Objection: It's not the one between the keyboard and Chair... It's the one between the head and the keyboard. As long as you are not giving the wrong head (pun intended), and your head is in the "right sockets" - you should be fine. Probably. Maybe.
I personally knew a couple of the low level guys caught in DEA operation Adam B0mb, which targeted Farmers Market/AdamFlowers- they literally never shut up about it and went to the post office daily to pick up a large package and drop off smaller ones, tweaking constantly on MDMA. Turkish mafia connections got it to Canada then to them for further distribution. The rest is honestly more than I should know and definitely shouldn't talk about. Absolute morons tbh 😂
You don't ever say anything to the cops without an attorney present and you never give consent to search anything again unless your attorney is present. Common sense.
Great advice ! Also if the cops persist with a search you can say " I do not consent but I will not resist ", this doubles up your protection and puts the burden on the cop to prove why they did this in court.
@Orthaluminox No, common sense means someone that has a sense of self preservation that is in the most basic way possible, common as in common people. Education gives you common sense.
Sooo...anyone know about any hating going on? I'm just one of you guys...and was wondering if anyone knew about some illegal activities I could be a part of...
This reminds me of that scene from the Simpsons where Mr. Burns and Smithers go through very elaborate security to get to a special room, only to find an old ratty screen door open.
That's insanely Apt because it describes TOR perfectly. People go through so much setting up their security, then they use the thing created by the US Government for their illegal activities. People really think the Government doesn't have an old screen door they can go through in it?
It was not made by the government but the navy, and we know how it works. The problem now is who controls the nodes and those in fact are now controlled by a lot of law enforcement over the globe and a few activists. No screen dor though.
Whether you're a hacker or just a standard citizen, I've always been of the opinion that more people need to follow the old internet rule of never giving any personal information out online. It seems like ever since the rise of social media, and now every website requiring you to sign up with email and other verification info, people have completely forgotten this.
True but depending it could be just as unsafe IRL. If your going to commit crimes I would suggest not telling anyone anything, not even family. The most successful usually dont have a "home" so as to not be recognized. It could be some mundane fact about you you told someone that ends up leading them to know your name and all that. On the streets a little harder with anon names, but if that gets connected to you or your name. its all the same. Lots of the street dudes flip fast, and half of them informants that will still break the law themselves trying some in to thinking its ok because he's breaking the law in a show solidarity or something.
It never ceases to amaze me the mistakes that otherwise brilliant hackers make. As for the guy that got caught by saying he was busted for weed, give out info like that, but make sure it's a lie. That way they will spend time chasing lies and not find anything.
didnt realise this channel was about protecting and giving tips to criminals . i thought it was about privacy from a citizens standpoint . who cares if they get caught . they scam old people and ransomware hospitals . let em rott in jail .
It can also make you realize that these hackers are not geniuses or brilliant. The thing used against them is exactly the thing they use to hack others. Social engineering is 95% of hacking. If these people make such mistakes you bet your ass that the average human makes a magnitude more mistakes.
Look, the cops don't really do much police work. Those insipid cop shows, where there's an investigator who investigates? Copaganda. No, cops get lucky when somebody shoots their mouth off, then they threaten that person and get them to violate their own civil rights by snitching on themselves, and then they make you snitch on your friends. Worst part? They'll promise that if you cooperate you'll get less time in the Scumbag Warehouse, which you'll find out at your sentencing was a total lie. Thanks for pointing out Basic Opsec.
@@MicahThomason domestic law enforcement agencies do infiltrate and try to get you to do stuff to damage your politically/socially/economically aligned movement. FBI killing black leaders like mlk and malcolm x or getting people like tim mcveigh to orchestrate a bombing whose supplies appeared out of thin air with no possible method of tracing them despite proof presenting otherwise.
Anyone who's considering using a VPN with Tor out of paranoia would be better served by just adding one more hop to their Tor circuits, which is a setting you can change. It's allowed to be up to 8, that's like 5 VPNs! note: the extra hops can see the circuit is longer than normal
@@honor9lite1337 The Feds say that 100% of the time, when someone is doing something on a coffee shop network, and they go door-knocking, the suspect confesses. Lol.
The way I explain it to people is imagine youre on a shopping website and you go over to a filter and select your options for a new pair of shoes. Every specification for those shoes limits the total options. Blue/white, Running, adidas, slip-on. After you put all those in you go from 100 brands to 10. Well this is how say the FBI finds you. You tell a story or talk in bits with people every bit of information narrows you down. "I went to wegmans with my parents and grandparents after I got off work at the autobody shop, theyre used to shopping at publix, but they liked the store" Thats narrows down their list of suspects drastically. We're looking at someone who probably lives in the northeast because he shops at wegmans that has family in the south/southeast because they shop at publix, works as an automechanic, parents are likely not divorced, grandparents are alive, so likely younger than 50, etc etc.
Hahaha, I can't believe folks have to learn this the hard way when it is common sense. Always make an opsec plan and stick with it. If you have to say anything about personal stuff, always go with a total random non related answer. Hello from Nauru, love your channel!
@@gudneighbour Thats where most people slip up, which I find surprising. You'd think people would be MORE careful when typing out their ideas but thats not the case in many instances.
100% agreed. Best OpSec is to not say anything at all. And if you really need to say something, make sure you lie about everything and occasionally contradict yourself about your personal information. Today I'm from Germany, tomorrow I'm from Vietnam.
and if you're american, force yourself to use words like colour and specialise etc. since otherwise you just come off as american since nobody else had their version of english devolved like that thanks to cost-cutting in the printing industry
Keep a regular job, buy appropriate( not more than a normal job could afford) amounts of gold bullion each month , use cash as much as possible, put large purchases in others names, and SHUT YOUR MOUTH. if you are making a lot , stack your gold/cash for 10 years after the fact
@@ellwoodwolfput it in bitcoin. Build credit. Use credit to start a successful buisness. Depending on how much money you got or how successful you buisness is, start washing dat money🥵🥵😂
48 Laws of Power, Law 4: Always Say Less Than Necessary. Besides creating an impression of great import, saying little avoids the risk of saying something foolish, which can be costly
Most people have an ego and need to brag about their stuff, that lies in the nature and only the most disciplined can come over that and become true Chads. They won't be praised, they won't be recognized, but most importantly, they won't get caught.
