Although this guide will cover all carrier service providers such as AT&T, Boost Mobile, Simple Mobile, T-Mobile, Sprint, etc. we will focus more on the T-Mobile
carrier network since this is what we have to work with in this guide. This guide will cover how to tether your Laptop/Desktop computer to your mobile device-
( even if it is restricted or you didn't pay for that service ! ) for free and bypass any BitTorrent blocks/Firewall blocks from the carrier network and set yourself
outside of the DMZ/Firewall and also receive the maximum possible downlink speeds from the network as well as encrypt all of your traffic so the network cannot
sniff or detect your incoming and outgoing transmissions/packets.
Why would someone want to do this? Well I'm glad you ask! If you're new to the Anonymous universe or hacker universe in general ( and yes, a 'cracker' is still a hacker
by definition so don't argue with me there ) this information can be extremely useful. What other individuals or parties could use this knowledge/skill ? Activists,
Hacktivists, Anyone that needs unfiltered and encrypted Internet access on the go, Individuals with good carrier service coverage in their area but no Cable Internet or
Satellite Internet providers, Individuals that are unable to pay for Cable Internet or Satellite Internet, Individuals which live in the middle of no where with no
Cable Internet or Satellite Internet providers but could have good carrier service coverage in that area, Anonyone that needs to be anonymous, etc.
Now, before you start thinking: "How can you be anonymous with a cell phone Internet, hurrdurr can't they Triangulate you derp this is ENTRAPMENT HURRRR DURRRRR"
Well I suggest you give it some more thought before you start going full retard and do some more research on how carrier networks actually work before thinking such
retarded things.
Now, if you want full anonymity the first thing that is absolutely required is that you purchase a smart phone outright with cash and you must activate it with
all false information, such as a fake name, fake address, etc. Never give them your real information or SSN or anything. Make sure you purchase prepaid service and
make sure you do your research on the coverage of the service provider that you intend to get. T-Mobile for example now offers "unlimited 4G LTE" for $50 per month,
but there's always a catch, they claim that you get unlimited bandwidth but they will cap you at 10 Gigabtyes and then throttle you to high speed 3G after that on
this specific tier plan with their service, however with this guide and with T-Mobile specifically you will be shown how to receive truly unlimited 4G LTE at max speeds
100% of the time.
We advocate that you acquire the cell phone for free with our TeamBerserk made fraudulent coupons. If you're a member of TeamBerserk you will have already acquired these
with the #opNewBlood 2.0 Encrypted Package. Current coupons allow for acquiring for free: Any T-Mobile brand phone, unlocked phones for any SIM-type carrier service provider.
Unfortunately you shouldn't card a cell phone and then pick it up at your drop point(s), because it's too risky to use a phone that was carded unless it's going to be a burner phone.
So remember to activate the phone and phone service anonymously either with cash and false identity information or for free and with false identity information.
Once you're actually using this service it's not really necessary to use a VPN on top of this layer, but using a VPN will definitely add an additional layer of security and anonymity to your
activites. Naturally you're going to be hacking web servers and boxes across the Internet and even if anyone gets your IP address or your IP address from this carrier service is logged
somewhere, it doesn't matter! Why ? Because the IP address that you are assigned at any given moment is shared among thousands of other cell phone users! They couldn't possibly
round down the IMEI number that was assigned to the IP address that hacked some web server! Because all of your transmissions are encrypted! And even if they did somehow round it
down to your IMEI number ( which would be impossible ), what are they going to do? Go arrest some guy named: Robert Fagot at address: 69 Faggot Way!? very, very unlikely indeed.
And if you ever need to change your IP address at any time you simply need to turn on airplane mode so it forces the radio off and then turn it back on again and bam! You get a fresh, new IP instantly!
With this system you can never be DoSd, booted or directly hacked either because you're behind a dedicated system and Cell Phone Tower!
Another requirement of this guide is that you completed all of the Windows OS guides that we made for security hardening, ricing, etc. Whether you're running
a different Operating System which the Windows 8/8.1 guides are for or not, you can still use those methods. Make sure you are running PeerBlock and DNSCrypt and
make sure that your network adapter DNS is configured for Google's DNS Servers @ 8.8.8.8, 8.8.4.4. So you're forward DNS Servers are set for OpenDNS DNSCrypt Servers
and the reverse DNS Servers are pointed to Google's DNS Servers -- You don't have to use Google's DNS Servers, you can use whatever DNS Servers you want.
So, let's begin!
---------------------------------------------------------------------------------------
Tethering Restriction Bypass:
(01): - If you paid for the $50 Tier Service with T-Mobile by default they allocate you 2.5 GB of tethering bandwidth and there is infact a wireless tethering application
that comes with all newer T-Mobile phones. If you didn't pay for the $50 Tier Service and they block your tether don't worry about that because the later steps of this
will still allow for you to tether for free. If you don't have the built in wireless tethering application you will need to root your phone and install a wireless tethering application.
