Julius_Van_Der_Beak
Fallen
- Joined
- Jul 24, 2008
- Messages
- 22,429
- MBTI Type
- EVIL
- Enneagram
- 5w6
- Instinctual Variant
- sp/so
A nickel could buy you five rashers of bacon and about a hogshead of cider!
Any recommendations, or personal experiences with these SW?
This may be a naive question, but is there safety in something simple like having a second tracfone with a number you don't share with many people? Even though it could be easily hacked, at least someone with a specific intention towards a specific person may not find the number? I'm assuming the phone and minutes could be purchased with cash at Walmart or something?
I use a VM to get into the dark webs and nothing else, it's a full Linux system will all kinds of tools on it for diving into scary places:
Whonix - Anonymous Operating System
For general and non critical anonymity, like browsing from a coffee shop, and torrents I use TorGuard, which doesn't really have anything to do with Tor, it's just a VPN:
Anonymous VPN, Proxy & Anonymous Proxy Services | TorGuard
Currently migrating all of my passwords to random strings kept in a password vault:
KeePass Password Safe
I haven't found a satisfactory way of buying/laundering BitCoin. I keep trying different things, it all tends to be awkward and risky or incredibly inconvenient. I haven't looked in a while, alternative crypto currency may help.
So what is the dark web exactly? The only thing I know about it comes from videogames on YouTube let's plays.
I don't mean to start an argument but...look at 10:28-11:22.All those scary stories about the nasty things on the deep web are fabricated, right? I don't know if I'll ever feel comfortable going there from the things I've heard so far, haha.
So what is the dark web exactly? The only thing I know about it comes from videogames on YouTube let's plays.
All those scary stories about the nasty things on the deep web are fabricated, right? I don't know if I'll ever feel comfortable going there from the things I've heard so far, haha.
Yeah, most of what I know comes from the SomeOrdinaryGamers and creepypastas.
Same. I saw a few guys play that one game with the skull face a while back which isn't really the darkweb but something close, they claim. It was pretty creepy. And now I hear there's something called the deep web which is apparently worse. What're ya'll doing on those machines you jailbreak and hijack into Windows/Apple hybrids, ah? Do you really need those porcelain doll bodies for your collection or a picture of a witch from the 1870s? Whoa, there, silver.
Yeah, you are more correct lowtech_redneck, the deep web is largely innocuous (depending on how you think maybe your myspace profile from 2005 might be pretty embarrassing, but it is hardly on the same level drugs, weapons, etc. A lot of the suppliers on the dark web congregate around certain websites, but the "dark web" isn't entirely filled with evil, there is a recent site launched that indexes poetry for example, but I do think there is more going on there than you believe there is. Some suppliers of illegal goods move goods from one supplier to another, so they're not necessarily involved with street level crime, but they let a lot of it be encouraged. Some people even argue that online sale of drugs may decrease street crime by cutting into the profits of gangs and creating a better (safer) supply chain. With that said the recent attack using the IoT to DDOS a lot of major sites is probably just a taste of things to come (though that doesn't necessarily have anything to do with .onion sites themselves). Not everything is very clean and clearcut. For example, the UN is meeting now on new internet standards in part to try to understand the risk of the dark web and what actions to take to get a handle on it. Anyone can start a .onion site themselves from a mobile phone or host one on their home computer and you can put whatever you like on it so it is not necessarily all illegal. Some apparently go there to create online forums to discuss things related to a particular subculture that feels it needs privacy and anonymity to avoid reprisals for the activities they conduct like a chinese hacker who wishes to avoid state detection and may post information that the CCP may not approve of, another example may be whistleblowers, or people who say are into bdsm and do not want their colleagues finding out. One example is that facebook has a .onion portal so that you can connect to their site even if you live in a country that may normally restrict your access to it like Iran or North Korea.
...
In 1967, the ARPANET was about to roll out. The ARPANET was the precursor to the internet. This was a great boon to scientific research. All the contractors of the Defense Department and labs and universities could communicate with each other on one network, instead of having to go through a zillion consoles. But there was a computer scientist named Willis Ware. He had been a computer pioneer. He was the head of the Computer Science Department at the RAND Corporation and a member of the Scientific Advisory Board at the National Security Agency (NSA). He wrote a paper. It was classified at the time. It’s been declassified since. It’s fascinating to read. He basically said, look, once you put information on a computer network — once you have online access from multiple, unsecured locations — you’re creating inherent vulnerabilities. You’re not going to be able to keep secrets anymore.
.....
He said, “Well, I took it to the team working on the ARPANET, and they said, ‘Don’t saddle us with a security requirement. Look how hard it is to do what we’ve done. It’s like telling the Wright Brothers that the first plane has to carry 20 passengers for 50 miles. Let’s do this one step at a time. Meanwhile, it’s going to be decades before the Russians can do anything like this.’†Well, it was about two and a half or three decades. In the meantime, whole networks and systems had sprouted up with no provision for security whatsoever. I look at this as the bitten apple in the digital Garden of Eden. It was something that was foreseeable, and by a small number of people, actually foreseen from the beginning; something inherent in the technology.
...
It’s 15 years after Willis Ware’s paper. Ronald Reagan is up at Camp David the first weekend of June in 1983. He watches a lot of movies up there. On that Saturday night, he watches War Games. This is the Matthew Broderick movie where he plays a teenage whiz kid who unwittingly hacks into the main computer at the North American Air Defense Command. Thinking that he’s playing a new, online game called Global Thermonuclear War, he almost sets off World War III. So, Reagan comes back to the White House. There’s a big meeting on Wednesday with his national security staff about something else completely. But at some point, he puts down his index cards, and he says, “Has anybody seen this movie War Games?†And nobody has. It had just come out.
He launches into this very detailed plot description. People are looking around the room like, where is this going? He turns to General John Vessey, who is the Chairman of the Joint Chiefs of Staff. He said, “General, could something like this really happen?†The general says, “I’ll look into that, Mr. President,†like generals do. He comes back a week later and says, “Mr. President, the problem is much worse than you think.†This leads, 10 months later, to the presidential signing of the first national security directive on communications and computer security. It reads very much like government papers you read today: “Our computer systems,†which were then just going up, “are vulnerable to electronic interference and interception by foreign powers, by criminals.†But then it takes an interesting step.
.....
The two guys writing this movie – who also later wrote a movie called Sneakers, which also had some impact – had heard from some friends who were hackers, about this technique called war dialing, or demon dialing. This is before the internet, where you program a phone to dial every number in an area code, and it rings twice. If a modem picks up, it squawks. The program records what that number is so you can come back to it later. That’s how Matthew Broderick breaks into the NORAD computer in the game. But they are wondering, is this plausible? I mean, wouldn’t it be a closed network? They lived in Santa Monica, which is where the RAND Corporation was. They called up the Public Affairs Department, laid out their problems. They said, “Oh, you want to talk to Willis Ware.†They go meet with Willis Ware, who is a very nice, genial guy. He listens to their problem, and he says, “You know, it’s funny, I designed the software for that computer in real life.†And he says, “You know, you’re right. It’s a closed system. But there’s always some officer who wants to work at home on the weekends, so they leave a port open. And yeah, if somebody dialed into that number, it could happen.†Then he said something that in retrospect, is very profound. He said, “You know what people don’t realize is the only completely secure computer is a computer that no one can use.â€
......