Welcome to our New Forums!

Our forums have been upgraded and expanded!

Welcome to Our New Forums

  • Our forums have been upgraded! You can read about this HERE

Cybersecurity series: Part VI

Eankhi

New member
Joined
Mar 19, 2020
Messages
33
Virtulization is a piece of technology that allows you to, as the name suggests, virtualize operating systems without actually installing it into your computer. To virtualize an operating system, you must install a program called VirtualBox (you may also install another program that does the same thing (Linux has a few options) but, in my opinion, VirtualBox is the most user-friendly of them all)

Virtualization allows you to try out new operating systems, which is a great way
to learn Linux.

Operating systems are stored in a file that ends with iso. When you install an operating system, the installer piece of code within the iso file gets run, and it performs the install.

Creating a virtual operating system is simple; download the correct iso, open VirtualBox, and press new, then follow the instructions. You can just default everything. Note: The virtual operating system will be contained in a folder, and the size will most likely be big. You can set the size to a smaller one, but there is a minimum storage requirement for each OS.

Special install notes for jewdows 10:

you will need to go into your virtual machine's settings, and disable the internet by putting an invalid setting (which will prevent internet access).

Go search for jewdows 10 activation keys. This is legal, as these websites have been up for a long time, in most cases. The reason why microjew does not go after these websites, is because you end up using their product, anyways, and give the jews your data.

Once that is done, you can do the nasty jewish install where you are forced to agree to be spied on to use the computer (no worries if vm, of course) that you own.

Jewdos has the ability to detect when it is ran in a virtual machine. If you have installed jewdos, go to the task manager. You will see that it says that it is virtualized.

Virtual machines have security benefits. The virtualized operating system can be viewed as a "container". Therefor, what happens inside the virtual machine, stays in the virtual machine.

I have read that Jewdows can see/read what is inside a virtual machine. I do not know if this is true or not, as there is not any way to see what information microjew is collecting. You can encrypt the virtual machine, but that requires an extension that can be installed.

So what is the point to virtualize, if it is not safe?
This is where Whonix comes in. Whonix is a Linux operating system that only runs in a virtual machine. It is essentially two virtual machines, in one package. The way it works differs from your usual operating system. The two virtual machines are Whonix Gateway and Whonix Workstation.

Note: BOTH must be ran at the same time. They can not work by themselves.

The way Whonix works is as follows:

The Whonix Gateway is configured to go through Tor. Your internet access goes through
the Whonix Gateway first, which goes through Tor.

The routed traffic comes back to the Whonix Gateway, which sends it to the Whonix
Workstation.

The Whonix Workstation goes through Tor, and then you get internet access.

All of that routing may make your internet pages load slow. However, you are now quite hard to unmask. If an attacker/hacker were to try to figure out your actual IP address, they would have to first trace back the Tor traffic to the source IP, which would be the Tor IP from the Whonix Gateway. So they have to again trace back the traffic. If you are wise, and you have a VPN, that would be yet another obstacle for them to break (which is a good thing). That is a lot of layers to go through. But, keep in mind that breaking the barriers is not impossible. A company like microjew got hacked, and they have some of the tightest security measures in the world (so nobody can know how much the jews actually know about us).

There is an even more sophisticated OS that you can use to even further protect yourself.
It is called Qubes OS. This one, however, can not be ran in a virtual machine. This one requires you to actually install it on your drive. This means that you always boot into Qubes OS, unless you dual-boot, but getting rid of the installed operatin system is not always easy. You can loose all your data if you do not know what you are doing.

Qubes is a virtualized operating system, however, it its self is not virtual, but all components
are virtualized, with the Qubes OS being the brain that controls it all. Your internet, programs, etc, is all a virtual machine that only has access to what it needs to run, and it does not communicate with anything else. Yes, it is an operating system that launches everything as a virtual machine.The secuity benefits are extremely high. If anything were to try to hack through, it would end up in a void, as there is nothing to go to. All the hacker would is land in containers. Tor may be used, too.

For security reaons, you should not allow copy/pasting from host (your actual operating system) and the virtual machine. That is just one extra piece of information that you can avoid giving away.

