User Controls

Pimp my network

  1. #21
    https://en.m.wikipedia.org/wiki/Satellite_Internet_access My network gets unlimited uptime Yo network gets DDOS downtime My network on space ships Yo network underground with worm shit My network uses high power lasers Yo network look like IBM punch cards https://en.m.wikipedia.org/wiki/Free-space_optical_communication
  2. #22
    EasyDoesIt Tuskegee Airman
    https://en.m.wikipedia.org/wiki/Satellite_Internet_access My network gets unlimited uptime Yo network gets DDOS downtime My network on space ships Yo network underground with worm shit My network uses high power lasers Yo network look like IBM punch cards https://en.m.wikipedia.org/wiki/Free-space_optical_communication

    Do you ever write anything that isn't fucking completely stupid?
  3. #23
    Do you ever write anything that isn't fucking completely stupid?
    Lol trolled grwak was cock mate haha got your fu king goat son u mad
  4. #24
    So the first thing you have to ask yourself is what is my threat model

    This is the step almost everyone forgets and then they dive right in with over 9000 layers of encryption and 40 VPNs + Tor + proxychains etc.

    Most people don't need anything beyond a few browser extensions and a lesson in how not to be an idiot online

    It sounds like your wireless network is secure enough, and if you want to demo a MITM attack, look into ettercap

    The Tor browser is still the gold standard for anonymous web browsing, but make sure you're running it on linux with scripts disabled

    Freenet is a pile of shit with major security problems, and if you're using it for anything shady, the only reason you haven't been caught yet is because nobody cares about the ~10,000 pedos that make up its entire userbase. Seriously, using freenet is like waving a giant flag to your ISP saying "HEY LOOK AT ME I'M DOWNLOADING CP COME AND GET ME"
  5. #25
    EasyDoesIt Tuskegee Airman
    So the first thing you have to ask yourself is what is my threat model

    This is the step almost everyone forgets and then they dive right in with over 9000 layers of encryption and 40 VPNs + Tor + proxychains etc.

    Most people don't need anything beyond a few browser extensions and a lesson in how not to be an idiot online

    It sounds like your wireless network is secure enough, and if you want to demo a MITM attack, look into ettercap

    The Tor browser is still the gold standard for anonymous web browsing, but make sure you're running it on linux with scripts disabled

    Freenet is a pile of shit with major security problems, and if you're using it for anything shady, the only reason you haven't been caught yet is because nobody cares about the ~10,000 pedos that make up its entire userbase. Seriously, using freenet is like waving a giant flag to your ISP saying "HEY LOOK AT ME I'M DOWNLOADING CP COME AND GET ME"


    Good to know.

    I just started using TOR right whenever the browser bundle was compromised. I was always hesitant about doing so though because I was always certain your ISP could see all your data was encrypted and it would give them a reason to start focusing on you.

    I just want my shit private.
  6. #26
    LiquidIce Houston
    One thing that's always in the back of my mind is that there's just so much shit going on now. You know, the whole thing about a single stupid UDP packet going over in the clear and your whole security infrastructure failing cause of that (wasn't this how a lot of vpn users were tracked? a udp packet?).

    If I were just telneting placed, sure, easy fucking peasy. But a web browser? You get your usual xhr stuff - sure that's old, but then you got all this new stuff like websockets, webrtc, dns-prefetch 'n all. Unless you're willing to put in that 20-50 hours of reading through all the shit out there and making sure non of it (nor it's implementation in a specific browser) won't betray you, how can you be sure?
  7. #27
    EasyDoesIt Tuskegee Airman
    One thing that's always in the back of my mind is that there's just so much shit going on now. You know, the whole thing about a single stupid UDP packet going over in the clear and your whole security infrastructure failing cause of that (wasn't this how a lot of vpn users were tracked? a udp packet?).

    If I were just telneting placed, sure, easy fucking peasy. But a web browser? You get your usual xhr stuff - sure that's old, but then you got all this new stuff like websockets, webrtc, dns-prefetch 'n all. Unless you're willing to put in that 20-50 hours of reading through all the shit out there and making sure non of it (nor it's implementation in a specific browser) won't betray you, how can you be sure?

    That's the kind of stuff that keeps me awake at night.

    The reality is, if your network is compromised, you can revamp it and still possibly have everything infected. Someone can keep you under surveillance for something you did six months ago. I mean, it doesn't take a genius to run Kali and crack WPA anymore. It's a game of unfalsifiable hypotheses.
  8. #28
    LiquidIce Houston
    That's the kind of stuff that keeps me awake at night.

    The reality is, if your network is compromised, you can revamp it and still possibly have everything infected. Someone can keep you under surveillance for something you did six months ago. I mean, it doesn't take a genius to run Kali and crack WPA anymore. It's a game of unfalsifiable hypotheses.

