VV(^^)VV_____OFFICIAL ANDROID OS/DEVICE THREAD_____VV(^^)VV

What Carrier are you currently using?

  • AT&T

    Votes: 0 0.0%
  • Verizon

    Votes: 0 0.0%
  • Sprint

    Votes: 0 0.0%
  • T-Mobile

    Votes: 0 0.0%
  • Metro PCS

    Votes: 0 0.0%
  • Cricket

    Votes: 0 0.0%
  • U.S. Cellular

    Votes: 0 0.0%
  • Straight Talk

    Votes: 0 0.0%
  • Other

    Votes: 0 0.0%

  • Total voters
    0
  • Poll closed .
I pay $20 for 50mb with comast! Even though i usually only get about 40mb



You do not know what your talking about. Seeedboxes are private,. They are offshore. ISP dont care about the data being downloaded as long as it is not torrents.. Traffic will not get you in trouble. why you think they offer 50-100mb  lines  Qut saying that nonsense
Actually, I know exactly what I'm talking about. I think you need to read what I typed again. :lol:

While the content on your seedbox might be private, the traffic between that seedbox and your machine is NOT (unless proxy/VPN). So, while an ISP won't readily see your machine connecting to known trackers (which is how a lot of C/D letters get sent, but its usually the content companies notifying your ISP, not the ISP itself) they CAN see that you went to seedbox.com and downloaded 50GB of whatever. They actually can also see the content that you downloaded in that 50GB, but they usually don't analyze traffic on that level. (This applies to ALL civilian and consumer lines, unless proxy/VPN like I said before.)

ISPs usually don't care what you're using your connection for as long as its not slowing down their network. That part of what you said is true. But, traffic CAN and DOES get people in trouble. Don't believe me? Try googling how to make a nuclear bomb, an IED, and popular tourist attractions in your city. See how long it takes the FBI to come knocking. :rofl:

A persons level of risk can be determined by a number of factors, including the content theyre trying to find/access, who owns said content, their geographical location, and whether or not they have a known history.

Trust me, I know a lot more about this type of stuff than you. I'm not trying to be condescending. I'm just speaking from experience. :smile:
 
Last edited:
Actually, I know exactly what I'm talking about. I think you need to read what I typed again.
laugh.gif


While the content on your seedbox might be private, the traffic between that seedbox and your machine is NOT (unless proxy/VPN). So, while an ISP won't readily see your machine connecting to known trackers (which is how a lot of C/D letters get sent, but its usually the content companies notifying your ISP, not the ISP itself) they CAN see that you went to seedbox.com and downloaded 50GB of whatever. They actually can also see the content that you downloaded in that 50GB, but they usually don't analyze traffic on that level. (This applies to ALL civilian and consumer lines, unless proxy/VPN like I said before.)

ISPs usually don't care what you're using your connection for as long as its not slowing down their network. That part of what you said is true. But, traffic CAN and DOES get people in trouble. Don't believe me? Try googling how to make a nuclear bomb, an IED, and popular tourist attractions in your city. See how long it takes the FBI to come knocking.
roll.gif


A persons level of risk can be determined by a number of factors, including the content theyre trying to find/access, who owns said content, their geographical location, and whether or not they have a known history.

Trust me, I know a lot more about this type of stuff than you. I'm not trying to be condescending. I'm just speaking from experience.
smile.gif
 I was a IT tech monitoring a network back in the days.

First of all the ISP dont care what you download as long it isnt torrent

2nd The connection from the seedbox tour computer is SSL. which mean it is secure link HTTPS. Meaning the download is encrypted anyways which means isp will not see anything but a bunch of scrambled numbers and symbols

And aint know dang fbi going to knock at your door for googling that get out of here! lots of college people do reports and some people are curious

My line stay does constant downloading I use almost 600 gb a month.. Man go spew that non sense somewhere else  LOL
 
Last edited:
You dont know anything I work for apple and I was a IT tech monitoring a network back in the days.

