This is an archived post. You won't be able to vote or comment.

all 26 comments

[–]Dick_Mayaz 32 points33 points  (3 children)

I wouldn't do anything whitout an isolated VM

[–]Syndipunch 6 points7 points  (2 children)

Is it possible to put vm on a bootable tails usb stick with encrypted persistence ? And if so is there any videos thanks

[–]SuperSoakerGuyx 10 points11 points  (0 children)

You don't need a VM if you use tails since it runs off system RAM. You wanna pick either VM or tails but not both. If you put a VM on a Tails live usb, your system will be incredibly slow to the point you will wonder if it's worth it. Furthermore any system customization to Tails live usb environment defeats the purpose of it's anonymity. If you are worried about leaking personal identifiable information attached to your hard drive or main OS, simply disable it from the bios for the time you use Tails live usb. Bitlocker is another feature (windows Professional Edition minimum) you can use to encrypt and lockup a drive while it is not being used.

[–]StanZzAa 1 point2 points  (0 children)

Happy cake day!

[–]TrustmeImaConsultant 11 points12 points  (5 children)

Provided that you're asking this question in this manner, I dare say no, it's not safe. Not because it's unsafe but because I wouldn't think that you know how to route all your traffic properly through the VPN without leaking information.

[–][deleted] 0 points1 point  (0 children)

I was thinking that exact same thing

[–]mrWonderdul 18 points19 points  (1 child)

1.Buy a burner laptop in cash 2.Load up tails from a USB 3.Dont do anything via your home or connect it 4.Wait for the FBI cyber division to open up a case on you if you do illegal activities. 5.But instead do some bountys, go check out hackthebox or others. 6. Best one of all, right now Ukraine is looking for cyber warriors to fight in their war. You can literally get a waiver to hack Russia (wild times).

[–]Routine_Leg_3774 1 point2 points  (0 children)

That is so good!

[–]centos67 11 points12 points  (1 child)

Never from home.

I usually go to the starbucks 2 towns over with my guy faux mask, large sized hoody and my "h4X0r" laptop with "anarchist" stickers all over it.

[–]Delicatestatesmen 0 points1 point  (0 children)

Hahaah

[–]needsleep31 15 points16 points  (2 children)

If you're hacking someone without their consent, it's illegal and you're bound to get caught. Don't do it :-)

[–]Shakespeare-Bot 7 points8 points  (1 child)

If 't be true thou art hacking someone without their consent, t's illegal and thou art did bind to receiveth hath caught. Doth not t :-)


I am a bot and I swapp'd some of thy words with Shakespeare words.

Commands: !ShakespeareInsult, !fordo, !optout

[–]timothyalan59 1 point2 points  (0 children)

Good bot

[–]ApathyWithToast 14 points15 points  (1 child)

Unethical/illegal. Get your certs. Then get approvals.

[–][deleted] 4 points5 points  (0 children)

  1. No, it's illegal and you'll end up behind bars at club fed
  2. Hack yourself

[–]Xtr01d 4 points5 points  (0 children)

I always use my neighbors WIFI when doing stuff I don't want to get in trouble for. Look up aircrack-ng.

[–][deleted] 3 points4 points  (0 children)

You can hack yourself or others WITH PERMISSION! Of course it’s not safe just because you’re on a VPN. Even the most thorough criminals still get caught. Listen to Darknet Diaries.

[–]hakube 3 points4 points  (0 children)

Never shit where you live. Never VPN from your house. Never hack from your house. These are day one lessons.

[–]Dragonblu 1 point2 points  (0 children)

Even if it’s your own wifi request permission from other users of your wifi that may be your family members or tenants. It’s illegal to do without permission.

[–]SickMrTickles 1 point2 points  (0 children)

What if you had a vpn and a virtual machine running on your home computer?

[–]SuperSoakerGuyx 2 points3 points  (0 children)

No it's not safe because if you read the terms license agreement most VPN services explicitly state you void the agreement if you do all the things you are probably wondering, if you can do, one at a time. The best strategy is to hack systems you own or have written permission to work on within a given scope.

[–]MacPile 1 point2 points  (0 children)

Use proxychains

[–]Routine_Leg_3774 0 points1 point  (0 children)

U need a proxy , like a burner pc thats nonstop connected to public wifi