|
Technology and Internet Emerging and current tech related issues. Internet, DRM, IP, and other technology related discussions. |
|
Thread Tools | Display Modes |
#1
|
||||
|
||||
how does "big brother" know what you're doing
a question for the infotech guys. so i'm in an area where pr0n isn't allowed anywhere in the country. i'm at a base that has wireless internet. it's run by the base and not by the host nation. it's rumored a person actually got in trouble for having skype sex with his wife. how is "big brother" able to know that they were skype sexing and how are they able to find out who the guy was being that the internet was wireless? i asked around and some think it's a FUD scare tactic, but others say they can see everything you do on you're computer monitor. makes me wonder if it's safe to check my bank account using the wireless connection.
|
#2
|
|||
|
|||
It's somewhere in between.
Unless there's some sort of program installed on the machine that records the activities (or there's a camera set up watching the screen), they can not see what's on the monitor. That said...given a good packet analysis tool, they can pretty much reproduce *any* non-encrypted traffic that leaves your machine. Emails, VoIP calls, video streams...it's all fair game. Encrypting the traffic does make it more difficult to spoof, but if they're in charge of the network, it's possible for them to MITM (man-in-the-middle) that encrypted session, especially if it's only SSL (used mainly for encrypting websites).
__________________
-- 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 |
#4
|
||||
|
||||
will using a proxy make me anonymous? won't that make me more vulnerable? foxyproxy with firefox ftw?
|
#6
|
|||
|
|||
end of the day it matters who big bro is.. if he has three letters. you are SOL either way...
|
#7
|
||||
|
||||
If it is the Military that is running the server that makes the hard connection to the World Wide Interweb, they sure can see everything going on at any particular computer.
I have seen the Comm Group people with a wall of monitors with randomly chosen computer screens showing exactly what was being done on each computer. There is no way they can live monitor every single computer at the same time, but they have the capability to mirror every single thing going on on all the computers.
__________________
If you haven't seen it with your own eyes, or heard it with your own ears, don't make it up with your small mind, or spread it with your big mouth. |
#8
|
||||
|
||||
When I was in SWA, a guy got busted for looking at pr0n on one of the PC's at our worksite. I don't know how they found out, but they did.
He went from E4 to E2 overnight.
__________________
This is my sig line. |
#9
|
|||
|
|||
Trying to cover your tracks can be viewed in a very negative way. service in and out of any military or government facility is heavily monitored for all the reasons that it needs to be. Even if they don't know it's you but see the traffic in especially if it's through TOR ect there going to find out wtf's going on just in case of espionage at the very least.
|
#13
|
|||
|
|||
If a simple computer tech in India can troubleshoot a computer in the US thru screen sharing session, they (military) definately has the capability to remotely look into your computer.
__________________
Dont just make a choice, be the person who makes the better choice. SA XD9, Kimber TAC II 45, Bersa Minifirestorm 9, 1858 Remington Pietta, 1851 Navy Pietta, M1 Garand, Stoeger coachgun |
#14
|
||||
|
||||
well yeah on a goverment PC it's obvious they'll get busted. but i was talking about people's personal PC's
|
#15
|
||||
|
||||
Quote:
In order to actually view what's being displayed on a computer's screen that info in it's entirety has to be transmitted to another machine over the network. This is done all the time. See here: Virtual Network Computing. Viewing someone's screen without their knowledge or permission would require you to install software of this type onto their computer and turn on the necessary network services without their knowledge. Doing this remotely is so close to impossible that it might as well be. However, any traffic you send or receive over the internet can be viewed by anyone with access to a computer positioned between you and the information source. See image below: Your computer would be any of the ones on the far right side, on the LAN. The machine labeled "Proxy Server" sits between your computer and the rest of the Internet. Anyone with access to the proxy server and the proper knowledge can see what you're sending or receiving over the Internet. If they have access to the proxy, it's a safe bet they know what they're doing. For instance, if you type "OMG i can haz pr0n" into the Google search box, they can view that text going out. They can also see all the pr0n that Google responds with coming back in. Are there ways around this to hide your privacy? Sure. Do you want to try to circumvent this setup at a .mil installation? Probably not. I'm sure you'll attract far more attention by attempting to hide what you're doing than by actually browsing a few pr0n sites. That, and unless you're absolutely certain that your Tiger Style is more powerful than your SysAdmin's Dragon Style, you're probably gonna get busted. --B
__________________
Need data recovery? CLICK HERE for a discount on your next recovery from DriveSavers! |
#16
|
||||
|
||||
you want to be sneaky with porn? get it sent in pieces. like a jigsaw puzzle.
