[tor-relays] I'm Running A Tor Exit Node And NEVER Initiated It

Greg Moss gmoss82 at gmail.com
Sun May 29 23:28:33 UTC 2016


OMG - I had the same thing happen to me back a few years. What I did was
completely destroy ALL computer equipment with a hammer. The weird part
about it was it keeps coming back now even 10 years later.
On May 29, 2016 3:23 PM, "Percy Blakeney" <di99in5 at gmail.com> wrote:

> I did just that.  TWICE.  I now have a total of 5 phones, 3 laptops, 2
> desktops 2 printers, and I'm now on my third router/modem.  Whomever,
> whatever this is knows how to get into the firmware.  I know this sounds
> crazy but it's true. I'd give anything for someone to come here and see for
> themselves.
>
> On Sun, May 29, 2016 at 3:53 PM, Mirimir <mirimir at riseup.net> wrote:
>
>> On 05/29/2016 10:27 AM, Percy Blakeney wrote:
>> > Whomever is and has been behind this is selective with what I can and
>> can't
>> > see.  I KNOW our electronics are and have been controlled since we moved
>> > here January 2014.  I know this because at one time "they" were
>> interacting
>> > with me on via my desktop.  I was asked if "they" could run a d-bus
>> session
>> > on another computer I have connected.  Not knowing what a d-bus session
>> was
>> > "they" gave me a step by step run down on how to do it.  I did what
>> "they"
>> > asked because it was kind of exciting.  Now in retrospect it's more
>> scary
>> > than anything else. ...
>>
>> Given what you've said, you might want to replace all of your
>> electronics. The router, and all computers and other devices that have
>> been connected to it, through wires or WiFi. Maybe also change ISP.
>>
>> That may seem extreme. For computers, it might be sufficient to replace
>> HDDs/SSDs. But smartphones, you should just replace entirely. The
>> concern is that malware can be hidden in other components, not just in
>> HDDs/SSDs.
>>
>> Also, be very careful about transferring files from old machines. If you
>> must, transfer individual files, not entire folders. Ideally, you would
>> scan each file for malware in an intermediate throwaway machine, running
>> a different OS. Maybe OSX, if your other machines are Windows and Linux.
>> Or Windows, if your other machines are OSX and Linux. You can use USB
>> flash drives. But use a given one only for a given pair of machines, to
>> reduce the risk of transferring malware.
>>
>> <SNIP>
>>
>> _______________________________________________
>> tor-relays mailing list
>> tor-relays at lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>>
>
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160529/64e0fbde/attachment-0001.html>


More information about the tor-relays mailing list