Oct 7 12:44
Hi, I'm new to bitmessage and I need some operational advice. I am cybergangstalked by a bunch of anonymous morons from my town, and they somehow manage to always get all my new e-mail addresses I create. Police is useless, they checked these threating e-mails and I was told "they use Tor, we can't trace them". So now I want to go darknet, and give different BM address to every (hopefully) trusted person I want to communicate with. If one of these addresses will be leaked, then I will find a "mole" - or a person with low computer security. Then I just have to delete this address from list of my identities and gangstalkers will be cut-off. Am I thinking this right? Please correct if I'm wrong: when I create a bunch of BM addresses randomly and give them to my correspondents personally, then there is no way to retrieve them somehow from BM network traffic of these people, like by some "sniffer" or other wifi interception or something? My PC is already secure, it is running newest Mint Linux with all updates regularly applied, and I have dedicated LTE modem for this computer, so there should be no leak on my side, I hope. I am the only user of this computer, and I use it only at home. I already disposed of my smartfone and currently I use a "dumbfone" with number given only to few people, and as for now there are no new threating messages going this channel. Is anything more I should think about to seal myself from stalkers?
Oct 7 13:01
>they somehow manage to always get all my new e-mail addresses I create. Probably being keylogged is my guess (if they somehow got access to your machine). It's the easiest way to get peoples' account details, no amount of encryption will save you from an installed keylogger. Hardware keyloggers are also a thing. The CIA and NSA have been known to open packages purchased online, like from amazon and install loggers into the hardware itself. What I would do: * check ALL my computer hardware (including routers/switches etc.) for anything suspicious * take my keyboard apart and look for a logger (easy to spot in most cases) * flash my bios with the latest version * wipe all my drives completely * reinstall linux on a encrypted drive which wont allow anyone access even if they have physical access to the machine (gaining root access to an unencrypted installation is easy-peasy) Now you can be reasonably certain that nothing is being logged / monitored. As for Bitmessage: run it through Tor. Heck, run the Tor browser for general browsing if you are that paranoid. Yes, giving your BM-addresses in person is the best way to distribute them. If you are already meeting up in person, you can also give them a shared AES-256 key which can be used for all communication. You can do plenty to ensure 99.99% privacy and data security, it really depends on how sensitive the data is and how much effort you (and your correspondents) are willing to invest.
Oct 7 13:53
> >they somehow manage to always get all my new e-mail addresses I create. > > Probably being keylogged is my guess (if they somehow got access to your machine). It's the easiest way to get peoples' account details, no amount of encryption will save you from an installed keylogger. Hardware keyloggers are also a thing. My brother warned me about keylogger, so I've got this new computer in pawn shop in nearby city - nobody other than me touched this computer ever since purchase. > The CIA and NSA have been known to open packages purchased online, like from amazon and install loggers into the hardware itself. My problem is a group of morons hiding behind network anonymity, I am an average citizen, surely not in focus of interest of CIA or NSA. > > What I would do: > * check ALL my computer hardware (including routers/switches etc.) for anything suspicious I have network access from dedicated LTE modem bought especially for this task. I don't use my home network devices like wifi from my cable and network provider. > * take my keyboard apart and look for a logger (easy to spot in most cases) My new computer is Panasonic Toughbook, a laptop. > * flash my bios with the latest version Will do this ASAP. > * wipe all my drives completely Bought my laptop with Windows 7 on HDD, thrown away HDD, inserted factory new SSD drive and installed Linux. > * reinstall linux on a encrypted drive which wont allow anyone access even if they have physical access to the machine (gaining root access to an unencrypted installation is easy-peasy) Will encrypt my Linux ASAP. > As for Bitmessage: run it through Tor. I will attach my BM to Tor network today. > Heck, run the Tor browser for general browsing if you are that paranoid. This is what I do already. > Yes, giving your BM-addresses in person is the best way to distribute them. If you are already meeting up in person, you can also give them a shared AES-256 key which can be used for all communication. I plan to give a try to something called gpg4usb, an encryption tool I read about while searching for methods of protecting my e-mails.
Oct 7 16:16
Easiest way to be safe but not most practical for daily use would be to install tails os on cd (or usb with hardware write protect switch. For easier updating). If you are infected just reboot. Now to hack you (atleast I think, Im no expert) it would have to be a tails bug or either bios/intel management engine backdoors. But tails should keep you safe from cyberbullying and most hackers. Qubes os should also be safe. However I have not got it working myself but if you can it seems more practical for daily use and more like a real desktop. Why do you think they are from your town?
Oct 7 16:34
> Why do you think they are from your town? Sometimes I got "paparazzo-style" photos of me coming on my e-mail. They are taken during different parts of a days, so I suppose these are some local stalkers.
Oct 7 17:11
This continues to entertain me. Pray continue.
Oct 7 23:36
If they are in your town, then if you set a trap, they will show up in person. They will find the chance irresistable. Then you can adjust their kneecaps. Lure them to a public forum, and chat with your own sockpuppet, about meeting somewhere, at a certain time, then wait for them to show up. Adjust kneecaps.
