet usage through the Tor network.
-Tor Browser, Electrum Crypto Wallet, KeePassXC (password manager), OpenPGP comes installed.
-In case of any raid, if you install a clean Windows on your SSD and Tails on your USB device, you will not leave any evidence to the other party.
2) HIDE IP ADDRESS / TOR BROWSER
Many of our friends here believe that they can achieve absolute anonymity by using an open line, but there are many examples of people being packaged from HTS registration on and off the forum. Therefore, my suggestion to you would be to use a VPN you trust over the open line and do all your work through Tor Browser. Personally, I wouldn't even breathe without VPN+TOR.
So, what is this Tor Browser that is mentioned in every headline, and why is it believed that it provides anonymity?
Tor works on onion routing logic, an anonymous network structure. When you send a request to a website via Tor, the request is sent through at least 5 servers. The request is evaluated by the first server, then forwarded to the second server. The second server then evaluates the request and forwards it to the third server. All these processes continue until you reach the site to which you sent the request. Your information is encrypted while these transactions are taking place. Each server Since your information is encrypted at each server transition and you pass through many servers when sending a connection, it is almost impossible to find out which connection is accessed.
3) DATA ENCRYPTION / PGP
If you do not encrypt the data you send to the other party, whether when sending an e-mail, when entering your address information when purchasing an illegal product, or when using private messaging, this data can be observed by your internet provider and third parties. So why does PGP prevent this?
This program, which stands for Pretty Good Privacy, was developed in 1991 by Anarcho/Libertarian Phill Zimmerman, who has carried out very important studies on internet and data privacy. Of course, I don't want to bore you with such historical and terminological information, so now let's move on to the part that interests us: Why PGP, how does it work?
When it first came out, the purpose of PGP was to hide and encrypt our e-mails from unreliable e-mail companies. But now it has numerous uses such as data encryption, full disk encryption, network protection, and encryption of private messages. Even one article is not enough to write technical information about how PGP is used, etc., so to go as superficially as possible; PGP was one of the first widely available software for the implementation of public key cryptography and is a hybrid crypto system in which both symmetric and asymmetric encryption are used to achieve a high level of security. In the basic processes of text encryption, a clear text (easily understandable data) is converted into an encrypted text (unreadable data).
Let's explain it with an example, removing technical and terminological information:
In the first stage, the compressed cleartext is encrypted with a one-time key known as the session key. The key is randomly generated using symmetric cryptography, and each PGP communication session has a unique session key.
The session key itself is then encrypted using asymmetric encryption. The receiver shares his public key with the sender of the message, allowing the sender to encrypt the session key. Thanks to this step, the sender exchanges the session key with the receiver over the internet, regardless of security conditions.
can share as. Once the ciphertext of the message and the encrypted session key are sent, the recipient can decrypt the session key using his private key and then use that session key to convert the ciphertext back to the original plaintext.
So, let's say you want to send an encrypted I Love You message to the other party. When you encrypt this message with your public key, the 'I Love You' text looks like this;
-----BEGIN PGP MESSAGE-----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=AowN
-----END PGP MESSAGE-----
The receiving party can convert this encrypted text to its original form only with the key you transmit.
4) CRYPTO CURRENCIES / THOSE WHO CONTINUE TO USE PAPARA INSISTANTLY
Before we get into crypto, most friends buy or rent papara, etc., and even if they somehow launder the money in another account, they leave a transfer trail when sending it to their own account. Even if you use the card of the Papara you purchased from, you will leave a mark on the ATM you used to withdraw from. Let me share my own experience as the simplest example. A small amount of 800 TL first came to my fielder's money, then he transferred it to the money I had bought, and from there I transferred it to my own money. Even though he changed 3 different accounts, I was called to testify as to why you took money from this account 1.5 years after this incident. Do not trust any government-controlled payment system.
Let's come to cryptocurrencies.
Unfortunately, cryptocurrencies, especially Bitcoin, are not anonymous. Bitcoin transfers are public and decentralized. Even if the fight against cybercrime is not yet developed in Turkey, institutions such as the FBI can find you from your wallet address with a very common method called chain analysis. If you are not betting big and you are not paranoid, any cryptocurrency will be enough for your privacy. But if you want to be safe, you should use Monero (XMR). Unlike other cryptocurrencies, with Monero, your transactions cannot be tracked and your wallet balance cannot be viewed. Monero is a cryptocurrency developed on privacy and anonymity.