T-Mobile ( and many other carrier service providers ) can only detect if you're tethering and block it by sniffing the browser User-Agent String for standard TCP ( and now UDP ) connections.
So all you have to do is download User-Agent Switcher Add-On if you're using FireFox or Chrome Web Browser and then change the User-Agent to any User-Agent with the word "Linux" in it.
If you're already using some Linux-Distribution you won't have to do that, but if you're on Windows OS you will and that's the first step.
---------------------------------------------------------------------------------------
Blocking DNS Sniffing/Routing:
(02): - T-Mobile will attempt to hijack your DNS and route all your queries through their DNS. These DNS IP Addresses will be different based on your location. You can get the DNS IP Addresses from
your PeerBlock log or use WireShark to monitor where your packets are going ( make sure you run WireShark with no other applications running ) Once you have the T-Mobile DNS you can then
block that IP and IP Range in your Firewall Tables Rules. Block All Protocols on All Local IP Addresses from Sending or Receiving any Data to that IP Range.
Do a WhoIS on the IP to verify that it belongs to T-Mobile Networks. Do a tracert command ( Trace Route ) from your command line interface to google.com --
Command: tracert google.com
And you will find that your raw route after doing the previous configurations will route from your local IP and outward through a few dedicated boxes with LAN addresses and then out to google.com
---------------------------------------------------------------------------------------
Blocking Packet Sniffing:
(03): - Now that you have blocked the T-Mobile DNS and you have Encrypted your DNS with DNSCrypt, Changed your User-Agent String and verified that your connections are being routed through the dedicated boxes
you're almost done. T-Mobile will now try to sniff your packets usually only the TCP and UDP protocols, and they do this for various reasons: They want to know if you are using BitTorrent, exceeding bandwidth limitations,
they also try to log your Internet activity so they can target you for advertisements and sell those logs to third-parties for additional profit at your expense. They also block certain websites and networks.
You can block their sniffing by encrypting all of your TCP and UDP transmissions by using ToR - Expert from the command line and then route your TCP and UDP Application Connections through that or a much faster and reliable
method is to simply use a Free VPN Service and use OpenVPN with that VPN Services Certificates. Once you have encrypted the transmissions that are using these protocols you won't need to use the User-Agent switcher any longer.
Even though most Free VPN Services are logged they still can't get you for any illegal activity because your service is prepaid with all falsified identity information attached to it.
---------------------------------------------------------------------------------------
Unblocking BitTorrent:
(04): - Although you can Torrent while on the VPN it won't necessarly be as fast as it could be, so if you want to Torrent at maximum speeds ( usually around 5 megabytes per second since T-Mobile advertises: "Up to 50 MBits/p/s! DURR!"
Of course a bit is not a byte :P when they say it's 50 megabits per second, that's a little trick on their advertising so it's going to be 10x lower which is 5 megabytes per second which is actually still pretty decent. You can still-
game on that, download your movies, music, pc games, etc. and do whatever you need to do. So you should instead use qBitTorrent which is a fantastic BitTorrent application which gives you the option to randomize the port it uses on each start up and it also enables you to Encrypt
the torrent traffic so the ISP/Carrier Service doesn't know what you're doing and therefor it can never be blocked or throttled :D
---------------------------------------------------------------------------------------
Potential Attack Vectors:
(05): - Even though you are pretty much protected from any DoS attacks, direct hacking attempts, Doxing attempts, etc by being beind a dedicated system and cell tower with all falsified identity information it is still possible to get into quarrels with enemy groups or enemies of any kind which will attempt
to social engineer you into joining their communications servers or instant messaging etc or any method which would require you to download their malware etc, or get you into a chat that they control or they could have a exploit for TeamSpeak, Pidgin etc and they
could then get a remote shell on your system if that Application that you are running is vulnerable to such an exploit. So just use your head and you'll be perfectly ok. Unfortunately as useful as TeamSpeak and Pidgin are for communications they are very vulnerable to
arbitray code execution as in if someone social engineers you into joining their TS3 box and they get your IP and even if all your ports are closed etc, since you are connected into their box or you are connected to them by those means it is still possible for them
to exploit those vulnerabilities in those applications and get a remote shell on your box where they can then issue commands directly to your Operating System and fuck up your box. So be careful and use your head.
---------------------------------------------------------------------------------------
Congratulations you are untouchable!
And remember folks, if you ever encounter a Federal Agent or Intelligence Agent, don't run, disinform them to hell and back and troll hard!