Sorry in my humble opinion no one able to breath can be that stupid. You are just doing a Simon...... :argue: ends feel free to :blah::blah::blah:
![](http://ct.fra.bz/ol/fz/sw/i53/2/12/7/frabz-U-MAD-BRO-522773.jpg)
Sorry in my humble opinion no one able to breath can be that stupid. You are just doing a Simon...... :argue: ends feel free to :blah::blah::blah:
Why would you do a "Respond" to my words to someone else and then imply that it had anything to do with you?all i am asking you to do is reword your question so it is a little more understandable. i didn't tell you to shut up or anything of the sort. oh and just fyi since my inception here and with all my bannings i created 1 mult that lasted for 1 post and was caught and deleted and it got me an extra month added to my banning. so your claim of me having multiple accounts and creating new nick names is a lie. now please what were you trying to ask ?
your understanding of his words is confusing. i know how the net works but i am not following what you are trying to know. are you asking if you can grab a piece of something from one spot then grab another piece from another spot ? if the whole thing is broken down then reassembled when it arrives ? if it is broken down does it all travels the same "wires" or go in different directions to meet up later in the pre determined destination ? what is it you are asking.Why would you do a "Respond" to my words to someone else and then imply that it had anything to do with you?
re the question.... I was talking to a hacker who gave me all that information and I wanted to verify each part. So I do not know how to make it simpler. I rather hoped that his words made sense to other people who knew about the net. Well my understanding of his words.
re you having multiple nicks. Sorry if I am mistaken. Someone pretended to you in that case. No big deal
so you say you are not going to get involved with insulting people and to prove your point you insult someone. the other gentleman that beat you pretty badly over the last few days have been way meaner to you. all i did was prove you wrong repeatedly.Oh Troops I do not want to appear rude, and do not want to appear to talk down to you, But I recently had it pointed out to me that my foolish attempts to try and respond to people being rude was a mistake, So I am opting out of conversations about the sun rising in the west, studs not being available in Northern Ontario, my being a woman, and several other topics. So when you were just silly and acting in a way I perceive is not genuine and interesting, ..... I mentally tag it as pulling a Simon
No big deal, feel free to ignore me.
well, the over all issue. If you know some information that is being transmuted..... for example destination the bank of Montreal IP, and something that will be in that transmission... 8234256 for example. Can you set up a (well he said a few) computers on a very high speed internet link and have it collect all the strings that happen to wander through that node?your understanding of his words is confusing. i know how the net works but i am not following what you are trying to know. are you asking if you can grab a piece of something from one spot then grab another piece from another spot ? if the whole thing is broken down then reassembled when it arrives ? if it is broken down does it all travels the same "wires" or go in different directions to meet up later in the pre determined destination ? what is it you are asking.
as for my 1 time creating a fake account it was before you and as i stated it was caught after 1 post and deleted and i was given longer away. as for the first thing you said i have no idea what that means either.
No you are not stupid enough to think you were right. You played me like a sucker fish.so you say you are not going to get involved with insulting people and to prove your point you insult someone. the other gentleman that beat you pretty badly over the last few days have been way meaner to you. all i did was prove you wrong repeatedly.
except i was right and you are a sucker fish. as for the rest i just got a phone call i will answer when i get back. you made things a little clearer. thank you.No you are not stupid enough to think you were right. You played me like a sucker fish.![]()
you can catch anything you want if you know where and when to look for it. he was right. if you just set your computers to catch everything that comes along that section for say an hour just cuz you know it will be going during that time period you are going to get a lot of information and it will take you a while to sift through everything you got to find what you are looking for. it would be a lot easier for you if you knew when it was gonna be sent. also if you only know the final destination and not the path it is going to take to get there you would need to get into secure servers of say a bank (your example) and that is illegal.well, the over all issue. If you know some information that is being transmuted..... for example destination the bank of Montreal IP, and something that will be in that transmission... 8234256 for example. Can you set up a (well he said a few) computers on a very high speed internet link and have it collect all the strings that happen to wander through that node?
It seems to sound logical.
It is ok, I made a bet to see. He will look at everything going into a specific mail server, and capture all the strings that match a criteria. If he can send me the header on 12 strings that match the criteria he winsyou can catch anything you want if you know where and when to look for it. he was right. if you just set your computers to catch everything that comes along that section for say an hour just cuz you know it will be going during that time period you are going to get a lot of information and it will take you a while to sift through everything you got to find what you are looking for. it would be a lot easier for you if you knew when it was gonna be sent. also if you only know the final destination and not the path it is going to take to get there you would need to get into secure servers of say a bank (your example) and that is illegal.
if you want to grab a certain piece of information of a certain machine wouldn't you need to know the path it was traveling on ? like if i was sending an email to you and someone wanted that email wouldn't the person that wanted that email need to know where it is traveling to grab it ? there are millions of paths between me and you how would you even know where to look. i was under the impression that unless you knew where it was traveling you couldn't grab it and the best way would be to either have hacked the final destination or the sender.That's kind of how it works, but also not at all how it works.
Data is broken up into packets which have headers containing all kinds of information. Will they all take different routes? Not likely. Unless your email is huge, the routers (big routers, not the small ones in your basement) will buffer and transmit as a burst. So most likely all your data goes out at the same time on the same route. Even if it gets split up, you've still got a 99.99999% chance it all follows the same route.
