New UGL called AgentYes

Goodness GRT that's pretty strong introductory rhetoric for your first few posts, BUT I wanna welcome you to MESO, as is, mate!

:)

I have only belong to a total of three boards.. two of the boards I belonged to are no longer on line. and the other I refuse to be a part of.. The board I belong to now is my home board.. I usually do not stray far from my home board so to speak. But cem-meso has all ways put out good products and I have always read the threads in this board..

I just found it very suspect that someone would come to a board that does not sponsor a a certain lab and BASICALLY promote them.. Promoting something does not have to be always in the fashion of hey this lab is spot on bet products around.. Simple mentioning of said labs name is promotion enough to make people possibly search out said lab..

And to do something like that without verification of quality and a long standing reliable service is very suspect behavior to me.. I think it is another way how esp new guys get burnt.. in this game.. And I find it to be in very bad fucking taste.. Dude wants to say I am trying to smear him or whatever, well it is what it is..

People in this game need to wake the fuck up and stop taking unnecessary risks guys are already taking enough risk. We as a community should be ensuring that quality products and reliable service is being provided before we start blasting their name all over the fucking place.. I mean fuck this lab has only come on the on line scene for about a month to 2 months now. How the fuck can someone say that they are fucking legit????

This type of shit does nothing but give the people who are against this life style more bricks and mortar to build their case that we are nothing but scum. And that is the furthest thing from the truth. Although there is a substantial amount of shitty people in this game I would like to think the vast majority are good people who only want to improve upon their lifestyle. It may not be the norm but it can be safe and a responsible life style.
 
GRT- chill out on the rhetoric man. The point of this sub forum is to discuss these matters. Believe it or not, some of the newbies (myself included) need MORE not less information about the availability of gear. We aren't going to just walk around and tap every buff guy on the shoulder who happens to look like they have a HGH forehead and say "hey do you know where I can buy roids?" Everyone (buyers and sellers) know the risks involved in this game so stop trying to censor the forum and let us do our own diligence and make our own decisions. We are big boys (and girls.)
 
GRT- chill out on the rhetoric man. The point of this sub forum is to discuss these matters. Believe it or not, some of the newbies (myself included) need MORE not less information about the availability of gear. We aren't going to just walk around and tap every buff guy on the shoulder who happens to look like they have a HGH forehead and say "hey do you know where I can buy roids?" Everyone (buyers and sellers) know the risks involved in this game so stop trying to censor the forum and let us do our own diligence and make our own decisions. We are big boys (and girls.)

Seeing as you probably lack the understanding of the word rhetoric. You might want to look it up prior to using it. JFYI.

Second. If you think open publication of sources is safe, smart or any of the other words related in that grouping of synonyms. Then you are part of the problem. It is only but apparent LE watches these forums. and any forum for that matter. And if you like taking any further risks that are not necessary then I guess you deserve anything that comes your way..

And you can tell your maturity level in relation to your GH forehead comment. Instances only happen in extreme cases usually due to abuse of hormones. You are a prime example of why things need to be more secure in this lifestyle. Because that is what it truly is a lifestyle.

Yes there are risks inherent to doing business in this fashion but with every risk there are steps everyone should take to minimize those risks not only for oneself but for the community as a whole.. And you sound like someone who is only concerned about yourself. When everything gets turned up side down again like it was back in 06-07 during ORD maybe then you will be like fuck and the little light will turn on for you..

It don't really matter to me though I suppose I get my products legally through my DR. So I don't really have to worry about the risks inherent in this "game" directly affecting me..

Best of luck to you buddy. And I am not trying to censor any information for people I am only asking people to use their fucking heads.
 
Last edited:
GRT
It favors no one on this forum when your remarks are consistently trite condescending and impersonal especially when directed at other Meso mates, whose opinions or sentiments may differ from yours.

Apparently you have an AX to grind, which is fine, yet may I suggest you not use other members, unless familiar with the particulars, as your indiscriminate chopping block.
Jim
 
2nd This sponsor has shown he/she is a security risk she posts her information on the forums using her phone. Yes there are downloads that do mitigate some risks for phone use but lets be honest. If said sponsor had its own safety as its utmost concern they would not be doing something as amateurish as that. Not to include they are putting possible customers at risk by doing business in such a manner.

I know nothing about the security practices of this particular person, but it raises a good question: Why would the use of TOR or VPN be any less secure over mobile network?
 
