Anonymous ID: 7e2673 Feb. 20, 2019, 7:02 a.m. No.5282755   🗄️.is 🔗kun   >>2776 >>2965

So idea I had for research for cyberfags:

 

Trace hacker through proxy chain with ssl/tls and ca hosted on private server which blocks ip of each hop in chain until originator found

 

Top kek

 

Hackers eat shit

Anonymous ID: 7e2673 Feb. 20, 2019, 7:24 a.m. No.5282965   🗄️.is 🔗kun

>>5282755

 

What I was hypothetically trying to say was that if a cyberfag set up a honeypot, and if a hacker tried to mitm or hack into it, it may be possible to use dynamic ip blocking in tandem with the cert server authority (that cyber fag created) to block each hop in the proxy chain and or vpn to spill the original ip.

 

Not sure of the feasibility or legalness but just an idea for whitehats to research if legal or feasible