@@Mr.SnakySnake Maybe if you're talking about Gus and Mike. Walt had a gigantic ego and couldn't just keep his mouth shut about Gale not being Heisenberg.
@@barongerhardt poes law isnt an excuse to make it as hard as possible to tell if something is a joke and then dump all the blame on anyone who gets confused
When the point of speech is to be heard, hearing can hardly be called spying. But spies will certainly be happy if you hand them the information they want on a silver platter.
It's always the same stuff when these people get caught. They get too comfortable while doing illegal stuff. The ones who don't get caught don't bring up any true information about their real lives and treat their hacker identity as a completely separate person who may even need to be replaced by another identity if things get too spicy. You don't hear stories about the smart ones, though, because they don't get caught unless they're *really* wanted by the government.
12:40 The best way I’ve found to convey how stupid it is to talk to the police is this: The absolute best case scenario resulting from talking to the police about something you are being charged with is that the interview is not played in court. If you successfully manage to not make a *single* contradictory or suspicious statement during the several hours of gaslighting and manipulation you will be subjected to, the investigator won’t show up to court and say “Yeah that guy had a solid interview.” They just won’t be there. Again, this is the best case scenario and it is far from guaranteed. You will stutter. You will say something stupid. Want to know a 100% tried-and-true method to ensure the interview cannot be played in court? Don’t talk to the police.
@@karlmadsen3179 His brother recognized specific phrases only the unabomber would use, and then he called the fedrales. (*as used in the famous manifesto printed in the papers.) it seems that ole Ted's opsec was super solid, especially considering that the fbi was much less sophisticated at that time.
The dumber and more obvious they are the less likely dem boys ever have the time to go after you. The ol "I dont have to outrun the bear, I just have to outrun my hiking buddy" 😂
There was a supposed saying on the inquisition that has gone around in variations: "Think much, say little, write nothing." Same applies to this, writing is the act of creating evidence against yourself.
though, luckily, now we can have fully-encrypted writing, so, maybe not... though it'd still apply on anything seen/ran through computers you don't fully control, like this!
Notice how all throughout that court document they talk about how he always connected to tor and went online through tor. Just that, so just being connected to tor or any sort of privacy measures will be used against you like it means you are guilty of a crime. That's exactly how the gov views you wanting privacy from them.
In general, the state exists to protect the interests of the ruling class; under a liberal "democracy," that means unless you are wealthy enough to buy a representative, no aspect of the state exists for your benefit. Even Roosevelt, architect of the New Deal and one of the most beloved Presidents in the history of this godforsaken country, only did what he did to protect idiot businessmen from themselves and prevent a communist revolution.
Technically, "cooperate, or when we get proof of what you've been doing, you will be punished accordingly &, by pure happenstance, this other thing would also happen."
I despise the feds but this situation is perfectly understandable. "Cooperate or else you'll be in prison, and since your cousins will have no legal guardian left we'll be forced to put them into foster care."
Sabu is a nice guy. I emailed him years ago and he actually replied. He seems much wiser. He is working hard to put his life together and working in incident response. I respect him for what he did.
Man do i love this channel. I mean the content for me it top-notch. And also the community that watches them and comments on them is also pretty good, in the sense of containing some pretty interesting stuff on their comments.
I'm not sure I agree with this one People should give information away, but to the point where fake information is well mixed with real info. That way no one will be able to connect the true information and you have plausible deniability if they use the typical "you said X", when you can point to yourself saying Y, W and Z which is provably false, making the information (even if true) unreliable and unusable Using a lot of aliases and connecting them to others that aren't yours is also a good one. TL;DR: The key isn't not sharing information, but sharing enough noise that makes anyone investigating you waste time and get into no conclusions about anything
The reality is different. When you're a high profile criminal, you can't think like a normal and constantly being in stressful conditions. You would have slipped info here and there.
Industry standard is to provide info / access to info on an as needed basis only. This also applies to criminal activity. I have always said the best way to get someone’s personal info / passwords is to simply ask them for it.
Thank you Kenny! Please make more videos like this AND mainly more videos on the topic of keeping our privacy in check and locked down as much as possible... you have top shelf knowledge on the matter and in a war where our privacy is soon to become thing of the past, as ISPs and others invade privacy to sell information to the highest bidder... we really REALLY need people like you on our side... so please KNOW you are really important in that war. I thank you for all you have done and will do 🤝🌹
there was a pretty good (german) talk about opsec at 35c3 & my favourite quote there is "OpSec: Alice und Bob halten's Maul." ("OpSec: Alice and Bob shut up.")
Talking "too much" can also be used for obfuscation as well so long as you're smart about it and "stupidly" let out a little too much information about yourself sprinkled here and there with the caveat that all of the potentially identifying information you share is completely fake. It would likely be obvious if you went too far with it by crafting some sort of outrageous fully detailed backstory, but if you just let small details leak out a little over here a little over there over a long enough period of time (i.e. don't sit there in a chat for hours and hours sharing your fanfic, but instead share like a dozen or so small "details" over the period of a few months) it could result in fairly strong misdirection.
Doing this can divulge real information. If the details are all fake, then that can help with the process of elimination once someone realizes it's all made up information. Sprinkling real information in there could also backfire, as it could still be enough to identify you after everything is combed over carefully. It's probably best to just not say anything at all
@@AbandonedVoid You're grossly oversimplifying and not looking at the big picture. If the details are vague enough that it couldn't possibly narrow down on any one person, but instead throws attention across a swath of say millions of potential people it won't get them any closer to detection and they also won't be able to rule any of them out, but it will lead them in a bad direction, wasting their resources, time and efforts. And say they do get the point of ruling out a few million people. Okay? There are over 8 billion people on the planet, about 75-80% of which is over 18. You'll have wasted their time following bad leads and even if they figure it out it still leads them no nearer to anything.
You should also take advantage of every slip up by the people you are with to learn their identity. 1. It will show you what not to do. 2. Your lawyer willl have something to bargain with if you get arrested.
just because law enforcement isnt allowed to hack people in order to make arrests (and it means that the only arrests they make are caused by bad opsec) . doesnt mean that activists and journalists and whistleblowers wont have corporations willing to pay hackers to do more illegal things to deanonymise them .. not everyone that wants privacy is a hacker or a criminal . some people will have entire state backed hacker groups after them and for those people propper opsec is important and the technical details do matter for them .
