Hi, I'm new to this thing. Need some help.

BM-2cT1MYt7vGjHG5tRGmK83GuKdpTF2JsiTW
Oct 7 12:44

Hi, I'm new to bitmessage and I need some operational advice. I am cybergangstalked by a bunch of anonymous morons from my town, and they somehow manage to always get all my new e-mail addresses I create. Police is useless, they checked these threating e-mails and I was told "they use Tor, we can't trace them". So now I want to go darknet, and give different BM address to every (hopefully) trusted person I want to communicate with. If one of these addresses will be leaked, then I will find a "mole" - or a person with low computer security. Then I just have to delete this address from list of my identities and gangstalkers will be cut-off. Am I thinking this right? Please correct if I'm wrong: when I create a bunch of BM addresses randomly and give them to my correspondents personally, then there is no way to retrieve them somehow from BM network traffic of these people, like by some "sniffer" or other wifi interception or something? My PC is already secure, it is running newest Mint Linux with all updates regularly applied, and I have dedicated LTE modem for this computer, so there should be no leak on my side, I hope. I am the only user of this computer, and I use it only at home. I already disposed of my smartfone and currently I use a "dumbfone" with number given only to few people, and as for now there are no new threating messages going this channel. Is anything more I should think about to seal myself from stalkers?

[chan] general
Oct 7 13:01

>they somehow manage to always get all my new e-mail addresses I create. Probably being keylogged is my guess (if they somehow got access to your machine). It's the easiest way to get peoples' account details, no amount of encryption will save you from an installed keylogger. Hardware keyloggers are also a thing. The CIA and NSA have been known to open packages purchased online, like from amazon and install loggers into the hardware itself. What I would do: * check ALL my computer hardware (including routers/switches etc.) for anything suspicious * take my keyboard apart and look for a logger (easy to spot in most cases) * flash my bios with the latest version * wipe all my drives completely * reinstall linux on a encrypted drive which wont allow anyone access even if they have physical access to the machine (gaining root access to an unencrypted installation is easy-peasy) Now you can be reasonably certain that nothing is being logged / monitored. As for Bitmessage: run it through Tor. Heck, run the Tor browser for general browsing if you are that paranoid. Yes, giving your BM-addresses in person is the best way to distribute them. If you are already meeting up in person, you can also give them a shared AES-256 key which can be used for all communication. You can do plenty to ensure 99.99% privacy and data security, it really depends on how sensitive the data is and how much effort you (and your correspondents) are willing to invest.

BM-2cT1MYt7vGjHG5tRGmK83GuKdpTF2JsiTW
Oct 7 13:53

> >they somehow manage to always get all my new e-mail addresses I create. > > Probably being keylogged is my guess (if they somehow got access to your machine). It's the easiest way to get peoples' account details, no amount of encryption will save you from an installed keylogger. Hardware keyloggers are also a thing. My brother warned me about keylogger, so I've got this new computer in pawn shop in nearby city - nobody other than me touched this computer ever since purchase. > The CIA and NSA have been known to open packages purchased online, like from amazon and install loggers into the hardware itself. My problem is a group of morons hiding behind network anonymity, I am an average citizen, surely not in focus of interest of CIA or NSA. > > What I would do: > * check ALL my computer hardware (including routers/switches etc.) for anything suspicious I have network access from dedicated LTE modem bought especially for this task. I don't use my home network devices like wifi from my cable and network provider. > * take my keyboard apart and look for a logger (easy to spot in most cases) My new computer is Panasonic Toughbook, a laptop. > * flash my bios with the latest version Will do this ASAP. > * wipe all my drives completely Bought my laptop with Windows 7 on HDD, thrown away HDD, inserted factory new SSD drive and installed Linux. > * reinstall linux on a encrypted drive which wont allow anyone access even if they have physical access to the machine (gaining root access to an unencrypted installation is easy-peasy) Will encrypt my Linux ASAP. > As for Bitmessage: run it through Tor. I will attach my BM to Tor network today. > Heck, run the Tor browser for general browsing if you are that paranoid. This is what I do already. > Yes, giving your BM-addresses in person is the best way to distribute them. If you are already meeting up in person, you can also give them a shared AES-256 key which can be used for all communication. I plan to give a try to something called gpg4usb, an encryption tool I read about while searching for methods of protecting my e-mails.

[chan3] general
Oct 7 16:16

Easiest way to be safe but not most practical for daily use would be to install tails os on cd (or usb with hardware write protect switch. For easier updating). If you are infected just reboot. Now to hack you (atleast I think, Im no expert) it would have to be a tails bug or either bios/intel management engine backdoors. But tails should keep you safe from cyberbullying and most hackers. Qubes os should also be safe. However I have not got it working myself but if you can it seems more practical for daily use and more like a real desktop. Why do you think they are from your town?

BM-2cT1MYt7vGjHG5tRGmK83GuKdpTF2JsiTW
Oct 7 16:34

> Why do you think they are from your town? Sometimes I got "paparazzo-style" photos of me coming on my e-mail. They are taken during different parts of a days, so I suppose these are some local stalkers.