I know nothing about the security practices of this particular person, but it raises a good question: Why would the use of TOR or VPN be any less secure over mobile network?

A user generally has less control over what information leaks from a phone than a normal operating system. This is a technical argument I doubt he is even aware of.

Tor should not be used to process sensitive information unless the website someone is communicating with allows HTTPS connections. None of the websites AgentYes was listed as participating on allow HTTPS connections. Using tor without https represents a strong security threat to any data which is being passed in plain text.

Tor-onion-network.png


In the graphic above Alice wants to access Bob's web server. Alice's communications from her home to the first tor node, first node to the second node, and second node to the third node are secure. When Alice's communications leave the third and final tor node if Alice in not using a website which supports HTTPS her communications can be snooped on by the operator of the third tor node operator. A malicious tor exit node operator can sniff any sensitive data leaving the node. Someone within the US government didn't understand the limitations of tor leaked sensitive passwords to a tor exit node operator.

Security expert used Tor to collect government e-mail passwords | Ars Technica
 
Great post Millard, but aren't HTTP (S)? connections the current web standard, (understand my existing computer savvy only extends to the keyboard, lol!)
Thx
:)
 
A user generally has less control over what information leaks from a phone than a normal operating system. This is a technical argument I doubt he is even aware of.

Tor should not be used to process sensitive information unless the website someone is communicating with allows HTTPS connections. None of the websites AgentYes was listed as participating on allow HTTPS connections. Using tor without https represents a strong security threat to any data which is being passed in plain text.

Tor-onion-network.png


In the graphic above Alice wants to access Bob's web server. Alice's communications from her home to the first tor node, first node to the second node, and second node to the third node are secure. When Alice's communications leave the third and final tor node if Alice in not using a website which supports HTTPS her communications can be snooped on by the operator of the third tor node operator. A malicious tor exit node operator can sniff any sensitive data leaving the node. Someone within the US government didn't understand the limitations of tor leaked sensitive passwords to a tor exit node operator.
<snip>

TOR? Who the hell uses TOR anymore? Why would any professional retailer, wholesaler, or even end user use TOR? TOR is only anonymous as long as it is not used. Anyone who will do more than LOOK at things on the internet does not use TOR.

If your condescending tone weren't enought to show how vastly superior in intelligence you consider yourself than anyone else posting in this thread, your post I quoted here surely is.

I see that you did not respond to the direct inquiry about VPNs. Perhaps you thought no one would notice you only answering the one half of a question that you could answer without showing the foolishness of your original claims.

VPNs are just as secure over mobile devices as they are over standard networks. Please, post a colorful picture proving that they aren't. There are many elders "in the game' and "in the lifestyle" that freely pass on information regarding security and how to best protect ourselves on both ends transactions and communications. For someone with such history you show a complete lack of knowledge on this topic.

You not only assume "that bitch" doesnt understand basic security/privacy protocols, you also assume no one else reading this eight page spectacle of yours does either.

You mysteriously appear here after (was it) years (?) of lurking out of concern for everyone's security? If that were the case surely you would have accomplished more by posting a thread or two outlining basic security techniques and practices we all can use to stay as safe as possible. Of course, that would not have given you the chance to go of on "that bitch". Your transparency is laughable. Please, try to cover yourself up with the cloak of concern. You fool no one.

"That bitch" has an awfully personal ring to it doesn't it? I can't remember the last time I referred to anyone as "that bitch". I can assure you though that the last time I did, it was regarding a female I have had my dick in more than once. It was not addressed towards some random stranger or strange enterprise on the internet. But please, tell us again how you have no personal agenda here.

Cheers :)
 
Last edited:
Great post Millard, but aren't HTTP (S)? connections the current web standard, (understand my existing computer savvy only extends to the keyboard, lol!)
Thx
:)

Most boards unfortunately do not use https. I wish they would. I made a feature request on a board to allow https but the request was ignored.

TOR? Who the hell uses TOR anymore? Why would any professional retailer, wholesaler, or even end user use TOR? TOR is only anonymous as long as it is not used. Anyone who will do more than LOOK at things on the internet does not use TOR.

If your condescending tone weren't enought to show how vastly superior in intelligence you consider yourself than anyone else posting in this thread, your post I quoted here surely is.

I see that you did not respond to the direct inquiry about VPNs. Perhaps you thought no one would notice you only answering the one half of a question that you could answer without showing the foolishness of your original claims.

