Comment by m4tthumphrey

Comment by m4tthumphrey 9 days ago

16 replies

Me neither, but would it have been easy to trace him? I mean if he was going to use this for bad, I would assume he would have waited a month or so then done it all via a VPN etc. But point being he _could_ have done this and to be honest for all we know, someone else _has_ been abusing it until it was patched...

manbash 9 days ago

VPN is used to bypass regional restrictions.

The VPN provider will share information if an active investigation is underway.

  • rustcleaner 8 days ago

    Buy VPS with Monero.

    Deploy image containing Tor router and hidden service onion config.

    Do above as many times as one needs to feel comfortable.

    Use VPSes as proxies intermixed with VPN and Tor legs.

    What's lil officer Timmy at CISA gon' do? Netflow you? LOL!

    • dboreham 8 days ago

      Fine except TLA is running your VPS.

      • jojobas 8 days ago

        And just like that, they track you down to an Upstate NY MacDonald's wifi hotspot that you're never going to visit again. Now what?

        • mattmanser 8 days ago

          It's the same with all crimes, sure you can theoretically get away with the perfect crime. But you only have to make one mistake to get caught.

          Re-use a username, accidentally log in to something as yourself, forget to turn on the VPN, etc.

          Just for some lolz which could result in prison time.

  • akdev1l 8 days ago

    the VPN provider can try to share whatever information but most reputable providers would have nothing

    You can pay for a VPN using monero or cash and then connect to the VPN from TOR - VPN provider doesn’t need to know anything

    • TechDebtDevin 8 days ago

      Please don't do this. Most people aren't going to pull this off correctly and if they think this makes it safe for them to go around messing with companies they could really get themselves in a lot of trouble.

      If I were to mess around with stuff, and im not. The only way I'm doing that is with a used laptop of Craigslist or whatever and cafe with no cameras, even then idk.

      • rustcleaner 8 days ago

        Qubes OS.

        Done.

        • TechDebtDevin 8 days ago

          Sorry you will never catch me using hardware to commit a crime that's ever connected to my home or work networks or ever in anyway been associated with my name. IDC about the OS. But I'm not going to commit a crime either so I don't worry about this FYI

    • [removed] 8 days ago
      [deleted]
    • ufmace 8 days ago

      If you're already using Tor, what's the point of having a VPN too?

      • __turbobrew__ 8 days ago

        There isn’t a point. It is useless security theatre for those who do not understand how tor works.

        • akimbostrawman 7 days ago

          it's called defense in depth which makes sense if your life depends on it not to mention tor is most likely blocked while VPS/VPN aren't

      • akdev1l 8 days ago

        So the target doesn’t see a bunch of random connections coming from tor/known exit nodes

      • victorbjorklund 8 days ago

        Only "benefit" would be that TOR might be blocked but the VPN isnt.