0
0

[–] SoSickInside 0 points 0 points (+0|-0) ago 

I keep hearing about the Tails operating system as well. It's promoted on Wikileaks page, I think or Tor page. Not sure where I saw it.

Any thoughts?

0
0

[–] psmith85 0 points 0 points (+0|-0) ago 

I'd be wary of both Tor and Tails as potential honeypots.

0
0

[–] PizzaThrowaway123 0 points 0 points (+0|-0) ago  (edited ago)

So why has it been used by whistleblowers, pedos, drug dealers and the likes for the past decade or so? I forget who said it, but they said that if your "secure" network is not being used by these types of groups of people, then it is most definitely not secure.

You are doing what is called "concern trolling".

0
0

[–] PizzaThrowaway123 0 points 0 points (+0|-0) ago 

It is better than using nothing, but people have been exposed in the past by not having proper TOR habits and OPSEC in general.

0
0

[–] 13asteroids 0 points 0 points (+0|-0) ago 

I have a question. Is it possible for someone to be spying on my activity as I type depending on the browser I'm using? (I'm using Mozilla). But if I were to use Tor, I wouldn't be able to be spied on? I'm not sure how much or what kind of information the spys would be able to have of my activity. I'm new to this kinda stuff so I'm sorry if these are dumb questions.

0
0

[–] PizzaThrowaway123 0 points 0 points (+0|-0) ago 

I am not up to date with how well popular browsers are sandboxing stuff for protection, but if your PC is compromised then it doesnt matter what browser you use. I experimented with the open-source PUPY remote access trojan (RAT) last year - https://github.com/n1nj4sec/pupy And I realized how powerful in-memory execution really is because at the time no antivirus could detect it, I had to use Volatility and do memory analysis to see that I had been infected.

Any RAT will allow live keylogging,screenshots,etc.

0
0

[–] El_Snapster 0 points 0 points (+0|-0) ago 

I just went to sign up for tweeter and it deleted all my log in info and passwords and it drained and shut off my phone within seconds of accepting their terms of conditions. I made a post about it earlier today.

0
0

[–] IntelligentObserver 0 points 0 points (+0|-0) ago 

With Intelligence powers expanding Dec 1, and supposedly tor and vpn server exit nodes compromised (article i read forgot where) does a vpn really make a difference???

0
0

[–] PizzaGate098-023849 0 points 0 points (+0|-0) ago  (edited ago)

(article i read forgot where)

Nice try.

"It is already compromised, so you might as well not try to protect yourself"

Fuck off troll.

0
0

[–] IntelligentObserver 0 points 0 points (+0|-0) ago 

Dont have to be agressive.. check article and even link to test methodology: https://chloe.re/2015/06/20/a-month-with-badonions/

Article: http://www.scmagazineuk.com/tor-network-exit-nodes-found-to-be-sniffing-passing-traffic/article/423818/

I asked the question because i want to secure my computer but lots of disinformation, compromised telecommunication and servers makes me unsure on which direction to go. Any advice?? Curious to hear ur opinion

0
0

[–] Dataanti 0 points 0 points (+0|-0) ago 

he is not wrong, its rule 41 being passed by the DOJ, anyone using tor or a VPN is automatically put on a watch list sort of thing and they can have their devices confiscated from them without warning, and its a global thing, meaning its not limited to united states.

i will say, researching this stuff doesnt really matter, its posting things that you would have to worry about. if you where to post something use tails on a public wifi, if you are just reading and researching, dont worry about it.