That explains why your post insinuates that what you typed is true. I really don't get how Apple gets away with calling you guys "Geniuses," guess that title went to your head. :rofl: :rofl: :rofl:

1st. Child Porn. Terrorist threats. Prostitution. Three types of traffic that can and does get people arrested, subpoenaed, and thrown in jail/prison. Law enforcement, and by proxy ISPs, care about traffic other than torrents.

2nd. First, the important thing to understand is how HTTPS and SSL works - mostly through public key/private key verification with certificate issuers like VeriSign. SSL is used to encrypt traffic using those public/private keys as outlined by the 509 standard. It was tried, tested, and true. So why does it not matter?

SSL is broken. Its been broken for some time. How? Through counterfeit certificates, hacks of the actual certificate issuers (VeriSign in 2008, Comodo in 2011, and probably other undisclosed incidents,) and weaknesses within the different implmentations of the SSL protocol itself (see:,http://m.networkworld.com/news/2013/031413-ssl-tls-267739.html?mm_ref=https://www.google.com/). So, while a perfect implementation of SSL is theoretically secure, the reality is that weak implementations and an inherent weakness within the entire public/private key structure makes SSL completely susceptible. Thus, any HTTPS using SSL is just as vulnerable as the SSL it uses.

While its not likely that ISPs are going out of their way to infiltrate for every customer they find using torrents, people should know that SSL is not 100% secure and CAN be hacked (you should assume this is true for every single security system.)

3rd. Really? Try using summonthensa.com on your naked connection a few times. Report back to us. :smile:



Like I said before. I know a lot more about this stuff than most people. You and your Apple "certifications" included. :rofl:
 
That explains why your post insinuates that what you typed is true. I really don't get how Apple gets away with calling you guys "Geniuses," guess that title went to your head.
roll.gif
roll.gif
roll.gif


1st. Child Porn. Terrorist threats. Prostitution. Three types of traffic that can and does get people arrested, subpoenaed, and thrown in jail/prison. Law enforcement, and by proxy ISPs, care about traffic other than torrents.

2nd. First, the important thing to understand is how HTTPS and SSL works - mostly through public key/private key verification with certificate issuers like VeriSign. SSL is used to encrypt traffic using those public/private keys as outlined by the 509 standard. It was tried, tested, and true. So why does it not matter?

SSL is broken. Its been broken for some time. How? Through counterfeit certificates, hacks of the actual certificate issuers (VeriSign in 2008, Comodo in 2011, and probably other undisclosed incidents,) and weaknesses within the different implmentations of the SSL protocol itself (see:,http://m.networkworld.com/news/2013/031413-ssl-tls-267739.html?mm_ref=https://www.google.com/). So, while a perfect implementation of SSL is theoretically secure, the reality is that weak implementations and an inherent weakness within the entire public/private key structure makes SSL completely susceptible. Thus, any HTTPS using SSL is just as vulnerable as the SSL it uses.

While its not likely that ISPs are going out of their way to infiltrate for every customer they find using torrents, people should know that SSL is not 100% secure and CAN be hacked (you should assume this is true for every single security system.)

3rd. Really? Try using summonthensa.com on your naked connection a few times. Report back to us.
smile.gif




Like I said before. I know a lot more about this stuff than most people. You and your Apple "certifications" included.
roll.gif
dude your talking about some FBI 35 years in prison type of stuff. of course they will hit you for that

2nd If your using a SSL 256 it is not getting decrytped. It would take 25 years or more  to crack or decrypt. Anything can be cracked but who gonna sit at a cpu for 30 years to decrypt something. So back to reality IT CANNOT BE CRACKED!

Like saying if you leave your door unlock i can walk in and steal your stuff. No duh. Talking about fake certificates this and that ..get out of here man and take a nap.. So what yopur saying is the seedbox site have a fake certificate right? because that is what we are talking talking about now, not about other rouge fraud websites

Im going to sum this up:

1.

I'm not saying comcast cant see your traffic, they can. as long as it isn't no FBI illegal type of stuff they dont care. They dont care about torrents until you receive copyright notices.

