RSS

How to DELETE 99.9% of your digital footprint from the internet

17 Oct

Step 1: Preliminary Requirements

Go through each email you can think of that you’ve used in the past 10 years.

You’ll want to recover them if you’ve lost access, so that you can access other websites you may have signed up to using them.

Step 2: Deleting old accounts from forgotten services

Use the search function on your e-mail and look for phrases such as “Sign up” or “Welcome”

Recover account and login into each service that pops up (that you received a sign-up email) from

Now look around the service for a delete account function, google around by searching “”delete account” + “”

If there isn’t one, google or look around for a support e-mail to request for them to delete your account.

Step 2c:

For some services, you may want to purge all content and messages before you delete the account, as the account may be archived and a hacker or external entity may access this information at a later date.That’s something to bare in mind.

Step 3: Checking if your information has been compromised already.

Now you should have a list of all your usernames and all the services, ranging from streaming services to e-mails. You need to use something called boolean searches to properly use Google to locate this info

Step 3b: I’ll be using “s to denote normal quotations, as you will need to use the normal “” signs to perform these searches.

You need to google your account name

“”

Sometimes maybe your account name + password like so:

“” + “”

Step 3c: You should see possibly pastebin links or underground databases publicly accessible on the internet, or possibly leaked private information.

This is normal. It happens to a lot of services.
Note down what passwords/information was comprimised.

Step 3d: Some database leaks are a bit more private and are still being shared/sold in private circles, but you can use this website:

https://haveibeenpwned dotcom

To check if you’ve been compromised, so you can change your live information to be different.

Step 8b: Using a VPN that has no logs.

You need to make sure your VPN has had a PUBLIC audit to ensure that it has NO LOGS, this means that it has no record of what you have used their internet connection for. And when you use a VPN, it’s hard for your ISP to know either.

Step 9: USING Burner accounts

You should be using burner accounts on known intrusive services such as Google by using a fake name and information.

This is LEGAL and you should do it to avoid having your information data mined across services.

Step 10: REGULARLY deleting your internet content.

You should be regularly deleting your tweets and old photos.

This data can be used against you to cross-reference your accounts and find more personal information.

Hackers will find a target and analyze them for months.

Hackers will use your old internet information to do some of this analyzing in retrospect to piece together who your social circle is to find a vulnerability.

Anyone can be attacked. You just haven’t been a target yet.

Defend yourself through prevention.

Step 10c:

Don’t believe me?

https://theverge dot com/2019/10/11/20910551/stalker-attacked-pop-idol-reflection-pupils-selfies-videos-photos-google-street-view-japan

This is nothing. Very simple with the tools EVERYONE has access to today.
The reflections in a pop star’s eyes told a selfie stalker exactly how to find her
Be careful of what you post online thevergedotcom

That’s it for now.

This thread was brought to you by someone who hacking accounts and systems at the age of 11.

There is much more talented and scarier threats out there now,

Not to mention most of your money is now online.

Protect yourself at all costs, it’s only a few hours.

DO NOT enter your password in Google search UNLESS you know it’s a publicly compromised password already.

This will give you an idea of how many PUBLIC, CLEAR internet resources that are indexed that have it stored.
The idea was for you to see how many times that password has been breached that a very low level hacker could get his hands on after a few Google’s.
Credits: Liam @somenerdliam

 
Leave a comment

Posted by on October 17, 2019 in Uncategorized

 

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.