[chan] general
Oct 7 17:11

This continues to entertain me. Pray continue.

[chan] general
Oct 7 23:36

If they are in your town, then if you set a trap, they will show up in person. They will find the chance irresistable. Then you can adjust their kneecaps. Lure them to a public forum, and chat with your own sockpuppet, about meeting somewhere, at a certain time, then wait for them to show up. Adjust kneecaps.

[chan] general
Oct 7 23:58

That you even take time to dream this shit up exposes your shitty character.

BM-2cT1MYt7vGjHG5tRGmK83GuKdpTF2JsiTW
Oct 8 08:34

It is sad, but you sound almost exactly like these stalkers. They also wrrite that everything related to me is "shitty".

[chan] general
Oct 8 10:53

Not all of this adds up. If an adversary has access to your computer while you aren't near it, a lot of this would make sense (keylogger etc). If you bought a cheap smartphone and used it for emails via 3G, it would be hard to interfere with it.

[chan] general
Oct 8 11:08

I really smell an "evil maid" attack here. The only real defense is to 1) use Linux 2) use whole-drive encryption 3) take out the hard drive when you leave and carry it with you at all times Even this isn't totally secure since the "evil maid" still has access to the computer itself and could alter the BIOS. So are you using whole-drvie encryption? You didn't mention it.

BM-2cT1MYt7vGjHG5tRGmK83GuKdpTF2JsiTW
Oct 8 11:18

I was advised to apply encryption, so I did. As I previously explained, I have new computer, a laptop, and it was never outside my house, nobody touched it.

[chan] general
Oct 8 11:24

I contend someone broke in and messed with it before you encrypted it.

[chan] general
Oct 8 11:30

You can keep a smartphone with you at all times; this isn't practical with a desktop or laptop PC. Also, using 3G rules out problems with a Wi-Fi router, which you can't supervise at all times either. A decent smartphone is largely immune to malware unless you have a sophisticated adversary. None of this sounds like the work of an average punk.

[chan] general
Oct 8 11:51

The hard drive on my secure laptop is in a little easily accessible door on the bottom of the case. When I leave for the day the hard drive is removed and I keep it on my person or within reach at all times. And if I lose control of it it's encrypted with LUKS. When I come home I pop it back in.

[chan] general
Oct 8 12:50

Even so, I would still recommend setting up an email address on a smartphone and accessing it via 3G only. This would rule out the laptop and the Wi-Fi router as the source of the problem. I've never come across a case as serious as this unless an adversary had physical access to the computer system while it was left unattended.

[chan3] general
Oct 8 15:04

Eh? It generally would. Email over TLS isn't an uncommon thing these days. And 3G sniffing isn't for the amateur.

[chan] general
Oct 8 16:27

>I've never come across a case as serious as this unless an adversary had physical access to the computer system while it was left unattended. That's precisely the case I was babbling about earlier. It's either some illegally enterning the property or it's the "evil maid" i.e. a trusted individual with legal physical access to the property. OP did not describe his domicile in sufficient detail.

[chan] general
Oct 8 17:00

Assuming that OP has given the full picture, the only explanation that fits all the facts is that an unauthorized person has had access to the computer. As for who or why, this is a lot harder to say. As suggested, he could plant information about visiting a cafe at a certain time to see who turned up. After you have binned your computer and router, bought a new one and locked the door, you shouldn't be having this problem. I'm wondering whether OP is at college and this is difficult. We need more info here.

[chan] general
Oct 9 03:54

What makes you think you are so important that they would stalk you?

[chan3] general
Oct 9 13:04

Fantasy. It's sounding more and more like a spy movie. Let him have his fun, nobody is getting hurt here.

BM-2cT1MYt7vGjHG5tRGmK83GuKdpTF2JsiTW
Oct 9 13:07

I don't "think". I am stalked.

[chan] general
Oct 9 14:31

https://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you%27re_a_dog People can't know for sure over the Internet. Based on what the OP said, the only realistic explanation is someone having access to the computer while it was left unattended by the owner. Beyond that it's hard to say anything else about this.

