Online Security

Just witnessed an awakening of zoophilia amongst a group of "normal" people, but I had to take a step back as their opsec was terrible, they were far too open abou it and on the wrong platform.
I am in a meme/joke group on facebook, nothing that would get you sacked and i was on my normal profile under my real name, and normally its quite tame, but funny.

Last week someone posted a video of a fisherwoman getting dildoed from a guy with a trout and most of the group went nuts for it wanting more, so then others posted videos of mice being inserted, and it exploded from there, some other shock videos, but a lot of common zoo porn, women being penetrated by willing animals.
There was a lot of 30 day bans handed out by facebook, and a couple of whatsapp groups were started for sharing zoo porn. It seemed to awaken something in a lot of people, and more women than men which was surprising, but they were all too naive about security and anonimity, they were on their personal fb profiles. A small number of people were disgusted.
Nobody seemed to be aware that posting that was illegal in the uk, I pointed out that it was illegal and the penalties, and that some of the stuff was outright animal cruelty, then I left the group and cleared my cache, purely because these idiots are going to get a lot of people caught, and the penalties in the uk for just possesing zoo porn are quite severe, and even once you have finished your sentence newspapers and anti zoo groups track people down and pressure employers to sack convicted zoos.
It was a pleasant surprise to see how many regular people were turned on by zoo porn though, it gives me hope we might one day be accepted.
Part of me wants to go in and tell them to be a bit more discreet and use secure platforms, but no way am I taking the chance of outing myself.
 
Telegram and Signal are considered safe in of themselves
One thing about the way that is worded.

It makes it sound like there some equivalence. Unfortunately many users of Telegram think all their chats are E2EE (when in fact they are not). Even for secret chats, the cryptographic protocols have not been audited by external cryptographers and are non-standard when compared with battle tested methods such as Double Ratchet.

Signal does still require a phone number, and so does Telegram (unless you use their cryptocurrency bullshit thing). A lot are not smart enough to purchase an anonymous VOIP number with crypto. Best to just stay on Matrix (like beast.chat), particularly as invite codes are only given to members of the forum with some post history.

Another Matrix server may provide increased anonymity, as you can de-associate that from previous activity by regularly rotating identities, having said that though, gaining people's trust may be more difficult if you do that. I would avoid Matrix.org's default server as they have been known to be particularly anal on moderation, (and not the kind we like) particularly when people complain. Fortunately with something like the Matrix protocol, anyone can set up a server (like beast.chat), and it can communicate with other servers in a federated manner, like email providers, not everyone has to be on the same server. There will however be servers (and I think matrix.org may be one of them) which won't support federation to servers like beast.chat.

For VPNs I would stick to those which have had external public audits such as those recommended by Privacy Guides. The reason for this is because the VPN industry spends a lot of money on marketing, astroturfing (getting mouthpieces to pretend to be independent) rather than gaining trust through providing quality and transparency. Typically you can determine this based on if a site has an affiliate program. Tom Scott has a great video on that.

We know that all of Privacy Guide's financial donations go through their OpenCollective org. Any additions to the site go through multiple levels of filtering. Content is generally discussed publicly, drafted, then approved by team members all within public either on their forums or GitHub. They have no affiliate program and seem to pride themselves on that.

I've seen NordVPN mentioned a few times around here, personally I would not use them. They've had a couple of issues in the past, one was an enumeration of accounts, pretty basic mistake that should not have been possible. There were security issues from a RAT. There seems to be a pattern. There is the distinct feeling they spend a lot less money on infrastructure, validation and auditing than they do on marketing. Seem to recall them having television adverts in like 60 countries, yet they cannot afford to validate these things do not happen. They spend a HUGE amount of money trying to game search engine results too.

Brave browser's privacy window, or the built in TOR browser.

There is no substitute for the Tor Browser in regard to fingerprinting, so I would stick to that. There is a warning on Privacy Guides about that, and in fact the Brave website as well.

Just a general note on the Linux recommendations. It's important to have a suitable threat model. Simply using Linux is no better than Windows, unless you're using it for specific reasons. Specific distributions like TAILS have amnesic properties, meaning that no data (recent files etc) is forensically able to be recovered. When you open files in programs they often have "cache" files which may lead an adversary with physical access directly to the content you've been viewing.

Distributions such as Qubes-OS may provide further compartmentalization between activities with disposable virtual machines. Tor support is available through the use of Whonix virtual machines. The way that Qubes-OS and Whonix differ from TAILS is that they contain one virtual machine that is configured to send all traffic through a separate virtual machine running Tor, whereas TAILS uses a firewall and special rules to "pipe" everything into Tor. Qubes, and Whonix can provide increased security against a local threat, such as malware, which is not uncommon in de-anonymization operations these days.

As for "separate laptops", my suggestion is to have a bootable and removable volume that can be entirely removed from the system you use and placed in a hidden place in another room. Obviously using strong encryption like LUKS is a must, but there is no substitute for complete deniability.

Performance can be very good with portable NVMes. The USB 4.0 standard allows for 40Gbit throughput, which you're never going to reach using a web browser.
 
Last edited:
Some further things I noticed in this thread which I thought I'd point out:


That particular neocities website is known for its misinformation and scaremongering, many of the pages contain absolute paranoid misinformation because the author thinks something works in a different way to what it actually does. There is also a lot of incorrect and outdated information there too.

Panama where Nord is based isn't part of 14 eyes either, I imagine they're quicker to kowtow to the US before the Swiss are.

"Eyes" is a common marketing technique by VPN providers. It really is quite irrelevant nowadays. There are worse jurisdictions for privacy than the "eyes" countries. That is why it is best to not place trust in a single entity. That is the premise behind Tor, the circuit contains multiple parties, none of which can de-anonymize you alone, and that stream changes every 120 seconds if no data is being sent.

Do you think IRC chats are good?

No, because there's generally no E2EE.

encrypted online storage solution for media

I'd probably use something like Cryptomator for this, as it has been publicly audited. Be very careful about "web-based E2EE", it's entirely possible for a provider to switch that off for specific accounts should they wish to do so.

How can I strip meta/exif data offline?

There are a number of recommended data redaction tools. There is also a specific guide for mac users.

Some VPN's are know for not masking your DNS, so even with a VPN running, your ISP will have record of you visiting this site.

The recommended ones there will do that, and additionally provide working kill switch functionality to disconnect the connection, rather than fall back to a connection not on the VPN. You should ALWAYS use your VPN provider's DNS servers (which is the default). There is an advanced explanation on that.

Does anyone know the best client for torrents concerning privacy?

There are not any specific clients that are "better" for privacy, except maybe non-commercial ones. Personally I use qBitttorrent, but not for anything zoo specific, and of course I always make sure to use that through a VPN. Tor usage is not possible in most cases with Bittorrent protocol as it does not support UDP. Bittorrent over Tor is not recommended.
 
