What's new
  • Happy Birthday ICMag! Been 20 years since Gypsy Nirvana created the forum! We are celebrating with a 4/20 Giveaway and by launching a new Patreon tier called "420club". You can read more here.
  • Important notice: ICMag's T.O.U. has been updated. Please review it here. For your convenience, it is also available in the main forum menu, under 'Quick Links"!

how safe,really,is this site......

This is not true. Every residential internet connection has it's own IP address. These IPs are usually "dynamic" as opposed to "static" meaning your IP will change each time the modem renews the "lease" on the IP, but that is not randomization. They keep a database that says "customer number xxxxxx had IP address xx.xx.xx.xx between MM/DD/YYYY and MM/DD/YYYY until it was renewed and now the current IP address is xx.xx.xx.xx."

Granted, when you hook up a wireless router in your home, every computer connecting to the net has the same IP address, the one assigned to your modem, but they know whose house it is.

I'm not disagreeing with you on the resources situation at all though. There is no way they can monitor what every single one of us do.
I'm curious to what people mean when they "proxy" their connections. I have heard of others proxying their connection to show up that they live in a different country as to where they actually live. Is the fact? And if that is true, can police or your isp figure out that you are proxying?
 

wintermute

Member
Using Tor with ICMag

Using Tor with ICMag

I've have and try to use tor sometimes, but its a royal pain in the ass. Its very slow and you have to log in with every new page because the website gets a different ip address with every new page reqest.

Set the TrackHostExits option in your Tor config file:
TrackHostExits host,.domain,...

For each value in the comma separated list, Tor will track recent connections to hosts that match this value and attempt to reuse the same exit node for each. If the value is prepended with a ’.’, it is treated as matching an entire domain. If one of the values is just a ’.’, it means match everything. This option is useful if you frequently connect to sites that will expire all your authentication cookies (ie log you out) if your IP address changes. Note that this option does have the disadvantage of making it more clear that a given history is associated with a single user. However, most people who would wish to observe this will observe it through cookies or other protocol-specific means anyhow.

Like:
TrackHostExits .icmag.com
 

cannabi

Member
I'm curious to what people mean when they "proxy" their connections. I have heard of others proxying their connection to show up that they live in a different country as to where they actually live. Is the fact? And if that is true, can police or your isp figure out that you are proxying?

A proxy is a service that connects you to another IP address and then retrieves the data in question from the remote computer, the proxy, and then the proxy hands that information over to you, seamlessly. Now, if your connection between you and your proxy is not securely encrypted, anyone can see exactly what you're doing regardless of proxy; however, this is useful in the event you wish to access something that is down or blocked from your location and you don't really care if anyone sees you accessing that information.

Proxy servers that are encrypted, but which resolve locally, meaning you send a request to YOUR DNS server saying "lookup the IP address for the name www.icmag.com," and THEN route the connections through the proxy, and LEO can hypothetically still see you have accessed the domain www.icmag.com, although they will not be able to see the content with which you post.

A proxy server that is encrypted, and which does remote resolution is pretty safe. This means you connect to the proxy, and ALL requests go through the proxy. The ONLY connection your computer makes is to the proxy, and it is ideally secured.

In this manner, you will be protected.

A really good idea for proxy servers, instead of paying for them, is to create your own proxy server by planting a small application on a friend or a relative's computer (preferably one you know that is powered up 24/7) who does not grow the next time you have physical access to their computer. Ideally, you would limit your usage of their connection to grow related business. If you keep your activities on the proxy server that you've created to a minimum, you will not impact their internet connection significantly enough to cause them to think their internet has "gotten slow."

Keep in mind, what you're basically doing is forwarding your requests for information to a separate computer that accesses the information and relays it back to you. Most residential internet connections have extremely fast download speed, but very slow--by comparison--upload capability. Typically people do not use their upload very much, but anyone who does file sharing will take notice. Anytime that you request info from the proxy server, it will be bottlenecked by the host computer's upload speed because it has to upload that information to you. Choosing a patsy who has a faster type connection is ideal, because the faster their connection, the lower the chances that they will notice you've hijacked their connection.