First thing Joe says to the crew in reservoir dogs, don’t tell anyone your Christian name, where you have been, where you may have done time, or a bank you robbed in St. Petersburg. Don’t say shit you don’t need to if you are trying to stay hidden.
hmm while the general argument seems valid, one might still say that they got caught slipping up socially after they satisfied technical security requirements, so pointing out how infamous hackers got caught because they couldn't keep their mouthes shut might be a case of survivorship bias.
Forgetting any number of things… The same device that one will be using to reach that far; is it always being used through the same exact WifI? What about updates? Does one have all other programs completely closed out?
UK Police Caution: “You do not have to say anything. But, it may harm your defence if you do not mention when questioned something which you later rely on in court. Anything you do say may be given in evidence."
Well honestly, intel ME could get everyone (even if you’re using tor or i2p) deanonimised. Now yes, so far we don’t know of many instances of someone getting found out due to it but at some point, when technology becomes physically inescapable and BCIs commonplace were are going to be living the nightmare.
@@mowsie2k492 disable it where you can but... The play is to discredit it to the public. It has tons of vulnerabilities, the one in the news right now is 27 ish zero days in Tesla. Last year a team made a jailbreak to give people free premium features (because tesla wants a sub for things already installed in the car.) pwn2own is going on rn and they're showing off tons of stuff, they already got over a million dollars from bug bounties.
My late uncle was a prison guard at a medium security prison. He said only stupid people got caught. When I asked him how he know that, he answered "Because they only send me stupid ones."
The thing with Intel ME is that it's very hard to know if you've monitored by it in a targeted way. The very subtle network trafic generated is not yet reverse engineered.
Cia Officer 1: But sir, How are we going to catch the TOR users? Cia officer 2: Don’t worry. TOR users always make sure everyone knows they’re using TOR
So I got a Master's in National Cybersecurity Studies. In one of my classes of threat hunting/internet crime, the course also took a dive into psychology. Ego is a bitch. It's the downfall of many, and will lead to bad opsec, which will lead to someone getting caught
They have not heard of linguistic fingerprinting, a surprisingly accurate way of identifying people. This like your vocabulary, length of sentences, your clichés, use of passive vs. active voice, favourite adjectives and many other elements identify you.
Good advice on mouth security. In regards to TOR, it's biggest weakness is timing. For example, you do something noticeable from your dorm at 1:37PM using TOR. Then police go looking for TOR connections from your dorm at that time. Hello search warrant.
Could you do a video talking about data removal services like Incogni or Aura? The premise seems great, but depending on the execution, also seems like it could be counter-productive.
I feel like a proactive solution (not sharing anything) is better than one of those retroactive solutions to your privacy. Once your information is out on the Internet, it’s out there whether that’s on public facing databases or private databases.
@@Fractal_32And what if, say, someone's parents blab too muchly? What if the info gets out, and is out, and you're past the point where "Proactive" is a meaningful word anymore?
I'm not going to lie, I feel like such a fool not realising that last point you made around ~13:00. That anything used against you will be written down, and anything 'for yourself' said will [most likely] be thrown out. That shit is so scary and now I see the importance off having your OWN body cam/phone camera footage whenever you can.
I thought this was going to be about phrasing, syntax, punctuation and word usage; or even keyboard rhythm tracking.. But, I guess common sense is in dire straits and people are far less paranoid than I am.
Really? And the routers know the ip of the users, I guess? But if you communicate over https they cant see what you are writing, but they can see what sites you are using?
It’s more than cops wont use beneficial statements, they CANT. Helpful statements are called “self serving statements “ and are INADMISSIBLE. If you want that helpful statement admitted YOU must testify (opening you up to cross examination).
I always find human error to be a humourous bastard, remember the silk road guy having his laptop yoinked by the feds while he went to piss in library toilets lol
Using TOR is not illegal, nor is it dangerous. Just thought I would clear up any misconceptions so people trying to make you think it is this great big hidden dangerous tool. It is not.
In this video, the creator discusses how Tor users often get caught due to saying too much rather than technical mistakes. They provide examples of hackers who were caught because of their excessive sharing of personal information and political opinions. The creator emphasizes the importance of being cautious with the information shared in online chats and treating them like direct conversations with the police. They also mention the Miranda Rights in the United States, which state that anything said can and will be used against the person in court. The video suggests that maintaining silence and being discreet is more important than the choice of VPN, proxy, or operating system when it comes to online privacy and security.
@@BurgerKingHarkinian yeah, you run the transcript and title into a prompt and its shockingly precise. I made a 2 min vid on it in case you want to do this yourself for any video and save yourself the bloat.
@@MicahThomason if the "creator" mentions his name somewhere, the prompt can sometimes pick it up and actually put their name in place of just creator. Like when some youtubers do a "hi X here" thing.
@@Maebbie I understand that. I was trying to be silly and compliment Kenny at the same time. It sounded right in my head at the time. I appreciate your explanation. Cheers.
I think so many people are eager to socialise or sometimes brag. It's natural for people to talk about themselves, even people who need to remain private like this
At the start of the video you mention that hackers getting caught is almost never because of a technical mistake or a zero day. Is there any examples where it is a non-simple technical mistake AND have you already done a video on it that i can watch?
Event if there were, they probably would have already been fixed, and probably would be nothing that you could do about it, because you would not know it in the first place
@@user-db2uj9vc7s i’m just interested to know if there is an example of someone who seemingly did everything right and was caught because of some sophisticated attack. Someone other than Daniel Rigmaiden.
@@user-db2uj9vc7sbut case studies are interesting. I don't know if anyone got caught but the Tor relay_early attack was a big technical mistake in Tor
The key is to share lots of information, but make it a ficitional you that leads them on a wild goose chase far away from you. Be mostly consistent, in character where the fictional you would live and operate, but it's all some alternate reality. If you're not that creatively, pick out a move character and build a life around them.
The greatest security risk is the one between the keyboard and chair
Objection: It's not the one between the keyboard and Chair... It's the one between the head and the keyboard. As long as you are not giving the wrong head (pun intended), and your head is in the "right sockets" - you should be fine. Probably. Maybe.
