What's new

IP Address Monitoring

Taliz

New member
Does anybody worry about authorities monitoring IP Addresses that post this website.

When I told a friend in the ISP industry i had registered at ICmag I got a verbal warning about posting anything that may incriminate me, and that all ip addresses that post sites like these may be monitored.

It doesn’t particularly worry me as I only have a couple of plants for personal use, and here in the UK you just get equip confiscated and a slap on the wrist.
However, it would be nice to know how secure these forums are..

ANY INFO MUCH APPRICIATED...
 

Taliz

New member
May I ad that his warning stops me uploading any photos or starting a gallery....

IS THIS JUST PARANOIA
 

Existenzophile

New member
Taliz said:
Does anybody worry about authorities monitoring IP Addresses that post this website.

When I told a friend in the ISP industry i had registered at ICmag I got a verbal warning about posting anything that may incriminate me, and that all ip addresses that post sites like these may be monitored.

It doesn’t particularly worry me as I only have a couple of plants for personal use, and here in the UK you just get equip confiscated and a slap on the wrist.
However, it would be nice to know how secure these forums are..

ANY INFO MUCH APPRICIATED...

Everyone should be actively worrying about their privacy being infringed upon by malicious entities. Weather it is Government agencies or Individuals, we are all at risk.

Your friend was right to warn you, but his warning is just common sense. Anything you put into a computer has the potential to be used maliciously, it could be your Name, or pictures on your Myspace page, credit card information, even telling your friend that you registered at ICmag is a security risk. It can all be used against you by malevolent persons or organizations.

So what can you do about it?

The first step is to not trust your security in the hands of someone else. Your concern shouldn't be how secure this site is, but how secure you are. This website could be run by the most compassionate and trustworthy people, but that doesn't mean someone hasn't compromised the site, or even them.

You need to proactively take steps to protect your identity, and the security of your computer. I'm in the procss of working out some basic guidelines for Internet Security to post here, but for the time being I've already got a purpose built solution that is easy to implement and provides layered security (Defense In Depth) and is pretty damn secure.

Check out this thread.
http://www.icmag.com/ic/showthread.php?t=40575

Welcome to Icmag Taliz, I hope you time here is happy, secure, and fun ;)
If you've got any more detailed questions I'd be more than happy to help!
-Ex-
 

Taliz

New member
WOW... Speedy Response

Personally I'm fairly secure, he is the only person (a fellow grower and clone donator) that knows of my existence here.

Thanks for the link Existenzophile..
It's a bit over my head, but i'll do some research..

T.....
 
G

Guest

well im not medical state been growing over five years post 1000s of pics over the years..overgrow was home first...ic mag since 03 change screen name pretty often i was nervous when i started but shit i could careless now...i just follow the three simple rules...never popped...i think the people that get popped are the ones who smell...tell...or sell...but i will say if i do get busted and shafted i will start to sell thats for sure...every action has a equal and opposite reaction
 

mtnjohn

Active member
Veteran
if the leo's take the time to investigate and bust "me".....well then, they will be wasting taxpayers money and they will also be very dissapointed , cuz it would be obvious to anyone that my grow is purely for personal use...hahahaha
a misdemeanor in my state...not good , but not anything that i wouldnt get over....

so i say fuck em
 
G

Guest

Taliz said:
Does anybody worry about authorities monitoring IP Addresses that post this website.

When I told a friend in the ISP industry i had registered at ICmag I got a verbal warning about posting anything that may incriminate me, and that all ip addresses that post sites like these may be monitored.

It doesn’t particularly worry me as I only have a couple of plants for personal use, and here in the UK you just get equip confiscated and a slap on the wrist.
However, it would be nice to know how secure these forums are..

ANY INFO MUCH APPRICIATED...

Good thread.

So if this webpage is monitored, can someone monitor my IP?

Please someone put up some more info on this.

Existenzophile: I don't have LINUX, any other options?


