It anything suspicious occuring that might point to thismpossibilty? I rember they did this to a pedo site. Does it seem reasonable to suggest that something like this may have occurred?
What if LE injected some kind of malware from hansa to windows mac or tails os.?
It anything suspicious occuring that might point to thismpossibilty? I rember they did this to a pedo site. Does it seem reasonable to suggest that something like this may have occurred?
[26 Points] throwathrowanz:
[2 Points] macshouse2017:
Im not trying to speculate or cause fud but i havent been following the strangeness of various stories today and others probobly have. Perhaps it might be a good to keep an eye on reports that might suggest malware has been used because i think thats easy for them to pull off.
It might be an idea to download tails and just hold it without doing anything just yet? Any network specialists here might be able tell if a device such as tails could be monitored for any malware data coming of the tails device?
[2 Points] wombat2combat:
you mean malicious js code to de-anonymize user. since we have not heard about it, I think it is unlikely that they actually did it. at least at a big scale. maybe the applied it to some key users [high profile vendors and market staff]
but keep in mind that such possibilities for law enforcement do not grow on trees and will not be wasted. i.e. these higher profile users probably all have js disabled by default and if they would actually realize that they get attacked, the whole operation would be useless and law enforcement wasted their precocious exploit.
[1 Points] macshouse2017:
If you a user or vendor that used hansa along with tailsos (or win/mac) during during the period of time that the le were in control of hansa u should assume that these le punks have field with the site.
It doesnt seem right theyd only target the auto encrpt feature failtards because the biggest fish most likely manually encrypt.
his would give LE the oportunity perhaps not only get hansa data but keystroke data on tails, keypass data and pgp data.
Theyd have to think it wasnt enough of a honeypot to capture just failtards. They may habe have had a second exploit that now owns your tails. Its a simple enoug h idea.
The possibility of your current tailsos might be compromised but get another tailsos, perferably from second location just in case your entire network is infected idk.
Dont put the new tails os on your network or machines just yet.
We need somebody t hat tell us how we could check ourselves or something else
[1 Points] dts-NOW:
[1 Points] ice_cream4breakfast:
I'm such that's what the deal with the spreadsheet time lock files was about. The day they went down they told everyone there was strange server activity and to download their time lock files
[1 Points] Not-lying-to-you:
Check me for ticks ... I mean, Tails.
I'll inject some malware into you in a minute