• Suddenly unable to log into your ZooVille account? This might be the reason why: CLICK HERE!

Online Security

Oldman

Moderator
Staff member
GENERAL POSTING

1. Do not use an identifiable avatar. This includes faces, tattoos, fursuits (especially if they are not yours)

2. Review every picture, every video you post multiple times. Look for identifiable things; houses, barns, unique saddles, collars with or without tags, pictures, furniture, mail, packages, collectibles, mirrors or anything can reflect your face or body, absolutely anything that can be used as identification.

3. If you have a unique pet, be very, very careful. If you have posted normal pictures anywhere, like facebook, twitter, ect., do not post him here or anywhere zoo themed. Even if you delete the social media pics, it's too late. ( Familiarize yourself with Reverse Image Search, what it is, and how it can be used against you )

4. Be careful with the information you post. Anyone with enough patience can piece together little things through pictures, descriptions, email addresses, anything to pinpoint who you are.

5. Use an email that is not attached to anything. Do not use real name, and do not setup a password recovery phone number or alternate email. Make yourself an absolute stand alone free email account and do not use it for anything else but zoo. Not even furry or fursuit related sites or accounts.




ONLINE SECURITY

1. Public IP addresses can be used to track your general location. We Recommend a VPN service like Nord VPN to mask your IP. ALWAYS USE VPN!

2. Use Strong Passwords on your ZooVille Account.

3. Whatsapp and Discord are NOT recommended services for private off-site chat. They have been known to be leaked and report info on users.

4. Telegram and Signal are considered safe in of themselves, however always used a VPN when logging onto telegram and also be wary of phishing for your IP address with external HTML links. This has been used before to catch users NOT using VPN on telegram or Signal.

5. Public telegram links to group chats are allowed here on zooville if you own a group (see site rules), however be aware that bestiality is illegal in many countries. Law enforcement can phish users out into private chats is a common way to trace and doxx your identity. TRUST and RESPONSIBILITY is on your hands for whomever private chats you join.
 
-encrypt your stuff even if you dont have anything illegal
-if youre going to meet someone do years of personal research and never meet for sexual reasons in the first place
-never post sexual pics online for a group or a forum
-never share sexual pics where you or your animals could be identified
-never share personal content if you havent met irl and are sure about each others intentions

maybe one can break of or two above but not all
 
GENERAL POSTING

1. Do not use an identifiable avatar. This includes faces, tattoos, fursuits (especially if they are not yours)

2. Review every picture, every video you post multiple times. Look for identifiable things; houses, barns, unique saddles, collars with or without tags, pictures, furniture, mail, packages, collectibles, mirrors or anything can reflect your face or body, absolutely anything that can be used as identification.

3. If you have a unique pet, be very, very careful. If you have posted normal pictures anywhere, like facebook, twitter, ect., do not post him here or anywhere zoo themed. Even if you delete the social media pics, it's too late. ( Familiarize yourself with Reverse Image Search, what it is, and how it can be used against you )

4. Be careful with the information you post. Anyone with enough patience can piece together little things through pictures, descriptions, email addresses, anything to pinpoint who you are.

5. Use an email that is not attached to anything. Do not use real name, and do not setup a password recovery phone number or alternate email. Make yourself an absolute stand alone free email account and do not use it for anything else but zoo. Not even furry or fursuit related sites or accounts.




ONLINE SECURITY

1. Public IP addresses can be used to track your general location. We Recommend a VPN service like Nord VPN to mask your IP. ALWAYS USE VPN!

2. Use Strong Passwords on your ZooVille Account.

3. Whatsapp and Discord are NOT recommended services for private off-site chat. They have been known to be leaked and report info on users.

4. Telegram and Signal are considered safe in of themselves, however always used a VPN when logging onto telegram and also be wary of phishing for your IP address with external HTML links. This has been used before to catch users NOT using VPN on telegram or Signal.

