Security and Anonymity in the Digital Age: 14. Creating Fake Accounts

When it comes to making dummy accounts, Fake Name Generator is a great site to use. The site creates a wealth of fake information, from name and address, to email and eye color. It even generates social security numbers and other realistic criteria.

Fake Name Generator

Security and Anonymity in the Digital Age: 13. Take Precautions With Your Email

Use secure email services when you can. Use a dummy email address when emailing people you do not trust and make sure that that dummy email is not attached to any of your real information (use a fake name, age, etc). You can also set up emails to reroute, so that you can receive them at your normal address – just make sure that you reply from the dummy account.

This is not particularly secure against government agencies but it is fairly secure against hackers. There are also free, disposable, temporary email services, such as Guerilla Mail, that allow users to create randomly generated accounts that get automatically deleted once the user ends their browser session, or after a time limit.

ProtonMail and Tutanota are both excellent options.

Security and Anonymity in the Digital Age: 12. Use Linux

Micro$oft is one of the greediest, cuckold corporations out there, and should be avoided and boycotted at all cost. Avoid purchasing anything from them, and avoid using any technology that uses their software or operating system. Windows is also notoriously unsafe, given most viruses are designed to infect Windows operating systems, since they make up the majority of personal computers.

Microsoft provides an entry key for the police which bypasses all Windows password encryption.

Linux is generally considered to be one of the most secure operating systems, it has a slight learning curve but soon becomes second nature. Linux is probably the best thing you can use when it comes to securing online privacy and computer protection. Linux Mint is the best place to begin.

A Beginner’s Guide to Linux

The ultimate guide to Linux for Windows users

Linux Mint

Ruminations on Moral Cowardice

By Cory Lanus

Yesterday I wrote a piece on Christianity where I referenced the ‘atom of unreasonability’ at the heart of the faith as one of reasons it has been so powerful. The idea that at its core, a moral system must have an atom or unreasonability, an essence of irrationality, is hardly original, but the more I think on it, the more valuable I perceive it to be. George Bernard Shaw once famously said: “The reasonable man adapts himself to the world: the unreasonable one persists in trying to adapt the world to himself. Therefore all progress depends on the unreasonable man”. We are called on every day to be reasonable, and told that the only way to personal wellbeing, comfort, and security is to be reasonable. One dares not rock the boat or call attention to themselves. It is easier to become a victim to groupthink and an accomplice by inaction to wrongdoing than it is to stand against predators and evil doers.

Let me take this lofty principle and apply it to practical situations. In the low rent showbiz environment that is dissident right and / or white nationalist entertainment, there are people widely reputed to be scumbags, often with good reason. Just like in real showbiz, of course. People, despite knowing and seeing some of these characters act in a loathsome manner, continue to watch, donate, go on, and promote for such individuals because the good they are perceived to accomplish by amassing an audience is seen to outweigh whatever individual flaws they have.  These people, themselves, are not ignorant of this specific bit of cognitive dissonance, and in fact often exploit it intentionally. Soon enough we end up with a chattering class filled with narcissists, grifters, subversives, deviants and a whole galaxy of sexual, physical, emotional, and chemical abusers. Little things, like taking care of the prisoners, or actually fighting for the cause get left by the wayside. After all, it is much more reasonable to go along with such a system than to be unreasonable and earn its ire.

The Shining Path guerillas in Peru are a good example of how this path works and where it leads. For a while they were one of the more successful Maoist revolutionary groups outside of China. Battlefield setbacks and attacks on the leadership led to the remaining leadership changing tact. They decided that fighting the revolution was too hard and dangerous, especially for those rebel leaders who were calling the shots. So they instead began to prioritize dealing drugs. At first, it seemed very reasonable. How else does one fund a national revolutionary campaign? But soon the leadership realized that there was far more profit and much less danger in selling drugs than in fighting the army. I’m sure they communicated the strategic shift to their underlings with much deftness and appeals to Maoist principles. But of course, no matter how much money they made off selling drugs, it never was enough to justify returning to the struggle in a serious way. Eventually, it just seemed reasonable to these ideological revolutionaries that they should be cynical narcos.

