IP address blocker for security when order raws

Mechanics

New Member
So I look to the homebrew crew for some valuable advise .
So I never use my PC anymore . but was curious if anyone has used a IP blocker .
And if so what is the best way or method .
So I guess I need to address this to the tech guys
 
So I look to the homebrew crew for some valuable advise .
So I never use my PC anymore . but was curious if anyone has used a IP blocker .
And if so what is the best way or method .
So I guess I need to address this to the tech guys
Information below is provided just for PRIVACY for controversial, yet still legal items, not intended for any illegal activity. Check your local laws before ordering.

1 The best way to get privacy is a "burner" prepaid smartphone, paid cash.

2 Definitely never use your pc. I've read your windows serial number can be easily accessed and used to identify/track you.
You can use a laptop computer + USB wireless modem, only as long as, read #3

3 Only use that burner phone/laptop to order things, check emails. And do that quickly. Never ever use the same smartphone/laptop for ANY other things.
Certainly not personal stuff may seen obvious, but even looking the same youtube videos, or searching the same things on Google can track you as the same person.

4 After quickly ordering / checking Emails turn it off, unplug usb modem (if pc), and wrap smartphone in Aluminum foil (preferably Copper foil if you can find it) as phones still communicate with cellular towers even when turned off and that can EASILY used to track your location.

5 Either leave the modem/smartphone away from your home, or drive with it still wrapped in metallic foil, leaving your main phone at home, and only unwrap/quickly use it at a relatively distant location as they will know the nearest cellular tower you used, thus roughly pinpointing your location.

6 You can connect only from a distant, yet crowded place.
You can watch the Breaking Bad episodes where he leaves the burner phone hidden at school (it begins vibrating on the false ceiling lol), as thousands of people attend school, thus next to impossible to know who the phone belongs to.
Again leave your main phone at home so they won't appear to be in the same place at the same time (as determined by cellular tower records).

7 this thread belongs to Security and Privacy sub forum.
 
Oh and for anyone saying they can track your phones GPS and shit, that's actually incredibly difficult and why when you call the police in real emergencies they can't do it in time.
 
I use a VPN idk about all this tinfoil stuff. I have TunnelBear

Oh and for anyone saying they can track your phones GPS and shit, that's actually incredibly difficult and why when you call the police in real emergencies they can't do it in time.
1 Cellular towers "ping" your phone, and it briefly "replies" EVEN WHEN TURNED OFF.
This has been used a zillion times to determine where a suspect (actually his phone) has been at a certain date and time.
Even Powering Down A Cell Phone Can't Keep The NSA From Tracking Its Location
NSA Can Reportedly Track Phones Even When They're Turned Off
Just that NSA ain't required as some phone companies keep records of nearest towers used, especially to calculate roaming charges.


2 Foil may prevent hacked phones from transmitting snooped data back.


3 Tinfoil is simple and effective.
 
Ohemgee, wrap your phones wrap your wife

Tails os + VPN + tor your best bet. I'm sure most aren't even doing all that
Google tails and grab a USB stick. Holla
Read busts news releases on how they routinely break thru VPNs.


Mobile phone tracking
From Wikipedia, the free encyclopedia
Mobile phone tracking is the ascertaining of the position or location of a mobile phone, whether stationary or moving. Localization may occur either via multilateration of radio signals between (several) cell towers of the network and the phone, or simply via GPS. To locate a mobile phone using multilateration of radio signals, it must emit at least the roaming signal to contact the next nearby antenna tower, but the process does not require an active call. The Global System for Mobile Communications (GSM) is based on the phone's signal strength to nearby antenna masts.[1]

Operational purpose
In order to route calls to a phone, the cell towers listen for a signal sent from the phone and negotiate which tower is best able to communicate with the phone. As the phone changes location, the antenna towers monitor the signal, and the phone is "roamed" to an adjacent tower as appropriate. By comparing the relative signal strength from multiple antenna towers, a general location of a phone can be roughly determined. Other means make use of the antenna pattern, which supports angular determination and https://en.wikipedia.org/w/index.php?title=Phase_discrimination&action=edit&redlink=1.

Newer phones may also allow the tracking of the phone even when turned on and not active in a telephone call. This results from the roaming procedures that perform hand-over of the phone from one base station to another.

Privacy
Locating or positioning touches upon delicate privacy issues, since it enables someone to check where a person is without the person's consent. Strict ethics and security measures are strongly recommended for services that employ positioning.
In 2012 Malte Spitz held a TED talk[13] on the issue of mobile phone privacy in which he showcased his own stored data that he received from Deutsche Telekom after suing the company. He described the data, which consists of 35,830 lines of data collected during the span of Germany's data retention at the time, saying, "This is six months of my life [...] You can see where I am, when I sleep at night, what I'm doing." He partnered up with ZEIT Online and made his information publicly available in an interactive map which allows users to watch his entire movements during that time in fast-forward. Spitz concluded that technology consumers are the key to challenging privacy norms in today's society who "have to fight for self determination in the digital age."

United States
A secret interpretation of The Patriot Act, confirmed to exist,[19][20][21][22] has been linked to secret widespread location tracking.[23][24][25]


Mobile phone tracking - Wikipedia
 
Home location register (HLR)
The home location register (HLR) is a central database that contains details of each mobile phone subscriber that is authorized to use the GSM core network. There can be several logical, and physical, HLRs per public land mobile network (PLMN), though one international mobile subscriber identity (IMSI)/MSISDN pair can be associated with only one logical HLR (which can span several physical nodes) at a time.

