No.24719
How does /hebe/ go about staying anonymous and how often do you worry about being caught or having feds kicking in your door?
I've usually been happy looking at safe pictures but recently I've been craving a bit more and I've been looking into tor. I downloaded the little bundle but I'm extremely nervous and scared of even starting it. I don't know if my safety can be guaranteed and I'm not sure if I wanna do this.
So I come to you guys, have you taken the plunge and if you have, do you ever worry about being caught? Or are you completely confident in your l337 computer knowledge and know you're rock solid? If so, can you help out a tech illiterate dummy or point me towards guides or information so I can also be sure I'm secure. I know I can google this, but I'll trust you all more since we're all in the same boat and the information will be more relevant.
Maybe it's just because I'm a little under the influence but even thinking about using tor makes me feel very uneasy and paranoid.
No.24720
Just stop, it's never satisfying and it's never worth the stress.
and this aint hebe.
No.24721
I don't do anything in particular
Been coasting the past 15-18 years depending on how young you take it I started collecting
I just rely on karma/good will I guess. I mean I don't do anything out of the ordinary but I don't do a tenth of the precautions the guys all over 8chan say you should
I have a shit life anyway so if something happens - it happens. If not, better for me
No.24724
I doubt that it's only pedos who tried to to download CP. Human nature and curiosity… I bet the pedophiles are those who stayed most away from it because of sexuality and a fear of being exposed. Others think that they just want to take a look.
No.24729
>>24719
The secret is to live in a third world shithole where there are laws against child pornography, but neither the manpower nor the infrastructure to have a cybercrime division, hopefully also plagued with petty crime and enough corruption that the pigs will never waste resources on you
No.24749
Simple: Don't look at, search for or download CP. Maybe it's easier since i'm not a pedo, but i'm fine talking to you guys all day and offering you advice without risking throwing my life away. Thank god for the first amendment.
No.24754
If it's safety you're after, then you picked the wrong sexuality. If you don't like the consequences of breaking the law, then don't break the law.
I'm also not going to help you do that. It would be irresponsible for me to give you enough confidence to do something dumb, and it would be dumb of you to trust me with something that might well end up ruining your life.
No.24760
>>24719
>How does /hebe/ go about staying anonymous and
I don't know. Perhaps you should ask /hebe/.
>how often do you worry about being caught or having feds kicking in your door?
Being caught doing what? Having feds kicking in my door for what? I don't do anything illegal.
>I know I can google this, but I'll trust you all more since we're all in the same boat and the information will be more relevant.
There are law enforcement agents on /younglove/, and they do shill in tech threads. I don't know if the one about Windows is still in the catalog, but that one had a lot of shilling and bad advice from people who acted like they hadn't read the Snowden documents.
Of course, they probably weren't allowed to, since they're government employees :)
>Maybe it's just because I'm a little under the influence but even thinking about using tor makes me feel very uneasy and paranoid.
It is not a crime to use Tor.
If you're feeling uneasy about using Tor to commit a crime, perhaps you shouldn't.
No.24774
Most of what's considered CP are really incest, very often between father and daughter. If you are a regular pedophile I can't see that there is much to enjoy, except if you have fetishes and like very obsucre things, bad filming, ugly men and their ugly penis…
It's not pedophile sex. It's for people with an "ugly fetish". Much of it is even so old that it's filmed in black and white. I can't believe that the law bother with it, it's just crap. It doesn't give you a hard-on, you look at it like in the same way as you stare at a car accident when you drive by.
No.24786
>>24774
I don't think you know this board's audience too well. Sure, there's a few who think that incest is icky, but most here at least want a daughter.
The point about it being old and disgusting can be made for any kind of porn, it just matters on what you see, I mean is this girl "just crap" quality?
No.24787
>>24786
*Also reasonably certain that her father is the photographer.
