Oct 7 12:44 [raw]
Hi, I'm new to bitmessage and I need some operational advice. I am cybergangstalked by a bunch of anonymous morons from my town, and they somehow manage to always get all my new e-mail addresses I create. Police is useless, they checked these threating e-mails and I was told "they use Tor, we can't trace them". So now I want to go darknet, and give different BM address to every (hopefully) trusted person I want to communicate with. If one of these addresses will be leaked, then I will find a "mole" - or a person with low computer security. Then I just have to delete this address from list of my identities and gangstalkers will be cut-off. Am I thinking this right? Please correct if I'm wrong: when I create a bunch of BM addresses randomly and give them to my correspondents personally, then there is no way to retrieve them somehow from BM network traffic of these people, like by some "sniffer" or other wifi interception or something? My PC is already secure, it is running newest Mint Linux with all updates regularly applied, and I have dedicated LTE modem for this computer, so there should be no leak on my side, I hope. I am the only user of this computer, and I use it only at home. I already disposed of my smartfone and currently I use a "dumbfone" with number given only to few people, and as for now there are no new threating messages going this channel. Is anything more I should think about to seal myself from stalkers?
Oct 7 13:01 [raw]
>they somehow manage to always get all my new e-mail addresses I create. Probably being keylogged is my guess (if they somehow got access to your machine). It's the easiest way to get peoples' account details, no amount of encryption will save you from an installed keylogger. Hardware keyloggers are also a thing. The CIA and NSA have been known to open packages purchased online, like from amazon and install loggers into the hardware itself. What I would do: * check ALL my computer hardware (including routers/switches etc.) for anything suspicious * take my keyboard apart and look for a logger (easy to spot in most cases) * flash my bios with the latest version * wipe all my drives completely * reinstall linux on a encrypted drive which wont allow anyone access even if they have physical access to the machine (gaining root access to an unencrypted installation is easy-peasy) Now you can be reasonably certain that nothing is being logged / monitored. As for Bitmessage: run it through Tor. Heck, run the Tor browser for general browsing if you are that paranoid. Yes, giving your BM-addresses in person is the best way to distribute them. If you are already meeting up in person, you can also give them a shared AES-256 key which can be used for all communication. You can do plenty to ensure 99.99% privacy and data security, it really depends on how sensitive the data is and how much effort you (and your correspondents) are willing to invest.
Oct 7 13:53 [raw]
> >they somehow manage to always get all my new e-mail addresses I create. > > Probably being keylogged is my guess (if they somehow got access to your machine). It's the easiest way to get peoples' account details, no amount of encryption will save you from an installed keylogger. Hardware keyloggers are also a thing. My brother warned me about keylogger, so I've got this new computer in pawn shop in nearby city - nobody other than me touched this computer ever since purchase. > The CIA and NSA have been known to open packages purchased online, like from amazon and install loggers into the hardware itself. My problem is a group of morons hiding behind network anonymity, I am an average citizen, surely not in focus of interest of CIA or NSA. > > What I would do: > * check ALL my computer hardware (including routers/switches etc.) for anything suspicious I have network access from dedicated LTE modem bought especially for this task. I don't use my home network devices like wifi from my cable and network provider. > * take my keyboard apart and look for a logger (easy to spot in most cases) My new computer is Panasonic Toughbook, a laptop. > * flash my bios with the latest version Will do this ASAP. > * wipe all my drives completely Bought my laptop with Windows 7 on HDD, thrown away HDD, inserted factory new SSD drive and installed Linux. > * reinstall linux on a encrypted drive which wont allow anyone access even if they have physical access to the machine (gaining root access to an unencrypted installation is easy-peasy) Will encrypt my Linux ASAP. > As for Bitmessage: run it through Tor. I will attach my BM to Tor network today. > Heck, run the Tor browser for general browsing if you are that paranoid. This is what I do already. > Yes, giving your BM-addresses in person is the best way to distribute them. If you are already meeting up in person, you can also give them a shared AES-256 key which can be used for all communication. I plan to give a try to something called gpg4usb, an encryption tool I read about while searching for methods of protecting my e-mails.