5. Public telegram links to group chats are allowed here on zooville if you own a group (see site rules), however be aware that bestiality is illegal in many countries. Law enforcement can phish users out into private chats is a common way to trace and doxx your identity. TRUST and RESPONSIBILITY is on your hands for whomever private chats you join.

Thank you so much for your knowledge...not just for anyone, but everyone visiting foreign sites outside there own country....many out there to enjoy safe in a secure playing field. Like to see more safety measures taken for everyone's enjoyment. This is a special place where reality is real sensitive opening secrets will hold. Again, thank you!
 
When I was younger and dumber I would just straight up google horse dicks with no VPN/encryption lol.

I use TOR browser for anything Zoo related now but I don't have dedicated VPN like Nord. Will I be fine for the most part just using an encrypted browser like TOR for browsing ZV?.

Thanks for the info.
 
When I was younger and dumber I would just straight up google horse dicks with no VPN/encryption lol.

I use TOR browser for anything Zoo related now but I don't have dedicated VPN like Nord. Will I be fine for the most part just using an encrypted browser like TOR for browsing ZV?.

Thanks for the info.
As long as there is. Thing here that can be used to identify you and you don't have anything revealing your hardware specifications you should be fine. But if you don't know what I mean by hardware specifications then try looking into a virtual system (if I am remembering that right).
 
As long as there is. Thing here that can be used to identify you and you don't have anything revealing your hardware specifications you should be fine. But if you don't know what I mean by hardware specifications then try looking into a virtual system (if I am remembering that right).
Yes I'm aware of virtual machines. After reading a load of threads on Reddit I've come to the conclusion that a VPN is not required while using a Tor browser and it can actually compromise your privacy as some VPN companies can log your browsing data on Tor. :/
 
When I was younger and dumber I would just straight up google horse dicks with no VPN/encryption lol.

I use TOR browser for anything Zoo related now but I don't have dedicated VPN like Nord. Will I be fine for the most part just using an encrypted browser like TOR for browsing ZV?.

Thanks for the info.
Tor Browser is the safest available method. It is built on Firefox ESR and highly customized to protect you in ways a standard browser can't. But web browsers all have flaws, so it's still possible to find and exploit those flaws to escape the browser to the host operating system and reveal who you are. The way to mitigate that possibility is to increase the security level in Tor Browser from 'Standard' to 'Safer' or 'Safest' and try to put up with websites being kind of messed up. It varies from site to site.

If you're really concerned about that kind of intrusion, you have to run Tor Browser in a disposable environment like TAILS or Qubes-whonix. TAILS is easy, Qubes is hard. Try TAILS sometime if you haven't, it's pretty nice.
Yes I'm aware of virtual machines. After reading a load of threads on Reddit I've come to the conclusion that a VPN is not required while using a Tor browser and it can actually compromise your privacy as some VPN companies can log your browsing data on Tor. :/
It's more nuanced than that. Combining Tor with a VPN hurts performance, offers little to no extra protection, and is only useful in rare circumstances. There are two combinations. The "X" marks a connection that is outside the Tor network and not protected by Tor:


(You) <---> (VPN) <---> (Tor) <-x-> (Website)

In this case, the VPN provider is not able to read your Tor traffic. Your connection to Tor is highly resistant to man-in-the-middle attacks. This is one of Tor's most important features because it enables you to use internet connections you don't trust.

Maybe do this if your local network is blocking Tor traffic but not VPN connections, and only after trying to connect to Tor directly with an unpublished Tor Bridge first.

Maybe do this if you're unable to turn off WebRTC without breaking a website you want to use. Certain functions in WebRTC can leak your real IP, so in that case a VPN could offer a little bit of protection. This only applies other browsers you are connecting to Tor by proxy, which you should never do unless absolutely forced, and to Tor Browsers on iOS which all have to use Apple's Safari browser underneath.


