8chan's Pedo Communities - Step into the cesspool of darkness and despair on shady chan boards

  • 🐕 I am attempting to get the site runnning as fast as possible. If you are experiencing slow page load times, please report it.
While Anonymous did do stuff to stop a pedo ring in 2011, Anonymous is no longer associated with 4chan. 4chan's community in general, at least when I was frequenting it, are heavily sympathetic towards pedophiles. I remember quite a few late night /b/ threads dedicated to the sort of content that /phile/ and /hebe/ provides. The consensus was that legally-aged women were simply "not for them", because all legally aged women have the possibility of not being a virgin and thinking for themselves too much.

There was even an infographic that was constantly going around where somebody listed all the qualities that pre pubescent girls have that legal girls lacked, which was the biggest pile of rose-tinted, disgusting bullshit I had ever laid my eyes on.

edit: I didn't realize how old this thread was. Sorry for necrobumping?

this is why everyone hates /b/
 
Brazilian Federal police routinely monitors these chans and deep web rings.
Sadly you can easily get a child prostitute in the poor áreas,especially if you're a gringo with dollars.
They really do? And that isn't just a cover for informants?
 
They really do? And that isn't just a cover for informants?
Just found a big fish they arrested last week

http://noticias.r7.com/minas-gerais...quadrilha-internacional-de-pedofilos-12022016

''Haniel Caetano de Oliveira integrava a quadrilha NFL (NoLimitsFun), responsável por tráfico de pessoas, exploração sexual e produção e distribuição de material de pornografia infantil. Segundo o MPF, um dos vídeos apreendidos mostra um bebê de um ano e meio sendo torturado e estuprado. O advogado do médico não atendeu às ligações do R7. ''

'One of the vídeos in his captured PC showed a 1 year old being raped and tortured'' (:_(:cryblood::cryblood::cryblood::cryblood::cryblood::cryblood::cryblood::cryblood::cryblood::cryblood::cryblood:
This fuck had 37k of pics and 700 vídeos for fucks sake.
He and his gang used Deep web,showing obviously that tor is compromised by police for a long time,thankfully pedos are not very good at pc and they will keep using tor.
 
Just found a big fish they arrested last week

http://noticias.r7.com/minas-gerais...quadrilha-internacional-de-pedofilos-12022016

''Haniel Caetano de Oliveira integrava a quadrilha NFL (NoLimitsFun), responsável por tráfico de pessoas, exploração sexual e produção e distribuição de material de pornografia infantil. Segundo o MPF, um dos vídeos apreendidos mostra um bebê de um ano e meio sendo torturado e estuprado. O advogado do médico não atendeu às ligações do R7. ''

'One of the vídeos in his captured PC showed a 1 year old being raped and tortured'' (:_(:cryblood::cryblood::cryblood::cryblood::cryblood::cryblood::cryblood::cryblood::cryblood::cryblood::cryblood:
This fuck had 37k of pics and 700 vídeos for fucks sake.
He and his gang used Deep web,showing obviously that tor is compromised by police for a long time,thankfully pedos are not very good at pc and they will keep using tor.
Tor is compromised? Again, we only have their word on that, not more.
 
Tor is compromised? Again, we only have their word on that, not more.
I mean its very easy to a agent to pretend its a pedo and join their community,its only a matter of time until a pedo slips and reveals any info that leads to him.
 
And as a cover story for that they claim, that Tor is broken.

That's exactly what they wouldn't claim. There are known vulnerabilities of tor, though they generally take more resources than normal police agencies have.

What's way more often the issue is the software running over the tor network has vulnerabilities that cause it to reveal things like real IP addresses over the net. And even more commonly, the dummies on tor get tricked into revealing more than they realize.

If tor itself has some fatal vulnerability, the last thing they'd do is discourage people from using it.
 
From what I understand, and I am by no means an expert on the subject, Tor is secure for most purposes, but there are exploits, as @AnOminous said, that can be used to unmask your true IP. Of course, if you're an idiot and tell the undercover FBI agent your real name and location, all the anonymity in the world won't help you.
 
From what I understand, and I am by no means an expert on the subject, Tor is secure for most purposes, but there are exploits, as @AnOminous said, that can be used to unmask your true IP. Of course, if you're an idiot and tell the undercover FBI agent your real name and location, all the anonymity in the world won't help you.
There ain't no patch against error PEBCAK.
 
