×
Login Register an account
Top Submissions Explore Upgoat Search Random Subverse Random Post Colorize! Site Rules
12
20 comments block


[ - ] i_scream_trucks 4 points 1.1 yearsMar 26, 2023 15:46:14 ago (+4/-0)

No shit....


[ - ] oursenilepresident 0 points 1.1 yearsMar 27, 2023 00:31:06 ago (+0/-0)*

yes.
article is retarded old news. most sites FAIL with javasript forced off. current fingerprinting relies mainly on html5 canvas being read back and type of GPU float rounding error profile of fringe pixels of fonts. Any site using CloudFlare offers fingerprinting. A remote PROXY web emulator service that runs javascript on ANOTHER machine remotely stops fingerprinting of your machine and fed ALS (antiliberalsociety (voat, banned twice) , TwiceBanned (voat), Scatholic (voat), ChuckysBack (voat), CognitiveDissident5 (yes really and truly), JosephGoebbels5 (ConPro), Danigerman, WhatDidHeMean99, Tima, FlyingSatsumas, Mrsponat and 8 other names) used such a remote anon proxy. That one Fed used a web proxy anon service to evade people like me.

TRACING PACKETS from a database....

sneakier methods include paying for a IP address of final router hop of your home or work office!!!! it works THROUGH VPNS!!! Another trick is hiccuping all users EXCEPT one target to packet trace for 20 seconds or so.

CRITICAL DANGER to anyone trying to hide behind either a VPN or a TOR network!

A new FUN FACT, but a fun fact that helps jews until this site adds random 1 to 150 bytes on all messages out,but now with SERVICE INTERRUPTIONS to all but one IP, there is NO HOME DEFENSE against this fun fact, unless you run a "tickle monitor" on a different VPN to detect false"service outages" !

= = = = = =

-----------


FUN FACT #941 : ALL PEOPLE CAN BE FULLY PACKET TRACED SINCE 2021 when reading a specially created packet sent to you, or passively read by you! They find you, for under $300 by Hackers and spies using backbone sieve databrokers like "Cortex Xpanse"!
=====


Though every 18 months, a NEW method to get javascript or router tricks or WEBRTC exploit tricks to reveal the exact last IP address into your home cable modem... There is a CRITICAL and ACTIVE trick the ADL/JIDF/SPLC and Nation states and CIA Glowniggers that started in 2021 that CANNOT BE STOPPED!

Possible alt of a very very dangerous hacker intent on getting a paycheck for a client upon finding actual identity of someone here and is mapping out types of traffic sent to recipients "message and comment" thread, employs a packet under 1500 bytes and usually is a primary string composed of just a single UTF8 8 bit byte , like ASCII PERIOD "." or ASCII COMMA "," and no other primary content string.

If an alt (user) sends over three of these short strings ("." , or ",") in one hour, then attack becomes definitive, and odds increase from 10% (innocuous) to 50% chance (highly credible hacker threat to you).

Sending (reading or accessing) two or more messages eventually of a specific total byte length is NOT ALWAYS INNOCENT activity and is part of the activities of ferreting out the home IP addresses behind a VPN using a technique I may have employed in the past, and nation state spooks are doing this year, though now anyone can do it. Its trivial if in a live chat, but can still be done if time window is much wider. IF ANYONE EVER SENDS A PRIVATE MESSAGE comprised of merely one or two bytes, its definitely an attack on the recipient.

I will divulge here the same info in longer pedantic form, but feel free to read the center portion of this recent reply wrote where I partially revealed the ways and means of getting IP addresses INCLUDING BEHIND a VPN , in 2021 :

Real and follow info links of mine : https://communities.win/p/140JK3HCCn/x/c/4JIP303V0Jb

(OPTIONAL) READ THAT LINK for a method using a backbone sieve broker Israel often uses
================

... or you can just read this message.