Oct 7 16:16 [raw]
Easiest way to be safe but not most practical for daily use would be to install tails os on cd (or usb with hardware write protect switch. For easier updating). If you are infected just reboot. Now to hack you (atleast I think, Im no expert) it would have to be a tails bug or either bios/intel management engine backdoors. But tails should keep you safe from cyberbullying and most hackers. Qubes os should also be safe. However I have not got it working myself but if you can it seems more practical for daily use and more like a real desktop. Why do you think they are from your town?
Oct 7 16:34 [raw]
> Why do you think they are from your town? Sometimes I got "paparazzo-style" photos of me coming on my e-mail. They are taken during different parts of a days, so I suppose these are some local stalkers.
Oct 7 17:11 [raw]
This continues to entertain me. Pray continue.
Oct 7 23:36 [raw]
If they are in your town, then if you set a trap, they will show up in person. They will find the chance irresistable. Then you can adjust their kneecaps. Lure them to a public forum, and chat with your own sockpuppet, about meeting somewhere, at a certain time, then wait for them to show up. Adjust kneecaps.
Oct 7 23:58 [raw]
That you even take time to dream this shit up exposes your shitty character.
Oct 8 08:34 [raw]
It is sad, but you sound almost exactly like these stalkers. They also wrrite that everything related to me is "shitty".
Oct 8 10:53 [raw]
Not all of this adds up. If an adversary has access to your computer while you aren't near it, a lot of this would make sense (keylogger etc). If you bought a cheap smartphone and used it for emails via 3G, it would be hard to interfere with it.
Oct 8 11:08 [raw]
I really smell an "evil maid" attack here. The only real defense is to 1) use Linux 2) use whole-drive encryption 3) take out the hard drive when you leave and carry it with you at all times Even this isn't totally secure since the "evil maid" still has access to the computer itself and could alter the BIOS. So are you using whole-drvie encryption? You didn't mention it.
Oct 8 11:18 [raw]
I was advised to apply encryption, so I did. As I previously explained, I have new computer, a laptop, and it was never outside my house, nobody touched it.
Oct 8 11:24 [raw]
I contend someone broke in and messed with it before you encrypted it.
Oct 8 11:30 [raw]
You can keep a smartphone with you at all times; this isn't practical with a desktop or laptop PC. Also, using 3G rules out problems with a Wi-Fi router, which you can't supervise at all times either. A decent smartphone is largely immune to malware unless you have a sophisticated adversary. None of this sounds like the work of an average punk.
Oct 8 11:51 [raw]
The hard drive on my secure laptop is in a little easily accessible door on the bottom of the case. When I leave for the day the hard drive is removed and I keep it on my person or within reach at all times. And if I lose control of it it's encrypted with LUKS. When I come home I pop it back in.
Oct 8 12:50 [raw]
Even so, I would still recommend setting up an email address on a smartphone and accessing it via 3G only. This would rule out the laptop and the Wi-Fi router as the source of the problem. I've never come across a case as serious as this unless an adversary had physical access to the computer system while it was left unattended.
Oct 8 15:04 [raw]
Eh? It generally would. Email over TLS isn't an uncommon thing these days. And 3G sniffing isn't for the amateur.
Oct 8 16:27 [raw]
>I've never come across a case as serious as this unless an adversary had physical access to the computer system while it was left unattended. That's precisely the case I was babbling about earlier. It's either some illegally enterning the property or it's the "evil maid" i.e. a trusted individual with legal physical access to the property. OP did not describe his domicile in sufficient detail.
Oct 8 17:00 [raw]
Assuming that OP has given the full picture, the only explanation that fits all the facts is that an unauthorized person has had access to the computer. As for who or why, this is a lot harder to say. As suggested, he could plant information about visiting a cafe at a certain time to see who turned up. After you have binned your computer and router, bought a new one and locked the door, you shouldn't be having this problem. I'm wondering whether OP is at college and this is difficult. We need more info here.
Oct 9 03:54 [raw]
What makes you think you are so important that they would stalk you?
Oct 9 13:04 [raw]
Fantasy. It's sounding more and more like a spy movie. Let him have his fun, nobody is getting hurt here.