The concept of Europeans’ ‘Faustian Spirit’ is tied into this unreasonability. The problem for advocates of this philosophy is that this very unreasonability is at cross purposes with creating and leading a political movement. The unreasonable man does not accept compromise, nor does he see the ‘lesser evil’. The unreasonable man does not care about optics, and is not worried about getting into the GOP or onto Fox News. The unreasonable man demands action and seeks martyrdom, despite the costs of such things. Us westerners have great difficulty understanding the psychology of suicide bombers, precisely because such a thing is seen as being unreasonable. We grapple morally with the actions of men such as McVeigh, Brevik, and Tarrant because they are so at odds with what is seen as rational. No ‘leader’ could possibly see there being any reason to expose themselves to as much personal and reputational harm in such a manner. I will reserve judgement of these men and analysis of their actions for another day, but I will say this: they were not moral cowards.

This leads us to the real problem that being reasonable has created, an environment of moral cowardice. Men and boys who have never held real jobs, and can now never hold real jobs tell you to dox yourself and join them on their children’s crusade. They say you are a coward if you do not expose yourself foolishly as they have. It is hilarious to see this sort attack the disciples of Buckley, when in a serious way they are his modern inheritors. Instead of purging you for being a Bircher, now you will be purged for being a wignat, or wanting to stay anonymous, or not disavowing violent acts. These Buckleyites are the true moral cowards, seeking to appease the powers that are attempting to destroy their people. They think if they just purge enough, if they appease enough, they can get into the country club, that the GOP and its auxiliaries will embrace them and the left will stop calling them nazis.

We are different from the majority in that we have been awoken to a terrible moral evil being perpetrated that most are content to ignore and some cynically embrace. What is happening to Europeans and their descendents globally is a moral issue. Zionism is a moral issue. Things should be fought not because it is convenient or politic but because it is the right thing to do. Taking a practical stand instead of a principled stand is the height of moral cowardice and to be honest when I hear people use such rhetoric, it sickens me. The problem that such practical and reasonable people bring is this practicality and reasonability leads to groupthink and bad strategic decisions being made. Leaders are terrified to risk what shreds of respectability and comfort they have, so they strive to be reasonable and practical. Well meaning people are often brought into the tent of reasonable and practical people and become complicit in their moral cowardice because of personal respect or lack of an alternative.

Barry Goldwater, the 1964 GOP’s stand in for Uriah declared: “I would remind you that extremism in the defense of liberty is no vice! And let me remind you also that moderation in the pursuit of justice is no virtue!”, and while Mr. Goldwater and I may debate the virtues of liberty at a later point, his point here is sound. It is not being an extremist or having moderation that justifies or defends your beliefs, it is the moral principles on which they reside. If your cause is based on a clear moral argument, then do not concern yourself with optics, reasonability, practical personal politics, or any of the multitude of other concerns of self envisioned leaders. Worry about staying moral and being effective, and leave the drug dealing to the Buckleyites.

The Writing is on the Wall

By Cory Lanus

I was thinking earlier about the failure of religion in the west to halt the social and moral decay which is currently destroying us. Certainly, at one point in time, spiritual leadership was valued as high, or more highly than temporal leadership. These days, there is not a church which will not bow to the forces of nihilism and alienation at the drop of a hat. Long gone is opposition to homosexual marriage, and soon too will go the fight against abortion. The idea that there were churches in this nation opposed to integration and to the civil rights movement now seems impossible in some deep way. One could argue that this has been the result of leadership scandals, criticism by ‘new atheism’, and an increasingly secular zeitgeist as a backlash to the George W Bush presidency; but this, for me, falls short. Religion failed to hold the cultural bulwark in this country because it failed to adequately provide a vehicle for cultural revanchism where it was wanted by the people. It is not the role of a leader of faith to tell us that we need to be more accepting of outsiders. The bible is in truth pretty heavy on that old tribalism thing.

That’s something that always trips me up. Foundational documents like the Bible and the Constitution are written or available in pretty simple english. One does not need to be a lawyer to understand the basics of the constitution, nor does one need a seminarian to interpret scripture for them. We abdicated those energies to specialist classes, and in both cases, the interests of self preservation and aggrandizement have lead them to radically redefine the nature of what it is that they communicate to us. Instead of leading, and inspiring us to be better people, to love our families and to live with compassion, we are instead dictated to in the name of the Constitution and the Bible, and told that we must abandon our heritage for sins we did not commit. Where reasonable people disagreed and said, ‘hang on a minute, the Bible does not endorse mass immigration, nor does the Constitution protect abortion’, they were driven out of what is represented as acceptable discourse. Whole generations of lawyers and theologians saw what happened to those people, and because they had mortgages, they decided to not push the envelope on such issues.