My recommended crypto sending and receiving methods:
Sending: Your exchange -> A dirty wallet that will be deleted after the transaction -> The wallet you will send to.
Receiving: A dirty wallet that will be deleted after the transaction -> The wallet you will send to your Stock Exchange application -> Stock Exchange
5) COMMUNICATION
Unfortunately, I still see many of our friends sharing their WhatsApp or Instagram contact addresses. First, never use Facebook products that use this open server. Remember that states and companies read your messages thoroughly and speak accordingly. Use messaging apps with strict privacy policies; telegram, qtox etc. Also, the most reliable will still be your own applications. The applications I named are open source, if you have technical knowledge, you can edit and install your own chat application. Even if you don't know, you can benefit from reliable people who have done this for you. For example, private messaging within the forum, private messaging via candies, etc.
WHAT HAPPENS IF I DON'T FOLLOW THESE RULES?
Your internet provider may give your transaction history to the relevant units in case of any lawsuit, investigation, etc. In the event of an investigation or raid, even a tiny detail you miss can ruin your life. Even if you are not doing anything illegal, governments and big companies can spy on your entire private life as they wish.Dear forum members, this article was written and shared by me for informational and awareness-raising purposes only, without any interest. No company or government will give you privacy out of interest. So please be conscious and aware of your surroundings. As the first and most important step to freedom, remain anonymous. Happy forum to everyone, if you indicate the items you want to add or the items you are curious about, I will constantly update the topic.
Note: The information I will give here will be about internet privacy, not carding privacy. Some of the methods I will give here in Carding may cause you to get caught in fraud etc.
1) OPERATING SYSTEM
Many of our friends stick to the norms and use Windows or Kali Linux. Of course, these usage preferences are also affected by the ease of the operating system and the tools it contains. But today I will tell you about the Tails OS operating system.
Why Tails OS?
-Tails is an operating system that is generally installed on a USB memory stick or Micro SD card and takes up very little space.
-The operations you perform on Tails are irretrievably deleted as soon as you shut down the system. For example, did you download a file or search for something in your browser? As soon as you turn it off without realizing it, the system will reset itself and the next time you turn it on, it will start from scratch. Of course, you can also create a permanent volume as you wish. These permanent volumes are protected by a password that is very difficult to crack. But remember that no password is unbreakable.
-It is programmed to do all internet usage through the Tor network.
-Tor Browser, Electrum Crypto Wallet, KeePassXC (password manager), OpenPGP comes installed.
-In case of any raid, if you install a clean Windows on your SSD and Tails on your USB device, you will not leave any evidence to the other party.
2) HIDE IP ADDRESS / TOR BROWSER
Many of our friends here believe that they can achieve absolute anonymity by using an open line, but there are many examples of people being packaged from HTS registration on and off the forum. Therefore, my suggestion to you would be to use a VPN you trust over the open line and do all your work through Tor Browser. Personally, I wouldn't even breathe without VPN+TOR.
So, what is this Tor Browser that is mentioned in every headline, and why is it believed that it provides anonymity?
Tor works on onion routing logic, an anonymous network structure. When you send a request to a website via Tor, the request is sent through at least 5 servers. The request is evaluated by the first server, then forwarded to the second server. The second server then evaluates the request and forwards it to the third server. All these processes continue until you reach the site to which you sent the request. Your information is encrypted while these transactions are taking place. Each server Since your information is encrypted at each server transition and you pass through many servers when sending a connection, it is almost impossible to find out which connection is accessed.
3) DATA ENCRYPTION / PGP
If you do not encrypt the data you send to the other party, whether when sending an e-mail, when entering your address information when purchasing an illegal product, or when using private messaging, this data can be observed by your internet provider and third parties. So why does PGP prevent this?
This program, which stands for Pretty Good Privacy, was developed in 1991 by Anarcho/Libertarian Phill Zimmerman, who has carried out very important studies on internet and data privacy. Of course, I don't want to bore you with such historical and terminological information, so now let's move on to the part that interests us: Why PGP, how does it work?
