Knotted1975
Tourist
Is there a way to delete pics not actual accounts.
Yes. It poses a risk from many different points. Update frequently fix security issues.My PC is very old though and I don't have enough space on the drive to update my OS anymore. Does this pose any risk to me here?
Definitely plan to ditch this thing soon for something much more powerful (and with more space). Definitely doing Linux instead of Windows as well and if I ever need Windows for something gaming wise there's always virtual machines.Yes. It poses a risk from many different points. Update frequently fix security issues.
Considering you do not have space for update I guess windows. As on linux you would have other means of doing this. Such as backing up your home folder and installing a new distro from scratch.
But a windows machine with a 32GB EMMC is going to be landfill waste pretty much immediately.
Replace that trash with a xfce or lxde based linux distro asap.
Report it.How does one remove a comment on a thread?
My PC is very old though and I don't have enough space on the drive to update my OS anymore. Does this pose any risk to me here?
TOR browser.free vpns out there?
Whatever has been saved by your ISP can not be cleared by you.how do i clear my tracks if i havent been using vpn?
Discord records and keeps everything you post. You can see for yourself by filling out a data subject request with them. They will return a packet of data showing your entire chat history etc. I would not trust discord for anything but playing video games and innocent chat.
Wipe your local history on your device. Start using a vpn they are cheap. I use Mullvad purchased with crypto. Some also use Tor as another layer. I use mullvad on my pc and phone . Then I use privacy browsers that don’t keep history by design. Firefox Focus on mobile and Librewolf on pc.how do i clear my tracks if i havent been using vpn? free vpns out there?
I do not know about other countries. But here they are required to hold onto the records for a certain number of years before deleting them.Edit : as others said any info your ISP has is out of your control.
Yea it’s not enough to nail you outright, but can be used as evidence to target you for an investigation. Worst case is they get a warrant to search your devices though it’s dubious if dns queries would be sufficient alone.I do not know about other countries. But here they are required to hold onto the records for a certain number of years before deleting them.
So for example they will keep your DNS requests for 4 years. DNS is typically not encrypted unless you enabled it.
So if you visit zooville, your ISP will know you looked up this host name. The actual contents of what you did on the website is encrypted by https so that should not be visible to them.
how do i clear my tracks if i havent been using vpn? free vpns out there?
Yea it’s not enough to nail you outright, but can be used as evidence to target you for an investigation. Worst case is they get a warrant to search your devices though it’s dubious if dns queries would be sufficient alone.
I do not know about other countries. But here they are required to hold onto the records for a certain number of years before deleting them.
So for example they will keep your DNS requests for 4 years. DNS is typically not encrypted unless you enabled it.
So if you visit zooville, your ISP will know you looked up this host name. The actual contents of what you did on the website is encrypted by https so that should not be visible to them.
Bad news: Using TOR and VPN together can (not "will", but can) trigger a couple of conditions that effectively destroys ALL protection from EITHER. VPN folks won't tell you this, but TOR folks will. I don't pretend to understand the "how" of it, but peopel I have reason to believe have said many times that VPN+TOR=serious (and easily exploited) potential for your supposedly "private" data to leak to even casual attackers. Against a government entity with (effectively) unlimited funding, using a VPN into TOR is slightly less secure than the screen door on your front porch - Yeah, it'll keep the flies and skeeters outside, but it ain't gonna do a damned thing to stop the rottie that decides to jump through it, or the crook who wants to rob you...I use both because Im concerned my real IP address will leak if Tor goes down.
All true I never thought about it that way being used as a defense. I suppose this is why they almost always catch people on posession or disseminating of illegal content. The DNS lookups and patterns of such are just little beacons that you MAY be visiting those sites. They may use that to add you to a list for further scrutiny and surveillance. The actual kill shot is a warrant for your devices and they find the content, or solid evidence that you uploaded content to someplace. Many times they use payment information, as in for pay services linked to you. Like you used your CC to purchase obvious access to illegal media.There's a "catch" you (or your lawyer, if it gets that far) can use as at least a partial defense - When you visit a site - *ANY SITE AT ALL*, regardless of whether it's the pureset, cleanest, G-rated-est site on the planet, or a site that serves up honest-to-god torture-snuiff-pedo porn, or anything you can imagine in between, you have *ABSOLUTELY NO CONTROL WHATSOEVER* what that site might trigger a DNS lookup for. Go to a cooking/recipes website, and you might, without ever knowing it, request lookups for anything from google's "urchin" (their stats/tracking/counting infestationware) server, or an image-hosting site for the picture of the nice fresh loaf of bread that the page displays, any number of ad servers, perhaps a server that hosts the code that puts a stock ticker across the top of the page you want to look at, any number of servers that ticker looks at to find out what the price of Ford stock is, some other site for the music that plays when you open the page, or pretty much anything else that you can imagine someone putting on a web page.
