Jump to content

Recommended Posts

Posted

Unless someone in the US has enough money to matter, or a minimum of self efficacy, they're not likely to have their "rights" "respected" regardless of what any piece of really old toilet paper says. Cops in the US are trained with the Reid Technique so they care more about getting a confession than protecting your freedom. Using lies and manipulation during investigations to fill the quotas that they absolutely do have.

 

I'm really looking forward to extracting myself from this shithole clusterfuck sociopath factory.

Posted

The 4th was never alive. You cannot give somebody imaginary powers AND limit those powers. All you can do is help others to realize that the powers are in fact imaginary.

Posted

FBI owns and operates child pornography site = utmost good!

person allegedly visits said site = evil immoral scum of the earth

 

'merica!

 

good find, don't use Tor

  • Upvote 1
Posted

What it should have said is, if you use your computer to access a site controlled by the government for the express purpose of engaging in criminal activity, the government will attempt to install spyware on your computer to identify you in order to use such information to establish probable cause for executing a search & seizure warrant against your computer used to access such site and any other computer electronics or storage media that might be used pursuant to such criminal activities.

 

Not worried about this case, unlike other cases. If on the other hand, the government was using access to government controlled websites (or any other entity's webiste(s)) for any non-criminal purpose as an opportunity to install such spyware, I would DEFINITELY object. If one has committed a crime, it is not unreasonable to in the moment employ reasonable and prudent measures to identify precisely WHO committed the crime and what items may be used to establish the guilt of the individual. It is essentially the same as following a masked bandit back to their hide out immediately upon robbing a bank and seeing who they are when they take their mask off.

Posted

good find, don't use Tor

I did not read the article, and did not understand what you ment with this sentence. Could you elaborate? I assume you are referring to Tor the anonymity network. Why should we not use it? (If that is what you ment to say.)

Posted

I did not read the article, and did not understand what you ment with this sentence. Could you elaborate? I assume you are referring to Tor the anonymity network. Why should we not use it? (If that is what you ment to say.)

 

Many people "in the know" agree that the Tor network is one big honeypot. 2 years ago, a couple days before they gave a talk announcing and releasing Tor at Defcon and Blackhat, news came out that Tor was funded by the U.S. Government. if you look at the court docs linked in the article it even refers to Tor as being developed for U.S. Naval Research. There are numerous accounts (including this one) where the CIA and FBI have set up honeypots specifically to incriminate people. Whether or not these people actually did something wrong (which is questionable) they were only able to do it and only did it because of the situation the State created for them. I realize that may have come off as confusing but what I mean is the FBI owns, runs, and continues to operate the child porn site this guy allegedly went to and they run it specifically to catch people who want to go to sites like this (a.k.a. honeypot).

  • Upvote 1
Posted

Many people "in the know" agree that the Tor network is one big honeypot. 2 years ago, a couple days before they gave a talk announcing and releasing Tor at Defcon and Blackhat, news came out that Tor was funded by the U.S. Government.

What I know is that the guy working on it created viruses on assignment to attack and help bring down the Amiga home computer. Which is like twisting a knife into my past, so I did not trust Tor after I read that.

Posted

What I know is that the guy working on it created viruses on assignment to attack and help bring down the Amiga home computer. Which is like twisting a knife into my past, so I did not trust Tor after I read that.

What???  As an Amiga owner of many years (A2000,A3000), and realllly upset about what happened (B.Gates gets no holiday cards from me), I don't recall virus issues.  Do you have links?

Posted

What???  As an Amiga owner of many years (A2000,A3000), and realllly upset about what happened (B.Gates gets no holiday cards from me), I don't recall virus issues.  Do you have links?

There is a virus called Saddam. Disk validator virus. I had experience with that virus.

 

But my bad, I mixed things up. I finally found the person I was thinking of. It is John Draper AKA Captain Crunch. I read in the comments of a youtube video where he is interviewed by Alex Jones, that he was probably/is behind the virus. Which makes sense because he was working with Apple at the time, which was in competition with Commodore/Amiga.

 

I remembered that he was talking about working with an encryption prog, but it might have been Thunder Cloud. So not Tor. Started with the same letter, so my brain messed up.

 

I am sorry for causing you distress.

Posted

...I am sorry for causing you distress.

 

Dude!  YOU don't cause me distress...distress was from B. Gates, voted many years in a row the person most likely to be the anti-christ, a title only now under challenge by A.Gore....

  • Upvote 1
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.