FIGHT the NSA, FBI, and Bastard US Government Spying Operations- Simply!

page: 2
24
<< 1    3  4 >>

log in

join

posted on Jun, 30 2013 @ 10:48 AM
link   

Originally posted by SonOfTheLawOfOne

Originally posted by QuantriQueptidez
The only way to get even close to browsing anonymously these days is to hop on a public wifi hot spot.

Even tunneling through a vpn with ssl won't save you if someone really wants to find ya.

A secure linux distro on a laptop with truecrypt and tor operating solely on open wifi is about as close as you can get to anonymity. Even then you gotta worry about bastards sniffing your keystrokes through the air via remote devices. Who knows how many such devices exist around high density areas. Then you can use a click keyboard, but maybe you gotta look out for argus drones directly viewing your screen, and on and on. .




You get it.

Every PC on the planet has a unique address, not an IP, but a MAC address. All IP registrations are associated to these MAC addresses so that every TCP packet you send over the net contains a way to trace the packets back to the originating machine. As long as they can capture the TCP/IP traffic, they can find you, and it only takes one single packet out of the billions most people send a day. SSL only protects you over the wire during transmission, but there is still a TCP stack that contains your MAC address.

They will always find you because of this. The only way to throw them off is to start manipulating the traffic you send by altering or randomizing MAC addresses combined with masked IP addressing.

~Namaste


as a former tech screwdriver jockey, from the age of TTL logic, and burning eproms.....well said...I learned back in the early 90's, "what can be written, can be read"




posted on Jun, 30 2013 @ 01:32 PM
link   

Originally posted by SonOfTheLawOfOne
They will always find you because of this. The only way to throw them off is to start manipulating the traffic you send by altering or randomizing MAC addresses combined with masked IP addressing.

~Namaste


Yeah but wait. How does VM deal with this? According to what I read, VM operates in a manner that disassociates itself from the hardware. So I wonder if that includes the MAC address when sending packets over TCP/IP. Anyone know?



posted on Jun, 30 2013 @ 01:56 PM
link   
But what about the guy working on this who worked for AT&T for over 5 years? What about the guy working on this that sells military surplus and equipment to law enforcement? Do you really think this some thing that is safe? I don't.



posted on Jun, 30 2013 @ 02:48 PM
link   
reply to post by TrueAmerican
 


The VMware will still use the MAC associated with your comp. It's still using your MAC. The MAC is a unique identifier given to each device that is allowed to communicate to wireless or wired networks. In other words, it's the ID in your wifi chipset, NIC card, or whatever chipset is involved in you connecting to the net and yes they all them. MAC address are bought wholesale from the IEEE which set standards on digital communciation protocols.

You can "spoof" your MAC addy but unless you have money to buy your licensed block, then no.
edit on 30-6-2013 by cenpuppie because: (no reason given)



posted on Jun, 30 2013 @ 02:57 PM
link   

Originally posted by TrueAmerican

Originally posted by SonOfTheLawOfOne
They will always find you because of this. The only way to throw them off is to start manipulating the traffic you send by altering or randomizing MAC addresses combined with masked IP addressing.

~Namaste


Yeah but wait. How does VM deal with this? According to what I read, VM operates in a manner that disassociates itself from the hardware. So I wonder if that includes the MAC address when sending packets over TCP/IP. Anyone know?


Virtual machines still bridge the hardware from the host, they still depend on the same hardware, like network cards, hard drives, etc. No matter what you do, you still end up with a MAC address, but with VMs, it creates a MAC address that sits on top of the host hardware's address.

For example, if you use a VM, you can go open up a command prompt, and type in "getmac" to list the MAC address being used for the VM. Then, go to the host machine and do the same thing. You'll see two addresses in the VM, one for the proxied MAC address that is "connected", along with a second address that will match the host MAC address. If you're using a Macbook and running Windows in Parallels or VMWare, you can go to System Preferences -> Network -> Advanced and your MAC address will be the Airport ID.