From my understanding, jewdows 11 can not be virtualized. Also, that operating system forces you to make a microjew account, and to my knowledge, there is no work-around. I would strongly encourage you to learn Linux, and make the switch to Linux. Yes, it is not as user-friendly as Windows, yes, there are very few games that are playable on Linux out-of-the-box (there are ways), but the security benefits are much higher, and no annoying updates!

And that is it for the cybersecurity series! Stay safe! This series covered the major steps
you can take to secure your privacy online, and reduce the amount of data that you give to the jews.

HAIL ENKI!!!!
HAIL ENLIL!!!!
HAIL ISHTAR!!!!
HAIL SHAMASH!!!!
 
HiddenSerpent said:
Virtulization is a piece of technology that allows you to, as the name suggests, virtualize operating systems without actually installing it into your computer. To virtualize an operating system, you must install a program called VirtualBox (you may also install another program that does the same thing (Linux has a few options) but, in my opinion, VirtualBox is the most user-friendly of them all)

Virtualization allows you to try out new operating systems, which is a great way
to learn Linux.

Operating systems are stored in a file that ends with iso. When you install an operating system, the installer piece of code within the iso file gets run, and it performs the install.

Creating a virtual operating system is simple; download the correct iso, open VirtualBox, and press new, then follow the instructions. You can just default everything. Note: The virtual operating system will be contained in a folder, and the size will most likely be big. You can set the size to a smaller one, but there is a minimum storage requirement for each OS.

Special install notes for jewdows 10:

you will need to go into your virtual machine's settings, and disable the internet by putting an invalid setting (which will prevent internet access).

Go search for jewdows 10 activation keys. This is legal, as these websites have been up for a long time, in most cases. The reason why microjew does not go after these websites, is because you end up using their product, anyways, and give the jews your data.

Once that is done, you can do the nasty jewish install where you are forced to agree to be spied on to use the computer (no worries if vm, of course) that you own.

Jewdos has the ability to detect when it is ran in a virtual machine. If you have installed jewdos, go to the task manager. You will see that it says that it is virtualized.

Virtual machines have security benefits. The virtualized operating system can be viewed as a "container". Therefor, what happens inside the virtual machine, stays in the virtual machine.

I have read that Jewdows can see/read what is inside a virtual machine. I do not know if this is true or not, as there is not any way to see what information microjew is collecting. You can encrypt the virtual machine, but that requires an extension that can be installed.

So what is the point to virtualize, if it is not safe?
This is where Whonix comes in. Whonix is a Linux operating system that only runs in a virtual machine. It is essentially two virtual machines, in one package. The way it works differs from your usual operating system. The two virtual machines are Whonix Gateway and Whonix Workstation.

Note: BOTH must be ran at the same time. They can not work by themselves.

The way Whonix works is as follows:

The Whonix Gateway is configured to go through Tor. Your internet access goes through
the Whonix Gateway first, which goes through Tor.

The routed traffic comes back to the Whonix Gateway, which sends it to the Whonix
Workstation.

The Whonix Workstation goes through Tor, and then you get internet access.

All of that routing may make your internet pages load slow. However, you are now quite hard to unmask. If an attacker/hacker were to try to figure out your actual IP address, they would have to first trace back the Tor traffic to the source IP, which would be the Tor IP from the Whonix Gateway. So they have to again trace back the traffic. If you are wise, and you have a VPN, that would be yet another obstacle for them to break (which is a good thing). That is a lot of layers to go through. But, keep in mind that breaking the barriers is not impossible. A company like microjew got hacked, and they have some of the tightest security measures in the world (so nobody can know how much the jews actually know about us).

There is an even more sophisticated OS that you can use to even further protect yourself.
It is called Qubes OS. This one, however, can not be ran in a virtual machine. This one requires you to actually install it on your drive. This means that you always boot into Qubes OS, unless you dual-boot, but getting rid of the installed operatin system is not always easy. You can loose all your data if you do not know what you are doing.