Oct 9 13:07 [raw]
I don't "think". I am stalked.
Oct 9 14:31 [raw]
https://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you%27re_a_dog People can't know for sure over the Internet. Based on what the OP said, the only realistic explanation is someone having access to the computer while it was left unattended by the owner. Beyond that it's hard to say anything else about this.
|Plez helpe mie||Mar 22 21:09||1|
|Where's the porn?||Mar 22 21:07||3|
|5835F43C491A2178C79E70070633197D||Mar 22 16:34||1|
|76769E0EBAC3A678DD46AB5139E1741B||Mar 22 15:03||1|
|Registration Request Accepted||Mar 22 09:49||3|
|funeral||Mar 22 08:12||1|
|summum suum ut careret ad doctrina transferre sine malorum||Mar 21 17:50||3|
|SEVERE FORM OF MALTREATMENT||Mar 21 17:39||1|
|flat earth debate||Mar 21 16:51||6|
|D93822073146A81C89B7B306D274AA61||Mar 21 16:44||1|
|cypherpunks, hackers, hacktivists, etc.||Mar 21 15:27||1|
|3E892FF7930BAB8134D834EED1C78D35||Mar 21 14:25||1|
|EC3776E5A0E0C6280A1711911026861B||Mar 21 12:40||1|
|NSA Worked to “Track Down” Bitcoin Users||Mar 21 11:45||3|
|The NSA Worked to “Track Down” Bitcoin Users, Snowden Documents Reveal||Mar 21 09:14||3|
|GET 100% ACCESS TO YOUR SPOUSE PHONE WITHOUT HAVING THEM.||Mar 21 07:50||3|
|A749DC06846B4CEB3EC7E5D6E4BAB39F||Mar 20 14:34||1|
|Banchiere di Dio||Mar 20 14:20||2|
|1682699F9403D36FDF346492620C9BFA||Mar 20 14:13||1|
|URGENT & IMPORTANT FOR EVERYONE ON THIS PAGE!||Mar 20 12:07||5|
|I speak nothing but the truth, contact this programmer he wiped my tears. I guarantee||Mar 20 11:57||4|
|Hack your partner remotely without touching his/her phone||Mar 20 11:57||7|
|ONLY FAKE HACKERS ON HERE ARE SCARED AND INTIMIDATED BY THE GENUINE ONE||Mar 20 11:36||4|
|touched||Mar 20 09:53||1|
|money laundering service||Mar 20 09:53||11|
|I speak nothing but lies||Mar 20 09:53||1|
|money laundering service||Mar 20 09:52||2|
|hire a professional hacker||Mar 20 09:52||3|
|hack a cheating spouse remotely||Mar 20 09:52||3|
|I'm a celebrity||Mar 20 09:03||1|
|DARKNET DIRECTORY ASSISTANCE||Mar 20 05:10||2|
|Hardware trojans...||Mar 20 03:15||13|
|0FCF17053AFA392FE72C09960E6BCF9D||Mar 19 21:31||3|
|msg to all bitboarders||Mar 19 21:30||11|
|Script KIddies||Mar 19 19:29||8|
|07CA2EAED5B9A7EF24C091A7553F78D1||Mar 19 17:02||1|
|13FA5FA1D7EC24EEFDC337E897470CDD||Mar 19 15:53||1|
|kill n kill all||Mar 19 15:48||3|
|5B89FB33DC9E8AADE2F1C0E58D49182D||Mar 19 15:36||1|
|89AE901C8CF2C59A4DCDB356080A5B67||Mar 19 13:23||1|
|Whatsapp and Facebook with Gmail hacking||Mar 19 13:20||9|
|REAL AND LEGIT HACKER||Mar 19 13:18||3|
|Trusted and fast i trust him 110 percent he delivers the best.||Mar 19 13:18||3|
|How a legit hacker saved my heart from being wrecked by my cheating spouse||Mar 19 13:18||8|
|Here is a trusted hacker that is very reliable.||Mar 19 13:18||8|
|Neutralizing bitmessage spammers||Mar 19 12:58||7|
