Fbi Can Obtain A Warrant If You Run Tor Come December

  • Thread starter indicabush
  • Start date
  • Tagged users None
indicabush

indicabush

2,583
263
This was only a matter of time and next will be any OS that allows you any kind of anonymity.

1...Whonix
2...JonDo
3...Tails
4...I2p

Just to name a few if your curious. This definitely makes it difficult for those moving Bitcoin in any kind of fashion. I for one will be paying attention to the Bitcoin Price Index (digital money)(crypto-currency). If you do not already have VPN services this may be some thing to look into.

Google has already flagged me for suspicious activity when using TOR....I am not a robot box and then a challenge response....this has been going on for some time now. Well here's the link:

http://themerkle.com/fbi-can-obtain-a-warrant-if-you-run-tor-come-december/
 
cemchris

cemchris

Supporter
3,346
263
Yeah the problem with VPN is they also cracked that a while back along with pretty much anything else. Thats why you see airgap as such a big thing. As soon as you get online. It's all she wrote. It comes down to if you think you are safe on the interwebs. You arent and you don't know what you are doing in the first place. Just be a small fish in the big sea and swim by with the pack.
 
LittleDabbie

LittleDabbie

Supporter
11,813
438
It'll never get by Congress.

Thats assuming congress ACTS, Failure for congress to address this issue will result in Action come dec.

The courts have opened the gates for the FBI to obtain warrents with no effort, Its going to take an act of congress to stop this now...

How this does not violate the right to privacy or the right to be free of illegal search and seziures im not really sure.. Stupid ass judges in this country who can't read law i guess.
 
GrowGod

GrowGod

BANNED!
Supporter
8,429
313
Thats assuming congress ACTS, Failure for congress to address this issue will result in Action come dec.

The courts have opened the gates for the FBI to obtain warrents with no effort, Its going to take an act of congress to stop this now...

How this does not violate the right to privacy or the right to be free of illegal search and seziures im not really sure.. Stupid ass judges in this country who can't read law i guess.
Wha:opps: hope your wrong :smoking:
 
LittleDabbie

LittleDabbie

Supporter
11,813
438
Wha:opps: hope your wrong :smoking:

It's what the article said in black and white.. :)

I don't do anything on the web to cause the fbi any interest so i don't care how bad my privacy is being invaded tbh..

But i do think its ridiculous to strip away everyones right to anonymity, all because of sites like the silk road and other vendors selling illegal shit via bitcoin.

Best and worst invention of the 21st century..

But really in the end this is not shocking at all, its always been a game of cat and mouse criminals vs everyone, and it seems everyone suffers in the end, Be it drug laws, be it cyber security.. we all loose.

This is just another loss im sure we're going to have to swallow.
 
SPe G

SPe G

323
43
I 'Have' used Tor Often.. Plan to again, soon.Used BTC Manytimes with the Darknet. Thats who There after. Vendors.
One used est' in 2013 !!. tha Pissed off.. lol ( hey tis their job ) ,,EEiK NOW They have decided to target Tor.
oh yea Results! but for a little time,Eyh!? ..... lol
 
SPe G

SPe G

323
43
BiTCoins or internet Currency is Harmless (n Fab) ............................j'st saying
There is reasons for Anonymity ... poor 'Onion',
Nah Wont be stopped -- lol.
 
Seamaiden

Seamaiden

Living dead girl
23,596
638
Yeah the problem with VPN is they also cracked that a while back along with pretty much anything else. Thats why you see airgap as such a big thing. As soon as you get online. It's all she wrote. It comes down to if you think you are safe on the interwebs. You arent and you don't know what you are doing in the first place. Just be a small fish in the big sea and swim by with the pack.
You seem to be one of the few who grasps this concept. I've posted the same thing more than once, the minute you reach out to the world wide web via your own inet connection, that's it, you're KNOWN.

I went back to the original article, the one that the link came from (the link was a c&p verbatim). I cannot get the link that ostensibly leads us to the pdf of the ruling to work, I keep getting an error. I'd like to find better veracity for this as a ruling.

In the meantime I found this: https://www.eff.org/deeplinks/2016/...rivacy-act-setting-stage-vital-privacy-reform
 
indicabush

indicabush

2,583
263
Yes, my provider knows that I'm about to start browsing or something....

