Message from @Artair
Discord ID: 327834302370807821
I have yet to hear about even one nazi dying
but I've heard about at least 3 antifa killed by one single punch or kick
They tried it in Cali. The day did not favor them.
Given the option between Ubermensche or Untermensche, no real european worth a shit will choose to stand with the Untermenschen
The odds dont favor them, they will find no mercy or favor with us, and the gods will not look upon them with mercy either
they are destined for the dustbin of history
Morning guys!
No, unfortunately Tor is no longer secure, it's been broken heavily.
At first (((They))) could only find your traffic using entrance/exit vector statistics, but now they are using their own servers as TOR nodes, allowing them to intercept large amounts of traffic.
I don't use TOR personally, is that a requirement for being here?
Tor is actually easy to track by tracing the exit nodes which all show your computers mac address unless you hide it or change it.
Second off, no matter what that traffic is being run through your router and DNS that is associated with you router.
Thirdly, not every VPN Tor routes through is free of packet sniffers
You know, this was all in my cisco certification course.
Let alone, we don't even know what VPN they route through unless someone can name every VPN off TOR goes through.
And aside from everything Austin just said, and more, TOR is just not that secure.
Yep
Sad truth
That's why it's "accessible yet secure"
seapea, can you type any faster?
@Fluxis Can you post some docs about Tor passing along mac addresses? Mac addresses are layer two and not used in layer three and above type routing that Tor does. Tor devs would specifically have to code their software to grab the mac address of the client and pass it along.
It's passed along in UDP and TCP packets.
Never studied it. I completely changed my facotry mac adress on my laptop m8.
Factory*
Better safe than sorry if we're talking about computer security
Also using windows 10 is an instant gg on security
Anyone with metaploit can get into someone using windows 10 by simply googling proper commands
Which is why DNS + Tor on windows can up the security a few points.
I use windows 10 because I like to be able to play game every now and then.
I have this Mac running OSX for most games, and on my laptop I just use WINE to emulate windows games.
Well you must have a very good computer!
I don't lol
Also, real net security comes down to flashing firmware on your router
Here I'll make it easy
I've done this all before for a friend, it's really not that hard guys.
Assuming hackers here are your run of the mill script kiddies and not nation states, hackers can:
Use Remote Exploits to access your computer (hacking your computer).
Trick you into running exploits on your computer (viruses, malware).
Trick you into disclosing the credentials to your computer or web services (phishing).
Manipulate company employees into handing over your login details or control of your account (social engineering)
Guess the credentials to your computer or web services (cracking).
Break into web services and determine your credentials (hacking web services).
While hackers will always know about security problems before everyone else, they are less likely to use their brand new exploits against random people. High value targets (whether they be financial (paypal?), political (fbi website?) or lulzy (the fappening)) are much more likely to be their focus. Unknown exploits are valuable: They are obtained by hard work or paying for them on the black market. But the moment you use them, everyone will find out and patch the hole. So the hacker wants to make it count, he doesn't want to blow his one shot on something worthless.
Day to day attacks will be from relatively unskilled hackers (script kiddies) and deployed against ip address on the internet.
Occasionally a large internet service will lose it's password database to hackers e.g. twitch.tv. Sooner or later one of these headline hacks will affect you.
In response you can:
Keep your operating system and software up to date to cut down on remote exploits.
Use anti-virus and anti-malware scanning software.
Be wary about running unknown software or logging into untrusted sites (common sense 2016).
Run a restrictive firewall to allow only certain applications access to the network.
Use a password manager to generate random, secure passwords for your local computer accounts and web services.
Use a different password on each site. Knowing one password shouldn't make it easier to guess the others.
Give fake personal info where possible, so that info from one hacked account can't be used to break into other accounts by messing with the "Forgot Password" feature or calling and manipulating support/customer service.
Only use trusted web services, and give them as little sensitive data as possible.
If you shop online, try to delete Credit Cards when you're done using them, don't keep them saved in the account.
Use Two Factor Authentication (2FA) for higher value web services (banking, email).
Advertisers can:
Collect information when you login to them.
Track you across different websites you visit without logging into them.
Track you via GPS on your phone.
Track you online via WiFi on your phone.
Track you offline via WiFi on your phone.
Track you offline via credit/debit cards.
Track you offline via reward/membership cards.
Some of the security (or privacy) threats with advertisers are opt-in (i.e. you accepted it) and generally advertiser tracking isn't going to mess up your day. Problems arise when advertisers sell your information on to third parties (who in turn sell it to other third parties), go broke and auction off your data, get hacked or are victims of mass surveillance.
It's worth noting that their revenue models would be colossally damaged if everyone ran adblocking software.
In response you can:
Not create social media accounts, or create accounts with false information (although you'll still have the same friends, so are still opting in big time).
Disable third party cookies in your browsers.
Turn off GPS on your phone, or use a custom rom to limit which apps have access to your GPS.
Turn off WiFi on your phone, or use a custom rom to limit which apps have access to WiFi.
Turn off WiFi when you're out and about, especially in malls/shopping centres.
Use cash.
Debit cards tell your bank what you're buying and who from and where, and they sell that.
Credit cards tell VISA/Mastercard/etc what you're buying and who from and where.
Don't use reward cards. Most people never use the "rewards" and your privacy is worth more.