×
Login Register an account
Top Submissions Explore Upgoat Search Random Subverse Random Post Colorize! Site Rules
7

What are the best hypothetical ways to post anonymously in minecraft?

submitted by giantprick to AskUpgoat 2.3 yearsFeb 18, 2022 06:15:24 ago (+7/-0)     (AskUpgoat)

If one wanted to submit things to the internet but remain anonymous, what are the best ways?

This is a purely academic question.


12 comments block


[ - ] Qwertytoal 3 points 2.2 yearsFeb 18, 2022 11:17:53 ago (+3/-0)

A general tip, with whatever you're doing, make it as random as possible, to prevent patterns from appearing and letting them identify you based on patterns you leave behind. Sometimes without knowing it. How?

You can have a map of the town you're in, or better, a town that is a few towns over, that is preferably popular enough that many different visitors from neighboring towns frequently visit. You place it on the wall and start chucking darts at it, or roll out on the floor and throw a few dice at it. The number rolled isn't important, for now, just the location. Find the location that is nearest to the die you tossed and visit it. See if you can find open wifi networks or those that are easily circumvented (some till use WEP, while others use those login authentication methods favored by hotels, so stick around the bar and listen to a guest pay for their bill with their name and hotel room #, there you go, thats the info needed for wifi.) Regardless where you visit, try dressing not just in "disguise", but something that disguises your outline, and facial gear like thick heavy glasses that make automated and manual facial matching difficult to impossible.
Pickup a pair of boots that are bigger then needed, and place a stack of folder paper in one shoes sole. This will help with obscuring your gait. If you're able to, wear a backpack that has densely heavy items in it like lifting weights, or dense metal like lead, and try to make one strap longer then the other, so your body will be trying to balance it out. Together with the paper shim in one shoe will change your gait. Before going out, walk infront of a mirror at home or a series of store windows, with and without the disguise. See how well it works.
One great tip is for the face to have an identifying mark that isn't real. So add a large big black/brown mole to your cheek, or something else. The more visible and easier to remember the better. Based on witness testimonies when in general a crowd is questioned, people typically focus on the glaring obvious details, and the rest they try to fill in. Each person will give the same description of the facial mark, but no one will match their descriptions of the rest of your face or your body type or clothing ensemble.
As for clothing, always dress to the weather, don't stick out, but try to find ways to misidentified your body type. Wrap and tie a sweater around your waist before putting on your jacket. Add a small backpack stuffed with t-shirts under a sweater or jacket, either infront or behind. You're not really trying to evade people, people don't really pay attention. You're trying to look different enough that if there are multiple surveillance videos from multiple days, they can't match you from all the videos and better, they can't create a "profile signature" they can put into a computer to identify you more easily and quickly in future surveillance video footage. One great "hack" or bug for automated facial tech. Is wearing a tshirt or sweater that has a face on it. The more realistic the better, making sure the eyes, nose and lips/teeth are visible. The program will focus on the face on your clothing and miss your real face. Footage of this obfuscation method exists, its been confirmed.
You leave your real phone at home for sure but you also want to change up your network identity. Meaning, use an older laptop with a pcmcia slot and swap out wifi cards during the day. In addition use programs which modify the hardware id/MAC address of your network card, either wifi or ethernet. Download ahead of time to your laptop/device a list of mac address prefixes for different companies, they each have their own series and styles. Dont change the mac to something random, change it to a realistic mac. Even better, gather mac addresses via network sniffing from random places in the vicinity and on the network itself and use those macs. You can even kick the current user of that mac address off the network, or wait till they log off.
Try to boot the laptop off of a boot cd, and not have any storage media even installed. After doing anything, power down the device, remove the battery and swap the ram out for some other spare ram sticks. If you must store data, use a USB drive you know how to encrypt, even better is one (software, i.e. veracrypt) that had the ability to create a fake hidden encrypted storage location and this way if it's ever in the hands of authorities, they may just focus on that storage partition and forget the rest. Or if you're being questioned, you can use it as your one bargaining chip. Just be sure the fake partition contains data that has a valid reason for you to be hiding... cryptocurrency wallets, personal info, etc, or they'll suspect its fake.
Returning to the dice, you can create a list of places that fit your criteria in terms of wifi networks to use for what you have to do, you roll the dice and the number that appears is that location in the list you've made. You can choose to stay in one spot all day or roll the dice a few times and find a few spots to use. When transporting yourself from one spot to the other, be sure it's not your personal car nor one of your friends or really anyone that can be linked to you. If its stolen, be sure the cars not been stolen from a neighborhood that is close to your home. And ofcourse follow the typical series of directions for preventing transferring your genetics and evidence of your existence to the cars interior. This goes for the laptop too. Some go as far as using gloves or just finger tip gloves... your call.