Last edited:
A nice visualization of HTTP, HTTPS and TOR and what it does for you.
 
i want to start being active here but im held back by the security issues with this site. im posting in here before an introduction lol

im more or less a script kiddy when it comes to internet security and my methods have been adopted less through knowledge and more through observation and misplaced (but lucky?) trust. my fundamental issue is the lack of an onion address and the heavy reliance on javascript (is it a good idea to encourage users to enable their browser to run scripts from a webpage? and also to have content that isnt encrypted?) made this account ages ago but have avoided downloading anything as a result of these kinds of concerns. i wonder if they are valid concerns or just a self fulfilling prophecy or correlation making me think my actions are the cause ("havent been in trouble using my system, therefore it works" is hardly a secure opsec model or a logical argument)? also one of the site sponsors (selling sex toys which seem great - has anyone posted proof they purchased one) seems to be at best a scam at worst a honey pot? (love to be able to post a correction here if it turns out they are reliable and safe - they dont seem active for some time but a competitor to bad dragon realistic toys would be nice) having that on the site seems highly suspect.

many of the comments in this thread alone seem to have people volunteering their own security models on a similar basis to how i justify my own ("havent been arrested yet"). not to say there hasnt been quality advice (someone mentioned that no amount of traffic obfuscation keeps you safe if a government is specifically targetting you which is something im not sure many realize - especially when they have data points like forum posts on a site like this to establish a timing attack). the conclusion there is that just because peoples threat profile mean their security models appear to work doesnt mean they have worked any more than it means they are on a list somewhere.

i write all this not to bring people down but to explain what things look like from where i am sitting. i want to be an active member of this community it seems chill af but do i really have to look over from this side longingly because i wont let my guard down? im thinking the platform zoovilleforum uses is so heavily reliant on javascript that it just doesnt function on an onion address? i know others have asked this before as well and the seeming lack of response along with the removal of the old onion link seems concerning.

and then there is matrix. never have i seen a service recommended because it is so convenient and accessible promoted so heavily in zoo/zeta/beast communities without hearing it mentioned in general public discourse. and again it only seems to work with javascript? anyone got reputable info on matrix from independent organizations that test this stuff out?

i have other security issues (really want to run a secure telegram client but cant figure out how to get a cell number not connected to me (cash purchase of a burner is sadly not an option) that a community like this could help address and make me more comfortable engaging and i really want to make a solid introduction post and contribute to the community in meaningful (not just horny) ways. i just cant while zooville doesnt seem to align with my security model. can anyone give me some comfort that my concerns arent valid or (for everyones safety not just mine) can the staff and mods get onion up and running again, encourage encryption of content uploads and if not remove reliance on javascript then at least discourage it?

i know im asking for a lot given i have so far contributed nothing but i hope my post is taken genuinely not cynically (and that this is the best place for the post).
 
i want to start being active here but im held back by the security issues with this site. im posting in here before an introduction lol

im more or less a script kiddy when it comes to internet security and my methods have been adopted less through knowledge and more through observation and misplaced (but lucky?) trust. my fundamental issue is the lack of an onion address and the heavy reliance on javascript (is it a good idea to encourage users to enable their browser to run scripts from a webpage? and also to have content that isnt encrypted?) made this account ages ago but have avoided downloading anything as a result of these kinds of concerns. i wonder if they are valid concerns or just a self fulfilling prophecy or correlation making me think my actions are the cause ("havent been in trouble using my system, therefore it works" is hardly a secure opsec model or a logical argument)? also one of the site sponsors (selling sex toys which seem great - has anyone posted proof they purchased one) seems to be at best a scam at worst a honey pot? (love to be able to post a correction here if it turns out they are reliable and safe - they dont seem active for some time but a competitor to bad dragon realistic toys would be nice) having that on the site seems highly suspect.

many of the comments in this thread alone seem to have people volunteering their own security models on a similar basis to how i justify my own ("havent been arrested yet"). not to say there hasnt been quality advice (someone mentioned that no amount of traffic obfuscation keeps you safe if a government is specifically targetting you which is something im not sure many realize - especially when they have data points like forum posts on a site like this to establish a timing attack). the conclusion there is that just because peoples threat profile mean their security models appear to work doesnt mean they have worked any more than it means they are on a list somewhere.

i write all this not to bring people down but to explain what things look like from where i am sitting. i want to be an active member of this community it seems chill af but do i really have to look over from this side longingly because i wont let my guard down? im thinking the platform zoovilleforum uses is so heavily reliant on javascript that it just doesnt function on an onion address? i know others have asked this before as well and the seeming lack of response along with the removal of the old onion link seems concerning.

and then there is matrix. never have i seen a service recommended because it is so convenient and accessible promoted so heavily in zoo/zeta/beast communities without hearing it mentioned in general public discourse. and again it only seems to work with javascript? anyone got reputable info on matrix from independent organizations that test this stuff out?

i have other security issues (really want to run a secure telegram client but cant figure out how to get a cell number not connected to me (cash purchase of a burner is sadly not an option) that a community like this could help address and make me more comfortable engaging and i really want to make a solid introduction post and contribute to the community in meaningful (not just horny) ways. i just cant while zooville doesnt seem to align with my security model. can anyone give me some comfort that my concerns arent valid or (for everyones safety not just mine) can the staff and mods get onion up and running again, encourage encryption of content uploads and if not remove reliance on javascript then at least discourage it?

i know im asking for a lot given i have so far contributed nothing but i hope my post is taken genuinely not cynically (and that this is the best place for the post).
I'm pretty sure being a member of this forum is highly unlikely to get you arrested.. !!
 
I'm pretty sure being a member of this forum is highly unlikely to get you arrested.. !!

hi thanks so much for responding! i appreciate your valid reply. im a paranoid fuckwit and "your risk of this happening is not nearly as high as you seem to think" is definitely something that needs to be said to me now and then. so i apologize if the reply i wrote below this disclaimer before adding this explainer/apology seems aggressive or harsh. its not you, its me. (but my points are still valid too)

not just about me, it's anyone using the site and a wide range of risk profiles. even so that is almost half my point. being active here won't get me in trouble but if i get entrapped meeting up with someone for some four legged play or used to get to someone i met for play then the kind of supportive pro-active views i will probably post about will really dig me a hole. id rather not have my own words used against me in court or a doxxing if i can avoid it.

not to go too hard against your point (it's valid, i'm paranoid and very low priority if i even am on someones radar, so dont take my reply personally at all) but is zooville really taking the attitude "it's highly unlikely so we wont do things that are known to provide the lowest possible risk profile for the format"? "you wont be arrested 99.99% sure, trust" might be valid but it wasnt really the basis of my concern. why the weird scam looking sex toy site as advertizer? why javascript? why abandon onion link? all are questions i think are worthy of a reply. the answers may be "no it isnt i bought one here is a picture", "site works without it and javascript exploits are the least of your worries[idk the tech side here]" and "because it was incompatible with the forum platform / v2 onion died and v3 presents new problems" and not particularly satisfying but at least that is better than no answer at all or an answer to another question...

when deep and loving relationships are at risk of being destroyed from unjust prosecution that could have been prevented surely that's enough to add that extra level of security (one that has existed before and was removed without explanation afaik!). even forgetting about me that idea of a confused dog ripped from their intimate sexual partner and lifelong friend and not knowing what they did wrong to never get to see them again is enough to do as much as i can at a broad level to protect. besides in the future it might be my lonely, isolated and confused lover that is torn from me and either murdered or adopted to a strange family and a lifetime of anxiety and abandonment fears. i guess thats the emotional argument anyway.
 
using a common commercial VPN does not mean anonymity - it only means your internet traffic is diverted
most common vpn providers will snitch their ass of if theres a lawful request to get the logs
 
using a common commercial VPN does not mean anonymity - it only means your internet traffic is diverted
most common vpn providers will snitch their ass of if theres a lawful request to get the logs
- Is this a fact? Or a suspicion ?
You sounds sure that they have a log. If so they have already made it ready when there is a request.
- Which uncommon non-commercial VPN is there to choose from at all ?
- A non-commercial VPN probably don’t have the resources to build and check secure system, and this way is unreliable. And if not commercial, how does the firm earn the money? Either filanthropic or by selling information.
- So I don’t see there is a work around if one has to use a VPN.
Alternatively one can use TorBrowser on the PC (but sadly very slow on an iPad).
 
- Is this a fact? Or a suspicion ?
They have to comply to the law where they operate in. If a commercial VPN provider offers traffic exit point from Germany then they have to comply to the local laws.
Commercial VPN is NOT anonymity when one using is committing crimes - its about getting past the GEO regulations with stuff like netflix and news sites to access the lawful data from the point of the provider. There are shady VPN providers who say they don't collect logs, but then again they could be shut down any time on the country they are operating in if the law requires them to have logs for all user activity e.g. for like 9 years or so.

