• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

Professional safety measures + Source (1 Viewer)

Currently reading:
 Professional safety measures + Source (1 Viewer)

Recently searched:

gkgrsnkzlcksn

Member
LV
2
Joined
Dec 11, 2022
Threads
21
Likes
8
Awards
6
Credits
4,014©
Cash
0$
Hello.

Super-thinking people of the capitalist age who have taken to the illegal path. (this entry seems a bit stolen)

I wanted to make a different introduction, first of all, I would like to enter the subject slowly and give a summary about myself. As an illegal forum, I only have IP membership here, I am not a membership or activity on any other tr site, I just stuck around for a while in order not to mention the others as Donkey Tepe and the site name. This is from 2020. I cannot say that I have opened many comments or topics on this topic, I write and communicate as needed. Since I am a person of first principles, I research the people I will communicate with and check their safety. Generally, my way of addressing them is in the style of my teacher, and I play the role of a jerk well.

Why did I choose the illegal path when I was on the right path?

There are many reasons for this, such as why some of us choose this path, the main reasons are incompatibility, insufficient salary, the administration's oppression of the people, etc.

It takes time to completely move from legal to illegal, and it is not easy to design the system accordingly, such as some terms, jargons, methods, etc.

My business is with rich people + hot girls and those who show their ass, which is a phenomenon that wanders around TikTok with their ass in the air. I slap and fuck these people, take their money and save it / eat it. I help the poor with the money I receive, I have a sensitivity to take from the rich and give to the poor. I never, ever put myself at risk for small things, family, environment, friends, etc. I don't want to go and slap the poor, as I said, I steal from the rich, but not from every rich person, those who understand understand. Let's say on this site, everyone did wrong to each other and slapped each other, you will never see this action from me.
Let's get into our topic now without boring you.

You can partially see 10% of what I will write in this forum or other forums, the rest of what I will write will be details that even professionals overlook.

It will turn the novices into professionals.

Even though the master does not appeal to professionals, I know that it will help them review their shortcomings.

I spent a lot of time to gather the subject, I compiled and wrote down sections from the security articles and old interviews of Fabriel, who used to work in cyber IT crimes and left TR lands, along with my own knowledge and experience. Even though I have not known him for a long time, it was useful for me to discover him. I can say it's up to my safety. He is known as a person who does not reveal himself publicly in terms of confidentiality and hides himself very well. Moreover, one of the former managers of the destruction does not hang out anywhere else. The last thing I know about him is that he is still continuing his business outside legally.

That's why I added the blogger address as a source, which can only be accessed by those who know, for your benefit. I hope I haven't violated the forum rules. If you look at it, the blogger address appeals to a certain audience.

ENTRANCE.

Mistakes made in security

Use systems such as Linux, tails, os etc. and you will be safe. WRONG

You can be safe by installing browser add-ons such as installing a VPN, using firewal, using antivirus. WRONG

You will be safe by using an open line disposable, an old wedge phone disposable, a foreign number or +90. WRONG.

In drop shipping, sending the consignment openly rather than camouflaging it directly, or in hand-delivered transactions, delivering/receiving to security cameras/under the radar of plainclothes police. WRONG.

We can extend these articles by multiplying them. Although many of you have taken such precautions, do not say that many of you have come forward and been sued, but there is no doubt in you.

So, you should ask yourself this question: If I'm being packaged even though I've taken every precaution, I must have a deficit somewhere, but where? If you think about this and take precautions, again. WRONG. Because it was necessary to take precautions beforehand, not after it was recorded in the registry.


How will you be protected from such security vulnerabilities?


First, clean new SSD (as a recommendation, Samsung Evo 860-870 can be long-lasting). When using an operating system, it does not matter whether it is Windows or another, we will not install anything after the clean installation. You will encrypt the system with veracrypt. It should ask you for a password at every startup, not just the C part, but the entire disk. .

