12-05-2015, 12:35 AM
Hello everybody.
Being new here I am not so new to IG and specifically to questions of, er, managing it. Here I’ll try to post an overview of yet unknown length of what I know in the subject. Why here? I’d like everybody interested or - an that’ll be of value indeed - skillful in the matter ask me questions or question my techniques / offer ones of their own. Because even if I know a thing or two about IG-specific techniques, I am still eager to investigate the subject deeper.
Let’s do IG security system first.
IG captures everything you do: when you log in, what device are using and what network you access, what IP are you using, how much likes/follows are getting (that’s kind of obvious) etc. It’s general aim is to create a typical human-like behavioural pattern to check bots against. And when it triggers over an alarming dissimilarity it triggers a flag which may lead to different cons - from a captcha/e-mail/phone verification request up to a temp ban.
I’d plot an imaginary decision tree of IG security net using to decide whether it’s up to ban you or not if I could, but so far I think it uses primarily 2 chains of security checks: network and device chain / your account activity.
On the network and device. First things first: it seems IG implements an elitist approach towards devices with expensive flagships getting far more credit over cheap chinese crap. Apple is N1 here for sure.
Next, IG concerns a Wi-Fi hazardous - using it, especially public one, will raise questions cause usually IG is accessed over 3G/4G and cause too many accounts on one IP will definitely not be tolerated. It’s therefore ideal to go cellular (with regretful costs to suffer) or even use proxy for extended connection pleasure). For interaction with multiple accounts it’s better to use proxy, and an expensive one is a must - a cheap proxy may surprise you with being already revealed to IGs security with dozens of accounts. At the very least be sure the proxy you choose is used under ‘mixed’ or ‘shared’ access rights for different users (e.g. you use it for IG, other guy for bypassing security filters somewhere but not on IG etc.).
Other way is to harness multitudes of SIM cards - messy I recon. Or is it not? SIM card pools, maybe some student doing it for you? What’s your suggestions?
// question: what’s with your usual dynamic IP at home network? Is it safe to implement numerous router resets to get a clean record?
Typically one proxy is OK for creation of 5-10 accounts, I am not sure on the exact number. One mobile number is also ok for multiple accounts creation and has a ‘cool down’ period after which you may try and use the same number again. At least that’s how it was when I looked at it some time before - I’m not using cellular for my dirty stuff and stick to proxy.
However, you’ll still have to fish out a proper number of mobile numbers and e-mails to verify the accounts - IG will definitely ask you to do it as you show even a hint of activity. Never ignore it, cause you’ll still have to authenticate sooner or later and the sooner the better. Verifying each account is better to be done under the same proxy you used to create it - f*ki*g up smbdy requires all the security there is, so keep you Durex at hand.
Either way, no matter what you chose to create your accounts since you’ve done it properly with all the proofs required. You have a pool of accounts now and eager to start playing.
Be careful though. IG’s paranoic anti-spam police is far from being all cool, because you’ve just managed to create your accounts looking more or less human-like, but your future behaviour is also of great importance. You do not have much space for fooling around - do smth stupid like dishing out 1k follows immediately after registering and you’ll get flagged with some captha or similar bother appearing. Do likewise 2 more times and consider your account dead - once blocked you’ll not be able to recover. If you are stupid enough to engage actively without proper preparations be ready to get all 3 warning in one e-mail.
Pictures for your profiles: be sure IG is capable of reading pics meta. Uploading generic google-bred pic 100 times won’t do. You’d better use some creativity to stock on more unique pics (not spending too much time) and to clean all the metadata - there are tools out there to help you.
The best way to manage your fresh and green pool of accounts is to behave reasonably and to start with uploading some photos to each (5 to 10) and some minor likes-follows here and there for some days (typically around 5) - that’s what a normal person would do, right? Remember to time your actions - 4am is typically not the time for massive liking. 100 likes/a minute also is not humanly enough to get through the net. Ideally you’ll have a week-or-so of warming up at a gradually growing rate of activity after which you may start being serious and allow yourself massive actions.
In the active stage be reasonable and act close to what an IG maniac would be capable of - do not overdo it.
Once done with oppressive actions for any considerable time consider your accounts ‘cooled’. You’ll have to warm them up once again before striking out another time.
