Results 1 to 40 of 44
Thread: For everyone's safety...
-
09-25-2007, 03:33 PM #1
For everyone's safety...
For everyone's safety. Search your old threads. I have gone through and found several posts with personal email addresses. I'm deleting them as I find them. It's against board rules anyway.
Also, go through the member picture section and if you have a face shot in there posted with your cycle I'd remove it.Muscle Asylum Project Athlete
-
09-25-2007, 03:35 PM #2
Yeah I never understood a face shot with the cycle right next to it. I guess we were just to lask
-
09-25-2007, 03:37 PM #3
also i recommend using securenym if your going to purchase anything illegal. Its not free but very safe. i think its a wrap with hushmail and cyber.
-
09-25-2007, 03:41 PM #4Originally Posted by 305GUY
-
09-25-2007, 03:49 PM #5Originally Posted by lightwaytbaby
http://www.securenym.net/privacy.htm
-
09-25-2007, 03:52 PM #6
well before i do that where did this idea that hushmail is compromised come from?
-
09-25-2007, 04:03 PM #7
Anything using encryption and connections made with SSL (Secure Socket Layer) are safe.
I do this sort of thing for a living by the way.
-
09-25-2007, 04:07 PM #8
Not to step on anyone's toes, but no secure e-mail is safe. One of the sources busted used securenym. I think it may be safer than others, but definitely not completely secure.
BTW, good call Carlos.
-
09-25-2007, 04:11 PM #9Originally Posted by TitleistMuscle Asylum Project Athlete
-
Originally Posted by goodcents
-
09-25-2007, 04:20 PM #11Originally Posted by sonnygll
-
09-25-2007, 04:23 PM #12New Member
- Join Date
- Apr 2007
- Posts
- 16
they got some computers with the decrypted mail on them
-
09-25-2007, 04:24 PM #13
so where did the notion that hushmail was cooperating come from? it definately wasn't in any release i saw...
-
09-25-2007, 04:36 PM #14
nevermind...
Last edited by thegodfather; 09-25-2007 at 04:40 PM.
-
09-25-2007, 04:41 PM #15
i just deleted every pic i put on here, no more pics that could distinguish me from someone else, ever again. been thinkin bout that for a while now anyway, ive got tats that give me away if you know me, GL bros, im curious to see if we will see any repercussions here with people we know due to all this
-
09-25-2007, 04:49 PM #16Originally Posted by Titleist
Originally Posted by Titleist
heres what the website says:
__________________________________________________ ________
"Our privacy policy is VERY simple. We log nothing, other than simple server stats which allow us to know how much traffic we have. There are no user logs, access logs, and no message backups. When a user subscribes to our service, he is given a computer generated key which allows him to log in at any time and create his account. The subscriber is responsible for payment of charges if the key sent to him has been used.
It is our stated policy to provide NO information about any user. The reality is that we cannot, as we have no information to provide to any party, including those who may have a court order or other legal instrument.
In the unlikely event that our U.S. based gateway servers are seized, and the user is using PGP as we recommend, any messages on the servers would still be unreadable. We are NOT a trusted third party. We NEVER have a copy of anyone's private key. All messages residing on the server are fully encrypted with YOUR key, not ours and all connections to SecureNym are SSL.
We do NOT operate a free service. We do NOT harvest mail addresses from users. We do NOT sell mailing lists. We do NOT sell or allow any banner advertising. We do NOT tolerate spam in any form.
We DO provide a secure, anonymous mail service. "Last edited by 305GUY; 09-25-2007 at 04:51 PM.
-
09-25-2007, 05:02 PM #17Originally Posted by DSM4Life
Thinking of you
-
09-25-2007, 05:03 PM #18
That should put to rest any thought of me being gay
-
09-25-2007, 05:05 PM #19Banned
- Join Date
- Aug 2005
- Location
- England...
- Posts
- 2,832
Originally Posted by akrosmegas
So it it possible for them to break into hushmail?
-
09-25-2007, 05:11 PM #20
Just a thought, several of the boards that I belong to are going private and imposing all kinds of rules that require longer membership times and higher post counts prior to certain questions being asked.
Does that not make sense in light of what is going on?
Also, it seems that there has been absolutely no discussion about ARR and if they are safe or not. I just think things should get locked down until things clear.
-
09-25-2007, 05:14 PM #21Originally Posted by tempbrit
-
09-25-2007, 05:15 PM #22
this board is for info purposes ONLY!
