• Suddenly unable to log into your ZooVille account? This might be the reason why: CLICK HERE!

Online Security

Most of the mainstream VPN services are snitches and also corporate with feds, you want to use a VPN service that allows you to pay in crypto preferably in XMR
Mulvad VPN is the best
If you are on windows please atleast use ccleaner lol
Consider using tails, qubes, whonix or even fucking Linux for an OS as windows is garbage for opsec
Proxies are also better than a VPN
Use protonmail for email addresses
I like to use tails OS with a USB boot load
That the Company allows payment in crypto do not guarantee that your IP and data stream is hidden.
Maybe even the opposite. Why should I trust someone who are willing to hide the money?
 
That the Company allows payment in crypto do not guarantee that your IP and data stream is hidden.
Maybe even the opposite. Why should I trust someone who are willing to hide the money?

Network traffic is never truly hidden, there are numerous attacks that can be performed to reveal the two distinct ends of a transmission that only require access to the flow metadata that is readily available to state-level actors, they don't need access to the unencrypted data to manage correlation between incoming and outgoing flows. From there it's not a difficult task to discern the source of the traffic. While there are methods to make that more difficult, they're largely outside the usage of the individual. I've said it before and I'll say it again, you can't hide from a gov if they're actively looking for you.
 
That the Company allows payment in crypto do not guarantee that your IP and data stream is hidden.
Maybe even the opposite. Why should I trust someone who are willing to hide the money?
Mullvad is the 1# used VPN service by darknet users for a reason

Network traffic is never truly hidden, there are numerous attacks that can be performed to reveal the two distinct ends of a transmission that only require access to the flow metadata that is readily available to state-level actors, they don't need access to the unencrypted data to manage correlation between incoming and outgoing flows. From there it's not a difficult task to discern the source of the traffic. While there are methods to make that more difficult, they're largely outside the usage of the individual. I've said it before and I'll say it again, you can't hide from a gov if they're actively looking for you.
If you are a true nut job you can buy a burner phone and a prepaid data sim in store with physical cash and Set up the phone not using your own ID then GEO spoof the phone while using a proxy then use the phone as a hotspot to connect assuming the laptop or pc also has military grade opsec too Lmao that would be my personal best bet as online anonymity but fuck no ones gonna do that
 
I hear it's dangerous to post photos that contain clouds or windows, I've heard stories about people who have tracked down others through weather charts and Zillow listings, even with stripped metadata. Even backyard shots that have a tree or imported plant can be used against you. Of course those are just stories posted on the good ol interwebs, but I guess you can't be too careful.
 
Most of the mainstream VPN services are snitches and also corporate with feds, you want to use a VPN service that allows you to pay in crypto preferably in XMR
Mulvad VPN is the best
If you are on windows please atleast use ccleaner lol
Consider using tails, qubes, whonix or even fucking Linux for an OS as windows is garbage for opsec
Proxies are also better than a VPN
Use protonmail for email addresses
I like to use tails OS with a USB boot load
protonmail has and continues to give user data to law enforcement. bad suggestion. look i get it i watch mental outlaw on youtube too, but if law enforcement was going after zoo porn consumers via isp data or tracker data we'd know. Not like who and what for are on the court dockets is hidden.

the old advice is always the best advice. no personally identifying information in your comments or uploads. exercise discretion in pm's. only view content on your own devices and your own network/cell plan. if they are getting a warrant for your ip's traffic from your isp, it aint cus they fingerprinted your browser in windows, its cus someone else reported suspicious behavior on their network or in person observation or cus you told them cus ofc you did lol.
 
Out of curiosity, other than ostracism , shunnings etc... What are the fines/incarceration? Let's say EU and North America. How bad can it get?

I don't use vpn or nothing on my phone browser Willynilly but I also don't give a fuck what people think of my porn habits. someone explain?

Also echelon makes vpn/tor an imaginary security, like the guy above said, if someone wants to know, they will.
In the uk I know a couple of people who had >1 year prison sentences and had their animal confiscated, banned from keeping animals and on the sex offenders register.
I know another person who had a court order to have their dog neutered, and they were placed on the register too and ther got a 6 month suspended sentence. Part of the conditions attached to not doing time was she has to see a therapist fortnightly for 6 months. The first therapist apparently couldn't hide her disgust and she had to seek a more sympathetic therapist.

