A friendly reminder (VPN)

Please disconnect from your VPN's server if normal browsing.. Or use a private tab & browser (Brave, etcetc).

Just a friendly reminder /!\

/!\ PSA - Disconnect from your VPN server to let others browse at faster speeds. We need bandwidth too!

Thx.
No
 
Thats fine, which is why "normal browsing" is stated. Some people watch youtube and even try to cashapp tx and ask "why did my cash app tx get denied".

So the "ISP" and "its my right" i understand. But sometimes, disconnect ;)

Also, check if your ISP hardware is made by huawei ;)
 
Nice, a few routers have that avil. and yes, i need that bandwidth. Seems like more people have problems turning it off than turning it on. Check those posts "why did my tx get denied" Lol
 
Nice, a few routers have that avil. and yes, i need that bandwidth. Seems like more people have problems turning it off than turning it on. Check those posts "why did my tx get denied" Lol
They are using known VPNs. You could set-up your own in Cloudflare that you had set up with a VPN on a public network :cool:
 
Please disconnect from your VPN's server if normal browsing.. Or use a private tab & browser (Brave, etcetc).

Just a friendly reminder /!\

/!\ PSA - Disconnect from your VPN server to let others browse at faster speeds. We need bandwidth too!

Thx.
what are you, retarded?
 
Since I was given negative feedback on the post above let me clarify because I was thinking of a vpn from a commercial tracker side of it. From a law enforcement side yes they would obviously track by IP.

HOWEVER

Increasingly law enforcement uses commercial intel databases to get information about suspects. And IP addresses are the least of your worries from that.

A VPN is the lazy way of attempting to not be tracked. If your security threat involves law enforcement you better be using TAILS or whonix from a public wifi.
 
Since I was given negative feedback on the post above let me clarify because I was thinking of a vpn from a commercial tracker side of it. From a law enforcement side yes they would obviously track by IP.

HOWEVER

Increasingly law enforcement uses commercial intel databases to get information about suspects. And IP addresses are the least of your worries from that.

A VPN is the lazy way of attempting to not be tracked. If your security threat involves law enforcement you better be using TAILS or whonix from a public wifi.
Public wifi allows the possibility for packet data interception. An obfuscated home network with Ethernet connection will be far superior to public wifi unless you’re war driving.
 
Public wifi allows the possibility for packet data interception. An obfuscated home network with Ethernet connection will be far superior to public wifi unless you’re war driving.

You would use a VPN on the public wifi. The data would be completely encrypted. But for the same reason you don't use your home connection, its not foolproof and if it drops it would expose you. Same way using your home connection would then expose your real ip.

But we're talking about protecting yourself from law enforcement not random hackers. Actually you can protect from both at the same time using public wifi using whonix os.

Long story short using whonix it's virtually impossible for someone to see what you're doing over public wifi.
 
You would use a VPN on the public wifi. The data would be completely encrypted. But for the same reason you don't use your home connection, its not foolproof and if it drops it would expose you. Same way using your home connection would then expose your real ip.

But we're talking about protecting yourself from law enforcement not random hackers. Actually you can protect from both at the same time using public wifi using whonix os.

Long story short using whonix it's virtually impossible for someone to see what you're doing over public wifi.
Packet data is only encrypted before TCP pass off and anything after that can be used by LE to build identifying metadata as you had mentioned in one of your other threads.

This is why you TCP encrypt with kernel level implementations on your home network.

I’d put 10k cash down as well as pay for travel after you successfully pulled any, ANY, data from my home network communications that could be used to identify anything on my network and not, let’s say for shits and giggles, my neighbors, on the same ISP.

Edit: the part about whonix not being susceptible is also untrue in the misleading sense; an attacker would still have access to data but much less than let’s say a windows system or standard Linux distro.

Qubes is the answer to this as an attacker would only have access to the Qube they would lead back to through network access (if obtained) and then would stop there assuming your OS is properly set up
 
Packet data is only encrypted before TCP pass off and anything after that can be used by LE to build identifying metadata as you had mentioned in one of your other threads.

This is why you TCP encrypt with kernel level implementations on your home network.

I’d put 10k cash down as well as pay for travel after you successfully pulled any, ANY, data from my home network communications that could be used to identify anything on my network and not, let’s say for shits and giggles, my neighbors, on the same ISP.
I started taking cyber security much more seriously after my first door kick lol
 
Packet data is only encrypted before TCP pass off and anything after that can be used by LE to build identifying metadata as you had mentioned in one of your other threads.

This is why you TCP encrypt with kernel level implementations on your home network.

I’d put 10k cash down as well as pay for travel after you successfully pulled any, ANY, data from my home network communications that could be used to identify anything on my network and not, let’s say for shits and giggles, my neighbors, on the same ISP.

Edit: the part about whonix not being susceptible is also untrue in the misleading sense; an attacker would still have access to data but much less than let’s say a windows system or standard Linux distro.

Qubes is the answer to this as an attacker would only have access to the Qube they would lead back to through network access (if obtained) and then would stop there assuming your OS is properly set up

Ah shit I was literally confusing whonix for qubes. I'm an idiot. Probably mixed them up in my head because qubes is built with whonix.

Also it's technically possible to wirelessly pull data from an Ethernet cable. Not feasible but that's much of the cybersecurity researcher world which I warn people against.

You will hear or read something sensational and freak out trying to protect yourself against it. But if you dig into it it's almost always ever only in a lab environment.

Also I don't know how/why you were caught but it's almost certainly not from some high tech data sniffing packet captures but failed opsec or a rat. Unless you were targeted by high level feds.
 
Ah shit I was literally confusing whonix for qubes. I'm an idiot. Probably mixed them up in my head because qubes is built with whonix.

Also it's technically possible to wirelessly pull data from an Ethernet cable. Not feasible but that's much of the cybersecurity researcher world which I warn people against.

You will hear or read something sensational and freak out trying to protect yourself against it. But if you dig into it it's almost always ever only in a lab environment.

Also I don't know how/why you were caught but it's almost certainly not from some high tech data sniffing packet captures but failed opsec or a rat. Unless you were targeted by high level feds.
Unfortunately, I was targeted by high level feds. It wasn’t anything drug or “criminal” related in the typical sense; internet crimes.
 
Unfortunately, I was targeted by high level feds. It wasn’t anything drug or “criminal” related in the typical sense; internet crimes.
Whelp fucking RIP lol. Not much you can do about feds. I teach that if your threat level is US federal you're likely done for.

It's not impossible but you have to take extraordinary measures. But 99% of the time being busted is failed opsec. Human error.
 
Back
Top