🔥 Burn Fat Fast. Discover How! 💪

BRōkéñ Hacker

Logo of telegram channel broken_hacker — BRōkéñ Hacker B
Logo of telegram channel broken_hacker — BRōkéñ Hacker
Channel address: @broken_hacker
Categories: Technologies
Language: English
Subscribers: 2.13K
Description from channel

Learn all your hacking here. Best hackers in the world we train professionals and beginners
Use our bot to contact administrator to learn new tricks and any hacking you want to know contact us through our bot @hackersworld2_bot

Ratings & Reviews

2.67

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

1

3 stars

1

2 stars

0

1 stars

1


The latest Messages 13

2021-12-28 11:23:26 Communication Methods:

A key part to anonymization is a secure communication method. There are so many different software that provides you several ways of talking securely to one another, how ever the one major down side is you are putting your identity in the hands of a company you do not know personally. This is very bad because, you do not know if they are actually being truthful on what they are providing.

We have seen this before with HideMyAss (VPN service) who was approached by US and had to hand over information on a specific user, however HideMyAss claimed not to keep logs from its users, but yet they were able to hand over information on a specific user. That is a perfect example that even though a company states something, that doesnt mean its completely true. Likely it is, but know that this company might be non-profit which means they can do whatever they want, or you didnt read their Terms of Service and therefore dont know that there are exceptions towards certain services to a company, which then results in a company handing over your data to the government.
30 views08:23
Open / Comment
2021-12-28 11:23:26 Disclaimer:

I didnt introduce you this subject in my last post, but I while do that now.
First, I want to clarify that the following information in this guide is not intended for malicious purposes, these are things black/grey hat hackers take to use, and these are things that the government won't tell you about, because this is what they are looking for.
So if you are a white hat, or dont care about your anonymity, this will be pointless information for you. However depending on how you operate as a hacker, and what/who you work for, this can still be useful
lets get to it...


Introduction:

Everything else mentioned will be considered as if the people reading this guide are black/grey hat, which makes it easier for me to explain.

In order to become a successful hacker you need to know that your anonymity is everything. Anyone with the know how can execute a successful hack, but not everybody can get away with it. As you may already know. Tor VPN Proxies all of these are ways of changing your IP, and while this is the most important part, in my opinion there are countless of small details that are crucial in order to complete your anonymity. Get comfy because this will be a long guide.
You can read part one here:
34 views08:23
Open / Comment
2021-12-28 11:23:26 Keeping Your Hacking Identity Secret - #2
34 views08:23
Open / Comment
2021-12-28 10:50:41 Personal Computer:

What I mean here is, what about your real identity? You probably have a facebook twitter and maybe instagram account right? Well, isn't it dangerous to access your hacking identity from the same computer where your real identity also is?
I haven't gathered all the info in this section, so i'm a little unsure here.
Because not everybody can afford a separate computer to only perform hacking things on. So what do you do to make sure you keep your secret life completely seperate even though you have two identities on the same computer?

INSTALL A DIFFERENT BROWSER THAT DOESN'T TRACK YOU

Examples here would be Firefox and Opera. Don't search about hacking things on your "real identity browser". Not even a quick lookup on a software you need to double check. Keep those two worlds completely separate.
43 views07:50
Open / Comment
2021-12-28 10:50:41 BECOME A GHOST HACKER

Ghost hackers are hackers who constantly changes his alias. No one can ever really get in contact with him, and he never is one place too long.
This gives many advantages, as it being much harder for anyone to track you down.
43 views07:50
Open / Comment
2021-12-28 10:50:41 DON'T TELL YOUR FRIENDS, FAMILY OR LOVED ONES, OR YOU HAVE PUT YOUR SECRET IDENTITY IN THEIR HANDS ALSO.

Don't Put a Name to Yourself:

What I mean here is, most hackers love attention. Take a look at Lizard Squad for example. They share the hacks they complete. Doing so, you give everybody the chance to communicate with you, because having a social media profile is for everybody in the whole world who wishes to, can be able to communicate with you. incl. feds. So, don't put a name to yourself.
43 views07:50
Open / Comment
2021-12-28 10:50:41 Don't Talk About SH#T:

When I say this, I mean it in any possible way. Do NOT say a single word about your hacking life. Don't even mention the word. The key to people not thinking you are a hacker is to never go in that area.
If one day you pull of a great hack, and you didn't cover all of your tracks, and the feds show up in your neighborhood to question your friends, they are obligated to tell the truth or they'll be interfering with a federal investigation. But they can't lie if they don't know the truth.
44 views07:50
Open / Comment
2021-12-28 10:50:41 So, how does someone keep their hacking life completely secret?

What This Is:

I'd like to know how hackers keep their hacking life secret. So with a bit of experience and knowledge obtained from elsewhere I want to share what I know, and also ask a few questions to become even more silent about your secret life
43 views07:50
Open / Comment
2021-12-28 10:50:40 Keeping Your Hacking Identity Secret
#1
41 views07:50
Open / Comment
2021-12-27 14:31:33 How to Change Your Email Address

#tricks

@Broken_Hacker
4 views11:31
Open / Comment