Cambodia Blocks Websites for Child Pornography
- RorschachRev
- Expatriate
- Posts: 26
- Joined: Wed Dec 15, 2021 12:17 am
- Reputation: 6
Re: Cambodia Blocks Websites for Child Pornography
Tor is limited to encryption of TCP data. UDP based requests (like DNS) are outside the scope of Tor. That includes certain protocols for streaming videos, RDP, etc. Basically Tor encrypts "most" traffic, but is extremely limited in scope. If you ping a machine while using Tor, the ping is not encrypted, the DNS lookup is not encrypted, etc. There are projects that I heard about years ago that tried to encapsulate all traffic in a TCP router using Tor, but I don't know if they were successful. Back in 2018 I was deeply interested in the concept of mesh networks, a peer to peer data exchange. The idea was being paid for bandwidth you offer to people around you, regardless of hardware connection. The system *could not* work because of the way that networking relationships are formed (at the device level, not the protocol level). If you could combine blockchain, root everyone's phone, create a series of VPNs based on blockchain addresses, fix the way Tor works to be more secure and complete, and then somehow merge all of that stuff it might work. In the meantime, expect leaks. Most major VPN providers don't encrypt RDP data, so a "honeypot" website will get IP address logs that are pretty funny. The VPN IP address will show for HTTP traffic, the border/ISP IP address for the RDP traffic. Paid VPN are a way to attach browser history to a credit card - if you use a paid VPN, they know your payment details when you go to websites.phuketrichard wrote: ↑Wed Dec 15, 2021 7:12 am how on tor? to sell you need be vetted and even if somehow the feds shop were vetted and sold to you, that would be entrapment.
VPN will make sure ur not tracked and that is always recommended using tor
Honey traps are used all the time online to catch pedos. Seen more than one cop show based on that
-
- Expatriate
- Posts: 467
- Joined: Wed Jan 31, 2018 2:17 pm
- Reputation: 271
Re: Cambodia Blocks Websites for Child Pornography
Who is "they"?
Re: Cambodia Blocks Websites for Child Pornography
Is the article is about Cambodia blocking child pornography why is the photo of a white guy?
-
- Expatriate
- Posts: 468
- Joined: Sat Mar 24, 2018 4:18 am
- Reputation: 140
Re: Cambodia Blocks Websites for Child Pornography
Is that still working nowadays? We experimented with that approach before for identifying users for remarketing and marketing funnels. After leaving the media buying niche, I've been out of touch with user tracking approaches for a few years.RorschachRev wrote: ↑Wed Dec 15, 2021 11:34 pm Browser forensics research done by EFF indicates that fonts and plugin detection using javascript is enough to uniquely identify a browser regardless of VPN. Google was able to uniquely identify users at a convention just by browsing habits. They had a machine that cleared history after each user, they invited people to come up and use the machine "in their normal way" and within 4-5 sites, most people were identified by the URLs they visited. The machine then told them their real name. Yes, Google Knows.
Can't remember the name of the tool, but a few years back, during the umbrella movement in hk, they were using a mobile mesh network. The codebase was open. It was not based on TOR, however. It was an interesting project. There were ways to track the members though. And this involved actually getting the physical devices, which is easy when they are all in a single location. All the auth's needed to do was round them up, and confiscate all cellphones.RorschachRev wrote: ↑Wed Dec 15, 2021 11:44 pm Tor is limited to encryption of TCP data. UDP based requests (like DNS) are outside the scope of Tor. That includes certain protocols for streaming videos, RDP, etc. Basically Tor encrypts "most" traffic, but is extremely limited in scope. If you ping a machine while using Tor, the ping is not encrypted, the DNS lookup is not encrypted, etc. There are projects that I heard about years ago that tried to encapsulate all traffic in a TCP router using Tor, but I don't know if they were successful.
Back in 2018 I was deeply interested in the concept of mesh networks, a peer to peer data exchange. The idea was being paid for bandwidth you offer to people around you, regardless of hardware connection.
The system *could not* work because of the way that networking relationships are formed (at the device level, not the protocol level). If you could combine blockchain, root everyone's phone, create a series of VPNs based on blockchain addresses, fix the way Tor works to be more secure and complete, and then somehow merge all of that stuff it might work. In the meantime, expect leaks. Most major VPN providers don't encrypt RDP data, so a "honeypot" website will get IP address logs that are pretty funny. The VPN IP address will show for HTTP traffic, the border/ISP IP address for the RDP traffic. Paid VPN are a way to attach browser history to a credit card - if you use a paid VPN, they know your payment details when you go to websites.
- RorschachRev
- Expatriate
- Posts: 26
- Joined: Wed Dec 15, 2021 12:17 am
- Reputation: 6
Re: Cambodia Blocks Websites for Child Pornography
https://coveryourtracks.eff.org/ They basically talk about uniqueness in general and specific terms. I have 2 ad blocking and privacy protecting plugins, but it still identifies me pretty clearly (note that the plugins I'm using to protect my privacy increase the chances of me being tracked by plugin). WebGL + fonts + timezone pretty much nails my machine down, today. I'm in a hotel at the moment so I'm usign a VPN. When I take this laptop home and turn off my VPN, all of those features will still be the same, uniquely identifying me as a user.
I was kind of Anonymous-ly involved in making sure Egypt stayed online with a mesh of peers. Privacy hopping through systems like that is possible, but supporting a large number of devices and equipment is orders of magnitude more difficult to go from 80% to 95% coverage.
I was kind of Anonymous-ly involved in making sure Egypt stayed online with a mesh of peers. Privacy hopping through systems like that is possible, but supporting a large number of devices and equipment is orders of magnitude more difficult to go from 80% to 95% coverage.
-
- Similar Topics
- Replies
- Views
- Last post
-
- 1 Replies
- 2031 Views
-
Last post by Ghostwriter
-
- 36 Replies
- 15640 Views
-
Last post by phuketrichard
-
- 5 Replies
- 1765 Views
-
Last post by Brody
-
- 0 Replies
- 1416 Views
-
Last post by bobagubi
-
- 0 Replies
- 7538 Views
-
Last post by Fridaywithmateo
-
- 4 Replies
- 606 Views
-
Last post by Bongmab69
Who is online
Users browsing this forum: ali baba, Amazon [Bot], dirtymacca, Felgerkarb, Google [Bot], KevinTan, Lost50, Semrush [Bot], ta158 and 1095 guests