There are other minute details, but these are a good starting point. Be safe and God bless.

[ - ] breh 0 points 2.2 yearsFeb 18, 2022 11:38:16 ago (+0/-0)

TIL I have nonexistent opsec. Thanks for the write-up

[ - ] ruck_feddit 0 points 2.2 yearsFeb 18, 2022 11:47:52 ago (+0/-0)

Holy fuckin nice work. You've got a particular set of skills...

[ - ] Cunt 2 points 2.2 yearsFeb 18, 2022 09:14:20 ago (+2/-0)

My library's computers completly wipe sessions after logging out, if you are visiting from out of state they give you a guest pass which is a single use anonymous log in. You would want to pick a computer with a monitor facing away from a security camera for ultimate op sec, and I would not use a local library.

Of course to be covid safe you would need a generic single use surgical mask, sunglasses for your hangover and generic jeans, sneakers, black hoodie and maybe black cap too. Of course no tracking devices like phones.

[ - ] SocksOnCats 1 point 2.2 yearsFeb 18, 2022 10:09:53 ago (+1/-0)

Go buy a used tablet or laptop for cash. Make the exchange while wearing a mask what actually hides identity (not just a surgical mask but one of those masks what has a lower face printed on it). Park far away and change masks several times while you go back to your car.

On getting the device, immediately put it in a faraday envelope. Put that in to another faraday envelope. Do not ever remove the device from the faraday envelope unless you’re out in public accessing a public WiFi network and masked with a hat on.

[ - ] mannerbund 0 points 2.2 yearsFeb 18, 2022 11:09:44 ago (+0/-0)

Not a joke, don't let it out anywhere near your home or it scans for Wifi. If you use a phone at home with wifi, the location of your GPS is added to the signal strength of your access point and your pretty darn exact location becomes apparent.

Later if the laptop comes out of the bag and it sees your wifi which was previously geo-tagged, you're SOL.

[ - ] deleted 1 point 2.2 yearsFeb 18, 2022 09:48:48 ago (+1/-0)

deleted

[ - ] JudyStroyer 1 point 2.2 yearsFeb 18, 2022 08:41:12 ago (+1/-0)

1-wear mask and gloves
2-leave phone at home
3-post photos of your victims ashes here for updoots using your commie sister's girlfriend's computer
4-secure more future

[ - ] IwuvU 0 points 2.2 yearsFeb 18, 2022 20:03:25 ago (+0/-0)

Let me tell you exactly what I do. First, I use. Dell XS1900 laptop with 1900x1200 resolution. You don't have to use that but I like it. Next, I go down to my local library on 5th st to use the internet. Here's a pro tip, you don't HAVE to use your real name on the sign in sheet so I always right bababeu. Next, there's satellites in space so you're fucked the moment you walk out your door anyways. Tha...eh I'm bored.

[ - ] deleted 0 points 2.2 yearsFeb 18, 2022 14:18:36 ago (+0/-0)

deleted

[ - ] Cantaloupe 0 points 2.2 yearsFeb 18, 2022 11:35:07 ago (+0/-0)*

Almost impossible. It's not just your machine, it's every machine between you and the destination. Almost all of which have a direct link to the obvious place.

You could have a tails running out of RAM

https://www.comparitech.com/blog/vpn-privacy/anonymity-focused-linux-distributions/


However most USBs a root kitted with someone's spyware

If you have a phone it tracks your daily schedule, if you vary from that... You'd have to put it in a container to prevent signal access.

Everywhere has cameras and AI can reconstruct your masked face.

Also, rubber gloves still leave finger prints.

So basically don't transmit anything that you don't assume is public. Although such measures may prevent google and facebook from tracking you

Maybe build a device from scratch with USB, etc. Otherwise you have to be concerned about audio and video. Also there can be those around you.

Other machines can check for your absence, with remote audio and video access.

[ - ] Xantha 0 points 2.2 yearsFeb 18, 2022 08:24:58 ago (+0/-0)

You should elaborate about how secure you need to be.

If you want to go all out.

Use VPN that accepts crypto. Post from locations with free public wifi. Don't use that location for long or repeatedly. Make sure the laptop or device used can be easily destroyed in a flash (fire is best), if you're going to be physically apprehended.