Oct 7 23:58
That you even take time to dream this shit up exposes your shitty character.
Oct 8 08:34
It is sad, but you sound almost exactly like these stalkers. They also wrrite that everything related to me is "shitty".
Oct 8 10:53
Not all of this adds up. If an adversary has access to your computer while you aren't near it, a lot of this would make sense (keylogger etc). If you bought a cheap smartphone and used it for emails via 3G, it would be hard to interfere with it.
Oct 8 11:08
I really smell an "evil maid" attack here. The only real defense is to 1) use Linux 2) use whole-drive encryption 3) take out the hard drive when you leave and carry it with you at all times Even this isn't totally secure since the "evil maid" still has access to the computer itself and could alter the BIOS. So are you using whole-drvie encryption? You didn't mention it.
Oct 8 11:18
I was advised to apply encryption, so I did. As I previously explained, I have new computer, a laptop, and it was never outside my house, nobody touched it.
Oct 8 11:24
I contend someone broke in and messed with it before you encrypted it.
Oct 8 11:30
You can keep a smartphone with you at all times; this isn't practical with a desktop or laptop PC. Also, using 3G rules out problems with a Wi-Fi router, which you can't supervise at all times either. A decent smartphone is largely immune to malware unless you have a sophisticated adversary. None of this sounds like the work of an average punk.
Oct 8 11:51
The hard drive on my secure laptop is in a little easily accessible door on the bottom of the case. When I leave for the day the hard drive is removed and I keep it on my person or within reach at all times. And if I lose control of it it's encrypted with LUKS. When I come home I pop it back in.
Oct 8 12:50
Even so, I would still recommend setting up an email address on a smartphone and accessing it via 3G only. This would rule out the laptop and the Wi-Fi router as the source of the problem. I've never come across a case as serious as this unless an adversary had physical access to the computer system while it was left unattended.
Oct 8 15:04
Eh? It generally would. Email over TLS isn't an uncommon thing these days. And 3G sniffing isn't for the amateur.
Oct 8 16:27
>I've never come across a case as serious as this unless an adversary had physical access to the computer system while it was left unattended. That's precisely the case I was babbling about earlier. It's either some illegally enterning the property or it's the "evil maid" i.e. a trusted individual with legal physical access to the property. OP did not describe his domicile in sufficient detail.
Oct 8 17:00
Assuming that OP has given the full picture, the only explanation that fits all the facts is that an unauthorized person has had access to the computer. As for who or why, this is a lot harder to say. As suggested, he could plant information about visiting a cafe at a certain time to see who turned up. After you have binned your computer and router, bought a new one and locked the door, you shouldn't be having this problem. I'm wondering whether OP is at college and this is difficult. We need more info here.
Oct 9 03:54
What makes you think you are so important that they would stalk you?
Oct 9 13:04
Fantasy. It's sounding more and more like a spy movie. Let him have his fun, nobody is getting hurt here.
Oct 9 13:07
I don't "think". I am stalked.
Oct 9 14:31
https://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you%27re_a_dog People can't know for sure over the Internet. Based on what the OP said, the only realistic explanation is someone having access to the computer while it was left unattended by the owner. Beyond that it's hard to say anything else about this.
|god fucking damn it fuck those cocksuckers at the FCC||Dec 14 18:59||1|
|please post your onion and uptime in UTC London time in this list||Dec 14 16:43||6|
|RetroShare||Dec 14 14:27||11|
|Hacking 101||Dec 14 08:21||2|
|Cat Goddess on the beach||Dec 14 07:51||12|
|Profit||Dec 14 07:45||1|
|Genghis Koyn warned about SEC clampdown months beforehand||Dec 14 00:14||2|
|Nyx||Dec 14 00:10||1|
|torIRC server||Dec 13 23:53||16|
|mass extinction of BM users||Dec 13 18:06||2|
|when you die||Dec 13 15:56||1|
|Programming/hacking services provider||Dec 13 13:23||3|
|OK lets start a chat||Dec 13 07:19||15|
|Muhammad.. peace be upon him||Dec 13 05:01||2|
|Bitmessage dead?||Dec 13 03:22||7|