As a Harrison Ford movie stated : "Choose wisely"
 
Last edited:
Over the past few years I came to the conclusion that educating people on how VPNs work and what they do is pointless. Unless the person has at least some IT knowledge. The privacy adverts are way too much persuasive even though misleading.
Those who use VPNs for privacy therefore form a wall of more easy targets protecting those who use TOR or other more heavy duty methods.
 
Well, the most "tried to hide" data is what is the most interesting from "enforcing the law" point of view.
 
i want to start being active here but im held back by the security issues with this site. im posting in here before an introduction lol

im more or less a script kiddy when it comes to internet security and my methods have been adopted less through knowledge and more through observation and misplaced (but lucky?) trust. my fundamental issue is the lack of an onion address and the heavy reliance on javascript (is it a good idea to encourage users to enable their browser to run scripts from a webpage? and also to have content that isnt encrypted?) made this account ages ago but have avoided downloading anything as a result of these kinds of concerns. i wonder if they are valid concerns or just a self fulfilling prophecy or correlation making me think my actions are the cause ("havent been in trouble using my system, therefore it works" is hardly a secure opsec model or a logical argument)? also one of the site sponsors (selling sex toys which seem great - has anyone posted proof they purchased one) seems to be at best a scam at worst a honey pot? (love to be able to post a correction here if it turns out they are reliable and safe - they dont seem active for some time but a competitor to bad dragon realistic toys would be nice) having that on the site seems highly suspect.

many of the comments in this thread alone seem to have people volunteering their own security models on a similar basis to how i justify my own ("havent been arrested yet"). not to say there hasnt been quality advice (someone mentioned that no amount of traffic obfuscation keeps you safe if a government is specifically targetting you which is something im not sure many realize - especially when they have data points like forum posts on a site like this to establish a timing attack). the conclusion there is that just because peoples threat profile mean their security models appear to work doesnt mean they have worked any more than it means they are on a list somewhere.

i write all this not to bring people down but to explain what things look like from where i am sitting. i want to be an active member of this community it seems chill af but do i really have to look over from this side longingly because i wont let my guard down? im thinking the platform zoovilleforum uses is so heavily reliant on javascript that it just doesnt function on an onion address? i know others have asked this before as well and the seeming lack of response along with the removal of the old onion link seems concerning.

and then there is matrix. never have i seen a service recommended because it is so convenient and accessible promoted so heavily in zoo/zeta/beast communities without hearing it mentioned in general public discourse. and again it only seems to work with javascript? anyone got reputable info on matrix from independent organizations that test this stuff out?

i have other security issues (really want to run a secure telegram client but cant figure out how to get a cell number not connected to me (cash purchase of a burner is sadly not an option) that a community like this could help address and make me more comfortable engaging and i really want to make a solid introduction post and contribute to the community in meaningful (not just horny) ways. i just cant while zooville doesnt seem to align with my security model. can anyone give me some comfort that my concerns arent valid or (for everyones safety not just mine) can the staff and mods get onion up and running again, encourage encryption of content uploads and if not remove reliance on javascript then at least discourage it?

i know im asking for a lot given i have so far contributed nothing but i hope my post is taken genuinely not cynically (and that this is the best place for the post).
Who cares - Zoophilia as an idea is totally legal, unless you get caught with your pants down doing intercourse, and post pics of yourself doing it online.
 
If using a commercial VPN does nothing, what systems would you recommend for people trying to protect their anonymity and identity online? TOR is the go to for covert internet traffic, followed by commercial VPNs. Other than these two i'm not sure what else to use.
Who cares - Zoophilia as an idea is totally legal, unless you get caught with your pants down doing intercourse, and post pics of yourself doing it online.
 
GENERAL POSTING

1. Do not use an identifiable avatar. This includes faces, tattoos, fursuits (especially if they are not yours)

2. Review every picture, every video you post multiple times. Look for identifiable things; houses, barns, unique saddles, collars with or without tags, pictures, furniture, mail, packages, collectibles, mirrors or anything can reflect your face or body, absolutely anything that can be used as identification.

3. If you have a unique pet, be very, very careful. If you have posted normal pictures anywhere, like facebook, twitter, ect., do not post him here or anywhere zoo themed. Even if you delete the social media pics, it's too late. ( Familiarize yourself with Reverse Image Search, what it is, and how it can be used against you )

4. Be careful with the information you post. Anyone with enough patience can piece together little things through pictures, descriptions, email addresses, anything to pinpoint who you are.

5. Use an email that is not attached to anything. Do not use real name, and do not setup a password recovery phone number or alternate email. Make yourself an absolute stand alone free email account and do not use it for anything else but zoo. Not even furry or fursuit related sites or accounts.




ONLINE SECURITY

1. Public IP addresses can be used to track your general location. We Recommend a VPN service like Nord VPN to mask your IP. ALWAYS USE VPN!

2. Use Strong Passwords on your ZooVille Account.

3. Whatsapp and Discord are NOT recommended services for private off-site chat. They have been known to be leaked and report info on users.

4. Telegram and Signal are considered safe in of themselves, however always used a VPN when logging onto telegram and also be wary of phishing for your IP address with external HTML links. This has been used before to catch users NOT using VPN on telegram or Signal.

5. Public telegram links to group chats are allowed here on zooville if you own a group (see site rules), however be aware that bestiality is illegal in many countries. Law enforcement can phish users out into private chats is a common way to trace and doxx your identity. TRUST and RESPONSIBILITY is on your hands for whomever private chats you join.
Thank you for the heads up! I think I should go around and read all the rules sections prior to engaging. It makes sense there should be rules for sites like this. Im new here, so this helps me navigate the waters greatly.
 
GENERAL POSTING

1. Do not use an identifiable avatar. This includes faces, tattoos, fursuits (especially if they are not yours)

2. Review every picture, every video you post multiple times. Look for identifiable things; houses, barns, unique saddles, collars with or without tags, pictures, furniture, mail, packages, collectibles, mirrors or anything can reflect your face or body, absolutely anything that can be used as identification.

3. If you have a unique pet, be very, very careful. If you have posted normal pictures anywhere, like facebook, twitter, ect., do not post him here or anywhere zoo themed. Even if you delete the social media pics, it's too late. ( Familiarize yourself with Reverse Image Search, what it is, and how it can be used against you )

4. Be careful with the information you post. Anyone with enough patience can piece together little things through pictures, descriptions, email addresses, anything to pinpoint who you are.

5. Use an email that is not attached to anything. Do not use real name, and do not setup a password recovery phone number or alternate email. Make yourself an absolute stand alone free email account and do not use it for anything else but zoo. Not even furry or fursuit related sites or accounts.




ONLINE SECURITY

1. Public IP addresses can be used to track your general location. We Recommend a VPN service like Nord VPN to mask your IP. ALWAYS USE VPN!

2. Use Strong Passwords on your ZooVille Account.

3. Whatsapp and Discord are NOT recommended services for private off-site chat. They have been known to be leaked and report info on users.

4. Telegram and Signal are considered safe in of themselves, however always used a VPN when logging onto telegram and also be wary of phishing for your IP address with external HTML links. This has been used before to catch users NOT using VPN on telegram or Signal.

5. Public telegram links to group chats are allowed here on zooville if you own a group (see site rules), however be aware that bestiality is illegal in many countries. Law enforcement can phish users out into private chats is a common way to trace and doxx your identity. TRUST and RESPONSIBILITY is on your hands for whomever private chats you join.
Thanks!
 
[MEGA THREAD - computer security, IPsec OPsec]


HEY GUYS - 24 years programming experience here, tech guy, just wanted to share some opinions and thoughts when it comes to online security and give people a greater sense of security online. I've done everything you can think of, from white-hat activities to black-hat and all the grey inbetween - beign into beast means you need to stay safe online, and i will help you as best as i can!



