Pizzagate Subverse Network
/v/AskPizzagate – Pizzagate-related questions
/v/pizzagatewhatever – anything Pizzagate-related
/v/PizzagateMemes – Pizzagate memes
/v/pizzagatemods – meta concerns and Pizzagate moderation discussion
For Newcomers
Submission Rules
See also "subverse best practices"
Policy on linking dangerous research
1: Relevance: Posts must be directly relevant to investigation of Pizzagate: the sexual/physical abuse and/or murder of children by elites, child trafficking organized by elites, and/or cover-up of these activities and/or the protection/assistance provided to the people who engage in said activities. See definition of Pizzagate and examples of relevant posts.
2: Empiricism: EACH factual claim that is not common knowledge must be sourced with a link. If you ask a question: Explain what led to your question and provide sources. If you present opinion/argument, connect your dots and provide sources for them. Avoid baseless speculation. ALL posts must include at least one link.
3: Clarity: All titles must adequately describe post content and must establish direct relevance to pizzagate. EACH link in your post must include a description of content and how the link relates to the post (except when markup is used to embed links in the specific text they support).
4: Meta submissions and general discussion submissions without sources will be removed. Please submit indirectly relevant posts to /v/pizzagatewhatever and unsourced questions to /v/AskPizzagate. Sourced activism / publicity posts and memes are allowed. Posts about the subverse itself go to /v/pizzagatemods.
5: You must label NSFW posts (“Not safe for work”; for example gore, nudity etc.) as such when submitting.
6: No Link Posts -- Only editable submissions made with the "Discuss" button are allowed. "Link" submissions have been banned by the community for the reasons described here. Link posts will be immediately removed.
Adspam, illegal content, and personal info about Voat subscribers will be removed, and the offender will be banned.
Moderator Rules and Removal Explanations
Submission Removal Log
WARNING! Due to the nature of this investigation, clicking some links could result in opening incriminating material. Always practice common sense before clicking links, and make sure you're browsing safely.
Use archive.is to archive sources.
Sort: Top
[–] DumpAcc98320948 ago (edited ago)
Most people don't understand what they read because the article doesn't go into laymen terms and is frankly being alarmist.
FBI operated hidden services that were configured in a way to plant malware onto the victims computer that would phone home with the real IP of that user. So, to be compromised in this way, you must access a HIDDEN SERVICE that is being operated maliciously and employing this NIT technique. Honestly it sounds like Man On The Side Attack.
In the past, it has been other user error that caused the hidden service IP leak, like the user ran javascript or used a bad login portal or something like this. Not from exploiting a flaw in TOR itself.
I don't know of any HIDDEN SERVICE that is being used as part of the pizzagate investigation so most people who use TOR here will be using it to vist clearnet websites. When you use TOR to visit websites that are NOT hidden services, you will need to use an exit node that handles traffic in the clear. This is where hackers/agencies will try to do Man In The Middle attacks, but these are obvious because you will find certificate errors and with modern browsers today they will stop you from carelessly doing dumb shit like accepting fake certificates. TOR and its community regularly hunt and blacklist these malicious exit nodes. I have ran into them before and reported it. You can request new circuit/exit node easily from Tor Browser.
There is NO indication that you are able to be fingered from an exit node so long as you are using HTTPS and checking your certificates.
[–] ThePuppetShow ago (edited ago)
It's most likely impossible to hide form the government if they're looking for you. Just look to the supposed anonymous VPN's for proof. "Privateinternetaccess" claims you can pay with a gift card, but they want you to prove ownership of that gift card. Which, you must reveal your identity to do.
TOR exit nodes have been compromised for a long time because they can see your real IP, if your just using TOR with no VPN. To do things right you need to set up your own VPN and run it like this.. VPN - TOR - VPN What I don't know is if their exploit can still pull you real IP from this, but I doubt it.
Or, find an open wifi in your neighborhood. There's always Starbucks too, just spoof your MAC address to be safe.
[–] DumpAcc98320948 ago
How do TOR exit nodes reveal your IP?
How the FUCK is hosting your own VPN more anonymous? That is the dumbest fucking thing I have ever heard on here.
[–] ThePuppetShow ago
If you control the TOR exit node you can see the real traffic.
Would you like to state why that's "the dumbest fucking thing you've heard on here"?
[–] derram 1 point -1 points 0 points (+0|-1) ago
https://archive.is/W9xiF :
This has been an automated message.