Oct 7 12:44
Hi, I'm new to bitmessage and I need some operational advice. I am cybergangstalked by a bunch of anonymous morons from my town, and they somehow manage to always get all my new e-mail addresses I create. Police is useless, they checked these threating e-mails and I was told "they use Tor, we can't trace them". So now I want to go darknet, and give different BM address to every (hopefully) trusted person I want to communicate with. If one of these addresses will be leaked, then I will find a "mole" - or a person with low computer security. Then I just have to delete this address from list of my identities and gangstalkers will be cut-off. Am I thinking this right? Please correct if I'm wrong: when I create a bunch of BM addresses randomly and give them to my correspondents personally, then there is no way to retrieve them somehow from BM network traffic of these people, like by some "sniffer" or other wifi interception or something? My PC is already secure, it is running newest Mint Linux with all updates regularly applied, and I have dedicated LTE modem for this computer, so there should be no leak on my side, I hope. I am the only user of this computer, and I use it only at home. I already disposed of my smartfone and currently I use a "dumbfone" with number given only to few people, and as for now there are no new threating messages going this channel. Is anything more I should think about to seal myself from stalkers?
Oct 7 13:01
>they somehow manage to always get all my new e-mail addresses I create. Probably being keylogged is my guess (if they somehow got access to your machine). It's the easiest way to get peoples' account details, no amount of encryption will save you from an installed keylogger. Hardware keyloggers are also a thing. The CIA and NSA have been known to open packages purchased online, like from amazon and install loggers into the hardware itself. What I would do: * check ALL my computer hardware (including routers/switches etc.) for anything suspicious * take my keyboard apart and look for a logger (easy to spot in most cases) * flash my bios with the latest version * wipe all my drives completely * reinstall linux on a encrypted drive which wont allow anyone access even if they have physical access to the machine (gaining root access to an unencrypted installation is easy-peasy) Now you can be reasonably certain that nothing is being logged / monitored. As for Bitmessage: run it through Tor. Heck, run the Tor browser for general browsing if you are that paranoid. Yes, giving your BM-addresses in person is the best way to distribute them. If you are already meeting up in person, you can also give them a shared AES-256 key which can be used for all communication. You can do plenty to ensure 99.99% privacy and data security, it really depends on how sensitive the data is and how much effort you (and your correspondents) are willing to invest.
Oct 7 13:53
> >they somehow manage to always get all my new e-mail addresses I create. > > Probably being keylogged is my guess (if they somehow got access to your machine). It's the easiest way to get peoples' account details, no amount of encryption will save you from an installed keylogger. Hardware keyloggers are also a thing. My brother warned me about keylogger, so I've got this new computer in pawn shop in nearby city - nobody other than me touched this computer ever since purchase. > The CIA and NSA have been known to open packages purchased online, like from amazon and install loggers into the hardware itself. My problem is a group of morons hiding behind network anonymity, I am an average citizen, surely not in focus of interest of CIA or NSA. > > What I would do: > * check ALL my computer hardware (including routers/switches etc.) for anything suspicious I have network access from dedicated LTE modem bought especially for this task. I don't use my home network devices like wifi from my cable and network provider. > * take my keyboard apart and look for a logger (easy to spot in most cases) My new computer is Panasonic Toughbook, a laptop. > * flash my bios with the latest version Will do this ASAP. > * wipe all my drives completely Bought my laptop with Windows 7 on HDD, thrown away HDD, inserted factory new SSD drive and installed Linux. > * reinstall linux on a encrypted drive which wont allow anyone access even if they have physical access to the machine (gaining root access to an unencrypted installation is easy-peasy) Will encrypt my Linux ASAP. > As for Bitmessage: run it through Tor. I will attach my BM to Tor network today. > Heck, run the Tor browser for general browsing if you are that paranoid. This is what I do already. > Yes, giving your BM-addresses in person is the best way to distribute them. If you are already meeting up in person, you can also give them a shared AES-256 key which can be used for all communication. I plan to give a try to something called gpg4usb, an encryption tool I read about while searching for methods of protecting my e-mails.
Oct 7 16:16
Easiest way to be safe but not most practical for daily use would be to install tails os on cd (or usb with hardware write protect switch. For easier updating). If you are infected just reboot. Now to hack you (atleast I think, Im no expert) it would have to be a tails bug or either bios/intel management engine backdoors. But tails should keep you safe from cyberbullying and most hackers. Qubes os should also be safe. However I have not got it working myself but if you can it seems more practical for daily use and more like a real desktop. Why do you think they are from your town?
Oct 7 16:34
> Why do you think they are from your town? Sometimes I got "paparazzo-style" photos of me coming on my e-mail. They are taken during different parts of a days, so I suppose these are some local stalkers.
Oct 7 17:11
This continues to entertain me. Pray continue.
Oct 7 23:36
If they are in your town, then if you set a trap, they will show up in person. They will find the chance irresistable. Then you can adjust their kneecaps. Lure them to a public forum, and chat with your own sockpuppet, about meeting somewhere, at a certain time, then wait for them to show up. Adjust kneecaps.