If a hacker needs a string to read your emails, they're a pretty shitty hacker. The vast majority of what you send and receive is unencrypted. All I need to do is get into your network (not hard, at decent hacker can infiltrate Belll/Rogers networks for this purpose) and update routing tables to get all of your data. Then they can know what websites you visit, what links you clink on, what emails you send/receive, etc.
Getting emails and stuff is easy. Getting passwords, which should be transmitted encrypted, is a different story. Your banking information is very safe. Your private email and chats, however, are not.
Short answer - maybe.So the question I am asking, is am I being bullshit or is this true?
So is it possible?
I have no idea. He told me getting an entire "communication" was very difficult. Although apparently big brother does it at the border and their computers "read" a significant number of emails and "communications" for trigger words.if you want to grab a certain piece of information of a certain machine wouldn't you need to know the path it was traveling on ? like if i was sending an email to you and someone wanted that email wouldn't the person that wanted that email need to know where it is traveling to grab it ? there are millions of paths between me and you how would you even know where to look. i was under the impression that unless you knew where it was traveling you couldn't grab it and the best way would be to either have hacked the final destination or the sender.
I mentioned updating routing tables... When you do that, you're ensuring every packet within that network hits machines you control. In essence, you're controlling the route of everything.if you want to grab a certain piece of information of a certain machine wouldn't you need to know the path it was traveling on ? like if i was sending an email to you and someone wanted that email wouldn't the person that wanted that email need to know where it is traveling to grab it ? there are millions of paths between me and you how would you even know where to look. i was under the impression that unless you knew where it was traveling you couldn't grab it and the best way would be to either have hacked the final destination or the sender.
Fid the neighbourhood, find the network map. Now you know somewhere all the data will go though: the gateway.Short answer - maybe.
The story is a little tortured but the description of how packets travel on the internet through various routers is essentially correct, although really wild bouncing isn't quite realistic - route flapping is considered undesirable behavior.
Not exactly sure of how the data capture would occur - is it assumed that you have root access to a router that you believe would be on one of the possible routes of the traffic you're trying to capture?
It's not difficult if you know what you're doing. The government has an easier task because they have access to root nodes in the country so they see everything.I have no idea. He told me getting an entire "communication" was very difficult. Although apparently big brother does it at the border and their computers "read" a significant number of emails and "communications" for trigger words.
If this is for simple, plain-text, unencrypted email, you got ripped off. I know hackers who will just get you the password for $500, then you can read all the email. I guess if he kept telling you how hard it was, he was already setting you up for the whole, "It won't be cheap," bit. As a general rule, if you don't know anything about something, you'll probably overpay.Apparently grabbing one of the packet things is pretty much just a question of just knowing something that is in "communication" and watching for it to fly by. Knowing either where it came from, or where it is going makes it infinitely easier. Being 'close' to either end also makes it easier as well. Well I guess it not so much easier, but will make it more likely to happen in a shorter time frame. And apparently 'closer' is linked to physical distance but not tightly linked. Closer is related to the path the packet takes.
Apparently it must be quite a bit of work. It took a bet well into the four figures before he agreed to do it.
Why would someone send the same email multiple times? And electronic communication is protected by law. So it's never legal to look at the content. Headers are public because thats the only way networks can know where to send data.This is fun, I am learning so much!
So no ping ball machine model.It is more structured and organized.
So using an example he mentioned,
If you owned a store that sold XYZ widgets, and you had only one competitor, it would be possible to set up something that would only look at "communications" going to the competitor's IP. It would be sniffing for any packet that contains the string " XYZ". You sort of need to be watching traffic on the internet to do this. You can pick a place that is more likely to have the packet travelling if you choose the right path. You can guess the tail in of the path as long as you know the destination IP.![]()
So if someone sends a packet with XYZ you have a chance of getting it. If they send it more often you get a better chance. If they send it a lot it is likely you will get multiple hits. He tells me this is not illegal, and you can access the header information freely. You just need to be certain the content is in the public domain. Oh bad example with the store order I guess. Not public domain.
Routing tables. Think a huge excel spreadsheet that is constantly updated with information on the optimum routes to get to different places. Overly simplified, but the easiest way to visualize it.I still have not been able to understand how how these hubs/routers know were to send the packets. Well more precisely how they decide who the next hubs/routers will be. I get the impression that the although the odds are the closest router to the destination will see it, there is a possibility it will be routed right around the world. Can any one explain it so a relative novice can understand?
Clearly I do not, but I am learning.It's not difficult if you know what you're doing. The government has an easier task because they have access to root nodes in the country so they see everything.
LOL I probably am / will. It was worth it to see. And no it not just reading someones email.If this is for simple, plain-text, unencrypted email, you got ripped off. I know hackers who will just get you the password for $500, then you can read all the email. I guess if he kept telling you how hard it was, he was already setting you up for the whole, "It won't be cheap," bit. As a general rule, if you don't know anything about something, you'll probably overpay.
It does not need to be the same email. Just a common string in each email. I bet you sign your emails? There is a common string. Emails were just an example. I will ask the legal question On TuesdayWhy would someone send the same email multiple times? And electronic communication is protected by law. So it's never legal to look at the content. Headers are public because thats the only way networks can know where to send data.
Oh so any one who has access can easily predict the most likely hubs/routers that will be servicing a given destination IP. So yes it would be a lot easier than I imagined to find a convenient place to look.Routing tables. Think a huge excel spreadsheet that is constantly updated with information on the optimum routes to get to different places. Overly simplified, but the easiest way to visualize it.