To the best of my understanding, Tor itself is very secure. It's virtually impossible to compromise.
However, Flash and Javascript are incredibly insecure. Likewise, your browser (Tor browser is based on Firefox) and your OS aren't necessarily secure.
During sting operations, agents will generally trick suspects into enabling Javascript/Flash, and then use known exploits to reveal the suspect's true IP address. Or, just do some social engineering. Of course, IP address can only get a warrant. You can't arrest anyone unless you can find that they have stored illegal material. Here's an example of a 'successful' sting operation. Even with complete control of the servers, they only managed to catch a small fraction of the actual users, and persecute an even smaller fraction.

tl;dr - Catching pedophiles is very difficult
 
To the best of my understanding, Tor itself is very secure. It's virtually impossible to compromise.
However, Flash and Javascript are incredibly insecure. Likewise, your browser (Tor browser is based on Firefox) and your OS aren't necessarily secure.
During sting operations, agents will generally trick suspects into enabling Javascript/Flash, and then use known exploits to reveal the suspect's true IP address. Or, just do some social engineering. Of course, IP address can only get a warrant. You can't arrest anyone unless you can find that they have stored illegal material. Here's an example of a 'successful' sting operation. Even with complete control of the servers, they only managed to catch a small fraction of the actual users, and persecute an even smaller fraction.

tl;dr - Catching pedophiles is very difficult
Not true. The numbers may have changed now but around mid-2015 roughly half of Tor's entry and exit nodes were compromised. If a person was unlucky enough to be routed through both a compromised entry and exit node they can easily determine the IP that traffic originated from, without the need for flash or java or html5 canvas fingerprinting.
 
Not true. The numbers may have changed now but around mid-2015 roughly half of Tor's entry and exit nodes were compromised. If a person was unlucky enough to be routed through both a compromised entry and exit node they can easily determine the IP that traffic originated from, without the need for flash or java or html5 canvas fingerprinting.
Even if this were true (I highly doubt that), .onion traffic never touches an exit node.
 
The articles posted rely on the idea that both the entry and exit nodes are compromised. This would allow an attacker to correlate time and volume. That's both dependent on the user accessing a clearnet site (8chan is available as a tor hidden service, iirc), and on the both entry and exit node to be compromised. Furthermore, that's not really evidence of anything. You could download as much data from childpornandterrorplots.net as you want and as long as it's encrypted, the NSA can't do anything about it.
If it were as simple as you are suggesting, all pedophiles and terrorists would have been arrested long ago or moved on from Tor.
 
Last edited:
The articles posted rely on the idea that both the entry and exit nodes are compromised. This would allow an attacker to correlate time and volume. That's both dependent on the user accessing a clearnet site (8chan is available as a tor hidden service, iirc), and on the both entry and exit node to be compromised. Furthermore, that's not really evidence of anything. You could download as much data from childpornandterrorplots.net and as long as it's encrypted, the NSA can't do anything about it.
If it were as simple as you are suggesting, all pedophiles and terrorists would have been arrested long ago or moved on from Tor.
They don't bust every single person that jerks off to CP once in a while. They use pattern analysis to determine repeat offenders or those they consider likely to act on it IRL. The number one priority however is shutting down the distributors and producers. Throwing some random NEET in jail for jacking it to kids isn't going to do anything to stem the flow of illegal pornography. They want the people putting it out.
 
The articles posted rely on the idea that both the entry and exit nodes are compromised. This would allow an attacker to correlate time and volume. That's both dependent on the user accessing a clearnet site (8chan is available as a tor hidden service, iirc), and on the both entry and exit node to be compromised.

To make that more likely you simply DOS or degrade the service of any non-compromised nodes making it much more likely that any given chain contains only nodes controlled by you. This is most useful when someone returns to a site more than once, i.e. you're looking for a particular user, since it's mostly up to chance whether they hit a compromised chain any particular time. But you only need to do it once.

The NSA has immense capabilities in this regard and I would be surprised if any low-latency anonymity network could possibly be safe from that kind of agency.

Throwing some random NEET in jail for jacking it to kids isn't going to do anything to stem the flow of illegal pornography. They want the people putting it out.

They'll bust low-hanging fruit like that if it falls into their lap, though. Fairly often they'll go after dozens of people at once in some kind of sting.
 
Back