User Controls

Would you be opposed to having a Tor Mirror?

  1. Speedy Parker Black Hole [my absentmindedly lachrymatory gazania]
    Originally posted by ⠀⠀⠀⠀⠀⠀ That cane should be framed and mounted on the wall.

    With the ice foot I put on it that winter I could use on the bike for jousting.
  2. Quick Mix Ready Dark Matter [jealously defalcate my upanishad]
    t-mobile 5G unlimited MiFi for house only (not really.. but it's bigger than a jetpack) for 50 a month.

    not the best but mid range and a hell of a deal on home internet from 5G towers. theyre all over California now. Midwest too. I havnt bought one. but then again, there is probably a cap. I barely use 50gigs a month at best.
  3. Sophie Pedophile Tech Support
    Originally posted by Speedy Parker You don't pay attention sparky. I was using a cane for about 5 to 6 weeks after I suffered compression fracture to the thoracic region of my spine when I was run into a ditch by a hit and run driver. That happened almost 6 years ago on 02JAN16. The day I beat four assholes with it was 02FEB16. I was done with the cane before my court date. I am fully recovered and haven't seen that cane in over a year when I packed it up for the move to AZ.

    Ok, ex-cripple.
  4. Donald Trump Black Hole
    Originally posted by Speedy Parker You don't pay attention sparky. I was using a cane for about 5 to 6 weeks after I suffered compression fracture to the thoracic region of my spine when I was run into a ditch by a hit and run driver. That happened almost 6 years ago on 02JAN16. The day I beat four assholes with it was 02FEB16. I was done with the cane before my court date. I am fully recovered and haven't seen that cane in over a year when I packed it up for the move to AZ.

    You beat people with your cane? That's pretty cool.
  5. Originally posted by ⠀⠀⠀⠀⠀⠀ That cane should be framed and mounted on the wall.

    first it will need to be bolted with a few picatiny rails.
  6. Speedy Parker Black Hole [my absentmindedly lachrymatory gazania]
    Originally posted by vindicktive vinny first it will need to be bolted with a few picatiny rails.

    I prefer M-LOK
  7. Originally posted by Speedy Parker I prefer M-LOK

    then it will need a pistol grip and bayonett mounting point.
  8. Speedy Parker Black Hole [my absentmindedly lachrymatory gazania]
    Originally posted by vindicktive vinny then it will need a pistol grip and bayonett mounting point.

    Wrong, you really don't know anything.
  9. Originally posted by Speedy Parker Wrong, you really don't know anything.

    i know what an assault, military-styled, tactical, combat cane should look like.
  10. Kev Space Nigga
    Originally posted by Narc Depends if the proxies comply with the pigs. Most do.


    .

    which is why you use volunteer user proxies, not official ones. i volunteer a tor node myself, i wouldnt comply with the pigs but even if i do, lets see them get the next node in the chain to comply which happens to be in russia, the next one in saudi arabia, the next one in china and so on.
  11. Kev Space Nigga
    Originally posted by Speedy Parker *hands pedo a shovel and starts the popcorn*

    holy shit i actually found it, a post from march fucking 2009.

    "Ars Technica has been covering the RIAA cases in the USA in great detail. There is a wealth of information there that is great reading for the security conscious. Here are five lessons that I gleaned from their data.

    (1) LEA can get your physical address in less than a day. All the major LEA have pre-written agreements with ISPs and with the court system that allows them to get a supeona and get the results from that supoena in less than 24 hours after an IP has been detected.

    (2) Your IP adress is not the only thing that identifies you. Every network adapater card in the world has a unique ID. By decting that ID via your MAC address, LEAs can locate the actual physical computer that downloaded the file, making any arguement that your connection was hijacked by wireless moot. The only way to defeat this is to use MAC address spoofing with a program such as SMAC 2.0.

    (3) Despite the noise about plasuable denability, American courts are accepting the theory that once the LEA has tracked the IP to your house the burden of proof shifts to you regarding whether you actually downloaded the file. Never leave *any* trace that connects you to the public internet (such as passwords, user names, IDs). All file sharing must be done anonymously and unique identifers must not be shared between accounts.

    (4) The American company Comcast recently revealed that it charges LEAs $1000 for every internet wiretap...unless the case involves a child in which case it's free. Yes, they consider pedos worse than terrorists. That is the environment you live in.

    (5) As always, encrypt everything. Compare the cost of encryption with the cost of a lawyer."

