Build a Ghost Untraceable Laptop: Ultimate Guide to Online Anonymity and Privacy! DIY

Поделиться
HTML-код
  • Опубликовано: 4 фев 2025

Комментарии • 888

  • @mikesmith9972
    @mikesmith9972 3 месяца назад +2489

    It's sad that nowadays just wanting to have privacy is somehow seen as doing something wrong. This is nothing you should be ashamed of simply because you have right to be secured in your articles and belongings.
    Great video.

    • @goobabooba1665
      @goobabooba1665 3 месяца назад

      Yeah, and use cash only. Unregistered SIM cards, fake IDs, multiple passports with different names🙃. Yeah bro privacy for sure. That’s why Feds are suspicious. Why would you be private if you have nothing to hide mentality.

    • @Promptshot
      @Promptshot 2 месяца назад +71

      If you’re goin to this length you are clearly hiding something.

    • @budderman3rd
      @budderman3rd 2 месяца назад +254

      ​@@PromptshotSilence FED!

    • @cube22111
      @cube22111 2 месяца назад +18

      @@budderman3rd lul he’s not wrong

    • @amoththatthinks
      @amoththatthinks 2 месяца назад

      @@cube22111 silence FED

  • @frankiewalnuts
    @frankiewalnuts Месяц назад +998

    Technically you can still pull off the ram depending on the time... CIA have pulled data of ram before... To be 100% secure you need to cycle the ram so it writes back over... secondly it's not a ghost computer because it still has a physical MAC address, so can be tied to activity online. The next stage is to rip the wifi and rip the lan out of the laptop then use a USB wifi or lan that will allow you to spoof the mac address and leave the original mac address in the machine which is what they will look for to tie it to online activity.

    • @GhostStrats
      @GhostStrats  Месяц назад +257

      Thank you

    • @nightblade178
      @nightblade178 Месяц назад +45

      yea i remember reading something like this. RAM can still be used to extract data

    • @kaspaking1
      @kaspaking1 Месяц назад +23

      @@GhostStrats you know nothing lmfao

    • @dbffbbfs
      @dbffbbfs Месяц назад +19

      I was going to say, I’ve ripped data off RAM before. This is far from stealth

    • @frankiewalnuts
      @frankiewalnuts Месяц назад

      @@dbffbbfs You would need to write a program that writes garbage data to the ram on shutdown... Or run memtest on the ram before shutting down... depends how illegal your activities are or how likely you are to be compromised... I used to use truecrypt years ago until they suddenly vanished... I had 128 bit and 256 bit encryption on drives which were impossible to crack... turns out the CIA cracked some truecrypt drives that were used by like some serious people... I'm no longer in a situation where I need this sort of protection anymore... But back in the day I had everything, dummy jpgs with hidden data in them, dummy system files which were actually complete drives with windows loaded on but only looked like 1bit sys files in windows... I was in deep lol

  • @Crogon
    @Crogon 2 месяца назад +499

    "I do not condone legal activity."
    Now that's one bold statement, right there.

    • @nye563
      @nye563 Месяц назад +15

      couldnt believe my eyes when i saw it

    • @MarcxX99
      @MarcxX99 Месяц назад +10

      He had to cut the “I” out of the word because of demonitization rules

    • @asher05
      @asher05 Месяц назад +6

      "Woa thats a lot of words... too bad im not reading em" lmao

    • @anothercoolchannel4528
      @anothercoolchannel4528 10 дней назад

      😂

  • @stray8468
    @stray8468 3 месяца назад +486

    I think what you are best at is showing the hardware side of cyber security, keep that up, I love the style you have with the glow in the dark, looks really neat.

  • @anglerfish61
    @anglerfish61 2 месяца назад +747

    well well well, the 15 laptops I have laying around collecting dust are here for a reason

    • @GhostStrats
      @GhostStrats  2 месяца назад +67

      YES!!!

    • @anglerfish61
      @anglerfish61 2 месяца назад +29

      @@GhostStrats I have a question though. You say nothing is stored on the device but Im guessing this doesnt include hardware unique identifiers like a CPU cause they (im guessing) are stored in the same place where the BIOS is stored? This could technically mean you could be identified still, but it would make it a LOT harder?

    • @4ephyyr
      @4ephyyr 2 месяца назад

      ​@@anglerfish61 Your concern for privacy is valid, but a clarification: the BIOS chip (EEPROM) primarily stores the boot order and firmware, not the unique identifiers. These identifiers are stored in dedicated areas on the CPU or RAM and pose less of a privacy risk compared to potential backdoors or malicious code in closed-source BIOS/UEFI firmware. Since these proprietary systems can’t be fully audited, alternatives like LibreBoot or Coreboot offer more privacy, though they lack support for newer hardware. And yes you are right that it could be much more harder to track you in this case.