VPNs are just as secure over mobile devices as they are over standard networks. Please, post a colorful picture proving that they aren't. There are many elders "in the game' and "in the lifestyle" that freely pass on information regarding security and how to best protect ourselves on both ends transactions and communications. For someone with such history you show a complete lack of knowledge on this topic.

You not only assume "that bitch" doesnt understand basic security/privacy protocols, you also assume no one else reading this eight page spectacle of yours does either.

You mysteriously appear here after (was it) years (?) of lurking out of concern for everyone's security? If that were the case surely you would have accomplished more by posting a thread or two outlining basic security techniques and practices we all can use to stay as safe as possible. Of course, that would not have given you the chance to go of on "that bitch". Your transparency is laughable. Please, try to cover yourself up with the cloak of concern. You fool no one.

"That bitch" has an awfully personal ring to it doesn't it? I can't remember the last time I referred to anyone as "that bitch". I can assure you though that the last time I did, it was regarding a female I have had my dick in more than once. It was not addressed towards some random stranger or strange enterprise on the internet. But please, tell us again how you have no personal agenda here.

Cheers :)

Tor provides excellent anonymity for free which is how places like the wikileaks, the silk road, and child pornography tor sites have thrived. It would not be practical for places like them to send and receive data without tor. The fact that they do exist is evidence of how well tor does indeed work.

FBI halted one child porn inquiry because Tor got in the way | Ars Technica
https://www.muckrock.com/foi/united...ketplace-doj-801/#367226-responsive-documents
WikiLeaks:Tor - WikiLeaks

VPNs work reasonably well but they can be sued by governments and compelled to give up sensitive user data. I subscribed to perfect privacy for a few years and was satisfied with their service. They have a legal fund to fight off government inquires for subscriber data. If the US government wants a subscribers information enough they can sue the owner of perfect privacy and put him out of business. An example would be someone like Julian Assange subscribing to a small VPN provider. The US government could bankrupt them to get access to his account information. An NSA employee could hack the single server the subscriber is using and determine who a hot target is. Fewer people use paid VPNs than tor so the anonymity is less strong than the anonymity provided by tor. Data jumps through more nodes on the tor network too making it more difficult to work backwards to locate the source of any provocative data.

https://www.perfect-privacy.com/faq.html#faq2

This presentation was put together by the tor project for the FBI. It has a lot of good graphics and can help someone to understand the difference difference between tor and VPNs.

https://svn.torproject.org/svn/projects/presentations/2012-01-17-FBI-presentation.pdf

As to all of your boring personal attacks on me, I've never referred to anyone here as "bitch," proclaimed myself to be smarter than anyone else, or been condescending to Millard. Millard's an intelligent guy and I enjoy chatting with him. Believe it or not referring to someone as bitch can cause you to lose your life some places I've been. The only other person I see using the words "that bitch" besides yourself is getright1time. He and I are not the same person.
 
Most boards unfortunately do not use https. I wish they would. I made a feature request on a board to allow https but the request was ignored.



Tor provides excellent anonymity for free which is how places like the wikileaks, the silk road, and child pornography tor sites have thrived. It would not be practical for places like them to send and receive data without tor. The fact that they do exist is evidence of how well tor does indeed work.

FBI halted one child porn inquiry because Tor got in the way | Ars Technica
https://www.muckrock.com/foi/united...ketplace-doj-801/#367226-responsive-documents
WikiLeaks:Tor - WikiLeaks

VPNs work reasonably well but they can be sued by governments and compelled to give up sensitive user data. I subscribed to perfect privacy for a few years and was satisfied with their service. They have a legal fund to fight off government inquires for subscriber data. If the US government wants a subscribers information enough they can sue the owner of perfect privacy and put him out of business. An example would be someone like Julian Assange subscribing to a small VPN provider. The US government could bankrupt them to get access to his account information. An NSA employee could hack the single server the subscriber is using and determine who a hot target is. Fewer people use paid VPNs than tor so the anonymity is less strong than the anonymity provided by tor. Data jumps through more nodes on the tor network too making it more difficult to work backwards to locate the source of any provocative data.

https://www.perfect-privacy.com/faq.html#faq2

This presentation was put together by the tor project for the FBI. It has a lot of good graphics and can help someone to understand the difference difference between tor and VPNs.

https://svn.torproject.org/svn/projects/presentations/2012-01-17-FBI-presentation.pdf

As to all of your boring personal attacks on me, I've never referred to anyone here as "bitch," proclaimed myself to be smarter than anyone else, or been condescending to Millard. Millard's an intelligent guy and I enjoy chatting with him. Believe it or not referring to someone as bitch can cause you to lose your life some places I've been. The only other person I see using the words "that bitch" besides yourself is getright1time. He and I are not the same person.


