In this cashcardmarket guide, we will discuss the Top 20 major PC / laptop configurations required for your carding success in 2021 .
You should only use your machine for carding purposes, never login with real profiles like Facebook, Instagram, Twitter, Google, etc.
It is advisable to have a separate machine for the carding scene, personal data should be saved separately from illegal data.
Different PC, different hard drives, etc. This is advised not only because of the authorities, but also if you are infected by someone. So the person who wants to harm you only has your card data, but not your photos, address, IDs, etc.
TOP 20 STEPS TO CONFIGURE YOUR MACHINE FOR SUCCESSFUL CARDING IN 2021
# 1 ENCRYPTION
After installing an operating system of your choice, it is essential to encrypt the laptop.
Encryption is the life insurance of all professional scammers. This makes it much more difficult for authorities to investigate you, even during a home search, if not impossible at the best of times.
It is recommended that you use a password that is 30 characters long, but you can usually tell that the longer it is, the harder it will be to crack your encryption.
There is often a discussion of which tool to use for encryption. Since Veracrypt has a proven track record and should always be secure, it is advisable to use it as well.
# 2 PREMIUM VPN
The basic requirements for getting started safely are a VPN subscription with one of the known Premium VPN providers. The monthly price is now only around $ 10 to $ 15 per month.
Everyone’s gone one way or another. 10 dollars is not the end of the world, but if your safety is compromised it could very well be the end of your freedom!
Must see (get cc, log, paypal, western, physical card with balance…. And more): Best CARDING SHOP
Most people swear by Perfect Privacy (PP since 2008) because this provider does not connect according to their own statements, which is corroborated by the fact that there are no known cases of buses at PP that can be attributed to VPN failure. supplier, but do your own research before you decide.
At Perfect Privacy, servers operate via RAM disks, not hard disks. Overall, PP also convinces with its always open communication with customers in the website’s internal forum.
You can find the PP website here : https://perfect-privacy.com
Install the Perfect Privacy client on your computer.
Once done, you need to test if Perfect Privacy’s DNS leak protection is working. You can do this directly on the Perfect Privacy page or here:
# 3 CONFIGURING YOUR BROWSER
The next step is to install the Firefox browser.
Firefox : https://www.mozilla.org/de/firefox/new/
It is usually useful to download directly from the manufacturer’s site.
After installing Firefox, go to the search line above and enter “about: config” . There you change the following settings.
The manual explanation: If you want to surf safely and anonymously with the Firefox browser, you need to change something in the Config file.
To understand what you are doing, you have to read the entire text.
To open the configuration, please type “about: config” and press Enter. After that just find the commands and edit them.
See also: CARDING PAYPAL METHOD OF 2021
# 4 DEACTIVATION OF THE GEOLOCATION API
With the help of the geolocation API, the geographical position of the Internet user can be determined relatively precisely. Depending on the hardware existing in the computer, nearby WiFis can be used or GPS hardware can be used to determine the location.
Still, I have a better feeling if you turn it off completely. To do this, you need to set the following variable under “about: config” :
geo.enabled false geo.wifi.uri (empty string) browser.search.geoip.timeout 1
This setting is important if you are masking your IP address with anonymization services or VPNs.
# 5 DISABLE WEBGL
Fingerprinting Canvas in HTML5 shows that fingerprints via WebGL can be prevented with the following settings:
webgl.disable-extensions true webgl.min_capability_mode true webgl.disable-fail-if-major-performance-caveat true
In addition, WebGL is a (unnecessary) security risk because it allows attacks on the operating system.
By reloading the fonts, bugs in the font rendering libraries can be exploited. This was the case for Linux (CVE-2010-3855), Windows (ms11-087) or OpenBSD (CVE-2013-6462).
WebGL shader engines also have occasional bugs, such as MFSA 2016-53, so we recommend that you disable WebGL completely to reduce the risk:
webgl.disabled = true
# 6 DISABLE WebRTC
WebRTC is a technology that enables direct telephone and video conversations between Internet users in the browser.
Currently, there are few useful applications for this technology and we prefer a specialized program like Jitsi.
