The UK Growers Thread!

IC3M4L3

Well-Known Member
80 s mate was beeeeeeep pager more than phone, first mobile i saw was a geeza in mid late 80 s and it was pick up with 2 hands job brought it into the pub to show off

thats what that is m8, lol only 30 qwid, and u can bloototh to ur normal phon in pocket so ud be using that OR jjst shot sim in it, u even get the leather shoulder strap

u now im getting one innit ahaha
I'll agree with u there. Ppl self medicate for a reason
i do mate, sik of the doctors thinkng they knows wats best for me, il only go docs if im literally dying, meds i deal with myself
 

Saerimmner

Well-Known Member
with that look on his mug? eyes and smile dont match....nah theres always a reason why someones a fuk up i should know lol
yeah i admit theres always a reason, but sometimes that reason can just simply be boredom or dealing with the level of fame he achieved, doesnt always go back to some sinister event in the past
 

zeddd

Well-Known Member
yeah i admit theres always a reason, but sometimes that reason can just simply be boredom or dealing with the level of fame he achieved, doesnt always go back to some sinister event in the past
what was the energy behind his acting, hes looks like one manic disturbed individual to me spanning 4 decades....
 

IC3M4L3

Well-Known Member
Tor Taken down by Government-Sponsored Hackers
Added: Friday, August 8th, 2014
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers,Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2013,www.extratorrent.cc


Hacker agencies hired by the US government managed to take down one of the last refuges of dissidents in oppressive regimes. The Tor system has long been recognized the only way that dissidents could communicate in repressive regimes. It is also known for being used by whistleblowers to leak their information. Now Tor is warning that many of its users could be identified by government-funded researchers.


According to Roger Dingledine, Tor Project leader, the service had identified machines on its network that had been altering the traffic of the system for 5 months, trying to unmask users connecting to the so-called “hidden services”. He also said it was likely the attacking machines were operated on behalf of the researchers at the Software Engineering Institute of Carnegie-Mellon University, funded by the Department of Defence of the United States. The machines have been removed from the network after they were discovered, but as you can understand, the damage has already been done. The researchers are going to speak on identifying Tor users at the Black Hat security conference in August. When Tor developers complained to the university, the local officials claimed the research had not been cleared and cancelled the talk.

Roger Dingledine admitted that people who operated or accessed hidden services from February through July might have been affected. As for those who navigated to ordinary websites, they should be good.

If you don’t know, hidden services include various underground drug websites like the shuttered Silk Road and privacy-conscious outfits like SecureDrop, especially designed to connect whistleblowers with media outlets. The Tor Project leader explained that the physical locations where the hidden services were housed could also have been exposed, but he was not sure about the content the visitors viewed.

But what really matters now is whether the spooks will just pop around to the researchers with a warrant and demand they hand over all the details they obtained during their experiments. As for the FBI, the agency didn’t comment on the questions about whether it would seek the information, while the Defence Department wasn’t quite sure if it even had the right to get research from the Institute.

Finally, Roger Dingledine recommended all Tor users to upgrade to the latest version of the software, because it addresses the vulnerability in question. He also warned that attempts to break Tor may continue.
 

R3l@X

Well-Known Member
sure the Russians put sniffers on the end nodes. Ages ago...
"
Researchers Winter and Lindskog identified 25 nodes of Tor network that tampered with web traffic, decrypted the traffic, or censored websites.

Two researchers, Philipp Winter and Stefan Lindskog of Karlstad University in Sweden, presented the results of a four-month study conducted to test Tor network exit nodes for sneaky behavior, it has been discovered that a not specified Russian entity is eavesdropping nodes at the edge of the Tor network.

The researchers used a custom tool for their analysis and they discovered that the entity appeared to be particularly interested in users’ Facebook traffic.

Winter and Lindskog identified 25 nodes that tampered with web traffic, decrypted the traffic, or censored websites. On the overall nodes compromised, 19 were tampered using a man-in-the-middle attacks on users, decrypting and re-encrypting traffic on the fly.


We should be grand it's the big guys they want like the ones running the sites n terrorists / freedom fighters.
 

R3l@X

Well-Known Member
Totally out of smoke now lads n I'm fucking hating it! Fucking bullshit cunting shit hash better come today man
 

R3l@X

Well-Known Member
Im working on sumit anyways dude.... potential connection that will ship bubble and bho with a paypal transfer ....
just make sure ur covered mate. N if u ever here of any irish let me know, would love to have someone domestic I could order off n get next day
 

RobbieP

Well-Known Member
just make sure ur covered mate. N if u ever here of any irish let me know, would love to have someone domestic I could order off n get next day
I have a few friends who are big into the cannabis medical scenes in different parts of canada and help supply quite a few dispensaries along the Canadian american borders. Im talking to them about setting up a postal service for us lads in the uk :)
 
Top