Never allow the scammers to connect on any host OS you have.

This should go without saying, but I’ve seen a few people think that it would be okay to let a scammer to connect to the host OS of a cheap machine they don’t care about.

NO! Most scammers are idiots, but there’s a handful that can drop malware on your system that could potentially jump through your router and into your other devices.

If you’re going to do any scambaiting you need a super PC that can run multiple VMs at once.

If you’re going to ruin the scammer’s operation by using multiple instances of remote desktop software, you’ll need to run those other instances of that software on other VMs. Don’t take any chances with these bastards. Even if one of those instances of remote desktop software has you controlling their system, make sure all instances of remote desktop software used for scam baiting are inside of VMs.

And be sure to have a good VPN on your host OS. And set that VPNs killswitch to the most aggressive setting to ensure nothing leaks from a connection timeout between you and the proxy.

Private internet Access is the best one. They’ve proven in multiple courts that they don’t make, save or keep any logs of their user’s activity. They’re a true zero knowledge service.

Nord VPN will also work if you have any issues with PIA, but if you can get PIA to work for you, it’s PIA that you want.

4 Likes