Regardless, they will have no way of knowing what you've accessed if implemented correctly.
 
Not safe if you are really trying to hide who you are, in most situations the police are not going to find out your information. They could find out more by having the court order your goggle questions! Most of all your systems go through companies that work for the Governments or are the Government...but they mostly don't care, it's really about what else your involved in if anything!

You are not going to be ahead of the Government, the police are not exactly the same thing but some countries are way ahead...they just don't want people selling/trading drugs for weapons!....in America that isn't really their issue!

You risk more having private people spying on you than the Government caring you...even then I am sure the Governments, not just one do spy on you and everyone that does anything remotely illegal...especially propaganda pages or what they feel is!

But the risk is minimal other than who they share that information too, I could see some information being sourced to your boss if you work in an industry that does Government outsourcing...security or weapons companies or anyone that works for them!

It seems to be bad if someoen wants to rob you, having you share all your personal information online! I'd use money orders and not bank routing numbers with a private access code or things like that!

You would have to be a big grow and having problems with that or just a small guy in the right area!

Your IP is almost meaningless, chances are it's cops that you know and that know you! So it's probably from people that you let know things or suspect and the cops wouldn't really be required to go through all the paper work to get the computer evidence...when it's not much and IC mag isn't giving it up!

The cops don't do a lot of computer surveillance round here but some places do extensively, especially if you have minors anywhere near your life! I'm sure that military intelligence finds out anything about anybody they ever wanted and can...that sure means any computer activity, any signal processing at all!

It's a fact they don't want to usually mess with that and large sophisticated drug organizations usually don't care about people on here...it would be a private problem, not a community access issue!
 

Sam the Caveman

Good'n Greasy
Veteran
Thanks bunches Wintermute, I'll give it a try.

I don't mind waiting for the page to upload, but re-logging in is such a pain.
 
There was an ex cop on this site or OG, who was just paranoid! This guy was using military type encryption bouncing off of a satellite and said he had a front door that a SWAT team couldn't rip off! I was impressed that a cop would be that a paranoid and not doing anything, but then again he just said he got another Government type job!

I've known people in the intelligence industry that man, they know anything you talk about on the phone and sometimes in a private room! If it's not billions of dollars of drugs, it's trillions of dollars of weapons deals that do invade countries!

People think it's about oil, well it's not about sourcing it just to the US...it's about what kind of weapon deals with other countries it sources to countries that just hate the NATO and their proxy friends!

Trust me! These people read anything and if they wanted to pick on you, dropping off a report in the mail about all your on goings...even that underwear you just bought! Even sliding that credit card does go through what you purchased, on the store computer if not to the credit companies (which it doesn't).

It would be really rare for some US Army Signal Intelligence guys sitting in a bunker, to use that information to get you into prison. But some guy you bump into in Amsterdam might or your trip to China!

I do know that Chinese military intelligence could just have a wave of police informants online! That would be really bad with all these phones, bouncing around about people ordering drugs and other on goings!

Not sure about the Asian Mafia and all these phones that are not very encrypted and going every which way! More and more people have computers on their phone and you want to talk about security!

These are not even friendly nations to yours, or you wouldn't be online here! the US and the UK used to share the same SIGNET organization, but then the UK split and decided to build their own!

Most cell phone traffic requires a plane to fly in the area, or some tower leaking out further to your listening stand. Then computers sometimes fly through the air, some use underwater cables....there is a US Submarine that is working on tapping into fiber optic communication lines, probably what these words transmitted through!

Not sure who is doing what under water, not quite a cone in a scuba divers ear! It seems I could go outside your house and tap the line, some bird trained to do more than be a homing pigeon!

Just have it peck at it and run down that plastic then attach a cord then fly that away to my little tree fort!

And people that called me friends turned me in for growing weed, what do you think I think about with all their heavy drug use of meth and crack!
 

Sam the Caveman

Good'n Greasy
Veteran
I found this online to add to the bottom of the torrc file to speed it up. I don't know what it does, but it helps.