Being new here I am not so new to IG and specifically to questions of, er, managing it. Here I’ll try to post an overview of yet unknown length of what I know in the subject. Why here? I’d like everybody interested or - an that’ll be of value indeed - skillful in the matter ask me questions or question my techniques / offer ones of their own. Because even if I know a thing or two about IG-specific techniques, I am still eager to investigate the subject deeper.
Let’s do IG security system first.
IG captures everything you do: when you log in, what device are using and what network you access, what IP are you using, how much likes/follows are getting (that’s kind of obvious) etc. It’s general aim is to create a typical human-like behavioural pattern to check bots against. And when it triggers over an alarming dissimilarity it triggers a flag which may lead to different cons - from a captcha/e-mail/phone verification request up to a temp ban.
I’d plot an imaginary decision tree of IG security net using to decide whether it’s up to ban you or not if I could, but so far I think it uses primarily 2 chains of security checks: network and device chain / your account activity.
On the network and device. First things first: it seems IG implements an elitist approach towards devices with expensive flagships getting far more credit over cheap chinese crap. Apple is N1 here for sure.
Next, IG concerns a Wi-Fi hazardous - using it, especially public one, will raise questions cause usually IG is accessed over 3G/4G and cause too many accounts on one IP will definitely not be tolerated. It’s therefore ideal to go cellular (with regretful costs to suffer) or even use proxy for extended connection pleasure). For interaction with multiple accounts it’s better to use proxy, and an expensive one is a must - a cheap proxy may surprise you with being already revealed to IGs security with dozens of accounts. At the very least be sure the proxy you choose is used under ‘mixed’ or ‘shared’ access rights for different users (e.g. you use it for IG, other guy for bypassing security filters somewhere but not on IG etc.).
Other way is to harness multitudes of SIM cards - messy I recon. Or is it not? SIM card pools, maybe some student doing it for you? What’s your suggestions?
// question: what’s with your usual dynamic IP at home network? Is it safe to implement numerous router resets to get a clean record?
Typically one proxy is OK for creation of 5-10 accounts, I am not sure on the exact number. One mobile number is also ok for multiple accounts creation and has a ‘cool down’ period after which you may try and use the same number again. At least that’s how it was when I looked at it some time before - I’m not using cellular for my dirty stuff and stick to proxy.
However, you’ll still have to fish out a proper number of mobile numbers and e-mails to verify the accounts - IG will definitely ask you to do it as you show even a hint of activity. Never ignore it, cause you’ll still have to authenticate sooner or later and the sooner the better. Verifying each account is better to be done under the same proxy you used to create it - f*ki*g up smbdy requires all the security there is, so keep you Durex at hand.
Either way, no matter what you chose to create your accounts since you’ve done it properly with all the proofs required. You have a pool of accounts now and eager to start playing.
Be careful though. IG’s paranoic anti-spam police is far from being all cool, because you’ve just managed to create your accounts looking more or less human-like, but your future behaviour is also of great importance. You do not have much space for fooling around - do smth stupid like dishing out 1k follows immediately after registering and you’ll get flagged with some captha or similar bother appearing. Do likewise 2 more times and consider your account dead - once blocked you’ll not be able to recover. If you are stupid enough to engage actively without proper preparations be ready to get all 3 warning in one e-mail.
Pictures for your profiles: be sure IG is capable of reading pics meta. Uploading generic google-bred pic 100 times won’t do. You’d better use some creativity to stock on more unique pics (not spending too much time) and to clean all the metadata - there are tools out there to help you.
The best way to manage your fresh and green pool of accounts is to behave reasonably and to start with uploading some photos to each (5 to 10) and some minor likes-follows here and there for some days (typically around 5) - that’s what a normal person would do, right? Remember to time your actions - 4am is typically not the time for massive liking. 100 likes/a minute also is not humanly enough to get through the net. Ideally you’ll have a week-or-so of warming up at a gradually growing rate of activity after which you may start being serious and allow yourself massive actions.
In the active stage be reasonable and act close to what an IG maniac would be capable of - do not overdo it.
Once done with oppressive actions for any considerable time consider your accounts ‘cooled’. You’ll have to warm them up once again before striking out another time.