First Pic:Every single time you load a page on the
sharty it
scans for open ports specifically ports: 6463, 1700, and 1701To even lurk the sharty you MUST enable canvassing in your browser% and enable JavaScript
The following JS runs in the background at all times:
googlesyndication, TuxlerVPN, and Soyjak.st
Soyjak.st is what bootstraps to the hidden
integrity.wasm which is the WebAssembly payload which runs extremely aggressive (the most aggressive I have ever seen)
fingerprinting of your browser, ip address, screen size, OS, and every other piece of information it can possibly collect on you.
It is NOT POSSIBLE to post while in private browser mode using a VPNThe only way to use TOR is to generate an
IP Token which defeats the entire purpose of using TOR.
Second Pic:The use of
eval() to execute a decrypted string as JavaScript is a significant security risk.
eval() can run arbitrary code, which could include malicious scripts (e.g., stealing user data, injecting malware, or performing unauthorized actions in the browser).Post too long. Click here to view the full text.