k9sexforever
Tourist
Honestly, it's not scary, just keep your wits about you. Don't give out personal information. Have funthisis all so overwhelmingg?
Honestly, it's not scary, just keep your wits about you. Don't give out personal information. Have funthisis all so overwhelmingg?
Well I just turn on Tor and turn on a VPN. I assume that way if the IP leaks that it would seem that my IP is the VPN one?Anyone know how to use tor with a proxy? i honestly never figured that out - and id like to use TOR behind a proxy so sites dont know im using TOR - clearnet sites, this way i leave no traces behind at all and no identifiable information while browsing
Using TOR and VPN together can, in and of itself, cause security problems, or so say the experts. I'm not up on the exact details, only that it's been repeatedly said, by those who should know, to be a bad, sometimes disastrous idea. Use TOR, or use VPN, but don't use BOTH TOGETHER, is the standing advice for online security. If you're "hyper secure", use TOR. If you're "casual secure", use VPN. Either one is better than "running barefoot", which leaves *EVERYTHING* hanging out there for whoever cares to bother to intercept it.Would using Tor and VPN at the same time be more track-proof than just one or the other? Some websites don't fully work with Tor.
Does not matter, install linux on the hardware or use a live system like Tails linux.which would have more security, Mac or Pc?
Use a live distro which does not use a hard drive.will wiping a Mac or PC be enough to make sure it’s clean, or do I need an entirely new device?
Home routers usually do not log all user data.if the router being used is the one provided by the internet provider, is any of what you do on the internet secure, or do they literally just have all of your data at the tips of their fingers?
Always remove metadata from the files you want to upload.Bonus question is, are there any security issues with any well known video editors?
What if all uploaded profile pics had to be mod approved and they could get that message before it even goes live?I usually click on account profile pics to see the full picture for accounts that peak my interest. Over the last several weeks I've noticed several that have shown faces in the full pic. I message that member and tell her that her profile pic shows her face when the profile pic is clicked on. Many people don't know that the full pic is upload instead of being cropped and that the full pic can be easily seen just by clicking on the profile pic. That's especially true for new members.
If I may suggest informing people that the full pic is uploaded instead of cropped when the window to upload a profile pic is loaded. Maybe nice bold print in all-caps would help them see any such warning. Or in the alternative just have the image cropped instead of uploading the full pic.
What is tails Linux? Is a google search going to tell me what I need to know without complicating the issue?Does not matter, install linux on the hardware or use a live system like Tails linux.
Use a live distro which does not use a hard drive.
Home routers usually do not log all user data.
Though your provider does not need that, all the traffic is going throgh them anyway. Use TOR.
Always remove metadata from the files you want to upload.
They have extensive documentation.What is tails Linux? Is a google search going to tell me what I need to know without complicating the issue?
I need “internet security for dummies”! my brain, for whatever reason, cannot wrap around a lot of what many of you talk about and explain. my Brain just blocks it out!
Thanks for this advice-encrypt your stuff even if you dont have anything illegal
-if youre going to meet someone do years of personal research and never meet for sexual reasons in the first place
-never post sexual pics online for a group or a forum
-never share sexual pics where you or your animals could be identified
-never share personal content if you havent met irl and are sure about each others intentions
maybe one can break of or two above but not all
Thanks. This is pretty intensive. Lots to consider.GENERAL POSTING
1. Do not use an identifiable avatar. This includes faces, tattoos, fursuits (especially if they are not yours)
2. Review every picture, every video you post multiple times. Look for identifiable things; houses, barns, unique saddles, collars with or without tags, pictures, furniture, mail, packages, collectibles, mirrors or anything can reflect your face or body, absolutely anything that can be used as identification.
3. If you have a unique pet, be very, very careful. If you have posted normal pictures anywhere, like facebook, twitter, ect., do not post him here or anywhere zoo themed. Even if you delete the social media pics, it's too late. ( Familiarize yourself with Reverse Image Search, what it is, and how it can be used against you )
4. Be careful with the information you post. Anyone with enough patience can piece together little things through pictures, descriptions, email addresses, anything to pinpoint who you are.
5. Use an email that is not attached to anything. Do not use real name, and do not setup a password recovery phone number or alternate email. Make yourself an absolute stand alone free email account and do not use it for anything else but zoo. Not even furry or fursuit related sites or accounts.
ONLINE SECURITY
1. Public IP addresses can be used to track your general location. We Recommend a VPN service like Nord VPN to mask your IP. ALWAYS USE VPN!
2. Use Strong Passwords on your ZooVille Account.
3. Whatsapp and Discord are NOT recommended services for private off-site chat. They have been known to be leaked and report info on users.
4. Telegram and Signal are considered safe in of themselves, however always used a VPN when logging onto telegram and also be wary of phishing for your IP address with external HTML links. This has been used before to catch users NOT using VPN on telegram or Signal.
5. Public telegram links to group chats are allowed here on zooville if you own a group (see site rules), however be aware that bestiality is illegal in many countries. Law enforcement can phish users out into private chats is a common way to trace and doxx your identity. TRUST and RESPONSIBILITY is on your hands for whomever private chats you join.
