• XSS.stack #1 – первый литературный журнал от юзеров форума

TOX, get out now

Telegram is to wors than you can even imagin my friend , jabber is better at this moment , or you can use Tox following what bratva said " meaning using tox with more securty options "
exactly

There are also other serverless solutiond
Like Session, Ricochet, Speek, Cwtch
 
Ok, Boss (admin)

had no hiding agenda, was just cleaning the closet

e reshil proverit chto my PC/Server delaet kogda ya ne aktiven, ne log in (ezvenyaite za translit, ny prosto nety e menyae e ne bydet rysskoi klavu)

karache y kogo est vremya tu investigate, look at the traffic, also why its starting look at shares, meaning trying accessing files on local drives and shares

maybe it just my particular instance, maybe I was affected / infected or compromised, im not sure, have no time to go deepar

karache snes ya ego ot greha podalshe

napisal potomy chto moget pomoget informacia komyto

dura byla v nem (tox) esche s 2021, potomy mu ego e ispolzovale via TOR, kto etogo ne delal, to eta informaciya ne dlya vas

e navernoe nastalo vremya zdelat chtoto na osnove ele po tipy Rocket Chat, TOX on byl ochen ydobnyi, prostoi
 
Последнее редактирование:
Пожалуйста, обратите внимание, что пользователь заблокирован
exactly

There are also other serverless solutiond
Like Session, Ricochet, Speek, Cwtch
I like Session but you can't trust anything write about it in blog or anything remember there was a lot of people writing about anom the Fbi phone that the phone is to secure etc and this make a lot of people get inside the honeypot , so for me i trust something used by real people in the field like big members here in xss or ramp and they still didn't catch them ... this is the way for me to trust app or anything else in hacking field
 
I like Session but you can't trust anything write about it in blog or anything remember there was a lot of people writing about anom the Fbi phone that the phone is to secure etc and this make a lot of people get inside the honeypot , so for me i trust something used by real people in the field like big members here in xss or ramp and they still didn't catch them ... this is the way for me to trust app or anything else in hacking field
Unlike Anom, or any of the other "encryted phone brands" like SkyEcc, Encro, Exclu, Ciphr and so on...Session is open source. You can find it on github, you can compile it from source, check is it really what it is.
Same as Briar or Cwtch or others.


For Jabber is bigger chance that a certain servers they are swaping encryption fingerprints and no one actually notice it.
Be real, ow many of us are checking encryption fingerprints ?


I mean, best would be to double encrypt manually everything with Pgp
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Be real, ow many of us are checking encryption fingerprints ?
This the problem
I mean, best would be to double encrypt manually everything with Pgp
and this the right way to work dont trust just one app or one way of communication I mean add sometihng like Pgp when you can etc
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Since the qTox 0day (that only impacted Windows systems) I've also tested Session chat, works well, I recommend
Even the xss admin remove the tox after we see the 0 day shared here .... tox will be never like before but there is more option like using tox with tails or other anon OS .. for session i dont know at the moment to be honest still didn't try it and test it
 
Even the xss admin remove the tox after we see the 0 day shared here .... tox will be never like before but there is more option like using tox with tails or other anon OS .. for session i dont know at the moment to be honest still didn't try it and test it
Ricochet ( and forks like Ricochet Refresh and Speak ) should also to be considered.

All of them open source
And routed through Tor
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх