Any tech-privacy-computer experts on here?

1tank1

New Member
I need a 99% secure VPN or anonymizer that hides my IP address from website owners but this is a serious business question and not bullshit chatter about spammers/trolls on a bbing website.

It needs to be chrome compatible.
Any help ???
 
Number one you're using the Chrome Browser.

True anonymity doesn't exist on the net.

If you are engaging in something illegal from which you could get caught.

A computer with disconnected hard drive(disconnect the data and power cable), running a ISO copy(downloaded from distrowatch.org) of TAILs (Linux TOR browser to hide the origin of your activity) in a optical drive and running a VPN to hide your activity from your ISP.

Once your activity for the day is over you simply turn off the computer with no hard drive to have left no trace even in your ram as long as you power down for the night.

TOR is very slow, can restrict access to certain sites because the complete list of exit nodes are published allowing site owners to block access. There's some questions about who actually owns these exit nodes. Doesn't allow you to chose exit nodes. TOR is a decentralized privacy access tool.

VPN hides IP address and changes your perceived location. Encrypts data from you and your VPN. So your CPU.....encrypted....to VPN.....leaves VPN server no longer encrypted. VPN does allow you to chose your exit nodes. The VPN shifts you away from your ISP into the hands of your VPN, so you are putting trust in your VPN provider, but you are also getting that encryption service that is important to keep your data out of the hands of your ISP. You are operating off a promise from your VPN provider for "no logs" regular audits to make sure this promise is held to, but it's still just a promise. VPN is a centralized privacy access tool.

The trick is to combine both of these in what is called Tor/VPN or Tor over VPN. So you connect first to the VPN then you access the TOR network using the TOR browser. This encrypts your data first and then hides the fact that you're using TOR so you don't get stuck and blocked using TOR exit nodes. Your ISP also doesn't know you're using TOR which is flagged by your ISP as suspicious.

This requires using a VPN provider that is compatible with the TOR browser. Once you have that it's just a simple matter of first accessing your VPN and then opening the TOR browser and you are about as good as I would care to be, but prepare for some seriously slow speeds.


And of course there is decentralized DVPN service that is paid for using crypto. This might be more secure, but the question, who is your provider when it could be LE as there's no audit being done on these decentralized VPN providers.

The weakness of TOR is that there could be someone watching entry and exit nodes and since the exit node is when the final layer of encryption is removed, someone could figure out what you're doing. The problem with this is that when using TOR the first person in the 4 nodes can see your IP address and if there's is an asshole in the last node removing the encryption working with the first node entry point this could expose you.

I'm not a security expert, just someone that has used Linux for 25+ years and has used the above method.
 
TOR isn't any better than chrome, bro. Do a quick search.

Nothing is private online.
Privacy comes down to what you do and what you expose online.

Chrome while a powerful tool, logs everything you do.

TOR with VPN is gonna do a far better job as long as it is run with an optical drive and not a hard drive.

Of course you can't use any personal information at all, once you've done that there is no way to keep you safe period as encryption is in the hands of someone that can remove the encryption for LE.

I would love to hear from UGL sources that keep themselves hidden as many of them are pretty savvy when it comes to this stuff.
 
TOR isn't any better than chrome, bro. Do a quick search.

Nothing is private online.
Id say TOR is by far the worst thing inthe world for privacy. All the laws that govern how much data, what kind of data, and the length oftime an ISP can hold your data get thrown out when there is TOR traffic. Plus, you now have the eyes of big budget federal people snooping at u. Its like waving a flag announcing to the government that ure up to no good. Ive heard of local cases where they hit a tor node and gave up, but im suspicious of that. I really think its a giant gov.funded honeypot.

Plus, OP just doesnt want websites to see his IP, all this talk of tails,tor,etc is overkill. A vpn should do it, but if ure worried about chrome leaking your IP, rent a VPS and run chrome from that.
 
Id say TOR is by far the worst thing inthe world for privacy. All the laws that govern how much data, what kind of data, and the length oftime an ISP can hold your data get thrown out when there is TOR traffic. Plus, you now have the eyes of big budget federal people snooping at u. Its like waving a flag announcing to the government that ure up to no good. Ive heard of local cases where they hit a tor node and gave up, but im suspicious of that. I really think its a giant gov.funded honeypot.