    • @editingconvience99
      @editingconvience99 2 месяца назад +28

      @@anglerfish61 Wanted to answer you since i didn't see a reply :)
      You raise a valid point. Unique hardware identifiers like the CPU, device IDs, or the information stored in the BIOS can theoretically be used to identify a device. However, these identifiers are typically not accessible or used by everyday applications for tracking users directly. For example, web-based applications generally don't have direct access to low-level hardware identifiers due to the layers of security and privacy safeguards.
      That being said, it is still possible for advanced tracking techniques or targeted attacks to use a combination of such identifiers and other data to attempt to re-identify a device. But, as you mentioned, this makes it significantly more challenging.
      If you're concerned about privacy and tracking, it's always a good idea to stay updated on security practices, use privacy-focused tools, and be mindful of the permissions you grant to applications.
      If you have any specific privacy or security concerns you'd like to discuss further, feel free to ask!
      God cares for you and jesus loves you have a blessed day :)

    • @YourFavoriteHacker8666
      @YourFavoriteHacker8666 2 месяца назад

      @@anglerfish61not after I hardware hack it and modify the strings

  • @jacquesredmond
    @jacquesredmond 3 месяца назад +300

    For those not technically inclined on the hardware side, or those that don't want the hassle of tearing up a laptop, you can do the exact same thing using a THIN CLIENT like the HP T620 or similar thin clients. They don't have a camera or microphone. Obviously not as portable, but the idea is still there, and they only pull 15 watts of power at idle. :)

    • @GhostStrats
      @GhostStrats  3 месяца назад +42

      Very good point!

    • @jacquesredmond
      @jacquesredmond 3 месяца назад +80

      @@GhostStrats Just a suggestion, make a video showing a setup of a thin client, they are dirt cheap on Ebay, RAM is easily upgradable and inexpensive as they usually use SODIMM.
      A second suggestion... for people who aren't hackers, but ARE concerned about privacy, make a video explaining from a "noob" point of view, the differences in stealth OSs, what makes one better than another, how to use TOR safely, again, through the eyes of a new viewer who wants to be safe and anonymous, so it would need to be a step by step tutorial, it might be long or in multiple parts, but it would help a lot of people.
      I have 35 years in IT, I am too tired and in ill health to make videos myself, but it would be great if you ran with it. :)

    • @americanpsyop1364
      @americanpsyop1364 2 месяца назад +2

      @@GhostStrats yours looks alot cooler i bet.

    • @HighVybeTribe
      @HighVybeTribe 2 месяца назад +5

      ​@@jacquesredmondYes excellent recommendation I second this 100%🤠👍

    • @philmchunt4304
      @philmchunt4304 Месяц назад +1

      I agree on both​ points@@jacquesredmond

  • @Frosty_Q-T
    @Frosty_Q-T 3 месяца назад +113

    You know the most loved thing about your content is my brother, is your intuitive way of explaining key information. You are helping all of us grow with you, and your hardware engineering is magnificent. Nothing needs to look good it just needs to work, and in some cases be practical. Damn I almost forgot to mention that it’s nice to snip extra wire incase you wanted to setup a remote device for ta… I mean home security. :)

    • @GhostStrats
      @GhostStrats  3 месяца назад +9

      lol 😂 thank you very much for those kind words. I really appreciate comments like this thank you!!!

    • @YourFavoriteHacker8666
      @YourFavoriteHacker8666 2 месяца назад

      We are not brothers, I’m an only child (adopted)

  • @NeverGiveUpYo
    @NeverGiveUpYo 3 месяца назад +225

    Don't forget about the MAC addresses in the BT/Wifi chipset and similar footprints.

    • @TheTubejunky
      @TheTubejunky 3 месяца назад +77

      DNS leaks, HARDWARE MACS, WIFI TRIAGULATIONS, and ANY networks that the adapter has ALREADY connected to will be a crumb trail! He's trying hard to sound "TECHY"

    • @dseednorwayn47
      @dseednorwayn47 3 месяца назад +29

      He better enabled the MAC spoofing choice in Tails

    • @HellsingGhrey-ht2wg
      @HellsingGhrey-ht2wg 3 месяца назад +19

      Your Mac address can be changed.

