Customize

The Gentleperson's Guide to Forum Spies

Discussion in 'General Discussion' started by Anonymous, Jun 9, 2013.

Thread Status:
Not open for further replies.
  1. Feel free to delete the file contents post any time. TMI
  2. Disambiguation Global Moderator

    His conversation in the Ask Questions thread is that he doesn't want to join because this file downloads to his phone when he accesses WWP.
  3. Wow. Your too quick for me. Just so.
  4. Disambiguation Global Moderator

    Here's his post
  5. And I just cross posted. It's one of our spy tricks not covered in the area. ;)
  6. OMG. Moderators please delete all my redundantly redundant posts. And the empty one too. LOL
  7. And now I'll come back in ten because there is responsive, and then there is pain in the ass...
  8. JohnnyRUClear Member

    Thanks, all, but I wasn't asking for a recap of the conversation here. I was asking for more specific information about the actual file.
  9. Oops again. I meant that I was the pain in the ass.
  10. I assume you saw the short lived details? Way TMI to let junk up the site.
  11. For the record, I did try cummunicating this using two other off forum methods but had no luck in a timely basis. Is the forum the correct place for this discussion?

    Tip: Having go to top buttons are handy on pages where long posts are repeatedly quoted.
  12. I think I have a possible answer...

    The purpose of the temp file is to allow non registered user to have thier anon user name reused in subsequent posts.

    Correct?. Huh? Maybe? Testing on new lage....
  13. Perhaps but hard to tell on that new PAGE.

    Notes:

    I entered the URL manually...
    All tests done using chrome mobile without TOR.

    1. The home page creates a new file unchallenged.
    2. A new post remembered my handle from other already open pages.
    3. Doing a BACK to the home page caused the challenge screen with replace / new options.
    4. Returning to a previous open page did not trigger the challenge though a newer file existed.
    5. ALL files deleted.
    6. Posting on an open page rembered my handle.
    7. Doing a back out of that post challenged to replace a file that no longer existed.

    Life and technology is strange.

    I am now closing all tabs and rebooting. Will clear chrome cache after restart. Will enter the URL manually. More to come...
  14. Truly bizarre behavior...
    X
    8. Initially, the Home page did not show Toast download notification.
    9. Entering Welcome thread added file but challenge was present
    10. Different thread downloaded with Toast notification.
    11. Entering a post did not remember my handle / user name.
    12. It appears this info is not stored in a cookie.
    13. Upon booting some apps take time to load. If I am hacked, it may have taken time for the hack app to load. Of course we have an app for that.;)
    14. I have made activists posts on main stream sites. FYI
    15. I have had previous hack attempts subsequent to that.
    16. Anti virus software will not detect invasion by pros.
    17. I am not paranoid so stop following me. Don't care really regardless.

    May I ask which mod is the web master or is that a secret?

    I must return to my home planet for a few hours but will do more research later...

    Thanks for your efforts.
  15. JohnnyRUClear Member

    No, I didn't.

    It looks like you've gotten a handle on this beyond my tiny ability to (maybe) help think it through, so I'll GTFO now. Good luck.
  16. A.O.T.F Member


    Using a cellphone to access anything is like walking through a fucking surveillance minefield. Are you fucking kidding me?


    NO! Most definitely not



    Sure, you can ask. But if we told you, we would have to kill you.
  17. Disambiguation Global Moderator

    AKA lurk moar
  18. Orgsclosed Member

  19. Second, why no user that being the case.

    Per your guide, "playing dumb". Allow me to make some additions to your spy docs...

    1. If they think your dumb enough, they'll screw up. Given I care little, using a cell has exposed some really odd happenings.

    2. Top five on the list of important software concepts is exceptions. Exceptions processing. Error exceptions handling. All sorts of geeky exceptions stuff.

    I you think about it, what hackers do is try to locate and exploit exceptions.

    What you might not know is that it is often through exceptions of various sorts that systems and web master geeks discover a problem.

    So it's good to test exceptions and do stupid stuff. Bad is good, or we wouldn't be here in the first place. ;)

    3. If I had created my user days ago the weird behavior might have gone away. A case where good is bad. Give em enough rope I say... If! If that is what's going here!
  20. Finally, when I could not explore this through other means the gig was up....

    Talk about outing yourself. With no immediate common place explanation the troubleshooting required exposes so many aspects of who I am it becomes a joke. So although I am not kidding I guess the jokes on me. LOL

    "The needs of the many outweigh the needs of the few."
  21. Test post from Chrom Version 32.0.1700.102
  22. Speculation:

    1. Why only on your site. Unsecured visits to other rabble rouser's sites might be good.

    2. If the problems on my end, why is it not transparent?

    3. Is this a man in the middle attack on your site?

    4. Might the web master be able to provide an innocent albeit anonymous explanation?

    5. Do I obsess about everything or just this one issue?
  23. Speculation:

    6. Nope, despite posts saying it just ain't so I'm pretty sure I'm being sent an encrypted file that contains a public key in it's file name. It is here that I will do some further research.

    And yes, I will load TOR and create a user once I've solved this puzzle. Doubt it matters on a compromised system though.
  24. JohnnyRUClear Member

    Isn't a user a human being? Do you mean an account?
  25. Hilarious... Unless of course the human is a user... Jargon updated... CLICK... wrrrr....
  26. NSA

    ^

    fify
  27. hi anonymous (comment puis-je rejoindre cette organisation je pense savoir me servire d'un ordinateur)
  28. how can i join?
  29. Disambiguation Global Moderator

    • Like Like x 1
  30. Sue, when are you going to get rid of your pedophile loving moderators?
    fedlex
    This message by fedlex has been hidden due to negative ratings. (Show message)
    • Dislike Dislike x 3
  31. Love HacK LovE Anonymous we are anonymous ;)
  32. DeathHamster Member

    • Like Like x 2
  33. Cryptome doesn't have the GCHQ acronym interpreted correctly.

    This is correct;

    From the intercept site.

    https://theintercept.com/2014/02/24/jtrig-manipulation/

    http://motherboard.vice.com/read/ne...according-to-this-koch-backed-astroturf-group

    http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_cyber_offensive2_nbc_document.pdf

    http://mobile.reuters.com/article/idUSBRE95K0ZV20130621?irpc=932
    For decades, the NSA and GCHQ have worked as close partners, sharing intelligence under an arrangement known as the UKUSA agreement. They also collaborate with eavesdropping agencies in Canada, Australia and New Zealand under an arrangement known as the "Five Eyes" alliance.


    Other factions.

    http://www.salon.com/2010/01/15/sunstein_2/
  34. meh

    My edit to spice this thread up":


  35. Maybe an Alien ?
Thread Status:
Not open for further replies.

Share This Page

Customize Theme Colors

Close

Choose a color via Color picker or click the predefined style names!

Primary Color :

Secondary Color :
Predefined Skins