Plus, OP just doesnt want websites to see his IP, all this talk of tails,tor,etc is overkill. A vpn should do it, but if ure worried about chrome leaking your IP, rent a VPS and run chrome from that.
Of course the OP only needs a no log VPN service.

Renting a virtual server unless it's done without identification wouldn't be something I'd ever do.

TOR nodes are a problem, we have a list of those nodes, but we don't know for sure who owns them, that's the reason for suspecting the entry and exit node being connected to LE or the Government that seems to have a hard-on for the Onion Router.

Hiding his IP address is fairly easy for cheap. If he's doing something like silk road stuff then he's toast no matter what he does, but good luck and I'm always happy to hear from the profession criminal class if they want to enlighten us. That said even the Silk Road guy as smart as he was screwed up when he exposed personal information and LE came into physical possession of his laptop, thus the reason for my no hard drive approach as I have a couple of panasonic toughbooks with optical drives that allow me to push a button to release and easily remove my hard drives. As long as you run your computer with no battery and have it hooked up to a power cord and have the ability to yank the cord for a few minutes there's no way to recover info from computer from RAM.
 
Id say TOR is by far the worst thing inthe world for privacy. All the laws that govern how much data, what kind of data, and the length oftime an ISP can hold your data get thrown out when there is TOR traffic. Plus, you now have the eyes of big budget federal people snooping at u. Its like waving a flag announcing to the government that ure up to no good. Ive heard of local cases where they hit a tor node and gave up, but im suspicious of that. I really think its a giant gov.funded honeypot.

Plus, OP just doesnt want websites to see his IP, all this talk of tails,tor,etc is overkill. A vpn should do it, but if ure worried about chrome leaking your IP, rent a VPS and run chrome from that.
That's exactly right. Beyond the known back doors.
I can't believe people still push it.

There's backdoors inside your intel chips for fucks sake.
 
Of course the OP only needs a no log VPN service.

Renting a virtual server unless it's done without identification wouldn't be something I'd ever do.

TOR nodes are a problem, we have a list of those nodes, but we don't know for sure who owns them, that's the reason for suspecting the entry and exit node being connected to LE or the Government that seems to have a hard-on for the Onion Router.

Hiding his IP address is fairly easy for cheap. If he's doing something like silk road stuff then he's toast no matter what he does, but good luck and I'm always happy to hear from the profession criminal class if they want to enlighten us. That said even the Silk Road guy as smart as he was screwed up when he exposed personal information and LE came into physical possession of his laptop, thus the reason for my no hard drive approach as I have a couple of panasonic toughbooks with optical drives that allow me to push a button to release and easily remove my hard drives. As long as you run your computer with no battery and have it hooked up to a power cord and have the ability to yank the cord for a few minutes there's no way to recover info from computer from RAM.
Brother, you can't hide your personal information using an intel chip.
 
Brother, you can't hide your personal information using an intel chip.
Your right there is back doors installed thanks to our dear Israeli brothers that help out our government by spying on us.

There is one other way to evade LE. Learn multiple languages and use a translate program to communicate with your clients and constantly change the key for translation.

If one was to mix ancient Sanskrit, Greek, Japanese, Chinese, Pali, Tibetan it would completely fuck any police department with the amount of resources needed to figure out what you're talking about.
 
Number one you're using the Chrome Browser.

If you are engaging in something illegal from which you could get caught.

I'm not a security expert, just someone that has used Linux for 25+ years and has used the above method.


Thanks for the reply bro.

1. Chrome is a good thing or bad thing to you in terms of basic privacy?

2. I'm not doing anything illegal so I don't care if LE/The Police/My ISP see the sites I'm using.

3. The only thing I need to do is make sure that a website owner can't recognise me from an IP address I used before and still use coz the rules of the website are that I can only have 1 account. If the site owner sees me using 2 business accounts from the same IP I will get both accounts blocked....and that would totally fuck me up!

Nobody on that site plays by the rules though and I know for a fact that there's loads of other bigger businesses using multiple accounts/IPs on there so it's time for me to play dirty too if I wanna keep up with the competition.

I added a good vpn extension from chrome this morning and I've tested it on several IP tracking sites and my real IP is always cloaked so I'm hoping I've found a solution now and can mask my identity from the site I need to use.