Also known as a SEU.
I knew my cat was a fed
Pebkac is a real thing.
I knew my little buddy was a fed.
Thanks, as a tor user, I've been having trouble getting caught. But this "how to" video helped! Typing this in the gulag rn
You already messed up by having a google account
You already messed up by being born in the 20-21 century
@@poisonouspotato1
I mean you could separate yourself into two different identities using different devices and different usernames
@@Abu_khalid1 that works too
@@Abu_khalid1 But not through Tor. If Google lets you have an account through Tor you need to link your phone number to use it.
TDLR: Hackers should get a life outside of hacking so they don't feel tempted to make friends with other hackers.
sadly having no life and being a loser is a requirement to becoming a hacker, making real friends or going outside is out of the question
@@TruthDoesNotExist Attachments lead to the dark side!
@@sminem6572 "ooo la di da, I can read" Show off....XD
@@TruthDoesNotExist It is for any criminal, white hats can be cool people.
@@TruthDoesNotExistnot true at all
Bottomline: Don't brag in public about how much money you are making as the neighborhood's unlicensed pharmeceutical salesman.
I personally knew a couple of the low level guys caught in DEA operation Adam B0mb, which targeted Farmers Market/AdamFlowers- they literally never shut up about it and went to the post office daily to pick up a large package and drop off smaller ones, tweaking constantly on MDMA. Turkish mafia connections got it to Canada then to them for further distribution. The rest is honestly more than I should know and definitely shouldn't talk about. Absolute morons tbh 😂
Never brag about how much money you make in the first place. Envy Socialists will harass you.
Unlicensed Pharmaceuticals? Never. Only Herbal Remedies officer!
@billsmith30 its just Peruvian tea extracts sir.
Don't brag ever. Every time someone brags about something, I always assume they're lying.
You don't ever say anything to the cops without an attorney present and you never give consent to search anything again unless your attorney is present. Common sense.
Great advice ! Also if the cops persist with a search you can say " I do not consent but I will not resist ", this doubles up your protection and puts the burden on the cop to prove why they did this in court.
@Orthaluminoxself snitching
@@thenotoriousmichaeljackson8938 it isn't illegal to be the son of a durg deller
There's a great funny classic video by a lawyer about this on here
@Orthaluminox No, common sense means someone that has a sense of self preservation that is in the most basic way possible, common as in common people.
Education gives you common sense.
Tor is a great aid in my illegal ex-yugoslav arms smuggling operation 👍🏻
relatable
@@Maxშემიწყალე dude, are you the type of idiot to not understand anything online?
got any extra m70s ?
@@Maxშემიწყალე he's joking
Sooo...anyone know about any hating going on? I'm just one of you guys...and was wondering if anyone knew about some illegal activities I could be a part of...
The thumbnail shows how much Jerma's physical health has deteriorated after he got caught managing that black market drug operation :(
Jerma? 😮
they do look a little similar don’t they
Too much zerking off
literally clicked on this to ask why Jerma was in the thumbnail lmaooo
@@iCookCrystalMethAll vtubers look alike.
This reminds me of that scene from the Simpsons where Mr. Burns and Smithers go through very elaborate security to get to a special room, only to find an old ratty screen door open.
@@klwthe3rdwhich episode was it?
@@klwthe3rd Thanks - just watched the scene 🤣
@@seronymusit's the one where they go on strike
That's insanely Apt because it describes TOR perfectly. People go through so much setting up their security, then they use the thing created by the US Government for their illegal activities. People really think the Government doesn't have an old screen door they can go through in it?
It was not made by the government but the navy, and we know how it works. The problem now is who controls the nodes and those in fact are now controlled by a lot of law enforcement over the globe and a few activists. No screen dor though.
Whether you're a hacker or just a standard citizen, I've always been of the opinion that more people need to follow the old internet rule of never giving any personal information out online. It seems like ever since the rise of social media, and now every website requiring you to sign up with email and other verification info, people have completely forgotten this.
True but depending it could be just as unsafe IRL. If your going to commit crimes I would suggest not telling anyone anything, not even family. The most successful usually dont have a "home" so as to not be recognized. It could be some mundane fact about you you told someone that ends up leading them to know your name and all that. On the streets a little harder with anon names, but if that gets connected to you or your name. its all the same. Lots of the street dudes flip fast, and half of them informants that will still break the law themselves trying some in to thinking its ok because he's breaking the law in a show solidarity or something.
@@nwerd7584yeah, it goes without saying that you should definitely keep attention away from yourself in real life as well. That’s even more important.
In short, the most important aspect of OpSec is the old navy adage: Loose lips sink ships
@@JPs-q1oyep
@@nwerd7584 on internet this goes if you aren’t commiting any crimes aswell tho
It never ceases to amaze me the mistakes that otherwise brilliant hackers make. As for the guy that got caught by saying he was busted for weed, give out info like that, but make sure it's a lie. That way they will spend time chasing lies and not find anything.
didnt realise this channel was about protecting and giving tips to criminals . i thought it was about privacy from a citizens standpoint . who cares if they get caught . they scam old people and ransomware hospitals . let em rott in jail .
In short, the most important aspect of OpSec is the old navy adage: Loose lips sink ships
It can also make you realize that these hackers are not geniuses or brilliant. The thing used against them is exactly the thing they use to hack others. Social engineering is 95% of hacking. If these people make such mistakes you bet your ass that the average human makes a magnitude more mistakes.
Even in the lie you can get caught. When in the information fails to be corroborated that can give investigators a clue. Say nothing and trust no one
That's what one of the members did i forgot which one they all thought he was a 17 year old girl, still got caught though
First rule of F̶i̶g̶h̶t̶ Tor Club: Don't talk about F̶i̶g̶h̶t̶ Tor Club
Second rule of F̶i̶g̶h̶t̶ Tor Club: Do NOT talk about F̶i̶g̶h̶t̶ Tor Club
Best Comment! Cheers
███ rule of ███ Club: Don't talk
"what's Tor?"
@@skylinetv2778⬜⬜⬜ rule ⬜⬜⬜ : ⬜⬜⬜⬜
Look, the cops don't really do much police work. Those insipid cop shows, where there's an investigator who investigates? Copaganda.
