How can NSA track you down even if you hop through multiple VPNs? | |
Anonymous Coward User ID: 76973742 United States 03/26/2019 12:04 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77476425 United States 03/26/2019 12:20 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 70075366 United States 03/26/2019 12:23 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77433261 United States 03/26/2019 12:23 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 73582700 United States 03/26/2019 01:07 PM Report Abusive Post Report Copyright Violation | Its deeper than that.at the binary level they can type your keys while you sleep.make anybody look bad or good.never trust digital alone as evidence.if they cheat,they can,thank god its obvious when they do though.theres a reason more than one person is ever watching.with ai,no more cheating anywhere.the corrupt will get judged. |
Anonymous Coward User ID: 77502790 Ukraine 03/26/2019 01:12 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77502790 Ukraine 03/26/2019 01:13 PM Report Abusive Post Report Copyright Violation | Webservers run scripts that leverage your browser to harvest your physical MAC address. Once the physical MAC address is revealed it is stored. Quoting: Anonymous Coward 77476425 Your MAC address is unique to your native physical machine. The mac address doesnt get past the router in most cases. They can easily be changed or the hardware changed. Gay |
CK Dexter Haven User ID: 77047820 Netherlands 03/26/2019 01:15 PM Report Abusive Post Report Copyright Violation | |
SilverCyprus User ID: 77123653 Canada 03/26/2019 01:15 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77502790 Ukraine 03/26/2019 01:17 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77502790 Ukraine 03/26/2019 01:17 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77502790 Ukraine 03/26/2019 01:21 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 67385131 Switzerland 03/27/2019 07:43 PM Report Abusive Post Report Copyright Violation | Ok riddle me this. If these three letter agencies have back doors into everything then why do the supeona the VPNs for data logs? Also why do the DOJ consistently complain about encryption and how it should be banned? Quoting: Anonymous Coward 77502790 It's for show. If we think that we are safe, then we will continue to use these unsecure methods. |
BrokenTech User ID: 68971733 United States 03/27/2019 07:49 PM Report Abusive Post Report Copyright Violation | Your first mistake is thinking a VPN is completely secure and safe. Its an illusion of safety. It keeps the average hacker out, but with the right equipment its completely possible. It seems you have fallen for the myth that a VPN is not hackable or traceable. I only use vpn for work because it is required. But personally I never use one, I'm not trying to hide from anyone and if they see me streaming movies, fuckem'. Last Edited by BrokenTech on 03/27/2019 07:51 PM |
BrokenTech User ID: 68971733 United States 03/27/2019 07:52 PM Report Abusive Post Report Copyright Violation | Ok riddle me this. If these three letter agencies have back doors into everything then why do the supeona the VPNs for data logs? Also why do the DOJ consistently complain about encryption and how it should be banned? Quoting: Anonymous Coward 77502790 It just makes their job a little easier if they do not have to do the work themelves. They typically only target the endpoints, not in between. Beginning and end is all they need. Last Edited by BrokenTech on 03/27/2019 07:53 PM |
Anonymous Coward User ID: 77504959 Germany 03/27/2019 07:54 PM Report Abusive Post Report Copyright Violation | |
Crypto-Tard User ID: 69359666 United States 03/27/2019 07:58 PM Report Abusive Post Report Copyright Violation | |
Cryptographer User ID: 76682345 United States 03/27/2019 08:08 PM Report Abusive Post Report Copyright Violation | It is actually very easy if you have access to the right tools (which NSA does of course). All net traffic passes through a small number of Tier-1 providers at some point so you only need a select number of peer connections (which the NSA has of course). A VPN is easy to track because it has a start and end IP and easy to identify patterns. If you can monitor all traffic in and out via a NOC, via lets call it a "looking glass", then it is really easy to assemble start and end points. It might be encrypted but your traffic starts and ends through the entire tunnel in a synced manner which creates simple patterns that are easy for monitoring tools to identify. It is really easy during slower traffic periods in the timezone of the monitored target. Meaning, if you want to make it take longer to identify what you are doing do it during PEAK traffic periods. It is a little more complex than I am making it sound but there are tools that automatically assemble the reports for you. There is an art to secure anonymous communications. Using a VPN while sitting in your house, even if you hop 5, is not going to keep your identity from the NSA. Sure, most anyone else it will make it near impossible to locate you but not from the great eye. Just remember, the NSA has HIGHLY qualified top notch people that have the BEST tools available to them for this type of thing, PERIOD. Cryptographer |