|why the fuck is nobody anything ?||Dec 12 23:16||8|
|torIRC server online||Dec 12 18:11||9|
|(no subject)||Dec 12 17:09||10|
|Burkhard Heim||Dec 12 15:14||2|
|CIA - Project STARGATE||Dec 12 14:59||1|
|MICROWAVE MIND CONTROL||Dec 12 14:59||1|
|United States gravity control propulsion research||Dec 12 14:15||1|
|torIRC Monday||Dec 12 13:33||1|
|torIRC Monday||Dec 12 13:29||23|
|new onion torirc||Dec 12 05:23||1|
|torIRC mini ver.||Dec 12 03:37||5|
|torIRC -- u gonna use it or not ?||Dec 12 03:36||2|
|sent via API : torIRC9050.py||Dec 12 03:29||15|
|The Revolution of Crypto-Anarchism is to design and spread rapidly a non-paradoxal cyberspace.||Dec 11 15:59||2|
|torIRC9050.py||Dec 11 15:14||4|
|torIRC Monday - code||Dec 11 10:44||1|
|eerily quiet on bitmessage||Dec 11 09:31||7|
|So much bullshit here!||Dec 11 08:05||7|
|suicide||Dec 11 03:16||8|
|Does this work||Dec 11 02:15||2|
|Hello everyone! :)||Dec 11 01:10||1|
|Is bittext.ch down?||Dec 11 00:37||2|
|BitText importantY: important-info||Dec 11 00:16||1|
|BitText mission007: The "general" chan's mission statement||Dec 11 00:06||1|
|BitText LIST||Dec 10 23:54||1|
|BitText ivr3ouAEyI: AfD_Mitgliederliste_16-05-01.csv||Dec 10 21:02||2|
|BitText NYQIVP_0JH: AfD_WhatsApp_Name_bis-500||Dec 10 18:58||1|
|BitText 84p9HtVqo2: Afd-Mitglieder 2015 unvollstaendig csv||Dec 10 18:44||1|
|torIRC||Dec 10 18:05||5|
|((i)) UPDATE linksunten.indymedia.org files||Dec 10 17:08||1|
|Hyphenated-American BM-2cXw4tSPxWu7q6ed51WoZgXXyJJ5kyB7Nx||Dec 10 11:12||1|
|with style||Dec 10 10:00||6|
|All I want for Christmas is White Genocide||Dec 10 09:58||7|
|pedos||Dec 10 09:34||3|
|Tor Browser 7.0.11 is released||Dec 10 08:08||2|
|Greece citizens storm authorities buildings||Dec 10 07:40||1|
|[chan] suicide-note||Dec 10 06:50||2|
|[chan] suicide-note BM-2cVbzUVY4b21avMSbXMHmVR1pc6a5wEeTN||Dec 10 06:42||3|
|[chan] suicide BM-2cTpc3iowqRLsz2CPf2eGZyUpZBDdhp1NB||Dec 10 06:24||1|
|NEED OF A PROFESSIONAL HACKER||Dec 10 04:51||1|
|There is no place in modern Europe for ethnically pure states||Dec 10 04:49||3|
|white countries for everyone (except whites)||Dec 10 04:48||3|
|BREXIT IS BULLSHIT||Dec 10 02:31||4|
|Harvard Magazine Promotes White Genocide||Dec 10 02:30||2|
|White Australia must be Asianized||Dec 10 02:18||1|
|Whites are a global minority||Dec 10 02:18||2|
|strike fear in the heart of the white man||Dec 10 02:09||1|
|hi there||Dec 10 02:05||4|
|you can't breed out the africans||Dec 10 02:04||1|
|We should commit mass suicide||Dec 10 02:04||2|
|policies to enforce racial mixing of whites||Dec 10 02:00||1|
|The extermination of white people is good news||Dec 10 01:55||1|
|Race Traitor Magazine promotes white genocide||Dec 10 01:50||1|
|anti-white 'supercultural' society||Dec 10 01:45||1|
|We have got to eliminate the gringo||Dec 10 01:41||1|
|Caucasians must be eliminated||Dec 10 01:36||1|
|the challenge of racial interbreeding||Dec 10 01:32||1|
|Everyone is our neighbour (except white people)||Dec 10 01:26||1|
|To the flat earthers||Dec 10 01:25||3|
|what if the NSA||Dec 10 01:25||2|
|Eliminating Caucasians is a good thing||Dec 10 01:21||1|
|not allowed to be white anymore||Dec 10 01:16||1|
|White Europe will not survive||Dec 10 01:11||1|
|bisexual anti-whites love fantasies of slaughtering white people||Dec 10 01:07||1|
|Gradually get rid of whites in Australia||Dec 10 01:03||1|
|the genocide of Europeans is such a good thing||Dec 10 00:57||1|
|genocidal anti-whites blame atrocities on the white race||Dec 10 00:52||1|
|German people are turning brown||Dec 10 00:47||1|
|life is better without white people||Dec 10 00:42||1|
|Kill the white farmer||Dec 10 00:37||1|
|crossbreeding their pale race||Dec 10 00:32||1|
|we intend to turn Europe into a mixed race||Dec 10 00:26||1|
|The White Majority is the Problem||Dec 10 00:21||1|
|we need to make Germany non-white||Dec 10 00:15||1|
|why not kill a white person?||Dec 10 00:11||1|
|jews endorse sodomy because it destroys white people||Dec 10 00:06||1|
|EU should undermine white people||Dec 10 00:01||1|
|ensure young people are mixing||Dec 9 23:56||1|
|White people should kiss brown ass to survive||Dec 9 23:51||1|
|White Realpolitik an Introduction||Dec 9 23:46||1|
|Weather Underground promotes killing white babies||Dec 9 23:40||1|
|Force kids to race mix||Dec 9 23:35||1|
|The white race is the cancer of human history||Dec 9 23:29||1|
|how we are going to exterminate White people||Dec 9 23:21||1|
|Programming and hacking services expert||Dec 9 23:18||1|