General statistics
List of Youtube channels
Youtube commenter search
Distinguished comments
About
Bond25
David Bombal
comments
Comments by "Bond25" (@Bond2025) on "David Bombal" channel.
Previous
1
Next
...
All
He wasn't aware of air-gap techniques used over 10yrs ago to communicate with any device via WiFi or Bluetooth. The device did not need to be connected to the Internet as whatever it was near could report the proximity. If you removed all RF devices and never plugged it in, you might find that people marked as targets would have to use something like USB storage to view files. Depending on the sites they were obtained from depends what was in them and what they did. Your off the shelf firewall will not help. The only decent firewall for stopping NSA and GCHQ was by Kaspersky, but they were also spying on you!
23
Ryan doesn't know that there is no agreed standard for encrypting mail sent between ISPs so it all goes as plain text. Protonmail can see everything without the need to decrypt anything after they encrypt it for users. Law Enforcement love it. He confused End2End with Encryption2Server. This is a common mistake.
1
The big problem is, all the reviews are exactly the same from the hundreds of people that were sent the RPi5. They are not as good as a miniPC that doesn't cost much more when you add a power supply, mouse and keyboard and storage and case and cooling and all the other bits you need. The mini PC is far better value and not as slow, plus it runs a lot more and could be used to run other OS. Now we have a silly situation of not being able to buy one, not being guaranteed we will get one even if we pay in advance to companies wanting to make money from our free loans. I tested it too, it's not a PC replacement, it's slow and not good on youtube and struggles on 4K videos and dual monitors. It is NOT that much better than a 4. So if you just want to run AdGuardHome or PiHole it is OK. Forget trying to run a firewall on it!
1
Tor is the biggest risk. I remember reading the docs years back about all the warnings such as "do not open downloaded files unless disconnected from the internet" and "do not run scripts". Later we found out how most people were caught through various techniques. One was files that had an odd extension, the computer would use VLC for example to go and fetch something, but this often caused an outbound connection and provided the ID of the user. Word and Excel documents, even a lot of JPG would cause the computer to connect outside Tor to a Law Enforcement IP. A lot of spyware was used too, people would click on anything in order to obtain something illegal. Users were watched on their own webcams, remote access tools were used too. In 2013 TorProject complied with an Order from Law Enforcement to assist them with identifying users. Around October/November a modified version of Tor was put on the site for download and marked as an update. To facilitate Operation Onymous, Tor Project had set privacy to low and allowed all scripts to run. This is what law enforcement needed to identify computers and IPs going to various sites. The version I downloaded from TorProject had a "Profiler Trojan" built in and my complaints were dismissed about why this was being distributed. It was for Law Enforcement. Last year we all found out that despite being set to high privacy, ALL scripts were still running on every site to assist Law Enforcement. This had been going on for some time. This is why I no longer trust Tor or the people behind the project if they are being ordered to manipulate software and put people at risk.
1
Previous
1
Next
...
All