Private Virtual Inception

Follow a step by step guide to launch multiple encrypted virtual machines to enhance privacy and security for your business and personal communication.

  1. CONNECT COMPUTER TO INTERNET VIA ETHERNET CABLE AND NOT WIFI
  2. PREFERABLY CONNECT TO ETHERNET CABLE THAT IS CONNECTED TO A SWITCH AND FIREWALL.  SOME SMALL HOME OFFICE ROUTERS HAVE A FIREWALL BUILT IN.  YOU MAY ALSO HAVE THE OPTION OF USING A LAYER 7 FIREWALL THAT RUNS ON YOUR OS SUCH AS WINDOWS OR MAC OS, OR A FIREWALL THAT RUNS ON YOUR VPN APPLICATION. 
  3. CHECK FOR SOFTWARE UPDATES ON YOUR OPERATING SYSTEM
  4. CHECK FOR FIRMWARE UPDATE ON YOUR ROUTER.
  5. INTERNET SPEED TEST: YES, ANY TIME IS A GOOD TIME FOR AN INTERNET SPEED TEST.  I USE THE FREE OOKLA OR GOOGLE INTERNET SPEED TEST FOR THIS.  
  6. SETUP VPN (OPTIONAL: USING AN PSEUDO/PEN NAME FOR THE ACCOUNT AND PAY FOR IT IN TUMBLED BITCOIN. I USE PROTONMAIL BECAUSE IT RESTS OUTSIDE THE SCOPE OF THE 5 EYES. SETUP MULTIPLE ACCOUNTS, I USE ONE VPN ACCOUNT FOR MY DESKTOP, ONE FOR MY MOBILE DEVICE, ANOTHER ALTERNATE ONE FOR USE ON THE VIRTUAL MACHINE YOU ARE GOING TO LAUNCH, AND OF COURSE A ONION VPN, THANKS TO THE NAVY AND DARPA WHO DEVELOPED THIS MYSTICAL ONION SO, I AM GOING TO USE IT.
  7. TURN ON VPN AND WAIT TO VERIFY THE CONNECTION (VPNS DROP AND THIS IS VERY IMPORTANT TO UNDERSTAND AND YOU MAY CONSIDER ADDING OR MAKING USE OF A KILL SWITCH THAT TERMINATES YOUR SESSION IF THE VPN DROPS(LOSES CONNECTION TO THE SECURE TUNNEL). 
  8. REMEMBER IF YOU ARE DOING ANYTHING UNLAWFUL WITH THIS INFO PLEASE LEAVE THIS PAGE NOW AND GO WORK ON YOURSELF.  IT’S NOT WORTH IT.  THE SAME DD AND 5 EYES THAT DEVELOPED THE PACKET SWITCHING NETWORK KNOWN AS THE MODERN DAY INTERNET (AND WHO PLACED ALL THOSE TRANS ATLANTIC AND WORLD REACHING CABLES TO GIVE US WORLD WIDE ACCESS) ABSOLUTELY HAS WAYS WE DON’T KNOW OF TO STILL GET PAST ALL THIS. THIS GUIDE IS MAINLY TO PROTECT YOU FROM CASUAL HACKERS, PROBING HIGHER UPS, AND ANNOYING MARKETING SOFTWARE THAT HARVEST YOUR DATA.  THE BIG BROTHER HAS PROVEN IT IN COURT TIME AND AGAIN THEY CAN GET ACCESS TO YOUR ACTIVITY AND INTERNET USAGE WITHOUT HAVING TO DISCLOSE WHAT METHODS THEY USED TO DO SO.  SINCE THEY BUILT IT (USING TAXPAYER FUNDING OF COURSE) AND CONTROL IT, THEY PRETTY MUCH HAVE A TOOL BELT OF BACKDOOR’S IN PLACE TO  CATCH EXIT NODES ON YOUR ONION. THEY CAN ALSO SUBPOENA YOUR VPN ACCOUNTS TO GET THE LOGS, AND HONESTLY WHAT VPN PROVIDER IS GOING TO DIE ON A HILL AND SAY NO TO THE THREE LETTER AGENCIES KNOCKING ON THEIR DATA CENTER DOOR? DO YOU REALLY THINK THEY WILL GO OUT OF THEIR WAY TO PROTECT A USER PAYING $9/MONTH? 
  9. OK MOVING FORWARD.