No.24795
>>24786
No, I think she's nice. But I think CP was disappointing when I a few years ago looked through a bunch of torrents. I never look at it, I prefer models. It's more stimulating to me than a father and daughter hiding in a dark cellar with masks and.. whatever. It's not for me. I'm just a pedo, I like litle girls.
No.24933
>>24795
>>24774
Yeah most CP is unfappable and pretty disgusting. You very rarely get people who can actually make good videos with attractive girls like Mastadon and SM. Most of it is fathers abusing their 5/10 daughters.
No.24977
>>24795
>>24933
That's why you go for the webcam/phone vids. CP created by the girls themselves
No.24978
>>24977
webcam vids are usually shit. either no sound/shitty sound and sketchy quality where the video looks like there is a time lapse between every second
Phone vids are usually vertical which pisses me off to no end and looks annoying because they are usually too close up
Nah i'll stick to my Daddy filming daughter while she sleeps by pulling down her panties and spreading her as she sleepily coughs and farts while he finishes the video by squirting yogurt in her face
those are better (plus i'm not into solo videos too much)
No.24984
>>24978
ill stick to legal media
No.24988
yeah OP just stick to legal nn or legal nude stuff (I recommend Hajime Sawataris book "Alice", its awesome) the stress and actual threat from using real stuff if you dont know what you're doing just isnt worth it.
No.25221
>>24719
>> How does /hebe/ go about staying anonymous and how often do you worry about being caught or having feds kicking in your door?
VPNs, full harddisk encryption, TOR / freenet / i2p, using your head.
>> So I come to you guys, have you taken the plunge and if you have, do you ever worry about being caught? Or are you completely confident in your l337 computer knowledge and know you're rock solid?
Yeah, I'm good.
Three ways I can be caught, DMA-attack on a running computer, physical keylogger, weaponized trojan / rootkit.
All of which requiers me to be defined as a target, in which case, the coppers have way too much free time.
>> If so, can you help out a tech illiterate dummy or point me towards guides or information so I can also be sure I'm secure. I know I can google this, but I'll trust you all more since we're all in the same boat and the information will be more relevant.
/baphomet/ has some info, you should start there and define your threat model.
Depends on how paranoid you want to be, but a decent VPN is good (non-us one, cryptostørm / trilightzone have servers in the right places), next veracrypt is good for strengthening truecrypt, and if you want to go full retard you chain VPNs in a virtual machine, but then we are talking producer-level security, non-windows setups, and deadman-switches like USBKill, and that's going abit over the top.
I'd say take it easy, the coppers are never going to have capacity to even bother catching everybody, just don't be obvious about it.
And stay away from sharing things on the open net.
No.25251
>>25221
Any tips on freenet? Just jump right in or is freenet not safe unless you do something first?
No.25270
>>25251
Given that the authorities have tens of thousand of people who they know share stuff on the clearnet… I don't think they have the capacity to crack freenet, even if they wanted to.
And besides, what can they do?
All of the CP is already on that net, it's stored on everybody's harddisks, fully encrypted.
I'd say just go for it, although, be aware that it is pretty slow.
You'll need weeks to get things down.
That said, linkageddon -> hidden wiki -> hard candy -> congratulations, you found candy mountain.
https://www.youtube.com/watch?v=DuwY8U1AY7k
No.25271
>>25270
Also, of course, VPN also masks your freenet-traffick, so that's good too.
No.25273
>>25270
they don't have to crack freenet, they already have more than enough tards using it with compromised browsers (like firefox) that think incognito mode is actually protecting them
but yea, freenet could be cracked, if they're watching a specific key that you happen to be accessing.
No.25279
>>25273
Maybe.
It's all just politics anyway, in Britain alone the coppers have identified 50k consumers - there simply isn't the will to pay for all of them to be jailed.
And for what purpose?
Putting consumers together in jail so that they can educate themselves on IT OP-sec?
Destroying their lives, breaking up their families, ending their careers?
Yeah, that's probably going to help them stay out of trouble in the future.