2.

if your using a VPN/Proxy/seedbox or a SSL comcast cannot see the contents of your traffic. No ISP can because it is encrypted this is ofcourse under the right conditions. SSL is valid.  VPN PROXY SEEDBOX is valid and enabled as well

Example this site doesnt have a SSL so comcast can see all the traffic, your passwords everything but are they looking now. All this info get dumped on a backup server for x amount of time unless they get a subpen or warrant

If you were conectted to a public wifi anybody can see your traffic if they want to

If this site had a valid SSL nobody will not see the contents of this traffic or any site with a SSL

Im done man! Your funny and got me cracking up
 
Last edited:
dude your talking about some FBI 35 years in prison type of stuff. of course they will hit you for that

2nd If your using a SSL 256 it is not getting decrytped. It would take 25 years or more  to crack or decrypt. Anything can be cracked but who gonna sit at a cpu for 30 years to decrypt something. So back to reality IT CANNOT BE CRACKED!

Like saying if you leave your door unlock i can walk in and steal your stuff. No duh. Talking about fake certificates this and that ..get out of here man and take a nap.. So what yopur saying is the seedbox site have a fake certificate right? because that is what we are talking talking about now, not about other rouge fraud websites

Im done man! Your funny and got me cracking up

Nah. I was just proving that, unlike you claim, ISPs do in fact care about traffic other than torrents.

2nd. That assumes you have to worry about decrypting the traffic in the first place. There are exploits that completely bypass SSL all together. (E.G. That essential security flaw that Apple patched a week or two ago.) Your analgy is incorrect. It's more like putting all of your valuable information in the biggest, strongest, most expensive safe in the world. Then drilling a gaping hole on the side of it. Then leaving it out in the open, and being mad when people bypass the lock on the safe and just grab things through that gaping hole.

To give you a better idea of a possible exploit: your ISP handles all of your outgoing traffic, even the traffic to Seedbox. Instead of querying the proper address, your ISP performs a Man In The Middle procedure and you're directed to a faxu-Seedbox site. You, not paying attention, give up your credentials to the faux site, the site then tunnels that info into the legit seedbox and redirects you to a proper session. Your ISP then takes said info and hands it over to a content company that uses discovery to subpoena that information. :smile: Plus, the whole BYPASSING SSL ENTIRELY thing would be applicable here as well.

Like I said, you don't know what you're talking about. Regardless if the traffic is encrypted or not, your ISP can see how much traffic is being processed and where that traffic is coming from/going to. Even if its unlikely that an individual's security would be heavily compromised by an ISP, the fact remains that an individuals security CAN be heavily compromised in this manner, and it's actually not that hard to do. It's certainly not impossible, as you originally suggested.

Please learn about the subjects at hand if you're going to take it upon yourself to act as though you are a professional. You are not a professional, nor do you know as much as you'd be inclined for the people of NT to believe. You are an IT desk jockey who worked for Apple.

Bench players talking like starters, I hate it.
 
Last edited:
VPN is less of a headache and is more anonymous.. and yes your ISP will be able to see what you're downloading, once you download the files from your seedbox to your computer. However, there are numerous ways of hiding that traffic too.. but why go through the extra step. Set it and forget it with a VPN.
 
Last edited:
@Yeah is pretty much correct.

In reality they would subpoena seedbox who would turn over your info with zero hesitation.
 
A problem I had with the status bar was that it sat a little too far from the top. I'm super OCD like that :lol:
 
download UCCW from PlayStore

and then download this

put it into 'UCCWoutput' folder in your storage

make a 4x1 or 5x1 widget on any launcher, then select the theme.

Do I have to hide my original status bar? Also say I'm inside an app I won't have a status bar while I'm inside that app right?
 
Do I have to hide my original status bar? Also say I'm inside an app I won't have a status bar while I'm inside that app right?

Yes you do on your launcher.

I just enable swipe down function to show/hide ststusbar

It's only for your home screen, your og status bar will show for your apps/browsers.

Remember, the bar is only a widget.