of course someone who sends it in email/snail mail will have to get creative and not make it obvious by just cutting it in squares or sending it all at once. or hide it by painting over it with a water soluble ink. like get those porn jigsaw puzzles, and have them paint over it with water color to hide the real image and when you receive it, just wipe it with a moist towel and reveal the real picture. but then again i'm sure the mail guys in the military have thought of that too? |
#17
|
||||
|
||||
Quote:
All traffic in and out went through the corporate server. Every web address request from every machine was logged. Unacceptable sites were pre-blocked. Unlisted sites that generated a lot of traffic during working hours were visited by the IT staff. If they were not related to the business, they were added to the blocked list of sites. Also, all email communications routed through, and were stored, on the corporate Access server. The company had government contracts, so there was a requirement to store all emails whether the user deleted them or not. They didn't log the actual traffic... simply the destinations. If he was surfing pr0n, he was probably not doing it from Calguns. One of my first boss's duties involved programming. Some of his programming tools and references came from "questionable" sites... and more than once he was called into IT and questioned about accessing sites that were known for piracy/cracking.
__________________
- Rich |
#18
|
||||
|
||||
Quote:
__________________
------------------------------------------- Last edited by fabguy; 02-13-2010 at 8:32 PM.. Reason: spelling |
#19
|
||||
|
||||
Quote:
Protip: Most voyeur pr0n is staged. --B
__________________
Need data recovery? CLICK HERE for a discount on your next recovery from DriveSavers! |
#20
|
||||
|
||||
I heard that if you stick your right pinky in your left ear while smearing rotting bannanas on your face, it will block all outgoing signals from the chips "they" have installed in our brains.
__________________
NRA Certified Pistol, Rifle, Shotgun and Metallic Cartridge Reloading Instructor California DOJ Certified Fingerprint Roller Ventura County approved CCW Instructor Utah CCW Instructor Offering low cost multi state CCW, private basic shooting and reloading classes for calgunners. CCW SAFE MEMBERSHIPS HERE KM6WLV |
#21
|
||||
|
||||
Quote:
Thats not entirely true.... http://en.wikipedia.org/wiki/Van_Eck_phreaking
__________________
07/02 SOT specializing in AK, AR, FAL, MAC-10 rifle and pistol sales, roster-exempt pistols, Ruger LCP, XDM, Gen4 Glock, etc. Open Tues-Thurs 10am-5pm, Friday 10am-6pm, and Saturday 10am-4pm www.prkarms.org Contact us at: Sales@prkarms.org (559)283-8666 or find us on Facebook at http://www.facebook.com/prkarms The original PRK-Lock exclusive mag locks. Will not fail as other designs are subject to http://www.calguns.net/calgunforum/s...d.php?t=257154 |
#22
|
||||
|
||||
Quote:
Quote:
One good policy is to require MAC address registration before a computer can join the network. That way I know exactly which machines belong to which users, and figuring out who is surfing tijuanadonkeyshow.com during work hours is not difficult. Quote:
--B
__________________
Need data recovery? CLICK HERE for a discount on your next recovery from DriveSavers! Last edited by sfwdiy; 02-14-2010 at 10:59 AM.. |
#23
|
||||
|
||||
Quote:
Last edited by racky; 02-15-2010 at 12:50 PM.. |
#24
|
||||
|
||||
Quote:
so back to the pr0n, everyone send me their pr0n now that know it's unsafe. it's lonely here . so the whole foxyproxy thing isn't safe right? |
#25
|
|||
|
|||
Quote:
__________________
Invented/From California: The Internet and Personal Computer, Google, iPod, Intel, Apple, AMD, NVIDIA, Gen Jimmy Doolittle, Stealth Technology, National Semiconductor, Tiger Woods, P-80 Shooting Star, Ronald Reagan, Fairchild, M-16, porn, Raquel Welch, Yahoo, super-sonic flight, Angelina Jolie, Gen. George S. Patton, the personal computer CPU, Gordon Moore, Clint Eastwood, Anti-Matter, Electronic Warfare, Bruce Lee, supersonic flight, ceramic body armor, Jim Morrison, ... and this post! |
#26
|
||||
|
||||
Lol exactly! Well get ya some stuff! just pm youre shipping.We got ya! To answer youre question. EVERYTHING you do at a foreign base down to a fob is tracked and recorded. Especially fobs and bases in "combat zones" its not always about the "porn" and such mainly its to prevent the dissemination of critical information to the wrong people. yea the rules pertaining to porn and stuff kindof suck but theres a reason for everything..(well sometimes) but youre still safe checking your accounts and such, everything they do is monitored and those monitors are monitored..There just making sure no ones freely giving haji intel..