It's all bullshit anyway, recently they caught a guy with a million files, and seriously, compared to somebody with a dozen files who gets three months or thereabouts in jail?
That's scientology-level thinking / Dr. Evil right there, "let's put him away for… one trillion billion lifetimes!".
No.25280
>>25273
Oh and BTW, there's layers of plausible deniability in freenet, where 1) you don't have control over what ends up on your HD, 2) nor of what others download through you, and 3) it's all encrypted anyway.
No.25284
>>25280
somehow the thought of willingly turning your pc into a botnet relay for cp isn't a very comforting one
No.25286
>>25284
Well, "pomfer's gonna pomf" and all that jazz.
Besides, what's the alternative?
As the freenet-developers themselves say:
https://freenetproject.org/faq.html#childporn
—
What about child porn, offensive content or terrorism?
While most people wish that child pornography and terrorism did not exist, humanity should not be deprived of their freedom to communicate just because of how a very small number of people might use that freedom.
I don't want my node to be used to harbor child porn, offensive content or terrorism. What can I do?
The true test of someone who claims to believe in Freedom of Speech is whether they tolerate speech which they disagree with, or even find disgusting. If this is not acceptable to you, you should not run a Freenet node. Also, content in Freenet is available only as long as it is popular, so it will go away if people lose interest. However, it should persist for some time, and if enough people are interested, it will persist forever. Note that other people's file are encrypted and split into pieces. They are not stored on your machine in their entirety. Your instance of Freenet will likely have a very small number of encrypted pieces from a given file. A file can only be assembled when all its pieces are combined with the decryption key.
—
No.25287
>>25286
Child porn and terrorism. In the same breath… What's next, the danger of gay sex and animal rights?
No.25288
>>25287
Actually, there's probably quite a bit of gay sex content on both freenet and TOR.
Especially considering that they are both used for worldwide social activism, particularly in oppressive African and muslim countries.
Then again, yes on such networks there will be a substantial amount of content that is offensive to some sour puss out there who thinks that thoughtcrime should be prosecuted for moralistic reasons alone.
Not very constructive, that, and the sad irony of it all is that CP has a substitutionary effect, which basically means that to be against CP, is to be for the sexual abuse of children.
No.25292
>>25288
I hate men, boys, i think they're disgusting but I have nothing against gay sex. Why should I? I don't paritcipate in it. it's none of my business.
The same with pedo. if it's under safe conditions and kid and grown up want, i don't think it's anyones buisness.
And it isn't. They will keep it to themselves. A wonderful secret… But if you try to be smart and trick or force it, that's something else.
No.25354
>>25270
> compromised browsers (like firefox)
Can someone explain?
No.25355
>>25354
many browsers like chrome automatically record and send back all the addresses you visit to google, which totally invalidates the point of having a VPN. many browsers like firefox work directly with microsoft and the fbi to compromise people looking for cp.
No.25356
>>25355
What browser should I use?
No.25358
I don't know, I don't use freent or look at cp.
I would presume you would use a browser specifically designed to be used with freenet.
No.25360
>>25356
A non-nigger one who doesn't leak your unique info all over the place.
https://panopticlick.eff.org/
No.25363
>>25360
Even Tor only has a 1 in 30k uniqueness, and 15 bits of identification, is that supposed to be good?
Chrome results in your shit being completely unique, with over 23 bits of identification, Google drones are fucking fucked
No.25370
>>25363
I'm getting ~9 bits and unique fingerprint in 773 browsers, which of course means my fingerprint is very much non-unique.
The less uniqueness, the better.
In fact, this means that those 773 browsers are TOR-exit node identifiable connections only, having the same OS as I.
In other words, good luck hunting me down G-men.
Rice your TOR abit and you'll get the same uniqueness, start by setting security to strong and then hunt down /baph/ or /tech/ guides.
Good luck and stay safe!
No.25371
>>25355
So Aviator, SeaMonkey, or Chromodo… what do you think about those?
