End Of Any Anonymity On Line

Joined
Nov 21, 2015
Messages
10,504
Google/Youtube is requiring EU residents to verify via ID or credit card that they are over 18, very soon, in order to access many features.
 

Maljam

Member
Joined
Jul 8, 2020
Messages
715
Any source for this? I tried searching for it but couldn't find anything.
 
OP
ecstatichamster
Joined
Nov 21, 2015
Messages
10,504
Google email
We’re also adjusting the way our age-restriction works off YouTube, prohibiting age-restricted videos to be viewable when embedded on most third-party sites. Users that click on an age-restricted video on another website will be redirected to YouTube, where they will only be able to view the content when logged-in. This will help ensure that no matter where the content is viewed, videos hosted by YouTube will only be viewable by the appropriate audience.

In order to comply with recent regulations, we will also roll out age-verification for users in the EU. If our systems cannot establish that a viewer is over the age of 18, regardless of the age they signed up with on their Google account, we will request they verify their age using a valid ID or credit card.@~
 

Maljam

Member
Joined
Jul 8, 2020
Messages
715
Google email
We’re also adjusting the way our age-restriction works off YouTube, prohibiting age-restricted videos to be viewable when embedded on most third-party sites. Users that click on an age-restricted video on another website will be redirected to YouTube, where they will only be able to view the content when logged-in. This will help ensure that no matter where the content is viewed, videos hosted by YouTube will only be viewable by the appropriate audience.

In order to comply with recent regulations, we will also roll out age-verification for users in the EU. If our systems cannot establish that a viewer is over the age of 18, regardless of the age they signed up with on their Google account, we will request they verify their age using a valid ID or credit card.@~

Thanks for the source. Absolutely insane.
 

Jessie

Member
Joined
Jul 9, 2020
Messages
1,018
I was wondering when this was going to happen, there's just too many ways for people to hide themselves with a simple email registration. That's why they started implementing SMS verification via text. However you can even get past this in certain scenarios, so ID verification seems like the next logical step for them to take.

It essentially renders proxies, VPNs, and onion routing useless. No point in encrypting your connection and hiding your IP if you have to use ID verification to login.
 

Light

Member
Joined
Oct 5, 2018
Messages
304
It essentially renders proxies, VPNs, and onion routing useless. No point in encrypting your connection and hiding your IP if you have to use ID verification to login.
That's true.
Hopefully the backlash from users and the strengthening of other platforms will work to stop it.
 

lvysaur

Member
Joined
Mar 15, 2014
Messages
2,287
It essentially renders proxies, VPNs, and onion routing useless. No point in encrypting your connection and hiding your IP if you have to use ID verification to login.
I've never believed VPNs act as anything other than a big fat "hey look at me, I have something to hide!" sign for the NSA to zero in on. If you were doing something illegal, I'd think the best way would be to do so "hidden in plain sight"
I'm not in IT though so feel free to tell me why I'm wrong
I've read that a large percentage of onion nodes are owned and monitored by the NSA as well.
 

Vinny

Member
Joined
Dec 11, 2018
Messages
1,438
Age
51
Location
Sofia, Bulgaria

Jessie

Member
Joined
Jul 9, 2020
Messages
1,018
I've never believed VPNs act as anything other than a big fat "hey look at me, I have something to hide!" sign for the NSA to zero in on. If you were doing something illegal, I'd think the best way would be to do so "hidden in plain sight"
I'm not in IT though so feel free to tell me why I'm wrong
I've read that a large percentage of onion nodes are owned and monitored by the NSA as well.
I agree if someone is sloppy VPNs aren't going to protect them. Just to state the obvious, they're probably logging your activity even though most say they aren't. So if you're engaging in illegal activities it's probably not as hidden as the person thinks. Most these companies will fall right in line when they're presented with a court order from a federal agency.

I do think VPNs can be useful for avoiding DMCA notices though. You just need to buy the VPN with cryptocurrency, and preferably use it over public wifi so they never know your real network connection. In this way, you can prevent the company from knowing very much about you. But other then streaming and downloading movies/music, they aren't going to do much. Tor is better, but even that has some exploitable areas.
 

BearWithMe

Member
Joined
May 19, 2017
Messages
2,023
I was wondering when this was going to happen, there's just too many ways for people to hide themselves with a simple email registration. That's why they started implementing SMS verification via text. However you can even get past this in certain scenarios, so ID verification seems like the next logical step for them to take.