Peace
 
G

Guest

if the government people want to monitor you they will find a way. This isn't even conspiracy theory stuff. Unless you're in the top 1% of internet security savvy people, odds are you're not covering your tracks enough even with the best identity protector programs and codes. You've pretty much just gotta decide how much of a risk you are willing to take and what you think the odds are that some agency would monitor your grow. If you're paranoid, just don't post anything incriminating. This is there the whole AFOM (a friend of mine) thing started on other sites (and gets sooooo annoying by the way). People just didn't wanna say it was them. There are laws prohibiting the use of digital photography as the sole evidence against a person in court, due to the fact that people can edit digital pics just about any way they like now. This doesn't mean they couldn't use something against you to obtain a warrant and get actual evidence. One thing you'll notice on here is that not a lot of growers put up pictures of or even admit to being large scale commercial growers, because this only puts them at more risk than they need to be in.
 
How To Beat The "IP Trace" While Surfing & Posting "TOR"

How To Beat The "IP Trace" While Surfing & Posting "TOR"

Taliz said:
Does anybody worry about authorities monitoring IP Addresses that post this website.

When I told a friend in the ISP industry i had registered at ICmag I got a verbal warning about posting anything that may incriminate me, and that all ip addresses that post sites like these may be monitored.

It doesn’t particularly worry me as I only have a couple of plants for personal use, and here in the UK you just get equip confiscated and a slap on the wrist.
However, it would be nice to know how secure these forums are..

ANY INFO MUCH APPRICIATED...

What you need to doi to solve "All Your Problems" is to first install the Browser "Firefox" then Install "TOR" which will bounce your IP address that wil show up on ANYONE"S LOGS all around this HUGE World of ours, & Show THEIR IP ADDRESS & NOT Your Real IP Address :)

& Best Of All It's Is Completely FREE!

All the directions & download links that you will need are post on my
MAXIMUM SECURITY SECTION! Free Apps, Learn How To Protect Your ID, & Your Real IP- Computer While Online
http://www.onlinepot.org/security/SecurityMainStartPage.htm

Start First With Installing The "FireFox Browser FIRST! The Link for it is posted, The Go Onto the "TOR" "PRIVOXY" Set ups.

& Then you will NEVER use your old IE Browser again :)

Stay Well & Stay SAFE! With "TOR"
Chris/OLP
 

Existenzophile

New member
OLPWebmaster said:
What you need to doi to solve "All Your Problems" is to first install the Browser "Firefox" then Install "TOR" which will bounce your IP address that wil show up on ANYONE"S LOGS all around this HUGE World of ours, & Show THEIR IP ADDRESS & NOT Your Real IP Address :)

& Best Of All It's Is Completely FREE!

All the directions & download links that you will need are post on my
MAXIMUM SECURITY SECTION! Free Apps, Learn How To Protect Your ID, & Your Real IP- Computer While Online
http://www.onlinepot.org/security/SecurityMainStartPage.htm

Start First With Installing The "FireFox Browser FIRST! The Link for it is posted, The Go Onto the "TOR" "PRIVOXY" Set ups.

& Then you will NEVER use your old IE Browser again :)

Stay Well & Stay SAFE! With "TOR"
Chris/OLP


I can "Solve All Your Problems" too!! I've got this mighty fine snake oil! Fresh squeezed!

Nothing is going to solve all of your security needs. Especially not a single solution. The key to effect security is defense in depth. You need to surround yourself with as many layers of security as possible to create a web of defense around yourself. TOR and Privoxy alone will not protect against many attacks, they only prevent against traffic analysis (and privoxy does some content filtering) but beyond that they do nothing.

That being said, TOR is an essential tool in any concerned citizens tool box.

And Chris, I say this with the best intentions...

Your Security Page is a clusterfuck. There is good information there, but the offsite ads, and media plugins running are a security risk themselves. The links near the bottom are great, but most of the products being hocked (and I can tell you from first hand experience) are crap. If you're interested I'd be happy to consult with you on getting more solid security advice on your page.
 