LOL ofshore preferably Sweden but yeah no one would be smart enough to do that. Right? And again, that has nothing to do with why posting from a phone is somehow more of a security risk. Awesome way to not answer a direct question. Again.
 
Lol. Offshore preferably Sweden and it is extremely easy to discover which VPNs do not keep logs. There is nothing for them TO give to anyone. You again did not answer the question directly asked by several posters. HOW exactly is posting from a phone more of a risk than posting from a traditional computer network?

Let's see how you don't answer the question again. Talk about boring.
 
Lol. Offshore preferably Sweden and it is extremely easy to discover which VPNs do not keep logs. There is nothing for them TO give to anyone. You again did not answer the question directly asked by several posters. HOW exactly is posting from a phone more of a risk than posting from a traditional computer network?

Let's see how you don't answer the question again. Talk about boring.

It's easy to see who says they don't keep logs. It's also easy for one of their servers to be compromised by law enforcement. Sweeden isn't a haven for illicit activity from the United States government. I have a lot of experience operating there. AAS aren't legal in Sweeden.

https://torrentfreak.com/swebits-bittorrent-tracker-shuts-down-following-uploaders-arrest-110301/
https://www.ncbi.nlm.nih.gov/pubmed/22269132

Cell phone traffic is routed through a cell phone provider who knows who and where you are 24 hours a day which is not ideal. For tor to work correctly it uses it's own stand alone bundle which is preconfigured to route all traffic over the tor network in a script free environment unlike a cell phone app. Plugins and scripts like flash and javascript can connect to the internet outside of a proxy despite using a VPN. DNS lookups are often routed outside of VPNs revealing the sites a user is visiting despite using a VPN.

Visiting a page that says your ip is now something other than the one you normally subscribe to doesn't mean all traffic is now secured. A computer user can setup an OpenVPN connection at the router then use tor inside of the already proxied connection adding more layers of security than are possible with a phone. A computer generally has more flexibility, tools, and configurability than a phone.
 
Last edited:
Cell phone traffic is routed through a cell phone provider who knows who and where you are 24 hours a day which is not ideal. For tor to work correctly it uses it's own stand alone bundle which is preconfigured to route all traffic over the tor network in a script free environment unlike a cell phone app. Plugins and scripts like flash and javascript can connect to the internet outside of a proxy despite using a VPN. DNS lookups are often routed outside of VPNs revealing the sites a user is visiting despite using a VPN.

Visiting a page that says your ip is now something other than the one you normally subscribe to doesn't mean all traffic is now secured. A computer user can setup an OpenVPN connection at the router then use tor inside of the already proxied connection adding more layers of security than are possible with a phone. A computer generally has more flexibility, tools, and configurability than a phone.
Great information, Banner!

What about Orbot? It claims to route all traffic through Tor on a rooted Android mobile phone

http://guardianproject.info/apps/orbot
 
It's easy to see who says they don't keep logs. It's also easy for one of their servers to be compromised by law enforcement. Sweeden isn't a haven for illicit activity from the United States government. I have a lot of experience operating there. AAS aren't legal in Sweeden.

https://torrentfreak.com/swebits-bittorrent-tracker-shuts-down-following-uploaders-arrest-110301/
https://www.ncbi.nlm.nih.gov/pubmed/22269132

Cell phone traffic is routed through a cell phone provider who knows who and where you are 24 hours a day which is not ideal. For tor to work correctly it uses it's own stand alone bundle which is preconfigured to route all traffic over the tor network in a script free environment unlike a cell phone app. Plugins and scripts like flash and javascript can connect to the internet outside of a proxy despite using a VPN. DNS lookups are often routed outside of VPNs revealing the sites a user is visiting despite using a VPN.

Visiting a page that says your ip is now something other than the one you normally subscribe to doesn't mean all traffic is now secured. A computer user can setup an OpenVPN connection at the router then use tor inside of the already proxied connection adding more layers of security than are possible with a phone. A computer generally has more flexibility, tools, and configurability than a phone.

