Page 1 of 2 12 LastLast
Results 1 to 10 of 14

Thread: Jap

  1. #1
    Senior Member
    Join Date
    Apr 2003
    Posts
    125

    Jap

    is it safe to use this proxy prog or not?

    Given the bad propaganda it has been under would you still use it.

    JAP........Yes...........NO

    JAP is a product of a German university, still in development and testing and AFAIK the only server is hosted by the developers. A German court ordered them to log users to a certain address, which wasn't named. The JAP team did not announce this, but they did publish the source code and it was quickly found by an outside programmer inspecting the code. The main problem is that if it happens again, we can expect they will not announce it. While I do not trust any government, it seems that the German courts are quite a bit less corrupt than the US courts. As such, I wouldn't expect them to order logging of a grow site and they may not order it again in any case. Even so, at least our local pigs would have to get this info from a German court.

    You could connect from your computer to the JAP server, then from that to another proxy. This would prevent anyone (e.g. Carnivore) from logging your session at your ISP, and it would obscure your final destination to the JAP chain. I just use JAP, assuming that even if possible for our pigs to weasel their way into getting data from JAP it would be far too much of a hassle for them to actually do.
    A+ Certified

  2. #2
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    USA = N.A.T.O.

    GERMANY = N.A.T.O.

    INTERPOL?

    And your avatar would actually get you some time with "bubba" in Germany?

    Are you a cringing nonce coward? afraid to speak freely?................why do you wish to hide like a cockroach? what is it that you have to say, that you are so afraid might be traced back to you?

    Errrrrrr you have a Constitution don't you?...........it probably applies in Texas (Following the battle of the San Jacinto River...1836.....?..)

    If anyone wonders why I rant...........please check out his other thread.

    I really do love those people who think that if they ask 15 people the same question, they will eventually get the answer they want to hear

    Boring..........................

  3. #3
    This would prevent anyone (e.g. Carnivore) from logging your session at your ISP, and it would obscure your final destination to the JAP chain.
    Actually no that wouldn't really do much agianst the ISP. The sessions would have to be running under an encryption of some sort... lets say something similiar to SSH. Otherwise its just a average proxie that really only provides small coverage for you when connecting to things like web servers. Also how will that prevent the actual loging of various things? Will it walk over and threaten peaple to stop

  4. #4
    Leftie Linux Lover the_JinX's Avatar
    Join Date
    Nov 2001
    Location
    Beverwijk Netherlands
    Posts
    2,534
    Well mr. TheSpecialist, JAP does just that

    The java app (JAP) does the encryption..
    The first chain does some decryption
    The second does the last bit of decryption (mixmaster)
    Then the second chain fetches your desired stuff and sends it back encrypted..
    The first chain does some more encrypting..
    And the java app decrypts it for you to view..
    ASCII stupid question, get a stupid ANSI.
    When in Russia, pet a PETSCII.

    Get your ass over to SLAYRadio the best station for C64 Remixes !

  5. #5
    Errr opps... That wasn't mentioned at all the first time around. Damn Nihil, yeah you know this is a messed up world when you have a guy with a Hitler avatar ranting about how countries are always getting more and more controling and intrusive. PM or post up the post your reffering to... im bored.

  6. #6
    Leftie Linux Lover the_JinX's Avatar
    Join Date
    Nov 2001
    Location
    Beverwijk Netherlands
    Posts
    2,534
    lol.. heh..
    I'm with you on the dictator thing

    the post nihil was on about is this one: http://www.antionline.com/showthread...hreadid=257147

    that's also where I mentioned the workings of JAP
    hitler-boy asked the exact same stuff in that thread as he did in this new thread here

  7. #7
    Senior Member
    Join Date
    Apr 2003
    Posts
    125
    Let me clear something up about this thread. If you refer back to my original post then you will see the topic was in fact about Proxy's. Outta that thread I found something that I was interested in. I learned something in that thread. I Had no idead what JAP was. So I wanted to bring that sub topic to a new thread. Focus on that. I failed. Whatever. Nihil you got a problem with what I say...... dont post on my thread. Im tired of you stating the obvious. If you dont know anything about JAP then dont speak brother. hhmmmm im on a thread about JAP think Ill say something which has nothing to do about JAP. 4th of July sniff sniff
    A+ Certified

  8. #8
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    Nihil you got a problem with what I say...... dont post on my thread. Im tired of you stating the obvious. If you dont know anything about JAP then dont speak brother. hhmmmm im on a thread about JAP think Ill say something which has nothing to do about JAP. 4th of July sniff sniff
    Is it that obvious?.....JAP is compromised?............hey you have worked that out?

    You had the answer yourself.......in your first post?..............a chain to a non-compliant area?

    But it is still NOT safe?...............they change loyalties?........can be bought?

    Would you please post a plain text example or .bmp of that which it is that you are concerned about hiding?

    I know that you won't

  9. #9
    I dont mean to point out the obvious but, If I were to use someone else's encryption software could that person or persons possibly have a key to decrypt where I have been and doing?

    I am not insinuating but, I still can't figure out why someone would want to hide what and where they have been. Only because my best friend is a cryptologist for the navy/nsa and has told me (as well as my professor) that if someone wants to trace back to a source they will find it, there is no fool proof way to hide, except not to hide like I have seen said in other threads... but interesting thread tho...

  10. #10
    They call me the Hunted foxyloxley's Avatar
    Join Date
    Nov 2003
    Location
    3rd Rock from Sun
    Posts
    2,534
    http://www.antionline.com/showthread...hreadid=257291

    there is a comment from Relyt re :- JAP and proxies in general.
    trust NO ONE.
    As for your general demeanour, it is your right as a citizen of the US of A. to say what you want, when you want. This does not mean that we have to listen to it.

    quote 'Nihil you got a problem with what I say...... dont post on my thread' !!!!!!

    your thread ? you have no material rights to the products of the page generated, you want to leave this forum, then 'dissing' those that are offering advice, is probably the right way to go.

    Enough already, I'm another one that is using YOUR thread to waste space.
    so now I'm in my SIXTIES FFS
    WTAF, how did that happen, so no more alterations to the sig, it will remain as is now

    Beware of Geeks bearing GIF's
    come and waste the day :P at The Taz Zone

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •