incredible thick questions on cyber security - Survivalist Forum
Survivalist Forum

Advertise Here

Go Back   Survivalist Forum > >
Articles Classifieds Donations Gallery Groups Links Store Survival Files


Notices

The Tech Zone Discussion on computers, software and games.

Advertise Here
Reply
 
Thread Tools Display Modes
Old 02-17-2020, 12:59 AM
hedgerowpete's Avatar
hedgerowpete hedgerowpete is offline
Hiker
 
Join Date: Nov 2011
Location: The original Birmingham, Engand, or as we call it the BLACK COUNTRY
Posts: 739
Thanks: 718
Thanked 474 Times in 270 Posts
Default incredible thick questions on cyber security



Advertise Here

I am a dinosaur when it comes to the computer and its witchcraft workings. other than a sabretooth tiger fur jacket i am as far backwards as you can get.

I want to ask a couple of dumb questions just to confirm my own studies please

Start with Tor onion,
Once installed and one the computer, the best way to describe it to a thick idiot like me is at my end of the computer chain. I am in a rabbit hole burrow. i go in at one hole as one vpn name and number from my computer but when i come out the other end i have changed the computers name and number. A bit over simplified but there abouts.

Once out of the rabbit hole i can open and read emails on msn and the like, facebook and insta and forums like this too, as long as i know the pass words and email accounts. But the vpn has changed.

Thats about right yes??



Digital pictures next,
I am told that digital pictures carry loads of data with them.
How do i kill all the digital information that comes with it. if i use an old digital camera, it does not log any information and coordinates ect. but if i upload the photo into my computer the computer logs the details of cooridinates and date and time details automatically.

how do i sterilise digital pictures

last one is mobile phones;
if i get an old phone with no internet and digital anything just phones and texts, it can be government followed via the cell towers its connected too, but cant be found past that point once turned off. i realise when its next switched on it will reconnect again to the towers and its position logged again.
Quick reply to this message
Old 02-17-2020, 02:08 AM
hedgerowpete's Avatar
hedgerowpete hedgerowpete is offline
Hiker
 
Join Date: Nov 2011
Location: The original Birmingham, Engand, or as we call it the BLACK COUNTRY
Posts: 739
Thanks: 718
Thanked 474 Times in 270 Posts
Default

also whats the difference between a IO address and a VPN and if i change the vpn why is the ip still reckonised
Quick reply to this message
Old 02-18-2020, 07:13 PM
Explainist Explainist is offline
Hunter
 
Join Date: Aug 2013
Posts: 1,861
Thanks: 0
Thanked 4,065 Times in 1,230 Posts
Default

VPN encrypts your data at your computer, and sends the encrypted data to a remote location. If I had VPN my data would leave my computer, travel encrypted to a computer server in, for example, Las Vegas, Nevada, then go to the web site I searched for. So if I search Brownells for AR-15 parts nobody knows but me.

if...

the VPN service people can be trusted. and how do you determine that? the same way you determine if anybody can be trusted: when they prove they can't be trusted.
Quick reply to this message
The Following 5 Users Say Thank You to Explainist For This Useful Post:
Sponsored Links
Advertisement
 
Old 02-19-2020, 11:51 AM
MrHmuriy's Avatar
MrHmuriy MrHmuriy is offline
Member
 
Join Date: Aug 2019
Location: Brovary, Ukraine
Age: 45
Posts: 36
Thanks: 27
Thanked 74 Times in 24 Posts
Default

1. VPN encrypts all traffic that goes from your computer to the VPN server, so your Internet provider will not see what you do on the Internet. But, directly the VPN provider will at least store the logs of who connected to the network and from where. It is possible that they keep logs of what you did online - if the US government asks them, then in 99.9% of cases it will receive this data.
2. Even very old cameras still save EXIF ​​data. To clean EXIF ​​data, there are special software like EXIF ​​Purge, ExifCleaner or on a websites like verexif.com
3. Old phones can only be found approximately.
Quick reply to this message
The Following User Says Thank You to MrHmuriy For This Useful Post:
Old 02-22-2020, 11:52 PM
hedgerowpete's Avatar
hedgerowpete hedgerowpete is offline
Hiker
 
Join Date: Nov 2011
Location: The original Birmingham, Engand, or as we call it the BLACK COUNTRY
Posts: 739
Thanks: 718
Thanked 474 Times in 270 Posts
Default

thank you both. maay i please ask

whats the difference between a "vpn" and "TOR" as i thought they did the same thing, buti was reading this week that in tor the computers IP address stays the same but in vpn it does not
Quick reply to this message
Old 02-23-2020, 12:03 PM
KLF KLF is offline
Hunter
 
Join Date: Jun 2011
Location: FIN
Posts: 1,376
Thanks: 93
Thanked 1,498 Times in 777 Posts
Default

VPN is a straight safe passage from you to vpn provider and back. You know exactly where the other end of the VPN tunnel is and vice versa. Data between these two points is encrypted, ie. outsiders can't read it.

TOR is a mess of passages that looks like spaghetti and layered like an onion. The other end does not know who you are and cannot verify it. You don't know where the other end is and cannot find it with "conventional" means.


VPN is usable, if you want to use public wifi and there is possibility that someone is trying to sniff passwords at the same time. Also VPN is used to connect from home to office, to use company data.

TOR hides pretty much everything you do (until you hit a honeypot). Tor-websites you visit cannot identify you and you cannot know where they actually are, traffic between you two is routed thru multiple ways. Pretty handy if you are buying or dealing drugs or other illegal stuff.
Quick reply to this message
The Following 2 Users Say Thank You to KLF For This Useful Post:
Old 02-23-2020, 09:45 PM
ghost792's Avatar
ghost792 ghost792 is offline
Target Shooter
 
Join Date: Jun 2012
Location: IL, USA
Posts: 544
Thanks: 3,528
Thanked 764 Times in 334 Posts
Default

Be aware that the TOR project received a bunch of money from various US agencies and foreign governments. I don't think I'd trust it with anything too important.
Quick reply to this message
The Following User Says Thank You to ghost792 For This Useful Post:
Reply

Bookmarks



Quick Reply
Message:
Options

Register Now

In order to be able to post messages on the Survivalist Forum forums, you must first register.
Please enter your desired user name, your email address and other required details in the form below.
User Name:
Password
Please enter a password for your user account. Note that passwords are case-sensitive.
Password:
Confirm Password:
Email Address
Please enter a valid email address for yourself.
Email Address:
Gender
Insurance
Please select your insurance company (Optional)

Log-in

Human Verification

In order to verify that you are a human and not a spam bot, please enter the answer into the following box below based on the instructions contained in the graphic.



Thread Tools
Display Modes

Posting Rules
You may post new threads
You may post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT -5. The time now is 01:22 PM.


Powered by vBulletin®
Copyright ©2000 - 2020, vBulletin Solutions, Inc.
Search Engine Optimisation provided by DragonByte SEO (Lite) - vBulletin Mods & Addons Copyright © 2020 DragonByte Technologies Ltd.
vBulletin Security provided by vBSecurity v2.2.2 (Pro) - vBulletin Mods & Addons Copyright © 2020 DragonByte Technologies Ltd.
Copyright © Kevin Felts 2006 - 2015,
Green theme by http://www.themesbydesign.net