Basically, even if a user is a longtime seasoned spook looking or even if a user is a Jew Naming user, YOU CANNOT TRUST THEM if they try to send "." in chat or posts, emails, site p2p, or even possibly TOPIC OF THREAD BODY like the "." at 12:35 AM EST Dec 2 at https://communities.win/p/140c4qCk2U/paul-simon-is-a-piece-of-shit/

ANYONE sending a short single byte comment is possibly doing ACTIVE web sieve SSL packet trace on someone (you?), or is doing early recon or re-testing (regression test) of the site formatting code for a prior known and prior used technique to divulge.

The chance rises to 50% positive chance if anyone in the same 48 hour window got a private message with one single period in it "." though technically any single letter will do... but... and this is key.... no private messages are needed if the site code for a single payload is reviewed by a user.... or even more if a two prong mapping using tickle time knowledge of NON ENCRYPTED feed from cloudflare colo to this cloud to know WHEN a target is reading a specific payload, and then forensic traffic map of the HTTPS feed on OTHER side fo cloudflare outbound.

It is a FACT that on other sites, spooks used a single period "." as a size constraining element , three times , in a short period to map people at voat.xyz in 2021, though any single letter will do nicely, perhaps humans overlook periods.

If I was an admin here, I would desperately also want to know if suspicious people sent any one byte private p2p messages.

As a naughty very skilled hacker myself.... I am warning you guys that THOSE TWO MESSAGES of just "." I REFER TO are likely EXTREMELY NON-INNOCENT, retests (regresion tests), or pre-tests (active development)!!!!!!!

Once again.. in 2021 there are affordable and trivial ways to find the actual real final IP address BEHIND a VPN, or behind multiple router hop obfuscators if they do not repacketize the payloads with time jitter and garbage byte random padding.

I am not a typical person, but the tools and ability could be shown to someone in a few hours, and someone paying 300 bucks or so, free for trial test, to get a targets home IP address the next time they use this site. It does not involve altering the javascript or getting them to click on any off site links. Few on earth know it and do it, but the Jews do, the spooks do, and I do.

Some sites other than Poal.co use CloudFlare to track you across all your web sites and add profile to record of this site. (Check padlock on the site. Poal.co is real, but it is Cloudflare SSL key NOT a real HTTPS SSL key for voat.xyz, consumeproduct.win, and many others).

Only US LEA (FBI/Secret Service/NSA) has in-situ capabilities within CloudFlare itself, so foreign spook agencies, like MOSSAD/Russia/China have to resort to clumsier means to do end to end traffic path to this sites colocation facilities.

If you only ever go to one web site using cloudflare (rare) the method I will divulge still works.

The out and in packets are all the same byte size after encryption into HTTPS for a final packet or sub 1500 byte packet, and though I won say how a predicatable series of three specific sized packets can be formed , end-to-end, services that collect and store all ENCRYPTED PACKET SIZES (even with HTTPS) for sale to Jewish buyers (not joking) exist :

https://www.vice.com/en/article/jg84yy/data-brokers-netflow-data-team-cymru

ISPs are quietly distributing "netflow" data that can, among other things, trace traffic through VPNs.

Here's archive lacking charts, lacking images, non reactive on glass held devices :

https://archive.is/SW6PL

Summary : Companies sell traffic sieve database scan specifics to motivated data buyers. A person forcing either periodic chat packets of a tiny specific size, or three specific sized web packets from a user's inbox mail, even if h t t p s encrypted by this site

FBI/NSA/CIA are entrenched in-situ at CloudFlare the anti-DDOS snitching vendor, so this thing in this news story is for foreign actors, not US Feds : ADL/SPLC/MOSSAD/JIDF/China/Russia.

80% of long-haul h t t p s packets can be scanned by ONE data broker : from their boast on their page :
==========


Cortex® Xpanse™ obtains flow data via multiple relationships with Tier 1 ISPs. Cortex Xpanse has access to a sample of approximately 80% of global flows."

https://docs.paloaltonetworks.com/cortex/cortex-xpanse/cortex-xpanse-user-guide/cortex-xpanse-expander/data/netflow-data.html

OMG! "all global packets"!

DEFENSE by site coders?
================

To fuck up their spy tactics, this site's coder would just make sure most all payloads have non screen rendered random padding of 0 to 100 bytes, on all traffic out, allowing sub 1500 byte packets, but trying to RANDOMLY pad 0 to 100 bytes, and average waste of 50 bytes.