Existenzophile

New member
Chakal said:
Good thread.

So if this webpage is monitored, can someone monitor my IP?

Please someone put up some more info on this.

Existenzophile: I don't have LINUX, any other options?


Peace

This site wouldn't even have to be monitored to have your ip address collected. Your requests for ICmag will normally go through at least three hops before it gets there if you are directly connecting (it's normally between 5 and 9 when i try) So any one who has access to any of those systems knows it's you visiting ICmag, and where you are located. Hell, If you're connecting from a shared connection (at a library, the office, a university, etc.) I can see what sites you are visiting just by being behind the same subnet as you. And it's the same deal on a much wider scale if you are on a wireless network.

Taking this in conjunction with the knowledge that the NSA directly cut into the IXP's (Internet Exchange Points) of PAIX, Mae West, UUnet, Global Crossing, and many many others, giving them the ability to simultaneously watch up to 1/6th of ALL TRAFFIC on the Global Internet you really have to wonder if this site being compromised should be your priority...

---

The Virtualization Solution I posted works for Windows and Linux. What OS are you running?
 
Last edited:
G

Guest

proxies are just an extra subpoena if they actually decided they wanted you.

while proxies are... "nice"... instead, perhaps it should be preached that those with anything to be concerned about should not post from the location that any activity that may be deemed as "questionable" by various 3 letter acronym groups occurs at.

ie, if one wanted to be truly anonymous, the closest possibility would probably be to vary the locations from which they access info/post, and THEN use a proxy.

but truthfully, I believe the answer is this: either dont participate in any actions that may or may not be legal in your circumstance, OR, keep it to yourself and don't post about it.
 

Existenzophile

New member
the lorax said:
proxies are just an extra subpoena if they actually decided they wanted you.

while proxies are... "nice"... instead, perhaps it should be preached that those with anything to be concerned about should not post from the location that any activity that may be deemed as "questionable" by various 3 letter acronym groups occurs at.

ie, if one wanted to be truly anonymous, the closest possibility would probably be to vary the locations from which they access info/post, and THEN use a proxy.

but truthfully, I believe the answer is this: either dont participate in any actions that may or may not be legal in your circumstance, OR, keep it to yourself and don't post about it.


Except in the case of Tor. Tor servers keep no record, and no data on anyone tor server can be traced back to any one client, they can only be traced to other Tor Servers. So LEO can Subpoena to their hearts content and end up with dick. There was a case earlier this year, where the German Authorities seized several Tor servers that had been connected with Child Pornography. The computers they seized yielded them NO Information that led to the prosecution of those responsible for the Child Porn. The first server they seized was an Exit node, the server who's IP address was identified as the computer send the request for said illegal material. The information the were able to obtain could only lead them to the next server in the chain which concurrently contained no information about the person who was actually requesting the information.

And yes, surfing from your Grow is not a good idea. But unless you live in the middle of nowhere, you have the option of piggybacking off someone else's wireless network. In my area I have a wide variety to choose from :)
But even that won't keep you anonymous. PROMIS derivative software can watch just your surfing habits (the sites you visit, what you search for, when you surf, how long you stay on a site...)for a very short amount of time and get a positive ID on you.

And your last statement is the equivalent of saying "If you don't want to be eaten by Bears, stay out of the Woods." Sound advice... but the woods are definitely worth the risk ;)
 
G

Guest

"Why not venture out on a limb? That's where the fruit is." -Mark Twain

:bandit:


regarding tor, I find it hard to believe that they couldnt sort thru the various servers that the pedophiles used and find the guy.. I dunno.. another thing is, cant always beleive everything you read, and remember, LEO often will not always share the full/truthful details publicly via news media, and sometimes might go so far as to let misinformation slip :bandit: now I'm NOT saying thats the case with the TOR incident, as frankly WE don't know.. but just remember, the very fact that we don't truly, definitevely know, is also the same defense that says its totally possible that they are more capable w/ proxy tracing than they let on.