    • @andrew32155
      @andrew32155 3 месяца назад

      I am concerned that hardware ID's, the permanent MAC or other serialized unique identifiers could still be compromised through low level hardware-layer attacks, or other lower parts of the TCP/IP stack. And just end-run Tails.
      It HAS happened before. And from the perspective of a single individual, even one completely comitted 100% to the pursuit, and with an extremely (unlikely, but playsible) skill level, arguably cannot "know" or contain complete end to end knowledge of security, at all layers.
      Obviously, there's the "best effort" and "good enough" and chasing 100% certainty really means: "Just do nothing and don't even connect online."
      But... if there's any known hardware and chips, or whole devices even that omit uniqe serials & ID's completely that's even better. And ideally the mfg. did it to "be lazy/cheap" rather than "secure/anonymous." Because you can inherently trust that better.
      As I'm thinking of those FBI honeypot ANOM phones, that they deliberately sold as open-source encrypted & secure marketed to criminals. An extreme case & hyperbole, but conveys the idea. Deliberately marketing things to subvert security (theirs) & provide anonymity, is a target for for being compromised at the root. While random "cheap & lazy" omissions of ID & surveillance tech & DRM is at least statistically random.

    • @SilverTester
      @SilverTester 2 месяца назад

      ​@@HellsingGhrey-ht2wgspoofed is not the same as "changed".

  • @heythatmonkeyhasaspoon2636
    @heythatmonkeyhasaspoon2636 2 часа назад

    On most laptops now, that plastic border around the screen has a weird, rough pattern on it.
    That plastic with pattern has a patent, it is patented as "Anti-Stick Plastic" and its sole specific purpose according to the patent is to prevent adhesive tape from sticking to the plastic. It was literally designed to prevent people from being able to tape over their laptop camera.

  • @Sticks-b3j
    @Sticks-b3j Месяц назад +13

    This showed up in my recommended, and I understand nothing, but I find this oddly peaceful

    • @RhynoE28
      @RhynoE28 Месяц назад

      Same. I'm much more suited to physically disappear into the woods or defend myself and not into electronics at all really and it was still recommended to me too. I understand what my wife hears when talking about building race cars. Lmao.

    • @qqqalo
      @qqqalo 2 дня назад

      The guy's trying to sell you something. The whole point is that you shouldn't understand anything, so that you see the guy as some sort of expert, and then you buy whatever he's selling.

  • @baysick6738
    @baysick6738 Месяц назад +1

    Amazing for you to show this how to video. I always wanted more privacy when I travel just in case my laptop gets stolen. The amount of times that has happen is insane. This makes it much better for me to know when I travel. Next travel, I'll set one of these up.

  • @adonian
    @adonian 22 дня назад +3

    I saw this thumbnail and title and thought this was gonna be something else 😂. But for those who don’t know, this IS good info. You’ll definitely want to get rid of the microphone and camera. I use a 1tb t-flash in a usb adapter 👍 for my ghost laptop.

    • @bfapple
      @bfapple 2 дня назад

      Why do you need 1TB for Tails?

    • @adonian
      @adonian 2 дня назад

      @ I’ll admit it is overkill I’ve only used about 64gb 😝

  • @Satoshic_
    @Satoshic_ 2 месяца назад +51

    6:18 "I do not condond **legal** activity " - ahahahhahaha

  • @Ripenr32
    @Ripenr32 23 дня назад +1

    Thank you very much for the information, just getting into Cybersecurity, learning about all the cool gadgets and what not. It's definitely a lot to learn.

  • @Uranone1
    @Uranone1 3 месяца назад +45

    You can also remove the wifi card and buy a separate one, it looks just like a normal usb drive and costs like 15-20 euros.

    • @GhostStrats
      @GhostStrats  3 месяца назад +10

      That’s awesome. Next time I’m gonna have to consider this.

    • @behaviortech1080
      @behaviortech1080 3 месяца назад +4

      Okay this answers my question…the wifi card is going to give you your MAC address right? Also wouldn’t you want to spoof your MAC address?

    • @TheTubejunky
      @TheTubejunky 3 месяца назад +18

      The fact he didn't already know this means he's a noob

    • @djshenanigans731
      @djshenanigans731 3 месяца назад

      @@behaviortech1080 Tails has a built-in startup script that does MAC spoofing but I still would not use any piece of tech that has been touched before in some way or ever connected to anything. You would also wanna by the computer with cash and pay someone homeless or unknown to you to pick it up if you are extremely paranoid. You could also NEVER use it on your home network or any locations near where you live as that's one of the first locations to be investigated

    • @dseednorwayn47
      @dseednorwayn47 3 месяца назад +16

      @@behaviortech1080 Tails comes with MAC spoofing, so as long he has it enabled he should be fine.

  • @umop3plsdn
    @umop3plsdn 2 месяца назад +43

    should put coreboot for bios replacement too theres backdoors in the bios

    • @Saphintosh
      @Saphintosh 23 дня назад +1

      Even UEFI ?

