Skip to main content

Fake identities and Tor-network

  

.

Fake identities and Tor-network

Tracking the person by using the computer's IP-address that the person uses is the common way to uncover the hidden identity of the user of social media. Even if the person uses the social media account from public libraries or some other places there is a possibility that surveillance cameras are targeted to the working point and then the officials can make the image compilation that allows to track the persons who are using the social media in a certain time.

Hiding identity in the network is quite easy. One of the most common ways to make this thing is just to use invented identity. In that case, the thing is not the stolen identity. The user must only create a social media account by using the fake identity, and that thing can hide the identity from the normal users, and the thing that can break this thing is that somebody knows the person, who is in the image of the user profile.

The image can load from the network, but maybe somebody knows who the person in the image is. And then make the report of that thing. And maybe artificial intelligence is compiling the face images from multiple social networks and user accounts. And the purpose is to find if there are many accounts made by different users where is used the same face image. The system can also find if similar messages are coming from different social media accounts. And in this process, the system tracks the beginning of the message line.

The system is trying to find so-called prime messages. If nobody publishes a similar message before, that means that the owner of the account is invented the text. But if similar texts are published by using multiple social media accounts, and always the text is copy-pasted from the E-mails or some text editors, that tells that publisher might be the same person. So identical messages at the beginning of the multiple series of the shares tell that the message is written by the person who uses the different accounts or it is shared with multiple persons by E-mail or some kind of similar program.

But the Tor network allows full anonymity or does it?

Even if the Tor-network is fully safe, there is the possibility that somebody makes a trap by suggesting the meeting. Before we are starting to use Tor-network and troll thing in there, we must ask one question. Why Tor-network is possible to reach? Why this network is not closed by the state?

And at meeting point is waiting for the nasty surprise with baseball-bat or silenced automatic pistol. Many people are believing that Tor-network is somehow safe. Maybe it's safe for tracking the IP-addresses. But there is always the possibility that the network is a so-called "honey pot" which is operated by the NSA or GCHQ. In that case, the user is routed to the "honey pot" or trap server, which might seem anonymous. But it is operated by military intelligence.

But if some people want to buy drugs, there is always a place, where drugs are delivered. So police or some robberies can lure the drug dealer into the trap. The same way people who are using Tor-network for sending illegal messages can suggest the meeting for each other, and at that meeting point are waiting for police or competitor gang.

http://curiosityanddarkmatter.home.blog/2021/01/14/fake-identities-and-thor-network/

Comments

Popular posts from this blog

Could this be the thing, that some people don't want you to know about zombies?

Could this be the thing, that some people don't want you to know about zombies? The simplest way to control zombies, which are made by using tetrodotoxin, which is called "zombie poison" is to use the automatic dispenser, which is normally used in diabetes treatment. In this case, the dispenser would be loaded by using tetrodotoxin. If the level of this poison is right, the person would be totally under the control of other people. And if the system cannot detect this poison there is a possibility to make the laboratory experiment when the staff will follow the decrease of the tetrodotoxin, and then the system can use a simple clock, which will inject poison to the body of a victim after a certain time. This would be an effective tool in the hands of military and counter-terror operators. Those zombies can be captured enemy operators, who will send back, and then they just kill their ex-partners. By using genetically engineered bacteria could be possible to create t...

Terrifying visions of genetic engineering.

 Terrifying visions of genetic engineering.  The modern Hounds of Baskerville ABW:s (Advanced biological weapons are the modern Hounds of Baskerville. The term ABV means the animal which is genetically engineered. And which is controlled by using some interactive electronic systems. There is a possibility to connect the action camera to dogs collars. And transmit commands to that animal by using electronic systems. Spoken words can use to the commands.  Or they can be a series of sounds that are stored in the sound files. When the operator activates a certain file that sound means a certain command to the animals. There is the possibility to automatize some commands by connecting the system to the image recognition tool. When the action camera sees something that is stored in the memory of the computer. That system sends the coded order to the animal.  Nanotechnology and genetic engineering are the most lethal combination in the world. The ABW:s (Advanced Biological ...

The story of (Northrop?) TR3A "Black Manta"

    Image I The story of (Northrop?) TR3A "Black Manta" Sometimes there have been discussions that the mysterious TR3A "Black Manta" was a study project for the B-2 bomber.  That means that TR3A was used as the flying mockup for testing the aerodynamic and control solutions for the B-2 "Spirit" bomber. The thing that supports this thing is that the manufacturer of both planes is Northrop corporation.  Along with "Aurora" was flying one other mysterious aircraft, TR3A "Black Manta". The system is described as the "Stealth VTOL" (Vertical Take-Off and Landing) aircraft. Unless the mysterious TR3B, the Northrop TR3A is the conventional VTOL-aircraft, what is using regular jet engines, but what has the stealth-body.  Image II The thing is that the stealth-reconnaissance aircraft, which uses a similar technology with the Northrop B-2 bomber would be an interesting part of the weapon arsenal. There is a possibility that the TR3A was...