How To Post Without Being Traced By Cops

Here's a good video explaining this shit. There is some great info at the end of the video for you guys ordering stuff online.
 
VPN and tor should always be on as well as Mac spoof and ghostery. Clean exif. Don't clink on links. Never post real pics of your self. Never use your real name. Basically lye about who you are.
I'm really a Japanese man named satoshi nakamoto
Hey man on a side note, what's your views on reverse searching images?

I tried it a couple times with some of my own images and came up with nothing.
 
HOW TO POST ANYWHERE WITHOUT BEING TRACED BY COPS

Found this genius article, thought you guys might want to read it :)

Customers are pretty safe, as long as they keep on buying small amounts meant for personal use.

All smart domestic sources would check customers Email only abroad.
Even if they determine the location, what can they do?
Ask for an arrest warrant in a country where gear ain't illegal?


Wanna make an interesting article?
Then post
HOW TO DROP POSTAL MAIL WITHOUT BEING TRACED BY COPS.
 
Americas to damn disorganized to give a fuck about tracing and tracking specifically you, although it is a possibility, and very well their could be some NSA blacklist all of are names are on. The real threat is look at the ads on the internet when you visit different sites, the ads recommended for you. They're probably porn related or maybe even steroid related. This is because advertising companies do have a big database that knows everything there is to know about you, they know who you are and they know every weird freaky thing you've typed in the google search bar.
 
Americas to damn disorganized to give a fuck about tracing and tracking specifically you, although it is a possibility, and very well their could be some NSA blacklist all of are names are on. The real threat is look at the ads on the internet when you visit different sites, the ads recommended for you. They're probably porn related or maybe even steroid related. This is because advertising companies do have a big database that knows everything there is to know about you, they know who you are and they know every weird freaky thing you've typed in the google search bar.
What do you can do about it?
Cleaning browsing history doesn't work. Somehow Google still knows it's you again so they know you've Googled steroids before.

Does Google check Windows or any other computer unique ID? To know it's you?
It seems to happen even in you don't login to Gmail or any Google product.
How to get around it?

Since you seem to be in the know
Just for fun, let's talk an hypothetical scenario about a domestic source
LE has already made an undercover purchase, tested positive and began formal investigation
How can they get away answering customers Emails domestically without giving out their location?
IMO they can't, even with proxies and VPNs. What do you say?
 
What do you can do about it?
Cleaning browsing history doesn't work. Somehow Google still knows it's you again so they know you've Googled steroids before.

Does Google check Windows or any other computer unique ID? To know it's you?
It seems to happen even in you don't login to Gmail or any Google product.
How to get around it?

Since you seem to be in the know
Just for fun, let's talk an hypothetical scenario about a domestic source
LE has already made an undercover purchase, tested positive and began formal investigation
How can they get away answering customers Emails domestically without giving out their location?
IMO they can't, even with proxies and VPNs. What do you say?

Every time you visit a website they get your IP and cookies, which they turn over to ad companies to make a profit. Now if you change IPs and delete history google does somehow store this info prior so I really don't see a way around, The best you can do is change IPs often, don't share cookies, and get a computer with a clean slate to avoid identifying yourself.

As far as answer customers emails, its you vs law enforcement, (Now this is over the top) I would hide my IP under as many layers of proxies as I could and to out smart them, if I had the time and funds I would run a RAT off a computer that wasn't mine so if they follow the bread crumbs they would be lead to a computer I was remotely operating far from mine. Other precaution would be privacy, secure email server, and require customers and myself to communicate with everything encrypted, this will stop them from getting anymore evidence on me while I can continue with business and start hiding my money while I prepared for the possibility of arrest. because they could kick down the door of some divorced soccer moms house and take the computer I was remotely operating off, and then figure out my computer and get me eventually. This scenario the weak link is customers, le can pose as them, and your right there is nothing you can do to be perfectly safe. What you can do is make a ridiculous trail, one that is so obnoxious and hard to follow that LE deems it not worth it and sticks your case into a filing cabinet moving on to the next guy.
 
