[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y ] [Home]
4chanarchives logo
Can you track back dead drop users?
Images are sometimes not shown due to bandwidth/network limitations. Refreshing the page usually helps.

You are currently reading a thread in /g/ - Technology

Thread replies: 69
Thread images: 6
File: maxresdefault.jpg (113 KB, 1280x720) Image search: [Google]
maxresdefault.jpg
113 KB, 1280x720
Can you track back dead drop users?
>>
yes they all contain tracking malware
>>
File: usb-killer-640x401.jpg (39 KB, 640x401) Image search: [Google]
usb-killer-640x401.jpg
39 KB, 640x401
This seems like a good idea.
>>
ok, what if i am the creator of a read only dead drop

can they track me back?
>>
>>51988737
Yes.
ROM S/N can be traced.
>>
>>51988817

Darn, wanted to make a DD with some questionable files

I guess i'll avoid that lol, not worth the risk to share stuff
>>
File: f0130741_1163650.jpg (206 KB, 800x1202) Image search: [Google]
f0130741_1163650.jpg
206 KB, 800x1202
Creator, or person putting it into their PC?

It should be secure enough if you're doing it from a secure operating system on a PC that can't be traced back to you (disposable used laptop, purchased with cash), and that's assuming that USB is backdoored to identify where its been, which there is no proof of.
>>
>>51989029
creator

but i don't think people would hassle it just for some pizza...
>>
>>51988586
those would discharge in a few days
>>
>>51988418
I never understood why people would risk connecting their computers here. Don't they understand that it's possible to connect the dead drop to a power source that'll fry your computer?
>>
>>51988737
buy a laptop from ebay, craigslist for little $$$ and use that to transfer the files. Then bin the device or bury it somewhere far away
>>
>>51989157
that's not how it works. It takes the 5V and boosts it to 100V and fries the USB power lines
>>
Just buy USB with cash, transfer from Linux.
Done.
>>
>>51988586
I want to buy some, pre charge them and leave them on campus...

Keks guaranteed
>>
File: 138446483649.jpg (57 KB, 599x602) Image search: [Google]
138446483649.jpg
57 KB, 599x602
>>51988852
>go to a small store
>buy the most generic chinese brand flash drive you can find
>pay in cash

You'll probably be fine, just remember to use a clean OS to copy the files, so they can't be linked to your OS through proprieties or some similar shit.
>>
>>51988584
>plug computer into usb side of building to upload memes
>notice anti virus program on desktop
>install malware tracking
>>
>>51989263
Where do you buy them? All I can find is a guide to make them
>>
>>51989291
The OS doesn't matter. Assuming OP is doing something illegal, investigators would be looking for device serial numbers.
Source: https://www.magnetforensics.com/computer-forensics/how-to-analyze-usb-device-history-in-windows/
>>
>>51989187
That's why you use a filter anon.
>>
I seriously hope you guys don't do this
>>
>>51989466
fresh VM and delete the VM afterwards
>>
What would you put in these things that can't be easily acquired elsewhere on the internet?
Seems pretty pointless desu senpai
>>
>>51989466
Imagine the OP, doing all sorts of spy stuff to buy a untraceable device, then he copies all his collection of files that has the propriety "Owner: John OP Doe" thanks to his OS.

>>51989615
This is a solution, or a LiveCD.
>>
>>51989615
A VM doesn't change anything in this. The device is first mounted to the OS hosting the VM before it is mounted to the VM. The only way I can think of doing this is this.
>Purchase laptop and USB in cash using throwaway craigslist account which is created and used on only public wifi
>IF laptop ever enters your house disconnect the battery
>Only power laptop when far away from your residence
>Use OS only stored in volatile memory (i.e. tinhat)
>When complete throw away laptop.
I doubt it's really that worth it though t.b.h. f a m
>>
What would happen if one of these were installed with CP in a building?
>>
>>51989837
>Implying people would actually plug their laptop into a random USB sticking out of a wall
Probably nothing
>>
File: 1330483276862.jpg (38 KB, 333x500) Image search: [Google]
1330483276862.jpg
38 KB, 333x500
>>51989685
cp
>>
>>51989408
just build one then, if you can't you don't belong on /g/ anyway
>>
>>51989837
The security cameras would be checked to see who drilled a hole in the wall and stuck a USB drive into it.

Also forensics would be done on the drive, probably some physical evidence left behind.
>>
Unrelated, but I got a USB drive as a gift. Would putting TOR on it be good for private browsing in public?
>>
>>51989837
An FBI raid, followed by the property owner getting a long prison sentence, followed by a media frenzy, followed by public outrage, followed by more of your rights being taken away.
>>
File: hipster fries tracbook.jpg (496 KB, 683x1024) Image search: [Google]
hipster fries tracbook.jpg
496 KB, 683x1024
>>51989862
You clearly don't understand hipsters
>>51989898
>Tor
>Private browsing
Pick one.
>>
>>51989898
Put Tails on it
>>
>>51989898
Sure, but don't expect to have any privacy by doing so. If you do anything to attract law enforcement, figuring out who you are would be a very simple matter.
>>
>>51989798
>boot a liveUSB from a public space like an internet cafe or library.
>copy files in question to DD USB

seems simple enough. live CD/USB to avoid incriminating metadata sneaking onto the DD, and using it in a public location where you can easily give an assumed identity or pay in cash to avoid a paper trail.