It essentially renders proxies, VPNs, and onion routing useless. No point in encrypting your connection and hiding your IP if you have to use ID verification to login.
This actually render VPNs even more useful than before. Assuming that this is really going to affect only EU residents, you can use VPN to trick Google to think that you are not EU resident, and therefore not require this insane ID verification. Also, there might be no point in encrypting your communication with Google servers, but you still want to encrypt your communication with the other servers
 

BearWithMe

Member
Joined
May 19, 2017
Messages
2,023
I've never believed VPNs act as anything other than a big fat "hey look at me, I have something to hide!" sign for the NSA to zero in on. If you were doing something illegal, I'd think the best way would be to do so "hidden in plain sight"
I'm not in IT though so feel free to tell me why I'm wrong
I've read that a large percentage of onion nodes are owned and monitored by the NSA as well.
Yes, TOR was basically invented and funded by US government. By using TOR, you are definitely screaming "hey look at me, I have something to hide!".

There are a few VPN providers, that reside outside US/EU juristiction, and has refused to cooperate with US/EU courts, and this is proven by the official, publicly available court documents.

The thing is, when using a good VPN, you have some chance that your communication might be logged and stored somewhere. When not using VPN, you can be 100% sure your communication IS logged and stored by your ISP.

I'd rather choose the first option.
 

Jessie

Member
Joined
Jul 9, 2020
Messages
1,018
@JanP It's possible, but if Google is going to go that far, it won't be long before they ban static IPs from accessing their servers. When this happens, 90% of the VPNs out here will become useless. I mean, I know a few VPNs offer dedicated IP addresses, but it's not many.

Most of them use static IPs, therefore whenever you connect to "Houston Tx" for example, hundreds of people are using that same IP address. It would be really easy for Google to systematically blacklist all these IPs, particularly if we're only talking about one region (like the EU for example).
 

Jessie

Member
Joined
Jul 9, 2020
Messages
1,018
Yes, TOR was basically invented and funded by US government. By using TOR, you are definitely screaming "hey look at me, I have something to hide!".

Yeah that may be true, but it's basically a nonprofit that's funded by voluntary donations now. The fact that anyone can run a Tor node is a pretty good indication that it's not a honeypot. It's not foolproof either. However if someone like Ross Ulbricht (free Ross!!!) can start a narcotic ring estimated to be worth over 80 million without instantly getting busted, I think Tor should be given the benefit of a doubt.

When you think about, and read his story, Ross was very sloppy too. They guy was a rank amateur in OPSEC, he even advertised his website over the clearnet with his own Google account, lol. It still took the dumbass feds a year to catch him. The only logical way to compromise Tor is if a adversary owns your guard node. If they own your guard node, they can log your real IP address, and since it's estimated that over 1/3rd of the exit nodes are likely owned by law enforcement, it's just a matter of time before they can catch you with a timing attack.

So unless a adversary owns your guard, and you also happen to cross a exit node owned by the same entity, then you're probably good. Mathematically the chances of this happening is very slim. And if you only connect to onion links, then it can't happen at all. People will also mention the occasional javascript exploit, however this shouldn't effect most people if they keep their browser updated. Java exploits are a big problem for pedos, because they like downloading kiddie porn and watching it in 3rd party apps, which will leak their IPs.

Normal people doing normal things really have close to nothing to worry about.
 

BearWithMe

Member
Joined
May 19, 2017
Messages
2,023
Yeah that may be true, but it's basically a nonprofit that's funded by voluntary donations now. The fact that anyone can run a Tor node is a pretty good indication that it's not a honeypot. It's not foolproof either. However if someone like Ross Ulbricht (free Ross!!!) can start a narcotic ring estimated to be worth over 80 million without instantly getting busted, I think Tor should be given the benefit of a doubt.

When you think about, and read his story, Ross was very sloppy too. They guy was a rank amateur in OPSEC, he even advertised his website over the clearnet with his own Google account, lol. It still took the dumbass feds a year to catch him. The only logical way to compromise Tor is if a adversary owns your guard node. If they own your guard node, they can log your real IP address, and since it's estimated that over 1/3rd of the exit nodes are likely owned by law enforcement, it's just a matter of time before they can catch you with a timing attack.

So unless a adversary owns your guard, and you also happen to cross a exit node owned by the same entity, then you're probably good. Mathematically the chances of this happening is very slim. And if you only connect to onion links, then it can't happen at all. People will also mention the occasional javascript exploit, however this shouldn't effect most people if they keep their browser updated. Java exploits are a big problem for pedos, because they like downloading kiddie porn and watching it in 3rd party apps, which will leak their IPs.

Normal people doing normal things really have close to nothing to worry about.
I'm pretty sure the feds waited so long with arresting Ulbricht on purpose, gathering more evidence and busting more people in the meantime.
 
EMF Mitigation - Flush Niacin - Big 5 Minerals

Similar threads

Back
Top Bottom