Anon Archived Serious thread: infosec, opsec, guerrilla war, advice (8chan)
submitted ago by 2980539?
Posted by: 2980539?
Posting time: 1.9 years ago on
Last edit time: never edited.
Archived on: 4/19/2019 10:00:00 AM
Views: 308
SCP: 1
1 upvotes, 0 downvotes (100% upvoted it)
Anon Archived Serious thread: infosec, opsec, guerrilla war, advice (8chan)
submitted ago by 2980539?
view the rest of the comments →
[–] 16916220? ago
>>11699120
Bad intel to some extent, because you do not make it clear the government already has extensive coverage of those who it wants coverage of.
Case in point - I am a minor player online, though many here would have heard of me. They pick up my keystrokes as a type, and I have a real time monitor somewhere (and more). How I am not sure, I'd assume they got into my system through the provider using established backdoors. So I can use TOR, but I assume they are pulling data some other way. If you are genuinely a threat to the machine, they will find you wholly outside your use ot TOR and get on you by going around it. Even if your computer security were perfect, they would put Cameras in to grab screen shots.
I'm not saying not to use TOR, but you shouldn't create an image that defeating the machine is an easy, or even necessarily controllable endeavor. There is a ton of coverage on multiple levels, from social circle analysis, phone record monitoring, to probably a limited in-person level that actually has human reviews of everyone at some point in their lives.
And knowing how the world works somewhat, I would assume they pick up TOR traffic profiles at the point of entry (every company is comped), and if you use TOR you get in person coverage to figure out what your deal is, and what you are up to.
Check out the Tom Bauerle story to see what is out there, and what they are using. The Machine has stuff even the Navy SEALs wouldn't believe is out there.
[–] 16916224? ago
TOR is compromised from the start. It was literally made by the US government. It's an agency asset. Shills want you to use something that has built-in monitoring. TOR is not a good product.
[–] 16916242? ago
>>12817669
spotted the FEDniggers
see
>>12621541
The federal government uses CP as a nuclear social control weapon against those that oppose it. The FBI hosts more child porn on honeypot sites than you could imagine, hundreds of terrabytes worth of content. Pedophiles are actively recruited to work within federal agencies to help plant evidence or sabotage individuals that step around the norms of society ( notoriously imageboards, obscure forums etc ). For reference TOR is blocked on the majority of imageboards due to the fact agents spam CP to take down sites they're ordered to eliminate through the legal process, while doing this they actively discredit TOR to being associated with child pornography and being "compromised" "unsecure" or claim "the nodes are all controlled by the FBI", in reality the government takes full advantage of TORs anonymity to scare off people who otherwise would use anonymous communication services. This in turn is taking out two birds with one stone for them. As the node pool shrinks due to less users trusting TOR, it makes it easier for the government to find the source IP behind wrongthink opinions or illegal (often drugs/weapons/books) posted on the clearnet.
[–] 16916225? ago
Literally this.
Same with Tails.
Although ultimately it doesn't matter what OS or software you use when the hardware comes with hidden partitions and backdoor ROMs which save input from the screen-readers/keyloggers that are no doubt bundled in the firmware.
Also, being the only person within 1000 miles without the same normie online signatures as everyone else around you just makes you more noticeable. Best you can hope for is plausible deniability via obfuscation but if what you're doing is actually important then using random linux distros and ip hopping is just buying you time by making a few nsa cucks work harder.
[–] 16916221? ago
You need to be more specific otherwise you are just fearmongering.
[–] 16925191? ago
>>11699120
What specifics? Look up TIPS Program on Wiki. And grasp that 1 in 24 citizen informants/spies was the pilot program. The full thing is much bigger. Everyone gets looked at in person now, so if you are on /pol, they know outside of checking IPs on /pol's servers or cracking your VPN. And they have a very detailed pic of who you are.
Don's stop digging and meming, but begin understanding the extent of the coverage that is everywhere 24/7, and figure out how to get off grid and away from it, and then have a plan to get to Russia, becasue if they take down the West, dissidents will be dealt with. China, Japan, and most of Europe are all comped, and (((Their))) operations operate there unimpeded. Russia is literally the only safe zone I see.
We may get away this time, becasue (((They))) have very serious problems with Trump. But if Trump fails, or falls, I have seen the machine first hand. The shit above is not going to defeat (((Them))). They have space-age tech and unbeleiveable manpower.
Again, if you want to see what can be rolled out against you, look up "Tom Bauerle surveillance."