1.......Restart of device
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 127.0.0.1:9481 0.0.0.0:* LISTEN 1635/java
tcp 0 0 127.0.1.1:53 0.0.0.0:* LISTEN 1714/dnsmasq
tcp 0 0 127.0.0.1:53 0.0.0.0:* LISTEN 941/dnscache
tcp 0 0 0.0.0.0:3000 0.0.0.0:* LISTEN 2198/ntop
tcp 0 0 127.0.0.1:8888 0.0.0.0:* LISTEN 1635/java
tcp 0 0 127.0.0.1:9050 0.0.0.0:* LISTEN 3208/tor
tcp 0 0 10.0.0.3:8058 0.0.0.0:* LISTEN 1635/java
tcp 0 0 10.0.0.3:48943 85.25.201.30:443 ESTABLISHED 3208/tor
tcp 0 0 10.0.0.3:41241 185.96.88.29:443 ESTABLISHED 3208/tor
tcp 0 0 10.0.0.3:42035 213.246.56.79:9001 ESTABLISHED 3208/tor
udp 0 0 0.0.0.0:26890 0.0.0.0:* 1635/java
udp 0 0 0.0.0.0:8008 0.0.0.0:* 1635/java
udp 0 0 0.0.0.0:1900 0.0.0.0:* 1635/java
udp 0 0 127.0.1.1:53 0.0.0.0:* 1714/dnsmasq
udp 0 0 127.0.0.1:53 0.0.0.0:* 941/dnscache
udp 0 0 0.0.0.0:68 0.0.0.0:* 1631/dhclient
udp 0 0 0.0.0.0:32332 0.0.0.0:* 1635/java
udp 0 0 0.0.0.0:14499 0.0.0.0:* 1631/dhclient
udp6 0 0 :::41284 :::* 1631/dhclient

2......Proxy nodes set

Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 127.0.0.1:9481 0.0.0.0:* LISTEN 1635/java
tcp 0 0 127.0.1.1:53 0.0.0.0:* LISTEN 1714/dnsmasq
tcp 0 0 127.0.0.1:53 0.0.0.0:* LISTEN 941/dnscache
tcp 0 0 0.0.0.0:3000 0.0.0.0:* LISTEN 2198/ntop
tcp 0 0 127.0.0.1:8888 0.0.0.0:* LISTEN 1635/java
tcp 0 0 127.0.0.1:9050 0.0.0.0:* LISTEN 3208/tor
tcp 0 0 10.0.0.3:8058 0.0.0.0:* LISTEN 1635/java
tcp 0 0 127.0.0.1:9054 0.0.0.0:* LISTEN 4014/tor
tcp 0 0 127.0.0.1:9055 0.0.0.0:* LISTEN 4014/tor
tcp 0 0 10.0.0.3:50103 93.115.95.205:443 ESTABLISHED 4014/tor
tcp 0 0 10.0.0.3:48943 85.25.201.30:443 ESTABLISHED 3208/tor
tcp 0 0 127.0.0.1:9055 127.0.0.1:59988 ESTABLISHED 4014/tor
tcp 0 0 10.0.0.3:41241 185.96.88.29:443 ESTABLISHED 3208/tor
tcp 0 0 10.0.0.3:44353 94.242.246.24:8080 ESTABLISHED 4014/tor
tcp 0 0 10.0.0.3:38639 109.163.234.4:443 ESTABLISHED 4014/tor
tcp 0 0 10.0.0.3:44298 94.242.246.24:8080 TIME_WAIT -
tcp 0 0 10.0.0.3:42035 213.246.56.79:9001 ESTABLISHED 3208/tor
tcp6 0 0 127.0.0.1:59988 127.0.0.1:9055 ESTABLISHED 3989/java
udp 0 0 0.0.0.0:26890 0.0.0.0:* 1635/java
udp 0 0 0.0.0.0:8008 0.0.0.0:* 1635/java
udp 0 0 0.0.0.0:1900 0.0.0.0:* 1635/java
udp 0 0 127.0.1.1:53 0.0.0.0:* 1714/dnsmasq
udp 0 0 127.0.0.1:53 0.0.0.0:* 941/dnscache
udp 0 0 0.0.0.0:68 0.0.0.0:* 1631/dhclient
udp 0 0 0.0.0.0:32332 0.0.0.0:* 1635/java
udp 0 0 0.0.0.0:14499 0.0.0.0:* 1631/dhclient
udp6 0 0 :::41284 :::* 1631/dhclient