## A comma-separated list of exit policies. They're considered first
## to last, and the first match wins. If you want to _replace_
## the default exit policy, end this with either a reject *:* or an
## accept *:*. Otherwise, you're _augmenting_ (prepending to) the
## default exit policy. Leave commented to just use the default, which is
## described in the man page or at
## https://www.torproject.org/documentation.html
##
## Look at https://www.torproject.org/faq-abuse.html#TypicalAbuses
## for issues you might encounter if you use the default exit policy.
##
## If certain IPs and ports are blocked externally, e.g. by your firewall,
## you should update your exit policy to reflect this -- otherwise Tor
## users will be told that those destinations are down.
##
#ExitPolicy accept *:6660-6667,reject *:* # allow irc ports but no more
#ExitPolicy accept *:119 # accept nntp as well as default exit policy
#ExitPolicy reject *:* # no exits allowed
#
## Bridge relays (or "bridges") are Tor relays that aren't listed in the
## main directory. Since there is no complete public list of them, even if an
## ISP is filtering connections to all the known Tor relays, they probably
## won't be able to block all the bridges. Also, websites won't treat you
## differently because they won't know you're running Tor. If you can
## be a real relay, please do; but if not, be a bridge!
#BridgeRelay 1
#ExitPolicy reject *:*
 

hkush

Member
Don't forget about remote desktop. Not an otion for everyone, but Windows Remote Desktop into a computer somewhere else will surely hide your true location. Or this theoretical setup would be ideal:

You --> Remote box --> Internet

Remote computer runs a version of Linux live disc, acts as a remote desktop and/or squid proxy.

Scenario - cops get the ip of the connecting machine, which will be the remote computer. Remote computer is turned on running some flavor of Linux live disc so that when they raid the addess, as soon as they turn the power off on the machine all log files, history, etc is cleared from RAM memory. They boot it up at headquarters and there is nothing to see except a fresh OS install on CD that thinks it just booted for the first time and no hard drive at all.
 

Sam the Caveman

Good'n Greasy
Veteran
Alright Wintermute, I gave it my best but couldn't figure it out.

I hit the browse button under the tor config heading in advanced settings, but couldn't find Trackhostexits options.

Could I just set the authentication from password to cookie?
 
The IP doesn't do much, they watch these known proxy servers way more than what is coming back and forth! It's really about ordering from an online shop or some things like that and say the company was keeping information on IP and the name and addresses...or a seed bank and that information got out or a community like this...it seems people didn't find information on the OG server about who was who! An IP isn't much, they would have to go through so much hassle with the companies that provide web access and that is many companies!

By the time they get through all of that, court orders for information, the court assumes the information is invalid as far as criminal activity...the grow would be gone as far as the court risks...if they didn't catch many people, going that way...that is seriously something that looks awful!

Or if someone went through other peoples computers, to create their own port proxies...well, that doesn't look good when Grandma gets shot! I wouldn't trust proxies because you do not control that server, it would be something where I made my own system through other peoples known computers that don't know a thing about computers...an access that people would use to rob them of their personal information, banking information, not ID information....and just routing through, to create a bad web that let me know how to burn connections before it got back to me!

Once they find the web of tangled connections, that would be slow as shit with today's computers (why I don't use proxies, other than to hide an IP and get on someones page that banned me, when these proxies are usually banned too already!)....well, once the law starts back tracking the proxies, have some land mine device program, not actually explosives just fry everything inbetween me and them!

I don't really like programming, so! Just waving my dick in the wind! Plus there is no purpose in a real sense, using an IP other than against the dumbest of cops! Unless you are using the most outstanding encryption and the other access needs a key!

SO that makes it pointless other than using an encrypted proxy from here to your proxy server, and the site sending info wouldn't encrypt it and they just see a mystery IP that everyone uses and it's all the same...some computer in some crap apartment in Iraq!