Every time you visit a website they get your IP and cookies, which they turn over to ad companies to make a profit. Now if you change IPs and delete history google does somehow store this info prior so I really don't see a way around, The best you can do is change IPs often, don't share cookies, and get a computer with a clean slate to avoid identifying yourself.

As far as answer customers emails, its you vs law enforcement, (Now this is over the top) I would hide my IP under as many layers of proxies as I could and to out smart them, if I had the time and funds I would run a RAT off a computer that wasn't mine so if they follow the bread crumbs they would be lead to a computer I was remotely operating far from mine. Other precaution would be privacy, secure email server, and require customers and myself to communicate with everything encrypted, this will stop them from getting anymore evidence on me while I can continue with business and start hiding my money while I prepared for the possibility of arrest. because they could kick down the door of some divorced soccer moms house and take the computer I was remotely operating off, and then figure out my computer and get me eventually. This scenario the weak link is customers, le can pose as them, and your right there is nothing you can do to be perfectly safe. What you can do is make a ridiculous trail, one that is so obnoxious and hard to follow that LE deems it not worth it and sticks your case into a filing cabinet moving on to the next guy.
1 Do you think the NSA can trace which IP accessed the source "safe" Email (like Proton, Tuta, etc)
I'd say yes, even if they can't decrypt the message yet.

2 Do you know how to save a DNS address in the browser so it doesn't have to look it up everytime you access the Encrypted Email?
I've read that DNS leaks your identity because the DNS-lookup happens at the same time (give or take a milliseconds) you accessed the website, thus likely it was you.

3 Would multiple layers be worth it?
Compare that to getting somebody in a steroid-legal country to manually check the Emails for you, save then in a USB, a few random hours later he (or she) takes the usb to a different computer, with a different encrypted Email, different Internet connection (thus different IP) and Emails you the customers questions.
Viceversa for replying: you check the Emails he sent you, type the answers, encrypt them, Email him, he saves the replies in the USB, a few random hours later he takes the usb to the first computer/Email/Internet connection/IP
This is the ONLY way you can't be linked to that.
Let's suppose you pay him $150 a month so he/she can support his/her 5/6/7 children, it costs you a mere $5 a day for a "system" that beats everything known so far.

3 On top of that you can add additional encryption
send him an USB or a letter with a different (truly random) and VERY LONG password for every day.
Plenty free encryption programs. It can be in the USB as well.

Do you have a computer background?
 
1 Do you think the NSA can trace which IP accessed the source "safe" Email (like Proton, Tuta, etc)
I'd say yes, even if they can't decrypt the message yet.

2 Do you know how to save a DNS address in the browser so it doesn't have to look it up everytime you access the Encrypted Email?
I've read that DNS leaks your identity because the DNS-lookup happens at the same time (give or take a milliseconds) you accessed the website, thus likely it was you.


Do you have a computer background?

NSA could definitely track your IP its just a matter of leaving a trail, but they will be unable to decrypt any emails, Proton for instance encrypts your entire browser. So yes they can see that you're using proton, but they can't prove what your doing on it without the key to decrypt your messages. You can keep a clear cache and run off a different DNS server to access your email, and that would protect from a leak.

3 Would multiple layers be worth it?
Compare that to getting somebody in a steroid-legal country to manually check the Emails for you, save then in a USB, a few random hours later he (or she) takes the usb to a different computer, with a different encrypted Email, different Internet connection (thus different IP) and Emails you the customers questions.
Viceversa for replying: you check the Emails he sent you, type the answers, encrypt them, Email him, he saves the replies in the USB, a few random hours later he takes the usb to the first computer/Email/Internet connection/IP
This is the ONLY way you can't be linked to that.
Let's suppose you pay him $150 a month so he/she can support his/her 5/6/7 children, it costs you a mere $5 a day for a "system" that beats everything known so far.

