Anonymity: Basics

tl;dr Anonymity takes effort, discipline, and respect for the craft.

First off, Proxychains adds latency, breaks tools that rely on fast session handling, and doesn’t fix bad opsec. You’re probably going to get more timeouts than actual scans, but it depends on how you use it.

TOR by itself is not magic, especially during long sessions. Exit nodes sniff, traffic fingerprinting happens, and if you’ve got nothing layering over it. (I’ve covered this before, take a look if you’re interested.)

VPN and Tor at the same time? - #7 by 0xf00I

Think handing over your email and phone number to companies like META is “okay”? That’s cute. META doesn’t just collect what you give; they dig into everything they can | metadata, patterns, shadow profiles. even people who haven’t signed up.

What Really Caused Facebook's 500M-User Data Leak? | WIRED

Security fails because people cut corners not because they’re too “accurate.” Do you really think your info gets leaked because someone was “too careful”?

1 Like