-
09-25-2007, 05:34 PM #23Originally Posted by 305GUYMuscle Asylum Project Athlete
-
09-25-2007, 05:39 PM #24Originally Posted by Carlos_E
props to Brian for keeping the BIGGEST AAS board on the net the SAFEST!
-
09-25-2007, 05:42 PM #25Originally Posted by 305GUY
-
09-26-2007, 07:55 PM #26Originally Posted by RuhlFreak55
I am right. But both sides have to be encrypted. Or you can create an SSL tunnel to the person you want to communicate with using a Putty SSH session. You set it to forward a port to localhost. So say you set the tunnel for port 25. Then set the e-mail on both sides to listen and send on 127.0.0.1:25, then it will go through the SSL tunnel where nobody can intercept it. Then any ordering is done through https, which is just http through an SSL tunnel.
Or the source can just have the billing company send a billing confirmation through regular e-mail with no information about what you purchased or from whom. Then all you need is the standard https web page to order from.
If I was going to sell drugs over the internet. I would keep it private, have only clients I know, and set a up a server for them to use. I would just put a openBSD box on a DMZ, with only 1 oddball port listening for SSH. Then provide the clients with a strong user name and password. Then They would have a directory only they or root had rights too. There we could write notes to each other. That would be easy and secure. With high number port on a tight BSD box that isn't pingable and has no standard user accounts, it's a sure thing.
-
09-26-2007, 08:11 PM #27
yeah i erased my pics the other day, even tho i have never stuck myself with anything
-
09-26-2007, 08:29 PM #28Originally Posted by number twelve
-
Thank you Carlos, I changed my e-mail, deleted all pix, and I guess I should go thru all my threads/post also. I also went thru all inbox and sent messages, deleting questionable ones. I haven't stuck myself either yet but I just want to be safe. I put all plans this winter on hold till I feel it'll be O>K>.
Last edited by ecto9; 09-26-2007 at 09:05 PM.
-
09-26-2007, 10:56 PM #30Originally Posted by Carlos_E
Just curious...why are 'GUESTS' even allowed to view this website? Why not just go totally private unless you are a member? Sure there is a good reason...just curious.
-
09-27-2007, 04:03 AM #31
Using a proxy IP may be a wise idea too.
But....Thats for the VERY paranoid!
-
09-27-2007, 07:38 AM #32Originally Posted by sonnygll
-
09-27-2007, 08:12 AM #33
Meh, I got personel web addresses posted but I am here for the lounge and diet sections, not an aas user myself.
-
09-27-2007, 08:07 PM #34
*****...lol jk!!!
-
09-27-2007, 11:47 PM #35
thanks for the heads up guys
-
09-28-2007, 04:57 AM #36Originally Posted by RuhlFreak55
It is because only one end was secure. They had an encrypted account, but that doesn't help if someone sends a plain text e-mail with incriminating evidence over the internet. Then all you need is a packet sniffer to intercept the e-mail. That's why it has to be encrypted or sent through a tunnel.
Another way to get more info, is if you get the e-mail address out of the packets. Then you can easily hack the account if they have a week password like most people do. You use a program that tries various passwords on the account in a brute force attack. So you have to have a very strong password. IE, "testosterone " is a bad password, but "T3$t057Er0n3" is good.
So if I set up a BSD server, lock it down, have pings dropped and only have port 12687 open listening for ssh. Have a dynamic IP and use a hostname that changes regularly from dyndns. Then set ssh to only allow certain users. And give people oddball names like @$$B0y!2. Nobody will know a username to try. Then I make passwords like D!@n460L! or something. And limit attempts to 3 before dropping the connection and logging the IP. Then you got no more worries.
-
09-28-2007, 02:56 PM #37Banned
- Join Date
- Aug 2007
- Posts
- 492
Originally Posted by sonnygll
im I supposed to take my emial address down from my my profile?
O forget it this hole computer thing is not secure no matter what.
-
09-28-2007, 06:52 PM #38Originally Posted by sonnygll
-
09-28-2007, 07:22 PM #39Originally Posted by RuhlFreak55
Yea mine is like 3 full sentances its great
-
09-29-2007, 02:37 AM #40
That's the way to do it. If you have a password like that, nobody is cracking it. It would take til the end of time.
Thread Information
Users Browsing this Thread
There are currently 1 users browsing this thread. (0 members and 1 guests)
Zebol 50 - deca?
12-10-2024, 07:18 PM in ANABOLIC STEROIDS - QUESTIONS & ANSWERS