    • @qqqalo
      @qqqalo 2 дня назад

      There's stuff like Intel ME which people have theorized could possibly be used as a backdoor, but there's no evidence of it ever being used in an actual attack.

  • @bluecrocks
    @bluecrocks 22 дня назад

    Your incredible, your expertise is truly respectable.

  • @GhostStrats
    @GhostStrats  Месяц назад

    Follow me on Rumble for exclusive content 😈 rumble.com/register/GhostStrats/

  • @soul-6323
    @soul-6323 2 месяца назад +127

    Didn't get the tracker placed in the CPU as a backdoor for the NSA

    • @incelloner4465
      @incelloner4465 2 месяца назад

      mossad n unit8200

    • @444_balmain4
      @444_balmain4 Месяц назад +4

      Why is no one answering bro

    • @millcosctd
      @millcosctd Месяц назад +2

      And what are their trackers?

    • @soul-6323
      @soul-6323 Месяц назад

      @@millcosctd you need to look into it,i cant explain it all,but intel has a contract with the NSA that allows them to place a back door into all of their cpus,and lets them access almost all computers connected to ethernect,weather it is turned on or not

    • @amiriki
      @amiriki Месяц назад +7

      ​@millcosctd IME in Intel CPUs, supposedly can be abused but I haven't done much research

  • @MeeO.S
    @MeeO.S Месяц назад +1

    Dude you've helped me a lot you have no idea! I've been having trouble staying home. Buy you've peaked my interest! Thanks

  • @securityq5809
    @securityq5809 2 месяца назад +23

    You forgot the thermite! 😂 I remember being this paranoid back in my teens. Privacy has been dead for 12 years, and they already know you are using tails!!

    • @o1-preview
      @o1-preview 23 дня назад

      12 years? more like 50 years, but ok, you are right about tails

  • @SkilledMinded_Futures
    @SkilledMinded_Futures Месяц назад +3

    It will save lives for the next 4 years. For those who know, they will understand this is a gem.
    Have a great day, and Happy Christmas.

  • @Young_Revolutionary
    @Young_Revolutionary Месяц назад +3

    God Bless you Brother 🇺🇸🇺🇸 Nobody realizes it but you are the future. The truth. A real revolutionary. Thank you ⚔️🙏🙏

    • @GhostStrats
      @GhostStrats  Месяц назад +3

      All God my friend I’m just along for the ride. Thank you for your kindness

  • @Pepo..
    @Pepo.. Месяц назад +4

    i was expecting some lazy content with an AI voice and some barebones instructions from chatGPT but this is wayy better, thanks

  • @javabeanz8549
    @javabeanz8549 2 месяца назад +8

    You can usually disable the microphone and camera by unplugging them from the mainboard. You can also buy a cheap WiFi dongle, and use that instead of the internal card. For about $25, you have disposable OS and WiFi.

    • @kaspaking1
      @kaspaking1 Месяц назад

      None of that, does anything. Extra steps for nothing. TAILS is enough. Pull usb, it wipes. You guys are brain dead in this community

  • @santiagovallejo4071
    @santiagovallejo4071 2 месяца назад +40

    maybe you are missing something, the bios chip are completely vulnerable, you might have in this project the coreboot technologies in the bios chip programming. there are some another vulnerabilities in certain board modules too. thanks for the video and greetings from argetina

    • @knrz2562
      @knrz2562 Месяц назад

      Thatsz all hard-coded/programmed,hardware/software!

    • @kuzadupa185
      @kuzadupa185 Месяц назад

      ​@@knrz2562 not the bios

  • @andresdia968
    @andresdia968 Месяц назад +1

    Wow man this is really easy to digest and also great helpful info ..awesome video once again def gained a subscriber 👌💯

  • @donnachacassidy1924
    @donnachacassidy1924 7 дней назад

    You can solder a short into the USB port so that when the USB is pulled the power is cut, wiping the RAM cache

  • @stray8468
    @stray8468 3 месяца назад +39

    hey man, you're gonna be the next network chuck, keep it up, really love your videos, can't believe you don't get more views

    • @fernandoblazin
      @fernandoblazin 3 месяца назад +10

      He will have to push sponsored content and sell coffee

    • @drstewart
      @drstewart 3 месяца назад +5

      Let's hope he can be better, and considerably less cringe with the friggin coffee.