[chan] general
BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r

Subject Last Count
political activism Oct 20 10:17 3
man gave cigarettes to teenagers Oct 20 10:16 3
CypherSaber: academia says to avoid overkill with encryption Oct 20 09:34 1
some people need to suffer Oct 20 09:30 2
Are you Christian? Oct 20 07:16 22
Julian Assange and Pedophile Baby Farms Oct 20 07:07 6
50 ways Oct 20 07:07 1
WikiLeaks Vault7 confirms CIA can effectively bypass Signal + Telegram + WhatsApp + Confide encryption Oct 20 00:03 33
Uncommon law Oct 19 23:44 1
The Bitmessage Primer for Patriots Oct 19 21:41 1
(no subject) Oct 19 17:12 5
band 1023MB Oct 19 17:11 2
Gravity is a mystical force invented by Freemasons. Oct 19 17:10 3
Memorial Day and the Rising Gorge: More than I Can Take Oct 19 17:07 2
The Blue whale Game Oct 19 13:21 60
LGBT Bullshit Oct 19 12:04 2
Wifi is totally insecure Oct 19 10:54 27
BURN THE WITCH! Oct 19 06:34 5
Hire a professional hacker Oct 19 05:38 2
Sattelite pirating Oct 19 05:01 14
PROOF GPS Satellites Do Not Exist Oct 19 04:23 2
NASA Faked Footage of ISS Space Station using Augmented Virtual Reality Oct 19 00:18 1
Globe Earthers Spend More Effort Opposing the Flat Earth Than They Spend Opposing Child Molestors. Oct 18 23:54 1
3 types of people Oct 18 23:33 1
King of the North - Ottoman Empire Oct 18 23:16 1
All Aboard Trump’s Tranny Train! Oct 18 22:33 1
The Moon Is ONLY 70 Miles Wide! Oct 18 22:15 1
MELANIA IS A MAN---UFACTURED WOMAN 100 PC Oct 18 21:42 1
The Stallman Tax Oct 18 21:01 2
The real purpose of homophobia Oct 18 20:58 1
Wikileaks - Made By The NSA Oct 18 19:19 1
Free Speeeeech Oct 18 17:50 3
list: CHANBOT Response Oct 18 16:55 3
Neutron star heading for Earth Oct 18 15:26 5
[DELETED] Oct 18 10:40 13
Your first date. Oct 18 09:12 2
blue whale Oct 18 08:02 3
Random B/W Pixels Oct 18 07:06 12
funny Oct 18 06:54 1
Officers used excessive force after I punched my lawyer in face. Oct 17 17:42 7
[DELETED] Oct 17 17:17 16
Unique non-mainstream non-political-correct cryptographic source code Oct 17 15:31 62
HACKING Oct 17 14:19 7
Programming and Hacking services Oct 17 14:15 7
Ukraine Kiev Now Oct 17 13:47 1
What happen Oct 17 12:41 5
all your crypto are belong to us (private key from public key only) Oct 17 07:41 4
Hot Yeltsa by the mic :) Oct 17 05:57 2
need a reliable hacker Oct 17 02:29 2
TR IS DOWN, NOW WHAT? Oct 17 01:22 4
Linux Wifi is totally insecure Oct 16 23:50 1
more: CHANBOT Response Oct 16 23:41 1
dodo: CHANBOT Response Oct 16 23:41 2
time: CHANBOT Response Oct 16 23:41 1
news: CHANBOT Response Oct 16 23:41 2
joke: CHANBOT Response Oct 16 23:41 1
gram: CHANBOT Response Oct 16 23:41 1
cast: CHANBOT Response Oct 16 23:38 1
addr: CHANBOT Response Oct 16 23:36 2
Looking for p2p network Oct 16 21:16 5
Sophie Oct 16 19:28 4
new chanbot 'cast' command Oct 16 18:47 1
Tribler Makes BitTorrent Impossible to Shut Down Oct 16 17:02 5
SALTPACK SIGNED MESSAGE Oct 16 16:19 4
#cypherpunk EFnet Oct 16 16:11 2
VPN & Firefox (+ other Gecko browsers)* rev. 0.3.10 Oct 16 15:56 2
where do you get good randomness? Oct 16 15:02 35
What if? Oct 16 15:00 3
LOL WPA Oct 16 14:14 1
Colin Plumb, co-developer of PGP, was exposed as NSA operative. Oct 16 12:21 18
machine_readable_tests Oct 16 12:21 3
na ławie oskarżonych zabrakło zleceniodawców Oct 16 12:12 4
41 man charming presence looking for old rich woman Oct 16 12:07 11
всякому генералу Oct 16 01:01 1
Annya Oct 15 22:41 2
Chanbot is back online Oct 15 22:23 1
How they are trying to derail Bitmessage development Oct 15 18:11 1
HELP Oct 15 11:31 3
Your privacy - VPN & Firefox (+ other Gecko browsers)* rev. 0.3.9 Oct 15 09:34 2
VERACRYPT AS IT SHOULD BE Oct 15 07:58 4
[DELETED] Oct 15 07:24 10
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX Oct 15 06:38 2
imap email client Oct 15 03:55 4
GANGSTALKING - T.I. Oct 15 02:56 1
A proxy infected binaries during download at the ISP Oct 14 23:37 1
Remote security exploit in all 2008+ Intel platforms Oct 14 23:11 2
Don't click html5 Oct 14 22:19 10
поговорим о вас Oct 14 21:43 3
ROT-26 Oct 14 21:33 2
Using Team Fortress 2 game-servers to circumvent censorship Oct 14 20:46 1
No. Really. No. Oct 14 19:04 3
Imgur is over capacity! Oct 14 17:45 1
I'm disapointed with Reddit Oct 14 16:59 1
Blue whale Oct 14 14:49 1
Blonde girl Oct 14 11:56 3
Rewson, SAFE, Waihopai, INFOSEC, ASPIC, MI6 Oct 14 07:02 14
Holocaust Education Oct 14 04:25 19
Tor sucks Oct 14 01:05 3
Active measures Oct 13 17:54 2
THE APOLLO "MOON" HOAX: FACT OR FICTION? Oct 13 17:31 2