(You) <---> (Tor) <-x-> (VPN) <-x-> (Website)

In this case, the VPN provider is able to read your Tor traffic, because it has already left the Tor network. However, the VPN will only see that it is traffic coming from a Tor exit node, and the VPN will know who you are because you subscribed to them. Some VPNs like Mullvad allow anonymous signup and payment. The content of your traffic could reveal enough personal information for others to deanonymize you.

Doing this is a bad idea and the need for it is very rare. Basically it's a way to hide the fact you're using Tor from a website that blanket blocks connections from Tor exit nodes, since exit nodes are well known. However you lose some anonymity because your traffic is more unique and interesting. To an outside observer, you are no longer a Tor user with traffic coming from a Tor exit node like all the others, you're a VPN user with regular traffic on one side and Tor traffic on the other. That's not great.

In either case you are creating nested TCP connections, which can be very finicky and slow.

?
 
Last edited:
Tor Browser is the safest available method. It is built on Firefox ESR and highly customized to protect you in ways a standard browser can't. But web browsers all have flaws, so it's still possible to find and exploit those flaws to escape the browser to the host operating system and reveal who you are. The way to mitigate that possibility is to increase the security level in Tor Browser from 'Standard' to 'Safer' or 'Safest' and try to put up with websites being kind of messed up. It varies from site to site.

If you're really concerned about that kind of intrusion, you have to run Tor Browser in a disposable environment like TAILS or Qubes-whonix. TAILS is easy, Qubes is hard. Try TAILS sometime if you haven't, it's pretty nice.

It's more nuanced than that. Combining Tor with a VPN hurts performance, offers little to no extra protection, and is only useful in rare circumstances. There are two combinations. The "X" marks a connection that is outside the Tor network and not protected by Tor:


(You) <---> (VPN) <---> (Tor) <-x-> (Website)

In this case, the VPN provider is not able to read your Tor traffic. Your connection to Tor is highly resistant to man-in-the-middle attacks. This is one of Tor's most important features because it enables you to use internet connections you don't trust.

Maybe do this if your local network is blocking Tor traffic but not VPN connections, and only trying to connect to Tor directly with an unpublished Tor Bridge first.

Maybe do this if you're unable to turn off WebRTC without breaking a website you want to use. Certain functions in WebRTC can leak your real IP, so in that case a VPN could offer a little bit of protection. This only applies other browsers you are connecting to Tor by proxy, which you should never do unless absolutely forced, and to Tor Browsers on iOS which all have to use Apple's Safari browser underneath.


(You) <---> (Tor) <-x-> (VPN) <-x-> (Website)

In this case, the VPN provider is able to read your Tor traffic, because it has already left the Tor network. However, the VPN will only see that it is traffic coming from a Tor exit node from a Tor user, not necessarily that it is you. The content of your traffic could reveal enough personal information to deanonymize you.

Doing this is a bad idea and the need for it is very rare. Basically it's a way to hide the fact you're using Tor from a website that blanket blocks connections from Tor exit nodes, since exit nodes are well known. However you lose some anonymity because your traffic is more unique and interesting. To an outside observer, you are no longer a Tor user with traffic coming from a Tor exit node like all the others, you're a VPN user with regular traffic on one side and Tor traffic on the other. That's not great.

In either case you are creating nested TCP connections, which can be very finicky and slow.

?

You are a smart cookie!. You have explained it way better than the plebs on Reddit hehe. I'll just be sticking with Tor for now then and slap it on "safe" mode.

Thank you! :husky_wink:
 
Hi all.
I'm concerned about our online safety and would like suggestions or advice we can all share.
I currently use Tor on it's safest settings.
No other VPN or routing.
 
I segregate all my online identities heavily, I adopt slightly different typing styles per identity, I use tor and VPNs where and whenever possible, a proper firewall to prevent leaks, separate machines for separate identities. I'm full blown tinfoil paranoid but its more just a fun time practicing hardcore opsec. I'm very glad this place does not ban tor but kind of upsetting they don't have an onion or eepsite I know of.
 
