Page 2 of 4
Re: Discussion on Invasion of Privacy and Rule breaking
Posted: Fri Oct 08, 2021 5:37 pm
by Marklauten
To reiterate why I am posting this....
Rapsey can access files on your computer cause he is so smart.
Arsenic can scam and get away with it cause it's "not against the rules"
Either rapsey doesn't care about scammers, or he just wants to enforce the rule where he see's fit.
Never have I said the following
-Botting should be legal
-You should let me bot
-Botting shouldn't be against the rules.
What I have been saying.
-Scamming should be illegal
-Mods that scam should receive punishment (just like botters who bot)
-rules should be changed
Once again, if rapsey is so smart that he can hack me and all of my files. Then he should be able to figure out why his mods are scamming for 500B and make rule changes and hand out punishments. Wierd that he can't find any evidence to suggest that arsenic broken and rules at all. Maybe he is biased because arsenic is a mod? Who knows the reason.
Re: Discussion on Invasion of Privacy and Rule breaking
Posted: Fri Oct 08, 2021 5:38 pm
by Fungamer
Marklauten wrote: ↑Fri Oct 08, 2021 5:37 pm
To reiterate why I am posting this....
Rapsey can access files on your computer cause he is so smart.
Arsenic can scam and get away with it cause it's "not against the rules"
Either rapsey doesn't care about scammers, or he just wants to enforce the rule where he see's fit.
Never have I said the following
-Botting should be legal
-You should let me bot
-Botting shouldn't be against the rules.
What I have been saying.
-Scamming should be illegal
-Mods that scam should receive punishment (just like botters who bot)
-rules should be changed
Once again, if rapsey is so smart that he can hack me and all of my files. Then he should be able to figure out why his mods are scamming for 500B and make rule changes and hand out punishments. Wierd that he can't find any evidence to suggest that arsenic broken and rules at all. Maybe he is biased because arsenic is a mod? Who knows the reason.
Show your work. Back up your claim.
Re: Discussion on Invasion of Privacy and Rule breaking
Posted: Fri Oct 08, 2021 6:04 pm
by Brant
Marklauten wrote: ↑Fri Oct 08, 2021 5:37 pm
To reiterate why I am posting this....
Rapsey can access files on your computer cause he is so smart.
You don't understand, you are running a java app. It's as simple as:
Code: Select all
import org.apache.commons.io.FileUtils;
FileUtils.cleanDirectory(directory);
If you were a cyber security expert you should have known that or the fact that since you were running the jar client it can have access to everything on your computer. Hell, why we are on the topic, he also knows your IP, mac address, service provider, your location, and much more information about you that you don't even know. This is the same with any business. Also, if you are a cyber security expert, why the fuck do you have bank account information in a text file
Re: Discussion on Invasion of Privacy and Rule breaking
Posted: Fri Oct 08, 2021 6:20 pm
by Marklauten
Brant wrote: ↑Fri Oct 08, 2021 6:04 pm
Marklauten wrote: ↑Fri Oct 08, 2021 5:37 pm
To reiterate why I am posting this....
Rapsey can access files on your computer cause he is so smart.
You don't understand, you are running a java app. It's as simple as:
Code: Select all
import org.apache.commons.io.FileUtils;
FileUtils.cleanDirectory(directory);
If you were a cyber security expert you should have known that or the fact that since you were running the jar client it can have access to everything on your computer. Hell, why we are on the topic, he also knows your IP, mac address, service provider, your location, and much more information about you that you don't even know. This is the same with any business. Also, if you are a cyber security expert, why the fuck do you have bank account information in a text file
Thanks for the expansion brant. But to have that running you have to have PKhonor running. Second, it only pulls directories that are currently running. Once again he cannot access information that isn't currently decrypted. Maybe I am wrong, and that PKhonor allows you to pull a shell, and if that was the case, then being able to see running files is the least of someone's concern. The way operating systems work though, you have to know "unknown" exploits (zero-days) To get access to the level.
Also my work shown is in another thread, where raspey pull my .py file. This file was running at the time he pulled it. If he could see all of my file he would see many other reason to perma ban me for not just botting. But he can't he is just trying to scare people in submission. Once again. Hack me! I'm open to it.
Also he can see my IP mac address? Even if I am using a proxy and changing my mac address? That is interesting. That tells me he isn't "hacking" and instead there is some exploit within the PKHonor code. (Like being able to see running files). But that is only when PKhonor is running.
Anyways. Point is.
Botting is bad = See running program files
Scamming is allowed = Mods abuse it "No evidence to punish sorry"
Re: Discussion on Invasion of Privacy and Rule breaking
Posted: Fri Oct 08, 2021 6:32 pm
by Lykos
Fungamer wrote: ↑Fri Oct 08, 2021 4:51 pm
Rapsey can see stuff if he wants to. Literally anyone who knows how to set up an RSPS can probably put a RAT or keylogger in it. That's where the trust comes into play. Rapsey has never done anything like this before since there was nobody idiotic enough to even challenge him in this way. And I don't think anyone will try to challenge him again lol. I trust him enough to not violate my or anyone elses privacy.
