Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

How to dissociate an already-hacked computer from your real identity..?


  • Please log in to reply
No replies to this topic

#1 kingneil

kingneil

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:02:07 AM

Posted 25 September 2016 - 12:53 AM

Let's say that you have a computer that is hiding behind a dedicated Tor Ethernet hotspot.

 

So let's assume the computer got hacked by web browser exploit.

 

So it is hacked, but it is still connected via a Tor Ethernet.

 

Therefore, the hacker can see WHAT you are doing, but not WHO you are, i.e. your real IP.

 

So... I want to operate in this environment.

 

What kinds of things would I do to stop this laptop from being tied to me..?

 

I will give you a list of things I thought of... I would like you to add to this list or correct anything I got wrong.

 

1. Laptop manufacturer

 

2. System spec

 

3. Wipe/re-install the BIOS and HDD from any previous attacks

 

4. Lists of programs installed. Perhaps only install a web browser and nothing else

 

5. Don't visit sites in your ordinary browsing routine on clearnet

 

6. Typing style / speed / vocabulary / language / typos, i.e. forensic linguistics

 

7. Time of the day that you use the computer.. clock on the machine..

 

8. Physically remove the webcam, mic

 

9. Physically remove the WiFi chip, so it can't scan for nearby networks and devices. So the only connection is directly by Ethernet to the Tor hotspot

 

10. Don't type your real name, or log into any accounts tied to your real name.

 

What do you think..?



BC AdBot (Login to Remove)

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users