View Single Post
  #10  
Old 05-09-2025, 06:55 AM

123qwer 123qwer is offline
Join Date: May 2024
Posts: 0
Default


Quote:
Originally Posted by ManWithGloves
AntiDetect is shit. Used to be a good software for carding but it is not keeping up with the latest browser fingerprinting techniques. Here is my solution for OPSEC:
VPN > VM > TOR > PROXY
VPN: Hide your traffic from ISP. The TOR already hides it, but VPN hides from ISP you are using TOR
VM: Maybe Whonix Workstation to isolate your work. It also focuses on privacy
TOR: This is how you become super anonym. Your traffic goes though different proxies, different encryption. Easiest way is to attach your Whonix Workstation to the Whonix Gateway (set it as a bridge)
PROXY: For example vip72 providing socks proxies. This way the websites won't see you are using TOR.
This is quite a good solution for OPSEC but here comes the browser fingerprinting itself.
AntiDetect could be installed to the VM (not the Whonix Workstation), so you can be more successful.
Lately I was beta testing Kameleo software. I'm about to make a VM in 2 weeks that can replace Whonix Workstation, connect thru TOR, and beat browser fingerprinting. I could register multiple accounts on ebay using this software. Never faced a captcha on Google.
Keep me updated on the GlovesOS
Не знаю как антидетект ! Но у меня стоит Сфера крякнутая и полет нормальный , отпечатки при разных сессиях разные. Машину скрывает на все 100% + любой конфиг под машину.