Be safe people.
 
Last edited:
In the uk I know a couple of people who had >1 year prison sentences and had their animal confiscated, banned from keeping animals and on the sex offenders register.
I know another person who had a court order to have their dog neutered, and they were placed on the register too and ther got a 6 month suspended sentence. Part of the conditions attached to not doing time was she has to see a therapist fortnightly for 6 months. The first therapist apparently couldn't hide her disgust and she had to seek a more sympathetic therapist.

Be safe people.
I might be wrong having not read through this thread since i last commented, but the comment youre replying to reads like he's wondering about possible legal risks of consuming zoo porn rather than possible risks of being caught in the act or creating/distributing self-made zoo porn. I'd be curious as well if thats something actually pursued anywhere or if it, as it appears to be, is similar to something like pirating movies in the eyes of the law.
 
As I had to open a Proton mail and VPN, pretty sure that's not even secure, but one thing I did when still a member on BeastForum etc, I switched off my location tag in the camera settings, but know somehow there are still ways to be traced, the only thing, apart from my family, I keep my zoo life to myself when in public, or on social media, whatsapp etc. But thanks for the heads up.
 
As I had to open a Proton mail and VPN, pretty sure that's not even secure, but one thing I did when still a member on BeastForum etc, I switched off my location tag in the camera settings, but know somehow there are still ways to be traced, the only thing, apart from my family, I keep my zoo life to myself when in public, or on social media, whatsapp etc. But thanks for the heads up.
with metadata properly removed from photos there will be no location data traveling packaged with your photos online. Removing exif data from photos is very simple and easy as well. That said, andrew tate just doxxed himself with a pizza box and 4chan found that kid who was abusing his cat in the early days of youtube off his green carpet and a tip on what county he was in. be deliberate in your internet footprint and you'll likely be ok, assuming youre not also running a dark web drug market or distributing/producing pedophilic material. if thats the case the fbi is already outside your house as i type this. :)
 
Thanks shortbutfast, no, I am not involved in any dark Web drug marketing etc, I don't attach myself to any unsafe links etc, try to observe /do thorough research ?
 
That said, andrew tate just doxxed himself with a pizza box and 4chan found that kid who was abusing his cat in the early days of youtube off his green carpet and a tip on what county he was in.
I don't think most people realize the sheer power of detective crowdsourcing. If you post something like a photo with your living room, bedroom, bathroom, etc. in the background you could be putting your security at risk. There was a user on here that was identified by merely the antique bedframe in the background of the video she made having sex with her dog. Her story was quite a sad one too, as once she was doxxed her information spread like wildfire and made her day to day life an absolute living nightmare.

I very seldom post photos on here, and what little I have shared I generally heavily blur the background for that very reason. Hell, even my avatar is a heavily doctored photo of my dog sitting in my living room. Absolutely every trace of the background was scrubbed, and her face/color was also modified a bit as well. It's also why I find threads like "post a picture of your animal partners" and "post a picture of your view today" absolutely cringeworthy.
 
I don't think most people realize the sheer power of detective crowdsourcing. If you post something like a photo with your living room, bedroom, bathroom, etc. in the background you could be putting your security at risk. There was a user on here that was identified by merely the antique bedframe in the background of the video she made having sex with her dog. Her story was quite a sad one too, as once she was doxxed her information spread like wildfire and made her day to day life an absolute living nightmare.

I very seldom post photos on here, and what little I have shared I generally heavily blur the background for that very reason. Hell, even my avatar is a heavily doctored photo of my dog sitting in my living room. Absolutely every trace of the background was scrubbed, and her face/color was also modified a bit as well. It's also why I find threads like "post a picture of your animal partners" and "post a picture of your view today" absolutely cringeworthy.
while not an answer for the kind of doxxing we've been mentioning, i highly recommend checking out Fawkes if you havent already. University of Chicago project thats a direct answer to the clearview ai dataset-trained facial tracking software in use. learns off the same dataset and algorithmically tweaks faces in photographs in such a manner as to leave you looking mostly the same to your own eyes in a photo, yet like a completely different person to tracking models. Not something that ai models can train around, either. if they train their models on tweaked photos it taints multiple generations and iterations of ai training models, flippin genius stuff. http://sandlab.cs.uchicago.edu/fawkes/

hope the tech makes its way to video post processing soon if it hasnt already.
 
