Jump to content
IGNORED

(CW: CSA) Josh & Anna 41: Will the Rebers Continue their B&B for Child Predators After the Trial?


HerNameIsBuffy

Recommended Posts

4 minutes ago, patsymae said:

OK tech. How would my access to a router that is not mine (like my neighbor's, or a local hotel, or like all the thousands who use an MickeyD router to do homework--allow me to download child porn on somebody else's Linus side of their computer? Not an argument, really want to know if that is possible.

If someone's computer was intentionally configured to be available for file sharing with no password protection, it's possible, but that would require the administrator to go through the hoops of making it as insecure as possible.  Otherwise it would take a 'nefarious security expert' with specialised software tools and knowledge to maybe break in. Nothing's 100% secure especially on public wifi hotspots, but it would take some work to leave yourself vulnerable to someone who's merely "fairly good with computers".

IIRC we learned the video files in question were opened in a video player in the linux partition, so unless it was left running with the screen off it couldn't have been missed by the local computer user.

  • Upvote 8
  • Thank You 3
Link to comment
Share on other sites

 

15 minutes ago, TuringMachine said:

What does she mean by that exactly? In my (admittedly limited) experience downloading things to Linux, usually the download page just gives you the commands. Would that count as "researching command codes"? Or does she just mean she didn't find evidence of pest googling "how to download tor on Ubuntu"?

This.  I mean you can install via command prompt but as @Alisamer said he could have googled what he needed from any device.  

And I'm sure he's the king of clearing his browser history, how far back can the forensics go for deleted searches?  If it's a simple commands he's done before he might already know.

If I had to shut down a remote computer I don't need to google shutdown -r because I already know the command.  

  • I Agree 2
  • Thank You 1
Link to comment
Share on other sites

With no pictures of Jessa at court, I'm not convinced she was there. The Sun mixed up other people, they may have confused her with Laura.

  • Upvote 16
  • I Agree 2
Link to comment
Share on other sites

2 hours ago, Tatar-tot said:

I would think most would take a pit stop at Porn Hub before engaging in the dark web.  
 

 

I'd be astonished if he hadn't eagerly watched the < redacted > type of PornHub offering before seeking even worse, yep.

Edited by HerNameIsBuffy
redacted specifics
  • Upvote 4
Link to comment
Share on other sites

Bush stated CSAM streamed using a VLC player, downloaded in a complex way she doesnt see this in other CSAM cases

Edited by 3KidsAndStopped
  • Thank You 3
  • Love 1
Link to comment
Share on other sites

2 minutes ago, CyborgKin said:

If someone's computer was intentionally configured to be available for file sharing with no password protection, it's possible, but that would require the administrator to go through the hoops of making it as insecure as possible.  Otherwise it would take a 'nefarious security expert' with specialised software tools and knowledge to maybe break in. Nothing's 100% secure especially on public wifi hotspots, but it would take some work to leave yourself vulnerable to someone who's merely "fairly good with computers".

IIRC we learned the video files in question were opened in a video player in the linux partition, so unless it was left running with the screen off it couldn't have been missed by the local computer user.

True, but in this case it was prove both the computer was password protected (as protected as you can be with a dumbass password like JoshuaJJ) and the partition had another password (the one that matched his bank, utilities, SM) and the router had a password as well.  Idk what that is, but no one did this without his passwords.  

We know he did this but out of curiosity, other tech people....can you run an crack remotely?  I've only used orph crack on an iso boot floop in the past for windows, no idea how it works for Linux.

And you're right, he'd have either seen what was happening or he'd have seen his computer locked with the Windows screen and if he tried to enter it would say another user is logged in.  There is no way this happened if he were sitting there and he didn't know.  No way.

4 minutes ago, snickerz said:

With no pictures of Jessa at court, I'm not convinced she was there. The Sun mixed up other people, they may have confused her with Laura.

I've read that elsewhere and it makes more sense to me.  If Jessa was there unless she ducked the photogs there would be pics everywhere. 

  • Upvote 7
Link to comment
Share on other sites

39 minutes ago, metheglyn said:

Yeah, I remembered that the official timeline was bunkum, but couldn't remember exactly how old he was. So Jackson *could* be courting right now and have been doing so for a while per past precedent. Hopefully not though! And Johannah's now 16 too, so we could start seeing the lost girls start dating/courting/getting married in the not too distant future. Gah.

The TTH house will end up With just JBShell, Jana as the designated stay at home daughter and Josie as the Michelle’s special miracle baby. 

  • Upvote 5
  • Sad 1
Link to comment
Share on other sites

8 minutes ago, 3KidsAndStopped said:

Bush stated CSAM streamed using a VLC player, downloaded in a complex way she doesnt see this in other CSAM cases

Did she get into the specifics of why it was complex?  I don't expect anyone to recap the minutia, just wondering if she left it at that or if there are details.  

  • Upvote 4
Link to comment
Share on other sites

1 minute ago, HerNameIsBuffy said:

Did she get into the specifics of why it was complex?  I don't expect anyone to recap the minutia, just wondering if she left it at that or if there are details.  

It didnt go into more details in The Sun, but if I see anything I will verbatim it back on here for you 😊

  • Love 1
Link to comment
Share on other sites

15 minutes ago, CyborgKin said:

If someone's computer was intentionally configured to be available for file sharing with no password protection, it's possible, but that would require the administrator to go through the hoops of making it as insecure as possible.  Otherwise it would take a 'nefarious security expert' with specialised software tools and knowledge to maybe break in. Nothing's 100% secure especially on public wifi hotspots, but it would take some work to leave yourself vulnerable to someone who's merely "fairly good with computers".

IIRC we learned the video files in question were opened in a video player in the linux partition, so unless it was left running with the screen off it couldn't have been missed by the local computer user.

I know the Prosecution’s probably prepared for and knew what this defense witness was going to testify to but holy shit, I hope they remember every single solitary point they need to rebut…

  • Upvote 5
Link to comment
Share on other sites

2 minutes ago, onekidanddone said:

Want me to call your boss to say it is really inconsiderate of them to except you to do work when Duggar watching is much more important?

I’m very proud I didn’t miss the open enrollment for my insurance deadline. That would have been hard to explain “ er, no, I need to cancel my Dr appointment…you see I was busy catching up on-commentary on a trial that has absolutely zero to do with me, so now I have no coverage…oops” 

 

As far as James and Jason being there — remember they are part of the kid cohort Joy was in. They are close in age and played together constantly as little kids. Up until Joy was 14 ish and jammed into the big girl group. I’m sure they are more concerned about the girl who they made forts and go-carts with than the creepy decade older big brother who sucked up all the attention and focus. 

  • Upvote 25
  • I Agree 1
  • Love 7
Link to comment
Share on other sites

  • HerNameIsBuffy locked this topic
Guest
This topic is now closed to further replies.



×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.