Anonymity 2023

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

TOTAL ANONYMITY

C R E A T E W I T H V O R Y Z A K O N E & C A R D I N G Z 2
Thank you for
YOUR PURCHASE
This Ebook is designed to give total anonymity to each of its readers.
During this Ebook we will address 9 main points,
1. Disabling all spy protocols and Windows security vulnerabilities.
2. Securing and encrypting your connection
3. Security and settings that anonymize your browser (2 solutions /
one full security and one without restriction of use)
4. Changing serial numbers and computer
5. Automation of specific machine cleaning
6. Encryption of part or all of the disks
7. Completely disabling Windows monitoring
8. Hide your physical and computer identity
9. Presentation of additional software (in order to secure specific
sectors)

09
W I N D O W S

During this Ebook, I will present to you a lot of software which each has a
specific role.
The one I am going to use as support is called Eyedown its goal is to bring
together all the anonymity and security tools that are not available to the
general public. Eyedown can be downloaded from eyedown.org

Once Eyedown is installed, we will start by removing any malicious protocols


or security vulnerabilities from Windows.
To do this, go to the WINDOWS tab.

And run the following options:

permanent deactivation of the IPv6 protocol,


disable Windows geolocation services,
clear current Windows DNS history,
set the default static DNS of Quad9,
disable Remote Desktop,
firewall configuration for applications and services likely to collect data,
disable Windows error reporting,
deactivate applications' access to personal data,
Permanently deactivate the microphone,
disable all Windows applications in the background,
permanently disable the webcam,
“debloat” your Windows system.
02
Also add a password to BIOS.
S E R I A L
N U M B E R

Once this is done, go to the Hardware tab of Eyedown.


Here you can change many of the computer's serial
numbers.

And change all the following numbers and identifiers:

MAC address; the name of the computer; the GUID of the


machine and Hwprofile; the device property GUID; I the
disk ID of the volume; Windows product ID; the network
GUID; the peripheral ID; the different Hardware Ids; the
name of the manufacturer; the name of the computer
model; the telephone number. from the manufacturer.

In the Hardware tab, you can also block and unblock


your USB ports. Let's imagine that you left your
computer unattended, no one could plug in a USB port
and therefore have no impact on your machine.
02
T E L E M E T R Y

Then, go to the Telemetry tab of Eyedown Software


This tab brings together all the options that will allow you to completely
deactivate monitoring of Windows and preinstalled software.

For those who weren't aware Windows is constantly monitoring you,


Every day, and even every hour, Windows collects everything you do on your
computer and can then resell your data to other companies for commercial
purposes or to work with governments.

You can be sure that your operating system will no longer be able to monitor you
by enabling the following options,

Disable Office suite telemetry


Disable Visual Studio Telemetry
Disable Nvidia Telemetry
which are the 3 most spyware programs on your computer.
Disable Windows Basic Telemetry
Block Windows Data Collection IPs
Block Windows Data Collection DNS
Disable Windows Telemetry Services
Disable Windows Scheduled Telemetry
Configure the Registry for Windows Privacy
Uninstall OneDrive + WifiSense anonymity config
Turn off Windows content suggestions
Disable Windows keystroke collection 02

Disable targeted advertising from Windows


D I S K
E N C R Y P T I O N

Now download Veracrypt software,


This will be used to encrypt your disks. No one will therefore be able
to access the contents of your hard drive without the decryption
key.

Once the software is open, you will click on create a volume,


then select Encrypt partition, here we will use normal encryption.

You will need to choose the Encrypt all of your disks option.
Then, click on Boot and those who are in dualboot on Multiboot.

Then AES encryption, then create a secure password with the strong
password generator in the Eyedown toolkit tab, then validate, so we
do a test. Accept the PC restart.

Once restarted logically Veracrypt is launched and asks for the


password.

Windows starts and then Veracrypt displays the successful pre-test


message and offers to encrypt the disk.

Here the encryption begins, now your disks are encrypted and
02
inviolable.
C L E A N I N G

Then go to Eyedown in the computer cleaning


tab, it is designed to have regular computer
cleaning adapted for data protection. You
should enable all these options regularly to
maximize your security.

