Search results

Posts by User


Comments by User

Is using a VPS better opsec?
- /u/MadHatterExpressed 12th March, 2024 - 02:09 Issue is now you have multiple networks to secure. Also really depends on what you're doing and the threat modules.

Regardless refundence with the amount of connections there even in the fastest you'll be 300ms+

by /u/originaldoc53 · 2024-03-12 00:42:00 in /d/OpSec

0 votes · 15 comments

How phishing works explained by a Hacker.
- /u/MadHatterExpressed 7th March, 2024 - 03:15 I really don't understand how any of this seems rude or bullying. I answered the question along with told you where to learn more. Direct is not rude nor bullying. It's proper English. Grow up a little bit

by /u/Kaliningrad · 2024-03-06 01:40:00 in /d/hacking

0 votes · 14 comments

How phishing works explained by a Hacker.
- /u/MadHatterExpressed 6th March, 2024 - 04:43 How would the SMS Open itself UNLESS it already had malware to control your phone remotely (Aka: Infected)

Think logically with this sort of stuff. Please stop asking questions google can answer... I know you're new but step 1. is to learn clearnet things first haha. Opening an SMS isn't going to do anything, Clicking a link opens a site which can be exploited via a browser to inject virus (Though, Those exploits get patched quickly by major browsers. and new ones are found and used) same as downloading a file could have a virus that executes on runtime and you gave it permission by running it.

by /u/Kaliningrad · 2024-03-06 01:40:00 in /d/hacking

0 votes · 14 comments

How phishing works explained by a Hacker.
- /u/MadHatterExpressed 6th March, 2024 - 04:41 With the fact you're extremely new and have essentially ZERO knowledge of hacking (And seems limited by history of tech and its interworkings)

This is far out of your grasp, reverse surveillance and figuring that all out is not an easy step by step guide. its per situation and constantly changing. You were not "attacked" by black cat. You just have a likely network spread virus if you shared wifi. Your new laptop isn't screwed though, It's 100The chances of being able to "Contact them" is essentially zero. If it was an actual known group theyre top levels they aren't going to leave any messy code, files, muchless contacts for you to see or play with.

by /u/Kaliningrad · 2024-03-06 01:40:00 in /d/hacking

0 votes · 14 comments

Seeing alot of posts asking for help regarding OpSec, but leaving out what their threat model is like. So here's a quick guide!
- /u/MadHatterExpressed 6th March, 2024 - 03:34 I think a bigger issue (That this starts to address) is people aren't certain of what the actual threat is. A prime example.

"I'm a rookie carder only carding food for others & small (sub $200) items (Digital for example sake of not bringing IRL aspects)"

Of course, They know its not a legal activity so they're not naive. But what exactly their 'threat' is. They'd be mostly unaware of.

I think it'd be just as helpful as this post to have more examples lined out with information. Like things listed in Lo/Mi/Hi levels of risk. And Lo/Mi/Hi threats.

It'd help people build an actual module around it haha.

by /u/[deleted] · 2024-03-06 03:07:00 in /d/OpSec

0 votes · 19 comments