03-13-2019, 07:34 PM
Quote:(03-13-2019, 07:49 PM)Nyx Wrote:[To see links please register here]
Quote: (03-13-2019, 02:36 PM)mothered Wrote:[To see links please register here]
Quote: (03-13-2019, 01:30 PM)Cyb3rNuX Wrote:[To see links please register here]
Isn't that risky, as anyone can see source code and FTP information or attacker's email in it?
Not at all.
In terms of the email, the logs are sent In the form of a text file, directly to a random email account that was created using fictitious details whilst connected to a dedicated device with unidentifiable details, hooked onto a neighbor's AP using a VPN- It's server located on the other side of the globe. MAC address Is also spoofed. No risk whatsoever.
Yep this is the answer. So long as you make sure none of your own information is being passed on while creating the email account you''ll likely be safe.
While connected to a VPN and connected to internet (that isn't your own) then you'd sign up for an email address at something like ProtonMail (based in Switzerland, any non 14 Eyes email provider would work though) under a completely anonymous handle (ex: [email protected]). As long as you don't use any personal information that could be used to identify you then it'd be incredibly hard for anyone to trace the account back to you.
And if you're using a FUD logger that is obfuscated they're probably not going to be able to even break it open to obtain the email address in the first case. They'd need to be fairly closely watching their packet sniffer to catch when the information is transferred since like @mothered mentioned he sets his to only relay information once an hour.
Very well said.
ProtonMail Is certainly a good option. I've been using It for years, and It serves It's purpose extremely well.