1
Anonymity and Privacy / Re: Need help hide my privacy with backtrack
« on: September 09, 2013, 01:49:47 pm »
If you are going to use the Interwebs I would like to recommend against spoofing your IP
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Yes exactly.That true. I've long thought about how to do such a dismount or whatever but never bothered to try to implement it. Would be a an interesting thing to look into.
Use being screwed in your advantage.
They have to read from the disk to copy it.
There is the entry point, HDD's have firware , memory and ARM cores these days.
Thats an interesting concept.If a forensics team uncovers an encrypted hdd they will make a raw copy first thing. They won't start cracking away trying to break the encryption. With a decent algorithm and a sufficently good password this won't matter much however.
Making the disk useless upon 'cracking' gonna think about that for a little.
If you store your files in a removable drive, hide and take it away off the scene (make sure they wouldn't see).I guess you can call this an attempt to solve the problem I mentioned but seriously, don't expect the police to be THAT incompetent.
We do not care about the logs in realtime. We can find the logs being stupid and just remove them. Though when something happens we can purge the logs. And if ofcourse we want to ban someone from accesing our servers we need to log the ip and ban it.I'm not questioning your motives or the need to log, just saying that security is important partly because of all the logs being stored, since you mentioned that the logs are stored to maintain security
The security of Tor becomes compromised if one has control over the exit nodes. It's safe to assume the government does, plus Tor was originally DARPA technology, so it's unwise to rely too much on it.That depends on what you mean with security.
We do log everything. And I mean absolutely everything, in and out. But this is to maintain our security, ..The logs being stored are also a part of the reason for why good security is important. If the (old) logs can be stored offline on an encrypted, powered off disk that should be done to the greatest extent possible (within reason when it comes to the time it takes to manage such a policy of course).
This is not local cracking, GPU's have nothing to do with it.Yeah.. I guess that is very true. It will have to be online.
Poor old online cracking against a probably already overloaded box.
If the software is any good it will also limits the attempts.
No dont think thats gonna do much good.You are completely right. Although a 26^6 could be brute forced in hours with say a GTX460 it might not be worth the trouble in this particular case. Then comes the issues with the MAC if the key in fact are tied to the MAC address.
Bruteforcing 26^6 and than a key that only has such a short lifespan is just not worth it.
Its gonna be a slow and tedious business.
Not to completely crack your statement but stealing someones MAC address is also going to ruin your own connection.
Your only option there is to send deautentication floods if your in physical range , this would make reconnecting for this person impossible.
Hes is likely gonna complain and drawing unwanted attention in your direction.
Just my 2 cents.
I guess I don't see where bruteforcing the ticket numbers would be anyway effective. If they are randomly generated at the time you buy minutes there won't be any left to retrieve from such an attack.If you are right about that one possible workaround could be to spoof your MAC address.
Any idea what would happen if an average user is investigated and found to have (for example) a TB of illegal download material in different parts of the world?By investigated you must mean that this user is a suspect and that the police has issued a warrant, entered the users appartment and taken the users computer?