But if the hackers monitor all data on the far side of cloudflare out, and no SSL is reset on that side (only 5% of customers do, probably), then these motivated actors can use any "known at the time" length , even with gibberish, if enough messages are sent... 3 spread out over a long session to one end user hiding behind a VPN.

The periods become irrelevant if a person is doing traffic analysis on all three tap points. The SSL INTO cloudflare (or out) suing public Cloudflare controlled SSL, combined with the other side of cloudflare, the opaqu most likely UNENCRYPTED side from Cloudflare, the private side, combined with "Cortex Xpanse" packet sieve parameters from specific 130 millisecond time period , IPs, and packet size used to map in across and out a large VPN.

Its all too much, and pernicious. All I can say is sending one byte messages or posts is similar to "door knob testing" and no good can be from this much of the time in my estimation.

The paid Leftists infesting this highly confidential "ways and means" will try to downvote this warning of VPN to home IP tracking.

= = = =
MOSSAD's Candiru uses Cortex packet sieve via paying Team Cymru who uses it :

Thanks to Team Cymru for providing access to their Pure Signal Recon product (using Cortex)

See at the bottom of :

https://archive.ph/kfYd2

= = = =


But as I said, there are many historic slimy ways to get a persons VPN public IP address or normal IP...

UNRELATED legacy tactics for ANTIFA Jews to locate you without help from Cloudflare/Google/Facebook cookies:
=====


The Full "ways and means" to get a street a person here live on or near, without using modified javascript (GPS/WIFI enhancements or cookie nexus tricks):

- URL "?" adornments : a URL on minor or major web site with an tracking adornment on it "?stringcode97149", if they click on a URL without first looking for "?" breadrumbs.

- Another is a image on a boutique image server with accessible logs (I never used any service ever except catbox and the standard hosts image server and never click on www.fedimages.gov/pics/140914094.jpg)

- Another is a zer0-day PDF with link to it posted, that works in ANY LINUX pdf viewer, and windows and mac. (Feds do this constantly). Beware PDFs jews might upload here.

- Another is a malware payload exploit in a fucking webP image file pretending to be a .jpg or pretending to be .png stream, but is really a "poisoned webP" image. I myself have extensive background in this and warned 3 other free speech sites, and I got Apple to fix 4 different webP image exploits. Windows had one in the past too, but that got closed before this year.

- Another is rare javascript exploits that root machines, but these pop up only once every 2 years, and require altering data stream inside cloudflare or on hacked server javascript code here.

- Another is rare WebRTC exploits FBI used to laughably locate all people on the DARK WEB (tor) that used web browsers for over a year. (never use any web browsers on tor, just packet chats). TAILS enabled it and slightly altered their source code checkin history logs to cover it up (embarrassed or nefarious?) I caught them.

- Another are the FREQUENT security exploits added to BRAVE browser source code by NSA paying big cash bribes to a engineer to check in three DIFFERENT identity revealing so-called new bugs last year alone!

I study all the above stuff because ANTIFA and Jews want me dead, it seems. (I am on many web sites). And I need to maintain proper security of myself. In fact none of the above tricks, none, would work against me, and at best would lead to a an infested router at a random persons home, before reentering another vpn path back to me.

Sorry for all the rambling and typos.

Shit... I am spewing all this not to scare anyone, and in fact its meant to protect this "Free Speech hate thought" site


TL/DR: Results-oriented paid contractors working for ADL/SPLC/JIDF/MOSSAD or a non-USA nation state send small specific sized replies to you, but to make it easier creating a service block of other IPs aids immensely. Private messages sent to you of just one byte like "." are suspect.