No, cops get lucky when somebody shoots their mouth off, then they threaten that person and get them to violate their own civil rights by snitching on themselves, and then they make you snitch on your friends. Worst part? They'll promise that if you cooperate you'll get less time in the Scumbag Warehouse, which you'll find out at your sentencing was a total lie.
Thanks for pointing out Basic Opsec.
That is a good description of local law enforcement. The FBI, while maybe not rocket scientists, is probably a level above that.
@@MicahThomason FBI only gets active if one of their friends is angry about you. But if you are a friend the FBI will destroy the evidence for you.
@@MicahThomason domestic law enforcement agencies do infiltrate and try to get you to do stuff to damage your politically/socially/economically aligned movement. FBI killing black leaders like mlk and malcolm x or getting people like tim mcveigh to orchestrate a bombing whose supplies appeared out of thin air with no possible method of tracing them despite proof presenting otherwise.
Your lawyer makes the deal with the cops not you.
@@MicahThomason the FBI is even worse, they just have free access and permission to break any rules, which local law enforcement doesn't.
i once ordered 400 oz of black market eucalyptus on the dark web. good shit.
Was it black markket because it paid no taxes?
In Minecraft ?
That's fed time interstate commerce
@@darkcoeficientFED FED FED FED
imagine being that poor
Anyone who's considering using a VPN with Tor out of paranoia would be better served by just adding one more hop to their Tor circuits, which is a setting you can change. It's allowed to be up to 8, that's like 5 VPNs!
note: the extra hops can see the circuit is longer than normal
Where in the settings
never doing anything from your home/working network is far superior opsecs than any added layering hops.
@@honor9lite1337 The Feds say that 100% of the time, when someone is doing something on a coffee shop network, and they go door-knocking, the suspect confesses. Lol.
@@honor9lite1337you don't live in an uncivilized country where your house is maybe the only safe space you have
Does ToR not have exit relays? Can you not just read all the unencrypted data from the exit relay in that case?
The way I explain it to people is imagine youre on a shopping website and you go over to a filter and select your options for a new pair of shoes. Every specification for those shoes limits the total options. Blue/white, Running, adidas, slip-on. After you put all those in you go from 100 brands to 10.
Well this is how say the FBI finds you. You tell a story or talk in bits with people every bit of information narrows you down. "I went to wegmans with my parents and grandparents after I got off work at the autobody shop, theyre used to shopping at publix, but they liked the store"
Thats narrows down their list of suspects drastically. We're looking at someone who probably lives in the northeast because he shops at wegmans that has family in the south/southeast because they shop at publix, works as an automechanic, parents are likely not divorced, grandparents are alive, so likely younger than 50, etc etc.
I wonder if some hacker has ever used this technique to frame his rival...
OPSEC keeping you big as hell
Hahaha, I can't believe folks have to learn this the hard way when it is common sense. Always make an opsec plan and stick with it. If you have to say anything about personal stuff, always go with a total random non related answer. Hello from Nauru, love your channel!
Do you really live in Nauru, the smallest country in the world?with only like 1000 Polynesians?
Or maybe don't say anything
have you ever lived in Arizona or are there layers to that?
Nauru? Hey, I am in the Pitcairn Islands. We’re practically neighbours!
@@megadog_ but wait isn't the population of Pitcairn literally all pedophiles 🧐🤨 even Wikipedia says it
for the best opsec, take your vocal coords so you dont speak too much.
let me know of it works.
and melt your keyboard so you can't write too much
And go live in the woods without any technology@@gudneighbour
@@gudneighbour Thats where most people slip up, which I find surprising. You'd think people would be MORE careful when typing out their ideas but thats not the case in many instances.
Here in Florida we have a saying, "Just keep your mouth shut, you won't get caught."
@@hippyjoe thats so true lol
100% agreed. Best OpSec is to not say anything at all. And if you really need to say something, make sure you lie about everything and occasionally contradict yourself about your personal information.
Today I'm from Germany, tomorrow I'm from Vietnam.
and if you're american, force yourself to use words like colour and specialise etc. since otherwise you just come off as american since nobody else had their version of english devolved like that thanks to cost-cutting in the printing industry
Keep a regular job, buy appropriate( not more than a normal job could afford) amounts of gold bullion each month , use cash as much as possible, put large purchases in others names, and SHUT YOUR MOUTH. if you are making a lot , stack your gold/cash for 10 years after the fact
@@glebglub evolved*
@@ellwoodwolfput it in bitcoin. Build credit. Use credit to start a successful buisness. Depending on how much money you got or how successful you buisness is, start washing dat money🥵🥵😂
48 Laws of Power, Law 4: Always Say Less Than Necessary.
Besides creating an impression of great import, saying little avoids the risk of saying something foolish, which can be costly
ROBERT GREEEEEEEEENE
Most people have an ego and need to brag about their stuff, that lies in the nature and only the most disciplined can come over that and become true Chads. They won't be praised, they won't be recognized, but most importantly, they won't get caught.
Understood.
You basically just summarized the whole “Breaking Bad “ plot
@@Mr.SnakySnake Maybe if you're talking about Gus and Mike. Walt had a gigantic ego and couldn't just keep his mouth shut about Gale not being Heisenberg.
Hack the world!!!
exactly like the left today
Also gotta say, anyone who claims to be 'Anonymous' is a liar in this modern age
"I'm on a moose" (but with a thick accent)
Saying you're in Anonymous now...is like saying you're in FAZE clan.
it was a lie back then too lol . anonymous were a psyops .
only powerful rich people are anonymous
It was a lie back then too. The whole point was there were no members. It was just fun to claim credit as anonymous.
I’m just gonna avoid illegal activities personally, this sounds stressful as hell lol
right ? i thought this was a privacy channel not a crime tutorial channel
@@barongerhardt Buddy, if crime is the only thing you find interesting, that’s on you 🤣
@@barongerhardt “Whoosh”? Bro, include a punch line or make the irony noticeable next time, how was I supposed to know you were joking? 😆
At least try to make it seem like a joke even a little bit
@@barongerhardt poes law isnt an excuse to make it as hard as possible to tell if something is a joke and then dump all the blame on anyone who gets confused
Spyware at the speech level,
Perfect
When the point of speech is to be heard, hearing can hardly be called spying. But spies will certainly be happy if you hand them the information they want on a silver platter.