Encrpytion:
End-to-end encryption (E2EE) is a method of securing communication between two or more devices by encrypting the content of the message at the sender's device, and then decrypting it only at the recipient's device. The encryption keys used to encrypt and decrypt the message are generated on the devices themselves, and are not stored on any servers or third-party systems. This ensures that only the sender and intended recipient can read the contents of the message, even if it is intercepted or accessed by unauthorized parties during transmission.

To understand why end-to-end encryption is better, it's helpful to consider other methods of encryption that are commonly used in communication. One common approach is to encrypt messages using a system where the keys used to encrypt and decrypt messages are stored on a server. This system is known as "client-server encryption." While this method can provide some level of security, it's not as secure as end-to-end encryption because the encryption keys are stored on a server that can potentially be accessed by hackers or other malicious actors.

In contrast, end-to-end encryption provides a higher level of security because the encryption keys are generated and stored only on the devices of the sender and recipient. This means that even if a hacker or government agency were to gain access to the server or the transmission itself, they would not be able to read the message because they do not have the encryption keys.

End-to-end encryption is important for protecting the privacy and security of communication in a variety of settings, including personal conversations, business communication, and political organizing. By using end-to-end encryption, individuals and organizations can communicate more securely and have greater control over their data and information.



Messengers:

There are several messengers online that use encryption for messages. Here are some examples:

  1. WhatsApp - This popular messaging app uses end-to-end encryption, which means that only the sender and recipient of a message can read it.
  2. Signal - Signal is a messaging app that uses end-to-end encryption for all messages, calls, and video chats.
  3. Telegram - Telegram offers end-to-end encryption for secret chats, which are not stored on Telegram's servers and can only be accessed on the devices of the sender and recipient.
  4. iMessage - iMessage is the default messaging app on iPhones and uses end-to-end encryption for messages between Apple devices.
  5. Viber - Viber uses end-to-end encryption for all messages, calls, and video chats.
  6. Wickr - Wickr is a messaging app that uses end-to-end encryption and allows users to set an expiration time for messages, after which they are automatically deleted. (wickr is disabled and is a closed program now, sorry!)
  7. Threema - Threema is a secure messaging app that uses end-to-end encryption and allows users to verify the identity of their contacts using QR codes.
It's worth noting that while encryption can help protect the privacy and security of messages, it's not foolproof and can still be vulnerable to certain types of attacks. It's important to use strong passwords, keep your software up-to-date, and be cautious when clicking on links or downloading attachments, even in encrypted messages.


VPNs:


My favorite vpn by far is PROTONVPN:
ProtonVPN comes with KILLSWITCH, stopping ALL traffic from flowing if it's not connected through the encrypted tunnel - this is the most important part of this thread, honestly!

ProtonVPN's Secure Core system is a feature that provides an additional layer of security and privacy to VPN connections. When you use ProtonVPN's Secure Core, your internet traffic is routed through multiple servers in privacy-friendly countries before it reaches the final destination. This means that if a server in a less secure country were to be compromised, your traffic would still be protected by the other servers in the chain.

Here's how ProtonVPN's Secure Core system works:

  1. Your internet traffic is encrypted and sent to a Secure Core server located in a privacy-friendly country, such as Switzerland or Iceland.
  2. The Secure Core server decrypts your traffic and sends it to another Secure Core server in a different privacy-friendly country.
  3. The process repeats until the traffic reaches the final destination.
By routing your traffic through multiple Secure Core servers, ProtonVPN's Secure Core system makes it much more difficult for anyone to track your internet activity or intercept your data. It can be especially useful when using public Wi-Fi networks or accessing sensitive websites.

It's important to note that while ProtonVPN's Secure Core system can provide an additional layer of security and privacy, it does not guarantee complete anonymity or protection from all threats. It's still important to take other security measures, such as using strong passwords and keeping your software up-to-date, to protect your online privacy and security.

ProtonVPN also lets you connect to the TOR network for your entire device, iOS, android, windows, mac, linux etc.



Here are eight of the best VPNs, based on their features, performance, and reputation:

  1. ExpressVPN - A popular and reliable VPN with high-speed servers in over 90 countries.
  2. NordVPN - A feature-rich VPN with strong security and a large network of servers in over 60 countries.
  3. Surfshark - A fast and affordable VPN with strong encryption and a no-logs policy.
  4. CyberGhost - A user-friendly VPN with fast servers in over 90 countries and a range of security features.
  5. ProtonVPN - A privacy-focused VPN with advanced security features, including a Secure Core system and strong encryption.
  6. IPVanish - A fast and reliable VPN with a large network of servers and strong security features.
  7. Private Internet Access - A no-logs VPN with fast servers and a range of privacy and security features.
  8. Hotspot Shield - A fast and reliable VPN with strong encryption and a user-friendly interface.
It's worth noting that there are many other VPNs available, and the best VPN for you will depend on your specific needs and preferences. When choosing a VPN, it's important to consider factors such as speed, security, privacy, and the number and location of servers. Additionally, it's important to choose a VPN provider with a strong reputation and a track record of protecting user privacy.

Browsers:


Honestly i recommend google chrome over all other browsers - it has tons of features you can enable and disable, extensions you can add and it's coded well, updated frequently
Google Chrome is a popular web browser that has gained popularity due to several factors. Here are some reasons why Google Chrome is a good browser:

  1. Speed: Chrome is known for its speed and efficiency. It has a streamlined user interface that allows users to browse quickly and navigate easily.
  2. Security: Chrome has several built-in security features that help protect users from malicious websites, phishing attacks, and other online threats. It also regularly updates its security features to stay ahead of new threats.
  3. Cross-platform compatibility: Chrome is available for multiple platforms, including Windows, Mac, Linux, Android, and iOS, making it a versatile choice for users who use multiple devices.
  4. Customization: Chrome allows users to customize their browsing experience with a range of extensions and themes, allowing them to personalize the browser to their liking.
  5. Integration with Google services: Chrome integrates seamlessly with various Google services, such as Google Search, Gmail, and Google Drive, making it a convenient choice for users who use these services frequently.
  6. Developer-friendly: Chrome is a popular choice for developers due to its built-in developer tools, which make it easy to debug code and test websites.
Overall, Google Chrome is a good browser because it offers speed, security, and flexibility, as well as a range of customization options and integration with other Google services.


Extensions:

Here are some of the best extensions for security for Chrome:

  1. uBlock Origin - A powerful ad-blocker that can also block malicious scripts and trackers.
  2. HTTPS Everywhere - An extension that automatically encrypts your web traffic with HTTPS to help protect your privacy and security.
  3. LastPass - A password manager that can help you generate strong, unique passwords for all your accounts and store them securely.
  4. Ghostery - A privacy-focused extension that blocks trackers and provides detailed information about the companies that are tracking you.
  5. NoScript - A security extension that allows you to control which scripts are allowed to run on web pages.
  6. Avast Online Security - A security extension that warns you about potentially malicious websites and provides additional protection against phishing and other online threats.
  7. Privacy Badger - A privacy-focused extension that blocks trackers and other scripts that could be used to track your online activity.
  8. Malwarebytes Browser Extension - A security extension that blocks malicious websites and provides additional protection against malware and other online threats
  9. IronVEST - With this you can MASK your identify online, creating a fake spoofed email for example protected by biometrics whcih forwards to your email, and when you reply.. it's also spoofed!


windows programs:


peerblock:

PeerBlock is a program that blocks incoming and outgoing connections to IP addresses that are known to belong to certain types of organizations or individuals, such as government agencies, corporations, and copyright enforcement agencies. Here are some reasons why PeerBlock may be considered a good program to use on Windows:

