>officer looks through the transaction history of various VPNs to pinpoint possible matches with OPs purchase based on timing (within this hour, within this day)
>officer then sifts through that possible matches and picks out the ones that sent around 497.14 KiB of data around the time 2019-02-13 22:18:01.
>OP is probably fucked now but rest assured, its for the greater good.
>already threads dedicated to VPN discussion
>makes a shitty new one liner thread anyways
Perhaps some rules around consolidating this kind of shit should be implemented.
>>6775 >transaction has nothing that tracks it back to me
>time correlation attacks no longer work on Tor
>vpn keeps no logs of who is doing what and where
>>6775 >low latency network that can resist against time correlation attacks
>an actual vpn that doesn't keep logs for high profile criminals
The delusions of a schizoid is really interesting. Maybe go out and get more sunlight, that might make the "voices" disappear.
>>6779 >time correlation attacks no longer work on Tor
From a Tor paper:
>Low-latency networks like Tor, on the other hand, are fast enough for web browsing, secure shell, and other interactive applications, but have a weaker threat model: an attacker who watches or controls both ends of a communication can trivially correlate message timing and link the communicating parties https://www.freehaven.net/doc/wupss04/usability.pdf
>>>/g/ Is OP British or British colony? Not sure where else bands this stuff.
How can a user realistically impede the near omnipotence of a global internet adversary? I have no want or need to do so, but it may soon become necessary to secure a future for our childrens.
Assuming hardware is not hacked, because most of us aren't important targets
>not use internet
good luck hermit
>not being important
You are important to Google, and that's enough.
>using anonymity networks
<Tor
Fast enough for timing attacks???
Big target
<I2P
Is it big enough to hide in?
>non-persistence and impersonation (eg WiFi theft, not using the same one each time, never using accounts)
Big hassle but doable?
>fake data
needs to far outweigh real data, but effective?
>>6783 Of course only 5-Eyes get that kind of data. Here is a very fruitful experiment:
If you do happen to have CP, and confident that your VPN doesn't keep logs, then try to post what you have on clearnet ONLY through that VPN. Lets see if they can stay true to their "no logs" policy then.
I do not store CP, and I see no sense in sharing CP, even more so on the clearnet.
Not that I believe anything would happen to me if I did it through the VPN, considering that no IP leaks happen.
no such thing as a no-logs VPN, Santa Claus or the Easter Bunny
once they see you are on Tor they do a correlation attack to see how many packets are being transferred. if it matches the size of the file being downloaded from the honeypot they have you pegged
>>6812 >no IP leaks happen
Even if your VPN is doing its job, you are far too trusting of your browser. As mainstream browsers go, perhaps only TBB is hardened enough; the rest are really bad news.
>>6826 Just block all UDP and ICMP traffic to outside your LAN, and then force all TCP traffic to go through a SOCKS proxy (Tor) using system-wide methods. That fixes all problems. However, it's inconvenient because a lot of normalfags like using cucknet occasionally.
>>6826 For normal browsing I'm using GNU IceCat.
ISPs in my country are a bitch, known provide the police the ips of anyone connecting to the tor network on their own. Having all my connections encrypted is more than enough.
>>6815 It could be, but even if it wasn't, what proof do you have that they still don't keep logs?
Best VPNs are not from big companies, but small ones where you can pay with crypto.
And obviously, due to timing attacks, don't think you are hidden. You're not. Using someone else's wifi without leaking any metadata is not an easy task either.
>>6497 You can pay in crypto to expressvpn.
And to be clear, most of the smaller ones are shit as they don't have servers in countries out of eu/usa/russia/china/india sphere of influence. yes, there are still countries no one cares about
>>7001 Тьі yesho не видал какими фразеологизмами ананасы бросаются аватарка в аватарку. Да, свет ученье, а неученье тьма в плане русич языча.
Ну что, чаехлёб или чизбургерожор (прости за кликуху для англичанина), грызи гранит языка страны Пыни, скоро они придут в твоё Соеденённое Королевство и возьмут быка за рога. Шучу, пидорахия не дойдёт, она скорее просто развалится на много регионов или станет этакой "тюрьмой" для пидорах, которые до сих пор не свалил оттуда.
>>6827 Set up a user/group with clearnet permissions and run clearnet applications under them. Run a proxy under this user/group to make access available to your whole network.
>>6773 > One of the most important things Yardbird stated were that everyone in the group who used Tor and remailers remained free, while those who relied on services such as Privacy.LI were arrested and convicted.
https://dee.su/uploads/baal
>>7387 > Yardbird further commented that several members of the group, including his second-in-command Christopher Stubbings (Helen) and Gary Lakey (Eggplant) were Privacy.LI users -- in fact he stated that they used it for everything. (Helen is currently serving a 25-year sentence in the UK, while Eggplant is serving life in an Arizona prison.)
> Eggplant literally became notorious because of his constant promotion of Privacy.LI -- he continually boasted that he could not be caught because Privacy.LI did not keep logs, and they were located outside of U.S. jurisdiction.
>>6775 Damn, who is this officer who has access to all packets ever sent from any computer?
>>6783 >Like many other VPN services nowadays, ExpressVPN doesn’t store any logs, and this is what the investigators soon found out as well. An inspection of the server in question yielded no useful information.
Read your own articles ffs.
I personally would never trust a VPN with anything serious. However I trust my ISP even less. VPNs have a business interest in never giving out logs, because no serious person will continue using a VPN found to have given away even a single log.
By routing traffic through a VPN, you're at least preventing the ISP from figuring out what you're up to. It's extremely unlikely, but it's possible that the VPN is compromised, or is keeping logs, or is reading through everything you send it.
Therefore, if you're doing anything serious which could get you locked up, you don't use a VPN. You use TOR, ideally from somebody else's internet connection, out of sight of any cameras, without being pinged by cell phone towers, on a burner laptop running a secure OS. Even then you're taking a risk. Life is about risk management. Don't shit on someone for taking their first steps into improving their security.
>>7570 >Don't shit on someone for taking their first steps into improving their security.
This. Most VPN services are either incompetent or scams, but there are a few decent enough providers who will do fine in mostly keeping your home ISP out of loop. It's a bit of a meme, but running Tor over a non-shit VPN won't hurt, and will at least deny your provider the privilege of seeing that you use it regularly. When traveling, hotel and airport wifis are often incredibly hostile networks, and VPNs again will help here.
Why would you eber ged a 3 year BBN blan. Isn'd id bossible niggerfaggods ged all dheir IBs banned and dhen you're fugged and sdugged widh a useless BBN brobider?
>mfw just got my 3 years vpn plan