Qubes is a virtualized operating system, however, it its self is not virtual, but all components
are virtualized, with the Qubes OS being the brain that controls it all. Your internet, programs, etc, is all a virtual machine that only has access to what it needs to run, and it does not communicate with anything else. Yes, it is an operating system that launches everything as a virtual machine.The secuity benefits are extremely high. If anything were to try to hack through, it would end up in a void, as there is nothing to go to. All the hacker would is land in containers. Tor may be used, too.

For security reaons, you should not allow copy/pasting from host (your actual operating system) and the virtual machine. That is just one extra piece of information that you can avoid giving away.

From my understanding, jewdows 11 can not be virtualized. Also, that operating system forces you to make a microjew account, and to my knowledge, there is no work-around. I would strongly encourage you to learn Linux, and make the switch to Linux. Yes, it is not as user-friendly as Windows, yes, there are very few games that are playable on Linux out-of-the-box (there are ways), but the security benefits are much higher, and no annoying updates!

And that is it for the cybersecurity series! Stay safe! This series covered the major steps
you can take to secure your privacy online, and reduce the amount of data that you give to the jews.

HAIL ENKI!!!!
HAIL ENLIL!!!!
HAIL ISHTAR!!!!
HAIL SHAMASH!!!!

In my opinion, Windows systems are the most unreliable. Whether you run it in VirtualBox or not, the system remains the same, just in a more secure box. This also means that whatever you do in it will probably end up in the hands of the Jews.

In addition to Linuxes, I would also recommend Kali. However, this requires a higher level of IT knowledge, but you can set up more security features.

Good post, thank you.
 
HiddenSerpent said:
Virtulization is a piece of technology that allows you to, as the name suggests, virtualize operating systems without actually installing it into your computer. To virtualize an operating system, you must install a program called VirtualBox (you may also install another program that does the same thing (Linux has a few options) but, in my opinion, VirtualBox is the most user-friendly of them all)

Virtualization allows you to try out new operating systems, which is a great way
to learn Linux.

Operating systems are stored in a file that ends with iso. When you install an operating system, the installer piece of code within the iso file gets run, and it performs the install.

Creating a virtual operating system is simple; download the correct iso, open VirtualBox, and press new, then follow the instructions. You can just default everything. Note: The virtual operating system will be contained in a folder, and the size will most likely be big. You can set the size to a smaller one, but there is a minimum storage requirement for each OS.

Special install notes for jewdows 10:

you will need to go into your virtual machine's settings, and disable the internet by putting an invalid setting (which will prevent internet access).

Go search for jewdows 10 activation keys. This is legal, as these websites have been up for a long time, in most cases. The reason why microjew does not go after these websites, is because you end up using their product, anyways, and give the jews your data.

Once that is done, you can do the nasty jewish install where you are forced to agree to be spied on to use the computer (no worries if vm, of course) that you own.

Jewdos has the ability to detect when it is ran in a virtual machine. If you have installed jewdos, go to the task manager. You will see that it says that it is virtualized.

Virtual machines have security benefits. The virtualized operating system can be viewed as a "container". Therefor, what happens inside the virtual machine, stays in the virtual machine.

I have read that Jewdows can see/read what is inside a virtual machine. I do not know if this is true or not, as there is not any way to see what information microjew is collecting. You can encrypt the virtual machine, but that requires an extension that can be installed.

So what is the point to virtualize, if it is not safe?
This is where Whonix comes in. Whonix is a Linux operating system that only runs in a virtual machine. It is essentially two virtual machines, in one package. The way it works differs from your usual operating system. The two virtual machines are Whonix Gateway and Whonix Workstation.

Note: BOTH must be ran at the same time. They can not work by themselves.

The way Whonix works is as follows:

The Whonix Gateway is configured to go through Tor. Your internet access goes through
the Whonix Gateway first, which goes through Tor.

The routed traffic comes back to the Whonix Gateway, which sends it to the Whonix
Workstation.

The Whonix Workstation goes through Tor, and then you get internet access.

All of that routing may make your internet pages load slow. However, you are now quite hard to unmask. If an attacker/hacker were to try to figure out your actual IP address, they would have to first trace back the Tor traffic to the source IP, which would be the Tor IP from the Whonix Gateway. So they have to again trace back the traffic. If you are wise, and you have a VPN, that would be yet another obstacle for them to break (which is a good thing). That is a lot of layers to go through. But, keep in mind that breaking the barriers is not impossible. A company like microjew got hacked, and they have some of the tightest security measures in the world (so nobody can know how much the jews actually know about us).