Oct 7 23:58
That you even take time to dream this shit up exposes your shitty character.
Oct 8 08:34
It is sad, but you sound almost exactly like these stalkers. They also wrrite that everything related to me is "shitty".
Oct 8 10:53
Not all of this adds up. If an adversary has access to your computer while you aren't near it, a lot of this would make sense (keylogger etc). If you bought a cheap smartphone and used it for emails via 3G, it would be hard to interfere with it.
Oct 8 11:08
I really smell an "evil maid" attack here. The only real defense is to 1) use Linux 2) use whole-drive encryption 3) take out the hard drive when you leave and carry it with you at all times Even this isn't totally secure since the "evil maid" still has access to the computer itself and could alter the BIOS. So are you using whole-drvie encryption? You didn't mention it.
Oct 8 11:18
I was advised to apply encryption, so I did. As I previously explained, I have new computer, a laptop, and it was never outside my house, nobody touched it.
Oct 8 11:24
I contend someone broke in and messed with it before you encrypted it.
Oct 8 11:30
You can keep a smartphone with you at all times; this isn't practical with a desktop or laptop PC. Also, using 3G rules out problems with a Wi-Fi router, which you can't supervise at all times either. A decent smartphone is largely immune to malware unless you have a sophisticated adversary. None of this sounds like the work of an average punk.
Oct 8 11:51
The hard drive on my secure laptop is in a little easily accessible door on the bottom of the case. When I leave for the day the hard drive is removed and I keep it on my person or within reach at all times. And if I lose control of it it's encrypted with LUKS. When I come home I pop it back in.
Oct 8 12:50
Even so, I would still recommend setting up an email address on a smartphone and accessing it via 3G only. This would rule out the laptop and the Wi-Fi router as the source of the problem. I've never come across a case as serious as this unless an adversary had physical access to the computer system while it was left unattended.
Oct 8 15:04
Eh? It generally would. Email over TLS isn't an uncommon thing these days. And 3G sniffing isn't for the amateur.
Oct 8 16:27
>I've never come across a case as serious as this unless an adversary had physical access to the computer system while it was left unattended. That's precisely the case I was babbling about earlier. It's either some illegally enterning the property or it's the "evil maid" i.e. a trusted individual with legal physical access to the property. OP did not describe his domicile in sufficient detail.
Oct 8 17:00
Assuming that OP has given the full picture, the only explanation that fits all the facts is that an unauthorized person has had access to the computer. As for who or why, this is a lot harder to say. As suggested, he could plant information about visiting a cafe at a certain time to see who turned up. After you have binned your computer and router, bought a new one and locked the door, you shouldn't be having this problem. I'm wondering whether OP is at college and this is difficult. We need more info here.
Oct 9 03:54
What makes you think you are so important that they would stalk you?
Oct 9 13:04
Fantasy. It's sounding more and more like a spy movie. Let him have his fun, nobody is getting hurt here.
Oct 9 13:07
I don't "think". I am stalked.
Oct 9 14:31
https://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you%27re_a_dog People can't know for sure over the Internet. Based on what the OP said, the only realistic explanation is someone having access to the computer while it was left unattended by the owner. Beyond that it's hard to say anything else about this.
|political activism||Oct 20 10:17||3|
|man gave cigarettes to teenagers||Oct 20 10:16||3|
|CypherSaber: academia says to avoid overkill with encryption||Oct 20 09:34||1|
|some people need to suffer||Oct 20 09:30||2|
|Are you Christian?||Oct 20 07:16||22|
|Julian Assange and Pedophile Baby Farms||Oct 20 07:07||6|
|50 ways||Oct 20 07:07||1|
|WikiLeaks Vault7 confirms CIA can effectively bypass Signal + Telegram + WhatsApp + Confide encryption||Oct 20 00:03||33|
|Uncommon law||Oct 19 23:44||1|
|The Bitmessage Primer for Patriots||Oct 19 21:41||1|
