Menu
Forums
New posts
Search forums
What's new
New posts
New profile posts
Latest activity
Vault
Time Travel Schematics
T.E.C. Time Archive
The Why Files
Have You Seen...?
Chronovisor
TimeTravelForum.tk
TimeTravelForum.net
ParanormalNetwork.net
Paranormalis.com
ConspiracyCafe.net
Streams
Live streams
Featured streams
Multi-Viewer
Members
Current visitors
New profile posts
Search profile posts
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Search forums
Menu
Log in
Register
Navigation
Install the app
Install
More options
Contact us
Close Menu
Forums
Time Travel Forum
Time Machines & Experiments
Help building a divergence meter?
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="OmniBon" data-source="post: 172278" data-attributes="member: 10298"><p>You have a private key that you store somewhere that COULD become compromised.. am I missing something?</p><p></p><p>What you are saying isn't mutually exclusive AND being fully offline would BE MORE SAFE than you are now. That was my point. Some hackers are experts. The first step of hacking would be identifying your IP and/or your machine. "Targeting" is what it is called. The second step would be a search string search for an encryption matching the type used by zeronet. Like length for SHA encryption etc.</p><p></p><p>I don't understand A. your accusatory tone and B. how you don't get what I said.</p><p></p><p>And it made me upset to the point I made a sassy / rude comment and now have edited it to be less sassy / rude.</p></blockquote><p></p>
[QUOTE="OmniBon, post: 172278, member: 10298"] You have a private key that you store somewhere that COULD become compromised.. am I missing something? What you are saying isn't mutually exclusive AND being fully offline would BE MORE SAFE than you are now. That was my point. Some hackers are experts. The first step of hacking would be identifying your IP and/or your machine. "Targeting" is what it is called. The second step would be a search string search for an encryption matching the type used by zeronet. Like length for SHA encryption etc. I don't understand A. your accusatory tone and B. how you don't get what I said. And it made me upset to the point I made a sassy / rude comment and now have edited it to be less sassy / rude. [/QUOTE]
Insert quotes…
Verification
Post reply
Forums
Time Travel Forum
Time Machines & Experiments
Help building a divergence meter?
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…
Top