The HLRs store details of every SIM card issued by the mobile phone operator. Each SIM has a unique identifier called an IMSI which is the primary key to each HLR record.

Visitor location register (VLR)
Description[edit]
The Visitor Location Register (VLR) is a database of the MSs (https://en.wikipedia.org/w/index.php?title=Mobile_Stations&action=edit&redlink=1) that have roamed into the jurisdiction of the MSC (Mobile Switching Center) which it serves. Each main base station in the network is served by exactly one VLR (one BTS may be served by many MSCs in case of MSC in pool), hence a subscriber cannot be present in more than one VLR at a time.

The data stored in the VLR has either been received from the Home Location Register (HLR), or collected from the MS. In practice, for performance reasons, most vendors integrate the VLR directly to the V-MSC and, where this is not done, the VLR is very tightly linked with the MSC via a proprietary interface. Whenever an MSC detects a new MS in its network, in addition to creating a new record in the VLR, it also updates the HLR of the mobile subscriber, apprising it of the new location of that MS. If VLR data is corrupted it can lead to serious issues with text messaging and call services.
Data stored include:
  • IMSI (the subscriber's identity number).
  • Authentication data.
  • MSISDN (the subscriber's phone number).
  • GSM services that the subscriber is allowed to access.
  • https://en.wikipedia.org/w/index.php?title=GPRS_Access_Points&action=edit&redlink=1 subscribed.
  • The HLR address of the subscriber.
  • SCP Address(For Prepaid Subscriber).
Billing center (BC)
The billing center is responsible for processing the toll tickets generated by the VLRs and HLRs and generating a bill for each subscriber. It is also responsible for generating billing data of roaming subscriber.

Network switching subsystem - Wikipedia


IN SHORT:
THEY KEEP RECORDS OF NEAREST/STRONGEST-SIGNAL CELLULAR TOWERS YOU USED.
 
Another related kind of government request is called a tower dump; in this case, a government asks a mobile operator for a list of all of the mobile devices that were present in a certain area at a certain time. This could be used to investigate a crime, or to find out who was present at a particular protest. (Reportedly, the Ukrainian government used a tower dump for this purpose in 2014, to make a list of all of the people whose mobile phones were present at an anti-government protest.)
The Problem with Mobile Phones
 
If you're using a phone that allows web browsing (smartphone)
likely it still "pings" the cellular towers even when turned off.
 
vpn + virtual machine with encrypted data is more than enough.
This still leaves your IP thus location exposed.

Ask Ross Ulbricht about VPNs
From a San Francisco Internet cafe
Tarbell said that while Dread Pirate Roberts used a "virtual private network," or VPN, to create a "false" IP address, the VPN server's records indicated a user had accessed it from a San Francisco Internet café near the home of a friend Ulbricht had gone to live with around September last year.
Records obtained from Google showed Ulbricht had regularly logged into his Gmail account from the Internet café, he said -- including on the same day in June that the VPN was accessed.

How the FBI caught Ross Ulbricht, alleged creator of Silk Road - CNN
 
This still leaves your IP thus location exposed.

Ask Ross Ulbricht about VPNs
From a San Francisco Internet cafe
Tarbell said that while Dread Pirate Roberts used a "virtual private network," or VPN, to create a "false" IP address, the VPN server's records indicated a user had accessed it from a San Francisco Internet café near the home of a friend Ulbricht had gone to live with around September last year.
Records obtained from Google showed Ulbricht had regularly logged into his Gmail account from the Internet café, he said -- including on the same day in June that the VPN was accessed.

How the FBI caught Ross Ulbricht, alleged creator of Silk Road - CNN
you just need a VPN provider that doesn't keep logs. and check if there's no DNS leak
 
you just need a VPN provider that doesn't keep logs. and check if there's no DNS leak
Info meant just for privacy where legal, check your local laws before ordering.

Busts had proven, time after time
that they can always break thru VPNs.


So, for a small order for personal use, they won't even bother.

Now for a large order, hundreds of grams
it may be better to assume that they will decode the VPN indeed
thus prevent the IP from being traced back to you.
 
That will only hide what your searching for from your internet provider, that won't stop anyone from back tracking your IP address.
You need Tor for that.
Information below meant just for PRIVACY in countries where this is legal. Not intended to break any lwas. Check your local laws before doing anything:

They will break thru that too, especially with a judge order.
The point is that even if they break thru VPNs/tor/whatever and they finally determine the originating IP
they won't know who it belongs to.

That's why the Breaking Bad episode comes handy as an example:
no matter how difficult or easy it is for them to determine the IP
they determine the IP comes from a prepaid phone that only seems to connect BRIEFLY thru a tower located at a large school, attended by HUNDREDS or THOUSANDS of people at the same time.

This brings us to the next point: BRIEFNESS
Quickly send and receive Emails, and VANISH
Either unplug the USP wireless modem, remove the SIM card, turn it off, wrap it in Aluminum foil+rubber bands, etc.
then take your time read and type the Email replies OFFLINE, either by typing them a notepad file to be copied/pasted later, or having an Email app/software/webpage that allows you to type all Email replies without being connected to the Internet.
When replies are ready, you only connect to Send/Receive, and it must be quick, a couple minutes for a few Emails.
Rinse and repeat.
 

Sponsors

Latest posts

Back
Top