A list of who says they don't is equally safe cell phone or not cell phone. No one is saying there is any way to be completely safe and anonymous. We are taking about reducing risks and you claim cell phones are much riskier. Whether a Vpn provider keeps logs or not has nothing to do with cell phone vs traditional network. VPNs safety ultimately may come down to the provider... but that is not cell phone exclusive and therefore irrelevant. You are bringing this up be because? Oh yes to say more things that are true but unrelated while not answering the question.

Sweden is best because of its PRIVACY LAWS. Not because of their AAS laws. Let me guess you are an ambassador to Sweden? Lol Your great experience operating there. Um yeah RIGHT or you would have known the reason it s a desirable country. No one said it was a haven for illicit activity. I said it is a desirable host country for a VPN. Most of us use numerous VPN With numerous host countries that was just a tidbit for anyone first looking into this.

Who said anything about a cell phone app?
Lol that is not the best way to put a Vpn on a phone. Its a very easy setting you just need the server address and login no app required. If you mean the apps to use tor from your phone.... again no different than tor itself from your PC.

Your cell phone provider know where you are at all times? What? Proxies hide the sites you visit from your online provider. They do not know which sites you are visiting when you have your phone properly set up.

You lose.
goodbye you have literally bored me to sleep. Please stop being such a dick. It doesn't go well with your misinformation. Cocky can only ever be pulled off succesfully when there are goods to back it up. You fail. Time to play nicer.
 
Last edited:
You lose.
goodbye you have literally bored me to sleep. Please stop being such a dick. It doesn't go well with your misinformation. Cocky can only ever be pulled off succesfully when there are goods to back it up. You fail. Time to play nicer.
Why the hostility? This is an important topic. We're all trying to learn. It sounds like you have experience with topic at hand but what's with your approach to sharing it?
 
Great information, Banner!

What about Orbot? It claims to route all traffic through Tor on a rooted Android mobile phone

Orbot: Mobile Anonymity + Circumvention | The Guardian Project

My knee jerk reaction is it's excellent so long as someone has the technical capicity to root their phone, is connecting to their destination via https, and they have a stand alone browser which insulates itself from malicious plugins.

A list of who says they don't is equally safe cell phone or not cell phone. No one is saying there is any way to be completely safe and anonymous. We are taking about reducing risks and you claim cell phones are much riskier. Whether a Vpn provider keeps logs or not has nothing to do with cell phone vs traditional network. VPNs safety ultimately may come down to the provider... but that is not cell phone exclusive and therefore irrelevant. You are bringing this up be because? Oh yes to say more things that are true but unrelated while not answering the question.

I answered your question and provided examples of why a PC is superior to a cell phone for communicating over the internet via proxy which you're choosing to ignore.

Sweden is best because of its PRIVACY LAWS. Not because of their AAS laws. Let me guess you are an ambassador to Sweden? Lol Your great experience operating there. Um yeah RIGHT or you would have known the reason it s a desirable country. No one said it was a haven for illicit activity. I said it is a desirable host country for a VPN. Most of us use numerous VPN With numerous host countries that was just a tidbit for anyone first looking into this.

Sweden cooperates with the US government and has arrested some of my friends on behalf of the US government for crimes they committed online. This fantasy you have about them being a great place to route any unlawful data is just that. Sweden is anti AAS.

Man arrested for having big muscles - The Local
https://blogmuscle.wordpress.com/2007/08/13/sweden-man-arrested-for-having-big-muscles/

Who said anything about a cell phone app?
Lol that is not the best way to put a Vpn on a phone. Its a very easy setting you just need the server address and login no app required. If you mean the apps to use tor from your phone.... again no different than tor itself from your PC.

The phone environment is different from a PC environment. The applications and resources they use are not the same. Do you not realize that there is an application within your phone which enables you to use a VPN?

Your cell phone provider know where you are at all times? What? Proxies hide the sites you visit from your online provider. They do not know which sites you are visiting when you have your phone properly set up.

Yes, your provider knows where you are. If a phone is properly configured it can be reasonably secure. It's more difficult to lock down a cell phone and verify/defend against leaks than a PC.

Your Cellphone Is Spying on You - Reason.com
Government Location Tracking: Cell Phones, GPS Devices, and License Plate Readers | American Civil Liberties Union
 
Very informative Banner!
:)

A good place to get a primer on computer security topics which are relevant to our interests is the Electronic Frontier Foundation's Surveillance Self Defense page:
https://ssd.eff.org/tech

Although it's not as in depth as it could be it's unintimidating and well written.
 
Back
Top