• sumguyonline@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    First, randomize your mac, shutdown anything that can “dial home” (updates, sync, logged in apps, etc) then connect to internet then anonymous VPN, then connect to the tor network, use an anonymized browser with NO java enabled, never download anything -copy paste text, and screen cap images-, if your network drops the popo’s are trying to do a “reconnect” attack to see if they can get an unprotected connection to the material you were looking at. Use a livedisk on USB and you likely won’t get bios level attacks, as live disks make it harder to access your bios. Source: a boring ass individual that just wants the gov off their jock strap, suck it Joe my FBI agent, you know what you did.

    • sunzu2@thebrainbin.org
      link
      fedilink
      arrow-up
      0
      ·
      1 month ago

      a boring ass individual that just wants the gov off their jock strap, suck it Joe my FBI agent, you know what you did.

      I also prefer my feds to earn their keep, I pay them good money for it.

    • PM_Your_Nudes_Please@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      1 month ago

      This looks like it was a timing analysis attack. Basically, they’re trying to figure out which user did something specific. They match the timing of the event with the traffic from the user, and now they know which user did the thing.

      It can be fuzzed by streaming something at the same time, because now your traffic is way harder to time analyze when you have a semi-constant stream of data running. But streaming something over Tor is an exercise in patience, (and it’s not something the typical user will just always have running in the background) so timing analysis attacks are gaining popularity.