Skip to main content

Fake identities and Tor-network

  

.

Fake identities and Tor-network

Tracking the person by using the computer's IP-address that the person uses is the common way to uncover the hidden identity of the user of social media. Even if the person uses the social media account from public libraries or some other places there is a possibility that surveillance cameras are targeted to the working point and then the officials can make the image compilation that allows to track the persons who are using the social media in a certain time.

Hiding identity in the network is quite easy. One of the most common ways to make this thing is just to use invented identity. In that case, the thing is not the stolen identity. The user must only create a social media account by using the fake identity, and that thing can hide the identity from the normal users, and the thing that can break this thing is that somebody knows the person, who is in the image of the user profile.

The image can load from the network, but maybe somebody knows who the person in the image is. And then make the report of that thing. And maybe artificial intelligence is compiling the face images from multiple social networks and user accounts. And the purpose is to find if there are many accounts made by different users where is used the same face image. The system can also find if similar messages are coming from different social media accounts. And in this process, the system tracks the beginning of the message line.

The system is trying to find so-called prime messages. If nobody publishes a similar message before, that means that the owner of the account is invented the text. But if similar texts are published by using multiple social media accounts, and always the text is copy-pasted from the E-mails or some text editors, that tells that publisher might be the same person. So identical messages at the beginning of the multiple series of the shares tell that the message is written by the person who uses the different accounts or it is shared with multiple persons by E-mail or some kind of similar program.

But the Tor network allows full anonymity or does it?

Even if the Tor-network is fully safe, there is the possibility that somebody makes a trap by suggesting the meeting. Before we are starting to use Tor-network and troll thing in there, we must ask one question. Why Tor-network is possible to reach? Why this network is not closed by the state?

And at meeting point is waiting for the nasty surprise with baseball-bat or silenced automatic pistol. Many people are believing that Tor-network is somehow safe. Maybe it's safe for tracking the IP-addresses. But there is always the possibility that the network is a so-called "honey pot" which is operated by the NSA or GCHQ. In that case, the user is routed to the "honey pot" or trap server, which might seem anonymous. But it is operated by military intelligence.

But if some people want to buy drugs, there is always a place, where drugs are delivered. So police or some robberies can lure the drug dealer into the trap. The same way people who are using Tor-network for sending illegal messages can suggest the meeting for each other, and at that meeting point are waiting for police or competitor gang.

http://curiosityanddarkmatter.home.blog/2021/01/14/fake-identities-and-thor-network/

Comments

Popular posts from this blog

When robots are laughing and crying.

When robots are laughing and crying.  Does the AI have feelings?  Does the AI have feelings? Or can it be emphatic? The fact is this program code that controls the AI determines if it can give empathic reactions. The problem with the human nervous system is that we don't make a difference in the writing of empathic letters or telling empathic stories human or AI. Our nervous system is not adapted to AI yet. And that's why we cannot separate text written by AI from text that made by humans.  What does somebody make with AI that can emulate feelings? The fact is that the cyborgs are useful tools for infiltration operations. The human-size robots can have WLAN/6G connections with the central computers. Or they can form a neural network that shares information between all group members. The robots can also act as walking neural network-based supercomputers. That can make complicated solutions.  In those networks, each member shares information and their data-handling capacity all o

Earth 2.0 has been caused discussion about the possibility to find another civilization

    Earth 2.0 has been caused discussion about the possibility to find another civilization The Earth 2.0 or officially Kepler-452b is locating extreme log distance from Earth(1).    A new Earth-type planet has been found near the star, which is similar to our own Sun. The journey to that planet would take 1400 years, even if the spacecraft will reach the speed of the light. The planet has been found in the year 2008, but the confirmation of the existence of that planet has been taken time, but in 2015 the confirmation has been got, and Earth 2.0 has turned true.  The mass of that planet is 1,9 times Earth and the temperature is excellent if we are thinking about liquid water, but the journey to that planet will take so long, that we cannot ever go in there by using regular rockets and technology. The thing is that this kind of planets are the most interesting if we are looking for the lifeforms, which are similar to us, and the problem with that kind of things is that the communicatio

Tunguska meteorite and the natural nuclear fission

  Image I Tunguska meteorite and the natural nuclear fission 1) Tunguska UFO-theory  Tunguska meteorite is the mystery, that has been solved once, but then the case has been open again because Lake Cheko was not suitable for an impact crater. That lake has been introducing as an impact crater of the Tunguska meteorite. But the problem is that the shape of that lake is like a swimming pool. And that means it cannot form by a meteorite. So the mystery remains.  Meteorites can launch the natural nuclear fission if they hit the uranium ore, and transfer the impact energy to that ore. And is the thing that the famous "Tunguska" meteorite caused that kind of effect? There is also a theory that some "UFO" explode in that area, but the thing is that it is only theory, but interesting topics for some TV-series.  So I will begin this text by handling that theory, which is one of the incredible and outstanding theories in the world. Officially there is no physical evidence of