Survivalist Forum - Reply to Topic
Survivalist Forum

Advertise Here

Go Back   Survivalist Forum > > >
Articles Classifieds Donations Gallery Groups Links Store Survival Files


The Tech Zone Discussion on computers, software and games.

Advertise Here
Thread: incredible thick questions on cyber security Reply to Thread
Post Icons
You may choose an icon for your message from the following list:

Register Now

In order to be able to post messages on the Survivalist Forum forums, you must first register.
Please enter your desired user name, your email address and other required details in the form below.
User Name:
Please enter a password for your user account. Note that passwords are case-sensitive.
Confirm Password:
Email Address
Please enter a valid email address for yourself.
Email Address:
Please select your insurance company (Optional)


Human Verification

In order to verify that you are a human and not a spam bot, please enter the answer into the following box below based on the instructions contained in the graphic.

Additional Options
Miscellaneous Options

Topic Review (Newest First)
02-23-2020 09:45 PM
ghost792 Be aware that the TOR project received a bunch of money from various US agencies and foreign governments. I don't think I'd trust it with anything too important.
02-23-2020 12:03 PM
KLF VPN is a straight safe passage from you to vpn provider and back. You know exactly where the other end of the VPN tunnel is and vice versa. Data between these two points is encrypted, ie. outsiders can't read it.

TOR is a mess of passages that looks like spaghetti and layered like an onion. The other end does not know who you are and cannot verify it. You don't know where the other end is and cannot find it with "conventional" means.

VPN is usable, if you want to use public wifi and there is possibility that someone is trying to sniff passwords at the same time. Also VPN is used to connect from home to office, to use company data.

TOR hides pretty much everything you do (until you hit a honeypot). Tor-websites you visit cannot identify you and you cannot know where they actually are, traffic between you two is routed thru multiple ways. Pretty handy if you are buying or dealing drugs or other illegal stuff.
02-22-2020 11:52 PM
hedgerowpete thank you both. maay i please ask

whats the difference between a "vpn" and "TOR" as i thought they did the same thing, buti was reading this week that in tor the computers IP address stays the same but in vpn it does not
02-19-2020 11:51 AM
MrHmuriy 1. VPN encrypts all traffic that goes from your computer to the VPN server, so your Internet provider will not see what you do on the Internet. But, directly the VPN provider will at least store the logs of who connected to the network and from where. It is possible that they keep logs of what you did online - if the US government asks them, then in 99.9% of cases it will receive this data.
2. Even very old cameras still save EXIF ​​data. To clean EXIF ​​data, there are special software like EXIF ​​Purge, ExifCleaner or on a websites like
3. Old phones can only be found approximately.
02-18-2020 07:13 PM
Explainist VPN encrypts your data at your computer, and sends the encrypted data to a remote location. If I had VPN my data would leave my computer, travel encrypted to a computer server in, for example, Las Vegas, Nevada, then go to the web site I searched for. So if I search Brownells for AR-15 parts nobody knows but me.


the VPN service people can be trusted. and how do you determine that? the same way you determine if anybody can be trusted: when they prove they can't be trusted.
02-17-2020 02:08 AM
hedgerowpete also whats the difference between a IO address and a VPN and if i change the vpn why is the ip still reckonised
02-17-2020 12:59 AM
incredible thick questions on cyber security

I am a dinosaur when it comes to the computer and its witchcraft workings. other than a sabretooth tiger fur jacket i am as far backwards as you can get.

I want to ask a couple of dumb questions just to confirm my own studies please

Start with Tor onion,
Once installed and one the computer, the best way to describe it to a thick idiot like me is at my end of the computer chain. I am in a rabbit hole burrow. i go in at one hole as one vpn name and number from my computer but when i come out the other end i have changed the computers name and number. A bit over simplified but there abouts.

Once out of the rabbit hole i can open and read emails on msn and the like, facebook and insta and forums like this too, as long as i know the pass words and email accounts. But the vpn has changed.

Thats about right yes??

Digital pictures next,
I am told that digital pictures carry loads of data with them.
How do i kill all the digital information that comes with it. if i use an old digital camera, it does not log any information and coordinates ect. but if i upload the photo into my computer the computer logs the details of cooridinates and date and time details automatically.

how do i sterilise digital pictures

last one is mobile phones;
if i get an old phone with no internet and digital anything just phones and texts, it can be government followed via the cell towers its connected too, but cant be found past that point once turned off. i realise when its next switched on it will reconnect again to the towers and its position logged again.

Posting Rules
You may post new threads
You may post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

All times are GMT -5. The time now is 07:21 AM.

Powered by vBulletin®
Copyright ©2000 - 2020, vBulletin Solutions, Inc.
Search Engine Optimisation provided by DragonByte SEO (Lite) - vBulletin Mods & Addons Copyright © 2020 DragonByte Technologies Ltd.
vBulletin Security provided by vBSecurity v2.2.2 (Pro) - vBulletin Mods & Addons Copyright © 2020 DragonByte Technologies Ltd.
Copyright © Kevin Felts 2006 - 2015,
Green theme by