• Stop coping, and start posting. Register an account in order to gain full access to Lookism's features.

would you smash this rawdog?

would you smash this random girl rawdog

  • yes rawdog all the way

    Votes: 24 77.4%
  • no i would use condom

    Votes: 3 9.7%
  • i wouldn't fuck her at all

    Votes: 4 12.9%

  • Total voters
    31

tinderhater

Newbie
Joined
Jan 27, 2016
Messages
49
Reputation
0








 

lookz

Machine
Joined
Jul 18, 2015
Messages
5,078
Reputation
5
What a stupid fucking Q

OP do you get off on this shit?


Are you a CUCK?
 

lookz

Machine
Joined
Jul 18, 2015
Messages
5,078
Reputation
5
mrz said:
MewingTillIDie said:
is this legit boyo? interested..

FBI has about a 1% success rate when they target Tor users with technical operations. As long as you don't leak personally identifying information or fuck up in some other way like this, you are pretty much good to go if you use Tor. If you aren't doing anything particularly illegal but are just saying controversial things, you are probably good to go with just Tor Browser Bundle. If you want an extra layer of security, you should get Tails .iso and run it in a virtual machine, then you can actually download things securely so long as you keep them in the virtual machine. Taking a snapshot of the virtual machine and loading from it makes sense since then you keep persistent entry guards between sessions. You should also slide the security slider in the browser to high, or as high as you can while still maintaining the functionality you need (taking into consideration that higher is always more secure, and maybe you just should do without some functionality). Another even superior option is to get Whonix and set that up.    

If you are actually planning to do things of questionable legality then it pretty much comes down to:

1. If you are really worried about leaving forensic trace evidence of what you did on your drive, you should get tails and install it to a USB or burn it to a DVD, but keep in mind every time you boot into it your entry guards rotate, so try not to use it for anything illegal more than once every few months, you can configure persistent encryption and keep anything you download and access it offline.

2. If you protect from disk forensics yourself in some other fashion, and you want better isolation, or if you are not as concerned about disk forensics, look into using Whonix.

Pretty much there are a bunch of different threat models and things you can do to address them, and it gets pretty complex especially when you start getting into custom configurations, but more or less even using the most basic tier of security (Tor Browser Bundle by itself) is already making you a hard target.

Just keep in mind you cannot let any links to your IRL identity manifest, like use a new throw away E-mail address you register behind Tor to register on any forums, and don't use a pseudonym you ever used on clearnet make up a new one you only use with Tor, etc.    

Coming to this forum on Tor is a pain in the ass because they use cloudflare, you can either rotate circuits (from the onion icon) / try to answer the captcha (impossible with security slider set to high) to get around the captcha blocking screen, or you can use the Tor Browser to connect to some php web based proxy, and then surf this forum through that php web proxy, but using Tor to connect to that proxy.

Come on man not this again...

[font=Arial, Helvetica, sans-serif]Children with Autism Spectrum Disorders often develop intense, very narrow fields of interest, such as learning obsessively about computers, TV programs, movie schedules, lining objects in straight rows, lighthouses or collecting sticks. Preoccupations can also be sensory in nature, such as the feel of water or a certain fabric.[/font]
 
Joined
Jan 25, 2016
Messages
414
Reputation
0
mrz said:
MewingTillIDie said:
is this legit boyo? interested..

FBI has about a 1% success rate when they target Tor users with technical operations. As long as you don't leak personally identifying information or fuck up in some other way like this, you are pretty much good to go if you use Tor. If you aren't doing anything particularly illegal but are just saying controversial things, you are probably good to go with just Tor Browser Bundle. If you want an extra layer of security, you should get Tails .iso and run it in a virtual machine, then you can actually download things securely so long as you keep them in the virtual machine. Taking a snapshot of the virtual machine and loading from it makes sense since then you keep persistent entry guards between sessions. You should also slide the security slider in the browser to high, or as high as you can while still maintaining the functionality you need (taking into consideration that higher is always more secure, and maybe you just should do without some functionality). Another even superior option is to get Whonix and set that up.    

If you are actually planning to do things of questionable legality then it pretty much comes down to:

1. If you are really worried about leaving forensic trace evidence of what you did on your drive, you should get tails and install it to a USB or burn it to a DVD, but keep in mind every time you boot into it your entry guards rotate, so try not to use it for anything illegal more than once every few months, you can configure persistent encryption and keep anything you download and access it offline.

2. If you protect from disk forensics yourself in some other fashion, and you want better isolation, or if you are not as concerned about disk forensics, look into using Whonix.

Pretty much there are a bunch of different threat models and things you can do to address them, and it gets pretty complex especially when you start getting into custom configurations, but more or less even using the most basic tier of security (Tor Browser Bundle by itself) is already making you a hard target.

Just keep in mind you cannot let any links to your IRL identity manifest, like use a new throw away E-mail address you register behind Tor to register on any forums, and don't use a pseudonym you ever used on clearnet make up a new one you only use with Tor, etc.    

Coming to this forum on Tor is a pain in the ass because they use cloudflare, you can either rotate circuits (from the onion icon) / try to answer the captcha (impossible with security slider set to high) to get around the captcha blocking screen, or you can use the Tor Browser to connect to some php web based proxy, and then surf this forum through that php web proxy, but using Tor to connect to that proxy.

Damn boyo, legit

You're not a developer of this stuff tho, are you?
 
Joined
Jan 25, 2016
Messages
414
Reputation
0
mrz said:
Come on man not this again...

[font=Arial, Helvetica, sans-serif]Children with Autism Spectrum Disorders often develop intense, very narrow fields of interest, such as learning obsessively about computers, TV programs, movie schedules, lining objects in straight rows, lighthouses or collecting sticks. Preoccupations can also be sensory in nature, such as the feel of water or a certain fabric.[/font]

Motherfucker he asked me a question.

Damn boyo, legit

You're not a developer of this stuff tho, are you?

No.

rapped.
 

Ryu

Super Moderator
Staff member
Super Moderator
Joined
Aug 6, 2015
Messages
8,134
Reputation
2,472
No.Because I know who this is.
 
Top