Skip to main content

Myth and fact of Getting Busted Online

Getting Busted Online
-=-=-=-=-=--=-=-=-=-=--=-

-=-=-=-=-=--=-=-=-=-=--=-=-=-=-=--=-=-=-=-=--=-=-=-=-=-

MYTH: It’s easy for law enforcement to trace people online.

FACT: This is not so unless you take zero precautions. Bouncing off any kind of proxy will significantly hinder law enforcement. Bouncing off anything that scrubs and then forgets your IP address makes tracing you via the network nearly impossible once you have ceased sending traffic. Everyone who gets caught is caught by traditional police-work or by following a trail of logged IP addresses. While it is possible to carry out timing correlation attacks against low-latency networks such as Tor, these are only within the capabilities of intelligence agencies. There is no credible evidence so suggest that these capabilities have been used to identify hackers, warez groups or virus authors and they will certainly not be used against ordinary peer-to-peer users.

-=-=-=-=-=--=-=-=-=-=--=-=-=-=-=--=-=-=-=-=--=-=-=-=-=-

MYTH: Uploading files anonymously is safe as long as my IP address is safe.

FACT: Traditional police-work (which Law Enforcement is very good at) includes examining meta-data of documents. Uploading files that can be linked back to you is a good way to get busted. Most ‘computer forensics’ focuses on retrieving data from hard-disks and scouring files for meta-data.

-=-=-=-=-=--=-=-=-=-=--=-=-=-=-=--=-=-=-=-=--=-=-=-=-=-

MYTH: My group will never be infiltrated.

FACT: This kind of thinking is what gets people busted. They allow incriminating information (this includes IP addresses) to leak to associates within a group. The group is infiltrated, and soon everyone is fucked.

-=-=-=-=-=--=-=-=-=-=--=-=-=-=-=--=-=-=-=-=--=-=-=-=-=-

MYTH: It’s safer to be a “reverse engineer” and crack without releasing.

FACT: You are more likely to be busted due to being narced out by someone peeping over your shoulder than being traced through bnc’s by supposed FBI magic, and cracking on your own machine is still illegal in the USA (with a few narrow exemptions), regardless of how innocent your intentions are.

-=-=-=-=-=--=-=-=-=-=--=-=-=-=-=--=-=-=-=-=--=-=-=-=-=-

MYTH: Most traffic on the Internet is logged.

FACT: This is not even remotely true. Most traffic is not logged, because there is simply too much of it to be stored. The establishment of a connection to a server is generally permanently logged at the server, but rarely at the point of origin. Firewalls and routers are not going to permanently log ordinary-looking forwarded connections because there are simply too many of them. Some data payloads may be logged during transit and at the receiving end. If you go through three hosts on the Tor network, your packets travel through many routers, and are encrypted at each point. Most of the time, these packets are not logged anywhere anyway. There is no way for someone to practically follow your trail through all of these routers, and nor can your connections be logged at all of these routers indefinitely. You are most likely to be identified by going through several rogue, cooperating Tor nodes simultaneously, which is unlikely unless Law Enforcement takes over the directory server.

-=-=-=-=-=--=-=-=-=-=--=-=-=-=-=--=-=-=-=-=--=-=-=-=-=-

Comments

Popular posts from this blog

Physical Teleportation Theoretical method to do It!

Teleportation is the ability of moving matter from one point in time and space to another point in time and space instantaneously. There are different types of teleportation available at this time both visual and physical teleportation are possible and we use visual teleportation as our starting point. Types Visual body teleportation Astral body teleportation The different types of visual teleportation are. visual body or astral body teleportation , or visual object teleportation but before we can master teleportation we must first learn the art of Telekinesis/Psychokinesis and Clairsentience and the higher state of consciousness the seventh sense. Other abilities useful in teleportation are Tele-Visualization and ESP (Extrasensory Perception). The ability of teleportation is used in Time travel, Interstellar travel, and Dimensional travel. Teleportation is the near instantaneous transport of the Psychic from one location to another and there is no other fo...

How to make explosive at home

Hey guys. So I seen a few tutorials on how to make explosives at home. Most of them were pretty long and confusing, dangerous or just stupid. Well this tutorial will show you a very easy way anyone can make explosives, and it's quite stable. What you need: Acetone (C3H6O) Hydrogen Peroxide You can get these from the pharmacy. Mixing these two ingredients in a high temperature will result in Acetone Peroxide. It's not very stable when it's dry, so as long as it's wet it's more stable. This "TATP" got a bit a publicity a couple years ago, in the U.K. Underground bombings, actually. It's dangerous, just like any explosive, so be VERY careful if you plan to make this. And read about it here http://en.wikipedia.org/wiki/Acetone_peroxide I AM NOT RESPONSIBLE FOR ANYTHING YOU DO WITH THIS INFORMATION. THIS IS FOR EDUCATION PURPOSE ONLY.

Trojan blackdoor

What is trojan backdoor ? Backdoor.Trojan is a detection name used by Symantec to identify malicious software programs that share the primary functionality of enabling a remote attacker to have access to or send commands to a compromised computer. As the name suggests, these threats are used to provide a covert channel through which a remote attacker can access and control a computer. The Trojans vary in sophistication, ranging from those that only allow for limited functions to be performed to those that allow almost any action to be carried out, thus allowing the remote attacker to almost completely take over control of a computer. A computer with a sophisticated back door program installed may also be referred to as a "zombie" or a "bot". A network of such bots may often be referred to as a "botnet". Botnets have been well publicized in the news over the years, with different instances being given specific names such as Kraken, Mariposa, or Kneber, alon...