How safe is this site?

oldguybreath

New Member
The way I see it, there is no way your safe. No proxy will save you. It's a big false sense of security. You think this site and the little proxy routes will make you anonymous? I see some people will say "Shit.. I proxy at a site in China, they won't catch me !!" OK how smart is it when you proxy via CHINA who is cracking the shit out of everything! . I would think traffic to China's routers would raise more suspicion than say a route to England. I think Homeland Security is well past these little tricks. I don't mean to sound like a downer, but what makes you think you are more deceiving than the people who do this for a living?

I was in the phone company and no shit there was never an argument when they wanted to do taps and such. It was always for a good cause and legal with a court order. Usually domestic threat shit. Never cuz some dude growin a little...
 

H2ojunkie

Member
and I doubt they are busy going after the home grower... Something else just occured to me, if you spoof your MAC address, the one unique identifying signature of your computer, then it would be almost impossible to prove that it was "you" or "me" sitting here on the site right now. Especially since there is the ability to spoof IP's and MAC addresses, who is to say someone didn't sniff my IP and use it maliciously to gain access. TOR looks pretty awesome thanks for the tip. Here is an interesting article on Cisco's website about IP spoofing: http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_10-4/104_ip-spoofing.html
 

smokefrogg

Active Member
i've thought about that too, i am legal to grow in my state and have a tiny amount going for mostly personal smoke so i'm just not tripping about it right now...if things were different and i was a big fish in the sea then i'd approach it completely different, simplest way for me would probably involve a random old sub 100$ used laptop probably running freebsd, random old used digi cam, sd card, all paid for with cash at some sort of physical store, your choice of tor and/or proxies, other people's wifi connections that are nowhere near your spot; if you feel that you should be a bit paranoid then maybe you should be?
 

H2ojunkie

Member
TOR looks awesome, I agree with Oldguy no one is going after the closet growers via computer investigation. Just don't do anything stupid...

MAC address spoofing is another way to go that would make it just about impossible to connect anyone with an actual computer since its the only identifiable signature that is attached to the IP header.
 

johnny961

Well-Known Member
If they want u they will come & there is nothing u can do to stop em. Dont do anything stupid like try to earn a living that is better than theirs than they usually wont bother u & donate some money to local charitys anyway couple dollars.
 
The way I see it, there is no way your safe. No proxy will save you. It's a big false sense of security. You think this site and the little proxy routes will make you anonymous? I see some people will say "Shit.. I proxy at a site in China, they won't catch me !!" OK how smart is it when you proxy via CHINA who is cracking the shit out of everything! . I would think traffic to China's routers would raise more suspicion than say a route to England. I think Homeland Security is well past these little tricks. I don't mean to sound like a downer, but what makes you think you are more deceiving than the people who do this for a living?

I was in the phone company and no shit there was never an argument when they wanted to do taps and such. It was always for a good cause and legal with a court order. Usually domestic threat shit. Never cuz some dude growin a little...

Ok, I agree with you that NSA and phone companies probably don't care, and especially for growin or browsing a forum...
Now.. You worked for the phone company, but have you tried to crack 128 bit encryption on tunneled traffic? Do you understand
tunneled traffic? Because ya I can sit at the NOC and capture all data, but if its a single stream and all encrypted you can't
see sh!t :) Let me put it like this.. If its so insecure to use proxies, TOR etc well then how is it they are not busting many
hackers who are committing some of the greatest robberies of our time.. How is it that everyone is getting away with really highly
Illegal activities by bouncing either off of tor networks, Botnets and various proxies in a traditional sense ya a proxy could be
compromised, but as long as you bounce around alot and your first entry proxy is not compromised they gotta go down the line...
Trace after trace its not easy to do, and by the time you get back your down with your script or post...
For example Scenerio
I setup at a wifi on some poor bastards house I then bounce around the world hopping all over the
place between nodes in my botnet then I issue out my CMD to the 1 compromised computer it then starts scanning
I then disconnect change location then setup on another wifi and check my logs for compromised victims...
Try to find that in a timely matter....
 

oldguybreath

New Member
Ok, I agree with you that NSA and phone companies probably don't care, and especially for growin or browsing a forum...
Now.. You worked for the phone company, but have you tried to crack 128 bit encryption on tunneled traffic? Do you understand
tunneled traffic? Because ya I can sit at the NOC and capture all data, but if its a single stream and all encrypted you can't
see sh!t :) Let me put it like this.. If its so insecure to use proxies, TOR etc well then how is it they are not busting many
hackers who are committing some of the greatest robberies of our time.. How is it that everyone is getting away with really highly
Illegal activities by bouncing either off of tor networks, Botnets and various proxies in a traditional sense ya a proxy could be
compromised, but as long as you bounce around alot and your first entry proxy is not compromised they gotta go down the line...
Trace after trace its not easy to do, and by the time you get back your down with your script or post...
For example Scenerio
I setup at a wifi on some poor bastards house I then bounce around the world hopping all over the
place between nodes in my botnet then I issue out my CMD to the 1 compromised computer it then starts scanning
I then disconnect change location then setup on another wifi and check my logs for compromised victims...
Try to find that in a timely matter....
Don't want to get in a pissn contest now , but I do know what VPN's and tunnelling are. Hell the last post he stated MAC spoofing, but hell there are 6 more layers to contend with. Just cuz your sittn in a NOC with a sniffer and u can't make out what it is u think it can't be done? Sure you sound like you have the knowledge to circumvent the system and I respect that but there are WAY higher powers and knowledge than us.....
 
