Services like Telegram require a phone number for verification but giving out your personal phone number is a very risky proposition and a violation of your privacy. All it takes is one wrong move and your number is out in the public eye. It doesn't take long from there to link a phone number to an identity and then to a face.
To avoid all of this I highly recommend none of you use Telegram with your real phone number. There are a million different ways to gain access to another phone number for long enough to validate your Telegram account. Once validated you will never need access to this number again.
Below are some links to places where you could get a throw away phone number for Telegram and other services...
Burner App: https://www.burnerapp.com
Mint SIM: https://www.amazon.com/Mint-Mobile-Starter-Verify-Compatibility/dp/B0786RD524
Google Voice: https://voice.google.com/
Free SMS: https://quackr.io/
Free SMS: https://smsreceivefree.com/
SMS for Bitcoin: https://smsprivacy.org/
To avoid all of this I highly recommend none of you use Telegram with your real phone number. There are a million different ways to gain access to another phone number for long enough to validate your Telegram account. Once validated you will never need access to this number again.
Below are some links to places where you could get a throw away phone number for Telegram and other services...
Burner App: https://www.burnerapp.com
Mint SIM: https://www.amazon.com/Mint-Mobile-Starter-Verify-Compatibility/dp/B0786RD524
Google Voice: https://voice.google.com/
Free SMS: https://quackr.io/
Free SMS: https://smsreceivefree.com/
SMS for Bitcoin: https://smsprivacy.org/
Burnerapp
Get Temporary Phone Numbers for Privacy & Calls - Burner
Use a temporary phone number and get a 7-day free phone number trial, now with unlimited calling and texting! Sign-up today!
👍2
Whether or not your identity has been compromised you should consider a credit freeze.
Why: Unless you are going to be applying for a credit card or loan in the very near future it is advisable to place a credit freeze on your account at the three credit bureaus (Experian, Equifax, and TransUnion). This will protect you from someone trying to steal your identity and open lines of credit in your name which can take a lot of time and money to recover from.
Thanks to Federal law it is required that these credit bureaus provide you with the free ability to place such a credit freeze on your account and it can be done very easily online or over the phone. Links and phone numbers provided at the bottom of this message.
A credit freeze trumps all forms of credit monitoring and can even be placed on your kids credit too. Your job is to protect and provide for them so this is a logical step in protecting your kids whom are often the targets of identity theft from these criminal scumbags.
Another note: if at any point you need to apply for a line of credit these companies offer you the ability to temporarily release this credit freeze.
Experian Credit Freeze Link: https://www.experian.com/freeze/center.html
888-EXPERIAN (888-397-3742)
Equifax Credit Freeze Link: https://www.equifax.com/personal/credit-report-services
800-685-1111
TransUnion Credit Freeze Link: https://www.transunion.com/credit-freeze
888-909-8872
Why: Unless you are going to be applying for a credit card or loan in the very near future it is advisable to place a credit freeze on your account at the three credit bureaus (Experian, Equifax, and TransUnion). This will protect you from someone trying to steal your identity and open lines of credit in your name which can take a lot of time and money to recover from.
Thanks to Federal law it is required that these credit bureaus provide you with the free ability to place such a credit freeze on your account and it can be done very easily online or over the phone. Links and phone numbers provided at the bottom of this message.
A credit freeze trumps all forms of credit monitoring and can even be placed on your kids credit too. Your job is to protect and provide for them so this is a logical step in protecting your kids whom are often the targets of identity theft from these criminal scumbags.
Another note: if at any point you need to apply for a line of credit these companies offer you the ability to temporarily release this credit freeze.
Experian Credit Freeze Link: https://www.experian.com/freeze/center.html
888-EXPERIAN (888-397-3742)
Equifax Credit Freeze Link: https://www.equifax.com/personal/credit-report-services
800-685-1111
TransUnion Credit Freeze Link: https://www.transunion.com/credit-freeze
888-909-8872
Experian
Freeze or Unfreeze Your Credit File for Free - Experian
A security freeze, often known as a credit freeze, will limit access to your Experian credit report. Here’s how to freeze and unfreeze your Experian credit report for free.