Spyware in the brain
Choosing prison to end loneliness is rather an odd one and very unfortunate also.
Two things come to mind. Pride cometh before the fall and loose lips sink ships.
Well said.
Learnt the loose lips sink ships lesson as a teenager. Glad I learnt it then. Dumbest move talking about shit. fuckers stole my fucking weed plants.
@@TheRedOGREu ain't got no ops suburbanite 😹😹
@@cantchange901 tf you know about me? There o edited just for you retard. 🤓
It's always the same stuff when these people get caught. They get too comfortable while doing illegal stuff. The ones who don't get caught don't bring up any true information about their real lives and treat their hacker identity as a completely separate person who may even need to be replaced by another identity if things get too spicy. You don't hear stories about the smart ones, though, because they don't get caught unless they're *really* wanted by the government.
12:40 The best way I’ve found to convey how stupid it is to talk to the police is this: The absolute best case scenario resulting from talking to the police about something you are being charged with is that the interview is not played in court. If you successfully manage to not make a *single* contradictory or suspicious statement during the several hours of gaslighting and manipulation you will be subjected to, the investigator won’t show up to court and say “Yeah that guy had a solid interview.” They just won’t be there. Again, this is the best case scenario and it is far from guaranteed. You will stutter. You will say something stupid. Want to know a 100% tried-and-true method to ensure the interview cannot be played in court? Don’t talk to the police.
I even pay attention to my verbiage and syntax while commenting in dark areas. Syntax idiosyncrasies is what got the Unabomber busted.
That...... and the bombs.
@@karlmadsen3179 Well, that, too. I guess.🤪
@@karlmadsen3179no, he literally only got caught because his brother read his manifesto, recognized his writing, and contacted the FBI.
You can't eat your cake and have it, too.
@@karlmadsen3179 His brother recognized specific phrases only the unabomber would use, and then he called the fedrales. (*as used in the famous manifesto printed in the papers.) it seems that ole Ted's opsec was super solid, especially considering that the fbi was much less sophisticated at that time.
I keep seeing people post their DNM shopping carts on substance discords and its driving me crazy.
FBI isn't coming after buyers, not really
The dumber and more obvious they are the less likely dem boys ever have the time to go after you. The ol "I dont have to outrun the bear, I just have to outrun my hiking buddy" 😂
its almost like they want to actively get caught
that shit sounds so insane that it couldve been a mini psyop to comprimise their opsec
I feel like that should be a reason to ban someone, so a phallic measuring contest doesn't start popping off.
There was a supposed saying on the inquisition that has gone around in variations: "Think much, say little, write nothing." Same applies to this, writing is the act of creating evidence against yourself.
though, luckily, now we can have fully-encrypted writing, so, maybe not... though it'd still apply on anything seen/ran through computers you don't fully control, like this!
If I were to do anything illegal, I wouldn't be talking about it
It depends on what it is, illegal aliens are doing illegal shit and they get a pass
Notice how all throughout that court document they talk about how he always connected to tor and went online through tor. Just that, so just being connected to tor or any sort of privacy measures will be used against you like it means you are guilty of a crime. That's exactly how the gov views you wanting privacy from them.
"Cooperate or we will take your family away from you"
- The "good" guys
did you expect them to suck him off or something?
In general, the state exists to protect the interests of the ruling class; under a liberal "democracy," that means unless you are wealthy enough to buy a representative, no aspect of the state exists for your benefit. Even Roosevelt, architect of the New Deal and one of the most beloved Presidents in the history of this godforsaken country, only did what he did to protect idiot businessmen from themselves and prevent a communist revolution.
Technically, "cooperate, or when we get proof of what you've been doing, you will be punished accordingly &, by pure happenstance, this other thing would also happen."
I despise the feds but this situation is perfectly understandable. "Cooperate or else you'll be in prison, and since your cousins will have no legal guardian left we'll be forced to put them into foster care."
Sabu is a nice guy. I emailed him years ago and he actually replied.
He seems much wiser. He is working hard to put his life together and working in incident response. I respect him for what he did.
Man do i love this channel. I mean the content for me it top-notch. And also the community that watches them and comments on them is also pretty good, in the sense of containing some pretty interesting stuff on their comments.
I got caught because I confused tor with The Onion.
That's funny, but what did you get caught doing?
@@xinpingdonohoe3978 Doing some trolling, he's now an employee there
@@xinpingdonohoe3978kidnapping a cat.
"Simply shutting up is so much more important" And yet it's so much harder to do.
For a lotta folks, the Entire Value Prospect of the internet is Having A Place To Not Shut Up.
Many more it's at least half the point.
in my bad days, id always see people get taken down due to EGO/in fighting or bragging. Greed and fame is always the downfall.
What would be the point if not for money or ego
Yep it was always some in fighting in the group literally every time
I'm not sure I agree with this one
People should give information away, but to the point where fake information is well mixed with real info. That way no one will be able to connect the true information and you have plausible deniability if they use the typical "you said X", when you can point to yourself saying Y, W and Z which is provably false, making the information (even if true) unreliable and unusable
Using a lot of aliases and connecting them to others that aren't yours is also a good one.
TL;DR: The key isn't not sharing information, but sharing enough noise that makes anyone investigating you waste time and get into no conclusions about anything
The reality is different.
When you're a high profile criminal, you can't think like a normal and constantly being in stressful conditions.
You would have slipped info here and there.
This post should be pinned. Connecting your "anonymous IDs" to other real IDs or other fake IDs is better than not goving any info at all.
@@honor9lite1337 you can slip here and there if most info you give online is fake
Bonus points if you can fake info that leads to someone else
Industry standard is to provide info / access to info on an as needed basis only. This also applies to criminal activity. I have always said the best way to get someone’s personal info / passwords is to simply ask them for it.