Then the MP's come and take it away or just watch what perverts we are, not that do they do anything but they could turn you in if they knew you from their hometown and didn't like you! It crosses ethics somewhere that wasn't really spoken when people talked about the NSA and wireless taps that are always ongoing they just don't want a warrant to read the computer and press print or send!
 

guest396

Member
what does your IP identify about you?

well back in the 90's i used to fuck with hacker tools to find smart asses on the internet. you could also do really messed up things to them over the computer. that was 15-20 years ago....

If your ISP will give it to them...it can be used to get your name, address, etc.

.....stay anonymous use a proxy service.

ibj i edited your post to give advice in light of the facts you shared.

Not even. Usually, IP addresses are often shared across many subnetworks - it's not "one-IP-one-user" like with a dedicated network. This makes it nearly impossible for an ISP to link your IP to your person (think RIAA lawsuits - how accurate have they been with those?)

In addition, unless you're posting images with your own face, it's almost impossible for LEO to use those photos as evidence. They'd have to establish your identity through those photos or through your own comments, then prove you took them in the home, then link them to other evidence implicating you in the crime, etc. etc.

Truth be told, LEO does not usually with the "best and brightest" of technology. They are limited to what their district can afford/provide. In terms of people resources, government as a whole tends to hire rather mediocre employees for these positions (I contract extensively in Government technology systems, and work closely with their 'staff'). Given all of this, is LEO more likely to hire a senior analyst at $70k/yr or three full time officers for the same cost?

The Man has not hired spooks to stare at internet traffic coming in and out of this site each day. They simply don't have the resources to do this. CSI doesn't have the resources to do this. Unless you're posting images with your face, drivers license and grow op in full sight, you're probably okay posting on this site.

some truth, some misconception let's read on......

This is not true. Every residential internet connection has it's own IP address. These IPs are usually "dynamic" as opposed to "static" meaning your IP will change each time the modem renews the "lease" on the IP, but that is not randomization. They keep a database that says "customer number xxxxxx had IP address xx.xx.xx.xx between MM/DD/YYYY and MM/DD/YYYY until it was renewed and now the current IP address is xx.xx.xx.xx."

Granted, when you hook up a wireless router in your home, every computer connecting to the net has the same IP address, the one assigned to your modem, but they know whose house it is.

I'm not disagreeing with you on the resources situation at all though. There is no way they can monitor what every single one of us do.

here we go now there is some truth in place of above misconception. then they have operation trojan horse where "they" play along and do the do until they can become a mod, simple really. no expensive equipment needed at all, but it might be usefull to leo to play w/ for entertainment while he/she sifts through all the bullshit that bores them, looking for that big lead. criminal informants can do the same or one such as a person trying to use it as a tool to get paid selling the info to leo. that's why if you don'tlike a proxy or what have you, it's real cool when you get the chance to pull up somewhere and do what sam said below.

Something I haven't seen much talked about much on here is wireless router dishes.

You can put your wireless router at the focal point of any dish and borrow internet service from a nearby business that offers it to the public or a nearby customer with an open connection. I haven't done this though, I've only read about it. I did have a girlfriend that picked up a wireless signal in my living room that wasn't mine, so you don't need a dish if there are open local connections.

If leo did ever try to locate an ip address, they wouldn't come to your house.
a good source for this is hotels/motels. coffeeshops/bookstores.

or you may just have such a bad taste left in your mouth from their initial visit, that you kinda laugh at the thought of ever talking to a fucking cop again. and say bring it. 25 plus years for a plant my ass! mf'rs i've fucked with more lead and donuts in a week then most of you sell out pussys will your whole lives....we ain't goin' out like that we ain't goin' out like that we ain't goin' out..........hahahaha oh fuck i think i'm getting off track.......it's getting hard to make the voices STFU. i hate people that sell their fellow man down the river for income.


sorry for the inconveniece. you may now continue you regularly scheduled program at this time.

ohgee
 
G

good drown

leo busted a guy in jax fl based on his riu posts. but someone either got busted, or went to the police and said hey this guy on this forum is so and so. thats why i try an advise people to never have anything in your pics that can be used to ID a house or person. clothing, tat, pets, cars, on and on, but people gotta show their bling...
 

cannabi

Member
Don't forget about remote desktop.