To truly stop your cell phone from tracking you, you must remove the battery. Many new phones feature a unibody design making battery removal near impossible.
To eliminate tracking without removing the battery try a faraday bag.
Faraday bags completely block all signals to and from your devices including Bluetooth and WiFi.
I typically power my cell phone down, and place it in the faraday bag any time I leave my home to avoid tracking. Texting and calling via Signal also works quite well on an iPod touch and they do not contain cell phone or gps capabilities.
https://silentpocket.com offers some great faraday bags.
To eliminate tracking without removing the battery try a faraday bag.
Faraday bags completely block all signals to and from your devices including Bluetooth and WiFi.
I typically power my cell phone down, and place it in the faraday bag any time I leave my home to avoid tracking. Texting and calling via Signal also works quite well on an iPod touch and they do not contain cell phone or gps capabilities.
https://silentpocket.com offers some great faraday bags.
SLNT®
SLNT® Faraday Bags
At SLNT, we create Faraday bags & RFID wallets trusted by Google, and US Army that effortlessly fit into your daily routine for continuous data protection.
PGP encryption has a rather steep learning curve, but its AES-256 encryption has not been publicly known to be crackable by adversaries with seemingly infinite resources at their disposal, such as the NSA. Take some time to practice using PGP, and use it to encrypt all communications with sensitive information. In any case, the use of strong encryption impedes the enemy's efforts at datamining and subverting us.
https://theprivacyguide.org/tutorials/pgp.html
https://theprivacyguide.org/tutorials/pgp.html
Forwarded from /pol/ news archive
>Collects your search engine inputs
>Collects DNA analysis through 23andme
>Spies on your phone and TV
>Collects Personal health data
>Tries to rig elections
>Controls the information flow
>Bans anyone who doesn't bend the knee to (((PC politics)))
Tyranny with pretty colors and a smile on its face.Source
Archive
#Google #Health #US
Forwarded from /pol/ news archive
The Tech giant reportedly teamed up with St. Louis-based Ascension, the largest non-profit health system in the country, last year, and the data sharing has accelerated since summer.
Code-named Nightingale, the project saw both companies collect personal data from patients, which included lab results, doctor diagnoses, and hospitalization records, as well as patient names and dates of birth.
Google said it plans to use the data to create new software that will improve patient care and suggest changes to their care.
Patients and doctors were not notified that their data is being shared, and did not give their consent, according to the report.
One individual who was familiar with the project told the Journal that at least 150 Google employees already have access to much of the data on tens of millions of patients.
Code-named Nightingale, the project saw both companies collect personal data from patients, which included lab results, doctor diagnoses, and hospitalization records, as well as patient names and dates of birth.
Google said it plans to use the data to create new software that will improve patient care and suggest changes to their care.
Patients and doctors were not notified that their data is being shared, and did not give their consent, according to the report.
One individual who was familiar with the project told the Journal that at least 150 Google employees already have access to much of the data on tens of millions of patients.
Daily reminder to never talk to the police for any reason. The statement "everything you say can and will be used against you in a court of law" is something you should take seriously. Don't resist arrest or act in a way that will give them the opportunity to press further charges against you. If stopped by police, only give information that is required by law (typically full name, D.O.B., and address). Tell them for any further questions to contact your lawyer. It's not a bad idea to have one on retainer.
It's vital to remember that police – detectives in particular – are trained to extract information out of people. No matter how innocuous the question may appear, they are there to use whatever tactic they can to make you say something that could be perceived as an incriminating statement. Do not try to outsmart them by going along with their questions to try and figure out how much they know. Just shut your mouth, regardless of any personal guilt or innocence. Loose lips sink ships.
It should be noted that law enforcement is not inherently evil, but as long as they enforce anti-White laws and policies, they should be treated as an enemy. Everyone who works for the current System (without sabotaging it internally) in any capacity are traitors. Cops are people who volunteer to enforce tyrannical and oppressive laws against their own people for a cushy government paycheck.
