Вся инфа
Винни кричит «Мама!»
(707) блять, она работает, только хуй знает как нормально соединить две части проволоки
Винни Пух кричит «Мама!»
ТАС КВАДРАТЫ
В инфе 78954 за древними письменами скрыт откровенный пиздёж
ВЕДЬ Я СОСТАРЮСЬ, ТОЛЬКО ВОЛИ НЕ ВИДАТЬ, БЛАГОДАРЮ ЗА ЧАЙ С БАРАНКАМИ И ТОРТ
В инфе 78954 за древними буквами скрыт откровенный пиздёж
МАДВАЛЬНЫЙ - НАДОКА
𓂧𓂋𓇌𓏭𓅱𓈖𓇋𓇌 𓇌𓏭𓎼𓇋𓊪𓇌𓏭𓇤 𓎡𓂋𓅱𓍿𓇌𓏭 𓅱𓇋𓎡𓇋𓈖𓎼𓆑
https://en.wikipedia.org/wiki/Shoulder_surfing_(computer_security)
Stylometry (deanonymization using your spelling style) is a powerful tool long used by Intelligence services. It is possible to automatically analyze and attribute anonymous postings to an author. Countermeasures such as faking one's authorship style can work.
Ⲅⲣⲁⲡ', ⲛⲁⲥⲉⲗⲟⲓ, ⲟⲡⲉⲃⲁⲓ - ⲑⲗⲓⲁ ⲃⲁⲣⲓⲁⲅⲁ ⲏⲧⲱ ⲣⲁⲓ!
Over time, pseudonymous activity can be profiled to give an accurate estimate of your timezone and reduce your anonymity set. Try to restrict your posting activity to a fixed time that fits the daily activity pattern of people across many places.
Mind your cookies! Remember to empty your browser's cookie and history cache periodically. When you are using Tor Browser, which is recommended for many reasons anyway, simply close Tor Browser after you are done working on your blog, then restart it. For more advanced separation use Multiple Whonix-Workstations.
78943 я про подобные вещи давно думал, от них как раз хрен защитишься(разве что js отключать или браузер патчить)
(707) Потому что из 2 проволок
(707) Антеннц вроде бы как сделал, но соединения хуёвые
в 2019 году наступит коммунизм
Mouse movements are potentially another biometric fingerprint. High accuracy is achieved in limited situations - active authentication during log-on. Does not clear EU false positive requirements however so they recommend it for combining with keystroke dynamics as extra confirmation.[14][15][16] It is good practice to keep JS disabled.
78940 блядь это пиздец. Мне даже в оолову не приходили такие методы идентификации И какие еще не пришли?
Anonymous Audio Recording Sharing[edit] A similar threat for linking audio recordings to a microphone's hardware is also a valid possibility though no research has been done on this yet. The same opsec measures as for #Anonymous Photo Sharing should be applied.
ВХУНИКС НЕ защищает стиьометрию. Она не сбивает с толку стиль письма юзера. Вследствие этого пока меры предосторожности не взяты, юзеры рискуют быть стилометрически проаналищированы онэсновываясь на стиле их говорения. Исследования предпоьагаюсь чтт достаточно тысячи слов (или меньше) чтобы положительно идентифицировать Автора и здесь есть доступный хост программного обеспечения чтобы провести этот анализ.
Users can be uniquely fingerprinted based on: [6] Typing speed. Exactly when each key is located and pressed (seek time), how long it is held down before release (hold time), and when the next key is pressed (flight time). How long the breaks/pauses are in typing. How many errors are made and the most common errors produced. How errors are corrected during the drafting of material. The type of local keyboard that is being used. Whether they are likely right or left-handed. Rapidity of letter sequencing indicating the user's likely native language.
Analysis of grammatical structure and syntax.
There are multiple ways to conduct statistical analysis on "anonymous" texts, including: [2] [3] Keystroke fingerprinting, for example in conjunction with Javascript. Stylistic flourishes. Abbreviations. Spelling preferences and misspellings. Language preferences. Word frequency. Number of unique words. Regional linguistic preferences in slang, idioms and so on. Sentence/phrasing patterns. Word co-location (pairs). Use of formal/informal language. Function words. Vocabulary usage and lexical density. Character count with whitespace. Average sentence length. Average syllables per word. Synonym choice. Expressive elements like colors, layout, fonts, graphics, emotions and so on. Analysis of g
(707) я дома, ща буду антенну пытаться делать
https://pp.userapi.com/c841128/v841128001/5b397/bc_96ka0tjU.jpg
https://www.whonix.org/wiki/Surfing_Posting_Blogging#Stylometry
вот это самое сложное Whonix does not Defeat Stylometry[edit] Whonix does not obfuscate a user's writing style. Consequently, unless precautions are taken, users are at risk from stylometric analysis based on their linguistic style. Research suggests only a few thousand words (or less) may be enough to positively identify an author, and there are a host of software tools available to conduct this analysis.
Сверхъебан https://vk.com/wall-135856652_35281
Neither can Whonix prevent users from shooting themselves in the foot, leading to inadvertent deanonymization. Users are strongly encouraged to read the list of non-technical steps to stay anonymous when using Tor, Tor Browser and Whonix. This list considers:
Obviously, Whonix cannot protect against external threats like people looking over the user's shoulder or gaining physical access to the machine in order to subvert the anonymity features of Tor and Whonix.
Whonix does not Protect Against External Threats or User Mistakes[edit] O
{DOSH} RAK, ARE YOU UHU EL?
дош & рак
дош и рак
Нет, задача вообще срубить. А там уж кто сам подумал о своей безопасности
Дошики кста дорого получаются
Ну да естессно, это как щал лбди купят айфонов а потом сиги стреляют и дошики жрут
78919 щас 2018? я в своем 8 лет ходил.
Алала мне тян дала
Если они увидят что денег мало, то и не сунутся. Задача же срубить больше. Это что касается виртуальных махинаций
Мне кажется, что мошенникам не выгодно работать с бедным населением
Да бля. Суть в том, что б деньги были вообще. А не так, что получил и всё отдал, остался без шубы. Купил вон самый дешевый пуховик и носи 3 года, если не 5.
Users could try to find an online service that will receive a personal SMS on their behalf. That would work and would be anonymous. The problem is this method probably won't work for Google and Facebook, because they actively blacklist such numbers for verification. Another option is trying to find someone else to receive the SMS for you, but that would only shift the risk to the other person. [26]
If a user really wants to do mobile verification, then a location far away from home is recommended, along with a fresh phone and a new SIM card. Afterwards, the phone must be turned off, and immediately both the phone and the SIM card should be completely destroyed. This may necessitate burning the items or other inventive (guaranteed) methods of destruction.
Any phone numbers that are provided will have already been logged. The SIM card is most likely registered in the user's name. Even if this is not true, receiving an SMS gives away the user's location. Users can try to anonymously buy a SIM card far away from their usual home address, but there is still a risk: the phone itself. Each time the phone logs into the mobile network, the provider will log the SIM card serial number [24] and the phone serial number. [25] If the SIM card is bought anonymously, but not the phone, it is not anonymous because these two serials will get linked.
Websites such as Google, Facebook and others will ask for a (mobile) phone number if attempting to login over Tor. Unless the user is really clever or has an alternative, this information should not be provided.
Do not Use (Mobile) Phone Verification[edit] W
Do not Use Different Online Identities at the Same Time[edit] Managing contextual identities online is increasingly difficult and fraught with mistakes. Different online identities can be easily correlated if used simultaneously, since Tor may reuse circuits in the same browsing session or information could potentially leak from the Whonix-Workstation. Whonix does not magically separate different contextual identities.