No.25396
>>25385
You'll cowards don't even look at cp on chrome!
No.25399
>>25385
Irony. Didn't know that guy had it in him.
No.25401
No.25404
>>25401
> Admittedly, after introducing the security scanner, traffic patterns changed. Scans on the server dropped and some of the users who opted to run the software
> security scanner
> run the software
> software
That's where using your head comes in.
Not all do.
But thanks for the link, it's a nice reminder that only the dumbest users get caught. :)
No.25405
>>25404
So basically they ran an exe?
No.25406
>>25405
Most likely javascript.
Reminder: Disable javascript in TOR. :)
No.25460
>>25458
Think I'll stick to 8chan. It's still alive for me. I wonder why… ;)
No.25488
>>25406
It's kind of annoying that TOR's javascript is not default off.
No.25493
What's the best way to wipe your PC of deleted files?
No.25516
>>25493
Whichever, you only need a single pass anyway.
CCleaner is okay I guess.
No.25686
I'm pretty comfy in tor atm. I'm trying to find a specific literary peice(a specific kind of person's guide to love etc) that I think you guys would know how to find. Know where to look?
No.25689
>>25686
The Paedophile's Handbook? I wouldnt recommend it the guy who wrote it is a tool.
No.25694
>>25689
He is a tool. Does anybody use the tool? Is it a pedophile-ring from an unknown planet that threatens to take over earth?
No.29231
Those who feared "abnormality" made laws to make them feel safe.
No.29239
>>25292
Except parents have a right to know what their child is up to. Sex has risks and a parent has a right to decide for their child. If a parent didn't know then their child could get and STD/STI and never get treated because people like you tell/threaten a child to keep a secret. Sex is related to health and parents have a right to know. The parents are involved in their child regarding all other health related aspects why not sex?
No.29240
>>29231
So are you saying that abnormalities aren't safe?
No.29304
>>What's the best way to wipe your PC of deleted files?
#Step 1 - ATA-3 secure erase commands. All hard disk drives from 1997 - 2015.
Tools: hdparm, parted magic, gparted
http://man7.org/linux/man-pages/man8/hdparm.8.html
http://partedmagic.com/secure-erase/
#Step 2 - full disk encryption.
#Step 3 - sell it … ( not online over your ISP, ebay account etc. )
100% protection.
No.29305
>>What browser should I use?
- Open Source
- Portable in STEALTH mode. ( Everything, including temporary files and cache, is stored in a sub-folder or RAM without touching the system. )
- Socks5 proxy support. ( Tor )
- no admin rights.
- chroot jail / sandbox your browser.
- 100% blocking internet access ( firewall ). Your browser communicate forever and ONLY with Tor.
Of course - all NSA software starts with the letter T:
Tor / Tails / TrueCrypt
Tailored Access Operations
TAWDRYYARD
TRAFFICTHIEF
Terrorist Surveillance Program
Trailblazer
Tempora
Turbulence (NSA)
Turmol
Trusted Platform Module
TRINITY Hardware
You have no FUCKING IDEA how strong the NSA really is … if you login to a childporn site they don't activate 1 or 2 or 3 network attacks - no dude - it's 100! network attacks - all at once … CLUSTER BOMBS
No.29306
>> If so, can you help out a tech illiterate …
You see many strategies exit. Here is another one - we name it the "NSA Standards":
NSA 1 - you start to separate absolutely ALL. Hardware / Software / Files - as deep as you can. I trust the us-american company HP aka Hewlett-Packard.
HP laptop 1 = only a Online machine.
HP laptop 2 = only Offline aka a real Air Gap.
https://en.wikipedia.org/wiki/Air_gap_%28networking%29
I move all files from the Online machine to the Offline machine and they never see HP1 again. The Offline HP is also my childporn media player.
