Anonymity 2023
Anonymity 2023
Anonymity 2023
C R E A T E W I T H V O R Y Z A K O N E & C A R D I N G Z 2
Thank you for
YOUR PURCHASE
This Ebook is designed to give total anonymity to each of its readers.
During this Ebook we will address 9 main points,
1. Disabling all spy protocols and Windows security vulnerabilities.
2. Securing and encrypting your connection
3. Security and settings that anonymize your browser (2 solutions /
one full security and one without restriction of use)
4. Changing serial numbers and computer
5. Automation of specific machine cleaning
6. Encryption of part or all of the disks
7. Completely disabling Windows monitoring
8. Hide your physical and computer identity
9. Presentation of additional software (in order to secure specific
sectors)
09
W I N D O W S
During this Ebook, I will present to you a lot of software which each has a
specific role.
The one I am going to use as support is called Eyedown its goal is to bring
together all the anonymity and security tools that are not available to the
general public. Eyedown can be downloaded from eyedown.org
You can be sure that your operating system will no longer be able to monitor you
by enabling the following options,
You will need to choose the Encrypt all of your disks option.
Then, click on Boot and those who are in dualboot on Multiboot.
Then AES encryption, then create a secure password with the strong
password generator in the Eyedown toolkit tab, then validate, so we
do a test. Accept the PC restart.
Here the encryption begins, now your disks are encrypted and
02
inviolable.
C L E A N I N G
Now, we will see 2 different security options: one very secure and another just
as secure but which does not restrict use such as site blocking for example.
To start the virtual machine, it is very important to isolate it from the kernel
because if someone manages to take control of your virtual machine remotely,
they will not be able to go back and take control of your real OS.
So to do this, open Eyedown, go to the Toolkit tab, and choose the option to
launch the tails VM with maximum isolation.
Once this is done, and the Vm Tails is started, click at the top left in the
application tab. Open the Tor browser connection then click on “hide from my
local network that I am connecting with Tor” then enter “a bridge that I
already know”.
Open Eyedown then in the browser tab, activate the option “generate Tor
bridges for security.
Once done, launch the connection to Tor and open the browser once the
configuration is finished.
02
N A V I G A T O R
F I R E F O X
To do this, open Eyedown, go to the Eyedown navigator tab and launch the
option reinstalling Firefox with Eyedown add-ons
Now once Firefox is installed, launch all these Firefox settings options for data
protection and anonymity.
Then open Firefox and pin the following extensions that Eyedown has
installed,
Random user agent, NoScript, Privacy Badger, uBlock Origin, Canvas
Fingerprint", Duckduckgo, foxy proxy, cookie auto delete.
The second option is used to create passport photos of people who do not
exist.
Let me explain, for example, you can have maximum security if you post a
photo somewhere, we will be able to find you, thanks to the exif file of the
photo,
When you take a photo location date camera time and many other parameters
remain in the photo and can be read by anyone who holds your photo.
To secure a photo (size, exif file, name), go to Eyedown toolkit, launch Eyedown
secure photo.
Still in Eyedown toolkit, you have shadow to buy the right to take remote
control of a computer, voicemod to secure and tamper with your voice in case
you need to make your voice become untraceable, we also have the software
to uninstall totally mcafee which for many people on Windows never really
uninstalls and is a pain for data collection.
There are also 2 decentralized crypto wallets, one for bitcoin called Electrum
and one for Monero which is by the way the only truly untraceable
cryptocurrency with an encrypted blockchain. It is thus the only one that
allows truly anonymous transactions. Kleopatra for PGP key creation.
In short, with Eyedown and this Ebook in parallel, you have a perfect toolbox to
get as close as possible to complete anonymity.
02
So, if you followed all of
these options to the letter,
you are totally
ANONONYMOUS.
09