3.......Browser opened and visiting the farm

Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 127.0.0.1:9481 0.0.0.0:* LISTEN 1635/java
tcp 0 0 127.0.1.1:53 0.0.0.0:* LISTEN 1714/dnsmasq
tcp 0 0 127.0.0.1:53 0.0.0.0:* LISTEN 941/dnscache
tcp 0 0 0.0.0.0:3000 0.0.0.0:* LISTEN 2198/ntop
tcp 0 0 127.0.0.1:8888 0.0.0.0:* LISTEN 1635/java
tcp 0 0 127.0.0.1:9050 0.0.0.0:* LISTEN 3208/tor
tcp 0 0 10.0.0.3:8058 0.0.0.0:* LISTEN 1635/java
tcp 0 0 127.0.0.1:9054 0.0.0.0:* LISTEN 4014/tor
tcp 0 0 127.0.0.1:9055 0.0.0.0:* LISTEN 4014/tor
tcp 0 0 127.0.0.1:9054 127.0.0.1:36666 ESTABLISHED 4014/tor
tcp 0 0 127.0.0.1:9054 127.0.0.1:36735 TIME_WAIT -
tcp 0 0 127.0.0.1:9054 127.0.0.1:36759 TIME_WAIT -
tcp 0 0 127.0.0.1:9054 127.0.0.1:36704 TIME_WAIT -
tcp 0 0 127.0.0.1:9054 127.0.0.1:36707 ESTABLISHED 4014/tor
tcp 0 0 127.0.0.1:36745 127.0.0.1:9054 TIME_WAIT -
tcp 0 0 10.0.0.3:50103 93.115.95.205:443 ESTABLISHED 4014/tor
tcp 0 0 127.0.0.1:36760 127.0.0.1:9054 TIME_WAIT -
tcp 0 0 127.0.0.1:36707 127.0.0.1:9054 ESTABLISHED 4175/firefox
tcp 0 0 127.0.0.1:9054 127.0.0.1:36741 TIME_WAIT -
tcp 0 0 127.0.0.1:36746 127.0.0.1:9054 ESTABLISHED 4175/firefox
tcp 0 0 10.0.0.3:48943 85.25.201.30:443 TIME_WAIT -
tcp 0 0 127.0.0.1:36750 127.0.0.1:9054 ESTABLISHED 4175/firefox
tcp 0 0 127.0.0.1:36646 127.0.0.1:9054 ESTABLISHED 4175/firefox
tcp 0 0 127.0.0.1:36755 127.0.0.1:9054 TIME_WAIT -
tcp 0 0 127.0.0.1:9054 127.0.0.1:36727 TIME_WAIT -
tcp 0 0 127.0.0.1:9055 127.0.0.1:59988 ESTABLISHED 4014/tor
tcp 0 0 10.0.0.3:41241 185.96.88.29:443 ESTABLISHED 3208/tor
tcp 0 0 127.0.0.1:9054 127.0.0.1:36747 ESTABLISHED 4014/tor
tcp 0 0 127.0.0.1:9054 127.0.0.1:36746 ESTABLISHED 4014/tor
tcp 0 0 127.0.0.1:9054 127.0.0.1:36728 TIME_WAIT -
tcp 0 0 127.0.0.1:36674 127.0.0.1:9054 ESTABLISHED 4175/firefox
tcp 0 0 127.0.0.1:9054 127.0.0.1:36701 TIME_WAIT -
tcp 0 0 127.0.0.1:9054 127.0.0.1:36726 TIME_WAIT -
tcp 0 543 10.0.0.3:44353 94.242.246.24:8080 ESTABLISHED 4014/tor
tcp 0 0 127.0.0.1:36757 127.0.0.1:9054 TIME_WAIT -
tcp 0 0 127.0.0.1:9054 127.0.0.1:36736 TIME_WAIT -
tcp 0 0 127.0.0.1:36748 127.0.0.1:9054 ESTABLISHED 4175/firefox
tcp 0 0 127.0.0.1:9054 127.0.0.1:36646 ESTABLISHED 4014/tor
tcp 0 0 127.0.0.1:36754 127.0.0.1:9054 TIME_WAIT -
tcp 0 0 127.0.0.1:9054 127.0.0.1:36730 TIME_WAIT -
tcp 0 0 10.0.0.3:38639 109.163.234.4:443 ESTABLISHED 4014/tor
tcp 0 0 127.0.0.1:36758 127.0.0.1:9054 TIME_WAIT -
tcp 0 0 127.0.0.1:9054 127.0.0.1:36748 ESTABLISHED 4014/tor
tcp 0 0 127.0.0.1:36751 127.0.0.1:9054 ESTABLISHED 4175/firefox
tcp 0 0 127.0.0.1:9054 127.0.0.1:36751 ESTABLISHED 4014/tor
tcp 0 0 127.0.0.1:36747 127.0.0.1:9054 ESTABLISHED 4175/firefox
tcp 0 0 127.0.0.1:9054 127.0.0.1:36733 TIME_WAIT -
tcp 0 0 127.0.0.1:36642 127.0.0.1:9054 TIME_WAIT -
tcp 0 0 127.0.0.1:36709 127.0.0.1:9054 ESTABLISHED 4175/firefox
tcp 0 0 127.0.0.1:9054 127.0.0.1:36749 ESTABLISHED 4014/tor
tcp 0 0 127.0.0.1:36749 127.0.0.1:9054 ESTABLISHED 4175/firefox
tcp 0 0 127.0.0.1:9054 127.0.0.1:36737 TIME_WAIT -
tcp 0 0 127.0.0.1:9054 127.0.0.1:36722 TIME_WAIT -
tcp 0 0 127.0.0.1:9054 127.0.0.1:36674 ESTABLISHED 4014/tor
tcp 0 0 127.0.0.1:36643 127.0.0.1:9054 TIME_WAIT -
tcp 0 0 127.0.0.1:36744 127.0.0.1:9054 TIME_WAIT -
tcp 0 0 127.0.0.1:9054 127.0.0.1:36709 ESTABLISHED 4014/tor
tcp 0 0 127.0.0.1:9054 127.0.0.1:36712 TIME_WAIT -
tcp 0 0 127.0.0.1:36753 127.0.0.1:9054 TIME_WAIT -
tcp 0 0 127.0.0.1:9054 127.0.0.1:36750 ESTABLISHED 4014/tor
tcp 0 0 127.0.0.1:9054 127.0.0.1:36658 TIME_WAIT -
tcp 0 0 127.0.0.1:36666 127.0.0.1:9054 ESTABLISHED 4175/firefox
tcp 0 0 127.0.0.1:36725 127.0.0.1:9054 TIME_WAIT -
tcp 0 0 127.0.0.1:9054 127.0.0.1:36742 TIME_WAIT -
tcp 0 0 10.0.0.3:42035 213.246.56.79:9001 ESTABLISHED 3208/tor
tcp 0 0 127.0.0.1:36752 127.0.0.1:9054 TIME_WAIT -
tcp6 0 0 127.0.0.1:36768 127.0.0.1:9054 TIME_WAIT -
tcp6 0 0 127.0.0.1:59988 127.0.0.1:9055 ESTABLISHED 3989/java
udp 0 0 0.0.0.0:26890 0.0.0.0:* 1635/java
udp 0 0 0.0.0.0:8008 0.0.0.0:* 1635/java
udp 0 0 0.0.0.0:1900 0.0.0.0:* 1635/java
udp 0 0 127.0.1.1:53 0.0.0.0:* 1714/dnsmasq
udp 0 0 127.0.0.1:53 0.0.0.0:* 941/dnscache
udp 0 0 0.0.0.0:68 0.0.0.0:* 1631/dhclient
udp 0 0 0.0.0.0:32332 0.0.0.0:* 1635/java
udp 0 0 0.0.0.0:14499 0.0.0.0:* 1631/dhclient
udp6 0 0 :::41284 :::* 1631/dhclient

Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 127.0.0.1:9481 0.0.0.0:* LISTEN 1635/java
tcp 0 0 127.0.1.1:53 0.0.0.0:* LISTEN 1714/dnsmasq
tcp 0 0 127.0.0.1:53 0.0.0.0:* LISTEN 941/dnscache
tcp 0 0 0.0.0.0:3000 0.0.0.0:* LISTEN 2198/ntop
tcp 0 0 127.0.0.1:8888 0.0.0.0:* LISTEN 1635/java
tcp 0 0 127.0.0.1:9050 0.0.0.0:* LISTEN 3208/tor
tcp 0 0 10.0.0.3:8058 0.0.0.0:* LISTEN 1635/java
tcp 0 0 127.0.0.1:9054 0.0.0.0:* LISTEN 4014/tor
tcp 0 0 127.0.0.1:9055 0.0.0.0:* LISTEN 4014/tor
tcp 0 0 127.0.0.1:9054 127.0.0.1:36807 ESTABLISHED 4014/tor
tcp 0 0 127.0.0.1:9054 127.0.0.1:36782 ESTABLISHED 4014/tor
tcp 0 0 10.0.0.3:50103 93.115.95.205:443 ESTABLISHED 4014/tor
tcp 0 0 127.0.0.1:36782 127.0.0.1:9054 ESTABLISHED 4175/firefox
tcp 0 0 127.0.0.1:9055 127.0.0.1:59988 ESTABLISHED 4014/tor
tcp 0 0 10.0.0.3:41241 185.96.88.29:443 ESTABLISHED 3208/tor
tcp 0 0 127.0.0.1:36807 127.0.0.1:9054 ESTABLISHED 4175/firefox
tcp 0 0 127.0.0.1:9054 127.0.0.1:36783 ESTABLISHED 4014/tor
tcp 0 0 10.0.0.3:44353 94.242.246.24:8080 ESTABLISHED 4014/tor
tcp 0 0 10.0.0.3:38639 109.163.234.4:443 ESTABLISHED 4014/tor
tcp 0 0 127.0.0.1:36783 127.0.0.1:9054 ESTABLISHED 4175/firefox
tcp6 0 0 127.0.0.1:59988 127.0.0.1:9055 ESTABLISHED 3989/java
udp 0 0 0.0.0.0:26890 0.0.0.0:* 1635/java
udp 0 0 0.0.0.0:8008 0.0.0.0:* 1635/java
udp 0 0 0.0.0.0:1900 0.0.0.0:* 1635/java
udp 0 0 127.0.1.1:53 0.0.0.0:* 1714/dnsmasq
udp 0 0 127.0.0.1:53 0.0.0.0:* 941/dnscache
udp 0 0 0.0.0.0:68 0.0.0.0:* 1631/dhclient
udp 0 0 0.0.0.0:32332 0.0.0.0:* 1635/java
udp 0 0 0.0.0.0:14499 0.0.0.0:* 1631/dhclient
udp6 0 0 :::41284 :::* 1631/dhclient

