πŸ•ΈοΈ
Th4ntis CyberSec
  • πŸ•·οΈ>whoami_
  • πŸ–₯️General Info
    • CyberSec News
    • Getting Started and other Resources
      • CompTIA Certs
        • Security+
        • Pentest+
    • MITRE ATT&CK
    • Cyber Kill Chain
    • Docker
  • πŸ’»Networking
    • General Networking
    • Common Ports and Protocols
    • TCP/IP Model
    • OSI Model
    • Subnetting
    • Wireshark
    • NMap
    • Wireless
      • Wardriving/WiFi Sniffing
    • 3-Way Handshake
  • 🐧Linux
    • Common commands
    • Sudo
    • Files and File contents
    • Sed Awk and Grep
    • Permissions
  • πŸͺŸWindows
    • Event Codes
    • Powershell
    • Internals
    • Active Directory
  • πŸ”ŽOSINT
    • OSINT Tools
    • IP/Domain OSINT
    • Email/Username OSINT
    • URL OSINT and Sandboxing
    • Social Media OSINT
    • Website OSINT
    • Password OSINT
    • Physical Location OSINT
    • Image OSINT
    • People OSINT
    • Phone Number OSINT
    • Shodan
    • Google Dorking
  • πŸ› οΈTools
    • Brute Force
      • Hydra
    • Credential Dumping
      • Mimikatz
    • Enumeration
      • Bloodhound
      • Certipy
      • Dirb/Dirbuster
      • Enum4Linux
      • GoBuster
    • Exploitation Framework
      • Metasploit
      • Sliver
      • Cobalt Strike
    • Hash Cracking
      • Hashcat
      • JohnTheRipper
    • Methods
      • Powershell Obfuscation
      • Privilege Escalation
      • Pass-The-Hash
      • Kerberos and Kerberoasting
    • Vulnerability Scanners
      • Nessus
      • OpenVAS
    • Web App
      • BurpSuite
      • OWASP Zap
    • Wireless
      • Aircrack-ng
      • Kismet
      • Bettercap
      • HCXDumptool
      • Wifite
    • Impacket
    • Social-Engineer Toolkit (SET)
  • πŸ“”Guides and How-To's
    • Lab Setup
      • Ubuntu VM
      • Kali VM
      • Windows User VM
      • Windows Server VM
    • Wardriving
      • Pwnagotchi
    • Wireless Pentesting
      • WiFi Pineapple Basics
      • Evil-Twin Attack
    • Over The Wire
      • Bandit
      • Natas
      • Leviathan
      • Krypton
      • Narnia
      • Behemoth
      • Utumno
      • Maze
      • Vortex
      • Manpage
    • Docker and Kali Linux
    • Staying Private and goin Dark Online
  • πŸ“•Quick References
    • Tools
      • Tmux
      • NMap
      • Ffuf
      • NetExec
      • CrackMapExec
      • Proxychains
      • OneDriveUser Enum
      • Hashcat
    • One-liners
    • Reverse Shells
    • Post Exploitation
    • Enumeration
      • Google
      • Sublist3r
      • NMap
      • DNSDumpster
    • Hashcracking
    • Wireless
  • πŸ““Courses
    • PNPT
      • Practical Ethical Hacking
      • Windows Privilege Escalation
      • Linux Privilege Escalation
      • OSINT Fundamentals
      • External Pentest Playbook
  • ☁️TryHackMe
    • Attacking Kerberos
    • Hacking with Powershell
    • Powershell for Pentesters
    • Linux PrivEsc
    • Windows PrivEsc
    • Blue
    • Kenobi
  • πŸ“¦HackTheBox
    • Starting Point
      • Tier 0
        • Meow
        • Fawn
        • Dancing
        • Redeemer
        • Explosion
        • Preignition
        • Mongod
        • Synced
      • Tier 1
        • Appointment
        • Sequel
        • Crocodile
        • Responder
        • Three
        • Ignition
        • Bike
        • Funnel
        • Pennyworth
        • Tactics
      • Tier 2
        • Archetype
        • Oopsie
        • Vaccine
        • Unified
        • Included
        • Markup
        • Base
    • Walkthroughs
      • Lame
      • Analytics
      • Manager
      • Codify
Powered by GitBook
On this page
  • Starting out - Creating accounts
  • Hardware
  • Software
Edit on GitHub
  1. Guides and How-To's

Staying Private and goin Dark Online

Last updated 12 months ago

Starting out - Creating accounts

  1. Create a account, make the email something random that isn't related to you. An alternative to Protonmail is .

  2. Next would be login to with your Proton account. You'll be using this to create emails for individual accounts/services you'll be using and making. An alternative to SimpleLogin is .

  3. Go to for a Password manager. Make a new email using SimpleLogin for this, and start using this to save all your passwords/logins/and etc.

  4. When making online payments use . This lets you create virtual payment cards for one-time purchases or subscriptions. NOTE: Some services will not let you or will fight you on using these virtual cards.

  5. I also HIGHLY recommend signing up for the other services Proton offers, such as their and . There is usually a bundle package for email and VPN and all in one.

  6. From here, when signing up for anything, use SimpleLogin to make an email for it to have it forwarded to your Proton account, saving the logins in Bitwarden, and making payments with Privacy.


Hardware

  1. I personally recommend a Google Pixel Phone - Unlocked, and installing or . iPhones are good as well though some of their privacy policies lately kinda of sketchy(Eg. Scanning iCloud pictures and such). Using instead of a normal carrier. So you'll be getting a new phone number. When giving out your new phone number to family/friends, make sure you trust them to not give it out to others.

  2. Most machines work but will depend on your use case, but rather than using Windows or Mac OS, go with (for more advanced) or base . I typically use a flavor of for ease as most things just work with it but to make it more privacy based you will want to look into what changes should be made.


Software

    1. I myself am a fan of Librewolf as it's a fork of Firefox, with more out of the box privacy features, and you can use containers, "Each container is isolated from the others, so you can access sites logged into different accounts.". So this will keep sites isolated from each other as to not share cookies and other info with each other.

  1. Self host as much as possible, such as storing your Bitwarden manager and files on your own machines.

can be used to encrypt files/folder to be uploaded to cloud storage for extra security.

for a Password manager.

for File hosting.

or Browser.

, , or for chat messaging, though you will need other people on the platform as well or your message will not encrypted.

for creating phone numbers, emails, etc. to use instead of your real personal information. Note: You may need a stock android/iPhone device to sign up for a plan. I was unable to while using CalyxOS.

πŸ“”
Protonmail
Tutanota
SimpleLogin
Anonaddy
Bitwarden
Privacy.com
VPN
Drive
CalyxOS
GrapheneOS
MintMobile
QuebesOS
Debian
Ubuntu
Cryptomator
Bitwarden
NextCloud
LibreWolf
Brave
Signal
Element
Session
MySudo