  1. Privacy protection: PeerBlock can help protect your privacy by blocking connections to IP addresses that may be monitoring your online activity or trying to track you.
  2. Security: PeerBlock can help prevent unauthorized access to your computer by blocking connections to known malicious IP addresses.
  3. Control: PeerBlock gives you control over which types of connections you want to allow or block, allowing you to customize the program to your specific needs.
  4. Open source: PeerBlock is open-source software, which means that its source code is freely available and can be inspected and modified by anyone.
However, it's important to note that PeerBlock is not a substitute for other security measures, such as antivirus software, a firewall, or safe browsing practices. Additionally, some experts have raised concerns about the effectiveness of IP blocking as a security measure, as it may not be able to keep up with the rapidly changing IP addresses used by attackers. As such, the effectiveness of PeerBlock may vary depending on the user's specific needs and the types of threats they face.

malwarebytes:
Malwarebytes is a popular anti-malware program that is designed to detect and remove various types of malware, including viruses, worms, trojans, rootkits, spyware, and adware. Here are some reasons why Malwarebytes is a good program to use:

  1. Effective malware detection and removal: Malwarebytes uses advanced detection and removal technologies to detect and remove malware that other antivirus programs may miss.
  2. Real-time protection: Malwarebytes offers real-time protection, which means that it actively monitors your system for malware and other threats, and can stop them before they can cause damage.
  3. User-friendly interface: Malwarebytes has a user-friendly interface that is easy to navigate, making it accessible even to users who are not technically savvy.
  4. Free version: Malwarebytes offers a free version of its program that provides basic malware detection and removal capabilities.
  5. Additional features: Malwarebytes also offers additional features, such as web protection, ransomware protection, and exploit protection, that can help enhance your overall security.
  6. Reputation: Malwarebytes has a reputation for being a reliable and effective anti-malware program, and is often recommended by security experts and IT professionals.
Overall, Malwarebytes is a good program to use because it provides effective malware detection and removal, real-time protection, a user-friendly interface, and additional security features, as well as a reputation for reliability and effectiveness.


norton security ultra:
Norton Security Ultra is a comprehensive security program that offers a range of features to protect your devices and data. Here are some reasons why Norton Security Ultra may be considered a good program to use:

  1. Robust antivirus protection: Norton Security Ultra provides powerful antivirus protection against a wide range of threats, including viruses, spyware, ransomware, and other types of malware.
  2. Multi-device protection: Norton Security Ultra offers protection for up to 10 devices, including Windows, Mac, Android, and iOS devices, making it a versatile choice for users with multiple devices.
  3. Secure VPN: Norton Security Ultra includes a secure VPN that can help protect your online privacy by encrypting your internet connection and hiding your IP address.
  4. Password manager: Norton Security Ultra includes a password manager that can help you generate strong, unique passwords and securely store them.
  5. Parental controls: Norton Security Ultra includes parental controls that allow you to block inappropriate content and set limits on your child's internet usage.
  6. Backup and recovery: Norton Security Ultra includes backup and recovery features that can help protect your important files and data in the event of a system failure or other disaster.
Overall, Norton Security Ultra is a good program to use because it offers robust antivirus protection, multi-device protection, a secure VPN, a password manager, parental controls, and backup and recovery features, making it a comprehensive security solution for users who want to protect their devices and data. Additionally, Norton has a reputation for being a reliable and effective security program, and is often recommended by security experts and IT professionals.

comodo firewall:
Comodo Firewall is a popular firewall program that is designed to protect your computer from unauthorized access and malware. Here are some reasons why Comodo Firewall is a good program to use:

  1. Comprehensive protection: Comodo Firewall provides comprehensive protection against various types of threats, including viruses, spyware, trojans, and other types of malware.
  2. User-friendly interface: Comodo Firewall has a user-friendly interface that is easy to navigate, making it accessible even to users who are not technically savvy.
  3. Advanced settings: Comodo Firewall allows users to customize their firewall settings, providing more advanced users with greater control over their computer's security.
  4. Real-time protection: Comodo Firewall offers real-time protection, which means that it actively monitors your system for threats and can stop them before they can cause damage.
  5. Automatic updates: Comodo Firewall receives regular updates that help ensure that it stays up-to-date with the latest threats and security vulnerabilities.
  6. Free version: Comodo Firewall offers a free version of its program that provides basic firewall protection.
Overall, Comodo Firewall is a good program to use because it provides comprehensive protection against various types of threats, a user-friendly interface, advanced settings, real-time protection, automatic updates, and a free version, making it accessible to users with different levels of technical expertise and budgets. Additionally, Comodo has a reputation for being a reliable and effective firewall program, and is often recommended by security experts and IT professionals.

mvps hosts file:
The MVPs Hosts file is a free, regularly updated file that contains a list of known ad servers, malicious websites, and other sources of unwanted traffic on the internet. By using the MVPs Hosts file, you can block access to these sites at the DNS level, preventing your computer from connecting to them and potentially exposing your system to malware or unwanted advertising.

Here are some reasons why you should consider using the MVPs Hosts file:

  1. Block ads and unwanted content: The MVPs Hosts file can block access to ad servers and other sources of unwanted content, making your browsing experience faster and more pleasant.
  2. Increase privacy: The MVPs Hosts file can help protect your privacy by blocking access to tracking websites and preventing them from collecting data about your online activity.
  3. Improve security: The MVPs Hosts file can help prevent malware infections by blocking access to known malicious websites and preventing your system from connecting to them.
  4. Easy to use: The MVPs Hosts file is easy to install and requires no special technical knowledge or configuration.
  5. Regularly updated: The MVPs Hosts file is regularly updated to include new sources of unwanted traffic on the internet, ensuring that you stay protected against the latest threats.
Overall, using the MVPs Hosts file can help improve your browsing experience, increase your privacy and security, and provide an easy and effective way to block unwanted content and ads on the internet.
If you are paranoid use MONOTONE-HWID SPOOFER often to change your device HWID, use virtual machine to do all your work online, chatting and playing.



The most important: VERACRYPT
Veracrypt is a free, open-source encryption software that is used to create encrypted partitions, volumes, or entire drives on your computer. It uses industry-standard encryption algorithms to secure your data and prevent unauthorized access.

Here's how Veracrypt works and why it's secure:

  1. Encryption Algorithms: Veracrypt uses strong encryption algorithms, including AES, Serpent, and Twofish, to encrypt your data. These algorithms are known for their ability to resist attacks and ensure that your data remains secure.
  2. Secure Key Derivation: Veracrypt uses a key derivation function called PBKDF2 to generate the encryption key from your password. This function slows down the key derivation process, making it harder for attackers to guess your password and access your data.
  3. Hidden Operating System: Veracrypt allows you to create a hidden operating system within the encrypted partition. This hidden operating system is accessed through a separate password and is completely hidden from the regular operating system, making it even more secure.
  4. Plausible Deniability: Veracrypt also provides plausible deniability, which means that you can create an encrypted partition that appears to be empty, even if it contains data. This can be useful if you're forced to disclose your password to an attacker or authority.
  5. Open-Source: Veracrypt is open-source, which means that its source code is available for anyone to inspect and audit. This allows experts to verify its security and identify any vulnerabilities or weaknesses.
Here are some reasons why you should consider using Veracrypt:

  1. Protect Sensitive Data: Veracrypt allows you to encrypt sensitive data on your computer, ensuring that it remains secure and protected from unauthorized access.
  2. Secure Communication: Veracrypt can also be used to encrypt emails, documents, and other files, ensuring that they are protected during transmission.
  3. Compliance Requirements: Veracrypt can help you meet compliance requirements for data encryption, which may be required by your organization or industry.
  4. Open-Source: The fact that Veracrypt is open-source allows for transparency and verification of its security by experts, making it a trusted encryption software.
Overall, Veracrypt is a powerful and secure encryption software that can help you protect sensitive data on your computer, and provide secure communication while meeting compliance requirements.

