What you do if you’re being followed
If you’re being followed on foot, odds are they’re monitoring you digitally as well, unless you were just picked from the crowd (i.e. you’re walking through the wrong neighborhood and … Read More
If you’re being followed on foot, odds are they’re monitoring you digitally as well, unless you were just picked from the crowd (i.e. you’re walking through the wrong neighborhood and … Read More
You should start by studying Anonymous and learning the many reasons they’re not world top hackers. Common tricks used by Anonymous are: 1. DDoS – A Distributed Denial of Service attack … Read More
Start now. Create funny accounts everywhere – parody accounts, dummy accounts, etc. Use the same password and attach to multiple emails. After a few years, you can slowly build these … Read More
You need to familiar yourself with proxies, vpn’s, and tor/torrents. A VPN sets up a secure network at your home. From there, you can connect from anywhere via a proxy. … Read More
Set up a home network: How To Set Up A Home Network In 5 Simple Steps Install Kali Linux (the update to BackTrack): Rebirth of BackTrack, the Penetration Testing Distribution. Learn the … Read More
The long story short of it is that in April 2013, Anonymous (YourAnonNews) on Twitter (a popular Anonymous Twitter account with over 1 million followers), started an Indiegogo campaign: Anonymous Wants To Start … Read More
Anonymous isn’t a group, so there are no members. If you’d like to contribute to the Anonymous ideal, simply identify yourself as an Anon and/or contribute in any way you … Read More
The open-sourced nature of Anonymous actually makes it infinitely more powerful than Mr. Lyon’s propaganda implies. First, to clear up the misinformation in his post: 1) Anonymous does not have … Read More