Message from @Fluxis
Discord ID: 327834074251001867
just to show him I mean business
threatening to kill "Nazis" is a cool thing for them, they feel accomplished afterwards
I have yet to hear about even one nazi dying
but I've heard about at least 3 antifa killed by one single punch or kick
They tried it in Cali. The day did not favor them.
Given the option between Ubermensche or Untermensche, no real european worth a shit will choose to stand with the Untermenschen
The odds dont favor them, they will find no mercy or favor with us, and the gods will not look upon them with mercy either
they are destined for the dustbin of history
Morning guys!
No, unfortunately Tor is no longer secure, it's been broken heavily.
At first (((They))) could only find your traffic using entrance/exit vector statistics, but now they are using their own servers as TOR nodes, allowing them to intercept large amounts of traffic.
I don't use TOR personally, is that a requirement for being here?
Tor is actually easy to track by tracing the exit nodes which all show your computers mac address unless you hide it or change it.
Second off, no matter what that traffic is being run through your router and DNS that is associated with you router.
Thirdly, not every VPN Tor routes through is free of packet sniffers
You know, this was all in my cisco certification course.
Let alone, we don't even know what VPN they route through unless someone can name every VPN off TOR goes through.
And aside from everything Austin just said, and more, TOR is just not that secure.
Yep
That's why it's "accessible yet secure"
It's for the autistic kids at school who like to pretend their being cool.
seapea, can you type any faster?
@Fluxis Can you post some docs about Tor passing along mac addresses? Mac addresses are layer two and not used in layer three and above type routing that Tor does. Tor devs would specifically have to code their software to grab the mac address of the client and pass it along.
It's passed along in UDP and TCP packets.
Never studied it. I completely changed my facotry mac adress on my laptop m8.
Factory*
Better safe than sorry if we're talking about computer security
Also using windows 10 is an instant gg on security
Anyone with metaploit can get into someone using windows 10 by simply googling proper commands
Which is why DNS + Tor on windows can up the security a few points.
I use windows 10 because I like to be able to play game every now and then.
I have this Mac running OSX for most games, and on my laptop I just use WINE to emulate windows games.
Well you must have a very good computer!
I don't lol
Also, real net security comes down to flashing firmware on your router
Here I'll make it easy
I've done this all before for a friend, it's really not that hard guys.
Assuming hackers here are your run of the mill script kiddies and not nation states, hackers can:
Use Remote Exploits to access your computer (hacking your computer).
Trick you into running exploits on your computer (viruses, malware).
Trick you into disclosing the credentials to your computer or web services (phishing).
Manipulate company employees into handing over your login details or control of your account (social engineering)
Guess the credentials to your computer or web services (cracking).
Break into web services and determine your credentials (hacking web services).
While hackers will always know about security problems before everyone else, they are less likely to use their brand new exploits against random people. High value targets (whether they be financial (paypal?), political (fbi website?) or lulzy (the fappening)) are much more likely to be their focus. Unknown exploits are valuable: They are obtained by hard work or paying for them on the black market. But the moment you use them, everyone will find out and patch the hole. So the hacker wants to make it count, he doesn't want to blow his one shot on something worthless.