When creating a password make a pattern, something super easy to remember.. for example here is an old password i used to unlock my bootloader (it loads before windows.. if u dont have the password u aint getting in!)
password: a1s2D3f4G5l1k2j3h4G5%@552>>beastlover%@>>k935
look at it, its so complex - yet simple. they are patterns on the keyboard - get it? and my PIM was 7045, impossible to guess - the FBI couldn't get into my computer if they tried for 100 years.

Summery and shorter version:

ALWAYS be connected to a VPN, right now i'm on TUXLERVPN because it's a residential VPN - no one can tell that i'm on a vpn and no one can tell where i live if they attempt to find out. Tuxler is the extension i run on chrome but protonvpn secure core is what my PC is connected to, so for me i do localhost -> protonvpn -> tuxlervpn -> internet (it usually doesnt work like this, thats not how the internet is designed, but i made it work!)
ALWAYS use killswitch - never let your IP be exposed to any progam
USE ADGUARD DNS: blocks trackers, ads, agencies, big companies that track you
Use extensions that block trackers and ads, like adguard
always use a secure messenger, my favorite is telegram with its secret chats
BIT LOCKER IS NOT SAFE AND HAS A BACKDOOR - USE VERACRYPT aes-256+pim with a password thats 20-32 characters long include special characters! - DELETE your recovery disk, u dont need it if u can remember ur password - DO NOT WRITE THE PASSWORD DOWN
I do not endorse/not a paid advertiser, just someone who wants to Spread some security.
do not use the same password for every website, if one gets hacked - you may be screwed
use 2factor auth on everything you can and use AUTHY for the vault.
 
[MEGA THREAD - computer security, IPsec OPsec]


HEY GUYS - 24 years programming experience here, tech guy, just wanted to share some opinions and thoughts when it comes to online security and give people a greater sense of security online. I've done everything you can think of, from white-hat activities to black-hat and all the grey inbetween - beign into beast means you need to stay safe online, and i will help you as best as i can!



Encrpytion:
End-to-end encryption (E2EE) is a method of securing communication between two or more devices by encrypting the content of the message at the sender's device, and then decrypting it only at the recipient's device. The encryption keys used to encrypt and decrypt the message are generated on the devices themselves, and are not stored on any servers or third-party systems. This ensures that only the sender and intended recipient can read the contents of the message, even if it is intercepted or accessed by unauthorized parties during transmission.

To understand why end-to-end encryption is better, it's helpful to consider other methods of encryption that are commonly used in communication. One common approach is to encrypt messages using a system where the keys used to encrypt and decrypt messages are stored on a server. This system is known as "client-server encryption." While this method can provide some level of security, it's not as secure as end-to-end encryption because the encryption keys are stored on a server that can potentially be accessed by hackers or other malicious actors.

In contrast, end-to-end encryption provides a higher level of security because the encryption keys are generated and stored only on the devices of the sender and recipient. This means that even if a hacker or government agency were to gain access to the server or the transmission itself, they would not be able to read the message because they do not have the encryption keys.

End-to-end encryption is important for protecting the privacy and security of communication in a variety of settings, including personal conversations, business communication, and political organizing. By using end-to-end encryption, individuals and organizations can communicate more securely and have greater control over their data and information.



Messengers:
There are several messengers online that use encryption for messages. Here are some examples:

  1. WhatsApp - This popular messaging app uses end-to-end encryption, which means that only the sender and recipient of a message can read it.
  2. Signal - Signal is a messaging app that uses end-to-end encryption for all messages, calls, and video chats.
  3. Telegram - Telegram offers end-to-end encryption for secret chats, which are not stored on Telegram's servers and can only be accessed on the devices of the sender and recipient.
  4. iMessage - iMessage is the default messaging app on iPhones and uses end-to-end encryption for messages between Apple devices.
  5. Viber - Viber uses end-to-end encryption for all messages, calls, and video chats.
  6. Wickr - Wickr is a messaging app that uses end-to-end encryption and allows users to set an expiration time for messages, after which they are automatically deleted. (wickr is disabled and is a closed program now, sorry!)
  7. Threema - Threema is a secure messaging app that uses end-to-end encryption and allows users to verify the identity of their contacts using QR codes.
It's worth noting that while encryption can help protect the privacy and security of messages, it's not foolproof and can still be vulnerable to certain types of attacks. It's important to use strong passwords, keep your software up-to-date, and be cautious when clicking on links or downloading attachments, even in encrypted messages.


VPNs:

My favorite vpn by far is PROTONVPN:
ProtonVPN comes with KILLSWITCH, stopping ALL traffic from flowing if it's not connected through the encrypted tunnel - this is the most important part of this thread, honestly!

ProtonVPN's Secure Core system is a feature that provides an additional layer of security and privacy to VPN connections. When you use ProtonVPN's Secure Core, your internet traffic is routed through multiple servers in privacy-friendly countries before it reaches the final destination. This means that if a server in a less secure country were to be compromised, your traffic would still be protected by the other servers in the chain.

Here's how ProtonVPN's Secure Core system works:

  1. Your internet traffic is encrypted and sent to a Secure Core server located in a privacy-friendly country, such as Switzerland or Iceland.
  2. The Secure Core server decrypts your traffic and sends it to another Secure Core server in a different privacy-friendly country.
  3. The process repeats until the traffic reaches the final destination.
By routing your traffic through multiple Secure Core servers, ProtonVPN's Secure Core system makes it much more difficult for anyone to track your internet activity or intercept your data. It can be especially useful when using public Wi-Fi networks or accessing sensitive websites.

It's important to note that while ProtonVPN's Secure Core system can provide an additional layer of security and privacy, it does not guarantee complete anonymity or protection from all threats. It's still important to take other security measures, such as using strong passwords and keeping your software up-to-date, to protect your online privacy and security.

ProtonVPN also lets you connect to the TOR network for your entire device, iOS, android, windows, mac, linux etc.



Here are eight of the best VPNs, based on their features, performance, and reputation:

  1. ExpressVPN - A popular and reliable VPN with high-speed servers in over 90 countries.
  2. NordVPN - A feature-rich VPN with strong security and a large network of servers in over 60 countries.
  3. Surfshark - A fast and affordable VPN with strong encryption and a no-logs policy.
  4. CyberGhost - A user-friendly VPN with fast servers in over 90 countries and a range of security features.
  5. ProtonVPN - A privacy-focused VPN with advanced security features, including a Secure Core system and strong encryption.
  6. IPVanish - A fast and reliable VPN with a large network of servers and strong security features.
  7. Private Internet Access - A no-logs VPN with fast servers and a range of privacy and security features.
  8. Hotspot Shield - A fast and reliable VPN with strong encryption and a user-friendly interface.
It's worth noting that there are many other VPNs available, and the best VPN for you will depend on your specific needs and preferences. When choosing a VPN, it's important to consider factors such as speed, security, privacy, and the number and location of servers. Additionally, it's important to choose a VPN provider with a strong reputation and a track record of protecting user privacy.

Browsers:

Honestly i recommend google chrome over all other browsers - it has tons of features you can enable and disable, extensions you can add and it's coded well, updated frequently
Google Chrome is a popular web browser that has gained popularity due to several factors. Here are some reasons why Google Chrome is a good browser:

  1. Speed: Chrome is known for its speed and efficiency. It has a streamlined user interface that allows users to browse quickly and navigate easily.
  2. Security: Chrome has several built-in security features that help protect users from malicious websites, phishing attacks, and other online threats. It also regularly updates its security features to stay ahead of new threats.
  3. Cross-platform compatibility: Chrome is available for multiple platforms, including Windows, Mac, Linux, Android, and iOS, making it a versatile choice for users who use multiple devices.
  4. Customization: Chrome allows users to customize their browsing experience with a range of extensions and themes, allowing them to personalize the browser to their liking.
  5. Integration with Google services: Chrome integrates seamlessly with various Google services, such as Google Search, Gmail, and Google Drive, making it a convenient choice for users who use these services frequently.
  6. Developer-friendly: Chrome is a popular choice for developers due to its built-in developer tools, which make it easy to debug code and test websites.
Overall, Google Chrome is a good browser because it offers speed, security, and flexibility, as well as a range of customization options and integration with other Google services.