|Meet the Official Trusted USA Hacker||Mar 19 11:18||19|
|REAL AND LEGIT HACKER TO HACK CHEATING SPOUSE WHATSAPP||Mar 19 08:59||4|
|He provide the best certified hacking services with the highest level of privacy and confidentiality to his clients||Mar 19 08:59||2|
|run a python script before everything else with superman privileges||Mar 19 07:51||1|
|Seeking special skill||Mar 19 04:22||1|
|huge 1914 banker crisis - new book on mega scam||Mar 19 00:35||7|
|904DE0A932CFC7E598227047D4BAAC89||Mar 18 19:13||1|
|C0E6DE69C4340FB8FCBD6DE3B7798374||Mar 18 17:44||1|
|Trust this Hacker for Credit Score Boosting||Mar 18 13:45||4|
|Bug found in copying machine||Mar 18 13:42||3|
|Meet Heinz, the Official Trusted USA Hacker||Mar 18 10:09||1|
|HELLO EVERYBODY!||Mar 18 07:53||1|
|CLICK HERE For All Hacking Inquiries||Mar 18 07:29||2|
|AEFA83D6675CAC1EF76FCDE4CAE2F71A||Mar 18 06:42||1|
|Social Media Hacking Experts available||Mar 18 06:37||12|
|Social Media Hacking Experts available FOR HIRE||Mar 18 06:37||2|
|F29B07CAECC8DDC70C8563DC686EA185||Mar 18 06:18||1|
|FF03CEC745304693D35AAF900938123F||Mar 17 21:59||1|
|BREAK THIS||Mar 17 19:56||2|
|Donor Card||Mar 17 19:35||2|
|high skill head||Mar 17 18:33||1|
|autem id et facillime vitae||Mar 17 17:47||1|
|0B71B44EE2AB82231B8B6D1DC5FF0D54||Mar 17 17:45||1|
|83B3D47BFF7E95A5B3BB7A1D6BDAACB4||Mar 17 17:12||3|
|F2B87E0A8DD6418B529584FFEB4F943F||Mar 17 16:30||1|
|Here is how to catch a cheating partner||Mar 17 13:13||3|
|Great Hacker with Great Reputation||Mar 17 13:11||6|
|Social Media Hacking Experts||Mar 17 09:08||3|
|Great Hacker with Great Reputation available for hire||Mar 17 09:02||3|
|hack your cheating spouse wife without being traced back to you||Mar 17 08:13||3|
|HACKER||Mar 17 08:13||17|
|I heard you all liked computer books||Mar 17 07:46||3|
|a kike is the most dangerous||Mar 17 07:40||3|
|Stephen Hawking is a Fool||Mar 17 07:31||6|
|tired of spam on general?||Mar 17 07:29||5|
|Secret paedophile culture in Japan||Mar 17 07:28||5|
|0C3E08667F3D1E4B32C4D1913F58B18B||Mar 17 07:17||1|
|Sites that are worth getting your basic news from||Mar 17 07:12||7|
|3B4DBB9D5C283768ABB1BCE57361BC58||Mar 17 06:28||2|
|TRACK YOUR PARTNER'S MOVEMENT EASILY TO FIND OUT ABOUT HIS/HER CURRENT LOCATION||Mar 17 01:49||2|
|EASIER BREAK ME||Mar 17 00:19||1|
|BREAK ME||Mar 16 23:51||1|
|clues 2||Mar 16 23:15||1|
|clues||Mar 16 23:15||1|
|Soviet Bloc Intelligence and Its AIDS||Mar 16 20:48||1|
|Ideology is making America stupid||Mar 16 20:24||1|
|null and void||Mar 16 20:05||2|
|The capitalist countries, stupid and decadent||Mar 16 19:39||1|
|despotic government to be your master||Mar 16 19:22||1|
|There is no cosmological evil||Mar 16 19:22||2|
|being manipulated by the unseen archons||Mar 16 19:10||1|
|C4679FBBA57C1049A05ABBB5421F5BAB||Mar 16 18:42||1|
|HACK||Mar 16 17:32||5|
|ЭТА ЛИЧНЫ КАНАЛ???||Mar 16 16:53||4|