Profile: 46839629...
🚨NEW VIDEO🚨
Bitcoin’s 21 Million Supply: Planning for Taxes, Estate & Retirement
@VKellermanCFP of @mysoundadvisory breaks down tax-efficient selling, inheritance planning, and portfolio structuring to balance Bitcoin with traditional assets.
Youtuber Mental Outlaw loves Mullvad
Yet he said Proton is a honeypot.
Proton & Mullvad both just pay M247 to service their New York location, which is closest to where Outlaw lives
So the same WireGuard protocol, through the same M247 NY, one day is the NSA honeypot, but another day it's the "chad" king?
Mullvad is propaganda. Their service was resold by radical-left Mozilla, while they ignored that Mozilla inserted AI and "Pocket" advertising malware into Firefox. So Mozilla VPN was just re-branded Mullvad, which was just re-branded M247. And Mullvad happily collected the funds, as they spew dribble about "privacy is a right".
Why is M247 bad? Well, if you haven't yet seen our article on VPNs, it's time to escape the Matrix: https://simplifiedprivacy.com/how-this-vpn-works/epic-pitch.html
Youtuber Mental Outlaw loves Mullvad
Yet he said Proton is a honeypot.
Proton & Mullvad both just pay M247 to service their New York location, which is closest to where Outlaw lives
So the same WireGuard protocol, through the same M247 NY, one day is the NSA honeypot, but another day it's the "chad" king?
Mullvad is propaganda. Their service was resold by radical-left Mozilla, while they ignored that Mozilla inserted AI and "Pocket" advertising malware into Firefox. So Mozilla VPN was just re-branded Mullvad, which was just re-branded M247. And Mullvad happily collected the funds, as they spew dribble about "privacy is a right".
Why is M247 bad? Well, if you haven't yet seen our article on VPNs, it's time to escape the Matrix: https://simplifiedprivacy.com/how-this-vpn-works/epic-pitch.html
Update to k3tan's Starting a new digital identity
Ktan wrote a nice article on digital identities (https://k3tan.com/starting-a-new-digital-identity) but sadly being from 2021 is out of date. This is my humble update and expansion on their ideas.
NEW Identity:
Starting up a new digital identity. Notice the "new" part. For a history lesson most hackers, black and white hats, get caught from reusing nyms or user names. Maybe it is laziness or human ego wanting to show street cred but never never never reuse user names. Maybe you used a name just for fun with friends but much later used it again for mission critical operations. You are super careful and it is super clean now, not so much back then. It only takes one misstep in the past to connect that to another nym you have used or even your real identity.
I will repeat it again, never never never reuse user names. Every email account, social media, online forum, whatever use a different name and never reference another account either in posts or in registration. i.e. New email accounts in that new name or burner accounts. Use a online username generator or name generator to avoid personal bias to give any sort of hint to the new name. Don't let your love of pokemon characters be your downfall.
Devices:
The author k3tan is correct, cash is king. Get cash and use cash to buy a laptop, a usb flash drive, and a lanyard. Use free Wifi access to download a linux distro and use the flash drive to install to the laptop. The original article suggests POP OS for some reason but in my opinion that can be a little resource intensive especially for a lower end laptop. The GOAT is Qubes but can be a bit intimidating for new users and again need a good amount of RAM so it is best for desktops. Honestly any linux distro is fine but some lightweight security inclined ones to look at are: Subgraph OS, Alpine, or PureOS.
Once that is installed to the laptop, use that to download Tails OS and install it on the flash drive you used to install your laptop OS. The laptop is going to be your daily driver for minor tasks and the tails flash drive is going to be your mission critical device when you need higher privacy and anonymity. Put the tails flash drive on the lanyard you bought. It will keep you from losing it and when it is plugged in and in use wrap the lanyard around your wrist. In a emergency just snatch it out of the computer. Your session will be wiped.
Phone:
A phone is never going to be private. (see
Get Bitcoin and Monero:
P2P through local meetup is fantastic if you have access to something like that. If you live in a smaller population center then that might not be a option. Use robosats to purchase bitcoin and Haveno-retro to purchase monero. Samurai is unfortunately gone and ashigaru is too new to recommend. Cake wallet with Tor is the go to for mobile and electrum and feather wallet on desktop.