Thank you Kenny! Please make more videos like this AND mainly more videos on the topic of keeping our privacy in check and locked down as much as possible... you have top shelf knowledge on the matter and in a war where our privacy is soon to become thing of the past, as ISPs and others invade privacy to sell information to the highest bidder... we really REALLY need people like you on our side... so please KNOW you are really important in that war. I thank you for all you have done and will do 🤝🌹
there was a pretty good (german) talk about opsec at 35c3 & my favourite quote there is
"OpSec: Alice und Bob halten's Maul." ("OpSec: Alice and Bob shut up.")
Talking "too much" can also be used for obfuscation as well so long as you're smart about it and "stupidly" let out a little too much information about yourself sprinkled here and there with the caveat that all of the potentially identifying information you share is completely fake. It would likely be obvious if you went too far with it by crafting some sort of outrageous fully detailed backstory, but if you just let small details leak out a little over here a little over there over a long enough period of time (i.e. don't sit there in a chat for hours and hours sharing your fanfic, but instead share like a dozen or so small "details" over the period of a few months) it could result in fairly strong misdirection.
Doing this can divulge real information. If the details are all fake, then that can help with the process of elimination once someone realizes it's all made up information. Sprinkling real information in there could also backfire, as it could still be enough to identify you after everything is combed over carefully. It's probably best to just not say anything at all
@@AbandonedVoid You're grossly oversimplifying and not looking at the big picture. If the details are vague enough that it couldn't possibly narrow down on any one person, but instead throws attention across a swath of say millions of potential people it won't get them any closer to detection and they also won't be able to rule any of them out, but it will lead them in a bad direction, wasting their resources, time and efforts. And say they do get the point of ruling out a few million people. Okay? There are over 8 billion people on the planet, about 75-80% of which is over 18. You'll have wasted their time following bad leads and even if they figure it out it still leads them no nearer to anything.
You should also take advantage of every slip up by the people you are with to learn their identity.
1. It will show you what not to do.
2. Your lawyer willl have something to bargain with if you get arrested.
just because law enforcement isnt allowed to hack people in order to make arrests (and it means that the only arrests they make are caused by bad opsec) . doesnt mean that activists and journalists and whistleblowers wont have corporations willing to pay hackers to do more illegal things to deanonymise them .. not everyone that wants privacy is a hacker or a criminal . some people will have entire state backed hacker groups after them and for those people propper opsec is important and the technical details do matter for them .
Law enforcement semi-regularly does illegal shit to acquire information, then uses parallel construction to claim they figured it out via legal means.
to be fair, most people with such "specific" political views just cant shut up about it. So he was basically a victim of his circumstances...
Commies and anarchists 😂
First thing Joe says to the crew in reservoir dogs, don’t tell anyone your Christian name, where you have been, where you may have done time, or a bank you robbed in St. Petersburg.
Don’t say shit you don’t need to if you are trying to stay hidden.
hmm while the general argument seems valid, one might still say that they got caught slipping up socially after they satisfied technical security requirements, so pointing out how infamous hackers got caught because they couldn't keep their mouthes shut might be a case of survivorship bias.
Directional antenna and open access wifi hotpots are very useful things. With a directional antenna you can connect to a wifi router from miles away.
Forgetting any number of things…
The same device that one will be using to reach that far; is it always being used through the same exact WifI?
What about updates? Does one have all other programs completely closed out?
The real question is.... How can you be an Anarchist AND a Communist?
en.wikipedia.org/wiki/Anarchist_communism
You just have to be dumb. Like any other communist.
I guess the same way you can have liberal dictatorship in the US and the EU.
Brain damage.
Though the Communism already implies brain damage or malevolence.
Thank you.
The video was very informative
And unfortunate
UK Police Caution: “You do not have to say anything. But, it may harm your defence if you do not mention when questioned something which you later rely on in court. Anything you do say may be given in evidence."
Well honestly, intel ME could get everyone (even if you’re using tor or i2p) deanonimised. Now yes, so far we don’t know of many instances of someone getting found out due to it but at some point, when technology becomes physically inescapable and BCIs commonplace were are going to be living the nightmare.
Then what’s the next plan? Jfc
@@mowsie2k492 disable it where you can but... The play is to discredit it to the public. It has tons of vulnerabilities, the one in the news right now is 27 ish zero days in Tesla. Last year a team made a jailbreak to give people free premium features (because tesla wants a sub for things already installed in the car.) pwn2own is going on rn and they're showing off tons of stuff, they already got over a million dollars from bug bounties.
It's disapointing how opsec basics had been missed in these cases. You wouldn't write a crime drama with clues this blatant.
My late uncle was a prison guard at a medium security prison. He said only stupid people got caught. When I asked him how he know that, he answered "Because they only send me stupid ones."
Professor of Logic there
13:28 highlights the point perfectly thank you for your videos 🙏
sabu was a fed from the start.
NSA owns most of the Tor exit nodes and an exit node can read all the traffic through it.
Not if it is encrypted properly. But knowing which hosts you use can trace you down I guess
The thing with Intel ME is that it's very hard to know if you've monitored by it in a targeted way. The very subtle network trafic generated is not yet reverse engineered.
Why do I have a feeling that at 12:00 the concepts of Apple Mac and MAC address are totally mixed up? The spelling even varies between the two.
Cia Officer 1: But sir, How are we going to catch the TOR users?
Cia officer 2: Don’t worry. TOR users always make sure everyone knows they’re using TOR
So I got a Master's in National Cybersecurity Studies. In one of my classes of threat hunting/internet crime, the course also took a dive into psychology. Ego is a bitch. It's the downfall of many, and will lead to bad opsec, which will lead to someone getting caught
My old dad years ago "it stops being a secret once anyone else knows it". Still true.
They have not heard of linguistic fingerprinting, a surprisingly accurate way of identifying people. This like your vocabulary, length of sentences, your clichés, use of passive vs. active voice, favourite adjectives and many other elements identify you.
Its not 100% accurate because a lot of people talk the same way but it can help select someone from a crowd of suspected people
Good advice on mouth security. In regards to TOR, it's biggest weakness is timing. For example, you do something noticeable from your dorm at 1:37PM using TOR. Then police go looking for TOR connections from your dorm at that time. Hello search warrant.
Thank you, my favourite hacking channel 🙏🏻🙏🏻🙏🏻 I'll be using these tips in my next operations
Anyone who watches Mental Outlaw is automatically on The List
Complacency kills in the workplace and in hack chat rooms. Thanks OSHA for the safety tip.
