Learn how Hackers hide their identities and how you can do the same easily.
Join the channel Telegram of the AnonyViet 👉 Link 👈 |
The rise of bitcoin and the explosion of Cyber Security have raised everyone’s attention. However, the media describes the Hackers as mythical creatures. They do sublime things and look incredibly “easy”. One of the easy things is hiding their identity online. In this article, I will tell the truth and explain how Hackers hide their identity. This is an easy method, but it’s also easy to give up.
Why Hackers have to hide their identity when Online?
Everything on the internet can be tracked. As a result, it’s not too surprising when you think someone will be watching your every move online. In fact, this does not happen in real time: providers (services, products) can collect user behavior and store them for a short period of time. In case something happens, they can look at the logs and check your activities. So don’t worry, no one cares what you do unless you do something bad.
However, Hackers do illegal things quite often. They stop services, steal information, destroy data, etc. So this is the main reason for Hackers to hide their identity when working.
However, online anonymity is not just for hackers. A lot of people decide to hide their identities for a variety of reasons. This is the case with censored governments like China or Russia. But even ordinary people want to remain anonymous Online, as mass user surveillance can be intimidating for some of us.
The Secret of Anonymous Online
It all starts with a cup of coffee…
You don’t get it wrong – it all starts with a cup of coffee or tea, cookies: anything you can get in a small cafe. This is the first, and great, step to being anonymous online. At this point, you’re probably wondering, “What the hell is this guy writing?”, slowly let me explain.
Hacker loves coffee (I have combo coffee + redbull in the evening).
On the Internet, everything is traceable. No matter how hard you try to disguise yourself, a tall person can know your exact physical location. Hackers know that and they don’t want to connect with what they’re trying to do.
If someone tries to follow you, they will only reach the cafe you used to sit in a few hours ago.
This is why Hackers carry out their attacks from cafes. This is not always the case, but it is a really good precaution. If someone tries to spy on you, they will go to the cafe, not your house. Just go to the cafe, you can become anonymous online. In fact, just one cafe is not enough. You need to choose a cafe carefully, and take some extra precautions.
How to choose the right cafe
Not all cafes are created equal. In fact, choosing the right cafe may or may not make you anonymous. A coffee shop is a small enough place, make sure it’s not a chain. It should be managed by a few people who are focused on what they do: creating great cafe experiences. A cafe with a quiet space, where everyone focuses on their work, combined with classical but gentle jazz music, there is nothing like it.
Most likely, they will offer free Wi-Fi. If the cafe was just a small business, they would use their home’s Wi-Fi to provide it to customers. This means that they will have a router that is simply unsecured and, most importantly, no login required.
Someone can identify the cafe, but the cafe cannot identify you.
Avoid any cafe that requires you to sign up for Wi-Fi by email or phone number (this is probably not the case in Vietnam). If you want to stay anonymous, just look for free Wi-Fi, even if the bar asks you to enter your Wi-Fi password, as long as you don’t have to enter your information.
Ideally, a small and cozy place, but away from counters and staff. As a recommendation, never go to the same cafe twice and don’t choose crowded places. Be kind, and act like a normal person.
You might look like a student preparing for an exam on his laptop. Or you look like a photographer editing a photo, but try to look natural. Go to a place where everyone has a laptop, if you don’t want to be the only one in the store using a laptop.
Don’t spoil what you’ve prepared!
Ok, now you are connected to their Wi-Fi. At this point, you may temporarily think that you are anonymous. Now, you don’t want anyone to know that you are accessing the internet from that cafe. So here are a few things not to do.
- Never access your personal email, Facebook account, Google account: they will remember you connected from their cafe.
- Do not use Google Chrome, because it is linked to your Google account and it sends data back to Google.
- Do not log into forums, Online services or anything with your account.
- Never check your Online banking, PayPal, etc. money related services.
This means you will have to disconnect from everything before entering the cafe. You will have to go online with a completely clean computer, this is how you will be completely anonymous when Online.
At this point, the hacker is almost completely anonymous. But it’s a hacker and they want to be 100% sure. This is why Hacker continues to take the next steps.
Hackers use Linux
Windows is a good operating system, but it’s not designed for hacking. Windows is very active in looking for updates, reaching out to Windows servers, and talking to them. The same is true for some of the default Windows apps, as well as some of the apps you already have installed.
When you’re trying to stay anonymous online, you’ll want complete control over that. You want to know what part of your system is trying to access the internet and for what. You also want to determine what has accessed the internet. Actually, you can do it with Windows, but it’s very complicated and annoying.
With Linux, it’s a completely different story. You can customize the application according to your needs and set it to Silent mode. You must have heard it Kali Linuxor Operating Systems Linux helps anonymous Hackers and pre-installed hacking tools. This might be a good option, but a smaller distro might even do the same thing better. In fact, you just want the tools you need.
Hacker’s computer has a very short lifespan
Many Hackers hide their identities using Linux. They come with Lives, a system that can run right on USB without installation but it’s better a Micro-SD card. Every time they start their PC, it will be a blank operating system: a fresh install. When they power off, everything is completely gone. This means:
Every time it powers off, the PC destroys cookies, cache, and everything.
Of course, you need to use an additional drive such as a USB to store what you need to save. But keep it to a minimum and never install the operating system.
If you don’t do it this way, someone could use cookies to track your activity. If you go home and connect to your account, the cookie will identify you as the person in the cafe. With the Live version, you can avoid that.
Delete your session!
Even if you delete your cookies after you’re done, add extra security. If you use cookies during the hack and delete them later, people can still follow those steps. They may even have a better idea of what you did and this could reveal your behavior.
Hackers don’t want danger and they will disable cookies. They never store it. So they added this trick to the Live.
Change MAC address
MAC Address is a unique identifier for your network card, even a Wi-Fi card. This identifier has a simple purpose: it allows your PC to chat over the network. Its purpose is not to identify you, but someone can use it that way. In fact, there is no database linking the MAC address to the owner of the device.
However, in the event someone gains access to your PC – or more simply, to your network – they can determine your MAC address. That person can attack you and you have already lost. The solution for this is very simple, you just need to change your MAC address.
Hackers change their MAC address to be truly anonymous online.
Now, home routers no longer store MAC addresses and login traffic. They only track them during your use and about 10 minutes after you leave. So you don’t have to hide your MAC address in such a network, but is that pretty safe? Hackers really can’t take this risk and they don’t want to.
Hackers in the dark
At this point, you’re close to what’s called anonymity. They can only find you in real time. This means someone has to follow you while you’re hacking and go to the cafe while you’re still there.
If the hacker is doing something really illegal, this can happen. This is why they try to hide their geolocation as much as possible. This article is about staying anonymous online, and I explained it. However, I can give you some hints on how Hackers hide their geolocation.
To hide geolocation, Hackers use intermediary and encrypted networks. They use three ways and combine them for greater effect.
- Proxies: They ask the remote server to fetch the web page results on their behalf.
- VPNs: They direct all traffic to a server, which then connects to the internet on their behalf.
- Tor: is a series of dynamic connections between nodes that are virtually anonymous.
Using each method will make your connection slower. Whatever you do, never start with Tor. If an intermediary node is trying to get your geolocation, you will be detected before you know it. For proxy or VPN, pay with bitcoin. You don’t want to be tracked for paying for a VPN. If you combine both Tor and VPN to connect will increase the ability to be more anonymous.
Conclusion
This is how Hackers are anonymous when Online. Without much effort, you can do the same thing: protect your privacy and identity. What do you think about online anonymity? What precautions would you use? How do you use this knowledge? (Source: ictshore).