When it first came out, the purpose of PGP was to hide and encrypt our e-mails from unreliable e-mail companies. But now it has numerous uses such as data encryption, full disk encryption, network protection, and encryption of private messages. Even one article is not enough to write technical information about how PGP is used, etc., so to go as superficially as possible; PGP was one of the first widely available software for the implementation of public key cryptography and is a hybrid crypto system in which both symmetric and asymmetric encryption are used to achieve a high level of security. In the basic processes of text encryption, a clear text (easily understandable data) is converted into an encrypted text (unreadable data).
Let's explain it with an example, removing technical and terminological information:
In the first stage, the compressed cleartext is encrypted with a one-time key known as the session key. The key is randomly generated using symmetric cryptography, and each PGP communication session has a unique session key.
The session key itself is then encrypted using asymmetric encryption. The receiver shares his public key with the sender of the message, allowing the sender to encrypt the session key. Thanks to this step, the sender exchanges the session key with the receiver over the internet, regardless of security conditions.
can share as. Once the ciphertext of the message and the encrypted session key are sent, the recipient can decrypt the session key using his private key and then use that session key to convert the ciphertext back to the original plaintext.
So, let's say you want to send an encrypted I Love You message to the other party. When you encrypt this message with your public key, the 'I Love You' text looks like this;
-----BEGIN PGP MESSAGE-----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=AowN
-----END PGP MESSAGE-----
The receiving party can convert this encrypted text to its original form only with the key you transmit.
4) CRYPTO CURRENCIES / THOSE WHO CONTINUE TO USE PAPARA INSISTANTLY
Before we get into crypto, most friends buy or rent papara, etc., and even if they somehow launder the money in another account, they leave a transfer trail when sending it to their own account. Even if you use the card of the Papara you purchased from, you will leave a mark on the ATM you used to withdraw from. Let me share my own experience as the simplest example. A small amount of 800 TL first came to my fielder's money, then he transferred it to the money I had bought, and from there I transferred it to my own money. Even though he changed 3 different accounts, I was called to testify as to why you took money from this account 1.5 years after this incident. Do not trust any government-controlled payment system.
Let's come to cryptocurrencies.
Unfortunately, cryptocurrencies, especially Bitcoin, are not anonymous. Bitcoin transfers are public and decentralized. Even if the fight against cybercrime is not yet developed in Turkey, institutions such as the FBI can find you from your wallet address with a very common method called chain analysis. If you are not betting big and you are not paranoid, any cryptocurrency will be enough for your privacy. But if you want to be safe, you should use Monero (XMR). Unlike other cryptocurrencies, with Monero, your transactions cannot be tracked and your wallet balance cannot be viewed. Monero is a cryptocurrency developed on privacy and anonymity.
My recommended crypto sending and receiving methods:
Sending: Your exchange -> A dirty wallet that will be deleted after the transaction -> The wallet you will send to.
Receiving: A dirty wallet that will be deleted after the transaction -> The wallet you will send to your Stock Exchange application -> Stock Exchange
5) COMMUNICATION
Unfortunately, I still see many of our friends sharing their WhatsApp or Instagram contact addresses. First, never use Facebook products that use this open server. Remember that states and companies read your messages thoroughly and speak accordingly. Use messaging apps with strict privacy policies; telegram, qtox etc. Also, the most reliable will still be your own applications. The applications I named are open source, if you have technical knowledge, you can edit and install your own chat application. Even if you don't know, you can benefit from reliable people who have done this for you. For example, private messaging within the forum, private messaging via candies, etc.
WHAT HAPPENS IF I DON'T FOLLOW THESE RULES?
Your internet provider may give your transaction history to the relevant units in case of any lawsuit, investigation, etc. In the event of an investigation or raid, even a tiny detail you miss can ruin your life. Even if you are not doing anything illegal, governments and big companies can spy on your entire private life as they wish.Dear forum members, this article was written and shared by me for informational and awareness-raising purposes only, without any interest. No company or government will give you privacy out of interest. So please be conscious and aware of your surroundings. As the first and most important step to freedom, remain anonymous. Happy forum to everyone, if you indicate the items you want to add or the items you are curious about, I will constantly update the topic.