Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

malware in tor

Name: Anonymous 2013-08-04 19:30

Name: Anonymous 2013-08-05 5:01

Anonymous's Super Secure Sea Pea Setup:
Create three VMs. One will be Linux, another Windows 2000, and the last OS X.
The browser is to be run on Windows, OS X runs a caching proxy and filter, and passes connections to the Linux VM, which is running Tor.

This creates a nearly unbreakable chain of operating systems (really, who has that much time on their hands to exploit three systems in one go?) so secure that not even the KGB could expose it's details if they kidnapped you and tortured you for days.

You are now free to masturbate to snuff films and rape with no fear that justice will ever be served. Enjoy!

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List