    • @Frosty_Q-T
      @Frosty_Q-T 3 месяца назад +5

      Network chuck… I swear bros a sham

    • @brandonw1604
      @brandonw1604 3 месяца назад

      @@Frosty_Q-T That's the truth

    • @Frosty_Q-T
      @Frosty_Q-T 3 месяца назад +2

      @@brandonw1604 to be real that jerk says a lot of crap that would in turn actually make you noticed and stick out more when trying to clean

  • @beepboop9848
    @beepboop9848 2 месяца назад +10

    There is one issue with this (with tails) where it doesnt flush your V-RAM so whatever is on your screen at the time you eject the USB can possibly be recovered in chunks, so just be aware of that. (unless this is fixed, idk if its outdated but still good to know)

  • @lfpurpose
    @lfpurpose 27 дней назад

    Great video.
    If you got an old laptop with only 4 or 8gb of ram you can also buy ram made for laptops and upgrade it that way.
    I upgraded my old laptop from 8 to 16gb and did something similar on another laptop.
    It's very easy, literally plug and play.

  • @ThereelOfficial
    @ThereelOfficial 14 дней назад +1

    Also, Qubes OS is nice if you really like containers

  • @Wasyock
    @Wasyock 22 дня назад

    I would also remove the battery to reduce the hard shutdown from 10 seconds of pressing the power off key for 1 second by pulling the plug, and store the system on a CD or DVD. The flash drive can theoretically save protocols.

    • @Wasyock
      @Wasyock 22 дня назад

      It would also be nice to turn off the internal Wi-Fi and use the external ones.

  • @AWAKENER77
    @AWAKENER77 2 месяца назад +7

    I have my Alienware m17x Laptop from 2008 and I have tails on it. I paid $2,150 when I first bought it.

  • @noxdraconis3310
    @noxdraconis3310 21 час назад

    Can we appreciate for a moment how wild it is to have state-sponsored hacker influencers?

  • @mikimouse3001
    @mikimouse3001 2 месяца назад +15

    I dont know if youre aware of the Van Eck phreaking which is related to TEMPEST (Telecommunications Electronics Materials Protected from Emanating Spurious Transmissions), where every electronic device that is powered on can by spied upon from a distance using an antenna and special radio receivers revealing whats on the screen of the target. The technique works on pc monitors , old crt tvs, smart tvs(works better), smartphones , SHIELDED usb and hdmi cables (and pretty much any other cable that carries information digital or analogue) and even air gapped machines, and the signal can be received from tens of meters up to hundreds of meters. Scary stuff if you ask me.

    • @steffybael1245
      @steffybael1245 2 месяца назад +1

      ME THINK THAT YOU USE TO OWN A "CONSUMERTRONICS " CATALOG AND READ HIS PAPERS!!!

    • @kingsoloman42
      @kingsoloman42 Месяц назад

      Someone’s doing that to my phone, pissing me off 📱 🤬 😅

  • @KyleFN
    @KyleFN Месяц назад +1

    Neat video, however I would suggest you use old Lenovo laptops (W-class workstations & T-class notebooks) because they have a hardware switch to kill all radios to ensure you're not emitting any RF. Also put TAILS on an SD card and boot to the internal SD card reader rather than have a USB drive sticking out the side.

  • @TheAshGuard
    @TheAshGuard 2 месяца назад +1

    didn't know i needed this until i saw it.

  • @Wolfeinstien
    @Wolfeinstien 20 дней назад

    Very nice, I carry tails os on a jump drive for use

  • @OGMann
    @OGMann 2 месяца назад +1

    SOC. Add the physical components you want. Connect the peripherals you want. They boot off flash, by design. Portable, often with battery power. Etc.

  • @The_Shadow_Broker
    @The_Shadow_Broker 10 дней назад

    The only thing that I can think of that can be compromised is the volatile memory, if one were so inclined, and this is very time sensitive, you can freeze the RAM and extract the data.

  • @enregistreur
    @enregistreur 24 дня назад

    Cool stuff, subscribed ! Thank you

  • @mustafa-hasanrabah3945
    @mustafa-hasanrabah3945 25 дней назад +1

    Awesome video man! Where can we get that flash drive card?

  • @Mistahhhloba
    @Mistahhhloba 4 дня назад

    can you make a detailer guide including the software for the usb?

  • @runifuceeme406
    @runifuceeme406 2 месяца назад +70

    @6:16 DUDE, DONT APOLOGIZE OR MAKE DISCLAIMERS ABOUT PRIVACY.. WE'VE GOTTEN TO THE POINT WHERE GOING THE EXTRA MILE TO ENSURE OUR PRIVACY IS LOOKED AT WITH SCRUTINY LIKE WE'RE UP TO SOMETHING ILLEGAL OR CRIMINAL.. DONT MAKE DISCLAIMERS ABOUT THIS.. TELL PEOPLE TO TAKE THEIR PRIVACY BACK AND BE A STRONG ADVOCATOR FOR PRIVACY RIGHTS..

