Hey Sup Forums So we all know that illegal media exist out in the vast, dark ocean of the Internet.
We also know that this illegal media is aggressively and diligently pursued by law enforcement.
Some people never get caught and can evade the ever-seeing eye of the government online forever, despite it being "easy" to track what data are shared from which computers.
My question is:
>How the fuck do people share illegal media on the Internet without getting caught?
I can't ask this anywhere else without it looking "suspicious"
But why hasn't law enforcement adapted to these yet? What makes them untraceable to use?
Brayden Garcia
...
David Gray
uhh is that madeline mccain?
Jaxson Sanchez
Roses are red Violets are blue What the fuck is wrong with you?
Ethan Thomas
Yep you found her we can call off the search
Nicholas Harris
like most criminal type activities > the more activity/money surrounding a certian item attracts more attn. the cops will always catch up... when theres a demand. just keep it legal. > 18+ / clothed / lolis
Sebastian Jenkins
ugh. look up secure linux systems and how tor works. nothing is 100% idiot proof. it is how you use it.
Justin Flores
the fundamental mathematical nature of onion routing means that it cant be traced. The servers are arranged in layers each with a password that is randomly generated to be up to 1000 digits long on numbers and letters. It would take longer than the heat death of the universe to solve a random password by trial and error like that. Therefore its uncrackable.
Ethan Campbell
OP here.
I don't want to see anything. I want to know the very basics of the technology behind law enforcement online. >how does LE (law enforcement) track you? >how does tor/others stop LE from being able to track? My background is in biochem and I am interested in the topic of how data is shared and how others can see
Christopher Jenkins
tor is broken now. most of the exit nodes are run by FBI/NSA if they watch enough traffic they can backtrace linux is a step up from windows/mac reporting
Anthony Ortiz
Wow, this definitely isn't an FBI post.
James Fisher
>cant be traced they will always find a way to backtrace it
Joshua Cook
Haha does the fbi have high school level computer science knowledge and needs Sup Forums to learn more? Give me a break
Henry Nguyen
TAILS is good, with the right tor settings on top and a dash of common sense it would be fine. TOR on windows is pointless tbh. And many linux distros still could be backdoored, however compared to windows 10 which is pretty much just frontdoored it is a step up.
>inb4 v& just some Sup Forums fag who picked this up, nothing to hide so doesn't matter to me ;^)
Andrew Jenkins
Law enforcement issues warrants to Web server admins and service providers asking for information on users they know are viewing illegal content, and put legal pressure on the hosts of that information to censor it.
TOR is short for The Onion Router. All users have a unique encryption key, all traffic travels thru several users' machines, being encrypted and decrypted by each with their own key, only the sender and receiver see the content, all others just see encryption.
Luke Gomez
dammit this glitch again does anyone know why Sup Forums x keeps marking random posts with a blue line as if they were mine?
Wyatt Morris
It's not just traceability to look out for, when using TOR it's best to assume that all sites you visits are kept in a list, this list is owned by the government and other LE. With the web you visiting site A is known but with a correct tor setup all they know is the sites visited not the who. If you log into facebook, use the same passwords and users or otherwise give yourself up in the same session as what you would like to hide then you are good as fkd. I'm this fag
Carter Reed
So LE has to go to private internet providers first? If so, how can people attract interest unless internet providers actively share data with LE if/when there is suspicious activity?
I feel like government agencies are working closely with data providers. I feel like I'm always being watched and if I type the wrong things I'll get flagged, but people can hire hit men online if they do it right.
Really I want to know how to be left alone and not worry about what big brother knows about me.
Jackson Davis
Everyone say hi to the feds
Gabriel Scott
>>Really I want to know how to be left alone and not worry about what big brother knows about me. You can't they know everything man, more than you can imagine. Just research, without the web or in public or near a phone or any other technology
Luke Bailey
...
Asher Robinson
You're either a sick fuck or a cop. If you're a sick fuck I hope you get popped and if you're a cop you're going about this wrong
Colton Sullivan
OP here.
Neither a sick fuck nor a cop. Just a simple transblack lesbian trapped in a grown mans body wanting to know how this type of technology works.
I can't ask uncle joe how some people can be invisible online or else he would think I'm a sick duck. I feel safer asking here at least because I can stay anonymous! >but am I REALLY anonymous here??
Nolan Morales
>but am I REALLY anonymous here?? no.
Sebastian Mitchell
No one is anonymous here and if you're a tranny then you're still a sick fuck but at least you're not the kind that needs to be shot on sight as you can be cured with psychological help
Mason Martinez
Speaking of treatment for trannies, I wonder why you often don't hear about people trying to treat gender dysphoria for what it is, even though there is some evidence that transgenderism can be treated pharmacologically
What's fascinating is that if you're looking for real information about reality and the nature of it you are deprived of finding this in the modern day, yet you'll easily find child pornography, ick. You can't know about how old big ben is but if you want to look at some kid vagina type shit all good man!
It's bizarre that law enforcement officers are more interested in baiting damaged human beings into developing sexual fetisisation that can enamour itself into a larger dark transition and change peoples behaviors.
Justin Thompson
Not like therapy going to simply do anything.
Caleb Lee
officer M J Sanborn reporting for duty
Parker Sanders
>All users have a unique encryption key, all traffic travels thru several users' machines, being encrypted and decrypted by each with their own key, only the sender and receiver see the content, all others just see encryption. I don't get it. Can someone give me an idiots version of this? I know how encryption works in theory, but how does tor use it for anonymity?
Gabriel Bennett
why would anyone monitor your traffic if they have no reason to do so?
Internet traffic, even for a single country is way too massive to analyze- even if you reduce it to file transfers and disregard streaming data (and the fuckload of other protocols) - there's little point gathering this data because the big time issue is visualizing and identifying this data (which has to be done by humans). unless you can at least filter it down to a small amount of persons that you want to monitor, its absolutely pointless to look what the fuck is going on on the internet. you need to drill down at some point. either monitor specific files - but thats fucking pointless because you can alter files so easily, or monitor specific people - but you dont know which ones
looking at what people google however is very trivial because the request is often in SHORT clear text and a single request / package. You can easily search such a database, but going deeper and into more detail is really not as simple as it sounds, often not even possible
Robert Rogers
Sup Forums is the absolute best place to learn things about technology.
Jonathan Perez
>officer M J Sanborn reporting for duty
Jordan Ortiz
What I meant is, wouldn't the intermediate machines see the decrypted stuff?
Luke Collins
because you encrypt your data with the recipient's public key - the intermediate machines cant decrypt it because you need the private key to do so, and the private key is never transmitted
Daniel Edwards
It's disturbing, really.
Jacob Miller
Ah, I get it. That's pretty nifty.
Alexander Martinez
It's too bad many exit nodes were compromised (by assholes posting CP and shit, when owned by citizens), shutdown (by many ISP's, whether terms and rules were followed or not), surveiled and/or seized (by LE)...
Angel Ross
OP gtfo you cancerous fuck. You can either learn from lurking or doing research on your own. Sage goes in all fields.
Carson Morales
>whoever controls the exit nodes controls what goes in and out >which basically makes me the one in control
Jackson Young
>they can backtrace
Please kill yourself.
Brandon Ward
The exit node is the last stop before the recipient? Then they would be able to see the address of the recipient. Plus the content but only if they somehow know where it comes from, right?