Page cover

🥷Anonymity

If you want to actually survive, read on.

Anonymity isn’t about hiding your IP. It’s about not being identifiable — behaviorally, technically, and operationally.


🖥️ Core Architecture: Isolation & Compartmentalization

✅ The Only Working Setup: Qubes OS + Whonix (or Kicksecure)

Forget VirtualBox + Whonix on Windows. That’s entry-level. It’s fragile, detectable, and one misstep exposes everything.

Setup:

  • Qubes OS (Xen-based, security-by-isolation)

  • Whonix-Gateway running in a dedicated NetVM

  • Whonix-Workstation as AppVM, forced through Tor

  • All sensitive tasks (drainer, wallet) in separate, disposable VMs

Why Qubes? Because your browser, wallet, and Telegram client shouldn’t share the same kernel. Qubes isolates them completely — even if one gets compromised, the others stay clean.


🌐 Network Layer

✅ Do:

  • Use Tor Browser in Whonix-Workstation

  • Enable Safest Security Level (JavaScript off)

  • Use onion services when available (e.g., ProtonMail onion)

  • Route all traffic through Tor

❌ Don’t:

  • Use bridges unless you’re in a censored country (obfs4 breaks fingerprinting)

  • Touch “Tor alternatives” like I2P or Lokinet — they’re dead or trivial to deanonymize

  • Assume DNS or WebRTC leaks are your biggest problem — they’re not


🧬 Fingerprinting

Your browser fingerprint is more unique than your face.

Websites collect:

  • Canvas, WebGL, font rendering

  • Screen size, timezone, language

  • AudioContext, battery status

  • Client hints, TLS fingerprint (JA3), HTTP/2 signatures

Even in Tor, you stand out if you don’t blend in.

Minimize Fingerprint Drift:

  • Use Tor Browser — it’s the only one that actively resists fingerprinting

  • Never resize the window (Tor uses fixed size)

  • Disable custom fonts, extensions, or scripts

  • Avoid WebGL-heavy sites (they increase entropy)

🔍 Test yourself: https://browserleaks.com If your fingerprint isn’t identical to other Tor users — you’re exposed.


💾 Data Protection: Full Disk + Memory Security

Use VeraCrypt

  • System encryption, not just file containers

  • Hidden OS with plausible deniability

  • No auto-mount, no saved passwords

  • Wipe RAM on shutdown (Qubes does this)

Never store decrypted data on SSD — wear leveling leaks data even after deletion.


🕵️‍♂️ Operational Security (OpSec)

Tools don’t protect you. Habits do.

Critical Rules:

  1. No reuse

    • One identity per campaign

    • One email, one VM, one wallet, one exit

    • Burn after use

  2. No cross-contamination

    • Never copy-paste between VMs

    • No shared folders, no USB passthrough

    • Use Qubes qrexec for secure inter-VM comms (if absolutely needed)

  3. No personal info anywhere

    • No real names, no birthdays, no photos

    • Even metadata (EXIF, document author) can burn you

  4. Time & behavior masking

    • Don’t log in at the same time every day

    • Don’t use the same typing rhythm

    • Whonix includes kloak — use it to randomize keystroke timing

  5. Physical security matters

    • Webcam covered?

    • Microphone disabled?

    • Are you being watched?


This is the baseline. Anything less is gambling with your freedom.

Last updated