After encryption, if you have a VPN on your system, install it securely (such as ExpressVPN, NordVPN, etc.) + set up your firewall system and log in to your secure VPN account.

Then, do whatever you want, such as fine-tuning your system, customizations, system updates, program installations) But never forget that your traffic must be encrypted.

If the traffic suffers a sudden disconnection, your IP address may be revealed and the killswitch (VPN kill switch) will not save you because it times out.

You should choose secure modems with SysLink / Asus / Keenetic VPN & router support. The prices may seem expensive, but they are a must. These modems do not keep logs and do not constantly log and send their activities like the modems distributed under the TR umbrella.

In the new fiber campaigns, companies such as Vodafone, Superonline, etc., which are mandatory for people, have logos.
They make you rent modems and prevent VPN usage, so you have problems when doing port and tunneling, you do not have full access to the modem. All your activities are intermittently transmitted to special teams established in cooperation with Cimer & TUBITAK.

That's why you should buy/buy the modems I wrote above from abroad. It is to your benefit to install a VPN on the modem router. Your IP address will not be disclosed in case of any VPN timeout. Because the layer system is activated, you will not worry about your VPN application losing connection.

You will encrypt with an operating system installed on a clean new SSD + veracrypt,

You will install VPN + your Router setup + firewall.

Prefer Passport (preferably open line foreign) Turkcell 534 serial numbers, use the symbian system as an open line phone. Signal blocking modem type features in your home/room; phone tapping prevention, location detection GPS blocking, frequency jammer feature, wireless camera system blocked blocking, hidden voice detection. There are many models in the market that are called anti-jammers, but they should cover the features I mentioned. There are limited sites selling in TR, but whatever you buy is entered into the system with your TR address, you cannot buy every product. For example, when you contact for a product with this feature, they notify you immediately. Do not make this mistake to the authorities.

These products are most easily found abroad, but there is a high probability of problems due to customs. There is no other option than leaving this job to professional intermediaries. Prices are skyrocketing because intermediaries intervene. I am thinking of selling these devices in the future. First, I need to know the sellers around. Is there anyone who does this job? From what I've seen and apparently it doesn't exist, but it is 100% available on the underhand black market.


You will not use software with the 14 eyes alliance. I left the link to the blogger address, which brings together all the resources I follow regarding this, as a source.




You will not make your communications through services such as discord, telegram, whatsapp, instead you will use services such as qtox, jami, signal, criptex, which we obtained in the source above,



You will prefer secure services for e-mail,


You will use a secure browser,


You will use secure file hosting and storage services,


You will use open source privacy plugins depending on your system,


You will disable your phone camera and microphone from unauthorized use, it will be under your control,

https://fabsec.blogspot.com/2021/08/...u-without permission.html


While doing the shipping method, you will have the cargo picked up from home, the gift package will be beautifully packaged, it will be fake money that you will send in a way that no one will think of, based on your imagination, it may be medicine, you should camouflage these with clothes, jewelry, dresses, etc.

In hand deliveries, do not hand the deposit directly to the person. There may be plainclothes police around, you may not be in a blind spot, you may be caught immediately. And most importantly, you should be very careful during hand deliveries. Do not meet with unknown people, especially new ones. Try to use ESC or different techniques. The person coming to meet you may also be a police officer. !


For hand deliveries, a blind spot scan should be done before the meeting. Get together with 3.5 friends and grab a drink, cola, seeds, etc., and chat. Go to that place 1 week before the meeting, check the cameras around without revealing them, write down in your memory which type they are, identify the blind spots, all this will draw attention. Don't peek left and right, your friends shouldn't say what's going on dude, why are you looking at the cameras? Friends who are tight-lipped are very important. Choose them carefully. If you don't trust anyone, do it yourself with a single gun, to identify blind spots.