Good to know that metadata is automatically strippedMetadata is stripped.
Plus, can't control what pictures they take.
I agree. Thanks.Thank you so much for your knowledge...not just for anyone, but everyone visiting foreign sites outside there own country....many out there to enjoy safe in a secure playing field. Like to see more safety measures taken for everyone's enjoyment. This is a special place where reality is real sensitive opening secrets will hold. Again, thank you!
This is mind numbingly complicated for those of us who don't have the kind of technical knowledge on display in this conversation. What is the risk level of participating in Zooville just using a standard cell phone with no bells and whistles...?Tor Browser is the safest available method. It is built on Firefox ESR and highly customized to protect you in ways a standard browser can't. But web browsers all have flaws, so it's still possible to find and exploit those flaws to escape the browser to the host operating system and reveal who you are. The way to mitigate that possibility is to increase the security level in Tor Browser from 'Standard' to 'Safer' or 'Safest' and try to put up with websites being kind of messed up. It varies from site to site.
If you're really concerned about that kind of intrusion, you have to run Tor Browser in a disposable environment like TAILS or Qubes-whonix. TAILS is easy, Qubes is hard. Try TAILS sometime if you haven't, it's pretty nice.
It's more nuanced than that. Combining Tor with a VPN hurts performance, offers little to no extra protection, and is only useful in rare circumstances. There are two combinations. The "X" marks a connection that is outside the Tor network and not protected by Tor:
(You) <---> (VPN) <---> (Tor) <-x-> (Website)
In this case, the VPN provider is not able to read your Tor traffic. Your connection to Tor is highly resistant to man-in-the-middle attacks. This is one of Tor's most important features because it enables you to use internet connections you don't trust.
Maybe do this if your local network is blocking Tor traffic but not VPN connections, and only after trying to connect to Tor directly with an unpublished Tor Bridge first.
Maybe do this if you're unable to turn off WebRTC without breaking a website you want to use. Certain functions in WebRTC can leak your real IP, so in that case a VPN could offer a little bit of protection. This only applies other browsers you are connecting to Tor by proxy, which you should never do unless absolutely forced, and to Tor Browsers on iOS which all have to use Apple's Safari browser underneath.
(You) <---> (Tor) <-x-> (VPN) <-x-> (Website)
In this case, the VPN provider is able to read your Tor traffic, because it has already left the Tor network. However, the VPN will only see that it is traffic coming from a Tor exit node, and the VPN will know who you are because you subscribed to them. Some VPNs like Mullvad allow anonymous signup and payment. The content of your traffic could reveal enough personal information for others to deanonymize you.
Doing this is a bad idea and the need for it is very rare. Basically it's a way to hide the fact you're using Tor from a website that blanket blocks connections from Tor exit nodes, since exit nodes are well known. However you lose some anonymity because your traffic is more unique and interesting. To an outside observer, you are no longer a Tor user with traffic coming from a Tor exit node like all the others, you're a VPN user with regular traffic on one side and Tor traffic on the other. That's not great.
In either case you are creating nested TCP connections, which can be very finicky and slow.
?
I'm with youOut of curiosity, other than ostracism , shunnings etc... What are the fines/incarceration? Let's say EU and North America. How bad can it get?
I don't use vpn or nothing on my phone browser Willynilly but I also don't give a fuck what people think of my porn habits. someone explain?
Also echelon makes vpn/tor an imaginary security, like the guy above said, if someone wants to know, they will.
Basically, you're not just asking for trouble - you're sending it an engraved invitation, offering to send a limo to pick it up, and begging it to slap the everlovin' dogshit outta ya when it arrives.This is mind numbingly complicated for those of us who don't have the kind of technical knowledge on display in this conversation. What is the risk level of participating in Zooville just using a standard cell phone with no bells and whistles...?
I think as long as you don't post anything identifable, if they know how to get to a private browser (incognito) and can remember their details, they may get by just with that. But also depending on the area they're in. As long as they're not saving content, as in the US, a couple of states forbid having zoo porn.This is mind numbingly complicated for those of us who don't have the kind of technical knowledge on display in this conversation. What is the risk level of participating in Zooville just using a standard cell phone with no bells and whistles...?
I know having sex with animals is a crime in my state. I'll have to check to see if possession of zoo porn is, too (I don't think it is....)I think as long as you don't post anything identifable, if they know how to get to a private browser (incognito) and can remember their details, they may get by just with that. But also depending on the area they're in. As long as they're not saving content, as in the US, a couple of states forbid having zoo porn.
According to this:I use TOR, as I assume most of you guys do as well.
I do use a Windows device, because, well... I'm poor.
I've wondered how much I've been watched over the years by [insert surveillance group name here] but all in all, nothing has happened. Although, I haven't done anything illegal. Viewing zoo porn is "okay" but possessing it is a grey area where I am, from what I understand.
Engaging in it, abetting it, and producing zoo porn is outright illegal, which I guess my inexperience leaves me in a bit more of a favorable position. Because I haven't broken any laws in my state, and don't reeeeally have any plans to. (Not that I'm accusing anyone here of that.)
