• Amused
  • Angry
  • Annoyed
  • ArrgPirate
  • atwork
  • Awesome
  • Bemused
  • Cocky
  • Cool
  • Crazy
  • Crying
  • deejayn
  • Depressed
  • Down
  • drinking
  • Drunk
  • eating
  • editing
  • Embarrased
  • Enraged
  • Friendly
  • gamingpc
  • gamingps
  • gamingsteam
  • gamingxbox
  • Geeky
  • Godly
  • Happy
  • hatemailing
  • Hungry
  • Innocent
  • lagging
  • livestreaming
  • loving
  • lurking
  • Meh
  • netflix
  • nostatus
  • Poorly
  • raging
  • Sad
  • Secret
  • Shy
  • Sneaky
  • Tired
  • trolling
  • Wtf
  • youtuber
  • zombies
  • Page 1 of 2 12 LastLast
    Results 1 to 10 of 13

    Thread: Feds use keyloggers

    1. #1
      Banned
      This user has no status.
       
      I am:
      ----
       
      grim's Avatar
      Join Date
      Dec 2012
      Posts
      322
      Post Thanks / Like
      Rep Power
      324

      Feds use keyloggers

      to defeat encrypted mail..

      ppl u gotta stop being so sloppy and depending only on encrypted mail..

      http://news.cnet.com/8301-10784_3-9741357-7.html

      This is old news but ppl obviously still not getting the message

    2.    Sponsored Links

      ----
    3. #2
      Super Moderator
      This user has no status.
       
      I am:
      nostatus
       
      beanlicker's Avatar
      Join Date
      Jul 2012
      Posts
      5,825
      Post Thanks / Like
      Rep Power
      6224
      This was the equivalent of a telephone wire tap which was installed at the internet provider company and there is no software or email provider that could have prevented these interceptions.......

      The judges' conclusion: federal agents did not violate the Fourth Amendment when spying on the Escondido DSL line without any evidence of criminal wrongdoing on his behalf, a legal standard known as probable cause. All the feds must do is prove the information is "relevant" to an ongoing investigation.


      The wiretap was done at PacBell's connection facility at 650 Robinson Rd. in San Diego. The DEA obtained what's known as a "mirror port," a feature that many network switches made by companies including Cisco Systems include for troubleshooting purposes.


      A mirror port duplicates all the Internet traffic of one user to a second port on the same switch, without the suspect being alerted that electronic surveillance is under way. The scheme is probably easier to accomplish with a static Internet Protocol (IP) address, which is what the Escondido case involved.

      "All the feds must do is prove the information is "relevant" to an ongoing investigation"......among other things, always be smart with your trash and don't tell other people about your business.

    4. ----
    5. #3
      Member
      This user has no status.
       
      I am:
      ----
       

      Join Date
      Aug 2012
      Posts
      261
      Post Thanks / Like
      Rep Power
      217
      Quote Originally Posted by grim View Post
      to defeat encrypted mail..

      ppl u gotta stop being so sloppy and depending only on encrypted mail..

      http://news.cnet.com/8301-10784_3-9741357-7.html

      This is old news but ppl obviously still not getting the message
      What r the options?

    6. ----
    7. #4
      Super Moderator
      This user has no status.
       
      I am:
      nostatus
       
      beanlicker's Avatar
      Join Date
      Jul 2012
      Posts
      5,825
      Post Thanks / Like
      Rep Power
      6224
      The only option to beating the Keyloggers ( AKA wire tap) is to avoid giving the feds "relevant information" to get to that point.

      Protect your IP addy

      Put your dirty trash in a smart place

      Don't talk about your use

      Avoid making giant orders

      Use your common sense

    8. ----
    9. #5
      Member
      This user has no status.
       
      I am:
      ----
       

      Join Date
      Aug 2012
      Posts
      261
      Post Thanks / Like
      Rep Power
      217
      Quote Originally Posted by beanlicker View Post
      The only option to beating the Keyloggers ( AKA wire tap) is to avoid giving the feds "relevant information" to get to that point.

      Protect your IP addy

      Put your dirty trash in a smart place

      Don't talk about your use

      Avoid making giant orders

      Use your common sense
      Bro I'm good on 4 of those....I don't know ip addy security though. What can I do

    10. ----
    11. #6
      Member
      is Beast mode....you mean awake?
       
      I am:
      Cocky
       
      miggymig's Avatar
      Join Date
      Mar 2012
      Posts
      256
      Post Thanks / Like
      Rep Power
      821
      Good advice bro

    12. ----
    13. #7
      Senior Member
      is Beginning recovery of torn
      bicep: distal
       
      I am:
      Hungry
       
      rmkicks's Avatar
      Join Date
      Dec 2010
      Location
      at the gym or in the kitchen
      Posts
      4,021
      Post Thanks / Like
      Rep Power
      5522
      Hey Grim, why don't you lay out a step by step plan for us to follow to keep safe. Dumb it down for those of us who are lacking in the I.T department. List exactly what is needed, where to get it, how much it costs, etc.

    14. ----
    15. #8
      Banned
      This user has no status.
       
      I am:
      ----
       
      grim's Avatar
      Join Date
      Dec 2012
      Posts
      322
      Post Thanks / Like
      Rep Power
      324
      #1 definitely do not use US hosted boards. LE can easily monitor EVERYTHING
      #2 i personally recommend a vpn as its more secure but if you want the anonymity you can run tor over the top.
      #3 Basic common sense don't open attachments in emails that you are not 100% sure on
      #4 Use an antivirus program that detects keyloggers and has a policy not to give in to big brother. Most of your name brand antivirus programs actually put in back doors.
      Do the same for your firewall, and other misc security programs. You can find pages that list programs who have refused to open back doors for the government.

      There are also programs that are supposed to scramble your typing to defeat keyloggers, I never used 1 though.

      Point is there is so much more to secure than just your email. Most can be done for free, very easily. Such as encrypting your hard drive

      http://www.truecrypt.org/ free easy to use program, who refuses to give big brother backdoor access

    16. ----
    17. #9
      Senior Member
      This user has no status.
       
      I am:
      ----
       
      kuntrykok's Avatar
      Join Date
      Apr 2012
      Location
      U.S.A.
      Posts
      756
      Post Thanks / Like
      Rep Power
      654
      great advice Grim.

    18. ----
    19. #10
      Legacy Member
      is proudly lurking since 2012.
       
      I am:
      lurking
       
      RussianBear's Avatar
      Join Date
      Feb 2012
      Posts
      79
      Post Thanks / Like
      Rep Power
      121
      interesting...

    20. ----
    Page 1 of 2 12 LastLast

    Similar Threads

    1. Postal package profiling, straight from the Feds!
      By beanlicker in forum STEROID BUSTS
      Replies: 34
      Last Post: 03-24-2015, 05:02 AM
    2. Replies: 1
      Last Post: 12-15-2011, 03:00 AM

    Tags for this Thread

    Bookmarks

    Posting Permissions

    • You may not post new threads
    • You may not post replies
    • You may not post attachments
    • You may not edit your posts
    •