Extensions:
Here are some of the best extensions for security for Chrome:

  1. uBlock Origin - A powerful ad-blocker that can also block malicious scripts and trackers.
  2. HTTPS Everywhere - An extension that automatically encrypts your web traffic with HTTPS to help protect your privacy and security.
  3. LastPass - A password manager that can help you generate strong, unique passwords for all your accounts and store them securely.
  4. Ghostery - A privacy-focused extension that blocks trackers and provides detailed information about the companies that are tracking you.
  5. NoScript - A security extension that allows you to control which scripts are allowed to run on web pages.
  6. Avast Online Security - A security extension that warns you about potentially malicious websites and provides additional protection against phishing and other online threats.
  7. Privacy Badger - A privacy-focused extension that blocks trackers and other scripts that could be used to track your online activity.
  8. Malwarebytes Browser Extension - A security extension that blocks malicious websites and provides additional protection against malware and other online threats
  9. IronVEST - With this you can MASK your identify online, creating a fake spoofed email for example protected by biometrics whcih forwards to your email, and when you reply.. it's also spoofed!


windows programs:


peerblock:

PeerBlock is a program that blocks incoming and outgoing connections to IP addresses that are known to belong to certain types of organizations or individuals, such as government agencies, corporations, and copyright enforcement agencies. Here are some reasons why PeerBlock may be considered a good program to use on Windows:

  1. Privacy protection: PeerBlock can help protect your privacy by blocking connections to IP addresses that may be monitoring your online activity or trying to track you.
  2. Security: PeerBlock can help prevent unauthorized access to your computer by blocking connections to known malicious IP addresses.
  3. Control: PeerBlock gives you control over which types of connections you want to allow or block, allowing you to customize the program to your specific needs.
  4. Open source: PeerBlock is open-source software, which means that its source code is freely available and can be inspected and modified by anyone.
However, it's important to note that PeerBlock is not a substitute for other security measures, such as antivirus software, a firewall, or safe browsing practices. Additionally, some experts have raised concerns about the effectiveness of IP blocking as a security measure, as it may not be able to keep up with the rapidly changing IP addresses used by attackers. As such, the effectiveness of PeerBlock may vary depending on the user's specific needs and the types of threats they face.

malwarebytes:
Malwarebytes is a popular anti-malware program that is designed to detect and remove various types of malware, including viruses, worms, trojans, rootkits, spyware, and adware. Here are some reasons why Malwarebytes is a good program to use:

  1. Effective malware detection and removal: Malwarebytes uses advanced detection and removal technologies to detect and remove malware that other antivirus programs may miss.
  2. Real-time protection: Malwarebytes offers real-time protection, which means that it actively monitors your system for malware and other threats, and can stop them before they can cause damage.
  3. User-friendly interface: Malwarebytes has a user-friendly interface that is easy to navigate, making it accessible even to users who are not technically savvy.
  4. Free version: Malwarebytes offers a free version of its program that provides basic malware detection and removal capabilities.
  5. Additional features: Malwarebytes also offers additional features, such as web protection, ransomware protection, and exploit protection, that can help enhance your overall security.
  6. Reputation: Malwarebytes has a reputation for being a reliable and effective anti-malware program, and is often recommended by security experts and IT professionals.
Overall, Malwarebytes is a good program to use because it provides effective malware detection and removal, real-time protection, a user-friendly interface, and additional security features, as well as a reputation for reliability and effectiveness.


norton security ultra:
Norton Security Ultra is a comprehensive security program that offers a range of features to protect your devices and data. Here are some reasons why Norton Security Ultra may be considered a good program to use:

  1. Robust antivirus protection: Norton Security Ultra provides powerful antivirus protection against a wide range of threats, including viruses, spyware, ransomware, and other types of malware.
  2. Multi-device protection: Norton Security Ultra offers protection for up to 10 devices, including Windows, Mac, Android, and iOS devices, making it a versatile choice for users with multiple devices.
  3. Secure VPN: Norton Security Ultra includes a secure VPN that can help protect your online privacy by encrypting your internet connection and hiding your IP address.
  4. Password manager: Norton Security Ultra includes a password manager that can help you generate strong, unique passwords and securely store them.
  5. Parental controls: Norton Security Ultra includes parental controls that allow you to block inappropriate content and set limits on your child's internet usage.
  6. Backup and recovery: Norton Security Ultra includes backup and recovery features that can help protect your important files and data in the event of a system failure or other disaster.
Overall, Norton Security Ultra is a good program to use because it offers robust antivirus protection, multi-device protection, a secure VPN, a password manager, parental controls, and backup and recovery features, making it a comprehensive security solution for users who want to protect their devices and data. Additionally, Norton has a reputation for being a reliable and effective security program, and is often recommended by security experts and IT professionals.

comodo firewall:
Comodo Firewall is a popular firewall program that is designed to protect your computer from unauthorized access and malware. Here are some reasons why Comodo Firewall is a good program to use:

  1. Comprehensive protection: Comodo Firewall provides comprehensive protection against various types of threats, including viruses, spyware, trojans, and other types of malware.
  2. User-friendly interface: Comodo Firewall has a user-friendly interface that is easy to navigate, making it accessible even to users who are not technically savvy.
  3. Advanced settings: Comodo Firewall allows users to customize their firewall settings, providing more advanced users with greater control over their computer's security.
  4. Real-time protection: Comodo Firewall offers real-time protection, which means that it actively monitors your system for threats and can stop them before they can cause damage.
  5. Automatic updates: Comodo Firewall receives regular updates that help ensure that it stays up-to-date with the latest threats and security vulnerabilities.
  6. Free version: Comodo Firewall offers a free version of its program that provides basic firewall protection.
Overall, Comodo Firewall is a good program to use because it provides comprehensive protection against various types of threats, a user-friendly interface, advanced settings, real-time protection, automatic updates, and a free version, making it accessible to users with different levels of technical expertise and budgets. Additionally, Comodo has a reputation for being a reliable and effective firewall program, and is often recommended by security experts and IT professionals.

mvps hosts file:
The MVPs Hosts file is a free, regularly updated file that contains a list of known ad servers, malicious websites, and other sources of unwanted traffic on the internet. By using the MVPs Hosts file, you can block access to these sites at the DNS level, preventing your computer from connecting to them and potentially exposing your system to malware or unwanted advertising.

Here are some reasons why you should consider using the MVPs Hosts file:

  1. Block ads and unwanted content: The MVPs Hosts file can block access to ad servers and other sources of unwanted content, making your browsing experience faster and more pleasant.
  2. Increase privacy: The MVPs Hosts file can help protect your privacy by blocking access to tracking websites and preventing them from collecting data about your online activity.
  3. Improve security: The MVPs Hosts file can help prevent malware infections by blocking access to known malicious websites and preventing your system from connecting to them.
  4. Easy to use: The MVPs Hosts file is easy to install and requires no special technical knowledge or configuration.
  5. Regularly updated: The MVPs Hosts file is regularly updated to include new sources of unwanted traffic on the internet, ensuring that you stay protected against the latest threats.
Overall, using the MVPs Hosts file can help improve your browsing experience, increase your privacy and security, and provide an easy and effective way to block unwanted content and ads on the internet.
If you are paranoid use MONOTONE-HWID SPOOFER often to change your device HWID, use virtual machine to do all your work online, chatting and playing.