Accounts:
Use the monero or the non-KYC bitcoin to purchase Mullvad VPN. Setup a encrypted email account with either Proton or Posteo. Encrypt your files with veracrypt or picocrypt.
For more details and going further down the rabbit hole see:
I have decrypted this burner phone guide to go with
nostr:naddr1qqgrgvfjxuckgd3evvcxye35xqcrjq3q5qan37zr8fzk8qwdtq54ltpn46kfwyq7aesyl0pp6zzqwtruu8cqxpqqqp65wjfrhws
Cell Towers vs WiFi.
In this wicked useful and brand spanking new post, I'm going to teach you what data is being shared from cell towers vs WiFi, and what your options to reduce that are. The end has 3 example cellphone setups for the average person, somewhat savvy, and tinfoil hat.
~~~
When you connect to cellphone towers:
You're using the modem which has an IMEI identification number. Using a DeGoogled phone and a VPN does NOT change this from revealing info about the hardware TO the TOWER, such as where it was bought. And who bought it.
There's a couple ways to deal with this. One way is to buy it in cryptocurrency, from a company like mine. This is the easiest method for most people.
A second way is to use external hotspots for service, and buy those locally in cash. For example GLinet travel routers:
https://simplifiedprivacy.com/glinet/index.html
(or crypto like Calyx/Tmobile depending on your country.) Some prefer this because then they can put it in a faraday bag to hide their location at home. And only take it out of the faraday bag outside their house.
A third way is to change the IMEI. This method is controversial, as some say it's stealth. Others say you're drawing attention to yourself by giving them bullshit or previous numbers.
Some devices are easier to change then others. And some countries have made it illegal to change the IMEI. Of course, I can not recommend anything illegal. But if it is legal in your country, then generally older things such as Nokias are the easiest. LunarDAO has a guide on this:
https://wiki.lunardao.net/imei.html
A combination of the 2nd and 3rd way can be done by using something like Blue Merle. This is software for GLiNET travel routers that changes the IMEI of the router. Then you could in theory swap different SIM cards. However, this has a high risk of potential error for a new user, and it's unclear who's audited it:
https://github.com/srlabs/blue-merle
~~~
When you connect to WiFi:
You're NOT using the IMEI. Instead, you're getting a MAC address assigned to you by the router. This is a local area network. Android randomly generates MAC addresses for each connection, and you can actually see these in the settings of the WiFi connection.
In general, Android security is pretty good for WiFi. However, the CIA loves to hack routers. From the Wikileaks documents, we know they prefer to tunnel traffic from home routers directly to the CIA to see the traffic.
There's two main ways to avoid this. First, you could always use a VPN, which then bypasses the router's DNS.
Second, you could always be behind a firewall or travel router. The router's WAN port is the one communicating with a modem (public internet). While the router's LAN or (local area network) is the one giving you a MAC address.
~~~
What are some example setups?
average person:
Phone (bought with Crypto)
\/
SIM (bought with cash)
\/
VPN
\/
JMP Chat (VoIP)
(using public xmpp servers)
\/
Cell numbers
~~~~~
Savvy dude:
Phone (bought with Crypto)
\/
Silent Link (Crypto eSIM)
\/
VPN
\/
VPS you control
self-host xmpp
\/
JMP Chat (VoIP)
\/
Cell numbers
~~~~~
Tinfoil hat:
Phone (bought with Crypto)
No SIM. Using Tor
\/
GLiNET router w/ SIM (Using VPN)
maybe faraday bags or IMEI changes
\/
VPS you control
self-host xmpp
\/
JMP Chat (VoIP)
\/
Cell numbers
~~~~~
And of course, regular SMS is horrible. Go with a real messenger if the other person will allow it, (which one is actually not that critical): Signal, XMPP, Matrix, Session, SimpleX.
Self-hosting the VPS just provides another layer of protection that you control between the hostile adversary and you.
So our team can help you get a Phone, or setup a VPS:
https://simplifiedprivacy.com/they-see-everything/index.html
But even if you go with another option, I hope you digest my core message:
you've got way more control than you think.
nostr:naddr1qqgr2wfnvdskywfhvvcnqdnyx93nqq3q8dlusgmprudw46nracaldxe9hz4pdmrws8g6lsusy6qglcv5x48sxpqqqp65ws2gfw8