There is an even more sophisticated OS that you can use to even further protect yourself.
It is called Qubes OS. This one, however, can not be ran in a virtual machine. This one requires you to actually install it on your drive. This means that you always boot into Qubes OS, unless you dual-boot, but getting rid of the installed operatin system is not always easy. You can loose all your data if you do not know what you are doing.

Qubes is a virtualized operating system, however, it its self is not virtual, but all components
are virtualized, with the Qubes OS being the brain that controls it all. Your internet, programs, etc, is all a virtual machine that only has access to what it needs to run, and it does not communicate with anything else. Yes, it is an operating system that launches everything as a virtual machine.The secuity benefits are extremely high. If anything were to try to hack through, it would end up in a void, as there is nothing to go to. All the hacker would is land in containers. Tor may be used, too.

For security reaons, you should not allow copy/pasting from host (your actual operating system) and the virtual machine. That is just one extra piece of information that you can avoid giving away.

From my understanding, jewdows 11 can not be virtualized. Also, that operating system forces you to make a microjew account, and to my knowledge, there is no work-around. I would strongly encourage you to learn Linux, and make the switch to Linux. Yes, it is not as user-friendly as Windows, yes, there are very few games that are playable on Linux out-of-the-box (there are ways), but the security benefits are much higher, and no annoying updates!

And that is it for the cybersecurity series! Stay safe! This series covered the major steps
you can take to secure your privacy online, and reduce the amount of data that you give to the jews.

HAIL ENKI!!!!
HAIL ENLIL!!!!
HAIL ISHTAR!!!!
HAIL SHAMASH!!!!

You are fogetting Memory/Ram dumping
jewdows make dump of Memory/Ram Data.
Anything on Jewdows is not secure.

You should also add some information about deleting data on Memory/Ram or Encrypting it too.
 
HiddenSerpent said:
Nice guide.

I installed a Ubuntu based Linux distribution, and one (or rather two) glaring issues came up. Both of the software that I need are installed with .msi file and I could not get either of them to work by using Wine, at least not yet. I would have already done full transition, but ChronosXP and indoor cycling software are much needed so I am still kind of on the verge. In every other aspect, Windows is very bad and I can't wait to get fully rid of it.

I thought that I am being smart by installing VirtualBox on Linux and running my cycling software with it on Windows, but the usb ant+ stick that I am using for connecting my device to computer has its range handicapped due to layer between these two systems making the usage unreliable. Obviously using VirtualBox on Windows is a pretty bad idea so I am not even considering that.

Can you help with this?
 
I think i need to bin this computer there is no way back, also my phone they have hacked face ID give them their due quite impressive but really wish they would try someone else :lol: :lol:


Goodbye computer i know henu and oL have helped me if they can overcome face id through an email i never had it set up on then hats off to them.


Any suggestions other than the bin for both would be appreciated, if i try get it fixed they look through all your stuff cant be trusted is the enemy after all.
 
EnkiUK55 said:
I think i need to bin this computer there is no way back, also my phone they have hacked face ID give them their due quite impressive but really wish they would try someone else :lol: :lol:


Goodbye computer i know henu and oL have helped me if they can overcome face id through an email i never had it set up on then hats off to them.


Any suggestions other than the bin for both would be appreciated, if i try get it fixed they look through all your stuff cant be trusted is the enemy after all.

Theres no need to bin.
Disconnect internet connection first
Install a fresh OS.
Then do some mods-
Change its digital mac address and digital serial number using softwares permanently. Do not use spoofing software.
Confirm the change has been done or not in laptop bios too and with other softwares.
Nerver install laptop/computer oem support assistant software on it.

For mobile better to sell and buy a new cheap android and root it and install open source os like linageOS on it.
First check the LinageOS has a compatible firmware for your new mobile on LinageOS official web site.
In addition you have to install jewgle pack on it too. Now thats a privacy and root breach !
Without jewgle pack no app will work!

