Highest Rated Comments


laststance292 karma

in your post you said you hunt down pedos, dealers, crime orgs, etc. But don't they all do a "test" of sorts where they force you to shag a kid or someone else to prove that you're "in the community"? I remember there was a CP sting and the dealer wanted the undercover guy to receive a blowjob from a 6 year old to see if he was legit, or force him to fuck.

How do you handle those type of situations?

laststance29 karma

Distracting visual movements is a real thing, next time you're in a fight helicopter-dick then get north-south position and start thrusting while you suck em off. Total confusion.

laststance12 karma

What is your stance on pedophiles? I saw that some people are trying to move it into a "sexual identification/preference" sphere were society should be more accepting to said pedos.

I've also heard that it's so ingrained that it's not a preference so you can't really "treat" a pedo other than chemical castration. Is that true?

laststance3 karma

Do you have any good sources or material? Or is the security community more of a "if you really want to learn, you'll find it? type of scene? Its a general consensus that most of the practices taught in formal education is more about how to approach the problem, the practices are very outdated since its a constant race/evolution.

If there are courses, which do you recommend?

laststance2 karma

What are your views on SSDs? From my understanding most SSDs on the market has limited data data recovery abilities. Such as locking in read only until it is in use again, then wiping the drives if you try to access the SSD.

For HHDs do you use a Linux sector by sector copy of the original drive as a work bench or do you use the original drive? Is there a special rule set due to the nature of how easy it is to tamper with digital evidence?

I've heard that people who trade in CP are surprisingly technically adept and use several "wtf this type of technology exists?" type of software/hardware in their networks. Is that true? What are the developments in the digital forensic field? Is it a constant arms race?