In other words, just because there's a record of a DNS lookup for "www.we-rape-four-year-olds-before-torturing-them-to-death-live-on-your-screen.xxx" on your machine is *NO* indication whatsoever that you've ever seen so much as a single pixel from a single frame of a kiddy-snuff movie - Just by virtue of how the internet works, it could be that your machine did indeed look up the address of the "evil" server - because something on the page you *WANTED* to see loaded something from who-can-even-guess-where as part of loading itself onto your machine in response to your request. That something may be operating on the same server as the kiddy-snuff site. Or it may in turn be asking a third server for a piece of the original "www.how-to-make-a-loaf-of-bread.com" page you wanted to see to begin with. And so on.
In short, it's not only possible, but *VERY* likely for your attempt to load "www.makechilifordinnertonight.com" or "www.paintmycar.net/prices" to spawn dozens, possibly hundreds, and in some extreme cases, maybe even THOUSANDS of DNS queries that you, the person sitting at the keyboard, have absolutely no idea about, have no clue they're happening at all, and since they produce *NO* detectable output on your screen, therefore you have no indication that such requests ever happened.
TL;DNR:
While DNS lookups CAN leave tracks, the reality (to anyone who has even the most basic understanding of how TCP/IP (AKA "The Internet") and HTTP/HTTPS (AKA "The Web") works) is that, although it's rarely encrypted, almost nobody except the most desperate will even TRY to make the case that because a DNS lookup for "www.howtomurderyourneighbor.com" exists on your machine, you're guilty of killing your next door neighbor. Or at least, they won't make such an attempt without a metric fuck-ton of other evidence - evidence that would likely be way more than enough to get a warrant/make an arrest even without the DNS info.
VPN and TOR only hide your IP. IF they are really determined they will leverage other tracking tech like browser fingerprinting or browser exploits that make it give up your real IP. Usually involves tricking their target to visit another site that is loaded with a payload and tech to do so. Then they swoop in , grab your device, and prove that only your browser in all the world with its unique fingerprint visited the illegal site in question. Even so, there are a lot of defenses to use. For instance it is not illegal to talk about bestiality, or say how you like it , and how much you want to do it. AFAIK even viewing images of it isn't illegal in many places even with "crimes against nature" laws. What they really want to get people on is them creating the content and disseminating it, selling it, or soliciting for it usually for favors or money. It is the act of fucking the animal is that is the big whammy illegal in many places. This is why content security measures is imperative. The FAQ on this site covers a lot of the easy basic steps to take. Also ensure your personal library of content that you create, even if you don't share, is well hidden and protected (encrypted with plausible deniability measures) like Veracrypt offers. It has a feature to encrypt files with two passwords, one that actually decrypts your content, and another that you give under legal duress that just decrypts some innocent files. And they can't prove you gave the wrong key because everything is scrambled.Bad news: Using TOR and VPN together can (not "will", but can) trigger a couple of conditions that effectively destroys ALL protection from EITHER. VPN folks won't tell you this, but TOR folks will. I don't pretend to understand the "how" of it, but peopel I have reason to believe have said many times that VPN+TOR=serious (and easily exploited) potential for your supposedly "private" data to leak to even casual attackers. Against a government entity with (effectively) unlimited funding, using a VPN into TOR is slightly less secure than the screen door on your front porch - Yeah, it'll keep the flies and skeeters outside, but it ain't gonna do a damned thing to stop the rottie that decides to jump through it, or the crook who wants to rob you...
TL;DNR:
While DNS lookups CAN leave tracks, the reality (to anyone who has even the most basic understanding of how TCP/IP (AKA "The Internet") and HTTP/HTTPS (AKA "The Web") works) is that, although it's rarely encrypted, almost nobody except the most desperate will even TRY to make the case that because a DNS lookup for "www.howtomurderyourneighbor.com" exists on your machine, you're guilty of killing your next door neighbor. Or at least, they won't make such an attempt without a metric fuck-ton of other evidence - evidence that would likely be way more than enough to get a warrant/make an arrest even without the DNS info.
That.VPN and Tor Browser
Some experience with Tails, have read about it, but seems that it not that straight forward...That.
+ Some use Tails or similar.
In fact it can not be easier.Some experience with Tails, have read about it, but seems that it not that straight forward...
Thanks! Will give it a chanceIn fact it can not be easier.
Download it.
Put it on a flash disk.
Boot it.
I mean... it's part of a decent security strategy. You don't want to rely on any one thing to protect yourself. Multi-layer security is the key. Non-logging VPN, non-tracking search engine, privacy-focused browser... those are must-haves. Me, I kinda go overboard... I do all my questionable activities within a Linux virtual machine, because I do not trust any non-open-source operating system to not report back to the mother-ship, and it's pretty easy to nuke a virtual machine, since the virtual hard drive is just another file on your system... delete the file, empty Recycle Bin, and wipe the free space on the HD. Then again, what I do for a living... I kinda know some of the tricks of the tradeIs Duck Duck Go a decent level of security?