I'll obviously register using different email, phone number, name, address, driving licence etc too
 
This is where you need someone more expert than me.

Yes the VPN can somewhat conceal your identity, but I can tell you through experience myself using up to four different VPN services at a time constantly shuffling my location all over the US and Internationally, websites can ID me and place a temporary block.

Chrome leaves a signature or fingerprint, what and how that is detected, I'm not certain, but I know for sure your Chrome device is ratting you out to websites. I think there is only 1 in almost 300,000 browsers will share the same fingerprint. So if you're logged in with a different ID/Password and you're using the same device I can assure you the company, if you're trying to exploit a service to your benefit, if they care to prevent you from doing so will be able to block you.

There are "anti-browser fingerprinting extensions". I haven't had a chance to use this and I've heard that it can make a website go wonky or break functionality.

Honestly your best bet is VPN using your privacy browser at all times. Incognito Window for Chrome at all times after you've flushed your memory between using each ID/Password.
 
I need a 99% secure VPN or anonymizer that hides my IP address from website owners but this is a serious business question and not bullshit chatter about spammers/trolls on a bbing website.

It needs to be chrome compatible.
Any help ???
Check out my posts in the privacy threads. I've broke down best VPNS, made threads about privacy and security. I have worked in the industry for over a decade.

Don't use Chrome. Why do you need Chrome? You could TRY using private browsing windows but they can still ID you based off your hardware, your screen size, your IP address, etc.

Your best bet is to just buy a cheap ass laptop meant for internet browsing only and then get a paid VPN on that and use your secondary account on the laptop and your first one on the current computer.
 
This is where you need someone more expert than me.

Yes the VPN can somewhat conceal your identity, but I can tell you through experience myself using up to four different VPN services at a time constantly shuffling my location all over the US and Internationally, websites can ID me and place a temporary block.

Chrome leaves a signature or fingerprint, what and how that is detected, I'm not certain, but I know for sure your Chrome device is ratting you out to websites. I think there is only 1 in almost 300,000 browsers will share the same fingerprint. So if you're logged in with a different ID/Password and you're using the same device I can assure you the company, if you're trying to exploit a service to your benefit, if they care to prevent you from doing so will be able to block you.

There are "anti-browser fingerprinting extensions". I haven't had a chance to use this and I've heard that it can make a website go wonky or break functionality.

Honestly your best bet is VPN using your privacy browser at all times. Incognito Window for Chrome at all times after you've flushed your memory between using each ID/Password.


Another question.
I've got 2 chromebooks and one of them has only ever been used for watching downloaded movies on netflix and prime when I'm away from home. Never ever used it for anything else online like forums/websites etc.

My main chromebook has been used for allsorts of shit for several years though and I suspect there would be easy ways to identifiy me if a site owner was "I.T savvy" with tracking devices and not just IPs....but surely there could not be any way a site owner could identify me on a new device with totally new credentials and no associated links to another device/other accounts???
 
Another question.
I've got 2 chromebooks and one of them has only ever been used for watching downloaded movies on netflix and prime when I'm away from home. Never ever used it for anything else online like forums/websites etc.

My main chromebook has been used for allsorts of shit for several years though and I suspect there would be easy ways to identifiy me if a site owner was "I.T savvy" with tracking devices and not just IPs....but surely there could not be any way a site owner could identify me on a new device with totally new credentials and no associated links to another device/other accounts???
You can check with MFASS on this. There seems to be many ways a website can ID you if you're using multiple accounts. Using two different devices along with two different VPN location settings for each account might solve your problem. The only way you'll know if you can get away with it is if you try.
------------------------------------------------------------------------------------------------------------------------------
Chromebooks have one nice feature and that's a quick scrub of the SSD with powerwashing.

The thing is you'd have to make sure you delete your Google ID on a regular basis and create a new one and then powerdown the laptop and use "shift + ctrl + alt + r" when powering up at log in screen then log in with your new account ID/Pwd.
 
Two computers and two VPNs would be best. Otherwise since you have one account established already at your normal computer and location and aren't worried about privacy, you could just continue using that one for your firdt account. Then just use the second laptop for your second account. I still would say using duckduckgo and a paid VPN would be the best, not a VPN extension.
 
Thanks bro.

So this is what I'm gonna do (tell me if you see any problems or things I can improve).