Either way, the address is created based on a unique combination / hash of the hardware on the computer, so the only way you could get around it, is to change the hardware frequently enough that the addresses won't match. However, this is not a complete solution because of the IP address combined with the MAC address. Your IP address, once determined, can then be located by your Internet Service Provider (ISP) to see what paid phone account it was associated to, at what time, and what the MAC address was at the time. Once they have that information, they know where you live and unless you burned your hardware to ashes and dumped it in a river every time you connect to the internet, or have a disposable array of computers, they've got you. Even using a network like Tor, where your traffic is proxied and relayed through anonymous servers, it still travels through routers and network hubs that are tapped and being monitored.

Using the Tor network will make it several orders of magnitude harder for them to see what you're doing, but it takes a bit of setup and understanding of computers and networking. If you're interested, Arstechnica has a great starting point HERE.

I hate to rain on anyone's parades, but it is going to be really hard to stop what THEY are doing without some heavy players (like Congress for starters) to get involved and put an end to the funding for these types of programs.

~Namaste



posted on Jun, 30 2013 @ 03:38 PM
link   
reply to post by TrueAmerican
 


From what Ive read about how prism works it doesn't matter what email service you use. Any Data is at risk period. They are actually copying nearly every bit that goes through the internet routing it through their own server farms for analysis, if anything flags then they work on decryption if necessary and have a human review it.



posted on Jun, 30 2013 @ 03:41 PM
link   
reply to post by SonOfTheLawOfOne
 


Excellent explanation, thank you. Although using VM it seems would create an additional step they'd have to see through, and if one were to change their VM setup daily... But even in that case, that's ridiculous to have to go through any of this to keep government out of our lives.


Even in the case of Congress defunding these programs, I don't think it'd make a difference, because of black budgets. They'd have to refuse all black budget programs too. And that will never happen. Defrauding the American public with their own money is a MUST these days in government. :shk: Only real solution is to disconnect entirely from the internet, cause all the ISP's have capitulated, and serve as more arms of the giant, evil octopus. There is no end in sight to this, is there.



posted on Jun, 30 2013 @ 03:42 PM
link   
Link below Anti prism site apps and programs

The opt out of PRISM, the NSA etc link



posted on Jun, 30 2013 @ 04:20 PM
link   
I use Startpage.. I am signed up to Beta test (for those of you who thinks startmail is free... it's a free 3 month trial. It'll cost you, I think, $5 per month after that)

But about fighting THEM... it almost doesn't even matter because they can sit there in their dark janitor's closets and see everything on your screen remotely without you ever knowing! You can use a proxy, use a public wifi hotspot but it doesn't matter. They can see your screen!



posted on Jun, 30 2013 @ 04:39 PM
link   
There are 2.769 billion internet users according to Wikipedia.

They are not watching everyone. It is impossible manpower wise. The NSA employs 40,000 people. People need to realize they are not watching you. They store the information in huge databases and it will take years to go through it all.

You don't have to worry at the moment. Years down the road, maybe, but the sheer manpower to eavesdrop on all these internet searches, phone calls, etc is simply not there.



posted on Jun, 30 2013 @ 04:42 PM
link   
Sighs!
you forget. they are IN your PC.
if its windows. they know it as you typ it.



posted on Jun, 30 2013 @ 04:45 PM
link   
reply to post by CPYKOmega
 


That's not the most accurate view.

It depends on the priority they assign to you as a potential threat.

The data doesn't "take years" to sift through.

TIA wasn't given sufficient funding, but the system put in place under Obama can scan through all the incoming data in near real-time.

Manpower?! You're thinking 20th century, buddy.
edit on 30-6-2013 by QuantriQueptidez because: (no reason given)



posted on Jun, 30 2013 @ 04:46 PM
link   
reply to post by buddha
 


How do 40,000 people watch 2.769 billion?



posted on Jun, 30 2013 @ 05:08 PM
link   

Originally posted by CPYKOmega
reply to post by buddha
 


How do 40,000 people watch 2.769 billion?


With technology like Narus, combined with super computers and machine intelligence that do the work of tens of thousands of math crunchers and code breakers.

Of course 40,000 people aren't sitting there monitoring 50,000+ people each (which is about what it would take each NSA analyst to watch over), but a few well placed devices most definitely do. You need to go look at what the device does and you'll understand how it is they do this. Combined with machine learning and massive computing power, the algorithms (over time) have been tweaked to find the most important bits of information. However, the fact of the matter remains, they have the data and can go through it anytime they want.