Cleaning includes Windows cache and unnecessary


files; the Windows update cache; user temporary
files; Firefox insecure files/data; the Windows
registry; Windows event logs; unnecessary
Windows drives; Windows orphan files/patches;
duplicates from the Download folder; Windows
thumbnail caches; Windows disk fragments;
Windows prefetch data; the Windows MenuOrder
cache.
02
V P N M U L L V A D

Then download Mullvad VPN which is


the safest VPN for us. Indeed, it does
not collect any data on its users, does
not keep track of connections and does
not collaborate with governments.

For those wanting anonymous


payment, it accepts cryptocurrency
payments, particularly those in
Monero.

And start connecting to the VPN to


change your IP. 02
N A V I G A T O R &
T A I L S V M

Now, we will see 2 different security options: one very secure and another just
as secure but which does not restrict use such as site blocking for example.

The first is Tail coupled with the TOR browser.

To use it in a virtual machine, we will use the tails iso.


Open Virtualbox and create a Vm with the tails iso

To start the virtual machine, it is very important to isolate it from the kernel
because if someone manages to take control of your virtual machine remotely,
they will not be able to go back and take control of your real OS.
So to do this, open Eyedown, go to the Toolkit tab, and choose the option to
launch the tails VM with maximum isolation.

Once this is done, and the Vm Tails is started, click at the top left in the
application tab. Open the Tor browser connection then click on “hide from my
local network that I am connecting with Tor” then enter “a bridge that I
already know”.

Open Eyedown then in the browser tab, activate the option “generate Tor
bridges for security.

Once done, launch the connection to Tor and open the browser once the
configuration is finished.

02
N A V I G A T O R
F I R E F O X

The 2nd option is a fully configured Firefox browser and pre-installed


extensions chosen for security and anonymity.

To do this, open Eyedown, go to the Eyedown navigator tab and launch the
option reinstalling Firefox with Eyedown add-ons

Now once Firefox is installed, launch all these Firefox settings options for data
protection and anonymity.

Configure Firefox Preferences for Speed


Force Firefox download confirmation
Disable Firefox Telemetry Tasks
Protect Firefox from tracking
Configure Firefox protocols for privacy
Disable Firefox Tracking Services
Configure Firefox containers for privacy
Configure Firefox entries for privacy
Improve the Firefox interface (performance, etc.)

Then open Firefox and pin the following extensions that Eyedown has
installed,
Random user agent, NoScript, Privacy Badger, uBlock Origin, Canvas
Fingerprint", Duckduckgo, foxy proxy, cookie auto delete.

Now you have a secure and anonymized browser, combined with


completely anonymous Mullvad VPN for surfing the WEB and completely02
disabling the collection of your data.
I D E N T I T Y

Now, go to the identity tab on Eyedown.


All the security in the world is of no use if when browsing the web, you
provide your real identity or your email address, your telephone number,
etc.
Click generate fictitious identity

Last name First Name


Full address
Age
Date of birth
Vehicle
Blood group
Weight
Size
Job
MasterCard

The second option is used to create passport photos of people who do not
exist.

Then, Eyedown allows you to create several disposable email addresses


without verification with an inbox directly in the documents of your
computer.
02
There you have it, you have as many identities as you want!
A D D I T I O N A L
S O F T W A R E

Now I will introduce you to several software,


Everyone secures a sector because often, being anonymous is not just a
question of IT, it is above all a question of vigilance.

Let me explain, for example, you can have maximum security if you post a
photo somewhere, we will be able to find you, thanks to the exif file of the
photo,
When you take a photo location date camera time and many other parameters
remain in the photo and can be read by anyone who holds your photo.

To secure a photo (size, exif file, name), go to Eyedown toolkit, launch Eyedown
secure photo.

Still in Eyedown toolkit, you have shadow to buy the right to take remote
control of a computer, voicemod to secure and tamper with your voice in case
you need to make your voice become untraceable, we also have the software
to uninstall totally mcafee which for many people on Windows never really
uninstalls and is a pain for data collection.
There are also 2 decentralized crypto wallets, one for bitcoin called Electrum
and one for Monero which is by the way the only truly untraceable
cryptocurrency with an encrypted blockchain. It is thus the only one that
allows truly anonymous transactions. Kleopatra for PGP key creation.
In short, with Eyedown and this Ebook in parallel, you have a perfect toolbox to
get as close as possible to complete anonymity.

02
So, if you followed all of
these options to the letter,
you are totally
ANONONYMOUS.

09

You might also like