![]() ![]() I am able to get spaces, members in spaces, but I am not able to get Messages of space. That said, unless you are a big fish to them, they are very secretive about capabilities and are unlikely to play their hand against you.I have Integrated Google Hangout chat for node js web application. Any hardware you order could be modified to include trojans, and targeted 0-day attacks could be deployed against your system.You can probably only hope to slow them down, not stop them. Targeted surveillance by a state level actor like the NSA? Similar to the above but even harder as they may be able to do things like traffic analysis on Tor.You can possibly make it harder (although not impossible) for this class of adversary by using services in a range of different jurisdictions, and using disposable Visa / Mastercard gift cards to pay for SMS services - with enough hurdles they may just give up. I'm not sure of a good solution for this one as most SMS services that Google will allow you to use are not free (criminals can get around this by using stolen payment details unfortunately, but not honest people - a sad state of affairs). Anyone who can subpoena documents from multiple parties in legal procedings? In the worst case, this adversary can obtain anything Google can do above, plus you can't rely on third party services for SMS if the third party service knows your real name.don't search for keywords to research your videos in non-anonymous Google searches), be careful about writing style and vocabulary usage to avoid statistical stylometry, don't use camera equipment that has also been used for any video that could be linked to your name, and be careful about leaking the time on your system (I suggest running ntpd and using a seperate physical box that is only used for the anonymous browsing). Google if they put human effort into investigating who you are (assuming they only use Google data - so excluding if they are filing lawsuits and using subpoena to get data from third parties)? As above, but also use a Tor circuit or a VPN you don't use for anything else, use something like Tor browser bundle to avoid fingerprinting, avoid any imagery of yourself or your voice in the videos, ensure the content of your video or the timing of their appearance doesn't correlate with non-anonymous data on other Google products (e.g.Data collected through the dragnet could still be used for targeted de-anonymisation later. ![]() If your content is flagged as of interest to them, you might then become the subject of targeted surveillance, which is much harder to protect against.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |