You can login if you already have an account or register by clicking the button below.
Registering is free and all you need is a username and password. We never ask you for your e-mail.
[–]ArthurEdens0 points
0 points
0 points
(+0|-0)
ago
(edited ago)
Are they located anywhere that aren't honeypots? Most of us are too afraid to hunt dark net sites that could incriminate us by putting cp or cia virus on our computers. That's why most of don't venture that way. Should it be left in the hands of 4chan type hackers? Why isn't it just leaked from the leakers to somewhere more mainstream like twitter or 4chan? Too dangerous?
I wouldn't go looking for them. I'd suggest you research public information to see who looks perverted, and then do very low-risk surveillance, like installing spy cameras.
Should it be left in the hands of 4chan type hackers?
Yes, actual hackers should be the only ones trying to hack into their camera systems and the like.
Why isn't it just leaked from the leakers to somewhere more mainstream like twitter or 4chan?
You have to be very careful about how you leak something like this. TOR, TAILS, maybe a new laptop, and done from a very public internet that won't come back on you.
view the rest of the comments →
[–] HighLevelInsider [S] 0 points 1 point 1 point (+1|-0) ago
There are authentic videos of this kind out there.
They have.
Why do you think I'm here feeding you guys intel?
This is already being acted upon in concrete ways in many places.
It wouldn't take more than perhaps 100 dedicated amateur investigators to shut down widespread elite pedophilia in this country.
[–] ArthurEdens ago (edited ago)
Are they located anywhere that aren't honeypots? Most of us are too afraid to hunt dark net sites that could incriminate us by putting cp or cia virus on our computers. That's why most of don't venture that way. Should it be left in the hands of 4chan type hackers? Why isn't it just leaked from the leakers to somewhere more mainstream like twitter or 4chan? Too dangerous?
[–] HighLevelInsider [S] 0 points 1 point 1 point (+1|-0) ago
I wouldn't go looking for them. I'd suggest you research public information to see who looks perverted, and then do very low-risk surveillance, like installing spy cameras.
Yes, actual hackers should be the only ones trying to hack into their camera systems and the like.
You have to be very careful about how you leak something like this. TOR, TAILS, maybe a new laptop, and done from a very public internet that won't come back on you.