Faceid you must be using Apple shit.
Another suggestion if they already have your details.
Do hard reset and
Reflash firmware.
Put a tape to cover the face id sensor and buy camera privacy shutter or put tape on your apple cameras.
Never use voice assistant.
Don't put any jos related files on it.

But it hears voices 24x7x365 days.
Even if its switched off.
Tracks gps data even if its switched off.

If you are unaware check this too https://www.rd.com/article/apple-scanning-photos/

Jewgle android is in the queue too.

Mobiles are not personal anymore.
When you browse it sends lots of information. Apart from mac and serial number theres more to change like imei esn something like that. If you change this and have put values of a stolen or blacklisted device then you can guess what could happen next.
Also if you modify these settings on you mobile your service provider will get alert. Better not to change these ids on mobile.

Use computer with linux thats it.
 
robb said:
EnkiUK55 said:
I think i need to bin this computer there is no way back, also my phone they have hacked face ID give them their due quite impressive but really wish they would try someone else :lol: :lol:


Goodbye computer i know henu and oL have helped me if they can overcome face id through an email i never had it set up on then hats off to them.


Any suggestions other than the bin for both would be appreciated, if i try get it fixed they look through all your stuff cant be trusted is the enemy after all.

Theres no need to bin.
Disconnect internet connection first
Install a fresh OS.
Then do some mods-
Change its digital mac address and digital serial number using softwares permanently. Do not use spoofing software.
Confirm the change has been done or not in laptop bios too and with other softwares.
Nerver install laptop/computer oem support assistant software on it.

For mobile better to sell and buy a new cheap android and root it and install open source os like linageOS on it.
First check the LinageOS has a compatible firmware for your new mobile on LinageOS official web site.
In addition you have to install jewgle pack on it too. Now thats a privacy and root breach !
Without jewgle pack no app will work!

Faceid you must be using Apple shit.
Another suggestion if they already have your details.
Do hard reset and
Reflash firmware.
Put a tape to cover the face id sensor and buy camera privacy shutter or put tape on your apple cameras.
Never use voice assistant.
Don't put any jos related files on it.

But it hears voices 24x7x365 days.
Even if its switched off.
Tracks gps data even if its switched off.

If you are unaware check this too https://www.rd.com/article/apple-scanning-photos/

Jewgle android is in the queue too.

Mobiles are not personal anymore.
When you browse it sends lots of information. Apart from mac and serial number theres more to change like imei esn something like that. If you change this and have put values of a stolen or blacklisted device then you can guess what could happen next.
Also if you modify these settings on you mobile your service provider will get alert. Better not to change these ids on mobile.

Use computer with linux thats it.



Okay bro thanks for this reply I haved saved it.

oh yeah its a walking tracking system , even though it is ststing i have been in two places at once.

They are all built so you cant take battery out, thats big brother watching.

i beleive its hackers as i was using a "Dodgy" site they are renowned for hacking you (Porn) any a them sites try hack you to fcuck pardon the pun. :lol:

I will re look at this and try fix it as its just a new phone and would hate to bin it, the computer is a year old but will bin it if required as they over power the screen when you are watching it even if you "cover" the camera.


Appreciate in depth reply mate
 
EnkiUK55 said:
robb said:
EnkiUK55 said:
I think i need to bin this computer there is no way back, also my phone they have hacked face ID give them their due quite impressive but really wish they would try someone else :lol: :lol:


Goodbye computer i know henu and oL have helped me if they can overcome face id through an email i never had it set up on then hats off to them.


Any suggestions other than the bin for both would be appreciated, if i try get it fixed they look through all your stuff cant be trusted is the enemy after all.

Theres no need to bin.
Disconnect internet connection first
Install a fresh OS.
Then do some mods-
Change its digital mac address and digital serial number using softwares permanently. Do not use spoofing software.
Confirm the change has been done or not in laptop bios too and with other softwares.
Nerver install laptop/computer oem support assistant software on it.

For mobile better to sell and buy a new cheap android and root it and install open source os like linageOS on it.
First check the LinageOS has a compatible firmware for your new mobile on LinageOS official web site.
In addition you have to install jewgle pack on it too. Now thats a privacy and root breach !
Without jewgle pack no app will work!

