It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

The Internet is a 21st centuy stasi archive

page: 1
0

log in

join
share:

posted on May, 21 2007 @ 05:08 PM
link   
Ver soon everybody will have an Internet file which you can easily compile by punching their name into search engines such as Google. Isn't it reasonable to post the Stasi files on the Internet too? It will be done soon for backwards compatibility.

Consequences: very soon every employer, every friend, every school will want your Google file and your explanation for any anomalies before you do business with them.



posted on May, 21 2007 @ 10:14 PM
link   
I don't see this as being possible until every webpage requires your credentials. They only thing they have on you now is your IP address and that can be easily spoofed.



posted on May, 22 2007 @ 02:13 AM
link   
Well, IP spoofing inst really going to protect you. The FBI has monitoring equipment at all ISP head-ends, so Layer-2 MAC filtering is also possible. Also, now that that equip is in place, they can pretty easily trace the data stream from a spoofed IP back to the ISP node it came from, and in most cases, all the way back to the modem and further since they can MAC filter.

The internet is not as secure a playground as many people assume. By its very design, all data streams can be traced to their source as long as you have the right equipment in the right spot. And as of May 14th, the FBI has that.


Originally posted by damajikninja
Well, if you change your network card(MAC), and get a new IP address (either from the ISP or from a router), your traffic will still be flowing through one fiber gateway back to the ISP. There is still a leg of the network that you HAVE to pass traffic through in order to get out to the internet. Even if you change your MAC and IP (which you cant do every second), they can still filter all the traffic from your network node and find your data stream again. Granted, it is gonna take em a second to re-locate you, but its gonna take you a second to switch out MAC/IP every time you do it.

EDIT: Not to mention that your cable/dsl modem will still have the same MAC if its in bridge mode, and the same IP if it isn't in bridge mode. See what I mean? Even if they can't track your NIC's MAC or IP, they can just filter any traffic coming from your modem. And as said above, even if you change out your modem, they can still start looking for you in the local node's traffic back to the ISP.


The only effective way to keep running from them is to change physical routes as often as possible. Like changing ISP's you run through, or being wireless and hopping from one physical layer (ISP/node) to another. As long as you do that while changing your MAC everytime you hop, you can evade them fairly well.

But even if you do that, they can still locate your data stream by waiting for your traffic to show up in other predictable places. Lets say they they know you go to a certain website, like ATS, and they want to monitor you. All they have to do is filter data going in/out of ATS servers, and wait for your username to show up in some packet data. Then they'll know which data stream is yours, which means they know where your data is coming from, which means they know what ISP you are on, and which Node you are on. From that point on, they can filter all your internet traffic until you change physical routes and they lose you again. Not to mention they will have a pretty damn good geographic fix on you.


Its all about not being predictable, and to keep them guessing about where your traffic is going to come through. Cause once they know where to look, they can find you and monitor you relatively easy. And let's not forget that the FBI has monitoring equipment freshly installed at all ISP head-ends, so they certainly have the resources to look at any data stream on any network.


[edit on 5/22/2007 by damajikninja]



posted on May, 22 2007 @ 03:46 PM
link   

Originally posted by Prokurator


Consequences: very soon every employer, every friend, every school will want your Google file and your explanation for any anomalies before you do business with them.


Big deal so someone will know I jerk off to www.naughtybits.com everyday ritualistically who cares?

But really though what are they going to gain from this?
I could see it coming about when we are all implanted with rfid or whatever kind of technology they can bring about, or mybe when we live in some vanilla sky reality with machines reading are retna in our eyes to tell client computers what we desire from our long list of search habits.



new topics

top topics
 
0

log in

join