• 0 Posts
  • 12 Comments
Joined 4 months ago
cake
Cake day: March 19th, 2025

help-circle






  • It hasn’t, it’s just that good opsec is impossible in the long run and everyone is bound to be deanonymized eventually. For example, if you’re using a clean account on a CP sharing forum, it’s possible to track your mannerisms and post history (content, timezone, etc) to get an estimate of where you live. Then they can subpoena the ISPs for IP traffic in that region and figure out who is using Tor. That subset of IPs may then be cross referenced with the time that suspect’s account posted, that can be used as probable cause for a warrant… That sort of stuff. Sounds super complicated but most of it can be automated and bypassed these days (I don’t think you actually need to subpoena for example).
    Where did the suspect fail? He should have used multiple accounts, spaced out the interactions more randomly, used stolen WiFi, ran his comments through a translator and back, etc. At no point did Tor fail at securing his IP address end to end






  • First off, Google has made agressive deals with phone manufacturers to ship spyware with their phones by default, and some of the stuff can only get taken out by rooting/jailbreaking the phone. By doing so, they acquired nearly 100% of the app store market share, and then used it to make “useful features” such as integrity checks that are tied to the Play Services app (which is an always on spyware background app).
    The end result is, even if you manage to root your phone and install a custom ROM (which is not always available to every model), a bunch of apps will refuse to work properly because you fail the Google Play fingerprinting steps and are assumed to be a security vulnerability. If I’m not mistaken there’s also some shady stuff with certificates, too