Conversation
Notices
-
Embed this notice
BBC interviews a rando britbong about the migrant hotels in Rotherham, UK.
To be honest, I did not expect a guy who looks like to have those kind of opinions.
ctMF47rHRoG4mcJn.mp4
-
Embed this notice
It's kinda strange how the "far right" looks like your average moderate. 😏
-
Embed this notice
>journo plays sad violin music
>other guy doesn't fall for it
Nobody invited them. They are all illegals squatting in someone else's home, they can go back to wherever they came from.
-
Embed this notice
@0 @Terry @Hoss @Nudhul @sapphire I personally believe they can't crack the tor network and he just didn't actually do everything right (it's really hard to do everything right)
-
Embed this notice
@0 @Terry @Hoss @sapphire i remember jersh telling a story of someone downloading cp with tor who was charged by the feds, but the cp guy did all the right stuff to hide where he was. feds still found him and the dude's lawyer said he'll only agree to a plea deal if the feds disclose how they found him. they opted to drop the case instead.
-
Embed this notice
@Nudhul @Terry @Hoss @sapphire Most security is a mix of making yourself a smaller target and not being low hanging fruit; this is not advice on how to avoid the gorgon's stare. This is how to obscure your IP in server logs, much smaller ask.
-
Embed this notice
@Nudhul @Terry @Hoss @sapphire
Shares one of the same errors, but arguably worse because piping all your internet traffic to a singular company isn't hiding in the sense people think it is; which they will find out in quick order if they ever do anything more spicy than pirating movies.
Consider Tor, even Brave's built-in should be fine for hiding one's IP on fedi, and it's free.
-
Embed this notice
@Hoss @Terry @Nudhul @sapphire A VPN is just someone else's computer.
-
Embed this notice
@0 @Terry @Hoss @sapphire "the cloud" scam rebranded huh?
-
Embed this notice
Something you should be using if you're hanging out around these parts.
-
Embed this notice
@Nudhul @Terry big words behind a keyboard and vpn
-
Embed this notice
@sapphire @Terry fucks a vpn
-
Embed this notice
@Terry if ypu're not prepared to suffer for your beliefs then you're not a serious person
-
Embed this notice
@Terry >i disagree with violence
then you're not a serious person
-
Embed this notice
@Nudhul he has to say that otherwise he'll get arrested.
-
Embed this notice
@syzygy @Terry @0 @Hoss @Nudhul @sapphire the only reason they knew him is because they were the ones distributing the 'p
-
Embed this notice
@Nudhul @Terry @0 @Hoss @sapphire
Feds try to be vague on how they deanonymise users because they want to make it seem like they've pwned the network. It's always the most low hanging fruit ever, even then, if they could reliably deanonymise users they would have a large list of people they would go for before the diddlas.
-
Embed this notice
@threat @Terry @0 @syzygy @Hoss @Nudhul @sapphire traffic correlation works if they (eventually) own the destination point, like when they take over a website and have their logs, and they can get your connection time from your isp or vpn provider. or, if they can really tightly correlate the traffic to you, this is how bomb threats at universities have been caught, they get federal funding so the feds coerce them to track Tor connections on campus. They see who made a Tor connection the exact second they got a bomb threat email. a lot harder when talking about hidden services. I am not saying they don't have a trick to track connections to hidden services, but so far every case I've seen indicates to me that people made elementary mistakes that got them caught.
-
Embed this notice
@syzygy @Terry @0 @Hoss @Nudhul @sapphire time correlation and 51%++ consensus of exits are about the only way and even then its not likely. everyone who gets got usually has their dick hanging out in the wind
-
Embed this notice
@sun @Terry @0 @syzygy @Hoss @Nudhul @sapphire yes of course but it takes a good bit of resource and manpower to connect the dots. its not like you and i can sit at a coffee shop together and do it
-
Embed this notice
@threat @Terry @0 @syzygy @Hoss @Nudhul @sapphire they aren't tracking every single tor user's traffic, that is probably way too difficult, yeah. but places are probably keeping logs forever of every time you connect to tor. doing it through a vpn just pushes the investigation up one level but running a relay regularly covers your traffic if you don't want that
-
Embed this notice
@Hoss @Terry @0 @syzygy @threat @Nudhul @sapphire they probably did that via DNS logs.
-
Embed this notice
IIRC a bomb threat at a university a few years ago was tracked by checking who accessed Guerillamail on the university Internet over the prior few days.