If you want to try it out, you can watch Palava.tv or a browser meeting. With WebRTC, you can know the local IP address of the computer on the local network and the public IP address, as a demonstration by D. Roesler shows.
Even VPN connections can be tricked. In addition, the presence of a camera and a microphone can be used as a feature in the browser’s fingerprint.
In Firefox, WebRTC can be disabled under “about: config” :
media.peerconnection.enabled = false loop.enabled = false loop.facebook.enabled = false
# 7 DEACTIVATION OF TIMING APIs
Very precise timing APIs can be misused by web applications to analyze resource loading or user behavior (Timing Attacks on Web Privacy, PDF).
If you are using your browser to read websites and not primarily for games, you should disable APIs:
dom.enable_resource_timing = false dom.enable_user_timing = false dom.enable_performance = false
# 8 DISABLE CLIPBOARD EVENTS
With clipboard events, Firefox informs a web page that the user has copied a section to the clipboard or pasted the contents of the clipboard into a form field.
The oncopy, oncut and onpaste events are triggered to which the web page could react. You can disable these events under “about: config” :
dom.event.clipboardevents.enabled = false
# 9 AUTOMATIC WEBSITES LOADING
Firefox begins to load web pages in certain situations when the mouse pointer is over a link, before you actually click.
This should speed up the loading of web pages by a few milliseconds. If you want to avoid connections with unwanted web servers, you can disable this feature under “about: config” :
network.http.speculative-parallel-limit = 0
# 10 DISABLE WEB IDE
TorProject.org recommends Firefox 38.0 to disable WebIDE under “about: config” for security reasons:
devtools.webide.enabled = false devtools.webide.autoinstallADBHelper = false devtools.webide.autoinstallFxdtAdapters = false
You won’t like anyone to be able to remotely disable or disable anything on your computer. Under “about: config” you can disable this feature:
extensions.blocklist.enabled = false
# 11 DISABLE METADATA UPDATE FOR AD-ONS
Starting with Firefox 4.0, the browser contacts Mozilla’s AMO server daily and sends an exact list of installed add-ons and the time Firefox should start.
In response, the server sends status updates for the installed add-ons.
This feature is independent of checking for updates for add-ons, it is simply an additional data collection from Mozilla. Under “about: config” you can deactivate this function:
extensions.getAddons.cache.enabled = false
# 12 DISABLE BEACONS
I can’t think of a useful app apart from “browsing behavior analysis” (aka tracking). Under “about: config” you can disable this feature:
beacon.enabled = false
# 13 DISABLE SECURE NAVIGATION
Starting with Firefox 34, it is no longer sufficient to deactivate the use of Google’s Safebrowsing database in the settings dialog.
In addition, you should disable the download of the database under “about: config” if you do not want to connect to Google.
browser.safebrowsing.enabled false (until Firefox 49) browser.safebrowsing.phishing.enabled false (from Firefox 50) browser.safebrowsing.malware.enabled false browser.safebrowsing.blockedURIs.enabled false browser.safebrowsing.downloads.enabled false browser.safebrowsing.downloads.remote.enabled false browser.safebrowsing.updateURL (empty string) browser.safebrowsing.appRepURL (empty string, up to FF 45) browser.safebrowsing.downloads.remote.url (empty string, from FF 46)
Against phishing attacks, no technical measures protect completely, but mainly own behavior.
And against malware, regular system updates protect better than antivirus and URL lists.
# 14 DISABLE HEALTH REPORT
The health report is sent to Mozilla, you can deactivate it under “about: config” :
datareporting.healthreport.service.enabled = false datareporting.healthreport.uploadEnabled = false datareporting.policy.dataSubmissionEnabled = false
# 15 DISABLE CUR BEAT EVALUATION
With Firefox 37.0, Mozilla introduced the Heartbeat user rating system. The user must rate Firefox and is occasionally invited to participate in the community.
Mozilla itself has acknowledged that this feature can be annoying:
We understand that any disruption to your internet time can be annoying.
