News:

PSC is not and never has been a media sharing community.

Main Menu

Looking for pedo friends to chat with on qTox

Started by LittleGirllover, 02 July, 2024, 00:10:19

Previous topic - Next topic

0 Members and 1 Guest are viewing this topic.

LateComer

Neither is best but between contempt and prison I would want contempt.

LikelyHuman

Quote from: LateComer on 06 October, 2024, 23:10:53Neither is best but between contempt and prison I would want contempt.

I genuinely wonder. I mean, on paper, it kind of sounds better, but I know a few people who have been to prison and say they couldn't wait to get there after being in the jail for 1-2 years waiting for trial, sentencing, etc. There are aspects to jail that a lot of people don't realize are actually less favorable than prison, if you're doing a long stay. I mean, among complaining about no good commissary items, I had friends complain about the lack of protection in jail versus in prison. In prison, it's different; you end up just getting assimilated into whatever race group you belong to, and are then "protected", but also expected to fight. In jail, they're much more often controlled by members of local street gangs that are in the jails at the moment, and then just random people who can't really do anything about it. Plus, that's when you're just a guy doing something nobody really cares about, but they do ask you what you're in for, and if you don't tell they assume you're a snitch, which is almost as bad (if not worse) than being a pedo. Because of that, it will more than likely be deemed that you need extra protection, which they're required to provide, but jails are often not equipped for a secured-wing like a prison would be. Mostly because people aren't expected to have long stays in jail, so they usually just stick them in solitary confinement.

So... Best case scenario, you go and spend a year and a half in a shitty jail cell, and it just sucks because you eat shitty food and are bored out of your mind. More likely, they shove you into solitary, and you go a little bonkers from it. Worse case scenario, you get shivved to death.

All the same things could happen in prison, I suppose, and so really the only thing better is the idea you won't be on a registry at the end of it. But that's provided you survive, and if you do, will you come out of it unscathed, even mentally so?

Oh, and it also just occurred to me, even the length of 1 and 1/2 years is optimistic. Because that's 1 and 1/2 years after you went to trial and plead the 5th. Who knows how long you already spent awaiting that trial.
Please encrypt all PMs/DMs

Rivers

Quote from: LikelyHuman on 06 October, 2024, 19:18:28Ironically, I have been hearing a lot of tales about people who end up under investigation after their iCloud flags a pic of their kid in the bathtub as CP.

But that's the cloud, not the phone.
Everything that's uploaded to a cloud service gets systematically checked, they say so themselves.
Checking a user's actual phone content is a whole different matter.
Proud to be a PEDO!!!

LateComer

There were plans to scan devices in 2021 but Apple paused the software rollout due to public outcry. They finally declared the service dead and unreleasable last year. Despite this I would not engage with on-topic stuff on a phone.

stalker

An onion is our friend, as per my avatar (although this friendship might end one day). A smartphone is our enemy, as per common sense.

Smartphones and ontopic things just don't go in pairs. I treat mine like a useful, but nosy coworker. It knows some things, it knows some embarrassing or private things too, but nothing even remotely tied to pedophilia, pedo stuff, pedo chats, pedo friends, pedo life.

The same with clouds. Once you upload something to a cloud, consider it public, forever. Encryption doesn't matter, one day it will be broken anyway. Let's assume you're 20, uploaded some encrypted CP to a cloud, and then you're 40 and you get the knock, because even if you deleted the file and forgot about it, all it did was hiding it from you, and now they automatically scanned all files they ever stored, and surprise, their scanner pointed them right to you. Quantum computing, AI, it doesn't really matter. The tech surely will be there.
Always encrypt your PMs

noster_lux

Here's my qtox ID: 999AE4192BDD8F89632E1984AF35EDCEC6175FCB62A0DCE44D0F70C4FA42CB1C2D8F08C3EFC7
feel free to send my a message

thatchattyfem

Hey all, more than happy to chat! My ID is: 09C765D3A4F04AACAF87F44636697FF50AEADF5D5A927A930AEFBE18195F4C035A4F763CA87B

  • Tox ID: 09C765D3A4F04AACAF87F44636697FF50AEADF5D5A927A930AEFBE18195F4C035A4F763CA87B

Pat975

My thoughts on a couple apps

I do not trust Telegram.  never have.  Now given recent events with its owner being arrested...

My chat platform of choice these days is Session.  Mainly because it runs over TOR.
Open to PMs with like minded individuals. I also have Session if you're up for chat.
05c7ba73fe75f9107498b632496621dbf6edcd395312914a9681025bd24b1c3a12

Pat975

Quote from: thatchattyfem on 01 October, 2024, 22:58:37I thought apps like Session were an absolute no go, because of security? The advice I was given was never use an app on your mobile!