The most important: VERACRYPT
Veracrypt is a free, open-source encryption software that is used to create encrypted partitions, volumes, or entire drives on your computer. It uses industry-standard encryption algorithms to secure your data and prevent unauthorized access.

Here's how Veracrypt works and why it's secure:

  1. Encryption Algorithms: Veracrypt uses strong encryption algorithms, including AES, Serpent, and Twofish, to encrypt your data. These algorithms are known for their ability to resist attacks and ensure that your data remains secure.
  2. Secure Key Derivation: Veracrypt uses a key derivation function called PBKDF2 to generate the encryption key from your password. This function slows down the key derivation process, making it harder for attackers to guess your password and access your data.
  3. Hidden Operating System: Veracrypt allows you to create a hidden operating system within the encrypted partition. This hidden operating system is accessed through a separate password and is completely hidden from the regular operating system, making it even more secure.
  4. Plausible Deniability: Veracrypt also provides plausible deniability, which means that you can create an encrypted partition that appears to be empty, even if it contains data. This can be useful if you're forced to disclose your password to an attacker or authority.
  5. Open-Source: Veracrypt is open-source, which means that its source code is available for anyone to inspect and audit. This allows experts to verify its security and identify any vulnerabilities or weaknesses.
Here are some reasons why you should consider using Veracrypt:

  1. Protect Sensitive Data: Veracrypt allows you to encrypt sensitive data on your computer, ensuring that it remains secure and protected from unauthorized access.
  2. Secure Communication: Veracrypt can also be used to encrypt emails, documents, and other files, ensuring that they are protected during transmission.
  3. Compliance Requirements: Veracrypt can help you meet compliance requirements for data encryption, which may be required by your organization or industry.
  4. Open-Source: The fact that Veracrypt is open-source allows for transparency and verification of its security by experts, making it a trusted encryption software.
Overall, Veracrypt is a powerful and secure encryption software that can help you protect sensitive data on your computer, and provide secure communication while meeting compliance requirements.

When creating a password make a pattern, something super easy to remember.. for example here is an old password i used to unlock my bootloader (it loads before windows.. if u dont have the password u aint getting in!)
password: a1s2D3f4G5l1k2j3h4G5%@552>>beastlover%@>>k935
look at it, its so complex - yet simple. they are patterns on the keyboard - get it? and my PIM was 7045, impossible to guess - the FBI couldn't get into my computer if they tried for 100 years.

Summery and shorter version:

ALWAYS be connected to a VPN, right now i'm on TUXLERVPN because it's a residential VPN - no one can tell that i'm on a vpn and no one can tell where i live if they attempt to find out. Tuxler is the extension i run on chrome but protonvpn secure core is what my PC is connected to, so for me i do localhost -> protonvpn -> tuxlervpn -> internet (it usually doesnt work like this, thats not how the internet is designed, but i made it work!)
ALWAYS use killswitch - never let your IP be exposed to any progam
USE ADGUARD DNS: blocks trackers, ads, agencies, big companies that track you
Use extensions that block trackers and ads, like adguard
always use a secure messenger, my favorite is telegram with its secret chats
BIT LOCKER IS NOT SAFE AND HAS A BACKDOOR - USE VERACRYPT aes-256+pim with a password thats 20-32 characters long include special characters! - DELETE your recovery disk, u dont need it if u can remember ur password - DO NOT WRITE THE PASSWORD DOWN
I do not endorse/not a paid advertiser, just someone who wants to Spread some security.
do not use the same password for every website, if one gets hacked - you may be screwed
use 2factor auth on everything you can and use AUTHY for the vault.
I only took a quick look at mvps hosts site, but was wondering do you think there's away of adding this to Pfsense to prevent lan computers from connecting? Such as if I use snort for example? Currently, DNS is forwarded to places like Quad9, and a few other no logs, DNSSEC, TLS dns servers. Plus experimenting with Snort again.
 
I only took a quick look at mvps hosts site, but was wondering do you think there's away of adding this to Pfsense to prevent lan computers from connecting? Such as if I use snort for example? Currently, DNS is forwarded to places like Quad9, and a few other no logs, DNSSEC, TLS dns servers. Plus experimenting with Snort again.
used peerblock imo - u can block all bogon, which includes LAN ips
 
do you use dnscrypt?
I only took a quick look at mvps hosts site, but was wondering do you think there's away of adding this to Pfsense to prevent lan computers from connecting? Such as if I use snort for example? Currently, DNS is forwarded to places like Quad9, and a few other no logs, DNSSEC, TLS dns servers. Plus experimenting with Snort again.do you
 
Tor Browser is the safest available method. It is built on Firefox ESR and highly customized to protect you in ways a standard browser can't. But web browsers all have flaws, so it's still possible to find and exploit those flaws to escape the browser to the host operating system and reveal who you are. The way to mitigate that possibility is to increase the security level in Tor Browser from 'Standard' to 'Safer' or 'Safest' and try to put up with websites being kind of messed up. It varies from site to site.

If you're really concerned about that kind of intrusion, you have to run Tor Browser in a disposable environment like TAILS or Qubes-whonix. TAILS is easy, Qubes is hard. Try TAILS sometime if you haven't, it's pretty nice.

It's more nuanced than that. Combining Tor with a VPN hurts performance, offers little to no extra protection, and is only useful in rare circumstances. There are two combinations. The "X" marks a connection that is outside the Tor network and not protected by Tor:


(You) <---> (VPN) <---> (Tor) <-x-> (Website)

In this case, the VPN provider is not able to read your Tor traffic. Your connection to Tor is highly resistant to man-in-the-middle attacks. This is one of Tor's most important features because it enables you to use internet connections you don't trust.

Maybe do this if your local network is blocking Tor traffic but not VPN connections, and only after trying to connect to Tor directly with an unpublished Tor Bridge first.

Maybe do this if you're unable to turn off WebRTC without breaking a website you want to use. Certain functions in WebRTC can leak your real IP, so in that case a VPN could offer a little bit of protection. This only applies other browsers you are connecting to Tor by proxy, which you should never do unless absolutely forced, and to Tor Browsers on iOS which all have to use Apple's Safari browser underneath.


(You) <---> (Tor) <-x-> (VPN) <-x-> (Website)

In this case, the VPN provider is able to read your Tor traffic, because it has already left the Tor network. However, the VPN will only see that it is traffic coming from a Tor exit node, and the VPN will know who you are because you subscribed to them. Some VPNs like Mullvad allow anonymous signup and payment. The content of your traffic could reveal enough personal information for others to deanonymize you.

Doing this is a bad idea and the need for it is very rare. Basically it's a way to hide the fact you're using Tor from a website that blanket blocks connections from Tor exit nodes, since exit nodes are well known. However you lose some anonymity because your traffic is more unique and interesting. To an outside observer, you are no longer a Tor user with traffic coming from a Tor exit node like all the others, you're a VPN user with regular traffic on one side and Tor traffic on the other. That's not great.

In either case you are creating nested TCP connections, which can be very finicky and slow.

?
So if I’m using an iPhone, and then download Tor, is that pretty good to use or no?
 
I'm just curious as to why there is so much fright concerning your sexual orientation. I understand for the people who want to remain in a morally respectable position. But I personally do not have a fear of what the government and third parties know about me which is probably almost everything. But how could they really use it against me? I accept who I am and do not feel I need to mask who I am. I am generally alone and do not need company. There is plenty company within the zoo community who I can respect. It's people such as myself who go to the Frontline to try and push forward the representation and the feelings associated with it. I've accepted my desire of stallions and I will not cower over ego. I will live proud until I die.
I *think* that most of it is for those who show proof that they have done sex acts with animals or are doing so currently because it’s illegal in many places.
 
Back
Top