I'm gonna use my main chromebook and visit the site like I always do from the same wifi IP address I've always used and using just 1 account on the site.

On my other chromebook I'm gonna visit the same site using a new account from a totally different IP address (broadband router) and I'm also gonna use a VPN extension on that device so even if the VPN cloaking fails the site owner would still only see the IP of the broadband connection and it's not the same as the IP for the wifi on my other device so there shouldn't be any possibility of the site owner figuring out it's me using 2 accounts on 2 different devices ???
 
Thanks bro.

So this is what I'm gonna do (tell me if you see any problems or things I can improve).

I'm gonna use my main chromebook and visit the site like I always do from the same wifi IP address I've always used and using just 1 account on the site.

On my other chromebook I'm gonna visit the same site using a new account from a totally different IP address (broadband router) and I'm also gonna use a VPN extension on that device so even if the VPN cloaking fails the site owner would still only see the IP of the broadband connection and it's not the same as the IP for the wifi on my other device so there shouldn't be any possibility of the site owner figuring out it's me using 2 accounts on 2 different devices ???
You can only try it to see if it works.

I would say it should work, but if the owner of the site is looking out for guys like you and you're getting free services you could still get caught.
 
Thanks bro.

So this is what I'm gonna do (tell me if you see any problems or things I can improve).

I'm gonna use my main chromebook and visit the site like I always do from the same wifi IP address I've always used and using just 1 account on the site.

On my other chromebook I'm gonna visit the same site using a new account from a totally different IP address (broadband router) and I'm also gonna use a VPN extension on that device so even if the VPN cloaking fails the site owner would still only see the IP of the broadband connection and it's not the same as the IP for the wifi on my other device so there shouldn't be any possibility of the site owner figuring out it's me using 2 accounts on 2 different devices ???
VPN won't fail if you get an actual VPN app such as NordVPN. They also have killswitch feature so IF you did lose connection it will automatically turn off your internet connection. Just get a real VPN app and use Chrome on your other machine if you HAVE to use Chrome for some reason (I don't understand why this would be though, all browsers support HTML protocol, it's not like Chrome magically is the only browser that would work on certain sites).

VPN extension vs app: "VPN extensions are typically slower than VPN desktop apps. They only protect browser traffic, which may leave personal information on the device vulnerable to cybercriminals. VPN extensions are less secure, and most of them don't actually encrypt your connection."

One thing that is critical is that VPN browser extensions DO NOT have a KILLSWITCH.

I would say just get a VPN app and download the installer and install the actual app. It will be much safer for you even if it is just a site you don't wanna get kicked off of.

Do not log in to any other sites using Chrome. None at all (except your VPN account). Make sure your chrome browser isn't logged in. They try to get you to login to your Google account to sync your history. It really would be best to use duckduckgo, then if that's not an option for some reason, use Firefox. Seriously, chrome is the worst.

Before logging in, set your browser for maximum privacy using the available settings:


 
VPN won't fail if you get an actual VPN app such as NordVPN. They also have killswitch feature so IF you did lose connection it will automatically turn off your internet connection. Just get a real VPN app and use Chrome on your other machine if you HAVE to use Chrome for some reason (I don't understand why this would be though, all browsers support HTML protocol, it's not like Chrome magically is the only browser that would work on certain sites).

VPN extension vs app: "VPN extensions are typically slower than VPN desktop apps. They only protect browser traffic, which may leave personal information on the device vulnerable to cybercriminals. VPN extensions are less secure, and most of them don't actually encrypt your connection."

One thing that is critical is that VPN browser extensions DO NOT have a KILLSWITCH.

I would say just get a VPN app and download the installer and install the actual app. It will be much safer for you even if it is just a site you don't wanna get kicked off of.

Do not log in to any other sites using Chrome. None at all (except your VPN account). Make sure your chrome browser isn't logged in. They try to get you to login to your Google account to sync your history. It really would be best to use duckduckgo, then if that's not an option for some reason, use Firefox. Seriously, chrome is the worst.

Before logging in, set your browser for maximum privacy using the available settings:


Bro.
You have NO IDEA, what any VPN does with the traffic it (?) passes.
The entire concept is ridiculous.

I would love to heart from someone that works at a commercial VPN
 
Back
Top