I segregate all my online identities heavily, I adopt slightly different typing styles per identity, I use tor and VPNs where and whenever possible, a proper firewall to prevent leaks, separate machines for separate identities. I'm full blown tinfoil paranoid but its more just a fun time practicing hardcore opsec. I'm very glad this place does not ban tor but kind of upsetting they don't have an onion or eepsite I know of.
When you consider the implications of being outed, I'd say the tinfoil hat is required when you're unsure of the situation.
 
Please check out these two threads.


The onion address works kind of weirdly. Maybe if more people request it, it might get fixed.
 
@ThisIsKnotLove I think they do have an onion, when I searched on duckduckgo a while back I inadvertently clicked their onion by accident and wasn't using tor lol edit: @pes' post links to a thread that discusses the onion in question

Damn that's amazing though, wish I had the money and the effort to invest in keeping myself that secure from being outed ?
 
They talking about VPN that keep logs. there are plenty that don't:
rb.gy/ijj2ga
You have to keep in mind that they might *SAY* they keep no logs, but you and I and Joe Average have absolutely no possible way to know whether that's a true statement or not.

Seems to me it was only a few months ago that one of the loudest "We keep no logs" VPNs got smeared all over the web after turning a boatload worth of logs that they supposedly didn't keep over to some police agency or other in connection with a cheeze-pizza investigation, which got a dozen or so persons of interest in several countries questioned, arrested, or both. I'd have to go digging for the details of exactly which one it was, but I do recall some of the commentary from third parties making a big deal of their prior "We keep no logs! Ever!" claims. Not sure, but I'm wanting to say that they went Tango-Uniform as a VPN provider not very long after the news broke. I can't possibly imagine why... <rolls eyes>

My point being, anybody can make any claims they like, but until something like that happens, how does anyone actually *KNOW* that the claim is or isn't true, other than reaching the "who watches the watchmen" point and just throwing up your hands in despair, and taking them at their word 'cause there's simply no way to verify the truth one way or the other?
 
They talking about VPN that keep logs. there are plenty that don't:
rb.gy/ijj2ga
I suggest actually reading the whole 3 articles. "We keep no logs" means nothing if you are legally bound to lie to your customers. The poin behind the articles is that you are merely shifting the trust from one company to another with no guarantee that they tell the truth. And at the same time a vpn provider is more likely to be a honeypot and on top of that they are a money making company. As soon as you become a problem you are worthless for them.
 
I suggest actually reading the whole 3 articles. "We keep no logs" means nothing if you are legally bound to lie to your customers. The poin behind the articles is that you are merely shifting the trust from one company to another with no guarantee that they tell the truth. And at the same time a vpn provider is more likely to be a honeypot and on top of that they are a money making company. As soon as you become a problem you are worthless for them.
Which companies are legally bound to lie to you? Wouldn't this be grounds for a legal case?
 
Which companies are legally bound to lie to you? Wouldn't this be grounds for a legal case?
It's called a gag order, and while repulsive, it is QUITE legal, with a LONG history of use. If they, whoever that happens to be, were to make it known that they were collecting/passing on information while such an order is in place, they'd be hit with penalties that can range from a fine that means little or nothing, to something so nasty it's effectively the same as "We (the cops/FBI/whoever) now own you and all your assets, you're no longer in business, and you may be finding yourself in a prison cell in the not-too-distant future".