Anonymous Coward User ID: 77498696 Canada 03/27/2019 08:19 PM Report Abusive Post Report Copyright Violation | Intel Management Engine Claims that ME is a backdoor Critics like the Electronic Frontier Foundation (EFF) and security expert Damien Zammit accused the ME of being a backdoor and a privacy concern. Zammit stresses that the ME has full access to memory (without the parent CPU having any knowledge); has full access to the TCP/IP stack and can send and receive network packets independently of the operating system, thus bypassing its firewall. the game is rigged at the hardware level Design The subsystem primarily consists of proprietary firmware running on a separate microprocessor that performs tasks during boot-up, while the computer is running, and while it is asleep.[7] As long as the chipset or SoC is connected to current (via battery or power supply), it continues to run even when the system is turned off. |
Louis in Richmond That is my arm now; broken for 7 months User ID: 74363490 United States 03/27/2019 08:24 PM Report Abusive Post Report Copyright Violation | I spent five hours on my cell phone with another Engineer in Costa Rica today as we troubleshot a problem with a redirector service I have running on Windows Server 2016 that I have loaded and am running off the HDD's on CISCO routers in distant places. That answers your question. If anything I am honest and I am on our side. I posted it in the Foodie thread as we worked [link to www.godlikeproductions.com] , it takes a CISCO router about ten minutes to load and launch a secondary OS on the router if you're curious. You can't even see it without the right access. Last Edited by Louis in Richmond on 03/27/2019 08:30 PM Until your military service has required you neutralize enemy combatants and invaders in the defense of your country, don't presume to tell us that have defended you that you don't support every shot we fired to eliminate that enemy. |
Anonymous Coward User ID: 76224820 United States 03/27/2019 08:27 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 73193215 United States 03/27/2019 08:42 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77249605 Norway 03/27/2019 08:44 PM Report Abusive Post Report Copyright Violation | |
Louis in Richmond That is my arm now; broken for 7 months User ID: 74363490 United States 03/27/2019 08:45 PM Report Abusive Post Report Copyright Violation | they could be running the vpns Quoting: Anonymous Coward 77390702 also there are various ways to identify a computer, such as mac address, browser fingerprint, ect ect ect I just dont buy this FUD about three letter agencies running all VPNs. No evidence to support this. In fact many VPN have flat out told them they have no logs when data was requested. Routers log everything. Who needs an ISP's or VPN provider's logs when you have access to the raw data and control the root CA's? Until your military service has required you neutralize enemy combatants and invaders in the defense of your country, don't presume to tell us that have defended you that you don't support every shot we fired to eliminate that enemy. |
KLC User ID: 75919805 Canada 03/27/2019 08:51 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 73848670 Canada 03/27/2019 08:57 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77507411 Germany 03/27/2019 08:57 PM Report Abusive Post Report Copyright Violation | they could be running the vpns Quoting: Anonymous Coward 77390702 also there are various ways to identify a computer, such as mac address, browser fingerprint, ect ect ect I just dont buy this FUD about three letter agencies running all VPNs. No evidence to support this. In fact many VPN have flat out told them they have no logs when data was requested. Routers log everything. Who needs an ISP's or VPN provider's logs when you have access to the raw data and control the root CA's? Routers don't log everything. Only certain routers that are set up to keep logs do that. More FUD. How do you know they control the CA's? Again no proof just more speculation. |
Anonymous Coward User ID: 77507411 Germany 03/27/2019 09:04 PM Report Abusive Post Report Copyright Violation | well I've heard too many cases where illegal shit happens and no one gets caught because they were anon on their computer. So how do these dark web creeps get away with it? It is very difficult and expensive to track someone using the methods people mention here. One thing people almost never mention here is that VPN's and Tor are not static. They change and update as well. It's almost always assumed that the three letters have better capabilities than the private industry. While that is certainly possible it is still just speculation. |
Truth Reaper User ID: 75955494 United States 03/27/2019 09:49 PM Report Abusive Post Report Copyright Violation | |
KLC User ID: 75919805 Canada 03/27/2019 09:52 PM Report Abusive Post Report Copyright Violation | they could be running the vpns Quoting: Anonymous Coward 77390702 also there are various ways to identify a computer, such as mac address, browser fingerprint, ect ect ect I just dont buy this FUD about three letter agencies running all VPNs. No evidence to support this. In fact many VPN have flat out told them they have no logs when data was requested. Routers log everything. Who needs an ISP's or VPN provider's logs when you have access to the raw data and control the root CA's? Routers don't log everything. Only certain routers that are set up to keep logs do that. More FUD. How do you know they control the CA's? Again no proof just more speculation. even ISP grade routers do not have long term storage they must dump the logs to a file at specified intervals or the data is overwritten root servers are all under the control of the gov. the internet was and still is a military project and operation (°ö°) Swirl Life |