Unless new laws pass that make viewing zoo porn outright banned and punishable, I don't think I personally have much to be concerned with. Except of course, for the possibility of new laws passing.
The bigoted and willful misunderstanding of a sexual interest in non-humans can be argued by us all we want, but at the end of the day, the argument is being aimed at brick walls. Even fantasy talk is sort've seen as immoral, despite furry communities being more accepted than ever.
I'm sure we're all familiar with To Catch a Predator. I'm by no means comparing any zoophile to predators, please bear in mind. But every time a predator is caught, they were very, very careless. Personal emails, no VPNs, personal phone numbers, various other personal details, showing up in person, etc. Even though Chris Hanson probably won't be asking any of us to take a seat because we showed up expecting a dog owner we met online anytime soon, a bit of common sense will go a long way.
And perhaps the biggest thing is to keep the actual physical abusers of animals out of this community. I don't think there's many of us that like being swept into the same category as some of the more sick folks who downright torture animals. And having a good sense of what screams "catfish." Neighborhood watch definitely needs to be everyone's responsibility. I guess that's the tax of Zooville.
I know having sex with animals is a crime in my state. I'll have to check to see if possession of zoo porn is, too (I don't think it is....)
Some good news, anyway: possession of zoo porn is illegal and only one of the 50 statesI know having sex with animals is a crime in my state. I'll have to check to see if possession of zoo porn is, too (I don't think it is....)
Agreed. It's been a real eye-openerZoophilia - Wikipedia
en.wikipedia.org
Also, thanks to everyone who contributed to this thread. Much appreciated!
I'm using the proton mail also. Thanks to the site for the suggestionYeah I think when I signed up I saw a recommendation for Proton Mail and that seems to work good. I've just recently started using the Tor browser and It seems good but kinda slow. Maybe with the encryption that's just the nature of it, Idon't know.
I also have Protonmail but also Proton VPN. I connect through that most of the time If not all the time. I’m not 100% sure how I’m being protected but I’m using it,I know having sex with animals is a crime in my state. I'll have to check to see if possession of zoo porn is, too (I don't think it is....)
According to this:
https://www.indy100.com/viral/animal-porn-us-states-legal-where-zoophile-zoophelia-oregon-9300871
There was only one state in the United States where possession of zoo porn is illegal.
Some good news, anyway: possession of zoo porn is illegal and only one of the 50 states
Agreed. It's been a real eye-opener
I'm using the proton mail also. Thanks to the site for the suggestion
Yeah I think when I signed up I saw a recommendation for Proton Mail and that seems to work good. I've just recently started using the Tor browser and It seems good but kinda slow. Maybe with the encryption that's just the nature of it, Idon't know.
PM sent.I attempted to contact a specific moderator, but have been unsuccessful so far.
Is it possible to have one contact me when able?
use Tor browser.If it hasn't already been done, may I ask what user info ZV logs? IP address etc and how long does it store the details? Just asking for a friend ?
Use Tor and VPN it will give you just a bit of relief ??If it hasn't already been done, may I ask what user info ZV logs? IP address etc and how long does it store the details? Just asking for a friend ?
Mainly how easy it is to audit what's going on "under the hood". The onion browser is built on top of TOR, so as long as you aren't doing anything outright stupid (storing pages on your device "in the clear", ferinstance) you *SHOULD* be OK. The problem (Especially if you're working with iPad/iPhone/Apple Watch) is trying to figure out what might be getting done "under the hood" that you aren't being told about. On a desktop, it's fairly easy to "compile your own" from known-clean, exploit-free source that you've inspected personally (assuming you've got the programming know-how to do that) b ut trying to do that for an Apple device other than a Mac tends to be problematic due to the way Apple plays games that screw developers. It isn't impossible, but it's a LOT harder than it ought to be. Can't speak to "other than Apple" devices directly, but since most of the development/support for TOR (and stuff derived from it, like the onion browser) is done on Wintel hardware, it's easier to get hold of the source code so you can inspect it and be (reasonably) sure there's nothing hinky going on.Is there any difference between Tor on PC and onion browser for your phone?
thank you for the info it helped a lotMainly how easy it is to audit what's going on "under the hood". The onion browser is built on top of TOR, so as long as you aren't doing anything outright stupid (storing pages on your device "in the clear", ferinstance) you *SHOULD* be OK. The problem (Especially if you're working with iPad/iPhone/Apple Watch) is trying to figure out what might be getting done "under the hood" that you aren't being told about. On a desktop, it's fairly easy to "compile your own" from known-clean, exploit-free source that you've inspected personally (assuming you've got the programming know-how to do that) b ut trying to do that for an Apple device other than a Mac tends to be problematic due to the way Apple plays games that screw developers. It isn't impossible, but it's a LOT harder than it ought to be. Can't speak to "other than Apple" devices directly, but since most of the development/support for TOR (and stuff derived from it, like the onion browser) is done on Wintel hardware, it's easier to get hold of the source code so you can inspect it and be (reasonably) sure there's nothing hinky going on.