  10. ONCE YOU TURN ON YOU VPN AND VERIFY ITS CONNECTED CHOOSE A DESTINATION TO SPOOF YOUR IP ADDRESS THAT YOU SO CHOOSE.  THIS IS WHERE YOU MAKE AN INFORMED DECISION.  I WOULD CHOOSE A DESTINATION INSIDE THE USA IF YOU PLAN TO MAKE USE OF THE ONION.  I WILL EXPLAIN LATER BUT IT IS A BLACK AND WHITE DIFFERENCE AS TO WHY. 
  11. NEXT YOU WANT TO LAUNCH A VIRTUAL MACHINE.  I WOULD USE VIRTUAL BOX TO LAUNCH A WINDOWS 10 OR 11 VM.  I WILL NOT COVER HOW TO SET THIS UP OR HOW TO LAUNCH A VIRTUAL MACHINE (VM) BUT THERE ARE PLENTY OF YOUTUBE CHANNELS THAT SHOW HOW. TWO OPTIONS ARE VIRTUAL BOX AND VMWARE.  THESE ARE TWO GREAT OPTIONS. BOTH ORACLE AND VMWARE MAKE GREAT VIRTUAL MACHINE SOFTWARE. THANKS FOR SHARING LARRY AND EDOUARD.
  12. LAUNCH THE VIRTUAL MACHINE. NOW BEGINS YOUR VOYAGE INTO A VIRTUALIZED INCEPTION. 
  13. LAUNCH THE SECOND (ALTERNATE) VPN (ALSO PAID FOR WITH TUMBLED BITCOIN) INSIDE THE VM AND VERIFY CONNECTION AND MAKE SURE TO CHOOSE A DIFFERENT (IP ADDRESS) VPN DESTINATION TO SPOOF YOUR IP ADDRESS. IF YOU PLAN TO USE THE ONION THEN PLEASE BE MINDFUL THAT CHOOSING A “NON-USA” VPN LOCATION WILL MOST LIKELY FINGERPRINT YOUR IP ADDRESS ONCE YOU ACCESS AND EXIT THE ONION NODES,YOUR MAC ADDRESS AND REAL IP ADDRESS WILL ALSO  BE FINGERPRINTED IN THE PROCESS WITH THE 5 EYES. YOU WONT KNOW IF THIS HAPPENS, BUT ONCE THEY FINGERPRINT YOU ALL YOUR ACTIVITY AND DATA HISTORY IS STORED IN ONE OF THEIR GLOBAL DATA CENTERS…FOREVER.  #44 SAID THEY STOPPED DOING THIS AFTER THE EDWARD LEAKS, BUT IN REALITY THEY JUST BUILT MORE DATA CENTERS AND CONTINUED ON WITH BUSINESS AS USUAL. 
  14. OPTIONAL: TEST THE VPN TUNNEL BY SIGNING INTO YOUR EMAIL ADDRESS SUCH AS A GMAIL ACCOUNT FROM THE VM AND SEE IF IT ALERTS YOU THAT A SIGN IN HAS BEEN ATTEMPTED FROM AN UNRECOGNIZED DEVICE AND LOCATION.  THIS IS A FORMALITY.
  15. NEXT LAUNCH ANOTHER VIRTUAL MACHINE ON TOP OF THIS ONE. I WOULD CHOOSE ANOTHER WINDOWS MACHINE.
  16. NEXT SETUP THE ONION VPN AND ONION BROWSER.
  17. OPEN AN ONION BROWSER WINDOW.
  18. MAKE YOUR WAY TO AN ENCRYPTED MESSAGING SERVICE SUCH AS SIGNAL OR A ENCRYPTED EMAIL SERVICE SUCH AS PROTONMAIL AND SETUP AN ACCOUNT IF YOU HAVEN’T ALREADY DONE SO. I WOULD AVOID MARKS ENCRYPTED MESSENGER APP AS SOMEONE ELSE HOLDS THE KEYS AND THEY KEEP LOGS.
  19. PAY FOR THE PROTONMAIL ACCOUNT USING TUMBLED BITCOIN.  THE SAME WAY YOU DID FOR THE VPN ACCOUNTS. 
