🔥 Burn Fat Fast. Discover How! 💪

BRōkéñ Hacker

Logo of telegram channel broken_hacker — BRōkéñ Hacker B
Logo of telegram channel broken_hacker — BRōkéñ Hacker
Channel address: @broken_hacker
Categories: Technologies
Language: English
Subscribers: 2.13K
Description from channel

Learn all your hacking here. Best hackers in the world we train professionals and beginners
Use our bot to contact administrator to learn new tricks and any hacking you want to know contact us through our bot @hackersworld2_bot

Ratings & Reviews

2.67

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

1

3 stars

1

2 stars

0

1 stars

1


The latest Messages 12

2021-12-28 12:10:23 Provide False Information:

Many things fall into place when one has to successfully become a ghost hacker, and one of the key things is what you're telling people. When you are communicating online you have two options, either don't say anything at all, or give them completely false information.
Going with option one will most definitely spark interest to people whose intentions are to bring hackers to justice, so you might as well give them what they want, but you didnt guarantee them that would you're giving them will be correct information. That'll be their job to determine, so let's make it very difficult for them
And it's important that you don't reveal anything that can be remotely connected to you in any way what so ever. It's difficult but it's great to take these types of measures if you have to. For example Dead Pirate Roberts did this too I have been informed. Take notes people

Moving On:

YOUR TIMEZONE

This is also very important that you keep it a secret to everybody. Now this is where it can get very complex, because we all have jobs and education probably, and family friends and so on. So in the end you'll only have a few hours a day to come on your secret identity, so to get online at completely random times will be a tough task for some because of that, but for those who have that possibility shouldn't take it for granted.
Your buddies will not be able to determine where in the world you live if you come online at completely random time, with no pattern at all.

Be Ready to Run:

To ellaborate, what I mean here is, if the situation should occur, you have to be able to run and leave everything behind. Think of it like you have a bag under your bed in case someone should track you down, you grab it and some money and take off.
Same exact scenario here. Have your depature ready if necessary.

Now to the Ultimate Advice:

This is something very interesting, and something law enforcement does all the time and it even tricked our old friend Dead Pirate Roberts.
When you have a black market business going or any sort of illegal activity, law enforcement will be watching you and attempt to track you down. But usually you have some buddies to help you run your illegal activity which brings me to the Ultimate Advice.
Don't bring new people close to your business
DPR was approached by a new user on Silk Road and he didnt think any of it and communicated with this individual and forgot that anybody could be sitting on the other end. And Unfortunately for him it was an FBI agent, which is believed to have helped in the arrest of DPR

Regardless, what i'm saying here is, trust the ones you have from the beginning because at some point it'll be dangerous to bring new people in your inner circle.

Closing:

I don't think I have much more to cover for this series, there might be a some more additional pointers, and i'll add them in my next posts if any .
31 views09:10
Open / Comment
2021-12-28 12:10:23 Keeping Your Hacking Identity Secret: How to Become a Ghost Hacker #4
24 views09:10
Open / Comment
2021-12-28 11:49:59 Being Introverted:

I saw a comment on here (a group previously created for this channel) from TRT I believe, and it didn't actually occur to me before seeing it. He replied to a newbie on here about anonymity. He said something like 'you can also be silent and not talk to people, and therefore people wont have much info about you'
I was honestly amazed that I have never thought about this. You aren't obligated to speak to anyone, so by not talking to people, they will have no information about you, which is a very very effective method to use, however in my eyes it takes a lot to not speak to anyone, however you can always make a new alias for doing just that and have another one for speaking to people.

Don't Say Too Much:

Having many aliases is obviously only for skilled people, and people who can handle it. Self control is definitely needed because you need to remember when to use a certain language pattern and not mix any of them up. And just like real life, you probably tell some things you want to remain a secret to some, and therefore if you accidentally reveal that to the wrong person, you are screwed. Which is why you need to have time, time to type and have a conversation otherwise you'll be stressed
34 views08:49
Open / Comment
2021-12-28 11:49:59 Creating an Identity:

The goal for the multiple aliases, and additional steps taken here, are to create a character to the people you are speaking to. Because when you are sitting behind you're screen, you obviously don't know who is sitting on the other end, and therefore you might as well fill this persons head with a completely false idea of who you actually are in real life. This gives great advantages such as if the FBI should stop by and question that individual, he'll be describing someone completely different, and maybe someone who doesn't even exist. Who knows

Knowing When to Leave:

As a ghost hacker you also need to know that you can still upset some people, and make some enemies, and a wise ghost hacker do not wish to be in such situation.
You need to know when danger is headed to your door, and if even the slightest sign of 'shadyness' is present, you have to leave your alias.
As I have also mentioned earlier, ghost hackers never stays one place for too long, and a perfect example of such scenario is if danger has occured. By 'discarding' your alias, you never log onto it again and never talk to the people you knew under that alias on a different alias, otherwise they'll be suspicious.
27 views08:49
Open / Comment
2021-12-28 11:49:58 Now I want to tell you how to become one.

What Is a Ghost Hacker?

First you need to understand who they are, and what they do. Only then will you be able to truly become one. (Obviously). So, let me explain.