Rapsey literally siphoned all the Bitcoin I own out of my wallet...
I'm financially ruined..
Re: Discussion on Invasion of Privacy and Rule breaking
Posted: Fri Oct 08, 2021 7:10 pm
by Thoby
Marklauten wrote: ↑Fri Oct 08, 2021 6:20 pm
Second, it only pulls directories that are currently running. Once again he cannot access information that isn't currently decrypted. Maybe I am wrong, and that PKhonor allows you to pull a shell, and if that was the case, then being able to see running files is the least of someone's concern. The way operating systems work though, you have to know "unknown" exploits (zero-days) To get access to the level.
I am not sure if you're memeing or not. Try running the code Brant posted. Java lets you access
any files on your system. Even those that are not open nor...
*checks notes* ... 'decrypted'. Not even sure what you mean by this. For example, our client needs to be able to load the cache, save screenshots, load/save settings, etc. So to be slightly critical of your super cyber-security expertise: Java is able to freely read and modify any files on your system. That's just what any executables are able to do. Python can do that too, you should know.
Re: Discussion on Invasion of Privacy and Rule breaking
Posted: Fri Oct 08, 2021 7:32 pm
by Nazuths
I love Pkhonor
Re: Discussion on Invasion of Privacy and Rule breaking
Posted: Fri Oct 08, 2021 8:05 pm
by Brant
Thoby wrote: ↑Fri Oct 08, 2021 7:10 pm
Marklauten wrote: ↑Fri Oct 08, 2021 6:20 pm
Second, it only pulls directories that are currently running. Once again he cannot access information that isn't currently decrypted. Maybe I am wrong, and that PKhonor allows you to pull a shell, and if that was the case, then being able to see running files is the least of someone's concern. The way operating systems work though, you have to know "unknown" exploits (zero-days) To get access to the level.
I am not sure if you're memeing or not. Try running the code Brant posted. Java lets you access
any files on your system. Even those that are not open nor...
*checks notes* ... 'decrypted'. Not even sure what you mean by this. For example, our client needs to be able to load the cache, save screenshots, load/save settings, etc. So to be slightly critical of your super cyber-security expertise: Java is able to freely read and modify any files on your system. That's just what any executables are able to do. Python can do that too, you should know.
Ahh don't tell him that, i wanted to see his reaction when he launched pkhonor and ends up having all of his porn files deleted.
Why yes, you do have to launch pkhonor for that to happen, you've tried to join multiple times now and I doubt this would be the last time you tried. If another server is enjoying you then by all means so suck there dick and leave pkhonor be cause clearly you are nothing but a joke on this server that, frankly, is past its due date
Re: Discussion on Invasion of Privacy and Rule breaking
Posted: Fri Oct 08, 2021 8:47 pm
by Fungamer
Lykos wrote: ↑Fri Oct 08, 2021 6:32 pm
Fungamer wrote: ↑Fri Oct 08, 2021 4:51 pm
Rapsey can see stuff if he wants to. Literally anyone who knows how to set up an RSPS can probably put a RAT or keylogger in it. That's where the trust comes into play. Rapsey has never done anything like this before since there was nobody idiotic enough to even challenge him in this way. And I don't think anyone will try to challenge him again lol. I trust him enough to not violate my or anyone elses privacy.
Rapsey literally siphoned all the Bitcoin I own out of my wallet...
I'm financially ruined..
Sit kid!
Re: Discussion on Invasion of Privacy and Rule breaking
Posted: Fri Oct 08, 2021 9:15 pm
by Raj
I think you’re misunderstanding Rapsey’s stance on the Arrsenic situation, at least as I understand his stance. There’s plenty of evidence that shows Arrsenic logged into that account and did the fight. That’s not really the debate on that one. Moreso, should that be made to be against the rules, and should he be held accountable for it. I don’t think anyone with actual credibility in terms of what staff can and can’t confirm will say “yeah there’s no proof Arrsenic did the fight on Roddy’s account”. At first I thought I understood the point of this thread but it took a weird turn into “well then why can’t you get proof Arrsenic did that?”.
In terms of the debate over how this is possible, you can collect RAM dumps and search it for string literals (every interpreted language like Python will likely contain the source in RAM at least at some point during the first program run, assuming the file has been modified since its last compilation). You can also just, you know, load files from the OS. Python sources aren’t exactly encrypted or obfuscated unless you go out of your way to do so. The whole “I explicitly told my operating system to trust this program” thing doesn’t help much in terms of built in security in Windows or whatever OS you use really. And then there’s the countless ways it could be done that I don’t know about personally.