Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

the reaction

Name: Anonymous 2020-04-07 12:39

we could organize a reaction or sumthin
i mean to all that crazy shit goin on
we gots da means, and shit be vulnerable as fuck
we only need clear thinking, to know our goals
so this is brainstorming thread

e.g. "you could use iploggin thru images yo" "host ur own private proxy on any paas of ur choice" "make a 'ip-conditional webpage' that only serves to an ip you privately own" "u prolly can use fake skin on thumb to give a different fingaprint and bypass biometrics" &c

what i be meaning is this: u gots da power? use it, dumbass! dont be watchin the damn show like stupid braindead family guy fatso

thus, the reaction

Name: Anonymous 2020-04-10 5:58

Name: !Ps1ivhrO6w 2020-05-05 15:07

shit be vulnerable as fuck
sure, and it has been so designed

"you could use iploggin thru images yo"
and make unique links for each image, which you send only to specific persons by mail or private message, thus more certainly acquiring their specific IP (univocal person to IP)

"host ur own private proxy on any paas of ur choice"
the trick is registering and setting up the paas anonymously (through TOR?), not letting it register down anything, and making it give you a warning once it has been compromised (booby trap?)

"make a 'ip-conditional webpage' that only serves to an ip you privately own"
yes, this is in essence the same as the hellban trick, but used as a rule instead of exception. everyone not whitelisted is hellbanned from your content and might see something completely trivial or innocent
this also reminds me of the wizards trick at the 4th harry potter book, where instead of some wizards tourney through illusion the muggles see an ordinal forest

"u prolly can use fake skin on thumb to give a different fingaprint and bypass biometrics"
you can periodically use body deformation techniques to change your fingerprint signature to something different than what has been officially recorded
if you own fingerprint analysis software you can probably even "unit test" it to assert that it fails recognition
and you might use fingerprint collected info to 3d print a thumb replica for your own bypassing goals

Don't change these.
Name: Email:
Entire Thread Thread List