  20. KEY STEP: THE BEST WAY TO MAKE USE OF AN ENCRYPTED EMAIL SERVICE IS TO COMMUNICATE TO ANOTHER PERSON (OR MACHINE IF YOU WILL) BY WAY OF THE DRAFT FOLDER.  SO THIS IS TO NOT ACTUALLY SEND ANY EMAILS AT ALL. YOU ENTER YOUR MESSAGE OR DOCUMENTS INTO A DRAFT EMAIL AND LEAVE IT THERE. THEN THE OTHER INTENDED READER LOG INS AND FINDS YOUR MESSAGE.  YOU MUST ALLOW THE OTHER END USER (OR INTENDED RECEIVER) LOG IN AND PASSWORD ACCESS TO THE SAME ACCOUNT AND YOU THEN COMMUNICATE BY LEAVING NOTES IN A DRAFT EMAIL. YOU NEVER SEND ANYTHING. 
  21. OPTIONAL: IN THE DRAFT EMAIL (THAT YOU NEVER SEND) YOU CAN ALSO TALK IN A “CODE” IF YOU WANT IN CASE YOU WANT TO SECURE YOUR INFORMATION FURTHER.  THIS IS A GREAT WAY TO PROTECT THAT FAMILY RECIPE FOR SHEPHERD’S PIE THAT YOU WANT TO SEND TO YOUR FRIEND.
  22. THE KEY TO USING A DRAFT IS TO NOT SEND AN ACTUAL EMAIL, YOU LEAVE IT AS  A DRAFT, BY DOING THIS YOU ALSO NEVER SHOW INTENT IN YOUR MESSAGE.  SO YOU NEVER ACTUALLY SAID ANYTHING YOU ONLY HAD A DRAFT OR A “BRAINSTORM”.  YOU ALSO DON’T RISK THE CHANCE OF INTERCEPTION DURING THE JOURNEY THE EMAIL PACKETS TAKE FROM THE SENDER TO RECEIVING ROUTER. THIS PROCESS THE EMAIL WOULD TAKER MAY INCLUDE MANY JUMPS FROM MANY SERVERS, ROUTERS, AND HOSTS WHICH LETS ANYONE LISTENING KNOW THAT YOU SENT A MESSAGE (AT SUCH AND SUCH A TIME AND THAT YOU ARE ACTIVITY COMMUNICATING).  YOU DON’T WANT THIS. 
  23. A FORMER DD HIGHER UP OFFICIAL USED THIS METHOD OF COMMUNICATING BY USING THE DRAFT FOLDER AS A MEANS OF TALKING TO HIS MISTRESS.  HE GOT CAUGHT, EVENTUALLY, BUT HE WASN’T USING ENCRYPTED EMAIL SERVICES OR MULTIPLE VMS AND VPNS(PAID FOR WITH TUMBLED BITCOIN), A USB BASED OS/VM, A VPN KILLSWITCH, OR THE ONION.  SO WE SHALL LEARN FROM HIS MISTAKE RATHER THAN LEARN THROUGH OUR OWN TRIAL AND ERROR.  WHICH WILL HELP KEEP THE RECIPE A SECRET.  WHICH IS THE GOAL.
  24. MAKE SURE TO NOT SIGN IN TO THIS EMAIL ACCOUNT OR ANY OF YOUR VPNS YOU USE FOR THIS PROJECT ON YOUR MOBILE DEVICE OR USING A PUBLIC COMPUTER.  THIS COULD EASILY GIVE AWAY YOUR IDENTITY AND THEN YOU WOULDN’T BE 00 AGENT TYPE COOL ANYMORE YOU WOULD JUST BE LIKE ALL THE REST.  MAKE THEM WORK FOR IT. WE ALL HAVE THE RIGHT TO PRIVACY. ESPECIALLY WHEN USING AN INTERNET NETWORK THAT WAS PAID FOR WITH TAXPAYER MONEY. 
  25. BONUS OPTION: SETUP WINDOWS 10 OR 11 ON AN ENCRYPTED USB STICK AND THEN FOLLOW THE STEPS TO RUN A VPN AND VIRTUAL BOX.  DO SO WILL HELP SECURE YOUR SESSION IF SOMEONE TRIES TO SHOULDER SURF YOU THEN ALL YOU NEED TO DO IS PULL THE STICK OUT AND POOF! THE SESSION IS TERMINATED. THIS IS MUCH EASIER AND MORE ERGONOMIC THAN TRYING TO USE THE MOUSE OR TOUCHPAD TO REACH THE MENU BUTTON TO TERMINATE THE SESSION. 
  26. THE GOAL IS TO KEEP THAT SHEPARD’S PIE RECIPE A SECRET…AT ALL COSTS 00 AGENT.
  27. MAKE SURE TO DELETE HISTORY, COOKIES, AND CACHE BEFORE ENDING YOUR SESSION.

THANK YOU FOR LISTENING. – Dimples

Posted by

in