Remember that one day all of our people's traitors will be held responsible for their crimes... and only Whites died on the Day of the Rope.
https://invidio.us/watch?v=d-7o9xYp7eE
It's vital to remember that police – detectives in particular – are trained to extract information out of people. No matter how innocuous the question may appear, they are there to use whatever tactic they can to make you say something that could be perceived as an incriminating statement. Do not try to outsmart them by going along with their questions to try and figure out how much they know. Just shut your mouth, regardless of any personal guilt or innocence. Loose lips sink ships.
It should be noted that law enforcement is not inherently evil, but as long as they enforce anti-White laws and policies, they should be treated as an enemy. Everyone who works for the current System (without sabotaging it internally) in any capacity are traitors. Cops are people who volunteer to enforce tyrannical and oppressive laws against their own people for a cushy government paycheck.
Remember that one day all of our people's traitors will be held responsible for their crimes... and only Whites died on the Day of the Rope.
https://invidio.us/watch?v=d-7o9xYp7eE
You never know when you might get yourself vanned or randomly attacked in a chimp out.
For instances like this we have dead man switches. If you’re unable to relay an important message for any reason this tool will make sure that your message gets out.
Behold: https://komprom.at/
Or if you prefer the onion service: http://up3hqp37oe7cqufn.onion/
Note you will need JavaScript for the onion service to work.
For instances like this we have dead man switches. If you’re unable to relay an important message for any reason this tool will make sure that your message gets out.
Behold: https://komprom.at/
Or if you prefer the onion service: http://up3hqp37oe7cqufn.onion/
Note you will need JavaScript for the onion service to work.
When you want to ensure your computer activities leave no trace on your computer, try Tails (https://tails.boum.org/). Tails is live booted on a computer on a CD or USB stick. As it runs in your computer's RAM, and shuts itself down automatically when physically removed in the case of an emergency, it cannot leave evidence on your computer's hard drive (unless you choose it to).
Tails by design is intended for anyone to use it with ease. This is a particularly useful tool for any activist who seeks to speak out online anonymously through Tor, but is not technologically adept enough to utilize and/or does not have the resources to dedicate a computer to run Whonix (https://www.whonix.org/).
Tails by design is intended for anyone to use it with ease. This is a particularly useful tool for any activist who seeks to speak out online anonymously through Tor, but is not technologically adept enough to utilize and/or does not have the resources to dedicate a computer to run Whonix (https://www.whonix.org/).
Forwarded from Opsec matters (Anshul)
Don't trust USB charging stations!
LA officials publish warning about the dangers of using public USB charging stations -- as they can hide malware
Their advice:
- use the AC charging socket, not the USB one
- bring your own USB charger from home
- use a cheap usb cable that doesn't support data transfer
Officials warn about the dangers of using public USB charging stations
via www.zdnet.com
forwarded from Digital Monkey Business
LA officials publish warning about the dangers of using public USB charging stations -- as they can hide malware
Their advice:
- use the AC charging socket, not the USB one
- bring your own USB charger from home
- use a cheap usb cable that doesn't support data transfer
Officials warn about the dangers of using public USB charging stations
via www.zdnet.com
forwarded from Digital Monkey Business
Telegraph
Officials warn about the dangers of using public USB charging stations
Travelers are advised to avoid using public USB power charging stations in airports, hotels, and other locations because they may contain dangerous malware, the Los Angeles District Attorney said in a security alert published last week. USB connections were…
A good way to prevent passive mass surveillance of your messages and emails is to use a website such as https://privatebin.net or https://privnote.com. These services encrypt your own self-destructing messages locally in your browser to be sent to your intended recipient.
It should be noted that third party websites should not be trusted to encrypt sensitive information. Both of the listed websites also use JavaScript to encrypt your messages, which is notoriously awful when it comes to exploits and vulnerabilities.
Everyone's threat model looks different. I personally only use this to relay information that is not overly confidential (in case the websites are compromised), my recipient does not use a trusted encryption method (such as PGP), and that I feel the surveillance on all members of the conversation is passive enough that we will all view and destroy the message before any adversary will have a chance to read it.
It should be noted that third party websites should not be trusted to encrypt sensitive information. Both of the listed websites also use JavaScript to encrypt your messages, which is notoriously awful when it comes to exploits and vulnerabilities.
