Guest wrote:Have you seen his threat on Dribbles Stooo?
Stooo wrote:Guest wrote:Have you seen his threat on Dribbles Stooo?
So he sees a post that he doesn't like, screengrabs it, posts it on another forum and asks for it to be deleted from here yet it's on another forum and posted by himself?
Guest wrote:Stooo wrote:Guest wrote:Have you seen his threat on Dribbles Stooo?
So he sees a post that he doesn't like, screengrabs it, posts it on another forum and asks for it to be deleted from here yet it's on another forum and posted by himself?
Stooo, you should unlock the "Dear All" thread, am not even sure why it needed to be locked? There are revelations coming that you will be very interested in reading
Guest wrote:Stooo wrote:Guest wrote:Have you seen his threat on Dribbles Stooo?
So he sees a post that he doesn't like, screengrabs it, posts it on another forum and asks for it to be deleted from here yet it's on another forum and posted by himself?
Stooo, you should unlock the "Dear All" thread, am not even sure why it needed to be locked? There are revelations coming that you will be very interested in reading
“The drug trafficking organization targeted in Operation Adam Bomb was distributing dangerous and addictive drugs to every corner of the world, and trying to hide their activities through the use of advanced anonymizing on-line technology,” said Briane M. Grey, DEA Acting Special Agent in Charge. “Today’s action should send a clear message to organizations that are using technology to conduct criminal activity that the DEA and our law enforcement partners will track them down and bring them to justice.”
trinity wrote:DEA Busts TOR-Operated “Farmer’s Market” Drug Market Place
Posted on April 16, 2012 by emptywheel
The DEA arrested 8 named and 7 unnamed people today in what it says is the first TOR-operated drug bust.
“The drug trafficking organization targeted in Operation Adam Bomb was distributing dangerous and addictive drugs to every corner of the world, and trying to hide their activities through the use of advanced anonymizing on-line technology,” said Briane M. Grey, DEA Acting Special Agent in Charge. “Today’s action should send a clear message to organizations that are using technology to conduct criminal activity that the DEA and our law enforcement partners will track them down and bring them to justice.”
Tor (short for The onion router)
Stooo wrote:trinity wrote:DEA Busts TOR-Operated “Farmer’s Market” Drug Market Place
Posted on April 16, 2012 by emptywheel
The DEA arrested 8 named and 7 unnamed people today in what it says is the first TOR-operated drug bust.
“The drug trafficking organization targeted in Operation Adam Bomb was distributing dangerous and addictive drugs to every corner of the world, and trying to hide their activities through the use of advanced anonymizing on-line technology,” said Briane M. Grey, DEA Acting Special Agent in Charge. “Today’s action should send a clear message to organizations that are using technology to conduct criminal activity that the DEA and our law enforcement partners will track them down and bring them to justice.”
Tor (short for The onion router)
Yep, TOR. The network used by the CIA and other covert agencies. Who do you think runs the exit nodes?
trinity wrote:Stooo wrote:trinity wrote:DEA Busts TOR-Operated “Farmer’s Market” Drug Market Place
Posted on April 16, 2012 by emptywheel
The DEA arrested 8 named and 7 unnamed people today in what it says is the first TOR-operated drug bust.
“The drug trafficking organization targeted in Operation Adam Bomb was distributing dangerous and addictive drugs to every corner of the world, and trying to hide their activities through the use of advanced anonymizing on-line technology,” said Briane M. Grey, DEA Acting Special Agent in Charge. “Today’s action should send a clear message to organizations that are using technology to conduct criminal activity that the DEA and our law enforcement partners will track them down and bring them to justice.”
Tor (short for The onion router)
Yep, TOR. The network used by the CIA and other covert agencies. Who do you think runs the exit nodes?
"Operation Black Tulip"
"Operation Black Tulip" security audit launched by the Dutch government finds that some of the 531 bad certificates were used to compromise at least 300,000 Iranian IP addresses.
By Mathew J. Schwartz InformationWeek
September 06, 2011 12:20 PM
On Monday, Fox-IT, the security auditors investigating the false digital certificates issued by Dutch certificate authority DigiNotar, released a preliminary report finding that the extent and duration of the breach was much more severe than had previously been disclosed.
In particular, attackers could have used the stolen certificates to spy on users of popular websites for weeks, without their being able to detect it. "It's at least as bad as many of us thought," said Chester Wisniewski, a senior security advisor at Sophos Canada, in a blog post. "DigiNotar appears to have been totally owned for over a month without taking action, and they waited another month to take necessary steps to notify the public."
Likewise, the list of fraudulent digital certificates obtained from DigiNotar has been growing, expanding to include not just Facebook, Google, Microsoft, Skype, Twitter, and WordPress, but also the CIA, MI6, and Mossad intelligence services, as well as the pro-privacy Tor Project.
The first known certificate to be stolen dates from July 10, 2011. But while DigiNotar learned about the fraudulently issued certificates sometime later, it only made a public acknowledgement after Google users began experiencing related attacks. As the scale of the breach became clear, last week the Dutch government--which maintains a digital ID system based on DigiNotar-issued certificates--seized control of the certificate authority, commissioned Fox-IT to begin an immediate audit, dubbed "Operation Black Tulip," and warned Dutch residents that the identity system could no longer be trusted.
The Tor Project, working with the Dutch government, has been maintaining a full list of all compromised certificates, which currently number 531, although security experts expect that number to grow. The list includes intermediary certificate authorities (CAs), including Comodo, Equifax, Thawte, and VeriSign root certificate issuers, which are sites that can be used to issue new certificates.
http://www.informationweek.com/news/sec ... /231600810
I love ToR's Anonymous statement;
On March 12th, 2012 Anonymous said:
Well if people think Tor is linking to the CIA and are not themselves working for the CIA, Hence the hate of Tor then all they need to do is load up MS-Fiddler2 and set the gateway as Tor and then point their browser at Fiddler.
What does seem to be missing from Tor is redundancy so that services can be kept running by sharing the service between several users to keep an onion site up and running.
Maybe it can be done by simply sharing the Hostname file between sever machines that replicate the same sites but this is something that will need to be addresses at some stage because too many of the links are dead.
Must go and meet my MOSSAD friends now
https://blog.torproject.org/comment/reply/535/14570
Stooo wrote:
I've used TOR to disguise my IP but it's as slow as fuck. Exit nodes can get a path and if you're fucking around you cold get a visit.
TOR, seriously?
Return to The Sleeping Dogs' Arms
Users browsing this forum: No registered users and 77 guests