For all the scandals of the flesh that clergy of all denominations have been embroiled in over the past few decades, it is the scandal of the conscience that bothers me more. Where are the christian leaders calling for an end to mass immigration, an end to homosexual propaganda aimed at our children, or an end to self destructive foreign conflicts? Did the Bible change over the last 50 years? No, but the clergy did. Gone are the men who were the conscience of their community, called to priesthood by God and duty. Now we have effeminate zionists, soyboys with crosses and purity rings. Hell and damnation have been replaced by soft rock and diversity programs. I have been to many churches, and I have yet to see one that is not pozzed at some level.

This was intentional, I am certain. People have been calling out the issues with religious hierarchies becoming sanctimonious liberals for a long, long time. Martin Luther got so mad about it he put up 95 Theses on it. Even Christ spent a great deal of his ministry attacking the corrupt and self interested religious authorities of his time. What are good christians to do when their leaders are following in the paths of the pharisees more than that of Christ? Is it any wonder none of the self proclaimed evangelicals running for president in 2016 got any enthusiasm from the Christian base?

Those who espouse a more traditionally based understanding of the teachings of Christ and the role of his ministry are systematically purged from our churches. They leave the leadership, they leave the laity, and soon many leave the faith entirely, unconvinced that there is room for love of one’s people in modern Christianity. Because the understand of scripture has been so polluted by social justice seminarians, good christian men turn their heads away and in many cases lose their way. I wonder how many lives lost to opiates, alcoholism, and suicide, might have been saved if the ministry had been more relevant to the lives of these men. People turned away from the church because it became more interested in bringing africans to the midwest than it did with saving souls and building better lives. Things will always be found to fill the void, for good or ill.

This country was founded on a principle of religious liberty. Our civic forefathers were driven from their homelands over affairs of faith and principle. If one tried to practice or preach faith as they believed it then, today, he would be driven from the public square by hateful mobs and violent extremists. What has been conserved by our conservatives if this is all we have left? We are bereft of our faith, our people, love for our own, the ability to lead and think as we want, and the ability to worship and believe as we want. You are no longer allowed in this country to believe in a Christianity which is European, in a Christ opposed to a temporal ecclesiastical hierarchy.

Perhaps it is this atom of unreasonability in the soul of the Christian faith which has given it so much power. The martyrs faced their gruesome ends believing their fidelity would be vindicated, and that we ought not be so concerned with principalities of the flesh. Where that spirit gone? Where are the Christians willing to be unreasonable about the wrongs of our world today? Have they given up, did the culture war end and no one told us? It is as though we have been stabbed in the back by our leaders. Even at the height of Christian power in this country, those who led it, sold out to the forces of liberalism and dehumanizing capitalism and surrendered when not only did their congregations want to fight, but they could have still won. We are an occupied people who never lost the war.

But the Holy Spirit is there and it is sustainment enough for those who seek. The trappings of hierarchy, power and wealth have always struck me as unchristian anyway. The Christian faithful in America are as the Israelites in the days of the prophet Isaiah: decadent, sinful, capricious and cruel. It seems reasonable that a just God would strike them down much as he did Jerusalem, and leave it the abode of wild beasts. But just as God did not abandon the Israelites, I cannot see God abandoning his own on this continent civilized in his name. The coming cataclysm will separate the wheat from the chaff and bring forth a new strength of purpose in the faith. The Christian faithful will once more get a Chi Rho in the sky and will go forward righteously, but long and narrow is the path to get there. We need not only a Christian reformation, but a christian revolution. We need to resurrect the spirit of the faith as Christ resurrected Lazarus. Our faith gives us power to restore the dead and to move mountains, we must use it and use it righteously. There is a fire in the minds of men to be kindled, and it is up to us to strike the sparks and fan that flame.

Security and Anonymity in the Digital Age: 10. Delete Tracking Data Regularly

Your browser keeps track of where you go, what you type, and any other data it can capture about you. A basic security measure is to regularly delete this data (history, cookies and cache).

Here’s how to delete your browsing data with Firefox.

Here’s how to delete your browsing data with Brave.

Security and Anonymity in the Digital Age: 9. Do Not Use Google

Google are sneaky little merchants who keep records of everything to make more money and appeal to their overlords.

When you search something in Google, it usually sends search terms to that site and your browser data and computer info. These sites thus build up a profile of you, and will bombard you with ads. Your online profile can also be sold.

Google, being a tool of the paranoid and power obsessed System, also saves all search histories of users. These search histories can be legally requested:

“Like other technology and communications companies, Google regularly receives requests from governments and courts around the world to hand over user data. In this report, we disclose the number of requests we receive from each government in six-month periods with certain limitations. Usage of our services have increased every year, and so have the user data request numbers.

We continue to look for new ways to organize information and provide more detail. For example, starting with the July-December 2010 reporting period, we began to disclose the percentages of user data requests we comply with in whole or in part. And starting with the January–June 2011 reporting period, we began to disclose the number of users or accounts about which data was requested.

Our FAQ about legal process provides information about how we aim to put users first when we receive user data requests. To learn more about the laws governing our disclosure of user data and reforms to those laws that we think are important, visit We hope this report will shine some light on the appropriate scope and authority of government requests to obtain user data around the globe.”

  • Google

Operations Security (OPSEC)

This is adapted from a twitter thread.

OPSEC is short for operations or operational security. Basically, the better your OPSEC, the more difficult it is for outsiders to find out what you’re up to, whatever that may be.

One of the most vital aspects of OPSEC is situational awareness. That is, the ability to actively evaluate one’s surroundings and make detailed assessments about one’s environment.

All of the encryption in the world won’t save you if the thought police get their hands on you while you’re logged in and signed on. All of your careful planning amounts to nothing if a common street criminal lethally stabs you for your phone and wallet.

Situational awareness is a skill that can be practiced and developed. Take the time to practice this in your everyday life. Here’s a link for one page that has some exercises, but many more can be found with some basic research.

Part of situational awareness is an accurate sense of self awareness. Know where your strengths and weaknesses lie. Learn how to amplify your strengths and compensate for your weaknesses. You might not be aware of these traits yet, but others notice them and can take advantage.

Don’t be a target. Bad actors look for people who are unconfident and wrapped up in their own thoughts. When you’re in public, keep your chin up and your head on a swivel. Don’t walk around with earbuds in and/or staring at your phone.

This ties in to the grey man concept. If you don’t want attention, dress and act in a way that won’t attract it. Don’t walk around wearing a MAGA hat, a Daily Stormer T-shirt, and a swastika patch on your backpack. Don’t even wear a Glock branded hat. Be inconspicuous.

One can never be 100% secure, so don’t get lulled into a false sense of security just because you implement the tips in this thread. It’s all about reducing the likelihood that an outsider will be able to tell what you’re up to, not guaranteeing that.

For the love of all that is holy, DO NOT USE WINDOWS. OSX is marginally better, but Linux is your best bet for privacy and security. If you want to vidya, get a console, that’s what they’re for. Linux Mint is a good version to start with.

>but I did some 1337 h4x that makes Windows bulletproof
No you didn’t. Use Linux, pretty much everything electronic in this thread is virtually pointless otherwise.

Get a VPN and pay for it. If you use a free VPN, then you’re the product. (i.e. Opera VPN doesn’t count) Mullivad, Private Internet Access, and NordVPN are some decent options off the top of my head. It’s really not that expensive. (Mullivad is probably the most anonymous, but it’s also the most difficult one to use)

Also, learn how to use Tor. It’s another means of anonymous access to the internet, and it also allows you to access websites that you can’t access from your normal browser. Just be mindful of the links you click on in those realms.

Carefully maintain any online personas you might have. Don’t use similar usernames on your normie and WN accounts. Use very secure passwords, a manager like KeePass can help with that, but also use a strong password to secure that database. Don’t repeat passwords on multiple sites

This is as vital as not using Windows, DO NOT USE GMAIL. Don’t even use it for your normie stuff. Use Protonmail or Tutanota as your primary account. Set up a throwaway spam gmail account if you really need to access a certain service, but don’t use it as a primary.