    Yeah, especially if it needs just one stupid packet, one stupid "weather notification service" or whatever the fuck and boom, it's recorded somewhere so someone can tied it back to you like 12 months later. I think it's still fairly costly to do this, but moore's law etc.

    I was messing around with nmap recently I found out that my ISP-provided modem-router has open ports 80 and 21 on the outside interface, and only port 80 on the inside one. What the flying fuck? I remember scanning the inside interface and found it satisfactory, then by chance I scanned the other one and fuck, great, how do I change this - oh, I can't, cause proprietary router software, what the fuck? Gonna figure this one out this weekend. Oh, the cherry on top is that I have ipv6 on my local network, but my ISP doesn't do ipv6. I mean, what the shit?
  9. #29
    Sophie Pedophile Tech Support
    Yeah, especially if it needs just one stupid packet, one stupid "weather notification service" or whatever the fuck and boom, it's recorded somewhere so someone can tied it back to you like 12 months later. I think it's still fairly costly to do this, but moore's law etc.

    I was messing around with nmap recently I found out that my ISP-provided modem-router has open ports 80 and 21 on the outside interface, and only port 80 on the inside one. What the flying fuck? I remember scanning the inside interface and found it satisfactory, then by chance I scanned the other one and fuck, great, how do I change this - oh, I can't, cause proprietary router software, what the fuck? Gonna figure this one out this weekend. Oh, the cherry on top is that I have ipv6 on my local network, but my ISP doesn't do ipv6. I mean, what the shit?

    Lol when i switched ISP's recently i got the same shit. Scanned the outer part poof port 21 open what the actual fuck.
  10. #30
    EasyDoesIt Tuskegee Airman
    Yeah, especially if it needs just one stupid packet, one stupid "weather notification service" or whatever the fuck and boom, it's recorded somewhere so someone can tied it back to you like 12 months later. I think it's still fairly costly to do this, but moore's law etc.

    I was messing around with nmap recently I found out that my ISP-provided modem-router has open ports 80 and 21 on the outside interface, and only port 80 on the inside one. What the flying fuck? I remember scanning the inside interface and found it satisfactory, then by chance I scanned the other one and fuck, great, how do I change this - oh, I can't, cause proprietary router software, what the fuck? Gonna figure this one out this weekend. Oh, the cherry on top is that I have ipv6 on my local network, but my ISP doesn't do ipv6. I mean, what the shit?

    I never use ISP provided Routers. Honestly it's usually cheaper to just buy your own.

    Also, that sounds really awful. Let's just face it that we in the US have no privacy anymore.
  11. #31
    Sophie Pedophile Tech Support
    We need to drup akware on the routhermto hsve ut sdt eyr
  12. #32
    EasyDoesIt Tuskegee Airman
    We need to drup akware on the routhermto hsve ut sdt eyr

    You alright man?
  13. #33
    aldra JIDF Controlled Opposition
    didn't read whole thread yet but on the topic of truecrypt and veracrypt-

    veracrypt is built on truecrypt's core source, so any inherent issues with truecrypt are also likely to be present in veracrypt.

    there have never been any actual faults or backdoors found in truecrypt, it's all just speculation from people who aren't qualified to do so. a 30k code audit was performed and it found nothing suspicious, just messy and inefficient code likely written by a single person.

    the reason it was abandoned was most likely due to the author not wanting to deal with the stress of people trying to track them down and the constant swipes at their/truecrypt's integrity - there's no reason to believe anything untoward was going on.
  14. #34
    EasyDoesIt Tuskegee Airman
    didn't read whole thread yet but on the topic of truecrypt and veracrypt-

    veracrypt is built on truecrypt's core source, so any inherent issues with truecrypt are also likely to be present in veracrypt.

    there have never been any actual faults or backdoors found in truecrypt, it's all just speculation from people who aren't qualified to do so. a 30k code audit was performed and it found nothing suspicious, just messy and inefficient code likely written by a single person.

    the reason it was abandoned was most likely due to the author not wanting to deal with the stress of people trying to track them down and the constant swipes at their/truecrypt's integrity - there's no reason to believe anything untoward was going on.

    I use LUKS anyway.
  15. #35
    aldra JIDF Controlled Opposition
    me too, cross-platform compatibility isn't great if you need to load containers in Windows though.
  16. #36
    Sophie Pedophile Tech Support
    You alright man?

    Lol, i don't even remember making that post i was probably high, sorry lol.
  17. #37
    EasyDoesIt Tuskegee Airman
    Lol, i don't even remember making that post i was probably high, sorry lol.

    Lol I figured.
Jump to Top