UnpopularPavilion | 31 points | Nov 21 2016 02:47:32

After our latest 'honey pot,' can a cyber security pro give us a run-down on the possible legal ramifications of digging around? Questions inside.

Should we be using a computer or mobile [redditisfun] for digging around?

Is it recommended to use a VPN?

I've taped up my PC camera. Should my mobile be covered, too?

Should we purge personal information on our terminals for safety? Social media, photos, etc.

Does possessing copies, screenshots, etc. put us in legal danger? Should they be removed from devices and left in drop boxes?

Thanks for your help. I am just a concerned citizen trying to help.

permalink

TigerFan_in_BR | 10 points | Nov 21 2016 02:57:15

If you download child porn onto your computer, that is a CRIME.

It can be retrieved by authorities using special software as well.

They (authorities) have also created websites with child porn on it and it contains viruses that'll send your name/address to authorities.

So, yes, don't click on blind links or download anything that you think crosses a line.

permalink

UnpopularPavilion | 4 points | Nov 21 2016 02:58:29

Of course. The only information I've saved are screen shots of screen shots and some of the information maps for quick reference.

My next question is, could those image files contain malware that could infect a computer or mobile?

permalink

PM_UR_DARK_SECRETS | 2 points | Nov 21 2016 03:44:40

http://stackoverflow.com/questions/9675941/how-can-a-virus-exist-in-an-image

permalink

UnpopularPavilion | 1 points | Nov 21 2016 04:30:44

Thanks.

permalink

safebrowseatwork | 8 points | Nov 21 2016 03:11:12

I posted elsewhere:

If you need to remain anonymous, then you need to not:

TOR is owned top-to-bottom, left-to-right but is probably worth using.

People who are serious about anonymity don't make the same mistakes DPR made. They don't use the same connections and they don't use a computer purchased digitally which can be tracked; at the very least, they buy computers in cash, anonymously. At the very least you should use a VM with a USB wireless card (which has a NEW MAC) and on a new connection unrelated to you if you want to get into the nitty gritty; however, that's dangerous and you might stumble upon CP or worse if you dig too deep in the wrong areas. I'm more inclined to let other people dig and then, myself, verify. I do not want to get popped for anything.

I'm willing to bet the majority of people here have little-to-no background in Cyber Security and need to be far more careful in their actions.

Recall that anonymous got people in legal trouble with LOIC. Not trying to scare people but just be aware of what you're doing, everyone needs to be informed about their actions and what they might do.

Click the wrong link, you've accidentally downloaded CP; open the wrong PDF, owned; browse the wrong website, get drive-by or watering hole popped; have JavaScript enabled, instant malware install - this happened during TORpedo aka tor pedo - hunting pedos on TOR.

Dig, research, but KNOW how to partially obfuscate your actions if need be. Please do research before acting.

Don't DOX, beware of accidentally participating in raids or attacks as you can be tracked and punished.

Be smart; analyze everything - slowly & methodically.

permalink

UnpopularPavilion | 1 points | Nov 21 2016 04:30:17

My dox was a factory reset on mobile. Is that excessive?

permalink

safebrowseatwork | 1 points | Nov 21 2016 04:35:37

What?

permalink

UnpopularPavilion | 1 points | Nov 21 2016 04:47:32

You said don't 'DOX.' I am not computer literate. Is a DOX on mobile just simply factory resetting?

permalink

safebrowseatwork | 1 points | Nov 21 2016 05:00:45

I can't tell if you're fucking with me because this is a really naive question, but: https://en.wikipedia.org/wiki/Doxing

permalink

UnpopularPavilion | 1 points | Nov 21 2016 05:06:03

LOL I am dumb. I should've just googled. Sometimes when im on reddit for awhile i forget its the internet and not a conversation, lol. Never mind.

permalink

sleuth_bear | 5 points | Nov 21 2016 02:54:00

mh im no expert, but what i have seen here is for e.g. that someone says he saw something suspicious on a twitter account which was new, and clicking onto this link led to cp. Maybe he was just a bit careless or just ctr trying to lure us into illegal stuff. be careful

permalink

UnpopularPavilion | 1 points | Nov 21 2016 02:55:48

Either way. I think this is a good opportunity for us to take a step back and remember that if indeed there is such an evil force, then that's the one were up against.

permalink

LaheyRandyCorey | 5 points | Nov 21 2016 02:57:46

I quote you the right column of the sub: "ATTENTION: Make sure you protect your anonymity. This is not a joke. For at least 30 years if not longer the things we are researching have perpetually been covered up by all of the most powerful people and organizations all over the world and has lead to people disappearing! | I highly recommend using Tor and a VPN, a reddit throwaway account is not a bad idea either!"

permalink

UnpopularPavilion | 1 points | Nov 21 2016 02:59:09

I don't know how I missed that. Thanks.

permalink

UnpopularPavilion | 2 points | Nov 21 2016 02:59:35

I'd also give you gold but no chance I'm linking my CC information here heh

permalink

SillySnoot | 5 points | Nov 21 2016 03:24:46

If it truly is, then its a stupid honeypot. They would have kept the link up longer and tried to leak it under less suspicious circumstances. Hardly anyone will go near that shit with a 10 foot pole. Honeypotting with an entire description that what they will be downloading is legit CP and from such a seemingly unexperienced source... Yeah i'm not buying the honeypot sliding threads.

permalink

whatshouldidowithmyl | 2 points | Nov 21 2016 07:55:29

Spin up virtual machines, use proxies, set up some sort of a vpn probably. The important thing is to not save anything directly on a local drive. If you find documents, only download them in a virtual machine so you can hopefully encrypt the virtual hard disk file.

You absolutely have to understand legal ramifications. Arguing white hate hacking from this point of view could be incredibly difficult. If you get yourself in the wrong position, you could be facing serious criminal charges.

permalink

wizacre | 2 points | Nov 21 2016 12:50:49

I am not an expert, but I will comment on this:

Does possessing copies, screenshots, etc. put us in legal danger?

Possession of child pornography is a crime.

Furthermore, it is a crime that is favored for taking down people who are doing things that more powerful people do not want done.

Digging into CP is a massively risky game.

permalink

[deleted] | 0 points | Nov 21 2016 03:04:01

[deleted]

permalink

safebrowseatwork | 2 points | Nov 21 2016 03:12:37

I'd say "this is the US Govt, the people capable of Stuxnet." Beware leading people into other conspiracies when they are unrelated. You don't want to turn people off who may otherwise be sympathetic to the "cause."

permalink

[deleted] | 1 points | Nov 21 2016 03:16:52

[deleted]

permalink

safebrowseatwork | 1 points | Nov 21 2016 03:25:54

There's good people everywhere. Look at Schindler.

permalink