Everyone's threat model looks different. I personally only use this to relay information that is not overly confidential (in case the websites are compromised), my recipient does not use a trusted encryption method (such as PGP), and that I feel the surveillance on all members of the conversation is passive enough that we will all view and destroy the message before any adversary will have a chance to read it.
Privnote
Privnote - Send notes that will self-destruct after being read
Share a confidential note via a web link that will self-destruct after it is read by your intended recipient.
De-anonymization (known in many online circles as doxing [from dox, abbreviated from documents. "Doxxing" is not the correct spelling]) is possible through connections and IP addresses but also via social threats.
Do not disclose identifying data online. Here are some simple tips on what NOT TO DO:
-include personal information or interests in usernames
-discuss personal information such as location, age, marital status, etc. Over time, discussions over inane topics like the weather could lead to an accurate idea of the user's location
-mention your sex, tattoos, physical capacities, disabilities
-mention hobbies, profession, or involvement in activist groups
-use special characters on your keyboard that only exist in your łåñĝűāĝę
-use Twitter, Facebook, and other social media networks at the same time
-post Facebook images without renaming the image. The image name contains a personal ID
-repeatedly connect online at the same time of day or night, which will show a pattern of work/sleep schedules
-forget that these chats are public arenas and have antifa/feds/other anti-Whites lurking around collecting every public post you make
-discuss anything personal whatsoever, even when securely and anonymously connecting with a group of strangers
->the group recipients are a potential hazardous risk ("known unknowns") and may be forced to work against you
->it only takes one informant to destroy a group
Most importantly, never forget that we are actively targeted because of what we are and what we seek: namely, the continued existence of our people.
I know most White people do not want to take sides in this war. Most just want to pretend that there is no war and get on with their lives. It's easier to follow the lead of the media and regard Timothy McVeigh, and Brenton Tarrant, and everyone else who takes a stand against our genocidal governments as monsters rather than soldiers fighting for our race in a holy war. But there is a war. This war has been going on since the Capitalists proved their allegiance to the Communists in WWII, and has been going on ever since. And in this war, the rule is: Whatever is good for our people is good, and whatever harms our people is evil. That is the morality of survival. Everything else comes second.
Do not disclose identifying data online. Here are some simple tips on what NOT TO DO:
-include personal information or interests in usernames
-discuss personal information such as location, age, marital status, etc. Over time, discussions over inane topics like the weather could lead to an accurate idea of the user's location
-mention your sex, tattoos, physical capacities, disabilities
-mention hobbies, profession, or involvement in activist groups
-use special characters on your keyboard that only exist in your łåñĝűāĝę
-use Twitter, Facebook, and other social media networks at the same time
-post Facebook images without renaming the image. The image name contains a personal ID
-repeatedly connect online at the same time of day or night, which will show a pattern of work/sleep schedules
-forget that these chats are public arenas and have antifa/feds/other anti-Whites lurking around collecting every public post you make
-discuss anything personal whatsoever, even when securely and anonymously connecting with a group of strangers
->the group recipients are a potential hazardous risk ("known unknowns") and may be forced to work against you
->it only takes one informant to destroy a group
Most importantly, never forget that we are actively targeted because of what we are and what we seek: namely, the continued existence of our people.
I know most White people do not want to take sides in this war. Most just want to pretend that there is no war and get on with their lives. It's easier to follow the lead of the media and regard Timothy McVeigh, and Brenton Tarrant, and everyone else who takes a stand against our genocidal governments as monsters rather than soldiers fighting for our race in a holy war. But there is a war. This war has been going on since the Capitalists proved their allegiance to the Communists in WWII, and has been going on ever since. And in this war, the rule is: Whatever is good for our people is good, and whatever harms our people is evil. That is the morality of survival. Everything else comes second.
❤🔥3
Concerned that someone may be listening in to your cell phone’s microphone without your permission?
There are countless spy programs out there to allow others to remotely listen in on your phone at any time.
If you’re using Android and carelessly install apps you are at greater risk for this sort of spying.
But most of us are vulnerable to the spying capabilities of the alphabet soup agencies of both foreign and domestic governments.