    There you go, comcast wiretaps pedos but not terrorists without charging a pretty penny for it, Ars technica contains the original article, you can look for it.
  12. Doesn't matter what you actually have on your hard drive. Everything you viewed and downloaded/uploaded is already in the ISP log attached to your IP. They don't need the actual content/data to prove you were in control/possession of it. All they need is the ISP log file.
    The following users say it would be alright if the author of this post didn't die in a fire!
  13. Grylls Cum Looking Faggot [abrade this vocal tread-softly]
    I remember when I used to play world of warcraft there was some kinda wizard group named the Kirn Tor, I wonder if that has any relevance
  14. Kev Space Nigga
    Originally posted by ⠀⠀⠀⠀⠀⠀ Doesn't matter what you actually have on your hard drive. Everything you viewed and downloaded/uploaded is already in the ISP log attached to your IP. They don't need the actual content/data to prove you were in control/possession of it. All they need is the ISP log file.

    encryption fixes that
  15. AngryIVer African Astronaut [my jade controlled morrigan]
    Originally posted by Ajax What makes NT better than NiS?

    The fact it has an admin that gives a shit about the site growing rather than some weeb who only runs somewhere to play favorites with the lowest common denominator.

    The fact I'm even still able to post here goes to show what a shitty admin Lanny is because I made the request a long time ago to have my accounts purged.



    Originally posted by the man who put it in my hood Literally nothing it has one poster talking to himself and if you make him upset he will post your IP address on 4chan and call the police on you because he's a faggot

    Name one IP I've posted. Just one.

    Oh, that's right, you're just mad because I called HTS noob a tranny.
  16. you are an IP doxxer and your website looks like the bottom of a garbage can after someone puked in it
  17. If you post on new totse your IP address will be shared around the tinychat faggot crew while they try to find where you live and mail things to your house becuase they are psychotic lozers
  18. Sudo Black Hole [my hereto riemannian peach]
    Originally posted by AngryIVer The fact it has an admin that gives a shit about the site growing rather than some weeb who only runs somewhere to play favorites with the lowest common denominator.

    The fact I'm even still able to post here goes to show what a shitty admin Lanny is because I made the request a long time ago to have my accounts purged.





    Name one IP I've posted. Just one.

    Oh, that's right, you're just mad because I called HTS noob a tranny.

    Hey aren't you that creepy child abusing trailer trash?

    ABSOLUTELY HARAM
  19. Sudo Black Hole [my hereto riemannian peach]
    Originally posted by Kev holy shit i actually found it, a post from march fucking 2009.

    "Ars Technica has been covering the RIAA cases in the USA in great detail. There is a wealth of information there that is great reading for the security conscious. Here are five lessons that I gleaned from their data.

    (1) LEA can get your physical address in less than a day. All the major LEA have pre-written agreements with ISPs and with the court system that allows them to get a supeona and get the results from that supoena in less than 24 hours after an IP has been detected.

    (2) Your IP adress is not the only thing that identifies you. Every network adapater card in the world has a unique ID. By decting that ID via your MAC address, LEAs can locate the actual physical computer that downloaded the file, making any arguement that your connection was hijacked by wireless moot. The only way to defeat this is to use MAC address spoofing with a program such as SMAC 2.0.

    (3) Despite the noise about plasuable denability, American courts are accepting the theory that once the LEA has tracked the IP to your house the burden of proof shifts to you regarding whether you actually downloaded the file. Never leave *any* trace that connects you to the public internet (such as passwords, user names, IDs). All file sharing must be done anonymously and unique identifers must not be shared between accounts.

    (4) The American company Comcast recently revealed that it charges LEAs $1000 for every internet wiretap…unless the case involves a child in which case it's free. Yes, they consider pedos worse than terrorists. That is the environment you live in.

    (5) As always, encrypt everything. Compare the cost of encryption with the cost of a lawyer."

    There you go, comcast wiretaps pedos but not terrorists without charging a pretty penny for it, Ars technica contains the original article, you can look for it.

    Shut up pedophile I'll fly a plane into your mother's house just so you burn to death in her basement surrounded by pizza boxes and anime posters
  20. Kev Space Nigga
    Originally posted by Sudo Shut up pedophile I'll fly a plane into your mother's house just so you burn to death in her basement surrounded by pizza boxes and anime posters

    yo that polish teen you were white knighting for sucked your dick yet for defending her honor?
Jump to Top