just something to ponder :joint:
 

Existenzophile

New member
the lorax said:
"Why not venture out on a limb? That's where the fruit is." -Mark Twain

:bandit:


regarding tor, I find it hard to believe that they couldnt sort thru the various servers that the pedophiles used and find the guy.. I dunno.. another thing is, cant always beleive everything you read, and remember, LEO often will not always share the full/truthful details publicly via news media, and sometimes might go so far as to let misinformation slip :bandit: now I'm NOT saying thats the case with the TOR incident, as frankly WE don't know.. but just remember, the very fact that we don't truly, definitevely know, is also the same defense that says its totally possible that they are more capable w/ proxy tracing than they let on.

just something to ponder :joint:

One of the great things about Tor is how easy it is to modify. You can create your own directory of tor servers to create your own private tor network. All you need to do is install Tor on each of your computers (or VMware images of Computers :wink: ) configure them as servers, publish a list of your servers, and then point you client to that list of servers. Now you've got a custom Tor Network that is unconnected to the public tor network.

So if I was going to participate in something I really really didn't want to get caught for, I would go out and compromise 100 machines or so, configure them as Tor servers, and then use them as a private Tor Network that I would then use to route my traffic through the Public Tor network...

But tracing all of the steps your traffic takes is tedious. There are much easier ways of finding out someones identity. :wink:
 

Existenzophile

New member
Chakal said:
Existenzophile:

More info on Promis please...

Peace


Created in the 1970s by former National Security Agency (NSA) programmer and engineer Bill Hamilton, now President of Washington, D.C.'s Inslaw Corporation, PROMIS (Prosecutor's Management Information System) crossed a threshold in the evolution of computer programming. Working from either huge mainframe computer systems or smaller networks powered by the progenitors of today's PCs, PROMIS, from its first "test drive" a quarter century ago, was able to do one thing that no other program had ever been able to do. It was able to simultaneously read and integrate any number of different computer programs or data bases simultaneously, regardless of the language in which the original programs had been written or the operating system or platforms on which that data base was then currently installed.


PROMIS and its evolutions were the lynchpin of every new military, scientific and financial advance being pursued by the US government and corporate sector. PROMIS progeny have become the "operating system" underlying data management and data mining for every major technology under development in all arenas of technological advance from medicine, to finance, to surveillance, to battlefield Command, Control and Communications or C3.

...

By definition, PROMIS progeny are the backbone of a current DoD plan to develop a "Godlike" view of all human (or battlefield) activity from space. They are also inherently a part of the data processing being envisioned for advanced space weapons requiring machines to think as they share data in virtual real time.

...

[At the heart of our story is a program (we'll call it Ptech, after the company that produced it) that combines artificial intelligence, datamining, and "interoperability," the capacity for one program to read, operate, and modify the source codes of other programs. The computational power of the Ptech evolution of PROMIS represents a daunting new surveillance-and-intervention capability. Ptech is the functional equivalent of Total Information Awareness.
Quote:

It combines datamining, artificial intelligence, and "interoperability," the capacity for one program to read, operate, and modify the source codes of other programs. Datamining is a technique for detecting and extracting meaningful patterns hidden within vast quantities of apparently meaningless data. Applications include policing and case management (where PROMIS -- Prosecutor's Management Information System began), aviation (Mitre), banking and risk management (JP Morgan), enterprise architecture and knowledge management (Popkin), the gathering and sifting of political and industrial intelligence information (FBI, RCMP, et al.), and a wide range of military applications (NORAD, Navy, etc.).

Programs based on datamining are powerful analytical tools; finding meaningful patterns in an ocean of information is very useful. But when such a tool is driven by a high-caliber artificial intelligence core, its power gets spooky. The datamining capability becomes a smart search tool of the AI program, and the system begins to learn.

