Announcement

Collapse
No announcement yet.

How to identify a CyberStalker:

Collapse
This topic is closed.
X
This is a sticky topic.
X
X
  • Filter
  • Time
  • Show
Clear All
new posts

  • #16
    Here is a good article on the The Top 10 Anonymity Myths

    https://xerobank.com/support/article...onymity-myths/



    When you visit a website, the webmaster can see your IP address, which identifies your unique Internet connection and where you are geographically. The webmaster can also see what kind of browser you use, what pages you looked at on his/her website, and what you typed while on the site. Search engines and other massive information processors also keep eternal databases that collect your interests, preferences, search queries, and responses. Additionally, your ISP can see everywhere you go, every email you send and receive, every purchase you make, and every instant message, and they may keep or sell records of this information. Further, most governments engage in overt or covert domestic spying on communications under the auspices of national security.




    When you use an anonymity service, you are taking away most spying ability from your network administrator, ISP, and whatever websites you visit. This is because you are using an intermediary. However, there are two attack methods that are capable of defeating most anonymity systems; they are global spying, which governments and large corporations can perform, and side-channel attacks, which can be performed by anyone. These two attacks often work because they operate outside of the anonymity network's scope.

    Global spying is a brute-force attack that occurs when an ISP is solicited to give access to centralized communication hubs, such as Internet exchanges and cloud-computing clusters. This allows global spies to view virtually all Internet traffic, retracing communications through an anonymity network back to its source with a technique called traffic analysis. The other method, side-channel attacks, work by exposing attributable data about the user of the anonymity service, which can be anything from writing style analysis of a blog post to full IP Address disclosure.

    Most commercial services are based in weak, centralized jurisdictions that will surrender your identity if requested. Most non-commercial services are strong enough to evade most domestic spying because they are distributed and decentralized. Very few commercial anonymity networks are capable of evading both domestic spying and international spying, because they use resource-intensive techniques like those outlined above. However, no anonymity service provider can protect a target that a superpower intelligence agency is devoting all its resources to trying to track down. Incidentally, terrorists and organized cybercriminals know this, so they use botnets to create anonymity for themselves instead of relying on traditional anonymity networks.

    The existence of these botnets creates a unique usergroup protection for the stronger commercial anonymity services. Virtually all users are automatically protected to the highest levels of anonymity, even against global adversaries, because they are excluded from focused targeting on account of the botnets.

    Comment


    • #17
      Re: How to identify a CyberStalker:

      Originally posted by qpqpqp
      Originally posted by 57125486
      unless he/she/it is the US government or superbadass elite hacker or ~spy~
      :^)
      Fame at last, huh? :shock:

      Comment


      • #18
        JohnDoe41571; great input. In short; there is no such thing as true privacy online. :lol: Got to love being screwed over. People should just be cautious and think (key word) before they act.

        Comment


        • #19
          Originally posted by qpqpqp
          JohnDoe41571; great input. In short; there is no such thing as true privacy online. :lol: Got to love being screwed over. People should just be cautious and think (key word) before they act.
          key word? lol.. thats about as secure as 837737 . think indeed

          Comment


          • #20
            6. Do not add anyone as a friend.. Even when you hide your friend list some stalkers can find you from your friend's friend list if their lists is not hidden as well. Also moderators can see everything on this site regardless of privacy settings so keep that in mind.. there is no such thing as "privacy settings" on any social networking site..
            Understood,but what if you're a person like me looking to make friends here at IP? #6 in my mind seems like a double-edged sword in my book. How can a person like myself get to know others if I cannot even interact or befriend them???

            Comment


            • #21
              This is all fine and dandy but not all of us are so proficient on the internet.........maybe it would be a great idea if it would at all be possible to explain in depth one area at a time of what you were talking about if it is at all possible

              Comment


              • #22
                Start a new post if you wish to discuss this topic .... necroposting.

                Comment

                Working...
                X