__________________
Embrace the suck. "If anything worthwhile comes of this tragedy, it should be the realization by every citizen that often the only thing that stands between them and losing everything they hold dear... is the man wearing a badge" -Ronald Reagan speaking of the newhall incident in 1970. |
#27
|
||||
|
||||
My neighbor is a dentist and he says it's in the fillings of your teeth. He said they can track every movement you make, and everything you do. So they even know about The hair growing from your palms. muhahahaha...
__________________
------------------------------------------- |
#29
|
|||
|
|||
"Even if it were just someone surfing pr0n, they have your IP address on every web page request and it's a simple matter to sniff the other packets you send on a daily basis to identify you. Your email packets would have that same IP address on 'em, etc"
Not always. Depending on the DHCP lease-time, you can have a different IP on different days. And if you use, say, a Linux machine and change the MAC on your wireless card, you could browse for hours without being caught (changing your MAC every time you're blocked). Note that I do NOT recommend doing this, as you *will* get caught if you set off enough red flags. They may not be able to track you via the normal monitoring, but what they *can* do is triangulate your position fairly accurately. Then, all it takes is the guy pulling the camera feed, seeing you, and you'll have a nice little visit by your local MPs. This is why you have friends with thumb drives back state-side.
__________________
-- 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 |
#30
|
||||
|
||||
Al Gore is Big Brother?
__________________
Disenfranchised NRA Benefactor Life Member. |
#31
|
||||
|
||||
Nahh... he's being serious.
The internet was originally (mid '70s) constructed for communication between military and educational institutions. It was a DARPA project, commissioned in 1958 after Sputnik flew. The first web server was set up around mid 1991. In mid 1994, it was still only getting around 100k hits per day. The WWW was a CERN project.
__________________
- Rich |
#32
|
||||
|
||||
Use an encrypted proxy and they wont know what you're doing on the net.
__________________
Oppressors can tyrannize only when they achieve a standing army, an enslaved press, and a disarmed populace. -- James Madison The Constitution shall never be construed to authorize Congress to prevent the people of the United States, who are peaceable citizens, from keeping their own arms. -- Samuel Adams, Debates and Proceedings in the Convention of the Commonwealth of Massachusetts, 86-87 (Pearce and Hale, eds., Boston, 1850) |
#33
|
||||
|
||||
Quote:
The connection to the proxy would be logged and probably investigated. Every outside destination IP address is logged if the gateway's server is configured to do so. There's a good possibility that the destination IP addresses for known encrypted proxies would be blocked.
__________________
- Rich |
#34
|
||||
|
||||
Student claims school spied on him via computer webcam
|
#35
|
||||
|
||||
you guys think you need th enetwork to see what someone's doing?
you should read up on van eck phreaking. cliff notes is you intercept the radio signal bleeding from the monitor / video cable, and decode that into the original signal. someone can see your monitor from whatever range they can catch the signal at. |
#36
|
|||
|
|||
I'll believe it when they make the specs public.
"OMG, dudz, we can spy on your monitorz with our l33t super secret intercept gadget." I'm skeptical. Not saying it can't happen...but I'm skeptical until there's actually independent research done to verify.
__________________
-- 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 |
#37
|
||||
|
||||
if you're talking about my post on van eck phreaking, look it up. very possible to do.
|
#38
|
|||
|
|||
I did look it up.
I want to see a system that works from across the street. I'm not saying it's not possible, but everything I've read is purely theoretical (or in the case of the eckbox implementation, only works when you are right next to the monitor). Give the strength of the signals leaving the monitor, you'd need a very large array of antennas to capture the signal in any meaningful fashion. It's cool from a theoretical standpoint, but until I see an actual practical implementation, I will remain skeptical.
__________________
-- 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 |
#39
|
|||
|
|||
Quote:
|
#40
|
||||
|
||||
Quote:
__________________
Oppressors can tyrannize only when they achieve a standing army, an enslaved press, and a disarmed populace. -- James Madison The Constitution shall never be construed to authorize Congress to prevent the people of the United States, who are peaceable citizens, from keeping their own arms. -- Samuel Adams, Debates and Proceedings in the Convention of the Commonwealth of Massachusetts, 86-87 (Pearce and Hale, eds., Boston, 1850) |
Thread Tools | |
Display Modes | |
|
|