QFT!

Remote desktop is a nice and easy shortcut for those without the technical know-how to run their own secured proxy servers, but make sure you use something like Hamachi to securely encrypt your traffic! Besides, a benefit to setting up a hamachi network in this manner ensures that you will always be able to contact the remote host on the same IP address, it's a special, separate IP address on a virtual private network.

However, make sure that the remote host is running a type of live CD as well, otherwise if LEO was interested enough in you, they could go to the location of the remote computer and seize it as evidence to search its' logs of all IP addresses connecting on remote desktop. They would easily be able to detect if any sort of proxy daemons were running on the host once they have it back at the station.

The proxy daemon that I use is instructed not to keep any records for this reason. Remote desktop logs are kept in the Event Logs as logon event 10. It stores IP address (YOU) and duration of connection. Also, when browsing using a remote computer, you will pickup all sorts of hidden history breadcrumbs that can be easily searched.

Better to read this article, I think: http://www.wired.com/epicenter/2009/08/you-deleted-your-cookies-think-again/
 

wintermute

Member
Alright Wintermute, I gave it my best but couldn't figure it out.

I hit the browse button under the tor config heading in advanced settings, but couldn't find Trackhostexits options.

Could I just set the authentication from password to cookie?

You'll want to leave the rest of the config / settings alone. Just appending that line to the end of the config like you pasted excerpts from should work.

Be sure your version of Tor is up to date! You'll want to have a recent -alpha version for this feature to work. The latest -alpha's also have some speed improvements! :)
 

bromhexine

Member
who's to say tor isnt run by police after all who else uses tor but people doing ilegal stuff? if it wasnt started by police im sure at this point they have some great interest in it. you want to be safe then dont talk about illegal things on a public forum that would be the safest bet. whether you use someone elses net to connect or you use an anonymous proxy you still run a risk of getting caught its a new world security is much tighter than you think and how anyone can put trust in this site is beyond me. you have no idea whos running things here.
 
C

cyberwax

Oh please do not start with more conspiracies, soon this site will allegedy be run by ghosts of an alien civilization. Give me hard proof or common sence, saying this site is run by cops and not backing it up with solid proof is not a scientificly valid method of proving your point and i will dimiss your statement as background noise.

I actually have an idea who is running this site, you can too if you just browse the main page and consider that sometimes; when a site has been validated by thousands and frequented by millions of growers posting pics and not beeing cought; things might actually be what they seem. Also you can use various progs/sites to track ownership.

If i were to advice anything it would be to limit information you post here, use nothing, except perhaps uploaded(clean) pics of plants, but no information that could identify you, and unless you are smart in your ways of posting your posts(like using public wifi, etc) of large grows; then i would guess the reason for your busts wouldnt be this site. Its really simple, just dont get greedy and stay smart.

Let me just finally put it this way, it is way safer for you to come here and ask, than it is to talk with rl friends about your plant issues.
 

bromhexine

Member
you want hard proof that its run by police? show me some hard proof that it isnt! most pot questions have been asked a thousand times online you dont have to ask them again to get information just search around and read. heres to legalizing all drugs so we dont have to fear for our personal freedoms and enjoy this short life on earth.
 

!!!

Now in technicolor
Veteran
Your enemies can get your IP address by having you click a link,
or even just by posting a picture here. Basically they can setup a
server and then check who's accessing anything on that server
(ie., a pic they linked to here).

They can get your IP and get a general idea of your location.
Usually right down to the city. The IP will also be traceable
back to your ISP, so they can call them up and ask for your
info, but ISPs don't (shouldn't) hand over that info so easily.

But most people won't bother because there's a good chance
that anyone worth busting online is hiding behind a proxy.

If you give a shit, download the Tor plugin for Firefox and set it
up. It's slow but very secure.
 
G

Gilles&Cheryl

You don't need a proxy. All you need is a disclaimer signature. You know, a line or two at the end of your posts that says "All posts by this user are fictitious." or something like that. LEO may be very interested in your activities until they see that disclaimer - then "poof!" they're gone!
 
Top