1
VesemirsPotions0317 1 point ago +1 / -0

Heard, same. So from a non promotional standpoint, what do you think good technically sound coins are?

1
VesemirsPotions0317 1 point ago +1 / -0

First watch Europa

1
VesemirsPotions0317 1 point ago +1 / -0

Care to elaborate, or just klowning?

1
VesemirsPotions0317 1 point ago +1 / -0

I mean if the hash from Lin woods passphrase matches the hash kappa gave this is certainly real. Or kappa and Lin wood coordinated a super larp

1
VesemirsPotions0317 1 point ago +1 / -0

Hm, I agree here, however am wondering about what tools they would use to penetrate through the VM and see the real MAC address of the NIC. Basically, if I’m spoofing my MAC and browsing on a VM, how does one look beyond that.

1
VesemirsPotions0317 1 point ago +1 / -0

Tor is solid. At least 3 hops, each machine is the only one that can see the previous link. This means they would have to beach all three of those nodes. I’ve noticed using Tor through brave they use 5 hops. They are also random and change at intervals. In my opinion tor does provide some serious privacy. Add a vpn to the host machine running tor through the browser in a vm with a spoofed MAC and I don’t think anyone is going to be able to track you down unless they are the NSA dumping some heavy resources on you

1
VesemirsPotions0317 1 point ago +1 / -0

MAC address can be changed though? You can do this in the network settings of the virtualization software. I use virtualbox so at least I am certain you can with it. Also, there are tools to spoof your MAC address.

1
VesemirsPotions0317 1 point ago +1 / -0

Damn stepping it up even more. So clearly you know some technical details here. How about this. Host system on VPN. VM running win xp, with a different VPN service routed through the host’s VPN service. Also windows xp vm browsing on brave through tor. Is this full ghost mode?

6
VesemirsPotions0317 6 points ago +7 / -1

Damn! Sorry to hear. I personally don’t think VPN is enough they probably have insiders at all the various VPN companies which they can hit up for a dig on your connection data which would eventually point to the email and Info you used to sign up with the VPN. This is why the burner phone to verify a fake name and email address is key. Also find a vpn that is free so you don’t have to give them personal info with a credit card. Or load up a pre pay you bought with cash while wearing your mask and a hat. Take your plates off when you drive to the store for the purchase as well probably cameras tracking the lots and that would be another trace back they can use. Great book worth reading is “the art of invisibility” by Kevin mitnick.

5
VesemirsPotions0317 5 points ago +6 / -1

This is why you setup an email on a burner phone with a fake name and always use Reddit on a VPN. If you’re really trying to be on the low run tor on brave browser anytime you visit. Reddit doesn’t know shit about me personally