Welcome to NethinGoez

Greetings to all guests. You have been required to change your password. Please click 'Forgot Your Password' link on the login page and follow the necessary steps to change your password. If you're having issues resetting your password, please E-Mail futomntg@gmail.com


Bonez

Super Mod
  • Content count

    1,308
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by Bonez

  1. And winner by Walkover (bitch move @CountAccount ) BONEZ! Still the Keystyle CHAMP! Call Bonez out for some word-ass-whooping
  2. Welcome to Boneyz Battle thread, get ready for war niqqas and wiggas. Rules Call someone out 12 - 16 bars of dishing out word whopping (don't get too personal) 2 replies per battle Winner is declared by amount of likes (or me since I'm 1337 hip-hop guru) Last rule - Write your own, don't copy shit from somewhere.
  3. I finally found it @CountAccount I was like okay let's try this stuff out. Is it REALLY as good as @Nazgul & @CountAccount say it is? Made a salad, started eating, then something happened, I vomited. I need this:
  4. A cryptocurrency (or crypto currency) is a digital asset designed to work as a medium of exchange using cryptography to secure the transactions and to control the creation of additional units of the currency. Cryptocurrencies are classified as a subset of digital currencies and are also classified as a subset of alternative currencies and virtual currencies. Bitcoin became the first decentralized cryptocurrency in 2009.Since then, numerous cryptocurrencies have been created. These are frequently called altcoins, as a blend of bitcoin alternative. Bitcoin and its derivatives use decentralized control as opposed to centralized electronic money/centralized banking systems. The decentralized control is related to the use of bitcoin's blockchain transaction database in the role of a distributed ledger. Pros Decentralised - There is no "Bank" that owns or create your "money" it's all driven by it's users (Holders/Miners) Anonymity when making payments, especially popular on the Deep Web You can make significant financial gains buying and selling at the right time Crypto Currencies removes the capitalistic power from the elite to the people Cons You could loose money investing wrong Read more here
  5. @CountAccount I'm callin yo ass out in a keystyle rap battle, BETCH. El Conde from spain A.K.A maricón Bashes on Bonez when he's tryin out Jamón I was trying to be nice, but now you brought the fiyah I'ma rip your ass apart and slap your ass you liar You said Jamón was the beesknees the holy grail I show respect and eat it, and you retaliate by dissing my cooking skills now I'ma show you war I'm the underground king a fuckin keyboard star You get yo ass to Ikea and have some lingon and meatballs what they forgot to tell you is that they're actual "meat balls" But you don't care you like that shit especially with hairs on I'm lyrically beat you up u better put your gear on helmet of kevlar get a shield or some shit when I am done with you, you be crying like a bitch or rather being true to who you really are answer this callout is like reaching for the stars! BRRRRRRRRREEEH SKIRT SKIRT
  6. And winner by KO @Bonez !!!!!!! btw who the fuck is this lol -> @BonezIsaCUNT
  7. Do you understand how much meta-data is collected about you? Basically every un-encrypted letter you write on your keyboard, every single word you speak on your phone, can be intercepted at any moment a government wishes to do so. They normally like in U.S. also store these records with technology few ever get to see. No I'm not being a foilhat, this is the agonizing truth. However, there are ways to avoid getting your meta-data collected and intercepted. First of all you need to change your internet habits, if you think being behind a VPN makes you safe, you are gravely mistaking. So how do you stay anon? 1. Get VirtualBox 2. https://whonix.org -> Get a more secure OS and run this in your VM. Whonix comes standard equiped with Tor, which everybody should use. 3. Are you using Gmail? forget about it. You need to switch it up. The best way to communicate is by using PGP (Pretty Good Privacy) encryption with them you communicate with. For chatting in real time I recommend using Pidgin (an IM) with a XMPP account and run it over tor. Full guide availible here: https://help.riseup.net/en/chat/clients/pidgin#tor-with-pidgin-configuration 4. Recomended e-mail service providers for everyday use: ProtonMail with 2FA / Tutanota Encrypted Mail 5. Addons in firefox/Tor, should look something like this: with emphasize on NoScript & https-everywhere & Privacy Badger + (SelfDestructing Cookies propz to @Count Account) those are must haves for everybody. EDIT: & ALSO USE A VPN ALWAYS!! NOT A CRACKED ONE, GET A REAL ONE AND PAY FOR IT WITH BTC AND DON'T LET THE VPN PROVIDER KNOW WHO YOU ARE. Care for your privacy, because your government don't. Stay Anonymous. Update 2017: More Secure Hardened Hardware: Librem 15: A Laptop That Respects Your Rights | Crowd Supply A librem computer is the beesknees if you truly wanna get off the grid of the international dragnet, and educating yourself in Privacy is KEY. Anonymity networks protect people living under repressive regimes from surveillance of their Internet use. But the recent discovery of vulnerabilities in the most popular of these networks — Tor — has prompted computer scientists to try to come up with more secure anonymity schemes. At the Privacy Enhancing Technologies Symposium in July, researchers at MIT’s Computer Science and Artificial Intelligence Laboratory and the École Polytechnique Fédérale de Lausanne will present a new anonymity scheme that provides strong security guarantees but uses bandwidth much more efficiently than its predecessors. In experiments, the researchers’ system required only one-tenth as much time as similarly secure experimental systems to transfer a large file between anonymous users. “The initial use case that we thought of was to do anonymous file-sharing, where the receiving end and sending end don’t know each other,” says Albert Kwon, a graduate student in electrical engineering and computer science and first author on the new paper. “The reason is that things like honeypotting” — in which spies offer services through an anonymity network in order to entrap its users — “are a real issue. But we also studied applications in microblogging, something like Twitter, where you want to anonymously broadcast your messages to everyone.” The system devised by Kwon and his coauthors — his advisor, Srini Devadas, the Edwin Sibley Webster Professor of Electrical Engineering and Computer Science at MIT; David Lazar, also a graduate student in electrical engineering and computer science; and Bryan Ford SM ’02 PhD ’08, an associate professor of computer and communication sciences at the École Polytechnique Fédérale de Lausanne — employs several existing cryptographic techniques but combines them in a novel manner. Shell game The heart of the system is a series of servers called a mixnet. Each server permutes the order in which it receives messages before passing them on to the next. If, for instance, messages from senders Alice, Bob, and Carol reach the first server in the order A, B, C, that server would send them to the second server in a different order — say, C, B, A. The second server would permute them before sending them to the third, and so on. An adversary that had tracked the messages’ points of origin would have no idea which was which by the time they exited the last server. It’s this reshuffling of the messages that gives the new system its name: Riffle. Like many anonymity systems, Riffle also uses a technique known as onion encryption; “Tor,” for instance, is an acronym for “the onion router.” With onion encryption, the sending computer wraps each message in several layers of encryption, using a public-key encryption system like those that safeguard most financial transactions online. Each server in the mixnet removes only one layer of encryption, so that only the last server knows a message’s ultimate destination. A mixnet with onion encryption is effective against a passive adversary, which can only observe network traffic. But it’s vulnerable to active adversaries, which can infiltrate servers with their own code. This is not improbable in anonymity networks, where frequently the servers are simply volunteers’ Internet-connected computers, loaded with special software. If, for instance, an adversary that has commandeered a mixnet router wants to determine the destination of a particular message, it could simply replace all the other messages it receives with its own, bound for a single destination. Then it would passively track the one message that doesn’t follow its own prespecified route. Public proof To thwart message tampering, Riffle uses a technique called a verifiable shuffle. Because of the onion encryption, the messages that each server forwards look nothing like the ones it receives; it has peeled off a layer of encryption. But the encryption can be done in such a way that the server can generate a mathematical proof that the messages it sends are valid manipulations of the ones it receives. Verifying the proof does require checking it against copies of the messages the server received. So with Riffle, users send their initial messages to not just the first server in the mixnet but all of them, simultaneously. Servers can then independently check for tampering. Generating and checking proofs is a computationally intensive process, however, which would significantly slow down the network if it had to be repeated with every message. So Riffle uses yet another technique called authentication encryption, which can verify the authenticity of an encrypted message. Authentication encryption is much more efficient to execute than the verifiable shuffle, but it requires the sender and the receiver to share a private cryptographic key. So Riffle uses the verifiable shuffle only to establish secure connections that let each user and each mixnet server agree upon a key. Then it uses authentication encryption for the remainder of the communication session. As long as one server in the mixnet remains uncompromised by an adversary, Riffle is cryptographically secure. “The idea of mixnets has been around for a long time, but unfortunately it’s always relied on public-key cryptography and on public-key techniques, and that’s been expensive,” says Jonathan Katz, director of the Maryland Cybersecurity Center and a professor of computer science at the University of Maryland. “One of the contributions of this paper is that they showed how to use more efficient symmetric-key techniques to accomplish