Yes, of course my provider knows I'm doing something.........

So which is my guard node, middle node and then exit node in this 3 hop circuit? What if my exit node is constantly changing. They consider this suspicious activity when this has been my mode of operating for many years. If the powers that be can operate in this fashion so can I.
 
DrMcSkunkins

DrMcSkunkins

Dabbling in Oil
3,901
263
I have noticed that when I search chrome lately it pops up the captcha thing saying they want to make sure you arent a robot. I have just noticed this in the last month.
 
indicabush

indicabush

2,583
263
@DrMcSkunkins ....its been going on for quite some time with anything related to Google. This dork draws attention as suspicious activity..........

Google search: inurl:trafficcams -intext:trafficcams
traffic cams for a lot of cities...this is incomplete of course, but you get the idea.
 
LocalGrowGuy

LocalGrowGuy

2,497
263
@DrMcSkunkins ....its been going on for quite some time with anything related to Google. This dork draws attention as suspicious activity..........

Google search: inurl:trafficcams -intext:trafficcams
traffic cams for a lot of cities...this is incomplete of course, but you get the idea.
What kind of porn are you into? :)
 
Fish.Carbone

Fish.Carbone

24
13
Used to be worried about this sort of thing but then watched a few Jacob Applebaum vids etc and realised they won the war before most knew that we were fighting for such rights online. Smarter people than me are trying to help change things though got too keep on the positive.
 
cemchris

cemchris

Supporter
3,346
263
@cemchris ....Please tell all how a "diskless vpn" can be compromised. To this day I'm still trying to read empty log messages.

Hacking VPN has nothing to do with log files ect. You are thinking of this the wrong way. It has to do with marking where your traffic is coming/going. Once that is decrypted doesnt matter what kind of security you have in place cause they aren't hacking through the encryption just "watching" the traffic. Unless you found some magical VPN that doesn't use DNS servers (which the gov owns so yeah). The NSA has a whole team dedicated to tracking VPN's. If they hacked 1024 bit RSA you think VPN is safe? It's all about wording. Like we were talking about in Apple thread. When Apple comes out and says "The NSA can't brute force the 256 bit AES key." Sure that's true they can't. The thing is they arent going to brute force it. They are going to exploit the system or the key and work around it. So it looks good since it seems Apple has really found something to throw a wrench in their plans. "Ha Ha look at us sticking it to the MAN." But the truth is its a joke plain and simple as you saw how the Apple stuff turned out with unlocking the phone. Again all the VPN and crypto in the world isn't going to do anything. Look at Bluffdale and tell me how safe you feel with your crypto. Also if this is from you house/business and not out in a public place that can't be tied to you and then transferring files to an air gaped system you are also just making yourself feel better without actually being safe in the sense.

"...the NSA has a dedicated team to crack VPN traffic and feed it to their data mining software."
https://anon.to/kGkXNB

Also if you are based in the US and using a VPN or Tor that right away makes it look like you have something to hide so there is also that to consider. Kind of like end to end encrypted txts or emails. If they have a reason to be looking at you in the first place that is gonna just peak their interest just a little more. The underlined sentence is key.

there is no privacy...NONE.

laws or no laws, they do want they want, when they want.

and BTW don't think "congress" is gonna keep you safe. They work for the same team of scoundrels.


pretty much /thread
 
Last edited:
Top Bottom