HP 2 = Windows 7 SP1 ( Offline )
HP 1 = NSA Linux ( Online )
You never transport files from HP1 to HP2 over hardware with a firmware controller. Use a DVD-RAM or DVD-RW
https://en.wikipedia.org/wiki/DVD-RAM
https://en.wikipedia.org/wiki/DVD-RW
— you never play multiplayer games with HP1 ( from now on you play games only with a Xbox One, PS4, Nintendo WiiU )
— Email, Social Media, Online Accounts, Wlan are now taboo.
Games: Xbox One or PS4
Childporn: Offline Hewlett-Packard laptop. Air Gap
Downloads: Online Hewlett-Packard laptop.
Instant Messaging: Google Android or Apple iOS.
YOU END your all-in-one-solution. Decentralize everything!
Trust me 2 laptops beat every VM. No - psychic abilities like telekinesis really don't exist. ^^
No.29313
or you could just skip all that and not be involved with cp because it's not and never will be worth it, even if you never get found out.
No.29316
>>25270
All the sites listed in Hard Candy have been taken down. Are there any sites still up and running?
No.29317
>>29313
Seriously. Don't mess around with anything that isn't available on clearnet as you'll have plausible deniability that you thought it was a legal site.
No.29321
>>29316
You deserve all the bad shit that could possibly happen to you. I bet you are the idiot wanting to write a paper about cp.
No.29332
>>29316
You were on the censored version of the hidden wiki.
No.29334
>>29332
No, I was not. The censored version just says something like, "fuck off and die." The version I was on had links, they were just all dead. Do you know of a version of hidden wiki that is more current?
No.29335
>>29334
>>29334
Why don't you fuck off and look up your child porn somewhere else?
No.29362
>>29334
There's an english male-centered discussion forum listed that's still up; at least on the ew3 wiki. I'm not gonna give you the direct link, because reasons.
>>29335
You shouldn't keep visiting a board that makes you this angry, it's bad for your blood pressure.
No.29364
>>29362
Viewing cp is bad for your health. And molesting children is bad for their health.
No.29365
>>29334
Idiots like you need to die.
No.29407
NSA 2
https://en.wikipedia.org/wiki/Access_control
https://en.wikipedia.org/wiki/Multi-factor_authentication
- no second online as root. Maximum restricted user account.
- 2 firewalls ( internal and external hardware ).
- Ultra Hardening
- Spoof all hardware, IDs, license.
- xtreme access matrix limitations ( read, write, execute, own, modify, drag and drop, copy and paste, share ).
- VPN ( combine Tor + VPN )
- 2 different anti-virus engines.
- double full disk encryption.
Many pedophiles use also:
https://www.yubico.com/products/yubikey-hardware/yubikey4/
https://tails.boum.org/
https://en.wikipedia.org/wiki/GNU_Privacy_Guard
https://en.wikipedia.org/wiki/Virtual_machine
https://www.virtualbox.org/
https://en.wikipedia.org/wiki/OpenWrt
https://opnsense.org/
https://www.ipredator.se/
https://www.perfect-privacy.com/
Arch Linux, Windows 7, Ubuntu, Mac OS X, Fedora, OpenBSD, HardenedBSD
https://hardenedbsd.org/
http://asciimoo.github.io/searx/
https://github.com/asciimoo/searx/wiki/Searx-instances
Mplayer and VLC
http://sourceforge.net/projects/jpegview/ ( the worlds best childporn image viewer )
Mac OS X image viewer: http://xee.c3.cx/
https://www.snort.org/
No.29408
>> but even thinking about using tor makes me feel very uneasy and paranoid.
3 successfull attacks exist.
Traffic Correlation Attacks
BGP Routing Attacks
Stegosploit
http://stegosploit.info/
stegosploit = malicious code inside images.
Protection against stegosploit advanced with Time-Shifted Exploit Delivery:
ZERO
Done! Game Over for 500 000 Tor pedophiles 2016. All us-americans should stop immediately their childporn addiction.
No.29471
>>29364
This should be good. Explain to me how looking at a picture of someone will hurt me.