Naz. I'll help you with that. Just set your screen dimensions with Nova
.
 
@Yeah is pretty much correct.

In reality they would subpoena seedbox who would turn over your info with zero hesitation.
This, ladies and gentlemen, is the end all be all when it comes to internet privacy. Your information is only as safe as the avenues you expose it to.

Never assume anything you are doing online is 100% secure. Always assume a degree of risk when doing anything that will leave a digital fingerprint, whether it be your IP address or your IMEI serial.


Sorry I asked about vpns guise

:rofl:

I didn't mean for to become such a big deal. I just absolutely hate when people spread misinformation, especially when I know what the correct information is. :D

I mean, some of the situations I proposed may seem extreme... but there are numerous examples of the weaknesses of SSL, and literally countless amounts of people who have been compromised using what they thought were safe connections.

The internet is very much like the Wild West. Be careful with your data, and more importantly, your personal info.
 
Last edited:
Agreed, very weary of cellphone purchases. Hopefully companies will start putting more money and resources into internet security and stop on top of it. We need protection on all fronts too, not just online purchases.
 
@Yeah is pretty much correct.

In reality they would subpoena seedbox who would turn over your info with zero hesitation.
The seedbox and company is offshore. That is the whole point. The seedbox company is throwing that subpoena away and they dont save logs anyways they get deleted daily
 
Last edited:
This, ladies and gentlemen, is the end all be all when it comes to internet privacy. Your information is only as safe as the avenues you expose it to.

Never assume anything you are doing online is 100% secure. Always assume a degree of risk when doing anything that will leave a digital fingerprint, whether it be your IP address or your IMEI serial.
roll.gif


I didn't mean for to become such a big deal. I just absolutely hate when people spread misinformation, especially when I know what the correct information is.
happy.gif


I mean, some of the situations I proposed may seem extreme... but there are numerous examples of the weaknesses of SSL, and literally countless amounts of people who have been compromised using what they thought were safe connections.

The internet is very much like the Wild West. Be careful with your data, and more importantly, your personal info.
 dude what are you talking about 1st of that that SSL weakness is a exploit like Java and flash have sometimes

THE ARTICLE CLEARLY SAYS THE WEAKNESS WAS FOUND ON SSL VERSION 1.0

The SSL vulnerability only works on SSL version 1.0. Versions 1.1 and 1.2 are not affected.

iT IS AN EXPLOIT ON OLD VERSION OF SSL

IN THEORY A SSL WILL ENCRYPT ALL INFO AS YOU STATED AND THAT IS WHAT I WAS SAYING.

Yes anything can happen or an exploit can be found but in truth a SSL WILL HIDE YOUR ACTIVITY! That is the whole purpose of an ssl

Shopping websites have to have a SSL to encrypt your credit card info
[h3]A highly-simplified example of encrypting using SSL certificates.[/h3]
Sara (the sender) wants to send an encrypted email to Rajiv (the recipient). First Rajiv sends Sara a copy of his SSL Certificate. In this highly-simplified example, the public key in Rajiv's SSL Certificate is "+1." The private key, which stays in Rajiv's computer, is also "+1."

So Sara composes a message to Rajiv. It says, "Hi--Sara." Then she instructs her computer to use Rajiv's SSL certificate to encrypt the message. The computer reads Rajiv's public key and adds +1 to each letter in the message.

For example, A+1=B, B+1=C, and so forth.

The encrypted message looks like this:

HI - SARA becomes IJ - TBSB

There is always a what if with anything. Some sites use outdated SSL but most are updated now. All you have to do is click on the lock to the left of the url and it will tell you the version of sll and if it is secure...

My point is the traffic is secure... Just like my wifi is secure, if somebody hacks that is something different but in reality the traffic ids encrytped

and the isp do not care if your downloading torrents  or other material as long as they dont get a copyright notice. Just like you said that older version of SSL can be hacked,so your ISP is going to hack your information.. Get out of here

Go spew your kiddie hacks to some elementary kids
 
Last edited:
Back
Top Bottom