Many fraudsters get caught because they do not understand the technology they are dealing with.
Being business minded and having an entrepreneurial mindset in this business is not just making money, it is also protecting yourself legally. This applies to both real world and DarkNet business.
There are many ways you can get caught and be tracked. First we will go over the ways your computer can be tracked.
The easiest way you can be tracked is by IP address and this is easily hidden using a proxy or VPN. If your real IP address is exposed, the feds will issue a warrant to your service provided and there will give your address, then your door will be kicked in.
All it takes it ONE TIME, one time and they can attach your name to your actions online and produce an entire criminal history. Keep it hidden, and remember even with gmail or online email apps, your IP is attached to each email when you send it.
The second way you can be tracked is a newer form of unique identification called Browser Fingerprinting. In case of web browsing your software configuration usually provides a pretty unique fingerprint that can be tracked as you browse.
Also every piece of information you post to different sites will contain information about you. For example the time of your postings will give a clue about which time zone you are in even if you don't provide any personal information.
Let's break your identity into domains and lets discuss each domain then. First, YOUR computer. How can an federal agent identify a person from the computer he uses? what is the digital fingerprint they leave behind?
There is a chain that leads all this information directly to you: Real Life Persona and Geography >>> Digital Fingerprint >>> User's Cyber Persona. All a federal agent has to do is works his way backwards linking you to digital fingerprints and finally identifying you as a person.
We need to know what access, tools and techniques must an federal agent possess to rebuild a fraudsters identity:
1. IP Address - Every computer on a network has a unique number. Every site you visit saves this number and attaches it to your activity. Law enforcement officials can trace your IP address back to your exact physical address by calling your service provide who keeps records. Most fraudsters know this and protect against it by either using a proxy or employing VPN(Virtual private networks)
2. Browser Fingerprinting - A browser fingerprint is information collected about a computer or mobile device for the purpose of identification. Fingerprints can be used to fully or partially identify individual users or devices even when cookies/javascript are turned off. Many of this can even happen through tor. Many people feel save behind a proxy or VPN, but sadly this is not enough to keep you out of prison. Browser fingerprints consist of your operating systems, which programs you have installed, fonts installed, etc. Surprisingly this information when all tied together makes a unique fingerprint of you as a user, which can be used in court to uniquely identify you. This is why it is best to use a Hacked Remote Desktop, along with a VPN to hide yourself. This puts at least 2 degrees of separations between you and the feds.
3. HTML5 Canvasing - this method uniquely identifies you based on YOUR GRAPHICS CARD & Computer configuration, you could be behind a VPN or proxy and they still would have you uniquely identified. This method uses your graphic card, processor ect. to draw a unique image in a hidden area on your screen, then apply a hash to the lines drawn. Because no two computers are exactly alike, each is different and can be used to identify you. Again, This is why it is always best to use a purchased hacked Remote Desktop behind a VPN/Proxy.
4. Snitches - NEVER tell anyone on darknet your real name or reveal any details about you. This is the #1 way people get caught. One of your vendors, etc. will get caught and to lessen his time will turn you in. Never meet in public, never call (voices can be uniquely identified). Never send email from clearnet.
Being business minded and having an entrepreneurial mindset in this business is not just making money, it is also protecting yourself legally. This applies to both real world and DarkNet business.
There are many ways you can get caught and be tracked. First we will go over the ways your computer can be tracked.
The easiest way you can be tracked is by IP address and this is easily hidden using a proxy or VPN. If your real IP address is exposed, the feds will issue a warrant to your service provided and there will give your address, then your door will be kicked in.
All it takes it ONE TIME, one time and they can attach your name to your actions online and produce an entire criminal history. Keep it hidden, and remember even with gmail or online email apps, your IP is attached to each email when you send it.
The second way you can be tracked is a newer form of unique identification called Browser Fingerprinting. In case of web browsing your software configuration usually provides a pretty unique fingerprint that can be tracked as you browse.
Also every piece of information you post to different sites will contain information about you. For example the time of your postings will give a clue about which time zone you are in even if you don't provide any personal information.
Let's break your identity into domains and lets discuss each domain then. First, YOUR computer. How can an federal agent identify a person from the computer he uses? what is the digital fingerprint they leave behind?
There is a chain that leads all this information directly to you: Real Life Persona and Geography >>> Digital Fingerprint >>> User's Cyber Persona. All a federal agent has to do is works his way backwards linking you to digital fingerprints and finally identifying you as a person.
We need to know what access, tools and techniques must an federal agent possess to rebuild a fraudsters identity:
1. IP Address - Every computer on a network has a unique number. Every site you visit saves this number and attaches it to your activity. Law enforcement officials can trace your IP address back to your exact physical address by calling your service provide who keeps records. Most fraudsters know this and protect against it by either using a proxy or employing VPN(Virtual private networks)
2. Browser Fingerprinting - A browser fingerprint is information collected about a computer or mobile device for the purpose of identification. Fingerprints can be used to fully or partially identify individual users or devices even when cookies/javascript are turned off. Many of this can even happen through tor. Many people feel save behind a proxy or VPN, but sadly this is not enough to keep you out of prison. Browser fingerprints consist of your operating systems, which programs you have installed, fonts installed, etc. Surprisingly this information when all tied together makes a unique fingerprint of you as a user, which can be used in court to uniquely identify you. This is why it is best to use a Hacked Remote Desktop, along with a VPN to hide yourself. This puts at least 2 degrees of separations between you and the feds.
3. HTML5 Canvasing - this method uniquely identifies you based on YOUR GRAPHICS CARD & Computer configuration, you could be behind a VPN or proxy and they still would have you uniquely identified. This method uses your graphic card, processor ect. to draw a unique image in a hidden area on your screen, then apply a hash to the lines drawn. Because no two computers are exactly alike, each is different and can be used to identify you. Again, This is why it is always best to use a purchased hacked Remote Desktop behind a VPN/Proxy.
4. Snitches - NEVER tell anyone on darknet your real name or reveal any details about you. This is the #1 way people get caught. One of your vendors, etc. will get caught and to lessen his time will turn you in. Never meet in public, never call (voices can be uniquely identified). Never send email from clearnet.