~Namaste
edit on 30-6-2013 by SonOfTheLawOfOne because: (no reason given)



posted on Jun, 30 2013 @ 05:36 PM
link   
Just tagging this thread so I can find it later. Giving a minute to get it going.



posted on Jun, 30 2013 @ 05:38 PM
link   
LOL

None of this will make a blind bit of difference and it will be only be a matter of time before things like this are just as vulnerable than any other out there for monitoring, the fact is the world is getting ever more advanced and moving on towards a type 1 civilization status, governments around the globe need to to obtain & maintain control of information for many reason and the big one is control of its populous, without it we'll never make TYPE 1 status because the system we have relied on for so long will collapse into chaos without "control" lets face it without order the world runs the risk of becoming one big chaotic 3rd world or much worst

YEAH, Lets burn the f~~king planet down i'm done with these rules and being civilized



posted on Jun, 30 2013 @ 05:55 PM
link   

Originally posted by SonOfTheLawOfOne

Originally posted by CPYKOmega
reply to post by buddha
 


How do 40,000 people watch 2.769 billion?


With technology like Narus, combined with super computers and machine intelligence that do the work of tens of thousands of math crunchers and code breakers.

Of course 40,000 people aren't sitting there monitoring 50,000+ people each (which is about what it would take each NSA analyst to watch over), but a few well placed devices most definitely do. You need to go look at what the device does and you'll understand how it is they do this. Combined with machine learning and massive computing power, the algorithms (over time) have been tweaked to find the most important bits of information. However, the fact of the matter remains, they have the data and can go through it anytime they want.

~Namaste
edit on 30-6-2013 by SonOfTheLawOfOne because: (no reason given)


Christ almighty

Your missing the point

WHY WOULD THEY WANT TO?

Are you saying the the NSA would do daily lottery's to directly spy on people when a computer can as you explained do that job? and the longer its stored the bigger the lottery becomes? a computer storing your online records is not a privacy issues

You'll never be alerted to NSA unless you say BOMB BOMB BOMB BOMB in which case your message will be put into some higher priority to be monitored for further keywords and only if you did it on more & more occasions would an actual worker pull your data for investigation, and only thennnnnn would they need to get a court order to "directly" spy on you if they see you're a threat, and only then, if found to be of no threat could you claim a "privacy issues" the fact is to do what you or others only guess as being done is IMPOSSIBLE and not to mention a massive waste of time money & resources

Seriously how is a computer collecting dust a threat to you? do you not understand how it works?

Until the day i'm bombarded with junk mail through my door i don't think i have a problem with these national security programs protecting me & my family and im certainly not gonna cry if this message was read because i said BOMB BOMB BOMB



posted on Jun, 30 2013 @ 06:01 PM
link   

Originally posted by TritonTaranis
the fact is to do what you or others only guess as being done is IMPOSSIBLE and not to mention a massive waste of time money & resources


Please elaborate. What exactly is "IMPOSSIBLE".


Seriously how is a computer collecting dust a threat to you? do you not understand how it works?


Better than you, apparently.



posted on Jun, 30 2013 @ 06:07 PM
link   

Originally posted by QuantriQueptidez

Originally posted by TritonTaranis
the fact is to do what you or others only guess as being done is IMPOSSIBLE and not to mention a massive waste of time money & resources


Please elaborate. What exactly is "IMPOSSIBLE".


Seriously how is a computer collecting dust a threat to you? do you not understand how it works?


Better than you, apparently.


Yeah sure... and i believe it is you who needs to further elaborate so crack on kid...?

Why don't you tell everybody how NSA or all the hundreds of similar programs the world over that nobody is talking about can directly spy on the worlds population, its not just US/UK which is the point people are missing, why is nobody talking about Russia & China's surveillance programs? if people are deluded enough to think they do not do the same for their own national security fr western operatives & internal threats then they're very very mistaken

the computer only stores and identifies threats the rest of the work is manpower
edit on 30-6-2013 by TritonTaranis because: (no reason given)



posted on Jun, 30 2013 @ 06:09 PM
link   
reply to post by TrueAmerican
 


The only one you can alter is windows xp. For some reason they allowed the spoofing of the sender. All other operating systems will not allow data on the sender to be spoofed. That is why they liked the windows xp orginal not updated for doing sock puppets.





new topics
top topics
 
24
<< 1    3  4 >>

log in

join