|(no subject)||Oct 19 17:12||5|
|band 1023MB||Oct 19 17:11||2|
|Gravity is a mystical force invented by Freemasons.||Oct 19 17:10||3|
|Memorial Day and the Rising Gorge: More than I Can Take||Oct 19 17:07||2|
|The Blue whale Game||Oct 19 13:21||60|
|LGBT Bullshit||Oct 19 12:04||2|
|Wifi is totally insecure||Oct 19 10:54||27|
|BURN THE WITCH!||Oct 19 06:34||5|
|Hire a professional hacker||Oct 19 05:38||2|
|Sattelite pirating||Oct 19 05:01||14|
|PROOF GPS Satellites Do Not Exist||Oct 19 04:23||2|
|NASA Faked Footage of ISS Space Station using Augmented Virtual Reality||Oct 19 00:18||1|
|Globe Earthers Spend More Effort Opposing the Flat Earth Than They Spend Opposing Child Molestors.||Oct 18 23:54||1|
|3 types of people||Oct 18 23:33||1|
|King of the North - Ottoman Empire||Oct 18 23:16||1|
|All Aboard Trump’s Tranny Train!||Oct 18 22:33||1|
|The Moon Is ONLY 70 Miles Wide!||Oct 18 22:15||1|
|MELANIA IS A MAN---UFACTURED WOMAN 100 PC||Oct 18 21:42||1|
|The Stallman Tax||Oct 18 21:01||2|
|The real purpose of homophobia||Oct 18 20:58||1|
|Wikileaks - Made By The NSA||Oct 18 19:19||1|
|Free Speeeeech||Oct 18 17:50||3|
|list: CHANBOT Response||Oct 18 16:55||3|
|Neutron star heading for Earth||Oct 18 15:26||5|
|[DELETED]||Oct 18 10:40||13|
|Your first date.||Oct 18 09:12||2|
|blue whale||Oct 18 08:02||3|
|Random B/W Pixels||Oct 18 07:06||12|
|funny||Oct 18 06:54||1|
|Officers used excessive force after I punched my lawyer in face.||Oct 17 17:42||7|
|[DELETED]||Oct 17 17:17||16|
|Unique non-mainstream non-political-correct cryptographic source code||Oct 17 15:31||62|
|HACKING||Oct 17 14:19||7|
|Programming and Hacking services||Oct 17 14:15||7|
|Ukraine Kiev Now||Oct 17 13:47||1|
|What happen||Oct 17 12:41||5|
|all your crypto are belong to us (private key from public key only)||Oct 17 07:41||4|
|Hot Yeltsa by the mic :)||Oct 17 05:57||2|
|need a reliable hacker||Oct 17 02:29||2|
|TR IS DOWN, NOW WHAT?||Oct 17 01:22||4|
|Linux Wifi is totally insecure||Oct 16 23:50||1|
|more: CHANBOT Response||Oct 16 23:41||1|
|dodo: CHANBOT Response||Oct 16 23:41||2|
|time: CHANBOT Response||Oct 16 23:41||1|
|news: CHANBOT Response||Oct 16 23:41||2|
|joke: CHANBOT Response||Oct 16 23:41||1|
|gram: CHANBOT Response||Oct 16 23:41||1|
|cast: CHANBOT Response||Oct 16 23:38||1|
|addr: CHANBOT Response||Oct 16 23:36||2|
|Looking for p2p network||Oct 16 21:16||5|
|Sophie||Oct 16 19:28||4|
|new chanbot 'cast' command||Oct 16 18:47||1|
|Tribler Makes BitTorrent Impossible to Shut Down||Oct 16 17:02||5|
|SALTPACK SIGNED MESSAGE||Oct 16 16:19||4|
|#cypherpunk EFnet||Oct 16 16:11||2|
|VPN & Firefox (+ other Gecko browsers)* rev. 0.3.10||Oct 16 15:56||2|
|where do you get good randomness?||Oct 16 15:02||35|
|What if?||Oct 16 15:00||3|
|LOL WPA||Oct 16 14:14||1|
|Colin Plumb, co-developer of PGP, was exposed as NSA operative.||Oct 16 12:21||18|
|machine_readable_tests||Oct 16 12:21||3|
|na ławie oskarżonych zabrakło zleceniodawców||Oct 16 12:12||4|
|41 man charming presence looking for old rich woman||Oct 16 12:07||11|
|всякому генералу||Oct 16 01:01||1|
|Annya||Oct 15 22:41||2|
|Chanbot is back online||Oct 15 22:23||1|
|How they are trying to derail Bitmessage development||Oct 15 18:11||1|
|HELP||Oct 15 11:31||3|
|Your privacy - VPN & Firefox (+ other Gecko browsers)* rev. 0.3.9||Oct 15 09:34||2|
|VERACRYPT AS IT SHOULD BE||Oct 15 07:58||4|
|[DELETED]||Oct 15 07:24||10|
|XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX||Oct 15 06:38||2|
|imap email client||Oct 15 03:55||4|
|GANGSTALKING - T.I.||Oct 15 02:56||1|
|A proxy infected binaries during download at the ISP||Oct 14 23:37||1|
|Remote security exploit in all 2008+ Intel platforms||Oct 14 23:11||2|
|Don't click html5||Oct 14 22:19||10|
|поговорим о вас||Oct 14 21:43||3|
|ROT-26||Oct 14 21:33||2|
|Using Team Fortress 2 game-servers to circumvent censorship||Oct 14 20:46||1|
|No. Really. No.||Oct 14 19:04||3|
|Imgur is over capacity!||Oct 14 17:45||1|
|I'm disapointed with Reddit||Oct 14 16:59||1|
|Blue whale||Oct 14 14:49||1|
|Blonde girl||Oct 14 11:56||3|
|Rewson, SAFE, Waihopai, INFOSEC, ASPIC, MI6||Oct 14 07:02||14|
|Holocaust Education||Oct 14 04:25||19|
|Tor sucks||Oct 14 01:05||3|
|Active measures||Oct 13 17:54||2|
|THE APOLLO "MOON" HOAX: FACT OR FICTION?||Oct 13 17:31||2|