Welcome to NethinGoez

Greetings to all guests. You have been required to change your password. Please click 'Forgot Your Password' link on the login page and follow the necessary steps to change your password. If you're having issues resetting your password, please E-Mail futomntg@gmail.com


Erik

Shady Bastards
  • Content count

    1,600
  • Joined

  • Last visited

Community Reputation

504 NTG Loyal

5 Followers

About Erik

  • Rank
    STACK OR STARVE™

Recent Profile Visitors

3,462 profile views
  1. Pump and Dump Group Discord Invite

    let me check this out, seems interesting!!
  2. sentry mba Alfafile.net

    Thanks for sharing, habibi.
  3. sentry mba proxyless 4Shared.com

    thanks for sharing habibi
  4. sentry mba proxyless Share-online.biz +Capture

    Hope its still working, let me try
  5. VPN providers often advertise their products as a method of surfing the web anonymously, claiming they never store logs of user activity, but a recent criminal case shows that at least some, do store user activity logs. The case in question is of Ryan Lin, a 24-year-old man from Newton, Massachusetts, arrested on Thursday, October 5, on charges of cyberstalking. According to an FBI affidavit published by the US Department of Justice, Lin is accused of harassing and cyberstalking an unnamed 24-year-old woman — referred to under the generic name of Jennifer Smith — between April 2016 and up until his arrest. It all started with a Craigslist ad The two met after Lin answered a Craigslist ad and moved in with Smith and her two other roommates. The FBI says that soon after Lin moved in with Smith, she was the victim of multiple hacking, harassing, and cyberstalking incidents. Investigators believe that Lin got access to passwords of some of Smith's online profiles because Smith didn't have a lock on her room door, and didn't password-protect her computer. Authorities say that Lin allegedly accessed Smit's Apple iCloud account from where he downloaded personal photos, and also her Google Drive account from where he took her private journal. Smith was the victim of a wide range of harassment campaigns According to the affidavit, Lin is the prime suspect behind a multi-faceted and unyielding harassment campaign that spanned months. In no particular order, below are some of the FBI's accusations: ⧐ The suspect allegedly created a collage of Smith's personal photos and non-related sexually explicit images and sent it to Smith's friends, classmates, teachers, co-workers, roommates, and family friends (including a minor). The emails were spoofed to make them appear as coming from Smith's email address. ⧐ The suspect allegedly sent excerpts of Smith's private journal to other persons, revealing personal details such as a past medical, psychological, and sexual history. ⧐ The suspect allegedly created online accounts in Smith's name on adult portals asking people to show up at her house to enact BDSM, gangbang, rape, and other sexual fantasies. At least three people showed up. ⧐ The suspect allegedly harrassed Smith using SMS messages sent via an anonymous text messaging service (textnow.com). ⧐ The suspect allegedly spoofed Smith's identity to send bomb and other threats to nearby schools and lone individuals. ⧐ The suspect allegedly sent threatening communications to Smith's friends, associates, and family (including a minor), urging Smith to commit suicide, or threatening to kill and rape Smith and associates. ⧐ The suspect allegedly bombarded Smith with friend requests on Facebook, even after getting blocked. ⧐ The suspect allegedly hacked Smith Rover.com account (pet sitting service) and told pet owners that Smith intentionally killed one of their pets, resulting in the pet owners sending police officers to their house to deal with Smith. ⧐ The suspect brought up the fact that Smith had an abortion, even if the suspect did not tell anyone about it, and only recorded the event in her private journal. Smith told authorities the abusive behavior began soon after Lin moved in, and continued even if she moved out two months later, scared by his actions. Lin's abusive behavior was then redirected to the other two roommates, and following complaints to the landlord and police, Lin was kicked out from the shared apartment in August 2016. The cyberstalking and harassing behavior continued, again, mainly directed at Smith. Suspect hid behind VPNs, Tor, ProtonMail For all of these actions, the suspect used ProtonMail, VPN clients, and Tor to hide his identity. After local police investigated all the victim's complaints for almost a year, they called in the FBI to help. The FBI found their first evidence at one of Lin's former employers. The company had reinstalled Lin's work computer after he left, but the FBI was able to find various artifacts in the hard drive's unallocated disk space. Evidence includes: ⧐ Google Chrome artifacts that Lin had read about the bomb threats against local schools. ⧐ Google Chrome artifacts that Lin had an account on textnow.com ⧐ Google Chrome artifacts that Lin had an account on ProtonMail ⧐ Google Chrome artifacts that Lin had visited Rover.com ⧐ Google Chrome artifacts that Lin had visited the Smith's Spotify profile, but also the profiles of Smith's brother and one of her best friends. ⧐ PureVPN artifacts suggesting Lin was using the company's VPN client. VPN activity logs tie Lin to Smith's harassment Yet, the most conclusive evidence came after the FBI managed to obtain logs from two VPN providers — PureVPN and WANSecurity. The logs showed how within the span of minutes the same VPN IP address had logged into Lin's real Gmail address, another Gmail address used for some of the threats, and a Rover.com account Lin created to discover Smith's real phone number. PureVPN was later able to link the stalking activity with Lin's home and work IPs. Ironically, FBI agents also found tweets in which Lin was warning other users that VPN providers store activity logs, advice he didn't follow himself. Investigators became sure they identified the right man after they interviewed some of Lin's past classmates, who recounted a similar pattern of harassment and cyberstalking from a man they described as a computer "genius." "As alleged, Mr. Lin orchestrated an extensive, multi-faceted campaign of computer hacking and online harassment that caused a huge amount of angst, alarm, and unnecessary expenditure of limited law enforcement resources," said FBI Special Agent in Charge Shaw. "This kind of behavior is not a prank, and it isn’t harmless. He allegedly scared innocent people, and disrupted their daily lives, because he was blinded by his obsession," the agent added. "No one should feel unsafe in their own home, school, or workplace, and the FBI and our law enforcement partners hope today’s arrest will deter others from engaging in similar criminal conduct." Source: https://www.bleepingcomputer.com/news/security/cyberstalking-suspect-arrested-after-vpn-providers-shared-logs-with-the-fbi/
  6. Donations for a Friends Cause

    Do you guys need something specific from Brazil?
  7. Greece

  8. More color on site

    i though it was both
  9. How to Secure your DNS

    Here are some things to check with any VPN provider: Do you have to provide an email to have an account? You're being logged. Do you have to provide a credit card? You're being logged. Does the service require you to use a binary installer to gain access? You're being logged AND rooted. The only Zero Customer Knowledge VPN provider in operation is Cryptostorm. You can pay via a variety of methods, receive your tokens via a variety of secure communication paths, and you never have to provide an email, a credit card number, or any other identifying information. If configuring your connection isn't done with a text file from the provider and an open source client, you're providing unfettered access to your system and your traffic. If shopped around and picked a cheap provider, there are a lot of bad things players like that do to their customers. Cryptostorm tokens are hashed using SHA512, the resulting hash is used as the userID for the network, and your password can be anything, as the system only looks for usernames that are valid hashes. The hashed token is a proof of purchase, Cryptostorm doesn't care who is using the network, so long as they can prove they paid. All of the other VPN providers offer a solemn oath that they are not logging you. Cryptostorm is the only provider that uses a business process which means that they can not. I'd be happy to answer any questions anyone might have regarding the Cryptostorm service.
  10. Gather Proxy 8.9.0 Premium

    Thanks for posting it bud
  11. sentry mba Tusfiles.net

    Thanks for sharing, I need to crack those fuckers