Did I mention not to use Windows? It’s really not even worth reading this thread if you keep using it.

Take some time to get used to Linux, but eventually it is a good idea to do full disk encryption for your machine. That is an option during the Linux install, just be sure not to forget that password, because you will need to enter it every time you boot.

Yes, having good OPSEC is a lifestyle, but we can no longer afford the luxury of a “normal life”

Learn how to use cryptocurrency. I would specifically recommend looking into Bitcoin and Monero. Coinbase is the easiest way to buy Bitcoin, but be sure to move it off to a private wallet ASAP and don’t donate to right wingers straight from your Coinbase account.

Your bank likely sells your account transaction history to marketers. Use a service like privacy dot com to mitigate that. It lets you set up cards that can only be used with a single vendor as well as single use burners. Your account statement won’t show the vendors you use.

This should go without saying, but don’t use Google Chrome either. Use Firefox if you’re autistic enough to set it up properly or use Brave if you want something that’s usable out of the box. Also, don’t use Vivaldi or Edge.

Post Office boxes are a good way to protect your physical location, but virtual offices are even better. That will provide you with a physical address wherever you choose. You can even have mail sent for the staff to open and they will email you scans of the content.

Some banks will even let you deposit scanned checks. Some VO services will forward mail for you and others can provide phone answering. Depending on your needs and desired location, you can expect to pay anywhere from $10-$200/mo.

Security and Anonymity in the Digital Age: 8. Better than Tor: Tails

Tails is a ‘Live’ operating system which is built from the Linux Operating System (as opposed to Mac or Windows). You can start it on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to:

  1. Use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network.
  2. Leave no trace on the computer you are using unless you ask it explicitly.
  3. Use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.

Tails comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. Tails is the equivalent of buying a computer and then throwing it away every time you use the internet. It’s pretty secure.

You can download Tails here.

This is a good place to get started if Tails is new to you.

Security and Anonymity in the Digital Age: 7. Some Key Points Regarding Tor

Do Not Torrent Over Tor

Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that’s how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow down the entire Tor network for everyone else (noteworthy during times when multiple dissidents will be using it).

Do Not Enable Or Install Browser Plugins

The Tor Browser will block browser plugins such as Flash, RealPlayer, Quicktime, and others: they can be manipulated into revealing your IP address. Similarly, we do not recommend installing additional addons or plugins into the Tor Browser, as these may bypass Tor or otherwise harm your anonymity and privacy. The lack of plugins means that Youtube videos are blocked by default, but YouTube does provide an experimental opt-in feature that works for some videos.

Use HTTPS Versions Of Websites

Tor will encrypt your traffic to and within the Tor network, but the encryption of your traffic to the final destination website depends upon on that website. To help ensure private encryption to websites, the Tor Browser Bundle includes HTTPS Everywhere to force the use of HTTPS encryption with major websites that support it. The “s” after HTTP means that the website traffic is encrypted with the SSL protocol, making the traffic more secure. However, you should still watch the browser URL bar to ensure that websites you provide sensitive information to display a blue or green URL bar button, include https:// in the URL, and display the proper expected name for the website. Additionally, see EFF’s interactive page explaining how Tor and HTTPS relate.

Do Not Open Documents Downloaded Via Tor While Online

The Tor Browser will warn you before automatically opening documents that are handled by external applications. DO NOT IGNORE THIS WARNING. You should be very careful when downloading documents via Tor (especially DOC and PDF files) as these documents can contain internet resources that will be downloaded outside of Tor by the application that opens them. This will reveal your non-Tor IP address. If you must work with DOC and/or PDF files, we recommend either using a disconnected computer, downloading the free VirtualBox and using it with a virtual machine image with networking disabled, or using Tails. Under no circumstances is it safe to use BitTorrent and Tor together, however.

Use Bridges And/Or Find Company

Tor tries to prevent attackers from learning what destination websites you connect to. However, by default, it does not prevent somebody watching your Internet traffic from learning that you’re using Tor. If this matters to you, you can reduce this risk by configuring Tor to use a Tor bridge relay rather than connecting directly to the public Tor network. Ultimately the best protection is a social approach: the more Tor users there are near you and the more diverse their interests, the less dangerous it will be that you are one of them.

There’s also a Tor app for Android mobile, known as Orbot.