SOME places with content that could be considered "questionable" try to do an end-run around it (legality is iffy - some say it's the same as deliberately breaking the order, some claim it's not - sooner or later, it will end up in a court somewhere, and an actual legal determination will come down - for now, it is what it is) by putting up what's often called a "privacy canary" - yes, EXACTLY like the old "canary in the coal mine" - usually in the form of a snippet of text somewhere on the site, usually not screamingly obvious, often, but not always, as the last text at the bottom of the home page, but always placed so that if you go looking, you can find it if it's there. Wording varies, but generally it says something similar to "We have not been served with any sort of gag or surveillance order." If you see such wording on a site, keep an eye on it when you visit in the future - if/when they actually do get hit with such an order, the practice so far is to "kill the canary" - by removing the canary text from the site. If a site that you visit used to have a canary on previous visits, but doesn't on this visit, it's safest to assume that they've been handed some sort of "You WILL snitch to us on your users, and you WILL keep your mouth shut about getting this order" paperwork, and that every byte you send or receive is being logged and handed over, complete with your IP address, to SOMEBODY. Saying "we got a court order" would be breaking the order. Saying who that somebody is would be breaking the order. Killing the canary is in the legal shadow-land, but offers a way to at least throw out a "Heads-up! We've got the cops hanging over our (and therefore your) shoulder - watch what you say!" to their users.
 
When you consider the implications of being outed, I'd say the tinfoil hat is required when you're unsure of the situation.
Maybe not if you stand out you might be followed more, it's good to have a balance instead of being full techo
 
GENERAL POSTING

1. Do not use an identifiable avatar. This includes faces, tattoos, fursuits (especially if they are not yours)

2. Review every picture, every video you post multiple times. Look for identifiable things; houses, barns, unique saddles, collars with or without tags, pictures, furniture, mail, packages, collectibles, mirrors or anything can reflect your face or body, absolutely anything that can be used as identification.

3. If you have a unique pet, be very, very careful. If you have posted normal pictures anywhere, like facebook, twitter, ect., do not post him here or anywhere zoo themed. Even if you delete the social media pics, it's too late. ( Familiarize yourself with Reverse Image Search, what it is, and how it can be used against you )

4. Be careful with the information you post. Anyone with enough patience can piece together little things through pictures, descriptions, email addresses, anything to pinpoint who you are.

5. Use an email that is not attached to anything. Do not use real name, and do not setup a password recovery phone number or alternate email. Make yourself an absolute stand alone free email account and do not use it for anything else but zoo. Not even furry or fursuit related sites or accounts.




ONLINE SECURITY

1. Public IP addresses can be used to track your general location. We Recommend a VPN service like Nord VPN to mask your IP. ALWAYS USE VPN!

2. Use Strong Passwords on your ZooVille Account.

3. Whatsapp and Discord are NOT recommended services for private off-site chat. They have been known to be leaked and report info on users.

4. Telegram and Signal are considered safe in of themselves, however always used a VPN when logging onto telegram and also be wary of phishing for your IP address with external HTML links. This has been used before to catch users NOT using VPN on telegram or Signal.

5. Public telegram links to group chats are allowed here on zooville if you own a group (see site rules), however be aware that bestiality is illegal in many countries. Law enforcement can phish users out into private chats is a common way to trace and doxx your identity. TRUST and RESPONSIBILITY is on your hands for whomever private chats you join.
Tor Browser>>VPN
 
I am using duck go and a VPN....is that safe?
There's only one possible answer without knowing *EXACT* details of both your setup, the internal workings of the VPN provider you use (which nobody but the VPN provider itself can give, and you damn-well better believe they're *NOT* going to do that) and the abilities and funding of anybody who might be trying to monitor your traffic (either before or after it dives into the VPN): Maybe.

There's simply no such thing as an absolutely safe communication method online unless that communication is encrypted using *WELL PROVEN* encryption methods before it leaves your machine, and remains that way until the intended person decrypts it on their machine. And even that has the drawback that there's no way to be absolutely certain that your chosen encryption method hasn't been broken by "somebody" (NSA? CIA? The Russian government? Chinese hackers?)
 
Out of curiosity, other than ostracism , shunnings etc... What are the fines/incarceration? Let's say EU and North America. How bad can it get?

I don't use vpn or nothing on my phone browser Willynilly but I also don't give a fuck what people think of my porn habits. someone explain?

Also echelon makes vpn/tor an imaginary security, like the guy above said, if someone wants to know, they will.
 
Back
Top