3 On top of that you can add additional encryption
send him an USB or a letter with a different (truly random) and VERY LONG password for every day.
Plenty free encryption programs. It can be in the USB as well.
Now that right there is a full proof plan, but its strengths are its weaknesses, The safest way to do fraudulent activities on the internet is to do them outside the internet and create a gap in your cyber footprint. With a person operating in a steroid-legal country, this creates an excellent legal loop hole that would make LE almost unable to prosecute. The only issue is you have to worry about the guy on the other end, will he mess up and compromise the flash drive? what if the LE investigating you intercepts a letter you sent to him? will he try to screw you? This plan is almost flawless as long as the guy on the other end does his job. Now if you wanted to keep things simple as I said before hack into some poor chumps network and install a RAT on his computer, access your email from there, if cops raid him they can eventually trace it back to you but it would be very hard to do and LE lacks time and funding to do so.

As far as computer knowledge goes, I don't know shit, but if you handed me a degree and hired me as an IT man I would keep my job. All I would do is install kaspersky and virtually ever technical problem can be solved with google or forums, you don't need to be a programmer when people have already made the software, so basically I could sit at my desk and not know shit working maybe 4-4hour days a week making 90k to wank it.
 
As far as computer knowledge goes, I don't know shit, but if you handed me a degree and hired me as an IT man I would keep my job. All I would do is install kaspersky and virtually ever technical problem can be solved with google or forums, you don't need to be a programmer when people have already made the software, so basically I could sit at my desk and not know shit working maybe 4-4hour days a week making 90k to wank it.

This statement is profoundly incorrect.
 
NSA could definitely track your IP its just a matter of leaving a trail, but they will be unable to decrypt any emails, Proton for instance encrypts your entire browser. So yes they can see that you're using proton, but they can't prove what your doing on it without the key to decrypt your messages. You can keep a clear cache and run off a different DNS server to access your email, and that would protect from a leak.


Now that right there is a full proof plan, but its strengths are its weaknesses, The safest way to do fraudulent activities on the internet is to do them outside the internet and create a gap in your cyber footprint. With a person operating in a steroid-legal country, this creates an excellent legal loop hole that would make LE almost unable to prosecute. The only issue is you have to worry about the guy on the other end, will he mess up and compromise the flash drive? what if the LE investigating you intercepts a letter you sent to him? will he try to screw you? This plan is almost flawless as long as the guy on the other end does his job. Now if you wanted to keep things simple as I said before hack into some poor chumps network and install a RAT on his computer, access your email from there, if cops raid him they can eventually trace it back to you but it would be very hard to do and LE lacks time and funding to do so.

As far as computer knowledge goes, I don't know shit, but if you handed me a degree and hired me as an IT man I would keep my job. All I would do is install kaspersky and virtually ever technical problem can be solved with google or forums, you don't need to be a programmer when people have already made the software, so basically I could sit at my desk and not know shit working maybe 4-4hour days a week making 90k to wank it.

Just for informational/entertainment purposes
I'm not advocating/condoning to break any laws anywhere.


Yes I also thought about spyware in USB
There's a solution for that:

1 The guy logins in the public Email (for customers).
(BTW I heard it is safer to directly type the IP address (IPv4) in your browser?
I guess most safe-email providers have an static ip.)

2 The guy prints the customers Emails (in paper sheets)

3 He takes the paper sheets to the other computer, best if located far away from the first one, and takes his time.

4 He scans the previously printed sheets, with an Optical Character Recognition software. It will create a text file with the Emails.
Scanning also creates a random delay from Email to Email.

4 He sends you the text file with an Encrypted Email, and an additional layer of encryption (a text encryption software) may be used if so desired.

5 Viceversa for replying Emails

-For ultimate privacy the guy should burn the paper sheets.
-The USB or letter with a different password every day should ideally be mailed before the suspect could ever be under surveillance, and contain many years worth of passwords.

CIA/SIS-MI6/KGB level of security for just a few dollars a day.
 

Sponsors

Back
Top