PDA

View Full Version : Attempted Setup of Luke Rudkowski




Peace Piper
07-04-2013, 02:42 AM
Attempted Setup of Luke Rudkowski


http://www.youtube.com/watch?v=zislzpkpvZc
http://www.youtube.com/watch?v=zislzpkpvZc

Luke's channel:
http://www.youtube.com/user/wearechange/videos

JK/SEA
07-04-2013, 09:45 AM
ok...maybe Luke should file a complaint, get a lawyer, hire an investigator to find out who sent the email, then go after the 'terrorists' who hatched this plan....

ladyjade3
07-04-2013, 10:15 AM
yikes

green73
07-05-2013, 08:09 AM
crazy.

Warrior_of_Freedom
07-05-2013, 08:25 AM
Ok first problem, the e-mail came from TOR. That place is full of illegal material. I wouldn't touch it with a 1000000 foot stick.

Also, isn't NOT opening attachments from anonymous senders one of the first rules of the Internet?

Petar
07-05-2013, 08:34 AM
Even if a program just previews an email image that someone sent you, it is still downloaded to your hard drive in that case.

Luke needs to do some serious hard drive clearing I guess...

Warrior_of_Freedom
07-05-2013, 08:40 AM
Even if a program just previews an email image that someone sent you, it is still downloaded to your hard drive in that case.

Luke needs to do some serious hard drive clearing I guess...

technically it does cache it but that doesn't show any intent of downloading the images. Though the courts don't care about the law anymore so they'd convict him either way. Probably opening the e-mail is enough for them and his confession that he actually saw the images will be used against him. Viewing a crime is now illegal.

Reason
07-05-2013, 09:56 AM
Creepy how easily our lives can be destroyed by the state.

Peace Piper
07-05-2013, 01:46 PM
Even if a program just previews an email image that someone sent you, it is still downloaded to your hard drive in that case.

Luke needs to do some serious hard drive clearing I guess...

He said as soon as he saw it was an email from a TOR server he logged in from another computer not connected to him.

Luke has been at this for awhile. Anyone that can figure out how to get in Henry Kissingers face (more than once) isn't stupid.


http://www.youtube.com/watch?v=lOgiZ0PZvvA

pcosmar
07-05-2013, 01:56 PM
Ok first problem, the e-mail came from TOR. That place is full of illegal material.
Illegal Material??
TOR is a routing system,, for anonymity. I have used it. It has nothing to do with Legal/Illegal.
It is about self defense


Also, isn't NOT opening attachments from anonymous senders one of the first rules of the Internet?

I open a lot of stuff. just out of curiosity. and to understand the threats that are out there.
I don't use an Operating System that is in any way affected by doing so.

Oh,, and I also have a DOD security level delete. (overwrite)

I am wondering if he has found out who the sender is?

Warrior_of_Freedom
07-05-2013, 02:01 PM
Illegal Material??
TOR is a routing system,, for anonymity. I have used it. It has nothing to do with Legal/Illegal.
It is about self defense



I open a lot of stuff. just out of curiosity. and to understand the threats that are out there.
I don't use an Operating System that is in any way affected by doing so.

Oh,, and I also have a DOD security level delete. (overwrite)

I am wondering if he has found out who the sender is?

but in this case someone received illegal material. It had nothing to do with getting a computer virus

I was also under the impression TOR had some sort of hub where people can post links to stuff, kind of like craigslist. What I saw in the youtube about it anyway

CPUd
07-05-2013, 02:20 PM
There is a lot more to the web than that which immediately meets the eye.

In fact, the "visible" layer of the web that you and I can easily access via popular search engines is only part of the story.

Hidden on the net is online content which is not so easily accessed, known as the Deepnet (also sometimes called Darknet, the Deep Web or Hidden Web).

Whilst a lot of this content consists merely of websites not indexed by search engines and only accessed by a handful of people, some parts of it are hidden a lot deeper.

A part of the Deepnet is accessed through the anonymity network known as Tor.

Originally sponsored by the US Naval Research Laboratory when released in 2002, Tor is widely used around the world for protecting anonymity online.

Visiting a website through Tor re-routes your connection through a randomised path of other Tor users' computers before reaching the target web server, effectively hiding your originating location from that server.
...

http://nakedsecurity.sophos.com/2012/12/06/tor-deepnet-anonymity/

pcosmar
07-05-2013, 02:33 PM
What I saw in the youtube about it anyway

Well then,, that explains it.
A youtube video couldn't be possibly full of shit.

https://www.torproject.org/

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.

Now it is possible for tor exit nodes to be compromised,, but that is another issue.

Warlord
07-05-2013, 04:57 PM
If he did happen to download it and then view the CP he could just ditch the laptop or leave it with a trusted contact and re-enter the US without worrying about felony charges .

Why would you take the chance? you'd just ditch the laptop if this happened.

Warlord
07-05-2013, 05:00 PM
Well then,, that explains it.
A youtube video couldn't be possibly full of shit.

https://www.torproject.org/


Now it is possible for tor exit nodes to be compromised,, but that is another issue.

There are sophisticated attacks that be done, Location one is the biggest problem and ISPs in a certain state/city turning over the list of people using TOR. So few people use it from there and with the list from the ISP they can track down who is likely using it and monitor them through the exit nodes

TOR is not full proof . I'm guessing to make it more secure you need a reliable proxy,

tangent4ronpaul
07-06-2013, 11:05 AM
There are sophisticated attacks that be done, Location one is the biggest problem and ISPs in a certain state/city turning over the list of people using TOR. So few people use it from there and with the list from the ISP they can track down who is likely using it and monitor them through the exit nodes

TOR is not full proof . I'm guessing to make it more secure you need a reliable proxy,

Roughly half a million users in a world population of ~6 billion ppl.

https://metrics.torproject.org/users.html

-t

Warlord
07-06-2013, 12:06 PM
Roughly half a million users in a world population of ~6 billion ppl.

https://metrics.torproject.org/users.html

-t

And if say 30% of the traffic is in the US that's less than 6,000 people per state. See how easy it is to pinpoint someone with a list from an ISP? So if you want to remain even more secure use a trusting proxy in a location that doesn't turn over your info to the Feds.