-  [WT]  [PS]  [Home] [Manage]

Posting mode: Reply
  1.   (reply to 16526)
  2.   Help
  3. (for post and file deletion)
/sci/ - Science, Technology, Engineering, and Mathematics

Join us in IRC!

•This is not /b/ or /halp/. Tech support has its own board.
•If you are not contributing directly to a thread, sage your post.
•Keep the flaming at a minimum.
•Tripcodes⁄Namefags are not only tolerated here, they are encouraged.
•We are here to discuss sci-tech, not pseudoscience. Do not post off-topic.

•♥ Integris

  • Supported file types are: GIF, JPG, PNG, WEBM
  • Maximum file size allowed is 5120 KB.
  • Images greater than 200x200 pixels will be thumbnailed.
  • Currently 478 unique user posts. View catalog

  • Blotter updated: 2011-01-12 Show/Hide Show All

There's a new /777/ up, it's /gardening/ Check it out. Suggest new /777/s here.

Movies & TV 24/7 via Channel7: Web Player, .m3u file. Music via Radio7: Web Player, .m3u file.

WebM is now available sitewide! Please check this thread for more info.

bank account getting drained from hackers Anonymous 17/07/17(Mon)01:09 No. 16526 ID: 030037

File 150024659115.jpg - (32.55KB , 333x360 , serveimage.jpg )

Theoretically, how fucked up would I be if someone used a keylogger on my machine for a few month and leaked my bank account details (online password, PIN, security questions etc) on the Darkweb?

Not worried at all but I just wonder how good these computer hackers are at clearing accounts. Aren't there limits depending on the level of your account? They definitely can get around I.P alerts when accounts are accessed in different countries.

Anonymous 17/07/17(Mon)22:25 No. 16527 ID: 33427e

How fucked? Well, completely.

But to do any of that they would have to get administrative access on your system, and if they get that kind of control they could just zombify your computer and get a constant revenue stream from you.

Breaking into a computer to get information on a single credit card is not very efficient. Getting into a bigger system to steal information on hundreds of credits cards, now that's more interesting.

Still, if you were to do the following you could be reasonably protected:
1. Put a hardware firewall between your computer and the Internet. Block all incoming and outgoing connections. Disable UPnP.
2. Put an HTTP proxy on the inside the firewall. The firewall should allow the proxy to connect to things outside, but not to open ports.
3. The proxy should block all domains except those of your bank.
4. Your browser should talk to the proxy to connect to the bank.
5. The computer should never leave the network nor should the network ever be reconfigured. (Corollary: that computer can never be used for anything other than connecting to the bank.)
If you do this, in order to get your keystrokes an adversary would have to take control of both your computer and either the firewall, the proxy, or the bank.

Delete post []
Report post