Never use an app on your mobile is good advice.  Not only for data leakage but what if someone found the phone?  Or the phone was open and someone happened by?

Easier to be discrete on a laptop.

Session runs over TOR so I trust it more than other apps
Open to PMs with like minded individuals. I also have Session if you're up for chat.
05c7ba73fe75f9107498b632496621dbf6edcd395312914a9681025bd24b1c3a12

LateComer

Quote from: Pat975 on 23 October, 2024, 03:58:49
Quote from: thatchattyfem on 01 October, 2024, 22:58:37I thought apps like Session were an absolute no go, because of security? The advice I was given was never use an app on your mobile!


Never use an app on your mobile is good advice.  Not only for data leakage but what if someone found the phone?  Or the phone was open and someone happened by?

Easier to be discrete on a laptop.

Session runs over TOR so I trust it more than other apps

Not Tor. Lokinet. Similar but not same. Another technical person in our wider community (not here) told me about doubts with Session. Text is encrypted. Media encryption has flaws. I would not use Session for anything but text.

Pat975

Quote from: LateComer on 23 October, 2024, 04:20:21Not Tor. Lokinet. Similar but not same. Another technical person in our wider community (not here) told me about doubts with Session. Text is encrypted. Media encryption has flaws. I would not use Session for anything but text.

Thank you!  Good to know.

So...  In your opinion...  Best app for privacy / security / anonymity?
Open to PMs with like minded individuals. I also have Session if you're up for chat.
05c7ba73fe75f9107498b632496621dbf6edcd395312914a9681025bd24b1c3a12

LateComer

Quote from: Pat975 on 23 October, 2024, 04:22:36
Quote from: LateComer on 23 October, 2024, 04:20:21Not Tor. Lokinet. Similar but not same. Another technical person in our wider community (not here) told me about doubts with Session. Text is encrypted. Media encryption has flaws. I would not use Session for anything but text.

Thank you!  Good to know.

So...  In your opinion...  Best app for privacy / security / anonymity?

I trust Session for text. Beside that Tor is the only software I trust for anonymity now.

MmmYess

if any one wants to chat on session
054e996cb12bcc4bcec03372b7b8aa93fb90dab8a89e32cd416ade6ee534653246

  • Tox ID: 3030A40DE069C0065CF7E15F3188903D291CB7189BFD44A17048D37C0BC2E4581CFBF8B941FB

crunchybidad

Quote from: LikelyHuman on 06 October, 2024, 19:18:28
Quote from: Rivers on 02 October, 2024, 03:13:33If there was a large scale, systematic spying of files against known cp databases, you'd see people getting arrested left and right, and the cp scene would be pretty much empty.

Ironically, I have been hearing a lot of tales about people who end up under investigation after their iCloud flags a pic of their kid in the bathtub as CP.

People can believe what they want, but I don't think one should base the question on how "much" they're spying on you, rather than if they are spying on you. If they're spying at all that's not a tenable to good OpSec. Full stop. Anything beyond that is suggesting that one can be careless and lucky because other individuals have gotten away with it.

Yes, there's a certain level of, "You don't matter enough for them to look that hard at," here, but you cannot find safety in being the smaller fish in the pond all the time. It reminds me of my days when I used to deal drugs, and the cops would go and arrest all the low-level dealers who would have absolutely no security. The reason why they didn't keep any security, is because they would simply snitch on someone bigger as a means to avoid arrest.

The police have no problem rounding up a bunch of smaller fish, if they think a few of them will bait in a bigger one. Not only does it make them look good by padding arrest numbers and showing them pursuing people committing these crimes, but at the end of the day it often will lead to bigger catches. So there's no reason to suggest that police won't go after small fish, the only thing at play here is how difficult it is for them. If companies like Apple are already choosing to scan peoples' data and match the data found there against known CSAM, how far will they have to go and what excuse will they need to use to justify selling lists of names to the police that contain data-sets profiled to be likely criminals? Right now, Apple justifies identifying and reporting CP as part of a crusade against child abuse, but also we all know that they probably don't want that on their servers either. I sincerely doubt they want people using their services to FaceTime minors either, so how long until they just hand that data over to law enforcement too? "So don't use FaceTime," you might say, but how do you know there's not something else like it sending telemetry off to Apple the whole time without your knowledge anyway?

