RU EN
Добро пожаловать на SKY-FRAUD.RU, после регистрации , вам будут доступны все разделы форума.
Вернуться   SKY-FRAUD.RU > Основное общение > Анонимность и безопасность > Basic Security
 
Adv. info:
Важная информация
Основные домены форума: SKY-FRAUD.RU | S-FRAUD.RU

TOR: bcbm4y7yusdxthg3.onion

XMPP.NAME - Официальный Jabber сервер для участников SKY-FRAUD.RU
Анонимность и безопасность О безопасности в сети и в реале. Советы экспертов.

Advert 1
UAS Section 2
Advert 3
Ответ
 
Опции темы Опции просмотра
Старый 10.05.2018, 23:20   #1
happyday
Junior Member
 
Аватар для happyday
 
happyday вне форума
Регистрация: 03.11.2017
Сообщений: 5
По умолчанию Basic Security

Many fraudsters get caught because they do not understand the technology they are dealing with.
Being business minded and having an entrepreneurial mindset in this business is not just making money, it is also protecting yourself legally. This applies to both real world and DarkNet business.

There are many ways you can get caught and be tracked. First we will go over the ways your computer can be tracked.

The easiest way you can be tracked is by IP address and this is easily hidden using a proxy or VPN. If your real IP address is exposed, the feds will issue a warrant to your service provided and there will give your address, then your door will be kicked in.

All it takes it ONE TIME, one time and they can attach your name to your actions online and produce an entire criminal history. Keep it hidden, and remember even with gmail or online email apps, your IP is attached to each email when you send it.

The second way you can be tracked is a newer form of unique identification called Browser Fingerprinting. In case of web browsing your software configuration usually provides a pretty unique fingerprint that can be tracked as you browse.

Also every piece of information you post to different sites will contain information about you. For example the time of your postings will give a clue about which time zone you are in even if you don't provide any personal information.

Let's break your identity into domains and lets discuss each domain then. First, YOUR computer. How can an federal agent identify a person from the computer he uses? what is the digital fingerprint they leave behind?

There is a chain that leads all this information directly to you: Real Life Persona and Geography >>> Digital Fingerprint >>> User's Cyber Persona. All a federal agent has to do is works his way backwards linking you to digital fingerprints and finally identifying you as a person.


We need to know what access, tools and techniques must an federal agent possess to rebuild a fraudsters identity:


1. IP Address - Every computer on a network has a unique number. Every site you visit saves this number and attaches it to your activity. Law enforcement officials can trace your IP address back to your exact physical address by calling your service provide who keeps records. Most fraudsters know this and protect against it by either using a proxy or employing VPN(Virtual private networks)


2. Browser Fingerprinting - A browser fingerprint is information collected about a computer or mobile device for the purpose of identification. Fingerprints can be used to fully or partially identify individual users or devices even when cookies/javascript are turned off. Many of this can even happen through tor. Many people feel save behind a proxy or VPN, but sadly this is not enough to keep you out of prison. Browser fingerprints consist of your operating systems, which programs you have installed, fonts installed, etc. Surprisingly this information when all tied together makes a unique fingerprint of you as a user, which can be used in court to uniquely identify you. This is why it is best to use a Hacked Remote Desktop, along with a VPN to hide yourself. This puts at least 2 degrees of separations between you and the feds.


3. HTML5 Canvasing - this method uniquely identifies you based on YOUR GRAPHICS CARD & Computer configuration, you could be behind a VPN or proxy and they still would have you uniquely identified. This method uses your graphic card, processor ect. to draw a unique image in a hidden area on your screen, then apply a hash to the lines drawn. Because no two computers are exactly alike, each is different and can be used to identify you. Again, This is why it is always best to use a purchased hacked Remote Desktop behind a VPN/Proxy.


4. Snitches - NEVER tell anyone on darknet your real name or reveal any details about you. This is the #1 way people get caught. One of your vendors, etc. will get caught and to lessen his time will turn you in. Never meet in public, never call (voices can be uniquely identified). Never send email from clearnet.
 
Ответить с цитированием

Advertising \ Реклама
2FORCE.SU - THE BIGGEST CVV SHOP ON THE UNDERGROUND MARKET

HQ DUMPS by Donald Trump
Ссылки для доступа к сервису: TRUMP-DMPS.RU


Sell RDP/Продажа дедиков/RDP SHOP #1
Ссылки для доступа к сервису: UAS-SERVICE.RU \ UAS-SERVICE.SU


HQ DUMPS by Donal Trump
Ссылки для доступа к сервису: TRUMP-DMPS.RU


Sell RDP/Продажа дедиков/RDP SHOP #1
Ссылки для доступа к сервису: UAS-SERVICE.RU \ UAS-SERVICE.SU


HQ DUMPS by Donal Trump
Ссылки для доступа к сервису: TRUMP-DMPS.RU



Старый 11.05.2018, 20:39   #2
boubadebaby
Junior Member
 
Аватар для boubadebaby
 
boubadebaby вне форума
Регистрация: 30.10.2015
Сообщений: 2
По умолчанию

very helpfull thank you
 
Ответить с цитированием
Старый 17.05.2018, 17:19   #3
happyday
Junior Member
 
Аватар для happyday
 
happyday вне форума
Регистрация: 03.11.2017
Сообщений: 5
По умолчанию

thank you for the comment. Glad uit helped yo
 
Ответить с цитированием
Старый 16.08.2018, 15:10   #4
chimaera
Junior Member
 
Аватар для chimaera
 
chimaera вне форума
Регистрация: 14.07.2015
Сообщений: 18
По умолчанию

Seems very interesting. Can i ask you something if you know someone's user agent what can you do with that can you do smth with it


Последний раз редактировалось chimaera; 16.08.2018 в 17:01.
 
Ответить с цитированием
Старый 19.11.2018, 12:35   #5
changa
Member
 
Аватар для changa
 
changa вне форума
Регистрация: 07.08.2015
Сообщений: 32
По умолчанию

can't agree with last - most popular way to catch someone is to look up their withdraws
 
Ответить с цитированием
Старый 03.10.2019, 07:41   #6
Jok3r1
Junior Member
 
Аватар для Jok3r1
 
Jok3r1 вне форума
Регистрация: 09.07.2018
Сообщений: 5
По умолчанию

This all still good even a year later
 
Ответить с цитированием
Ответ
Здесь присутствуют: 1 (пользователей: 0 , гостей: 1)
 
Опции темы
Опции просмотра
Ваши права в разделе
Вы не можете создавать новые темы
Вы не можете отвечать в темах
Вы не можете прикреплять вложения
Вы не можете редактировать свои сообщения

BB коды Вкл.
Смайлы Вкл.
[IMG] код Вкл.
HTML код Выкл.

Быстрый переход

Похожие темы
Тема Автор Раздел Ответов Последнее сообщение
Proofpoint to Acquire Security Awareness Training Firm Wombat Security for $225 Million radikal Mass media about us 0 07.02.2018 12:19
Identity and numbers basic SkyNet Статьи 1 16.09.2015 17:21
Иранские хакеры применили зловред на Visual Basic SkyNet СМИ о нас 0 16.12.2014 02:09
Basic Phishing Tutorial T1000 Статьи 2 04.11.2013 15:31