>inb4 getting tackled
that's the cops, not the picture
>>29407
Leave it to /younglove/ to make software that respects your anonymity sound filthy
>>29408
Now I have this image in my head of some chucklefuck in a police department being ordered to luck up a gig of cp, put malicious code inside, and reupload ALL OF IT.
No.29495
>>29471
>>29471
That's right no sympathy for those who are abused to make those images. You don't have a conscience and probably think that children being abused (like hurtcore) is okay to view. You should not be trusted around kids.
This is why we are hated. Because pro child rapists like yourself are fine with children being used, abused, crying, screaming in pain,…..because you dehumanize them. How could you even enjoy an image knowing a child was forced. Don't pretend that hurtcore doesn't exist and there isn't a demand for it.
You disgust me. Child rapists and those who promote it need to die.
No.29497
>>29495
That didn't answer my question at all.
Your entire post is working under a false pretense: that if you look at a picture of something it means you advocate and enjoy it. Complete nonsense. Do you think if I watch an ISIS beheading that means I'm one of them?
Why are you saying "we"? Am I your opponent or not?
No.29499
>>29471
> Now I have this image in my head of some chucklefuck in a police department being ordered to luck up a gig of cp, put malicious code inside, and reupload ALL OF IT.
kek. Actually, that is exactly what they probably want to be allowed to do.
Can't you just use a VPN + TOR though?
Together with steganographical encryption of your disks and three-factor authentication?
Also I am disappointed in who few have supported https://www.kickstarter.com/projects/designshift/orwl-the-first-open-source-hardened-computer, but we're getting there, step by step.
No.29500
>>29471
yourbrainonporn.com
No.29501
>>29497
> that if you look at a picture of something it means you advocate and enjoy it.
So I take it to mean you're just looking at cp and not jacking off to it. Because I am dearly hoping you aren't thinking you can actually defend jacking off to to child rape as not enjoying child rape.
No.29502
>>29471
>Now I have this image in my head of some chucklefuck in a police department being ordered to luck up a gig of cp, put malicious code inside, and reupload ALL OF IT.
Why would he have to? You don't need more than a single image in a batch to use as a trap. This sort of incredibly stupid lack of critical thought on your part goes to show how easy of prey you are for authorities.
No.29509
>>29502
Sometimes on the internet people post these things called "jokes" where they make up impractical scenarios for the sake of comedy, you should try it sometime. But seriously a single trap image would be much easier to identify and avoid than a cluster of trap images scattered across different sites.
Also if I'm an easy prey then dox me, don't worry I'll wait.
No.29510
>>29500
Now my palms are covered in hair, thanks.
No.29524
>>Together with steganographical encryption of your disks …?
Better - transport your files as quick as you can into your new air-gapped laptop ( FDE ).
>>three-factor authentication
excellent - i can give you a guarantee no one can break this. Well done! Be prepared police start now social engineering attacks.
I am sure a PRO like you know the name Kevin Mitnick
You are better than me - i use "only" two-factor- authentication.
>>ORWL
Very good, important. Remind: never ever buy hardware online.
No.29525
>>Because pro child rapists … are fine with children being used, abused, crying, screaming in pain
I am a rape victim - it was a police officer. Very sadistic and with death threats if i tell anyone what happend.
>>How could you even enjoy an image knowing a child was forced.
The sexuality is unimportant. He need the emotion that you are complete helpless. He eat your fear.
The most ppl believe its an sexual aggression - its not! He loves the situation that you can't escape.
The soul damage for a child is 100% for a very long time …
Isn't a preventive helpline not better? If someone feel he need another human in a helpless situation …
The most police officers are awesome, unlucky for me that one madcap saw a perfect victim in me.
Thank god all my scars ( butt, face, hands, arms ) are healed and no one see that my body was flogged ….
No.29635
>>29502
anon confirmed for can't hack me or nothin'
I got NORTON
Have a nice winter, fgt
Or summer depending on your hemisphere