Sassafrass
Well-Known Member
- Joined
- Jul 4, 2018
- Messages
- 605
- Reaction score
- 4,509
Kind of defeats the point if you don't carry a mobile phone around. But the lack of moment can point at a suspect.
Oh VPN's. While I support the use of VPN's for most users. The simple fact is that anything the FBI wants the FBI gets.
So the easiest way to get around vpn's, is simply look for the human to fail to use them. Now lets say that you use your vpn all the time. Then, it is easy to put down a honey pot for you.
Lets say that you always visit this website at 9:30. It is simple for most agencies to insert malicious code into your stream of this site. It infects your computer with out you knowing and tells the agency anything they want.
There is also weakness in the code it self that the fbi has used. Personally. VPN will slow them down, but they can always get between you and your final site.
Doesn't defeat the point if you're not needing to move around. If I want to be in contact with someone incog, I may or may want to use it only when I am in a certain place. Like, say, to check in with someone I don't want to be associated with, more so than me being on the run (or whatever) and not wanting to be tracked.
But yeah, I was specifically asking about the identification of purchased SIM cards through the use of spoof towers as you explained them previously. You'd said - iirc - that those SIMS are ultimately identified through a sort of sifting process, the gist if which seemed to be based on sorting and sifting physical location, and that this "defeats" burners. So I was trying to understand whether that process would still work (or be impacted at all) if Tor and/or a VPN were also used (I understand these are all addressing different parts of privacy), and whether the sifting process has anything to sift if you're always connecting to public wifi from the same area covered by the spoof tower.