Under “about: config” you can disable the feature by setting the following URL to an empty string:
browser.selfsupport.url = ""
# 16 DISABLE THE WIFI HOTSPOT PORTAL DETECTION
Firefox detects the portal pages of Wi-Fi access points and opens them in a new tab (Release Notes).
For detection of the Wi-Fi Hotspot portal, Firefox contacts the following web page each time it is launched:
Under about: config, you can make Firefox stop this behavior by disabling portal detection (you won’t miss it):
network.captive-portal-service.enabled = false
See also: A GUIDE TO CARDING WESTERN UNION IN 2021
# 17 DISABLE MICROSOFT FAMILY SECURITY
We at cashcardmarket strongly suggest to disable Microsoft Family Safety which is a local man-in-the-middle proxy in Windows 10 that can control access rights to web pages and therefore is by definition a censorship tool.
Starting with Firefox 52, the use of Microsoft Family Safety is enabled by default. With the following option, you can disable the use of Microsoft Family Safety under “about: config” :
security.family_safety.mode = 0
# 18 CHANGE YOUR HARDWARE ID
The hardware ID can be read by programs under certain circumstances, in the worst case it can be used in a comparison against you.
It is therefore recommended to change it as well. For that there is this tool:
The tool is self-explanatory and very easy to use. You start the program, generate a new hardware ID and press the “Change HWID-Button” .
After restarting, the new hardware ID must be set. Whether the changes have become active.
Go to Windows and type in “regedit” and confirm as administrator.
A window will open. Now you need to follow the following path to get the correct file:
Computer - Hkey_Local_Machine - System - CurrentControlset - Control - ID Config DB - Hardware Profiles - 0001
There you will find a file called “HW Profile Guid” . On the right side there is a value.
Modify the last 4 digits of the value.
# 19 DEACTIVATING THE MICROPHONE AND CAMERA
We admit it may sound paranoid. But, if you study RATs a bit, you might understand why cashcardmarket.com recommends it.
If someone infects you, they can have full access to your computer once they are connected to the internet.
This can include access to microphones and cameras. If so, the attacker can theoretically take pictures of you at any time, but they can also activate your microphone.
This is also possible via your smartphone. As long as you don’t need the microphone, we recommend that you turn it off in Device Manager.
With the camera, cashcardmarket is one step ahead. Not only do we disable it, but we also uninstall the corresponding drivers. In addition, we also recorded all of our machine cameras.
In Device Manager, go to “Image Processing or Imaging Device” and uninstall your camera.
# 20 BLUE SCREEN OF DEATH ACTIVATION
It is a combination of keys that you can use to crash your PC and thus re-encrypt your PC. If for some reason state authorities should access your data, you can protect it from the state.
Those who use a stationary PC can use it in the event of an uninvited spontaneous visit to the Blue-Man-Group (Cops) simply switch off immediately via a multiple socket with switch, so that the encrypted system is immediately encrypted again.
For those who use a laptop, however, working without a battery is not the reality and if you are using a case, the laptop should have shut down immediately, a workgroup can quickly access the laptop and keep it “open”.
In this case, it is possible on Windows systems to trigger a Blue Screen of Death at the touch of a key, which immediately crashes the system, thus arming the encryption.
To do this, all you need to do is enter the following registry key with a currently patched computer and enter a DWORD value:
- Go to the registry path
- Enter a new key as DWORD “CrashOnCtrlScroll” (without quotes !!!)
- Enter the value “1” in the newly created key and restart the computer.
After restarting, you just need to press the following key combination in an emergency:
Hold down the right “Ctrl” key and press the “Scroll Lock” key twice .
If you don’t know where the keyboard keys are, just search Google.
After setting this up, you will be happy to see a blue screen of death for the first time.
#BONUS: SET UP A VIRTUALBOX MACHINE
Virtual machines are needed to run carding tools without running them on your system, but also for carding, for example.
If you want to become a professional carder, you can’t do without a VM.
Install VM Workstation or VirtualBox (free) Which variant you choose is up to you, as the products do not differ significantly in quality.
Download the virtual box: https://www.virtualbox.org/
For VB, it is better to use Windows 8 or 10.
To install the VB, you need an .iso image of the selected operating system.