How can NSA track you down even if you hop through multiple VPNs? | |
Lily o' the Valley User ID: 77507546 United States 03/27/2019 10:08 PM Report Abusive Post Report Copyright Violation | Say something bad. Quoting: LittleMissDictator See if a couple secret service fellas show up at your front door. Problem answered. No necessarily. The also have all the information on you, all your friends, relatives, etc. The don't necessarily read all your e n.a. ail, but they keep it just in case. Two years down the line your brotherin law hets involved with a group of interest. They find a toss away cell phone bought 4 years ago when you were in New York on business at a Walgreen store. Y ou got it for your brother in law because he lost his and can't find one locally...it was used in planning an illegal activity. You are asked to come to the police station... They have all the pieces... When somebody does something they really don't like, they go though all the people associated, making connections. None of us can vouch for people 2 or 3 removed. *** Good deeds bring rewards, bad actions bring troubles. That is a law of the universe. *** |
Lily o' the Valley User ID: 77507546 United States 03/27/2019 10:23 PM Report Abusive Post Report Copyright Violation | ... Quoting: Anonymous Coward 74670671 I just dont buy this FUD about three letter agencies running all VPNs. No evidence to support this. In fact many VPN have flat out told them they have no logs when data was requested. Routers log everything. Who needs an ISP's or VPN provider's logs when you have access to the raw data and control the root CA's? Routers don't log everything. Only certain routers that are set up to keep logs do that. More FUD. How do you know they control the CA's? Again no proof just more speculation. even ISP grade routers do not have long term storage they must dump the logs to a file at specified intervals or the data is overwritten root servers are all under the control of the gov. the internet was and still is a military project and operation This is the true bottom line. The military is always a couple of decades ahead of you. NSA ditto. *** Good deeds bring rewards, bad actions bring troubles. That is a law of the universe. *** |
Anonymous Coward User ID: 77507411 Germany 03/27/2019 10:25 PM Report Abusive Post Report Copyright Violation | ... Quoting: Louis in Richmond Routers log everything. Who needs an ISP's or VPN provider's logs when you have access to the raw data and control the root CA's? Routers don't log everything. Only certain routers that are set up to keep logs do that. More FUD. How do you know they control the CA's? Again no proof just more speculation. even ISP grade routers do not have long term storage they must dump the logs to a file at specified intervals or the data is overwritten root servers are all under the control of the gov. the internet was and still is a military project and operation This is the true bottom line. The military is always a couple of decades ahead of you. NSA ditto. Why do they want to make it illegal to use encryption then? If they know so much. |
Anonymous Coward User ID: 77507411 Germany 03/27/2019 10:29 PM Report Abusive Post Report Copyright Violation | ... Quoting: Louis in Richmond Routers log everything. Who needs an ISP's or VPN provider's logs when you have access to the raw data and control the root CA's? Routers don't log everything. Only certain routers that are set up to keep logs do that. More FUD. How do you know they control the CA's? Again no proof just more speculation. even ISP grade routers do not have long term storage they must dump the logs to a file at specified intervals or the data is overwritten root servers are all under the control of the gov. the internet was and still is a military project and operation This is the true bottom line. The military is always a couple of decades ahead of you. NSA ditto. This is something a brainwashed boomer would say. |
Anonymous Coward User ID: 77477703 United States 03/27/2019 10:37 PM Report Abusive Post Report Copyright Violation | |
CK Dexter Haven User ID: 77047820 Netherlands 03/27/2019 10:40 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 73332955 United States 03/27/2019 10:54 PM Report Abusive Post Report Copyright Violation | |
Blessed Jael User ID: 77333689 United States 03/28/2019 08:05 AM Report Abusive Post Report Copyright Violation | |
Dr.Know User ID: 49720784 United States 03/28/2019 08:17 AM Report Abusive Post Report Copyright Violation | I always suspected that all routers have back door microcode that allows the NSA to download routing tables of VPN service providers. They scan for Key words in order to monitor you. I think the feds run the torrent servers and prono sites to keep us busy and also make us guilty of a crime that they could prosecute if they wanted to. No your MAC address doesnt go out on the web because it is as OSI Layer 1 where your modem is only sending/receiving TCP/IP packets at layer 4 ( for IP) and layer 5 ( for TCP packets). |
Anonymous Coward User ID: 49720784 United States 03/28/2019 08:19 AM Report Abusive Post Report Copyright Violation | ... Quoting: Anonymous Coward 77507411 Routers don't log everything. Only certain routers that are set up to keep logs do that. More FUD. How do you know they control the CA's? Again no proof just more speculation. even ISP grade routers do not have long term storage they must dump the logs to a file at specified intervals or the data is overwritten root servers are all under the control of the gov. the internet was and still is a military project and operation This is the true bottom line. The military is always a couple of decades ahead of you. NSA ditto. This is something a brainwashed boomer would say. How would you know, all you millenials know is how to use a smart phone. |
Anonymous Coward User ID: 76022984 United States 03/28/2019 08:19 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77331063 United States 03/28/2019 08:26 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 76916974 Luxembourg 04/27/2019 11:07 AM Report Abusive Post Report Copyright Violation | |
UTownReturns User ID: 77065695 United States 08/02/2020 06:12 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 78527715 Malta 08/02/2020 06:25 PM Report Abusive Post Report Copyright Violation | It's a matter of time and effort plus cost. It is extremely difficult to get a Vpen in some shithole country to cooperate and then just find out they don't keep logs. Which most good ones don't. So in order for this to happen you would need to be very very valuable. |
