KANGABYTES
Anti-Hacker Jobs

Plans for the Dark Web

    Document Introduction

    This Series & Dataroom - Anti-Hack Jobs

    This document belongs to the dataroom of, Anti-Hack Jobs, of which in turn, belongs to Australian based KangaBytes as the owner and author of all content within this document.

    The Anti-Hack Jobs advisory, is to advise in respect to, how best to protect the data of your customers, from hacking events.

    The use of these tips, requires a license. Please visit the online dataroom at www.kangabytes.tips/pass.html for this information.

    This Document - Plans for the dark web

    This document focues on, matters of which focus on the Dark Web.

    Much of this advisory is, what can be done on the dark web, to mitigate the threat of hacking, by, removing the value of stolen data on the dark web.

    The Dark Web is the area of which everything happens in respect to why, these data thefts happen in the first place.

    FAKE DARKIES - How This Works

    What you do here

    If you have the resources to do so, you need to, set up a fake-data account(s) within the dark web.

    The aim is, for you to, place into your dark web account, fake information. Such as, fake email addresses of which do not work, or, fake account numbers with their fakeside words.

    When there is enough of us, doing this same task, we are sure to swamp the dark web with data of which is just pointless, and, dark buyers will not know where to turn for data of which is worthy of their purchase.

    Fake Darkie - What you do

    The website

    You also need to set up, a social group, of like persons. The Objective of this group is, to talk about the best fake data to write, to ensure that, the trap does get set.

    Fake Darkie - Handy Tips

    Be Prepared

    Always have on hand, a list of fake data, ready to dump at the instant.

    Be ready to act the instant of when a hack on your website/server is detected.

    Ensure Good Connections

    Ensure that, you have yourself in a good group of like persons.

    The meaning of Like Persons, can include, respective owners of a strip of shops, or, business owners who are mates through a golf or social club, and so on.

    All members in this group, MUST, know each other in the physical sense. That is, you must communicate with each other via any means that is not of any electronic means, such as any combination of, email, telephone or social media.

    FURTHERMORE, make sure that, this group, has a strong contact with a member of the police force, especially, one of who has good contacts/connections with cyber security enforcement.

    This is, to ensure that, the police are aware of who you are, and what you are doing.

    Fake Darkie - The Hacker

    The Hacker

    The Data Theif, no longer gets the money of which the theif wants or needs. Due to, the massive price cut of which is now the reality, for stolen data generally.

    No money in crime, no desire to do crime.

    How this impacts on the hacker

    Their own customers, who would be seeking to buy the stolen data, would not want to buy your stolen data, if they do not know which dark web account has the true data or not.

    This will at the least, greatly reduce the market for your stolen data, and in turn, greatly reduce the risk of your true/good-data being stolen in the first place.

    Fake Darkie - Some Risks of Note

    Please Note: The following list of risks may NOT be complete. You are advised by us, to seek your own, independent advice in respect to this.

    Test Attack

    Any hacker, is going to test your data first? Be prepared for such a mass attack on your server.

    Revenge Attacks

    Once a hacker finds out that, this data is all fake, they may seek to take some type of revenge out on you.

    There is no limit as to how this revenge may play out, although, the most likely form will be some type of online attack such as a Denial of Service Attack.

    Footnotes

    ALWAYS do this with the co-operation with, and knowlege of know by trusted authorities.

    Fake Darkie - Cross Notes

    This page contains some tips and hints, around how you may combine this advisory Fake Darkie with other advisory tip(s) elsewhere within this dataroom.

    Trip Accounts

    The most ideal data for you to use with your Fake Darkies is, details of those Trip accounts.

    FAKE SAY - How This Works

    Whenever you experience the theft of data from your database, you need to come out and say, The only data that got stolen, was fake data..

    No matter as to how authentic, of which that stolen data is, you must always make this statement.

    For such a statement to carry any weight, you MUST be known for, your website must have something like the FakeSay system associated with it.

    Fake Say - The Hacker

    Whomever stole your data, the value of that data, is now worthless.

    Any party who may have already purchased that data, are going to be pissed off with the vendor of that same data.

    Fake Say - Cross Tip/System Notes

    You MUST be known for these

    You add quite a bit of weight to your FakeSay claims, when your website is known for having fake data on your website.

    This includes the need for you to implement the FakeSide advisory.

    Fake Say - Some Risks of Note

    Please Note: The following list of risks may NOT be complete. You are advised by us, to seek your own, independent advice in respect to this.

    Any truth to stolen data

    Should you suspect that, any of that data is in fact, true data, then, you MUST advise your respective customers, by at least two means, #1 is via email, and #2, is a banner on your website.

    You may send additional notifications, such as SMS, App, or whatever other means of contact, that you have.

    Prepare for a mass event

    Any such hackers, may try and test this stolen data first. Be prepared for such an attack on your server at any time.

    Must do other tips too

    This advisory will be pointless, unless your website is well known for having the FakeSay advisory, along with other fake data content.