====



Appendum : I am fully cognizant that divulging more spy "ways and means" or "spycraft" as I just did makes me glow far more than most other users, but I did it to protect people here who are trying to hide from Jew paid ANTIFA goons hired by MOSSAD/JIDF. People hiding like myself. Jews want me dead. Keep in mind , actual fed glowniggers here from (CIA/ NSA/ NRO/ FBI/ DIA/ USDOJ/ State Dept INR/ USAFISR/ DOE/ DHS/ TFI/ ONSI/ NSF/ USPS) do not seek to uplift this sites IQ higher or its educational level, Thus, I am other "site helpers" like myself here are not glowniggers.

= = = = = =
side note:

NSF/ USPS?

Every time I mention "NSF/ USPS" I get mocked on lefty ParlerWatch and rDrama dot net too. So I always have to type the following citations for NSF/ USPS:

NSF Too? Yes, $ millions even for NSF to surf this "hate thought" site :

https://www.breitbart.com/tech/2020/03/01/federal-funds-used-to-research-hate-speech-on-gab/

USPS too? Yes not just millions for NSF, but even the USPS monitors White Hate on social sites to allow access of FBI/NSA databases:

https://www.businessinsider.com/usps-running-covert-program-that-monitors-americans-social-media-per-report?op=1

There are no less than 20 active glowniggers on this site when adding in a handful of nations states too.


[ - ] observation1 1 point 1.1 yearsMar 26, 2023 20:45:08 ago (+1/-0)

Yes it does

[ - ] deleted 1 point 1.1 yearsMar 26, 2023 16:20:49 ago (+1/-0)

deleted

[ - ] Kozel [op] 3 points 1.1 yearsMar 26, 2023 16:42:33 ago (+3/-0)

most retards here are using a chrome flavor of browser which was built from the ground up to fingerprint users

[ - ] observation1 1 point 1.1 yearsMar 26, 2023 20:45:57 ago (+1/-0)

Same ones who direct link to youtube and reddit

[ - ] Kozel [op] 0 points 1.1 yearsMar 28, 2023 12:29:45 ago (+0/-0)

direct links are fine, it is up to the end user to proxy it. plenty of addons to automate such things.

[ - ] observation1 0 points 1.1 yearsMar 28, 2023 22:03:06 ago (+0/-0)

And blowing my nose on money after I hand it to you is technically something you can clean, too.

[ - ] Kozel [op] 0 points 1.1 yearsMar 29, 2023 01:58:06 ago (+0/-0)

can I install a little guy that sits between me and people who hand me money and cleans it without me doing anything at all?

no?

so its nothing at all like what I just wrote.

[ - ] observation1 0 points 1.1 yearsMar 29, 2023 02:36:59 ago (+0/-0)

The difference is youd ask every voat user to install their own little guy that sits between you and the people who leave deposits.

Im the type of person who prefers not to drive slow in the fast lane and making everyone drive around me.

[ - ] Kozel [op] 0 points 1.1 yearsMar 29, 2023 02:38:42 ago (+0/-0)

yes they should install a little guy like that, and a little guy that blocks ads, and a little guy that deletes cookies and if they don't they are normie faggots

[ - ] observation1 0 points 1.1 yearsMar 29, 2023 03:16:04 ago (+0/-0)

"I'm going the speed limit. Others should stop honking and flashing their lights. Just go around me, faggots."

[ - ] Kozel [op] 0 points 1.1 yearsMar 29, 2023 03:28:53 ago (+0/-0)

Your comparisons make no sense. I've left you in the dust, circumnavigate your own folly before you attempt to pass me up, fool.

[ - ] AngryWhiteKeyboardWarrior 0 points 1.1 yearsMar 27, 2023 06:06:01 ago (+0/-0)

Someone tell MartinTimothy that the feds can still see him jerking off to nude pre-teen glamour.

[ - ] shadowwolf225 0 points 1.1 yearsMar 26, 2023 23:26:46 ago (+0/-0)

You just gotta use a different finger for each identity. This is basic shit. Just don't cross your fingers and make a noob mistake.

[ - ] deleted 0 points 1.1 yearsMar 26, 2023 21:39:16 ago (+0/-0)*

deleted

[ - ] Panic 0 points 1.1 yearsMar 26, 2023 17:47:00 ago (+0/-0)

It figured out that I am JFK Jr. Dammit. Faking my death was a waste of time.