Could you do a video talking about data removal services like Incogni or Aura? The premise seems great, but depending on the execution, also seems like it could be counter-productive.
This would be cool, or at least add this topic to a video on bulk data or smth.
I feel like a proactive solution (not sharing anything) is better than one of those retroactive solutions to your privacy. Once your information is out on the Internet, it’s out there whether that’s on public facing databases or private databases.
I second this! Would love to see a video on this topic
@@Fractal_32Yeah but its better than just saying oh well and leaving it out there (at least publicly anyways)
@@Fractal_32And what if, say, someone's parents blab too muchly?
What if the info gets out, and is out, and you're past the point where "Proactive" is a meaningful word anymore?
I remember reading Sabu got caught because he forgot to connect to vpn one time.
A cop told my 7th grade class, the only reason we catch criminals is because they talk about their crimes.
So greatest security is being completely antisocial. Great I am on the right path. ✅️
You're awesome dude. Lol. Simply shutting the eff up 😂
Shit. I had no idea WHY Saboo snitched. That's rough. They pulled some wild shit.
TOR exit nodes can be running a sniffer to log the unencrypted packets for phishing...
When has that ever resulted in someone going to jail. If anything this is just gonna be used for metadatacollection for the NSA
Respectfully, I think you missed the point of the video.
@@GerhardTreibheityes lookup how cybercriminals with good opsec get caught
Use https
@@thewhitefalcon8539 I do, I have browser configured for https priority.
Tech snitches, tellin all they business. Open up in court as their own star witness.
bada doo doodoo
Facts
Do you see the perpetrators. Yea right here. Fuck around get caught set my friends up for years
I'm not going to lie, I feel like such a fool not realising that last point you made around ~13:00. That anything used against you will be written down, and anything 'for yourself' said will [most likely] be thrown out. That shit is so scary and now I see the importance off having your OWN body cam/phone camera footage whenever you can.
love these types of videos, keep it up!
I thought this was going to be about phrasing, syntax, punctuation and word usage; or even keyboard rhythm tracking.. But, I guess common sense is in dire straits and people are far less paranoid than I am.
That would be a good video all on its own.
Isn’t the NSA hosting a ton of TOR routers though?
Really? And the routers know the ip of the users, I guess? But if you communicate over https they cant see what you are writing, but they can see what sites you are using?
It’s more than cops wont use beneficial statements, they CANT. Helpful statements are called “self serving statements “ and are INADMISSIBLE. If you want that helpful statement admitted YOU must testify (opening you up to cross examination).
5:34 Jerma???! I can't wait for the hacking tutorial stream
finnish national bureau of investigation has claimed to successfully traced monero, can you do a video on that?
1 - dont be selected as a target to 3 letter agencies; 2 - good tech
I always find human error to be a humourous bastard, remember the silk road guy having his laptop yoinked by the feds while he went to piss in library toilets lol
TLDR: don’t brag about illegal stuff to your hacker friends
Using TOR is not illegal, nor is it dangerous. Just thought I would clear up any misconceptions so people trying to make you think it is this great big hidden dangerous tool. It is not.
These nerds that grew up on the computer really need classical social engineering more than anything 🤣🤷🏽♂️
Yeah they never got that firmware update.
So, in short, the most important aspect of OpSec is the old navy adage: Loose lips sink ships
In this video, the creator discusses how Tor users often get caught due to saying too much rather than technical mistakes. They provide examples of hackers who were caught because of their excessive sharing of personal information and political opinions. The creator emphasizes the importance of being cautious with the information shared in online chats and treating them like direct conversations with the police. They also mention the Miranda Rights in the United States, which state that anything said can and will be used against the person in court. The video suggests that maintaining silence and being discreet is more important than the choice of VPN, proxy, or operating system when it comes to online privacy and security.
AI can summarize videos now? Sweet!
@@BurgerKingHarkinian yeah, you run the transcript and title into a prompt and its shockingly precise. I made a 2 min vid on it in case you want to do this yourself for any video and save yourself the bloat.
So, Kenny is The Creator...
@@MicahThomason if the "creator" mentions his name somewhere, the prompt can sometimes pick it up and actually put their name in place of just creator. Like when some youtubers do a "hi X here" thing.
@@Maebbie I understand that. I was trying to be silly and compliment Kenny at the same time. It sounded right in my head at the time. I appreciate your explanation. Cheers.
I think so many people are eager to socialise or sometimes brag. It's natural for people to talk about themselves, even people who need to remain private like this
At the start of the video you mention that hackers getting caught is almost never because of a technical mistake or a zero day.
Is there any examples where it is a non-simple technical mistake AND have you already done a video on it that i can watch?
Event if there were, they probably would have already been fixed, and probably would be nothing that you could do about it, because you would not know it in the first place
@@user-db2uj9vc7s i’m just interested to know if there is an example of someone who seemingly did everything right and was caught because of some sophisticated attack. Someone other than Daniel Rigmaiden.
@@user-db2uj9vc7sbut case studies are interesting. I don't know if anyone got caught but the Tor relay_early attack was a big technical mistake in Tor
"i2p zeroday vulnerability"
buster hernandez case
A great defense attorney I watch on TH-cam likes to say “Stop self snitching” and applies to this video.
"Loose lips sink ships".
Maybe the real *_Tor Users Who Got Caught Bu Saying Too Much_* is all the friends we made along the way.
Watching any video related to opsec puts you on a list.
Noted.
fuck lists and fuck algorithims. the algorithim knows nothing.
That list would have millions of names though
@@stigcc do you think the agency couldn't handle that?
@@roberts.9299 Of course lol. But you would be almost invisible on such a large list
it's surprisingly hard to shut up and be quiet about stuff. i highly recommend practicing keeping secrets ahead of time.
Im an anarcho communist but i use a Mac 💀
Hey, the anarcho communist already implies brain damage, so no surprise there.
😂
Can’t blame someone for buying things
people who get cognitive dissonance from this don't understand material conditions
The key is to share lots of information, but make it a ficitional you that leads them on a wild goose chase far away from you.
Be mostly consistent, in character where the fictional you would live and operate, but it's all some alternate reality.
If you're not that creatively, pick out a move character and build a life around them.
Didn't you already make this video years ago