Living Rent Free

Readers on this site do not see comments attacking people contributing content and comments since they are deleted and blacklisted. While they seem to get some satisfaction from their attacks, my response is best reflected by the late master above.

I used to say that everyone gets a new start when the collapse happens. That means the slate is wiped clean for me with people as we move forward to build a better future for our children. We passed that line once the Republic was overthrown in the 2020 elections.

As for those attackers who use a VPN for rotating IP addresses: you should know by now that tactic does not work.

My point is simple: we are all in this together. Attacking each other only helps the evil side promote their agenda and our demise. I wish I could offer so solace to these people who have nothing better to do with their lives but I do not have the time.

David DeGerolamo

    
Plugin by: PHP Freelancer
This entry was posted in Editorial. Bookmark the permalink.
5 3 votes
Article Rating
9 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Thomas Angle
Thomas Angle
2 years ago

As for those attackers who use a VPN for rotating IP addresses: you should know by now that tactic does not work.

You should do an article on this one. Because there are those that think they really keep you safe on line. The packets need to be routed there and back, there is always a trail and always a place to retrieve such information.

Fido
Fido
2 years ago
Reply to  Thomas Angle

IP address is just one piece of information you provide when you connect to a web server, although it is the *one* piece that *cannot* be spoofed. There is a great deal of “fingerprinting” going on in modern web servers, involving multiple technologies. They are all spoofable, but even how you choose to spoof is information that can help identify you. Allowing the server to use cookies helps to identify you, allowing them javascript helps a great deal more. There are also features in modern HTML protocols that can be used, as well as timing and other “quirks” that identify your browser and operating system, and even your kernel’s IP protocol stack. That’s alot to play with, but the more things there are to play with, the more you can be identified by how you play with it.

Thomas Angle
Thomas Angle
2 years ago
Reply to  Fido

I was thinking more along the lines that if you have access to all the routers, you know where everything goes. They can capture the packets and decrypt them and no one knows about it.

They have had access to all this for a long time now. The internet is not safe for confidential information.

Fido
Fido
2 years ago
Reply to  Thomas Angle

ok, yeah, that’s “next level” shit right there. As far as I know, only the NSA can do that shit. They do *not* have access to *all* routers, as I controlled a few of them once and can be sure only of them. I do know that *all* of the backbone routers at all of the major peering points, like MAE west, are… or rather the data is: the routers might be secure, but their traffic is *all* copied and “tee”ed off to NSA controlled routers in secure rooms. Most corporationslarge enough to employ more than 50 good coders have a single room somewhere, where no one is seen entering or exiting during business hours, and entrace is CAC controlled (DOD smart-card).

I have my doubts about their ability to decrypt modern public-key encryption (unless actual 200 qubit quantum computers exist, which I also seriously doubt), but for most things they don’t have to. They can track packets by their source/destination IP, size and timestamps, and identify which machines are talking to which machines, even through VPN, then they can compromise the endpoints either through backdoors provided by microsoft/apple, through known zero-day holes, or if all else fails, there is always the intel ME backdoor. There are mitigations for all of these, but man that’s a lot of work, and an ongoing cat and mouse game.

Thomas Angle
Thomas Angle
2 years ago
Reply to  Fido

Team Cymru does it. Then they sell the “threat data” to “customers”.

“but man that’s a lot of work, and an ongoing cat and mouse game.”

And it is a game 99.99999% of the people cannot play.

All the companies will sell or loan their keys to the backdoor.

Last edited 2 years ago by Thomas Angle
tom finley
tom finley
2 years ago

On loan from God, I miss Rush, I believe God could not stand to be away from him any longer

Thomas Angle
Thomas Angle
2 years ago
Reply to  tom finley

I cannot believe who has taken Rush’s place. Times are tough.

Don
Don
2 years ago

BRAVO

Lawnmore
Lawnmore
2 years ago

I agree completely! Thanks for your hard work and vision!
No empire last for ever, this one will die as well. Hopefully you have kindled the spirit of freedom for the future!