Faceid you must be using Apple shit.
Another suggestion if they already have your details.
Do hard reset and
Reflash firmware.
Put a tape to cover the face id sensor and buy camera privacy shutter or put tape on your apple cameras.
Never use voice assistant.
Don't put any jos related files on it.

But it hears voices 24x7x365 days.
Even if its switched off.
Tracks gps data even if its switched off.

If you are unaware check this too https://www.rd.com/article/apple-scanning-photos/

Jewgle android is in the queue too.

Mobiles are not personal anymore.
When you browse it sends lots of information. Apart from mac and serial number theres more to change like imei esn something like that. If you change this and have put values of a stolen or blacklisted device then you can guess what could happen next.
Also if you modify these settings on you mobile your service provider will get alert. Better not to change these ids on mobile.

Use computer with linux thats it.



Okay bro thanks for this reply I haved saved it.

oh yeah its a walking tracking system , even though it is ststing i have been in two places at once.

They are all built so you cant take battery out, thats big brother watching.

i beleive its hackers as i was using a "Dodgy" site they are renowned for hacking you (Porn) any a them sites try hack you to fcuck pardon the pun. :lol:

I will re look at this and try fix it as its just a new phone and would hate to bin it, the computer is a year old but will bin it if required as they over power the screen when you are watching it even if you "cover" the camera.


Appreciate in depth reply mate

Give a close look to camera there could be a tiny pin size hole that's the sensor. The same is placed next to front camera of mobile called proxymity sensor (i guess). That controls the auto brigtness. Might be you are covering that sensor on your laptop which causes over bright screen.

If there's no sensor and the camera is acting to control the brightness than thats a red flag camera is watching everthing all the time.

These auto bright screen settings can be turn off in setting do some search on internet for how to disable auto bright screen of (laptop model no. Or laptop company) windows 10 or 11 whatever you are using.


Install linux you may have more control on you laptop.
You may try linux mint it free open source and good for new users. Install a lite version since you are using it only for surfing and media files.

Suggest you to buy a used laptop for JoS. That's more reliable and cheap option.
That may have less privacy breaches. The battery would be an issue but who cares put a generic battery but use genuine adoptor/charger it has more juice to deliver.
Dell last longer.


Porn, i hope you are aware of this. https://ancient-forums.com/viewtopic.php?f=3&t=69855&hilit=Porn
 
robb said:
EnkiUK55 said:
robb said:
Theres no need to bin.
Disconnect internet connection first
Install a fresh OS.
Then do some mods-
Change its digital mac address and digital serial number using softwares permanently. Do not use spoofing software.
Confirm the change has been done or not in laptop bios too and with other softwares.
Nerver install laptop/computer oem support assistant software on it.

For mobile better to sell and buy a new cheap android and root it and install open source os like linageOS on it.
First check the LinageOS has a compatible firmware for your new mobile on LinageOS official web site.
In addition you have to install jewgle pack on it too. Now thats a privacy and root breach !
Without jewgle pack no app will work!

Faceid you must be using Apple shit.
Another suggestion if they already have your details.
Do hard reset and
Reflash firmware.
Put a tape to cover the face id sensor and buy camera privacy shutter or put tape on your apple cameras.
Never use voice assistant.
Don't put any jos related files on it.

But it hears voices 24x7x365 days.
Even if its switched off.
Tracks gps data even if its switched off.

If you are unaware check this too https://www.rd.com/article/apple-scanning-photos/

Jewgle android is in the queue too.

Mobiles are not personal anymore.
When you browse it sends lots of information. Apart from mac and serial number theres more to change like imei esn something like that. If you change this and have put values of a stolen or blacklisted device then you can guess what could happen next.
Also if you modify these settings on you mobile your service provider will get alert. Better not to change these ids on mobile.

Use computer with linux thats it.



Okay bro thanks for this reply I haved saved it.

oh yeah its a walking tracking system , even though it is ststing i have been in two places at once.

