Easy instructions for anonymity

Echo111ohce

New Member
I’m sure most of people on this forum already know how to do this but I figured it couldn’t hurt to make this post for the people that don’t. I wanted to make it as simple as possible, directed towards people with little to no experience. Also felt like it was a way to contribute something to forum. This is meant for an absolute beginner with limited knowledge of how to remain “anonymous” on the internet.

Step by step for booting tails OS from USB.

1. Downloading the Tails OS image
Go to the Tails website: tails(dot)net/install/download

You want to click the button to download the “USB image” and save it to your computer.

2. Formatting the USB drive to make it bootable.
Find a USB stick with at least 8GB. This will erase everything on it.

Download and install balenaEtcher from etcher(dot)balena(dot)io

There are other sites that do this but this one is incredibly simple.

Open Etcher, click “Flash from file” and pick the Tails image you downloaded.

Select your USB as the target.

Click “Flash” and wait (this takes about 10 minutes)

3. Boot from the USB
Restart your computer with the USB inserted

As soon as it restarts, press the function key to enter bios or directly to boot menu. (Boot menu is usually F12 or F10) (bios is usually F2 or F10) (search for how to enter bios or boot menu for your specific computer if you have any trouble).

When the bios loads you will see a tab for boot options

Select the USB from the list to boot.

Save and exit.

DO NOT LOG IN OR SEARCH FOR ANY PERSONAL SOCIAL MEDIA ACCOUNTS, LOCAL WEATHER, NONE OF THAT STUFF if you wish to stay as anonymous as possible. When I use tails/whonix, I use it for a single purpose then remove the drive and go back to my normal OS.

There are other steps you can take but this is probably one of the easiest ways to remain anonymous.

I am not some red team expert or soc analyst but studied penetration testing on and off as a hobby for years. There are people much more suited for this info than me but like I said, I figured it might be able to help someone out there.

“The quieter you become, the more you are able to hear.”
 
Last edited:
If anyone likes this or is interested, I will make one for virtual machines. Not quite as good but great for someone that wants to help protect their main machine from malware and absolutely safer than using your main Windows or Mac machine to order gear from. Do I think the feds are coming for ordering a few vials? Absolutely not, but if you’re interested in it at least the info will be there.
 
Last edited:
I’m sure most of people on this forum already know how to do this but I figured it couldn’t hurt to make this post for the people that don’t. I wanted to make it as simple as possible, directed towards people with little to no experience. Also felt like it was a way to contribute something to forum. This is meant for an absolute beginner with limited knowledge of how to remain “anonymous” on the internet.

Step by step for booting tails OS from USB.

1. Downloading the Tails OS image
Go to the Tails website: tails(dot)net/install/download

You want to click the button to download the “USB image” and save it to your computer.

2. Formatting the USB drive to make it bootable.
Find a USB stick with at least 8GB. This will erase everything on it.

Download and install balenaEtcher from etcher(dot)balena(dot)io

There are other sites that do this but this one is incredibly simple.

Open Etcher, click “Flash from file” and pick the Tails image you downloaded.

Select your USB as the target.

Click “Flash” and wait (this takes about 10 minutes)

3. Boot from the USB
Restart your computer with the USB inserted

As soon as it restarts, press the function key to enter bios or directly to boot menu. (Boot menu is usually F12 or F10) (bios is usually F2 or F10) (search for how to enter bios or boot menu for your specific computer if you have any trouble).

When the bios loads you will see a tab for boot options

Select the USB from the list to boot.

Save and exit.

DO NOT LOG IN OR SEARCH FOR ANY PERSONAL SOCIAL MEDIA ACCOUNTS, LOCAL WEATHER, NONE OF THAT STUFF if you wish to stay as anonymous as possible. When I use tails/whonix, I use it for a single purpose then remove the drive and go back to my normal OS.

There are other steps you can take but this is probably one of the easiest ways to remain to remain anonymous.

I am not some red team expert or soc analyst but studied penetration testing on and off as a hobby for years. There are people much more suited for this info than me but like I said, I figured it might be able to help someone out there.