I am in the UK and wanted to post some stories. I know most of the discussion is about images or videos etc which i understand is risky but if its just a story is this still a big risk? :(
 
I am in the UK and wanted to post some stories. I know most of the discussion is about images or videos etc which i understand is risky but if its just a story is this still a big risk? :(
Hi, in the Writing and Stories section, just don't use real names, places, and not too much detail in perspective about information that can be traced, in the Porn section, videos not showing things that can be identified like location, the place, house etc, which you disable your cameras location and sure of the video recording too.
 
Hi, in the Writing and Stories section, just don't use real names, places, and not too much detail in perspective about information that can be traced, in the Porn section, videos not showing things that can be identified like location, the place, house etc, which you disable your cameras location and sure of the video recording too.
ok thank you. The stories i post wuld be 100% fiction anyways and i dont like in the USA so i make up places in the USA like a random State or City area for the location of the story event, nothing more and thats just from my own general knowledge of geography not based on any actual visited or knows real place to link me to. I just was more asking about the fact i would be posting a fictional story and nothing more. I have no intention of using any real fact or details. How risky is fictional story posting?
 
Whether fictional or true, as long as it won't be identified to give yourself away to unwanted prying eyes. See my true story, my whole life, in My Life how I got involved into beastiality in the Men and Animals section of Writing and Stories, I kept to minimal details of the names, just like the main topics, no real location where I was, or mentioned any town /city
 
Just witnessed an awakening of zoophilia amongst a group of "normal" people, but I had to take a step back as their opsec was terrible, they were far too open abou it and on the wrong platform.
I am in a meme/joke group on facebook, nothing that would get you sacked and i was on my normal profile under my real name, and normally its quite tame, but funny.

Last week someone posted a video of a fisherwoman getting dildoed from a guy with a trout and most of the group went nuts for it wanting more, so then others posted videos of mice being inserted, and it exploded from there, some other shock videos, but a lot of common zoo porn, women being penetrated by willing animals.
There was a lot of 30 day bans handed out by facebook, and a couple of whatsapp groups were started for sharing zoo porn. It seemed to awaken something in a lot of people, and more women than men which was surprising, but they were all too naive about security and anonimity, they were on their personal fb profiles. A small number of people were disgusted.
Nobody seemed to be aware that posting that was illegal in the uk, I pointed out that it was illegal and the penalties, and that some of the stuff was outright animal cruelty, then I left the group and cleared my cache, purely because these idiots are going to get a lot of people caught, and the penalties in the uk for just possesing zoo porn are quite severe, and even once you have finished your sentence newspapers and anti zoo groups track people down and pressure employers to sack convicted zoos.
It was a pleasant surprise to see how many regular people were turned on by zoo porn though, it gives me hope we might one day be accepted.
Part of me wants to go in and tell them to be a bit more discreet and use secure platforms, but no way am I taking the chance of outing myself.
 
Telegram and Signal are considered safe in of themselves
One thing about the way that is worded.

It makes it sound like there some equivalence. Unfortunately many users of Telegram think all their chats are E2EE (when in fact they are not). Even for secret chats, the cryptographic protocols have not been audited by external cryptographers and are non-standard when compared with battle tested methods such as Double Ratchet.

Signal does still require a phone number, and so does Telegram (unless you use their cryptocurrency bullshit thing). A lot are not smart enough to purchase an anonymous VOIP number with crypto. Best to just stay on Matrix (like beast.chat), particularly as invite codes are only given to members of the forum with some post history.

Another Matrix server may provide increased anonymity, as you can de-associate that from previous activity by regularly rotating identities, having said that though, gaining people's trust may be more difficult if you do that. I would avoid Matrix.org's default server as they have been known to be particularly anal on moderation, (and not the kind we like) particularly when people complain. Fortunately with something like the Matrix protocol, anyone can set up a server (like beast.chat), and it can communicate with other servers in a federated manner, like email providers, not everyone has to be on the same server. There will however be servers (and I think matrix.org may be one of them) which won't support federation to servers like beast.chat.