  • @JamesSmith-v9n
    @JamesSmith-v9n 3 месяца назад +3

    Thank you once again for this educational info and once again I love my Tails

  • @captaindragon8179
    @captaindragon8179 2 месяца назад

    You also HAVE to change the processor bits to disable tracking and storage.

  • @parkerazz4385
    @parkerazz4385 Месяц назад +1

    Now that's something else!

  • @CorEsan
    @CorEsan Месяц назад

    Raspberry Pi's are great too because they are tiny and pretty powerful now. You can use Alfa AWUS036ACHM usb Wifi (most Alpha's will support monitor mode I think) /w macchanger and a micro USB for the disk. For the monitor they make these tiny 7" monitors for them but you can just use headless mode and ssh or vnc to it from your PC/Mac. Be sure to cycle it a few times to clear RAM after use.

  • @diba17
    @diba17 Месяц назад

    calling an hard drive what actually is solid state memory tells me everything I need to know about your competence xD

  • @Anticitizen666
    @Anticitizen666 Месяц назад

    Basically could have done the same thing with the hard drive and camera still in it - if you boot from a "live" Linux image on a USB stick it won't use the hard disk anyway. You can put tape over the camera, ir, if you open the case, just unplug it from the motherboard. As others have said, your MAC address will (usually) uniquely identify a laptop if you use its WiFi. So you should use MAC spoofing, or an Ethernet to WiFi gateway dongle to strip off the laptop's MAC (I've made these - I design PCBs and write embedded firmware for a living). You can also create a linux install that boots from the internal drive, with all partitions mounted as read-only, and uses RAM disks for your home directory, var and tmp, so it's all deleted when powered off. Much faster to boot, and use.

  • @DevilsWings
    @DevilsWings Месяц назад

    I don´t need one but now i want one.

  • @deathcometh61
    @deathcometh61 6 дней назад +1

    Just wondering the mac of the wifi chip are linked to that laptop and your home wifi? Would it be good practice to have a laptop never linked to u?

  • @Sleepyjamal039
    @Sleepyjamal039 2 месяца назад

    I really like it to see your video. I did it before with instructions from other people but if I think like I’m new to this stuff, I would only need this video to do it.

  • @yanipro3978
    @yanipro3978 12 дней назад

    Good vid
    But what about the
    intel managment engine?
    And its AMD counter part?

  • @tulw2728
    @tulw2728 26 дней назад +1

    It looks cool, what’s the name of the bootable flash drives and tails? Tnx

    • @grief_hsw
      @grief_hsw 18 дней назад +1

      you can create a bootable flash drive with a program called rufus and a .iso file of whatever operating system you want

    • @tulw2728
      @tulw2728 18 дней назад

      @
      Thank you

  • @Twtvo
    @Twtvo 18 дней назад

    How can I learn stuff like this like you do?

  • @Brownnoise443
    @Brownnoise443 3 месяца назад +4

    Thought I remember reading that there is a very small window of info when you shut down your computer that ram does save a kinda last state type thing, and if you shut off while say looking at an unsavoury page that is burned in and forensics can find that

    • @behaviortech1080
      @behaviortech1080 3 месяца назад

      RAM stores credentials short term but no memory to view files if logged in? Or no? Sorry just thinking this out loud as well

  • @vickynapane
    @vickynapane 17 дней назад

    lol but the coffee shop has cameras, so do the shops along the same street.. just because you can't see a camera doesn't mean there isn't one. Also, a pi is a good alternative to a laptop, especially if you get a tiny display hat for it

  • @nalali5730
    @nalali5730 Месяц назад +1

    This is soo cool to use but can we do it also in other laptop manufacturers? For example macOs or Lenovo?

  • @moss-ccw7971
    @moss-ccw7971 3 месяца назад +1

    I don't need this, but I think it's pretty cool that it can be done,

  • @jdoublea2023
    @jdoublea2023 26 дней назад

    Hey I love this guide but do you think you could go into more detail as to how you removed the ssd for this particular model ? Most sources I’ve found say it’s not possible

  • @pregorygeck6605
    @pregorygeck6605 9 дней назад

    Should I remove the speakers as well? They can be used as microphone as far as I know. In the context of a ghost laptop.

  • @micc4044
    @micc4044 2 дня назад

    If using a burner phone hotspot to connect to internet is a vpn required/needed on the phone also? Obv it will ne slower but is it needed? Or what else should you do in that situation???