It also helps if you're transferring "clean" files onto the DD USB (by scrubbing the metadata or using encryption to protect the files in question) and doing >>51989291
>>
>>51989915
Assuming the owner did not authorize the USB to be there.
>>
>>51989888
You're right I don't belong on /g/. I have a full time job and a family to take care of and therefore don't have time to sit on my ass and build autistic devices.
>>
>>51989921

doesn't Tails just work on the Tor network?

>>51989916

then what should I use?
>>
>>51989971
>he wants to pay for autistic devices
>he has a family and wants to spend his time paying just to fuck with someones pc
>don't have time to sit on his ass but does have time to shitpost and be a stupid nigger
ok anon
>>
>>51989227
Just spotted the coil. That changes things lmao
>>
>>51989991
Tails is much better than using just Tor alone
>>
>>51989991
Depends on what you mean by private. Private from the host of the public wifi? Private from websites your browsing? Private from the gubment? Be more specific.
>>
>>51990085

Private on public Wi-Fi, browsing, things of that nature. It's probably not possible to be private from the gubbermint, but that too if possible.

>>51990009

I'll read more into this, thanks
>>
>>51990009
>>51990121
don't even, you're both on a watchlist for mentioning it now anyway
>>
>>51989971

Then fuck off nigger. What the fuck are you doing here? No wonder your wife goes on monthly business trips to Detroit.
>>
>>51990147
So are like one million other people
>>
>>51990121
Well if you just want to be private from the host tor is fine. For the government, the more jurisdictions the better. An entirely foreign hosted VPN is your best bet though hardware backdoors still make it pretty much impossible.
>>
>>51990147

and now you are too for linking us
>>
>>51990179
fuck...
>>
>>51989916
how incredibly gay
>>
>>51988418
The fuck is a dead drop?
>>
>>51993624
spies used to do it
>>
>>51989882
Kill yourself
>>
>>51989205
>What is a library
>>
Just use a piratebox
>>
>Plugging an unknown USB into your device
Literally an accident waiting to happen
>>
>>51988418
>usb glory holes
Thats one way to fuck your shit up
>>
>>51994223
why not use a usb extension cable or a hub?
>>
>>51989157
One guy in Taken did it with a few phone calls and a particular set of skills.

Now imagine if it's someone's job.

Don't be a moron and just stop with that shit altogether. Instead put in some work towards maybe learning how to play a new video game and attract yourself a young 20 something gamer girl. They always want to be with the computer dude.
>>
>>51989685
Distributed malware? I imagine that whole first scene in the matrix where Neo hands over some software for money could be done as a dead drop if the software was tied to the hardware in any way, like dongles. There's a lot of people out there that don't want to dabble in the funny side of computers and would rather just plug and play.

It probably sounds like I know what I"m talking about, though. I don't. But I did watch the matrix.
>>
>>51989709

They caught BTK through finding metadata left by his OS, fucktard.

>what is real life
>>
>>51988418
It be more effective to set up an open FTP, and just have a sign displaying connection info. I want to do something similar at my campus with a raspberry pi or something to see what people put on there.

FOR SCIENCE!
>>
>>51995514
That's not untraceable. In fwct that us completely traceable as yiu would have to give an IP.
>>
>>51993624
OP is taking about a USB glory hole.

It's a USB end sticking out of a hole in the wall, and you butt you computers ass up tonit, until it slips in, and our comes buckets of files. And viruses.

USB. Glory. Hole.
>>
So, just to make sure I'm understanding this correctly....you want to modify a thumb drive so that you can hide it in a discreet location outdoors, say in a wall or a log. You want to do this so you can discreetly carry your laptop to it to retrieve files by pressing it against the log/wall/whatthefuckever.

Does that really sound like a sane idea to you? Is there ever a way to discreetly CARRY AROUND AN OPEN LAPTOP IN THE FUCKING WOODS?
>>
>>51989916
hahahaha bre pettis

forgot he existed with that hipster name
>>
>>51988418
>>51995514
Make a piratebox instead, you can run it on a laptop, or an android phone.
>>
>>51997721
People take laptops to beaches like its socially acceptable when its really not.

Is this any different? No.
>>
>>51989466
>Windows
You should be using a non networked Linux live environment for USB dead drops. Any logging or exploit gets wiped away at reboot.
Thread replies: 69
Thread images: 6

banner
banner
[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y] [Home]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
If a post contains personal/copyrighted/illegal content you can contact me at [email protected] with that post and thread number and it will be removed as soon as possible.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com, send takedown notices to them.
This is a 4chan archive - all of the content originated from them. If you need IP information for a Poster - you need to contact them. This website shows only archived content.