inspired by There are some important things you know if you are a college student and about to put fliers up on campus
1) Sup Forums by default does not redirect you to https 2) if you're using the http site, your campus likely has a log of any particular thread you visited, and possibly even logs of if you posted to a thread / created a thread 3) if you're using https, they only know that you visited Sup Forums, but not whether you viewed any particular thread / board or if you created any posts
your campus can and will not hesitate to check their isp logs to see who was using the site in order to dox you, if the campus response is large enough.
people have gotten doxxed on campus even when they were using tor at the time, by cross-checking against which machines on campus were the ones using tor.
so play it smart. if you're going to post fliers (which i fully support), 1) make sure you're using https or a vpn, 2) be careful what you say here
It's not as good a resource as murdercube, not having been compiled by the gentlemen and scholars of /k/, but it has a couple files murdercube missed. Between the two it makes for a pretty comprehensive library.
Logan Foster
How come I can't save your flag. It's rare.
Chase Campbell
Remember kids: VPN then TOR.
Michael Wilson
no
Landon Morales
people really should watch the youtube i linked above
opsec is difficult. fortunately, you dont need freedom fighter level opsec for these types of shenanigans, but still. generally if you're thinking about opsec after the fact you're going to have a bad time
Jack Miller
For residential service using IPv4 (almost certainly behind NAT), yes but you can still be browser fingerprinted unless you take precautions. Run NoScript. Businesses, schools, etc; may have static IPs assigned to them in which case it would be a no. For IPv6, no. Yeah but I wouldn't, the problem with running your own VPN is that you don't get the plausible deniability of having your traffic mixed with other users. If you insist here's a good seedbox script: github.com/arakasi72/rtinst and one for OpenVPN: github.com/JMSwag/OpenVPN-install (doesn't work behind NAT)
lookup resVPN... they host through a residential network so you won't be blocked on Sup Forums and most sites as long as you don't post stupid shit.
Evan Lopez
bump
Luke Foster
But if you're tearing down and rebuilding it on a regular basis there won't be anything to trace. I doubt Amazon is archiving destroyed ec2s.
Colton Baker
Just print the posters at home. Don't even think of printing them at the school. Use mobile data if you want to show off the fruits of your labor. Don't put any near security cameras
No. That's the point of subnetting
Nathaniel Jenkins
poo
Cameron Hill
bump, good info
Levi Kelly
>Sup Forums by default does not redirect you to https
A lot of IT departments have HTTPS Everywhere installed in the browser already, mostly for the staff's own safety.
If you must use a campus computer, use a public one and steal someone else's credentials. This will set a precedent that people are being framed.
>German level propaganda tactics Place razor blades under each flier so they cannot be easily removed. Rust them so people can't take them to use.
take out the yellow ink cartridge and print grayscale to avoid tracking Use a typewriter for propaganda if possible Buy a second hand printer cash Use a disposable shitposting rig If you’re worried about security cameras, put a rock in your shoe to change your gait, use a wig rather than a mask, glasses can be tossed away after use. Use the tactics of the negro: wear two T-shirt’s in contrasting colors. Dump one after your actions. Black over white works well. Black over blue doesn’t.
Nicholas Lee
Install the browser extension https-everywhere, it will default every site to using https
as long as you are using https you are good, OP is right, I would not browse Sup Forums on http at my campus