Do not go to the meeting yourself after the blind spot, bring intermediaries if you have the means or solid friends or if you remember, send them. During the delivery/receiving, you should be very comfortable and professional, your body language should not reveal you, you can camouflage yourself or your sent intermediaries by taking advantage of the covid and wearing a mask. You/the intermediaries. Determine camouflaged hair, beard style and clothing so that you cannot be recognized again. Do not carry or allow anyone to carry sharp sharp tools or anything that will give you away. Make sure your phone is encrypted and set it to reset itself in case of entering the wrong pin. Do not have a memory card inserted or use a safe backup phone for such operations. .


Important excerpts from the Fabriel Interview:

Have you ever been involved in any illegal activity?

No, it's illegal
I do not support them, but it does not mean that I have never been there, and this does not mean that I constitute a criminal act.

How can we truly disguise ourselves?

The moment you start thinking like a police officer, but as I wrote at the beginning, it is a method for illegal formations, I do not offer this suggestion within the scope of hiding, if you are asking personally, you will have received this answer in response to this, there must be a difference between the prey and the hunter, if there is prey on both sides, the formations are doomed to collapse, if both sides If he becomes a hunter, the consequences of tension will trigger potential wars. The way I addressed him was at least an answer.

But dangerous people use the information shared on your blog?

We can't prevent this and we can never know who is what. My purpose in creating the me/we blog was to draw attention to personal security, so that those who seek the truth will surely find it, that's why the blog address is secret, I didn't hide the devil in the details, I put it in front of everyone's eyes so that they can find it more difficult, because people focus on the unseen points. they miss details; If we touch on the "never" part, we can only know who is who when we subject it to research. We cannot comment on someone we do not know, we only make judgmental remarks, we only gain knowledge as soon as we start to know that person. But I cannot help but write, please forward our posts to other people without any interest, but to those who deserve it and appreciate it. I know that those who read all the posts will start to see their shortcomings like the light of the full moon.


Do you have any projects?

These software used by many people; We are in contact with important companies and independent developer organizations such as Veracrypt, Megabasterd, PilferShush Jammer, ExpressVPN, Zemana LTD, Signal, Criptext and we support them (of course, there are those whose support has ended) and we contribute to their development, we provide language support and many feature updates. We introduced these practices (let's say naively, within the occasion/reasons). We already keep a bibliography on our blog, you can take a look.


Do you consider yourself a hacker?

This question has been asked many times, I do not see/call myself a hacker, it is not a situation that appeals to me, we have no intention of proving ourselves to anyone or making a show of strength, who am I? What is the purpose of presenting a virtual demonstration to someone else? Nothing... We continue our fellowship intermittently just to be useful. No matter how knowledgeable we are, at some point we are blind and deaf, which shows that we are always hungry for knowledge when we are lacking. If there are those who can understand what I am talking about, there are. I am a carpenter and make things out of wood. I build and demolish whenever I want, but no one knows about it because my construction and destruction take place in my invisible place. If I want to demolish a building, I destroy it by turning the pieces of wood into ashes. Thank you for the questions, I wish success, health and peace for everyone.

And as a footnote, I hope that the answers I gave to the questions did not come across as arrogant and arrogant. Everything starts with perceptions, it is important to direct perceptions.


END.

Let's not forget that there is also the police among us, it is not known who they are, I think they are included in the tg group, it is not difficult for the state police to pay money and become a member of the forum, they read what we write and look for exploits from our articles. Cyber police gather at regular intervals and sample site A, person B shared the subject and content writing style replies Contact addresses, etc. are all examined in detail, looking for even the slightest clue that could lead to a vulnerability. When the vulnerability is found, the person is followed and eventually caught. Let's be careful about every word we say. I say to the police, go play marbles, try to catch those who traffic in child pornography, make videos, kill people and commit atrocities. We are after our bread, not after slapping the poor. Cybermen have become flatterers of the rich, they see protecting their money as a divine duty.


I have been trying to convey this topic to the forum for more than 1 hour. I have edited and colored the articles one by one, I apologize in advance for my spelling mistakes. If you know of such good resources, you can include them in the topic with comments.
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom