Results 291 to 300 of 411
-
April 17th, 2018 12:05 AM #291
Snowden and Tor - might not be the same as you and me using tor.
snowden might have a tor end node from a trustworthy friend or accomplice.
it is only *reliable* if you know the end node is reliable.
-
April 17th, 2018 12:14 AM #292
Come to think of it. Tor always defaults to eu. It just adds another layer of security since the public ip is located somewhere ala vpn.
For all we know, the tor server where the data is transmitted to and from is also collecting data.
Sent from my BLL-L22 using Tapatalk
-
April 17th, 2018 02:06 AM #293
Well, that's why you have a whole suite of security products working for you. You won't have to sacrifice convenience for security.
I guess you're not of interest to them.
Are you still studying?
Don't tell me you've stopped learning?
When mobile, like at the airport, I simply call my agent in Hong Kong to prepare the contract for the factory in Chaozhou and have it faxed or emailed to me. I'll sign it later or he can sign it on my behalf.
People can do the work for you in the office you know. Lol
You still have to connect to an email service to receive the documents. Also, some fax machines can store a finite number of pages that was either sent or received. I'm sure you've taken great lengths into ensuring that no unauthorized copies of your docs exists?
Sorry, it's just not the case for me. I can still work fine, no problem. How hard would it be copying files from USB to USB? Thanks for the advice though.
Firewall? Anti Malware/Spware/AV? Are you kidding me?
Data security, similar to data privacy, is a concerted effort of different disciplines and solutions working together.
You know how much time is wasted cleaning the virus or malware? When you thought you've cleaned it, it pops up again in your browser. You don't know what files it has infected in your system. What is worst is that after cleaning, your system does not work fine anymore. Either it freezes on you or simply too slow to work on. You then do some troubleshooting and hairpulling. The best remedy for this is to simply nuke the hardisk and start from backup. How many hours wasted.
You talk about productivity loss, this is productivity loss.
If you think this can work effectively, why would Snowden use TOR?
Though, I'm not oblivious to the concept. I use a VPN service if I need anonymity. I can just "show up" anywhere around the world, if I wanted to. I just pick the country I need to be in and boom! Beam me up, Scotty!
Good luck on your backups though. I never have to do that anymore due to an attack or infection. I do it because the hardisk is going to go anytime. Lol!Last edited by oj88; April 17th, 2018 at 02:12 AM.
-
Verified Tsikot Member
- Join Date
- Dec 2017
- Posts
- 1,018
April 17th, 2018 05:12 PM #294
-
BANNED BANNED BANNED
- Join Date
- Sep 2015
- Posts
- 13,917
April 17th, 2018 05:47 PM #295
-
Verified Tsikot Member
- Join Date
- Dec 2017
- Posts
- 1,018
April 17th, 2018 05:48 PM #296The don't work all the time. Eset, Norton, Avast, Malwarebyte, Commodo, etc. You name it, I've tried it all.
They can still see you.
I guess not. I'm well-behaved on the Net. Unlike some people I know.
I presume that all your 'people' follows the same security protocol as you do? Namely, one computer for work, another one for online use?
You still have to connect to an email service to receive the documents. Also, some fax machines can store a finite number of pages that was either sent or received. I'm sure you've taken great lengths into ensuring that no unauthorized copies of your docs exists?
You can receive fax in your computer via fax/modem. It doesn't have to be a fax machine.
You obviously haven't had the misfortune of a USB drive die on you. Or the idea that it actually makes it easy for viruses and malware to propagate through USB.
They don't even need malware/spyware/virus installed in your system in order to spy on you. There mere fact you're connected to the internet, that's more than enough. No need to go through all that hassles.
Thus, I only use Tails. They'll be hopping from South Africa to China to Israel ot India, computer to computer and it will frustrate them and they will simply move to an easier target. I'm a waste of their time.
I kid you not. I hope you're not that ignorant about data security tools. As with physical security, wherein you have a main gate, probably some CCTVs, an alarm, guard dogs, security personnel, a deadbolt on the front door, etc., data security is deployed in layers. The network layer is protected initially by your firewall. Malware and other viruses are caught by the UTM. Wickedly evil attachments are caught by your email server's anti-spam and anti-malware engines. Any surviving threat or threats that got through the other layers, or virus payloads that entered through the USB drive (aha!) or from network file transfers are taken cared of by your local AV and personal firewall (endpoint or client protection).
For being one of the world's most wanted high profile individual that is actively being surveilled, tracked, and pursued by the US government, I would too. But that is not the case for the great majority of people using the Net.
If fact, I'm using Tails right now typing this out.
TOR was turtle slow before. It's hardly usuable. Now, it's rather fast. Perhaps, it's my connection.
If you really want to be safe online, either turn off your modem or use TOR.
However, most people do not bother turning off their modem. They just leave it unattended when not in use or when they are sleeping. Your connection is open 24/7 for possible attacks and eavesdropping. So, kindly turn off your modem every time you don't use it. You'll be adding more security to your system.
-
Verified Tsikot Member
- Join Date
- Dec 2017
- Posts
- 1,018
April 17th, 2018 05:53 PM #297I have credit cards. But, no to ATM. I've heard a lot of horror stories with regards to that. The bank can't even protect you. Passbook all the way for me. It's really much safer if you have paper evidence of deposits and withrawals, machine validated by the pretty teller, face to face, eyes to eyes, smile to smile, with CCTV cameras on you. Lmao!
-
BANNED BANNED BANNED
- Join Date
- Sep 2015
- Posts
- 13,917
-
April 17th, 2018 10:08 PM #299
-
Verified Tsikot Member
- Join Date
- Dec 2017
- Posts
- 1,018
April 18th, 2018 10:48 AM #300A reliable cc company should text and email you on every transaction made on your cc, small or big. They should also have an anti-fraud department to monitor your buying pattern and should it detect something odd, they will notify you immediately. If it's a fraud attempt, they will cancel your cc and issue you a new one. When buying online, they should have an OTP system, where they text you a one time pin (OTP) so you can complete the payment.
Always keep your cc safe. If you are going to places like Divisoria, leave your CC at home. Just bring cash.
https://www.autoindustriya.com/auto-industry-news/nissan-confirms-van-partnership-with-mitsubishi-fo...
Mitsubishi Philippines