Why are opsec people so retarded

DerKryptid

I killed byuu lol
kiwifarms.net
Joined
Aug 8, 2021
It's always the biggest retards shilling tor and running all those gimmicky security software? These are people who need handholding to realize when they've fucked their systems up in the first place
 
Solution
I'll be honest, I have no fucking clue what demographic you're referring to in this question. Do you mean zoomers that learn about tor and "muh deep web" and think they're hot shit for using tor to go to google?

What a lot of these fags don't realise about tor is that a lot of websites simply block it, or try to make its usage inconvenient. As the list of exit nodes is public, any website owner can easily do it. They might get their 1337 h4x0rz "anonymous browsing", but then realize it's simply unsuitable for everyday usage, and often really fucking slow. ISPs could very easily block all TOR traffic as well; in fact, this has already happened in Venezuela for example - https://www.accessnow.org/venezuela-blocks-tor/...
I'll be honest, I have no fucking clue what demographic you're referring to in this question. Do you mean zoomers that learn about tor and "muh deep web" and think they're hot shit for using tor to go to google?

What a lot of these fags don't realise about tor is that a lot of websites simply block it, or try to make its usage inconvenient. As the list of exit nodes is public, any website owner can easily do it. They might get their 1337 h4x0rz "anonymous browsing", but then realize it's simply unsuitable for everyday usage, and often really fucking slow. ISPs could very easily block all TOR traffic as well; in fact, this has already happened in Venezuela for example - https://www.accessnow.org/venezuela-blocks-tor/ (archive). There are many ways of identifying TOR users for those spergy enough to want to find you anyway; browser fingerprinting, stylometry, or even people sharing their personal data while on TOR.

I am also reminded of the recent rise of VPN popularity and misinformation in recent years, it's esencially snake oil for zoomers using the same bullshit claims about "muh anonymity and military encryption". All it's good for is hiding your IP from some skiddie 'booting you offline' cause you killed him in cod, or streaming netflix content from the US. If you do something sketchy behind a VPN, the company will have no problem handing all your personal information over to authorities if they ask for it.

What answer were you looking for when you wrote this question?
 
If you're referring to the bitchfights between hardened-os makers like Graphene and Copperhead, then I'd wager the guess that they're a few too many chromosomes between them.
Can't really expect anything else from people encrypting their holiday pictures with twofish on an airgapped pc and bragging about how you're an idiot If you don't do that
 
  • Like
Reactions: mister meaner
Those who talk about opsec the most are demonstrating that they don’t truly understand it. It’s like somebody admitting to being good at lying or manipulating people.

Depends on the company. If they don't log traffic they can't hand over a thing.
I wouldn’t trust any paid VPN to not log anything despite what they might claim.
 
I'll be honest, I have no fucking clue what demographic you're referring to in this question. Do you mean zoomers that learn about tor and "muh deep web" and think they're hot shit for using tor to go to google?

What a lot of these fags don't realise about tor is that a lot of websites simply block it, or try to make its usage inconvenient. As the list of exit nodes is public, any website owner can easily do it. They might get their 1337 h4x0rz "anonymous browsing", but then realize it's simply unsuitable for everyday usage, and often really fucking slow. ISPs could very easily block all TOR traffic as well; in fact, this has already happened in Venezuela for example - https://www.accessnow.org/venezuela-blocks-tor/ (archive). There are many ways of identifying TOR users for those spergy enough to want to find you anyway; browser fingerprinting, stylometry, or even people sharing their personal data while on TOR.

I am also reminded of the recent rise of VPN popularity and misinformation in recent years, it's esencially snake oil for zoomers using the same bullshit claims about "muh anonymity and military encryption". All it's good for is hiding your IP from some skiddie 'booting you offline' cause you killed him in cod, or streaming netflix content from the US. If you do something sketchy behind a VPN, the company will have no problem handing all your personal information over to authorities if they ask for it.

What answer were you looking for when you wrote this question?
I've seen boomers bubba up their PC's in the name of opsec and the almighty cult of encyption on countless occassions. It's not just funne tiktok zoomers doing it.

But you hit the nail on the head quite hard
 
Solution
Back