They are all built so you cant take battery out, thats big brother watching.

i beleive its hackers as i was using a "Dodgy" site they are renowned for hacking you (Porn) any a them sites try hack you to fcuck pardon the pun. :lol:

I will re look at this and try fix it as its just a new phone and would hate to bin it, the computer is a year old but will bin it if required as they over power the screen when you are watching it even if you "cover" the camera.


Appreciate in depth reply mate

Give a close look to camera there could be a tiny pin size hole that's the sensor. The same is placed next to front camera of mobile called proxymity sensor (i guess). That controls the auto brigtness. Might be you are covering that sensor on your laptop which causes over bright screen.

If there's no sensor and the camera is acting to control the brightness than thats a red flag camera is watching everthing all the time.

These auto bright screen settings can be turn off in setting do some search on internet for how to disable auto bright screen of (laptop model no. Or laptop company) windows 10 or 11 whatever you are using.


Install linux you may have more control on you laptop.
You may try linux mint it free open source and good for new users. Install a lite version since you are using it only for surfing and media files.

Suggest you to buy a used laptop for JoS. That's more reliable and cheap option.
That may have less privacy breaches. The battery would be an issue but who cares put a generic battery but use genuine adoptor/charger it has more juice to deliver.
Dell last longer.


Porn, i hope you are aware of this. https://ancient-forums.com/viewtopic.php?f=3&t=69855&hilit=Porn

Thank you bro for in depth reply appreciate it.


Yeah mate they take full control of screen they can watch you and you can see them watching you my dad even seen it when i showed him. Defo red flag.


Either porn or hesoals more the former i would say.


I wouldnt be using that again on the new one for sure, i will click the topic i think i have read it before will do again.

Take care mate.
 
Responding to everyone;

VirtualBox is not a 100% closed garden. If it were, you would not be able to use it. The virtual environment needs access to your system components such as CPU to function, however, the access is limited. Jewdows has been engineered to take advantage of this to spy on what is going on inside the virtual environment. However, this data that it collects gets sent to microjew via hidden/backdoor channels that require internet. This can be seen with Wireshark, as I have explained. Removing telemetry access via the 3 scripts will block this attack vector.

RAM / memory is volatile. It gets deleted as soon as you reboot.
https://www.howtogeek.com/171872/why-does-ram-have-to-be-volatile/
for more information.

I will be adding a post soon on encryption and how to make use of it in a safe way. Encryption is murky due to the endless garbage that is all over the internet. Many services make statements like "We use strong encryption, so your date is safe!", but what encryption are they actually using? How is their promised security any different from someone else's? This is usually nowhere to be found, or, it is buried deep in the documentation of said service.

Jewdows API is very easy to manipulate and it is filled with loopholes. Accessing the webcam is a very common hack. The hacker can also prevent any physical lights from turning on when they access your webcam, making it impossible for you to know that you are being watched, unless you have a deep understanding of how things work. Also, nearly every laptop that has a built-in webcam, will have microphones, and as you can already guess... it is an easy attack. Physically covering the camera only blocks the visuals. I would suggest unplugging your webcam if it is an external one. For built-in ones, you can mute the audio. Be sure to check that it is muted by recording something. It should be silent. Be sure to check regularly that it is muted.

Phones are not secure by default. The original ideal of Android was to be a portable version of Linux (in-fact, Android IS a form of Linux), however, Android was bought by jewgle, and well, we all waved farewell to mobile freedom. This is what would happen if microjew bought a Linux distro, too.
F-droid repository has an open source camera, keyboard, caller, contacts, and many more. Use these instead of the default ones.

Kali Linux used to be the go-to Linux for hackers and security devs, as it has most of the things you will need to do said things (minus anonymity, security), but it is slowly turning into just a regular Linux distro. Even the Kali website its self says this.
 
Apologies for posting here and am not sure if this is the correct place - but it seems that there has been a data breach on ancient-forums and email address details passwords might have found their way onto the dark web. just mentioning this as i got a breach alert from my password vault. this is a little dated but i was alerted on the 9th of December.

just thought to let someone know and hopefully it can be investigated or fixed.
 

Al Jilwah: Chapter IV

"It is my desire that all my followers unite in a bond of unity, lest those who are without prevail against them." - Satan

Back
Top