“The quieter you become, the more you are able to hear.”
!!! ;)
 
This is just one piece of the puzzle though right? IE this lets you browse a website anonymously, but as soon as you start doing things like buying and trading crypto their are more things to consider.

This isn’t meant to be a critique more just an observation. I admit to be pretty lazy, too trusting with the gear world and want to tighten things up.
 
This is just one piece of the puzzle though right? IE this lets you browse a website anonymously, but as soon as you start doing things like buying and trading crypto their are more things to consider.

This isn’t meant to be a critique more just an observation. I admit to be pretty lazy, too trusting with the gear world and want to tighten things up

This can get deeper and deeper the safer you want to be. Non KYC exchanges are always the best practice. Hardware wallets like ledger work well with tails if you’re storing crypto. Monero is safer than BTC. Some people, if using BTC, use “tumblers”. It is basically like having 100 dollar bills and everyone puts in their bills. It all gets mixed up so you’re not getting the same bills back and makes tracking It on the blockchain much more difficult. Some people avoid reusing crypto addresses. If you are just looking to tighten security up and not a vendor, I would say tails and a non kyc wallet is more than sufficient. It takes manpower, time, and most importantly, money, for LE to go after someone. I don’t want to give out any wrong info but I feel like a poorly packed package is more dangerous than someone using something like tails and a non KYC wallet. So you are correct. It is one piece of the puzzle but it is a really big piece.
 
Last edited:
This can get deeper and deeper the safer you want to be. Non KYC exchanges are always the best practice. Hardware wallets like ledger work well with tails if you’re storing crypto. Monero is safer than BTC. Some people, if using BTC, use “tumblers”. It is basically like having 100 dollar bills and everyone puts in their bills. It all gets mixed up so you’re not getting the same bills back and makes tracking It on the blockchain much more difficult. Some people avoid reusing crypto addresses. If you are just looking to tighten security up and not a vendor, I would say tails and a non kyc wallet is more than sufficient. It takes manpower, time, and most importantly, money, for LE to go after someone. I don’t want to give out any wrong info but I feel like a poorly packed package is more dangerous than someone using something like tails and a non KYC wallet. So you are correct. It is one piece of the puzzle but it is a really big piece.
Thanks bro that's helpful. Yeah I've been lazy with the crypto side as well. I don't have a stash of coin. Usually just buy on demand when I need it. The learning curve and added time of non kyc has kept me lazy.
 
This can get deeper and deeper the safer you want to be. Non KYC exchanges are always the best practice. Hardware wallets like ledger work well with tails if you’re storing crypto. Monero is safer than BTC. Some people, if using BTC, use “tumblers”. It is basically like having 100 dollar bills and everyone puts in their bills. It all gets mixed up so you’re not getting the same bills back and makes tracking It on the blockchain much more difficult. Some people avoid reusing crypto addresses. If you are just looking to tighten security up and not a vendor, I would say tails and a non kyc wallet is more than sufficient. It takes manpower, time, and most importantly, money, for LE to go after someone. I don’t want to give out any wrong info but I feel like a poorly packed package is more dangerous than someone using something like tails and a non KYC wallet. So you are correct. It is one piece of the puzzle but it is a really big piece.
Some of these, if you are not a vendor, are kind of taking it to the extreme but it absolutely can not hurt to take extra precautions. I mean I have definitely been guilty of just using a regular vpn to scroll meso. Seeing anyone caught up in any legal trouble at all for gear alone is something I never want to see happen. I know some vendors that I’ve used in the past have went down (L1sk@). When that stuff happens it definitely makes your butthole pucker a little bit. You never know what their opsec is. Every single one claims to delete customer info but you never know how smart the guy you piss off is. One person in LE might say “well shit, it’s just some test”. Another might be out just to fuck someone’s day up. One thing I know is that they are always lurking.
 
Thanks bro that's helpful. Yeah I've been lazy with the crypto side as well. I don't have a stash of coin. Usually just buy on demand when I need it. The learning curve and added time of non kyc has kept me lazy.
I think, don’t quote me, even Best wallet is non KYC. Really easy to use. Some other guys may chime in with some other options.
 
Back
Top