The 'impossible' is just something that hasn't been done yet.
Nothing is impossible eh? Go slam a revolving door.
In my experience, most do 'semi' legitimate work, using normal tools for disinfection and optimization. These tools are things like hitman, MBAM, ccleaner, etc. Unfortunately, the techs do not seem very skilled, sometines causing damage, and more importantly they lie in a very convincing confidence game to get payment info and perform service. While I have yet to see anyone have extra fraudulent charges placed on them, the initial bill is fradulent given that the work never needed to be performed.
Also, if these "services" are so unethical as to lie to get you to pay, it is a small step to later using that payment information or selling it to third parties.
The worst one I saw is from a personal friend who called one of these services for assistance, paid 300 dollars for 3 years of remote assistance. One onthe to the day later, another company cold called him (he thought it was the first company). He allowed them remote access, and then when they wanted payment and he realized it was not the first company he asked them to disconnect. He was emotional and turned off his surge protector when they became pressuring and refused to disconnect. He left the room failing to realize it was a laptop and still on. The 'tech' then proceeded to delete most of the recently dated files in his user profile. These were very important files, and I was only able to recover about 85% with file recovery tools.
Unfortunately all these companies need to operate is a phone number and a simple VOIP system..maybe a quick templated website and domain. They can be set up in a very quick time, and exist outside of any willing jurisdiction to fight them. Education is the ONLY way at this time.
Perhaps, he should take the most money he made (legally) on any one day of his life, then counter sue for lost wages for every single day incarcerated. I mean if he made 1500 on that lottery ticket one day, then he should have made 1500 every other day including weekends!
Slashdot [Superprotection needed].
My questions are thus... why not move to a model where the entire OS is forced through the tor proxy, This could be done with the use of a dummy network adapter and disabling the current adapter while tor is in use. Yes it would likely break certain OS features during that time, but there it is.
TFA also discusses putting a dumbed down security 'slider' on the browser, but still the default is to allow JIT/JS. Currently you have noscript installed, but not turned off in a fresh install. A few lines of JS is enough to identify an IP or fingerprint more of the system. The default should be most secure with warnings to open it up. Period. At install time you already explin that things do not work like you are used to and then allow the user to decide to reduce security. Anything else provides an illusion of security to a naive user, but still allows an adversary easy means of detection.
We are the tough geeks and will browse into that rough patch on the interwebs to get our fix of data.
We will risk malware and viruses to pirate the latest films.
We will walk into a biker bar and call the biggest pagan mother fucker a gay little bitch.
Oh wait, maybe not that last one.
Seriously though.. what is considered a troll, or offensive is subjective. If I do not want imposed censorship, I sure as shit am not going to pay for it directly.
Let's guess who gets in trouble...
The employee selling the data..check (low level scape goat)
Maybe an IT guy that allowed excessive permission.. maybe he just gets fired...
Any DEA agents or upper level management who authorized illegal and warrant-less data collection? NO
Any Amtrak executives for allowing it to be provided (through the employee or the terminal in the DEA office?) NO
If we are lucky we will hear some strong words at a congressional hearing, and that will be the end of it.