Anonymous Coward User ID: 76809044 United States 08/02/2020 06:26 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 78527715 Malta 08/02/2020 06:29 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 78527715 Malta 08/02/2020 06:32 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 78527715 Malta 08/02/2020 06:33 PM Report Abusive Post Report Copyright Violation | MAC addresses can be easily spoofed. Plus they don't move past the local LAN unless you are on a wireless connection. Even then its not really that valuable. The Ethernet card can just be switched out. A malicous script could get the MAC address of the host machine as well. That would require using a Zero Day exploit. Which typically aren't burned unless its a very high value. Not somebody posting SUCK MY PHAT EJACUTLATING SHCLONG to GLP. |
Anonymous Coward User ID: 84667771 United States 12/01/2023 05:24 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 76626437 United States 12/01/2023 05:40 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 84670994 United States 12/01/2023 05:44 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 86064758 United States 12/01/2023 05:51 PM Report Abusive Post Report Copyright Violation | they could be running the vpns Quoting: Anonymous Coward 77390702 also there are various ways to identify a computer, such as mac address, browser fingerprint, ect ect ect Your writing style and compare it with other identities you have not masked online, they could control the ISP you use or rather have access to either willingly or they hacked the ISP and have backdoors to it. When they got their suspicion they go look what ISP you pay for and send a request or they have access already or use a backdoor into the ISP and then monitor your traffic at the ISP and then the supiscion is either confirmed or you were not the one they were looking for. And also there's plenty of programs that send shit to the makers and those makers probably like to share or they're hacked. Also there's the data gathering centers, like Echelon. Sweden has a ginormous data collecting center with the Swedish FRA Pretty cool logo: [link to upload.wikimedia.org (secure)] Here's the swedish wiki about Försvarets Radioanstalt: [link to sv.wikipedia.org (secure)] it catches all traffic from Russia that goes between Russia and the US from say Moscow. Some detective work but they can find you. They found that guy Sabu of LulzSec and he was way more careful than most. [link to en.wikipedia.org (secure)] still he messed up in one point and they got him. [link to www.youtube.com (secure)] there's probably more ways to find out who people are, the experts here will probably tell us. Holy shit I've been on this site a long time, I remember when posting this video was an instaban! |
Anonymous Coward User ID: 86580300 United States 12/01/2023 05:53 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 85475134 United States 12/01/2023 06:00 PM Report Abusive Post Report Copyright Violation | Well I’ve invited the fuckers over for a chat so far no one’s showed up Quoting: Anonymous Coward 84670994 I’d make tea and crumpets even Basically this. I know what they are capable of. Could they “ruin” my life? Could they ruin yours? Do you want to live what few years we have left in paranoia and trying to “behave” how they want? My advice, just be reasonable and let the chips fall where they may. I’ve been a targeted individual for upwards of 6 years. |
condor819 User ID: 12210116 United States 12/01/2023 06:05 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 81379273 Cambodia 12/01/2023 06:15 PM Report Abusive Post Report Copyright Violation | They monitor metadata detailing every IP-to-IP connection on the public internet routes and within internet service providers, which effectively covers the bulk of the entire internet. Veep33NN providers say they don't keep logs, but that's not really true to the extent people think it is. They don't log the content of your traffic typically, but you can be damn sure they log which Veep33NN account was assigned to a particular Veep33NN IP address at all times. So by monitoring the characteristics of the traffic leaving your ISP modem, then through the ISP network, then out into the public internet, then into the Veep33NN network, and finally the data reaching the destination website, they can assemble a view of the entire journey pretty easily without even needing more info beyond who had what Veep33NN IP at a particular time. Tor disrupts their ability to do that type of analysis, which is why they have to do a lot of manual effort regarding timing analysis of packet characteristics and entrance/exit node behavior. |
Anonymous Coward User ID: 81379273 Cambodia 12/01/2023 06:21 PM Report Abusive Post Report Copyright Violation | They monitor metadata detailing every IP-to-IP connection on the public internet routes and within internet service providers, which effectively covers the bulk of the entire internet. Veep33NN providers say they don't keep logs, but that's not really true to the extent people think it is. They don't log the content of your traffic typically, but you can be damn sure they log which Veep33NN account was assigned to a particular Veep33NN IP address at all times. So by monitoring the characteristics of the traffic leaving your ISP modem, then through the ISP network, then out into the public internet, then into the Veep33NN network, and finally the data reaching the destination website, they can assemble a view of the entire journey pretty easily without even needing more info beyond who had what Veep33NN IP at a particular time. Tor disrupts their ability to do that type of analysis, which is why they have to do a lot of manual effort regarding timing analysis of packet characteristics and entrance/exit node behavior. And one more point regarding Tor - the manual analysis I mentioned above is undoubtedly almost nearly or already entirely automated by this point with the advent of real-time on-the-fly tracking and analysis of all traffic by AI-based surveillance platforms. |
Anonymous Coward User ID: 81379273 Cambodia 12/01/2023 06:35 PM Report Abusive Post Report Copyright Violation | Ok riddle me this. If these three letter agencies have back doors into everything then why do the supeona the VPNs for data logs? Also why do the DOJ consistently complain about encryption and how it should be banned? Quoting: Anonymous Coward 77502790 It's for show. If we think that we are safe, then we will continue to use these unsecure methods. It's for show yes, but also so that they can maintain secrecy of means and methods while using parallel construction to provide a plausible "reverse-engineered explanation" of how they discovered user activity without needing to admit use of or submit information about the real surveillance tools that were actually used to discover said activity... because quite a bit of it is very very illegal, especially when it involves a US citizen. |
Anonymous Coward User ID: 86585763 United States 12/01/2023 06:40 PM Report Abusive Post Report Copyright Violation | |