If I couldn't access the darkweb with anything but a phone, I would just stay off of it entirely. Otherwise I'm doing nothing but willfully submitting data that can be used to profile, trace and identify me to a third-party who has zero interest or reason to protect that data, and every reason to sell it to someone else. I think the only reason we haven't The Great Pedo Roundup is because 1. All that data is more valuable to advertisers, so they're buying it first and 2. Cops only want small fish to get big fish, so keeping the pond stocked is necessary.

Edit:

Oh, and once again to beat a dead horse... The police don't need to break your encryption. They simply need to make you miserable enough to compel you to disclose the key. Cases like the San Bernadino shooter's iPhone are different. That man was already staring down a death sentence, so saying, "Unlock your phone for us or else," doesn't do shit, so they had to go spend a million bucks to pay a security-research firm to break it. But if the cops picked any one of us up tomorrow, and said, "Give us the key to unlock this phone, or you're going to spend the next 18 months in jail under contempt of court charges," that produces a whole hell of a lot more leverage.

Just wanted to clear up some claims in this post, not to be rude or anything towards the poster, but Apple is NOT scanning for CSAM, They had plans to do so, but ended up backing off of them because a lot of researchers said it was a bad idea.

The story about the kid in the bathtub or what not is actually Google. They not only scan images for matching CP but they also use algorithms to flag photos that COULD be CP.

LikelyHuman

Quote from: crunchybidad on 30 December, 2024, 13:19:47
Quote from: LikelyHuman on 06 October, 2024, 19:18:28
Quote from: Rivers on 02 October, 2024, 03:13:33If there was a large scale, systematic spying of files against known cp databases, you'd see people getting arrested left and right, and the cp scene would be pretty much empty.

Ironically, I have been hearing a lot of tales about people who end up under investigation after their iCloud flags a pic of their kid in the bathtub as CP.

People can believe what they want, but I don't think one should base the question on how "much" they're spying on you, rather than if they are spying on you. If they're spying at all that's not a tenable to good OpSec. Full stop. Anything beyond that is suggesting that one can be careless and lucky because other individuals have gotten away with it.

Yes, there's a certain level of, "You don't matter enough for them to look that hard at," here, but you cannot find safety in being the smaller fish in the pond all the time. It reminds me of my days when I used to deal drugs, and the cops would go and arrest all the low-level dealers who would have absolutely no security. The reason why they didn't keep any security, is because they would simply snitch on someone bigger as a means to avoid arrest.

The police have no problem rounding up a bunch of smaller fish, if they think a few of them will bait in a bigger one. Not only does it make them look good by padding arrest numbers and showing them pursuing people committing these crimes, but at the end of the day it often will lead to bigger catches. So there's no reason to suggest that police won't go after small fish, the only thing at play here is how difficult it is for them. If companies like Apple are already choosing to scan peoples' data and match the data found there against known CSAM, how far will they have to go and what excuse will they need to use to justify selling lists of names to the police that contain data-sets profiled to be likely criminals? Right now, Apple justifies identifying and reporting CP as part of a crusade against child abuse, but also we all know that they probably don't want that on their servers either. I sincerely doubt they want people using their services to FaceTime minors either, so how long until they just hand that data over to law enforcement too? "So don't use FaceTime," you might say, but how do you know there's not something else like it sending telemetry off to Apple the whole time without your knowledge anyway?

If I couldn't access the darkweb with anything but a phone, I would just stay off of it entirely. Otherwise I'm doing nothing but willfully submitting data that can be used to profile, trace and identify me to a third-party who has zero interest or reason to protect that data, and every reason to sell it to someone else. I think the only reason we haven't The Great Pedo Roundup is because 1. All that data is more valuable to advertisers, so they're buying it first and 2. Cops only want small fish to get big fish, so keeping the pond stocked is necessary.

Edit:

Oh, and once again to beat a dead horse... The police don't need to break your encryption. They simply need to make you miserable enough to compel you to disclose the key. Cases like the San Bernadino shooter's iPhone are different. That man was already staring down a death sentence, so saying, "Unlock your phone for us or else," doesn't do shit, so they had to go spend a million bucks to pay a security-research firm to break it. But if the cops picked any one of us up tomorrow, and said, "Give us the key to unlock this phone, or you're going to spend the next 18 months in jail under contempt of court charges," that produces a whole hell of a lot more leverage.
Just wanted to clear up some claims in this post, not to be rude or anything towards the poster, but Apple is NOT scanning for CSAM, They had plans to do so, but ended up backing off of them because a lot of researchers said it was a bad idea.

No worries, glad you clarified. You're positive they didn't actually identify someone and get them prosecuted before all the outcry though? I could swear they had actually been getting people busted before admitting it was a bad idea.
Please encrypt all PMs/DMs