404 Media has obtained the list of sites and services that ICE contractor ShadowDragon pulls data from. ShadowDragon sources data from all over the web and lets government analysts easily search it and draw connections between people.
Not being pedantic, I just don’t think a lot of people actually read documents that are out there and instead settled for summaries that barely covered anything.
State governments run more TOR exit nodes than anyone else, too.
Proceed with caution everywhere, block whatever telemetry and trackers you can, and lobby your governments to eliminate data brokers that make categorization, tracking, and the sale of your private data easier.
Tor was designed to protect the US Navy from internet surveillance in opposing or backstabbing allied ports. It is designed to exit nodes (some of which will alwaysnbe malicious) cannot see the user or the entry point.
Main way to deanonymize a Tor user is to use malicious JS added to the site whose users you are attacking. This can be used to send a computer's identifying into to any arbitrary server. Not allowing a site to use JS at all defeats this, some payloads work onlybon Windows or (probably now) Android or iOS, and a Whonix setup that forces all network access to Tor still prevents the intended non-Tor connection from actually going arou d Tor.
We know this from the Freedom Roads hosting case.
On Tor or not, you need to block all of the ads and trackers unconditionally, and exile anything that breaks to another machine. Do not subscribe to anything, do not shop wirh credit cards, and do not shop online wirh your "spicy" machine/phone and OS.
Treat every ad supported site as malicious, treat FB, Google, other corporate social media as especially malicious. Do not use Chrome.or Google Maps. Do not use Google/Apple pay as they prove ownership of a phone. Banking apps probably do this too. Treat all data brokers as doxxing sites.
Lazarou Monkey Terror 🚀💙🌈 •
The 200+ Sites an ICE Surveillance Contractor is Monitoring
Joseph Cox (404 Media)Lazarou Monkey Terror 🚀💙🌈 •
LukefromDC hat dies geteilt
LukefromDC •
On the other hand, this program may create opportunites to set traps for ICE at vacant-or at MAGA-addresses
Lazarou Monkey Terror 🚀💙🌈 •
dotsie •
Not being pedantic, I just don’t think a lot of people actually read documents that are out there and instead settled for summaries that barely covered anything.
State governments run more TOR exit nodes than anyone else, too.
Proceed with caution everywhere, block whatever telemetry and trackers you can, and lobby your governments to eliminate data brokers that make categorization, tracking, and the sale of your private data easier.
LukefromDC •
Main way to deanonymize a Tor user is to use malicious JS added to the site whose users you are attacking. This can be used to send a computer's identifying into to any arbitrary server. Not allowing a site to use JS at all defeats this, some payloads work onlybon Windows or (probably now) Android or iOS, and a Whonix setup that forces all network access to Tor still prevents the intended non-Tor connection from actually going arou d Tor.
We know this from the Freedom Roads hosting case.
On Tor or not, you need to block all of the ads and trackers unconditionally, and exile anything that breaks to another machine. Do not subscribe to anything, do not shop wirh credit cards, and do not shop online wirh your "spicy" machine/phone and OS.
Treat every ad supported site as malicious, treat FB, Google, other corporate social media as especially malicious. Do not use Chrome.or Google Maps. Do not use Google/Apple pay as they prove ownership of a phone. Banking apps probably do this too. Treat all data brokers as doxxing sites.