User Controls

Noted jedi Paul Krugman caught downloading CP, takes to Twitter to try to get in front of case

  1. #21
    -SpectraL coward [the spuriously bluish-lilac bushman]
    Plus, too, no amount of defensive software or techniques is going to stop a hardened cracker. And the 0-day exploits are plentiful. People think TOR and CGI and encryption is the end-all in Internet privacy, but to a determined and creative individual, they are really nothing but second-rate deterrents.
  2. #22
    Sophie Pedophile Tech Support
    Originally posted by -SpectraL Plus, too, no amount of defensive software or techniques is going to stop a hardened cracker. And the 0-day exploits are plentiful.

    Indeed. Which is as much true for any system you can come up with.
  3. #23
    Star Trek VI: The Undiscovered Country Dark Matter [my scoffingly uncritical tinning]
    Soph, is being on one of those ISPs, like a mobile phone operator, that have a huge number of users behind one address, sufficient?
  4. #24
    Sophie Pedophile Tech Support
    Originally posted by Star Trek VI: The Undiscovered Country Soph, is being on one of those ISPs, like a mobile phone operator, that have a huge number of users behind one address, sufficient?

    Sufficient in regards to what? Random skids? Or LEA?
  5. #25
    Star Trek VI: The Undiscovered Country Dark Matter [my scoffingly uncritical tinning]
    Preserving privacy.
  6. #26
    Sophie Pedophile Tech Support
    Originally posted by Star Trek VI: The Undiscovered Country Preserving privacy.

    Probably not. Your browser has a particular fingerprint, depending on your OS, addons and even things such as your screen resolution.
  7. #27
    -SpectraL coward [the spuriously bluish-lilac bushman]
    https://en.wikipedia.org/wiki/Device_fingerprint

    https://en.wikipedia.org/wiki/Clock_skew

    https://en.wikipedia.org/wiki/Canvas_fingerprinting

    https://en.wikipedia.org/wiki/Evercookie
  8. #28
    Number13 African Astronaut [dispute my snotty-nosed seagull]
    The only good thing to post on twitter is pictures of cosplayers armpits.
  9. #29
    Sophie Pedophile Tech Support
    Originally posted by Number13 The only good thing to post on twitter is pictures of cosplayers armpits.

    That's uh, very specific.
    The following users say it would be alright if the author of this post didn't die in a fire!
  10. #30
    Number13 African Astronaut [dispute my snotty-nosed seagull]
    Originally posted by Sophie That's uh, very specific.

    Have you seen anything else good on twitter?
  11. #31
    Sophie Pedophile Tech Support
    Originally posted by Number13 Have you seen anything else good on twitter?

    Otaku posters and drawfags are always fun. Plus i follow a couple of cyber security people that post about things i find interesting.
  12. #32
    Number13 African Astronaut [dispute my snotty-nosed seagull]
    Originally posted by Sophie Otaku posters and drawfags are always fun. Plus i follow a couple of cyber security people that post about things i find interesting.

    Otaku's and drawfags also retweet pit pics though, it's a conspiracy.
  13. #33
    Sophie Pedophile Tech Support
    Originally posted by Number13 Otaku's and drawfags also retweet pit pics though, it's a conspiracy.

    Even better.
    The following users say it would be alright if the author of this post didn't die in a fire!
  14. #34
    Originally posted by Sophie Probably not. Your browser has a particular fingerprint, depending on your OS, addons and even things such as your screen resolution.

    also most browser have access to unique device id turned on as default.
  15. #35
    aldra JIDF Controlled Opposition
    Originally posted by Jiggaboo_Johnson I accidentally downloaded 1.4tb of scat porn. I sure hope no one finds out about it.

    Better tell your thousands of Twitter followers before someone else can
    The following users say it would be alright if the author of this post didn't die in a fire!
  16. #36
    Star Trek VI: The Undiscovered Country Dark Matter [my scoffingly uncritical tinning]


    How would you go about putting CP on someone's computer and then getting LEO to investigate anyway? It seems quite difficult to do.
  17. #37
    netstat African Astronaut
    edited for privacy
  18. #38
    Sophie Pedophile Tech Support
    You don't even need root you big dumbs. You could write a piece of javascript that downloads something illegal from somewhere.

    But that's a pretty shitty way. Your run of the mill trojan will already have the capacity to receive data in some way or another by virtue of it having to talk to the command and control server. All the information you need will generally be on someone's computer.

    It isn't even that hard to design a malware specifically to deliver and/or forge evidence. If you do develop such a malware you could even have it delete the evidence sloppily. Then when you report the person anonymously the crime lab will recover the deleted material. And they'll go: Aha! See, he tried to delete it, he must be guilty.
  19. #39
    Originally posted by Sophie You don't even need root you big dumbs. You could write a piece of javascript that downloads something illegal from somewhere.

    But that's a pretty shitty way. Your run of the mill trojan will already have the capacity to receive data in some way or another by virtue of it having to talk to the command and control server. All the information you need will generally be on someone's computer.

    It isn't even that hard to design a malware specifically to deliver and/or forge evidence. If you do develop such a malware you could even have it delete the evidence sloppily. Then when you report the person anonymously the crime lab will recover the deleted material. And they'll go: Aha! See, he tried to delete it, he must be guilty.

    They'd also discover the malware though...
  20. #40
    -SpectraL coward [the spuriously bluish-lilac bushman]
    I'm pretty big on shellcode.
Jump to Top