People are careless. Sometimes it's a lack of knowledge. I was able to identify a poster here because he used a retarded filename.
ANONS WHO REDPILL ON REDDIT
stop
mitnick message. Read the Art of Deception. You can get useful info on people with seemingly meaningless scraps of info. Also look at that 40 questions genie thing that used to be popular, or even doxing missions on Holla Forums and /baph/ or /cow/. You mention enough tidbits and they can get you. They can also get you from localised spellings. (opsec tip: sometimes I use British spellings, sometimes American, sometimes I purposely type like an ESL with hints of sentence structure with asiatic language origin. Yes it is autistic.)
If you want total opsec: do not try to completely omit all personal info. Instead invent a pseudoidentity and roleplay. If they "dox" you, they will be led on a wild goosechase. Drop that holier-than-thou attitude. You WILL eventually leak something that can be used to dox you, even something like mentioning the weather where you live or climate type, the price or quality of a commodity, or things like what hours you post during or what words and sayings you use. Something WILL leak eventually, so it's better to leak something false on purpose from the start. Redditards don't have a high enough IQ to deal with red herrings. If you want complete anonymity, the only option is false identity. Do intensive research and pick a larp target if you feel paranoid.
Manual method:
Get a burner laptop off craigslist, do not put any personal info into it, ever
If you live in a large city, shitpost from public wifi, possibly with vpn or proxy
If you live literally where, use public wifi and/or a vpn
I discourage shitposting from your home wifi altogether.
Good advice.
Another thing you have to be really careful of with reddit is that the admins will help the enemy. Admins have logs that show your IP and they can link together any alts you have if you log into them from one IP, or if you don't clear your cookies. There's a technique called browser fingerprinting which means they might be able to link your alts even if you're on a different IP and in "privacy mode"
Recently, there was a story in the mainstream press about the guy who started the Red Pill subreddit: archive.is
I'm fairly certain the admins assisted in that doxing. A lot of the connections were made using comments, and I find it hard to believe that anyone read all of that guy's comments without first knowing who he was and they just happened to find personal information. Plus, reddit only let's you see like 1000 comments. Some of the ones they used were pretty old, they would have dropped off his user page.
What I think happened was, an admin sat down the logs and such and quickly figured out who this guy was. They have probably done this for hundreds of high-profile people reddit accounts. But most of the people are nobody's in real life. When they realized this guy was a big fish, that's when they took the extra time to invent a public trail to his info.
wew 3 hits
i'll be printing this shit out and hang it up as a badge of honor
Yes, browser fingerprinting is a huge problem. Facebook and Twitter do this very well. It gets really scary when you think how companies like SCL buy data from everybody and have hundreds if not thousands of data points on everybody. This data can then be used to basically simulate the world. And if you think this sounds like SF just look up the performance of Renaissance Technology. They beat out every other hedge fund by miles.
Probably the best way to fight this is to have a virtual machine for every persona. This let's you use fb, reddit, twitter etc. without worrying. Just install some random addons, applications and fonts on the machine.
The burner laptop and public wifi is a good idea (although you have to be careful there because of security cameras - if I was really trying to hide, I'd write my posts on one computer, transfer them to the burner, then drive somewhere and sit in my car and hit the submit button).
But aside from that, I wouldn't be surprised if there were already linux distros and browser mods that randomize various data points to throw off the fingerprint algorithms. I haven't bothered to check.
You could also build (again, if you really, really wanted to hide) a raspberry pi box the length and width of a credit card and the height of a USB stick. Just need a battery and a wifi antenna. You go to some bar and get their wifi password, then you drop this little computer somewhere. It only needs to remain undiscovered for a few days. On it, you have a simple node app that checks a public drop website, maybe pastebin. When data shows up there, it takes that data and reposts it to reddit (or wherever).
You'd have to give it the first pastebin URL manually. Every hour (or whatever) it checks that URL. The data it's looking for could be JSON with the reddit post to reply to, the comment contents, and the next pastebin URL.
Downside: you're definitely going to be on their security cam dropping it off. And when they find it, it'll definitely look suspicious. I wouldn't be surprised if the police could find you from the serial number on the pi. They'd also get the pastebin IP logs. I wouldn't recommend this as a way to do something truly illegal.
I think I'm going to set up a few identities just as an exercise. What facebook settings are recommended? It seems to me that you'd want to use the privacy settings to hide the fact that the account will have little or no content.
Eagles is a Guatemalan shitskin.
I've archive a couple of mine myself. I knew I was saying something that the Jews wouldn't like, so I archived it as quick as I could, so I could have some proof that it was taken down. Maybe the first attempt or so, I tried to archive it, but it was taken down within what must have been the first minute, and maybe instantly. The post still shows up when logged into my account, but you can see it's down when logged out, so I noticed when the archiver didn't pick it up.
what VPNs are good?