Don't want to get in a pissn contest now , but I do know what VPN's and tunnelling are. Hell the last post he stated MAC spoofing, but hell there are 6 more layers to contend with. Just cuz your sittn in a NOC with a sniffer and u can't make out what it is u think it can't be done? Sure you sound like you have the knowledge to circumvent the system and I respect that but there are WAY higher powers and knowledge than us.....
Well the L2 address is stripped at the switch so thats just Ridiculous and the guy doesn't know but am not gonna point that out to him
and belittle him. But you believe there is some higher power all knowing.. And I can firmly tell you.. Those Tiger Units Suk they are
squares that have been made to conform, ya they got some decent recruitment because of 9/11 but they suk man and are dim they don't think
outside the box because of their regulations and conformity. Wooo Scary GSEC.. The CIA can't even protect themselves from SSL attacks come
on man... Ya they capture everything but they gotta sift through it. I agree with you on alot of things, but the .GOV is not as all knowing
as you think man... I respect your knowledge and field of work.. But common :)
OSI: All People Seem to Need Data Processing
But I agree the level of security probably isn't needed for posting on the forum, but am a security specialist so its my job :)
 

oldguybreath

New Member
I was just sayin the average joe on this forum is wrong if he thinks he's anonymous. I mentioned nothing about encryption I also did not say it was strictly the government that can crack 128 bit . 128 bit encrypt has been around for years in secure radio,. The way I heerd it 128k encrypt is used cuz it CAN be cracked. Why not 512? Just throwin it out there. I'm right with you that the gov is behind the 8 ball but thats why there are contracts

Edit: 256k encryption. Sorry dementia
 
I was just sayin the average joe on this forum is wrong if he thinks he's anonymous. I mentioned nothing about encryption I also did not say it was strictly the government that can crack 128 bit . 128 bit encrypt has been around for years in secure radio,. The way I heerd it 128k encrypt is used cuz it CAN be cracked. Why not 512? Just throwin it out there. I'm right with you that the gov is behind the 8 ball but thats why there are contracts

Edit: 256k encryption. Sorry dementia

Here is the deal about encryption and why I brush aside your comments about cracking it.

There are encryption laws that prohibit the use of high encryptions like 4096 bit encryption. So standards are not gonna reveal those.
There are different encryption implementations and people can implement these encryption standards various ways by referencing other librarys
or classes/function/modules whatever you wanna refer to it as. Well they could easily weaken or maybe they implement it in a way by using a crap
method of generating the prime numbers alot of variables here that make it easy to decrypt. But the personal time, hardware resource time etc
to decrypt data on a live stream is high. For example some implementations can be cracked very quickly by hacking the implementation of the
algo, but a brute force takes HUGE HUGE amounts of resources that would be better served elsewhere.. I know because I have ran a cluster in attempt
to brute a 128 bit encryption from the public key out of a data capture its nasty and a waste of time. This is why they build back doors into alot
of implementations like Windows Bit Locker there was a HaDo about it with the FBI because the fbi couldn't decrypt it easily.

But the deal is this your DEA, FBI, Local sheriff department is gonna have to spend time. First to aquire that capture then send it over to someone
who can crack it. Because I can guarantee you if they do (Which am sure they do) have programs that can easily crack 128 bit encryption from data
captures they are not distributing it across the FBI and it maybe futile against certain implementations which then would require high level or
authority to decrypt the data. Obviously the NSA can almost crack anything because they have acres of racks. But you gotta become a super
star for them to make you a priority like that.. So the thing about anonymity is what makes someone want to find out who you are. Your anonymity
depends on the priority assigned to you. For example NSA does not care about bank robbers,drug dealers etc they pose no threat to national security
so a common small grow on this site well it is at local sheriff level which they do not have access to those tools required so the grower is pretty
much anonymous unless he raises his priority. For example threatening national security. Now a bank robber or a hacker who digitally robs banks attracts
FBI, and interpol but as long as it wasn't big enough to threaten national security the nsa probably wont get involved, but if they want they can
raise his priority and get info from homeland security-> nsa... So you are wrong when you say the proxy wont keep him anonymous because it will
as long as he stays a low criminal priority.
 

CLOSETGROWTH

Well-Known Member
I've never had an issue. When I used to be illegal, I always signed in on a VPN first, which I still do most times cuz I handle all my financial issues online. But heck, I never really did worry about it. The only thing I'd suggest is that, if you post photos, make sure you check the background for any "locational information" on them. I still get a chuckle from one poster in a very MJ-illegal state -- he/she posted a photo with their car and license plate in clear view cuz they wanted to share a shot of a nice snowstorm.
OMG your kidding!! LMFAO! :bigjoint:
 

oldguybreath

New Member
VASIO: Dude I said there is no way they are anonymous, that's it. Your book review above admits that. I never said they WILL! I just stated that technically they CAN. What's the big puffed out chest shit? Yes it would take resources to do it but they CAN. :peace:
 
VASIO: Dude I said there is no way they are anonymous, that's it. Your book review above admits that. I never said they WILL! I just stated that technically they CAN. What's the big puffed out chest shit? Yes it would take resources to do it but they CAN. :peace:
You are never anonymous.
You are never truly free.
Everything can be broken.
Nothing is secure.
etc etc
I don't mean to be an as$hole but man common.. Don't tell a free bird freedom doesn't exist.
If a tree falls in the forest and no one is there to hear it does it make a sound?
So, ya your right. You are never truly anonymous unless you're hijacking Networks and jumping from
location to location on wifi dressed up like a bunny rabbit with sun glasses on
in a stolen car. So if you see a rabbit driving fast with a laptop and sun glasses thats me being anonymous...
 
Top