Skip to main content

Fake identities and Tor-network

   

.

Fake identities and Tor-network

Tracking the person by using the computer's IP-address that the person uses is the common way to uncover the hidden identity of the user of social media. Even if the person uses the social media account from public libraries or some other places there is a possibility that surveillance cameras are targeted to the working point and then the officials can make the image compilation that allows to track the persons who are using the social media in a certain time.

Hiding identity in the network is quite easy. One of the most common ways to make this thing is just to use invented identity. In that case, the thing is not the stolen identity. The user must only create a social media account by using the fake identity, and that thing can hide the identity from the normal users, and the thing that can break this thing is that somebody knows the person, who is in the image of the user profile.

The image can load from the network, but maybe somebody knows who the person in the image is. And then make the report of that thing. And maybe artificial intelligence is compiling the face images from multiple social networks and user accounts. And the purpose is to find if there are many accounts made by different users where is used the same face image. The system can also find if similar messages are coming from different social media accounts. And in this process, the system tracks the beginning of the message line.

The system is trying to find so-called prime messages. If nobody publishes a similar message before, that means that the owner of the account is invented the text. But if similar texts are published by using multiple social media accounts, and always the text is copy-pasted from the E-mails or some text editors, that tells that publisher might be the same person. So identical messages at the beginning of the multiple series of the shares tell that the message is written by the person who uses the different accounts or it is shared with multiple persons by E-mail or some kind of similar program.

But the Tor network allows full anonymity or does it?

Even if the Tor-network is fully safe, there is the possibility that somebody makes a trap by suggesting the meeting. Before we are starting to use Tor-network and troll thing in there, we must ask one question. Why Tor-network is possible to reach? Why this network is not closed by the state?

And at meeting point is waiting for the nasty surprise with baseball-bat or silenced automatic pistol. Many people are believing that Tor-network is somehow safe. Maybe it's safe for tracking the IP-addresses. But there is always the possibility that the network is a so-called "honey pot" which is operated by the NSA or GCHQ. In that case, the user is routed to the "honey pot" or trap server, which might seem anonymous. But it is operated by military intelligence.

But if some people want to buy drugs, there is always a place, where drugs are delivered. So police or some robberies can lure the drug dealer into the trap. The same way people who are using Tor-network for sending illegal messages can suggest the meeting for each other, and at that meeting point are waiting for police or competitor gang.

http://curiosityanddarkmatter.home.blog/2021/01/14/fake-identities-and-thor-network/

Comments

Popular posts from this blog

Plasmonic waves can make new waves in quantum technology.

"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lead ot the development of more sensitive and robust quantum technologies. Credit: LSU" (ScitechDaily, Plasmonics Breakthrough Unleashes New Era of Quantum Technologies) Plasmonic waves in the quantum gas are the next-generation tools. The plasmonic wave is quite similar to radio waves. Or, rather say it, a combination of acoustic waves and electromagnetic waves. Quantum gas is an atom group. In those atom groups, temperature and pressure are extremely low.  The distance of atoms is long. And when an electromagnetic system can pump energy to those atoms. But the thing in quantum gas is that the atoms also make physical movements like soundwaves. It's possible. To create quantum gas using monoatomic ions like ionized noble gas. In those systems, positive (or negative) atoms push each other away.  When the box is filled with quantum gas and som...

What is the difference between TR-3A and TR-3B? And are those planes real?

What is the difference between TR-3A and TR-3B? And are those planes real? Is TR-3B (0) "Black Triangle UFO" or is it only the piece of paper?  The study project, what is used to create advanced ideas for use of the nuclear-powered aircraft. Or is it the study project or black budget aircraft, where lost 2,3 trillion dollars (1)of the stealth bomber were gone. In this text is things, that might seem very difficult to accept, and when we are thinking about things like doubling the object or making it smaller by using huge layers of energy, nothing denies to test those things. But were those tests successful, there is no data about that in public Internet, so we must say that things like doubling the human or aircraft can be tested, but the results can be unknown.  But in the source two is the tale, what seems like impossible, those men, who got Noble Prize put at first time one atom to the box, and hit it with photon one photon in the box and hit it with t...

The interesting coincidence between USS Sea Shadow (1982) and CSS Virginia (1862)

Image I The interesting coincidence between  USS Sea Shadow (1982) and CSS Virginia (1862) Far away from its time is the thing, that you might notice when you see those two images. The upper one (Image I) is portraying the modern naval USS Sea Shadow (IX-529)(1) experimental Stealth ship, which was created by Lockheed-Martin, and the image below (Image II) is portraying the CSS Virginia (2), the ironclad from the Civil War Era. The thing why the hull of the CSS Virginia, what is ironclad from 1862 is that the ammunition of the cannons would not transfer their impact energy to the hull of the ship. And the reason why Sea Shadows hull has this form is that it should point the radar echo away from the hull.  The thing that I must say that CSS Virginia is far ahead its time because that structure is effective against the explosive ammunition, and the slanting armor of tanks like T-34 and Sherman have made them effective. But for some reason, the use of slanting ...