For VPNs I would stick to those which have had external public audits such as those recommended by Privacy Guides. The reason for this is because the VPN industry spends a lot of money on marketing, astroturfing (getting mouthpieces to pretend to be independent) rather than gaining trust through providing quality and transparency. Typically you can determine this based on if a site has an affiliate program. Tom Scott has a great video on that.

We know that all of Privacy Guide's financial donations go through their OpenCollective org. Any additions to the site go through multiple levels of filtering. Content is generally discussed publicly, drafted, then approved by team members all within public either on their forums or GitHub. They have no affiliate program and seem to pride themselves on that.

I've seen NordVPN mentioned a few times around here, personally I would not use them. They've had a couple of issues in the past, one was an enumeration of accounts, pretty basic mistake that should not have been possible. There were security issues from a RAT. There seems to be a pattern. There is the distinct feeling they spend a lot less money on infrastructure, validation and auditing than they do on marketing. Seem to recall them having television adverts in like 60 countries, yet they cannot afford to validate these things do not happen. They spend a HUGE amount of money trying to game search engine results too.

Brave browser's privacy window, or the built in TOR browser.

There is no substitute for the Tor Browser in regard to fingerprinting, so I would stick to that. There is a warning on Privacy Guides about that, and in fact the Brave website as well.

Just a general note on the Linux recommendations. It's important to have a suitable threat model. Simply using Linux is no better than Windows, unless you're using it for specific reasons. Specific distributions like TAILS have amnesic properties, meaning that no data (recent files etc) is forensically able to be recovered. When you open files in programs they often have "cache" files which may lead an adversary with physical access directly to the content you've been viewing.

Distributions such as Qubes-OS may provide further compartmentalization between activities with disposable virtual machines. Tor support is available through the use of Whonix virtual machines. The way that Qubes-OS and Whonix differ from TAILS is that they contain one virtual machine that is configured to send all traffic through a separate virtual machine running Tor, whereas TAILS uses a firewall and special rules to "pipe" everything into Tor. Qubes, and Whonix can provide increased security against a local threat, such as malware, which is not uncommon in de-anonymization operations these days.

As for "separate laptops", my suggestion is to have a bootable and removable volume that can be entirely removed from the system you use and placed in a hidden place in another room. Obviously using strong encryption like LUKS is a must, but there is no substitute for complete deniability.

Performance can be very good with portable NVMes. The USB 4.0 standard allows for 40Gbit throughput, which you're never going to reach using a web browser.
 
Last edited:
Some further things I noticed in this thread which I thought I'd point out:


That particular neocities website is known for its misinformation and scaremongering, many of the pages contain absolute paranoid misinformation because the author thinks something works in a different way to what it actually does. There is also a lot of incorrect and outdated information there too.

Panama where Nord is based isn't part of 14 eyes either, I imagine they're quicker to kowtow to the US before the Swiss are.

"Eyes" is a common marketing technique by VPN providers. It really is quite irrelevant nowadays. There are worse jurisdictions for privacy than the "eyes" countries. That is why it is best to not place trust in a single entity. That is the premise behind Tor, the circuit contains multiple parties, none of which can de-anonymize you alone, and that stream changes every 120 seconds if no data is being sent.

Do you think IRC chats are good?

No, because there's generally no E2EE.

encrypted online storage solution for media

I'd probably use something like Cryptomator for this, as it has been publicly audited. Be very careful about "web-based E2EE", it's entirely possible for a provider to switch that off for specific accounts should they wish to do so.

How can I strip meta/exif data offline?

There are a number of recommended data redaction tools. There is also a specific guide for mac users.

Some VPN's are know for not masking your DNS, so even with a VPN running, your ISP will have record of you visiting this site.

The recommended ones there will do that, and additionally provide working kill switch functionality to disconnect the connection, rather than fall back to a connection not on the VPN. You should ALWAYS use your VPN provider's DNS servers (which is the default). There is an advanced explanation on that.

Does anyone know the best client for torrents concerning privacy?

There are not any specific clients that are "better" for privacy, except maybe non-commercial ones. Personally I use qBitttorrent, but not for anything zoo specific, and of course I always make sure to use that through a VPN. Tor usage is not possible in most cases with Bittorrent protocol as it does not support UDP. Bittorrent over Tor is not recommended.
 
Last edited:
Back
Top