Zum Inhalt der Seite gehen

Story: https://www.404media.co/the-200-sites-an-ice-surveillance-contractor-is-monitoring/
Nothing is safe on US servers
A contractor for Immigration and Customs Enforcement (ICE) and many other
U.S. government agencies has developed a tool that lets analysts more easily
pull a target individual's publicly available data from a wide array of sites, social
networks, apps, and services across the web at once, including Bluesky,
OnlyFans, and various Meta platforms, according to a leaked list of the sites
obtained by 404 Media. In all the list names more than 200 sites that the
contractor, called ShadowDragon, pulls data from and makes available to its.
government clients, allowing them to map out a person's activity, movements,
and relationships.

LukefromDC hat dies geteilt

The fact that Onlyfans is on the target list is especially nasfy, may be Christian nationalists at work.

On the other hand, this program may create opportunites to set traps for ICE at vacant-or at MAGA-addresses
nothing is truly safe online now thanks to the US....
this has been true for decades.

Not being pedantic, I just don’t think a lot of people actually read documents that are out there and instead settled for summaries that barely covered anything.

State governments run more TOR exit nodes than anyone else, too.

Proceed with caution everywhere, block whatever telemetry and trackers you can, and lobby your governments to eliminate data brokers that make categorization, tracking, and the sale of your private data easier.
Tor was designed to protect the US Navy from internet surveillance in opposing or backstabbing allied ports. It is designed to exit nodes (some of which will alwaysnbe malicious) cannot see the user or the entry point.

Main way to deanonymize a Tor user is to use malicious JS added to the site whose users you are attacking. This can be used to send a computer's identifying into to any arbitrary server. Not allowing a site to use JS at all defeats this, some payloads work onlybon Windows or (probably now) Android or iOS, and a Whonix setup that forces all network access to Tor still prevents the intended non-Tor connection from actually going arou d Tor.

We know this from the Freedom Roads hosting case.

On Tor or not, you need to block all of the ads and trackers unconditionally, and exile anything that breaks to another machine. Do not subscribe to anything, do not shop wirh credit cards, and do not shop online wirh your "spicy" machine/phone and OS.

Treat every ad supported site as malicious, treat FB, Google, other corporate social media as especially malicious. Do not use Chrome.or Google Maps. Do not use Google/Apple pay as they prove ownership of a phone. Banking apps probably do this too. Treat all data brokers as doxxing sites.