  • @sero1947
    @sero1947 2 месяца назад +2

    before I watch the whole video, I would like to say: regardless of what you take out of the system, if the device doesnt have a core2duo or core2quad, or, is librebooted, none of this really matters. It will protect you from other bad actors, but in the case of the government or law enforcement, none of this will matter. The intel management system will own you regardless if there is a camera, and hard drive or not. The only true system for that acts as a ghost system would be a device such as a thinkpad x200, with a core2duo, with the measures like this.

  • @castilleran9755
    @castilleran9755 Месяц назад

    There will always be that one truly gifted person that will logon to their facebook account through tor 😄

  • @ferencszabo3504
    @ferencszabo3504 2 месяца назад

    You can cut the cable or disconnect the ribbon cable on the MB like normal people do!

  • @Bigrizz69
    @Bigrizz69 Месяц назад

    i guess you could make an makeshift portable display with an old laptop and get a raspery pi with a lot of ram to get a very portable build.

  • @FutureLaugh
    @FutureLaugh 2 месяца назад

    i fully appreciate this content, subscribed 10 seconds into the vid. Love to see privacy vids like this. do you have a degoogled phone video or are we just using prepaid trac phones?

  • @georgewbushcenterforintell147
    @georgewbushcenterforintell147 Месяц назад

    This should be part of your Escape plan to leave the stadium before the 7th inning.

  • @KamiSamaPIANIST
    @KamiSamaPIANIST Месяц назад

    Consider the importance of RAM! It plays a crucial role by storing memory and data efficiently.

  • @pennypoacher6121
    @pennypoacher6121 Месяц назад +1

    ahhh The first amendtment power of the word would.. I found my place.

  • @Ratmilker
    @Ratmilker 2 месяца назад

    What an interesting combo with a 3D printer

  • @saenz404
    @saenz404 2 месяца назад

    it would be great if you talk about how to make a burner phone

  • @KarmaReacts99
    @KarmaReacts99 3 месяца назад +2

    You are underrated ❤

    • @GhostStrats
      @GhostStrats  3 месяца назад +1

      Thank you I really do appreciate stuff like this

    • @KarmaReacts99
      @KarmaReacts99 3 месяца назад +1

      @GhostStrats Will wait for Big Videos 📹

  • @ContaAdministrativo-t1e
    @ContaAdministrativo-t1e Месяц назад +1

    friend, talk about network concepts

  • @SeashellHeadfones
    @SeashellHeadfones 16 дней назад

    What about removing the GPS?

  • @43johnkramer454
    @43johnkramer454 2 месяца назад

    i did the same thing 3 years ago also if you encrypt the main drive you don't have to worry about removing the the ssd or hard drive.

  • @gigoat_chad_boi
    @gigoat_chad_boi 2 месяца назад +42

    A camera / microphone can be practical sometimes, what you could do instead is just instead of cutting a wire, you could for example add a switch to the ground of both of theses components, thus separating them from the computer but they can still be used as needed

    • @93vxhybridhatchback
      @93vxhybridhatchback 2 месяца назад +17

      I think you missed the point.
      TL;DR: if you need a webcam/mic, this setup isn't for you.

    • @tracesmith3572
      @tracesmith3572 2 месяца назад +4

      Point is you don't use your daily driver for this, EVER. If you can't figure out why, pay attention.

    • @earthclad6833
      @earthclad6833 2 месяца назад +5

      Bad opsec

    • @93vxhybridhatchback
      @93vxhybridhatchback 2 месяца назад +3

      @@papastuffy this went over your head. If you're making a laptop like this, you DO NOT use a mic/webcam with it. You use a mic/webcam with your "normal" laptop. There is absolutely no need for a webcam/mic for this setup. That's how people get jammed up

    • @93vxhybridhatchback
      @93vxhybridhatchback 2 месяца назад

      @@papastuffy why delete your other comments?
      Anyways, you're not understanding the point we've all made and the point of this video. This is a ghost/"burner" laptop setup. It is used ONLY for your most secure computer usage. This is in addition to a normal use laptop, so you'd have two.

  • @Maxel-n6f
    @Maxel-n6f 13 дней назад

    it's sad most ppl have forgoten all software is run on hardware, and that they are vulnerable to it.

  • @zayne-t9v
    @zayne-t9v 2 месяца назад

    some things can be saved to either the cpu gpu and even the bios in some cases some advanced viruss can store them selves on those components wich are very tricky to fix so the might be an issue

  • @AndrisZeltins-f4m
    @AndrisZeltins-f4m 16 дней назад

    What about network mac address? The mac addreess is assigned to your network card and btw your isp net address is assigned to your mac. If connect to hotspot your ip address may be different but you can be tracked by mac address next time you connect to internet.

