Comments by "Bond25" (@Bond2025) on "Mental Outlaw"
channel.
-
30
-
Privacy and Anonymity are completely different. Tor was compromised in 2013, users can be identified by rogue nodes and traffic staining techniques. That is why GCHQ runs a lot of Tor Nodes. The Tor Browser Bundle was altered, possibly with the agreement of the developers to assist Law Enforcement with Operation Onymous in 2014. All the default security settings were changed to the lowest level and scripts were turned on. The script feature was also left operating despite the setting being set to off/blocked in later releases - to assist further with police investigations. The way it worked was that sites run a script when a user connected and the Tor Browser Bundle firefox sent replies outside Tor, back to Law Enforcement. Certain sites were given ID numbers and once the user connected, firefox run the script and identified the real IP address of the person.
Tor Project would never answer questions over this. They also presented for download a version in November and December 2013 that had a "profiler trojan" built in, but only identifiable by Kaspersky antivirus at the time, because that company would not assist with exposing users.
Some sites had pictures and videos that were modified, so they would cause a video player or picture viewer program to call for extra resources or a CODEC. Unless you blocked this or set VLC, for example, to connect out on a random IP and Port, you would be connected to Law Enforcement and they tracked you. Other files were just remote access trojans and law enforcement just sat watching what users did.
VPNs are dangerous. YouTube affiliates only advertise them as they earn up to 40% of each referral. Most are only Proxy Servers, not VPNs. They operate on rented equipment in datacnters like M247 Ltd - who are forced to hand over all data in the UK at the request of police with a Production Order. The VPN collects, inspects, manipulates and redirects your data and sifts through to see if there is anything they can add to a user profile. Some VPNs want email addresses, phone numbers, WifI info, contact lists, PRECISE LOCATION and also your credit card details as your verified profile is sold for more.
Even if the VPN doesn't collect all your data, the Host Company can and does sell it to whoever wants it
A VPN only hides the IP, technology has moved on in the past 10years, now it is possible to trace anyone anywhere. Security Services can locate a person using facial recognition, using input from doorbells, CCTV, phones, ANPR etc. They can also tell who is with you if you are talking near a phone or alexa, or some TVs.
17
-
@wintrywind I definitely would be using KAPE/Nord and all the others running your data through the same Datacenter proxy servers. All your Data is logged, stored and assigned to the profile associated with your credit card account. The Data is then collected and sold again by the hosting company. ALL VPNs log your data, if they say they don't, or say no one does, they are not being honest. They all cooperate with Police and Security Services.
If your data goes through anything in the UK, it must be made available to GCHQ. This is why PIA stopped using UK hosts, they had their UK servers located in Amsterdam. It doesn't stop anything, the Police ask a partner country to get the information under different local Laws.
Only one or two VPNs respect privacy and make it impossible to supply data on users, they are PRQ and Mullvad.
Beware of the many VPNs that are set up as a front, some like WeVPN were even being recommended by idiot influencer types just in it for the money, they never got paid! We have suspicions about Proton. Will this ever be the next Excrochat, plenty think it will.
5
-
4
-
4
-
4
-
4
-
I agree, I used a VPN to stop my ISP being nosey, but found there were stronger Laws protecting my info than with PIA or the HoneyPot VPN called WeVPN. What you need to do is see how many companies refuse to accept a VoIP number even if it is valid and you pay for it. They want to be able to track you. I got a Pixel and use Graphene, with FDroid and similar stores. I use a VoIP number and only use the SIM for data. That also means all permissions are switched off to avoid tracking apart from to the Cell Site ping. Your choice of Apps needs to be changed, for example, use Bitwarden and use Aegis Authenticator. Some 2FA Apps, Twilio Authy being one, take all the data they can through permissions you agree to and sell it on to others. They have never said what they do with the data they take or for what purpose.
Never use Twitter on the App, or Youtube, use browsers on the phone and use Brave.
You really need to section off social media, work and hone.
2
-
2
-
2
-
2
-
2
-
2
-
2
-
2
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1