View Single Post
  #7  
Old 05-09-2025, 06:40 AM

mortal25 mortal25 is offline
Join Date: May 2021
Posts: 0
Default


AntiDetect is shit. Used to be a good software for carding but it is not keeping up with the latest browser fingerprinting techniques. Here is my solution for OPSEC:
VPN > VM > TOR > PROXY
VPN: Hide your traffic from ISP. The TOR already hides it, but VPN hides from ISP you are using TOR
VM: Maybe Whonix Workstation to isolate your work. It also focuses on privacy
TOR: This is how you become super anonym. Your traffic goes though different proxies, different encryption. Easiest way is to attach your Whonix Workstation to the Whonix Gateway (set it as a bridge)
PROXY: For example vip72 providing socks proxies. This way the websites won't see you are using TOR.
This is quite a good solution for OPSEC but here comes the browser fingerprinting itself.
AntiDetect could be installed to the VM (not the Whonix Workstation), so you can be more successful.
Lately I was beta testing Kameleo software. I'm about to make a VM in 2 weeks that can replace Whonix Workstation, connect thru TOR, and beat browser fingerprinting. I could register multiple accounts on ebay using this software. Never faced a captcha on Google.
Keep me updated on the GlovesOS