Explanation
disclaimer: this is my definition, based on experience, knowledge, and information obtained from elsewhere.
They are hackers who dont seek attention. They know the consequences of such circumstances, and seek to be as unknown as possible. Staying one place for too long, gives you just that. Attention.
So, they will make sure nothing is connected to their real identity first and foremost, but they will also likely have more than one alias, and therefore keep those separated also.
Now you should have a good overview of what a ghost hacker is, so lets move on.

Aliases:

First thing they will do is create an alias for everything they have. Smart ghost hackers will only use on alias once, and never re-use it. So if one have 24 accounts, he will have 24 different aliases. Yes sounds a bit over the top, but some hackers do this to achieve maximum anonymity. Bare in mind this is only if you are in the small group of level 1000 paranoia.

The benefit of never re-using an alias is first off, it is impossible for say, FBI to link 2 accounts together if they are in no way connected to each other somehow. Obviously there are other measures needed to be fulfilled in order for this to be possible, but you get the idea.

Passwords:

Next up is passwords. Again, the smart ones will only use one password for each account, and never re-use it. This way you again exclude the possibility of one being able to link two accounts together. Again a paranoia measure you can choose to do if you are paranoid like that. I dont judge.

Language Patterns:

Next up is the way you speak. This is the most crucial step when becoming a ghost hacker, because you can determine a lot by the way one types, and with 2016 now being here, we have very smart people being able to determine various things out from just how one types and or speaks, therefore this is very important you understand this step. I'll elaborate.
Say you have 2 different aliases, and if you truly want to make sure no one is thinking you are the same individual, type differently than you usually type. This includes words you wouldn't usually include in your vocabulary, and maybe make certain spelling mistakes. By doing this you are giving people an idea of who your alias is, and if you continue to type in that way, they won't even begin to think if this account they came across on eBay, speaking very sophisticated is in some way connected to this account on Craigslist, typing with basic grammar.
Basic psychology with Typo
27 views08:49
Open / Comment
2021-12-28 11:49:58 I mentioned in one of my earlier posts something about ghost hackers, and very shortly stated a thing or two of what they do.
Sit back because this is a very long post
26 views08:49
Open / Comment
2021-12-28 11:49:58 Keeping Your Hacking Identity Secret: How to Become a Ghost Hacker #3
27 views08:49
Open / Comment
2021-12-28 11:23:26 United States of America:

I will close this part 2 with USA.
Consider US your biggest enemy. With the 2 biggest agencies located in the US which feeds off your personal data, stay as far away from them as possible. To maximize your anonymity, try your best to not use software that falls under the Patriot Act Law, however I see that as very hard to do. Use software from companies that isnt located in US, and dont live in America. This is being very paranoid, but if you get caught and you are in America, you are facing american prosecutions.


Closing:

I hope you have learned from this, because I spent a lot of time writing this, and I will make this a series, so look out for further tips. '
37 views08:23
Open / Comment
2021-12-28 11:23:26 Question 2: This is because if you dont pay for your product, you are the only product being sold. A company needs money, and it costs money to keep their servers up, and they have families to feed, so why would they provide you and everybody else a really good software that anonymizes you when they can charge for it?

We live in 2021, and you need to remember that everything is about money now. Thats how it works as sad as it may sound to some of you. We need money to run things, and a successful cant keep their service secure if they dont have any money to that.

Additional precautions:

Again read ToS & Privacy Policy (Yes, you have to)

Make sure they are not located in USA.

Strong encryption

Customers feedback

Answer to precaution 2: This is because if you have a company in USA then USA will have complete jurisdiction over the company and the company will have to abide by US laws.

As many of you know, other countries have better privacy laws, such as Sweden and Switerland and they will therefore be a better advantage. Also FBI & NSA have headquarters in US which are the main 2 companies wanting to have all your information, but they have no power of getting such information if your VPN provider is located in Russia for example, because America doesnt have any jurisdiction there.

BEWARE: Some companies have many servers spread through many countries and these will sometimes include american countries. Know that if you sign up for this VPN you could end up on the server they have in US and therefore they have right to demand information from that server.
38 views08:23
Open / Comment
2021-12-28 11:23:26 I want you to know that even though a company is stating something, do some investigation. Ask around, read reviews, read their Terms of Service and Privacy Policy. (Yes im not kidding).
Some key things you should look for when wanting to communicate safely, are these:

Check if they provide strong encryption

Read the customers feedback

Investigate

Read ToS & Privacy Policy




Aliases:

I mentioned in part one that you should become a ghost hacker. A ghost hacker is someone who never uses the same name for everything. He constantly changes alias, and doesn't stay in one place for too long, which gives him many advantages such as FBI not knowing where or who to look for.
I want to point out that this also applies to all your accounts that you own, if you have an instagram & twitter account with the same alias, FBI & NSA and any skilled hacker will be able to link them together because of the same alias has been used, and trust me that is not hard to do.

VPN Providers:

This is an obvious one, however many newbies ask the common question on "What VPN should I purchase?" and "If I have to stay anonymous, why should I then pay for one?". I will now clarify these two questions.

Question 1: This will and I repeat, WILL depend on your current location. If you are located within the US it would be smart to fool your country thinking you are in China or Russia.
32 views08:23
Open / Comment