In recent decades, great strides have been made by the mutually fertile disciplines of mathematics, computer science, and neuroscience. Among the results has been a new discipline called cognitive neuroscience, which constitutes a powerful new understanding of the way the human brain works (see Churchland, Gazzaniga, etc.) While this has illuminated some very fundamental and grand issues of philosophy, it also has applications so practical that they have reshaped our world. "Neural Network" programming is modeled on the computational techniques used by the human brain - an electrochemical computer that uses neurons instead of semiconductors; the firing or non-firing of neurons instead of ones and zeros.

With neural networking, software has become much smarter than it had been. Now it can perform multiple, related operations at the same time through parallel processing; now it can learn from setbacks, and use genetic algorithms to evolve its way out of limitations. Now it can respond to more kinds of data from the electronic environment, including "fuzzy" values that don't come in discreet numerical packages. This kind of computational power supports an inference engine that can digest the mined data into results that are not only descriptive of the system's present state but predictive for imminent and, to some degree, even middle-term outcomes. That's why the same family of programs that does enterprise architecture, which is descriptive (and prescriptive if you take its descriptions as a mandate for cutting costs by firing people - "process management"), comes to include risk management software, which is predictive of the future. It extrapolates from current trends in a more than quantitative way.

Conventional electronic surveillance finds patterns in the data of other instruments; Ptech's Framework can exploit the patterns it detects and extrapolate future probabilities. Then it can integrate itself with the computers from which it's getting the information and intervene in their functioning. The result is a tool for surveillance and intervention. The program can identify suspect streams of cash in a banking network and allow a bank officer to freeze the suspect assets. Of course, a user could direct the same program to prevent detection. It can discover salient anomalies in a person's movements through a city and either flag those anomalies for further scrutiny, or erase them from the record. And it can find errant flights in an air traffic map and initiate an intercept response. Or not.


There is a lot of Information out there on the Inslaw Debacle, And the Ptech/GoAgile debacle 25 years later. The parallels between the two (And this is disregarding the software) are quite disturbing...
 
Always Play It Safer With TOR

Always Play It Safer With TOR

Existenzophile said:
Except in the case of Tor. Tor servers keep no record, and no data on anyone tor server can be traced back to any one client, they can only be traced to other Tor Servers. So LEO can Subpoena to their hearts content and end up with dick. There was a case earlier this year, where the German Authorities seized several Tor servers that had been connected with Child Pornography. The computers they seized yielded them NO Information that led to the prosecution of those responsible for the Child Porn. The first server they seized was an Exit node, the server who's IP address was identified as the computer send the request for said illegal material. The information the were able to obtain could only lead them to the next server in the chain which concurrently contained no information about the person who was actually requesting the information.

And yes, surfing from your Grow is not a good idea. But unless you live in the middle of nowhere, you have the option of piggybacking off someone else's wireless network. In my area I have a wide variety to choose from :)
But even that won't keep you anonymous. PROMIS derivative software can watch just your surfing habits (the sites you visit, what you search for, when you surf, how long you stay on a site...)for a very short amount of time and get a positive ID on you.

And your last statement is the equivalent of saying "If you don't want to be eaten by Bears, stay out of the Woods." Sound advice... but the woods are definitely worth the risk ;)

How I Use My "TOR" is every time I log onto someplace or check an email account, when I get done, I completely Close Out My FireFox Browser & "Close Out My TOR Connection" Then Reopen my Browser Again & reconnect Up to another country & another "TOR" Server, & Then make my next browser choice in surfing. It Keeps Your Connections Times Short, & Keeps Them Varied To Truely Make It "Almost Impossible" Short Of NSA being involved in "Tracing Your True Location & True IP Address" Because ANY Logs That Are Kept Will "Always Show" The "TOR'S" IP Address & Not Your Real Computer IP Address

& Yes Your Computer Security Is Always A "Multiple Layer Security Job"

Chris/OLP
 

Latest posts

Latest posts

Top