In the event you think that your device may be, or may become compromised, it is advised to desolder the microphone within your device.
From there you can purchase a splitter like this:
https://www.amazon.com/gp/product/B004SP0WAQ
Then purchase a lapel microphone like this...
https://www.amazon.com/gp/aw/d/B07M6JBJ1G/
Plug in your head phones and you’re ready to go. Now any time you don’t want to be spied on simply remove the splitter from your headphone jack on your phone. Since your internal mic is gone you’re safe.
Note: There may also be a microphone specifically for your camera when recording videos.
There are countless spy programs out there to allow others to remotely listen in on your phone at any time.
If you’re using Android and carelessly install apps you are at greater risk for this sort of spying.
But most of us are vulnerable to the spying capabilities of the alphabet soup agencies of both foreign and domestic governments.
In the event you think that your device may be, or may become compromised, it is advised to desolder the microphone within your device.
From there you can purchase a splitter like this:
https://www.amazon.com/gp/product/B004SP0WAQ
Then purchase a lapel microphone like this...
https://www.amazon.com/gp/aw/d/B07M6JBJ1G/
Plug in your head phones and you’re ready to go. Now any time you don’t want to be spied on simply remove the splitter from your headphone jack on your phone. Since your internal mic is gone you’re safe.
Note: There may also be a microphone specifically for your camera when recording videos.
👍2❤1
Hopefully none of you are using (((WhatsApp))) at this point.
WhatsApp Confirms a New Threat; Android And iOS Users at Risk From Malicious Video Files
https://www.solutionfactory.in/whatsapp-confirms-a-new-threat.html
WhatsApp Confirms a New Threat; Android And iOS Users at Risk From Malicious Video Files
https://www.solutionfactory.in/whatsapp-confirms-a-new-threat.html
Sharing screenshots can be really bad opsec. If you’re not careful you can reveal missing bits of information that can help narrow down or confirm your identity such as...
1. Your time zone. If you post a screenshot and your clock says 3:14PM and you’ve posted the screen shot at 5:14PM my time then I know you’re likely 2 hours behind me.
2. The make/model of your device. Judging by the contents on the screen one could identify your make and model of your device which could later be used to tailor an exploit specifically to your device.
3. Your name, number, friends, location, etc... depending on the details within the screen shot you may be giving away friends real names, your real name, number, or location.
4. The resolution of the image may be used to identify or narrow down the device used to take the screen shot.
5. Active services on your phone. This can let the enemy know things like what email provider you use and what apps you use.
6. If the battery was recently charged judging by the battery percentage one could get the assumption that you’ve just woke up not long before. This establishes the beginning of mapping out your daily routine.
Tips...
Posting screen shots is a bad idea. If you must do it, always at the bare minimum crop out the info bar at the top of the screen and show only the required information.
Posting screenshots that aren’t yours while pretending they are can be great opsec. Keep in mind the time of the screenshot vs when you’re posting it.
1. Your time zone. If you post a screenshot and your clock says 3:14PM and you’ve posted the screen shot at 5:14PM my time then I know you’re likely 2 hours behind me.
2. The make/model of your device. Judging by the contents on the screen one could identify your make and model of your device which could later be used to tailor an exploit specifically to your device.
3. Your name, number, friends, location, etc... depending on the details within the screen shot you may be giving away friends real names, your real name, number, or location.
4. The resolution of the image may be used to identify or narrow down the device used to take the screen shot.
5. Active services on your phone. This can let the enemy know things like what email provider you use and what apps you use.
6. If the battery was recently charged judging by the battery percentage one could get the assumption that you’ve just woke up not long before. This establishes the beginning of mapping out your daily routine.
Tips...
Posting screen shots is a bad idea. If you must do it, always at the bare minimum crop out the info bar at the top of the screen and show only the required information.
Posting screenshots that aren’t yours while pretending they are can be great opsec. Keep in mind the time of the screenshot vs when you’re posting it.
If you're interested at all in learning more about governments spying on their own citizens and mass surveillance, watch Edward Snowden in Citizenfour.
https://invidio.us/watch?v=EDhB-A23IUk
https://invidio.us/watch?v=EDhB-A23IUk