/b/ - Random

The Confluence of All Things

Index Catalog Archive Bottom Refresh
Name
Options
Subject
Message

Max message length: 0/12000

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0.

Board Locked? Request Reopening

PNG and GIF uploads are temporarily disabled while we deal with a spammer problem.


8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

"Life has become immeasurably better since I have been forced to stop taking it seriously." -Hunter S. Thompson Weapons|Queen Grace's Royal Palace|Politically Incorrect|Video Games|Books|Role Playing Games|comfy posting

seeking feedback on my April Fool's prank Anonymous 03/17/2025 (Mon) 07:20:52 No. 469886 >>469918
I'm seeking feedback on my April Fool's prank, which may ruffle some feathers, so I need to be well-prepared against doxxing. My plan is to create a fake persona that doesn't share my interests, someone who embodies the character of a cocky, self-proclaimed dumb hacker with a penchant for leetspeak and Discord raids. People will likely assume this individual is real, but in reality, I'll be controlling their online presence. My top priority ideas are: 1. Utilize an Android virtual machine with spoofed GPS to create fake locations on social media platforms like Facebook, Twitter, Instagram, and Tinder. This is my most valuable resource. Additionally, generate fake Google Maps reviews of places I've never been to. 2. Rewrite all chat messages through ChatGPT in Tor to conceal my writing style. If that's not possible, I'll use NeuralDaredevil-8B-abliterated locally on my PC. Other ideas, listed from most useful to least: * Upload photos or documents with fake metadata on 4chan and use Exiftool to edit them, ensuring the same serial number across multiple images. * Generate a bio using ElfQrin (elfqrin.com/fakeid.php) and Fakenamegenerator (fakenamegenerator.com). * Censor my photo's face using AI-generated or other methods, storing the unedited version in metadata. * Create a public Google Drive document as if I'm sharing it with someone but was too lazy to limit access to their email alone. * Provide private details on smaller networks, such as board readers and Craigslist forums. Less obscure sites include Discord, Reddit, Hacker News, TikTok, dating platforms, and more. * Delete or alter content after the Wayback Machine caches it to create suspicion. * Block individuals who find information about my character on social media. * Maintain unique misspellings, grammatical errors, phrases, or bios across multiple platforms. Additional tactics: * Share a single link with tracking parameters across various fake personal accounts, saying "Look, I made Twitter/YouTube/Reddit/more mad." To make it more believable, post screenshots from my Android VM, as many apps force tracking parameters. Note that Twitter's tracking parameter contains an encoded user ID. * Obtain fake photos of my home from real estate listings or purchased property images. * Rush comments with intentional misspellings using Gofbid to appear intimidated or angry when "my cover" is blown. * Claim I use VPNs and privacy software recommended by YouTubers and that I learned OPSEC in Discord. * Make it seem like my haters found my fake personal email or phone number (public VoIP) through account recovery or contact exploitation. Which sites allow using a phone number without confirmation? Questions for further investigation: * Can I obtain an abandoned account from an old data breach for my sock puppet? * Are there alternative photo sources, such as Fiver or Vidi? Regarding my OPSEC, it's largely based on OSINT Techniques 10th edition by Mike Bazzell: * I'll create accounts at a public WiFi spot in my country or another to avoid VPN-blocking and use DOH if necessary. Then, I'll access those accounts from home using the same Mullvad server.
[Expand Post]* Use a high-entropy, randomly generated password for each account via KeepassXC. * All activities will be conducted within an Ubuntu and Android virtual machine with no personal information or activity. * Employ TOR with JavaScript disabled whenever possible; if not, use LibreWolf without extensions.
go up
bump
bunp
That's nice but what's the prank?
>>469886 (OP) Glowing TLAman must leave
>>469918 What is a TLAman >>469903 I don't want to spoil the surprise Do you have any other criticisms or know of TOR-friendly websites without registration where I can seek further assistance? I've already explored zzzchan, 8chan, 8kun, and 22chan. Thank you for your time, and I look forward to your input.
>>469965 I'm not going to do anything illegal and I don't want to incriminate you.
If you don't use a GRNTMAC filter, your generated files will be pretty easy to trace OP
>>469989 I've done some digging, and all I can find on GRNTMAC is someone with that username on a dusty old online forum. It's as if this acronym was conjured out of thin air or, worse, a clever marketing ploy to sound impressive but mean nothing. I'm left wondering, what exactly does GRNTMAC do? Is it the key to data security that he claims, or just a clever bit of wordplay?
I'm bumping my post in hopes someone might have some insight - should I be pulling off my prank or investing more time in learning about operational security instead? Has anyone read 'Extreme Privacy' by Mike Bazzell and can vouch for its usefulness? Help me out, internet!
>>470149 Oh, I don't care. I'm sorry. It just doesn't involve me at all in any way.


Forms
Delete
Report
Quick Reply
Drag files here to upload or
click here to select them