  • @Shopz_Services
    @Shopz_Services 3 месяца назад +2

    awesome video love the channel

  • @DeezelxDr3amz
    @DeezelxDr3amz 3 месяца назад +5

    mwuahaha awesome stuff brother, stay ghost - stay safe :)

    • @GhostStrats
      @GhostStrats  3 месяца назад +3

      Thanks man I appreciate that

  • @carlosbermeo4028
    @carlosbermeo4028 3 месяца назад +3

    Hi but your next video could be about doing a ghost phone or/and a phone that is untraceable smart phone or old phone thanks for it man and you the best

    • @GhostStrats
      @GhostStrats  3 месяца назад +3

      I kinda did already check out the Meshtastic stuff

    • @carlosbermeo4028
      @carlosbermeo4028 3 месяца назад +1

      @@GhostStrats ok I will check that video out

  • @user-xt6bf2dq8t
    @user-xt6bf2dq8t Месяц назад

    Can you create a guide on how to make/where to buy sunglasses that tricks CCTV facial recognition software please?

    • @user-xt6bf2dq8t
      @user-xt6bf2dq8t Месяц назад

      I saw someone on Dread selling these sunglasses. Just wanted to make sure they're real.

  • @Ford_Falcon
    @Ford_Falcon 28 дней назад

    Im curious how flashdrive operating system isnt serial numbered to 1 ya purchased on flashdrive

  • @Lucabinetti390
    @Lucabinetti390 3 месяца назад

    Just earned a follow love your content keep it going !!!

  • @MeraVena900
    @MeraVena900 Месяц назад

    This video made me subscribe right away…. FUCKEN GREAT!!!!

  • @PedroBackard
    @PedroBackard 24 дня назад

    Any Idea what Vpro can do ;)?

  • @cb_ah_fb
    @cb_ah_fb 3 месяца назад +3

    That is an incredibly cool concept. The first thing that came to my mind was the Framework laptops to "natively" support this - just buy the laptop without internal storage and have a couple of storage expansion slots to boot from, with whatever OS you prefer. Any thoughts on that?

    • @GhostStrats
      @GhostStrats  3 месяца назад +2

      Thank you very much for telling me this. I’m gonna look into framework laptops. And I don’t seem like a good idea, but the whole idea is if it was to get compromised anyway if you were to leave it somewhere, you don’t want anything that has any data to store at all.
      The concept for this device is more or less a burner laptop. It all for educational purposes only this is an experiment that I wanted to try.

    • @cb_ah_fb
      @cb_ah_fb 3 месяца назад

      ​@@GhostStrats If you don't know Framework I would suggest you look into them, it's worthwhile just for the concept behind their laptop.
      Basically you get a configurable laptop with 4 USB-C expansion slots where you can plug in whatever you want (there are already pre-made modules from Framework but I saw some custom one made already). The idea was to have one of the storage expansion module be the bootable drive with Tails, Kali or any other OS all self-contained just like in the USB stick used in this experiment, with no other storage at all in the laptop.
      Without that expansion module it would basically be a burner laptop, with the additional benefit of having bigger (this is arguably not a benefit) and faster storage while also being able to also use the laptop as a "normal" laptop, as you can just install Windows (or any other OS you daily drive) in another module and use it when needed.
      TL,DR: you make one module a live OS installation to run just like if it was in a USB stick and another module with a properly installed OS that acts as your daily driver

  • @BrewMaster-betaFish
    @BrewMaster-betaFish 26 дней назад

    What about the mics on the mobo, isbt there a minimum of 3 in every device?

  • @patotraijard
    @patotraijard 2 месяца назад +1

    where did you buy that sd credit card coll thing i want it

  • @maxime22033
    @maxime22033 2 месяца назад +1

    Fyi, speakers can get used as a microphone, look into it

  • @InternetUser-sz6id
    @InternetUser-sz6id 16 дней назад

    What about encrypting your hard drive? How this could be compromised beside of cracking it's pass?

  • @blueyblue859
    @blueyblue859 20 дней назад

    Were do you get the usb card

  • @overclucker
    @overclucker 2 месяца назад

    Swap out the bt/wifi if you've previously used that machine, or if the source of the machine can be traced back to you i.e. you got it from someone you know, or can identify you.

  • @bladeking2013
    @bladeking2013 3 месяца назад

    Can u make a mini phone size version plz

  • @shortthings8160
    @shortthings8160 27 дней назад

    What about a phone specifically androids?

  • @mineyolotv9683
    @mineyolotv9683 Месяц назад

    what abt a riser cable for the ssd replacing the sd card port, so instead of an usb drive(wich is less durable than an ssd) you can use a removeable ssd