the same thing. They do one expensive shuffle using known protocols, but then they bootstrap off of that to enable many subsequent shufflings.” “When you use standard encryption on the Internet, you use an expensive public-key crypto system to encrypt a short key, and then you use symmetric-key techniques to encrypt your longer message,” Katz adds. “But it’s novel in the context of these mixnets. They’ve been around for 20, 25 years, and nobody has had this insight until now. In the standard context of encryption, you have the honest sender and the honest receiver, and they’re defending against an external malicious attacker. Here, you need stronger properties. The issue is that the server that’s doing the shuffling might themselves be malicious. So you need a way to ensure that even a malicious server can’t shuffle incorrectly.” Nice add-ons, got them now. But I'm uncertain on the bolded part: Try here with "do not track" enabled: https://panopticlick.eff.org/ 7. NSA elite hacking team techniques revealed The NSA has at its disposal an elite hacker team codenamed "Tailored Access Operations" (TAO) that hacks into computers worldwide, infects them with malware and does the dirty job when other surveillance tactics fail. Der Spiegel, which detailed TAO's secrets, labelled it as "a squad of plumbers that can be called in when normal access to a target is blocked." But they can probably be best described as the NSA's black bag operations team. TAO comes in for specific, targeted operations when the NSA can't find intelligence or needs more detailed information on a target through its bulk surveillance programs. Before Snowden, most of their operations and techniques were shrouded in secrecy, and their secrets make for one of the most fascinating revelations. Read more here: https://freesnowden.is/revelations/#fisa-court-order-demanding-us-call-records http://mashable.com/2014/06/05/edward-snowden-revelations/
  8. I sell ice in the winter, I sell fire in hell I am a hustler baby, I’ll sell water to a well. - Jay-Z
  9. Awesome stuff @fed87 this is the kind of cracking we need more of. All people wanna do is jerk off. They need to get educated. Keep feeding them!
  10. @Solux So you're switching shit up making it bold Tellin Bonez to walk, now shit will unfold I do this shit here, in the third language i speak and I come out on top nigga this is the peak You cannot mess with my flow nor my clouds for that matter all that'll do is make your ass shatter into small little pieces, they will search for weeks but all they will find, is a sign, saying rest in peace! it's my last reply so I better get to business open them eyes up sit down and listen I got crazy flows that resemble Bizzy Bone from the group thugs n harmony If that white nigga came across my path he would be treated accordingly by the rules of the internet, there arent fuckin any ones so I'll not beat your ass up only slap you twice or maybe once hope u be feeling my rhythm just sit down kid, this is the big boy's room and fuckin with big boys will make you look like a goon, Brrrrrraaaaaa
  11. @Solux You was droppin some bars in an attempt to battle me last night tbh I fucked nasty hoes with fannys more tight Your flow is wack there's no real rhythm or feel I'ma give you a lesson son in how we keepin it real You be out on a chase, for that sticky icky real I got a fuckin box full that I use when I feel I'm a god damn pothead, high as a kite! But Im still gonna make you look wack allrite Oh wait you did that shit on your own No one in this bitch fuck with tha throne that throne belongs to me bad to the Bonez Sol got no weed, he should come to my home you've been called out @Solux
  12. no problem, it's what I do
  13. I have made 2fa reset on original account this one will be banned. Only one allowed. cool?
  14. So I'm always intrigued by a persons desktop, because they say alot about a man. Hop on the train and show me your's Here is mine
  15. U kno maan, marijuana's a harb. We fi dem have no qoore for asthma or glaucoma man. What gw'aan fi dem?
  16. Damn u sitting on a fuckin 38" monitor. Yes it was a dick joke. I feel shame now. Fuck you *running away crying*
  17. Hello bud. What's the name of your other account, you can only have one.
  18. Try not using privacy badger here: https://panopticlick.eff.org/ then try with it.
  19. Something like that @Solux?

    1. Solux

      Solux

      Perfect. Thank you kindly good sir. =)

    2. Bonez

      Bonez

      You're most welcome Sir Solux. Few of my acquaintances have such good manners.

  20. You should have a nice DMT cover photo, hooked ya up @Solux :biggrin:

     

    1. Solux

      Solux

      Thanks man, now I wish I had some DMT. So I can be blasted into another dimension. lol :bonez:

  21. This is not a legitimate question. In Germany, you need parliamentary knowledge and held lower offices to become chancellor. In US, any motherfucker with money can run for office obviously. You don't even have to be a senator. Merkel is a stupid hag, trump is a freakin joke. Conclusion: They both suck ass, but Merkel has experience in politics, for good and bad.
  22. Learn how to programme C, Citrix, Csharp, GO, Java Android, JavaScript, Jquery, Linux, PHP, Ruby, PYthon and ALOT more for FREE! Vid tut's are from Lynda.c0m [Hidden Content] Comment to reveal hidden content.