User Controls

Would you be opposed to having a Tor Mirror?

  1. Narc Naturally Camouflaged [connect my yokel-like scolytidae]
    Originally posted by Kev ^ ignorant retard never heard of proxies

    ISPs charge law enforcement $1000 an hour for wiretapping internet traffic of their subscribers who are suspected terrorists, but if the investigation concerns a child, it is free.

    as you can see, looking at images of naked kids makes you way worse than a terrorist. so i ask you again, why the fuck am i still here? hint: the foot fetish kid did not use tor.

    lol @ proxies


    .
  2. Sophie Pedophile Tech Support
    Originally posted by Narc lol @ proxies


    .

    Proxies can be useful though. Especially if you chain them. You can for instance run Tor chained with other proxies to hide the fact you are connecting from the Tor network. If you chain tor through a HTTP proxy server you're running you can use that to run and inspect web traffic through. For when you wanna fuzz a web application or something in a similar vein.
  3. Narc Naturally Camouflaged [connect my yokel-like scolytidae]
    Just buy a second hand smart phone(and/or laptop) off gumtree, or get a stolen one. Go to a different town and befriend a homeless drunk. Buy him beer but give him the cash to buy it. Tell him you're barred from the store so he'll need to go in. Ask him while in there to grab you a new prepay chip and top up. Presto you now have anon internet access. Just avoid cctv whilst acquiring or using it


    .
  4. Daisy chain 100 CGI proxies. Have fun tracing all that back.
  5. Narc Naturally Camouflaged [connect my yokel-like scolytidae]
    Depends if the proxies comply with the pigs. Most do.


    .
  6. Speedy Parker Black Hole
    Originally posted by ⠀⠀⠀⠀⠀⠀ Daisy chain 100 CGI proxies. Have fun tracing all that back.

    1995 called. They want their technology back.
  7. Originally posted by Speedy Parker 1995 called. They want their technology back.

    Old does not directly translate to useless. For example, I have some utils from the '90s which can obfuscate old known viruses and RATs and make them fully undetectable, because the latest virus scanners don't have definitions that old which can detect the obfuscation. There are hundreds of other examples which prove old can be better than new.
  8. Speedy Parker Black Hole
    https://www.ionos.com/digitalguide/server/configuration/httpoxy-behind-the-cgi-vulnerability/
  9. Originally posted by Speedy Parker https://www.ionos.com/digitalguide/server/configuration/httpoxy-behind-the-cgi-vulnerability/

    But hackers on CGI proxies don't care if the data they send a receive is intercepted or manipulated. It doesn't matter.
  10. lockedin Tuskegee Airman
    The author of this post has returned to nothingness
  11. Speedy Parker Black Hole
    Originally posted by ⠀⠀⠀⠀⠀⠀ But hackers on CGI proxies don't care if the data they send a receive is intercepted or manipulated. It doesn't matter.

    Right, because hackers just publish their work in the Times and the Post anyhow.
  12. Originally posted by Speedy Parker Right, because hackers just publish their work in the Times and the Post anyhow.

    If I wanted to post on this site through a CGI proxy, I wouldn't care if the data was intercepted.
  13. Speedy Parker Black Hole
    Originally posted by ⠀⠀⠀⠀⠀⠀ If I wanted to post on this site through a CGI proxy, I wouldn't care if the data was intercepted.

    Raw packets and all?
  14. Originally posted by Speedy Parker Raw packets and all?

    Sure, because those packets would have the IP address of another CGI proxy. I wouldn't care if they have that IP.
  15. Speedy Parker Black Hole
    Originally posted by ⠀⠀⠀⠀⠀⠀ Sure, because those packets would have the IP address of another CGI proxy. I wouldn't care if they have that IP.

    Ok you just run with that
  16. Quick Mix Ready Dark Matter [jealously defalcate my upanishad]
    Raw Packets reminds me of Raw sugar cane packets you get at starbucks
  17. It's easy to get the IP of anyone here. All you have to do is set up an FTP server on your own box and put an image file on there and then link to it here. When the user views the pic, the FTP log shows the IP that downloaded the pic. By repeating the process a few times, and watching who is online every time an IP appears in the FTP log, it can be determined, over time, which username the IP address belongs to.
  18. Quick Mix Ready Dark Matter [jealously defalcate my upanishad]
    Originally posted by ⠀⠀⠀⠀⠀⠀ It's easy to get the IP of anyone here. All you have to do is set up an FTP server on your own box and put an image file on there and then link to it here. When the user views the pic, the FTP log shows the IP that downloaded the pic. By repeating the process a few times, and watching who is online every time an IP appears in the FTP log, it can be determined, over time, which username the IP address belongs to.

    what if they use a Proxy (or 12)
  19. Originally posted by Quick Mix Ready what if they use a Proxy (or 12)

    Then you're only going to find out one of the servers they are using. But there are hundreds of other ways.
  20. Speedy Parker Black Hole
    Originally posted by ⠀⠀⠀⠀⠀⠀ It's easy to get the IP of anyone here. All you have to do is set up an FTP server on your own box and put an image file on there and then link to it here. When the user views the pic, the FTP log shows the IP that downloaded the pic. By repeating the process a few times, and watching who is online every time an IP appears in the FTP log, it can be determined, over time, which username the IP address belongs to.

    Here is my IP

    206.214.226.2

    Bring it bitch.
Jump to Top