Advertisement
Guest User

Untitled

a guest
Sep 25th, 2017
76
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.05 KB | None | 0 0
  1. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
  2.  
  3. THE TRUTH ABOUT ONLINE BUSTS
  4.  
  5. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
  6.  
  7. MYTH: It's easy for law enforcement to trace people online.
  8.  
  9. FACT: This is not so unless you take zero precautions. Bouncing off any kind of
  10. proxy will significantly hinder law enforcement. Bouncing off anything that
  11. scrubs and then forgets your IP address makes tracing you via the network
  12. nearly impossible once you have ceased sending traffic. Everyone who gets
  13. caught is caught by traditional police-work or by following a trail of logged
  14. IP addresses. While it is possible to carry out timing correlation attacks
  15. against low-latency networks such as Tor, these are only within the
  16. capabilities of intelligence agencies. There is no credible evidence so suggest
  17. that these capabilities have been used to identify hackers, warez groups or
  18. virus authors and they will certainly not be used against ordinary peer-to-peer
  19. users.
  20.  
  21. MYTH: Uploading files anonymously is safe as long as my IP address is safe.
  22.  
  23. FACT: Traditional police-work (which LE is very good at) includes examining
  24. meta-data of documents. Uploading files that can be linked back to you is a
  25. good way to get busted. Most 'computer forensics' focuses on retrieving data
  26. from hard-disks and scouring files for meta-data.
  27.  
  28. MYTH: My group will never be infiltrated.
  29.  
  30. FACT: This kind of thinking is what gets people busted. They allow
  31. incriminating information (this includes IP addresses) to leak to associates
  32. within a group. The group is infiltrated, and soon everyone is fucked.
  33.  
  34. MYTH: It's safer to be a "reverse engineer" and crack without releasing.
  35.  
  36. FACT: You are more likely to be busted due to being narced out by someone
  37. peeping over your shoulder than being traced through bnc's by supposed FBI
  38. magic, and cracking on your own machine is still illegal in the USA (with a
  39. few narrow exemptions), regardless of how innocent your intentions are.
  40.  
  41. MYTH: Most traffic on the Internet is logged.
  42.  
  43. FACT: This is not even remotely true. Most traffic is not logged, because there
  44. is simply too much of it to be stored. The establishment of a connection to a
  45. server is generally permanently logged at the server, but rarely at the point
  46. of origin. Firewalls and routers are not going to permanently log
  47. ordinary-looking forwarded connections because there are simply too many of
  48. them. Some data payloads may be logged during transit and at the receiving
  49. end. If you go through three hosts on the Tor network, your packets travel
  50. through many routers, and are encrypted at each point. Most of the time, these
  51. packets are not logged anywhere anyway. There is no way for someone to
  52. practically follow your trail through all of these routers, and nor can your
  53. connections be logged at all of these routers indefinitely. You are most likely
  54. to be identified by going through several rogue, cooperating Tor nodes
  55. simultaneously, which is unlikely unless LE takes over the directory server.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement