Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - ph0x

Pages: [1]
1
Hacking and Security / Re: hacktivist
« on: June 10, 2014, 11:32:51 pm »
If you're gonna break the law, just use Tor.

https://torproject.org

What kind of kidiot uses tor?.

seriously?.

Anyways you have you're opinions. don't pretend you understand what I am doing.

You guys of all people should know that if you are being watched, you are doing something wrong and that there are more then one way to get online without being watched or monitored.

Lol

2
Hacking and Security / Re: hacktivist
« on: June 08, 2014, 01:51:13 pm »
So I don't understand what do you want. All that security is ridiculous and all that to write a comment? holy shit man, you're one paranoid mothafucka.
Which country is it?

You would be paranoid if you where held in a cell for posting a comment online



Long Live the Queen  >:(

3
Hacking and Security / Re: hacktivist
« on: June 07, 2014, 10:55:08 am »
Many people, institutions and VPNs claim many things doesn't imply they are true. also, why use 1 VPN when you can use proxy chaining??

If you connect to the internet, then your ISP can see everything that is in clear so at least see your IP address.

For the data, i am not sure for tablets and smartphones. If it was a magnetic hard drive the answer would easily be YES. But on flash drive i am not sure if wiping the disk is a necessity.

EDIT:

i just found this great paper on SSD (and Flash drive) wiping. https://www.usenix.org/legacy/events/fast11/tech/full_papers/Wei.pdf
To resume, overwriting the full drive should do the trick but some dergee of rcovery is still possible.

How do I find out about proxy chaining?.

the feds never pulled anything from my desktop that had an SSD installed

I am thinking along the lines of SSD setup, with a virtual box, encrypt it, go through vpn & proxies
do this on a throw away 3G mobile broadband connection, spoof the mac addressed, spoof geo location

not use wifi but instead use a usb dongle. encrypt the hard drive and have a hidden partition.

the fact is that I am not in it to hack in to systems I am in it for freedom of speech and in this country freedom of speech is dead, people get arrested for posting their opinions online
one man got 24 months for posting on some train firms twitter account.

I do not have the knowledge the get in to systems or websites, the most I have done is play use ssl stip on kali over my own network to see it dump passwords

once upon a time I used to write virus, but not any more

4
Hacking and Security / hacktivist
« on: June 05, 2014, 10:54:26 am »
If you use a VPN for hacktivist related ventures and the vpn company, claim to keep logs for only 7 days and only have information like IP, times, dates and data volume, what are the chances of the cops tracing the ip addresses?.

can the cops get logs from the isp?, can the ISP see what internet activitiy was done over a VPN?

can data be pulled from IOS 7 if all data was erased through the settings of the ipad?



Pages: [1]