rooshvforum.network is a fully functional forum: you can search, register, post new threads etc...
Old accounts are inaccessible: register a new one, or recover it when possible. x


Cambridge Analytica and Weaponized AI
#26

Cambridge Analytica and Weaponized AI

Quote: (03-22-2018 05:22 PM)TravelerKai Wrote:  

Quote: (03-22-2018 05:08 PM)Black Caesar Wrote:  

dawg that is not how things work at all

Prove it then. Show me where they are not running Tor nodes.

https://arstechnica.com/information-tech...f-its-own/

https://arstechnica.com/tech-policy/2016...break-tor/

https://arstechnica.com/information-tech...t-funding/

https://arstechnica.com/information-tech...web-sites/

https://arstechnica.com/tech-policy/2016...t-malware/

Rawmeo, had he ever told me personally what he was doing before it happened, I would have told him he was fucked (if it was even true to begin with). It's clear he was not a real hacker or even security professional.

Tor is done. It's been done for a while. No black hat worth his salt, that is not compromised or a plant is using it without added obfuscation.

Don't fill these dudes heads up with illusions of grandeur. Unless you really know what you are doing (and you likely would not be reading advice on RVF), nothing is anon these days. It's mostly over. Unless you live in a country with no consequences (Russia/China), it's Live CDs and obfuscation (Which is not real security) like throw away dope phones. Problem is, they got access to cameras so they will try to catch your face on whatever wifi you bumming on, because the ISPs will betray you like someone else said.

Proxy hoppin still works, but the countries you do it through matter more than anything.

This is not the 90s or the 2000s.

It's obviously not 100% anonymous, but it's a LOT better than a VPN.

In a year or so, the Monero Devs will have implemented Kovri, the successor to Tor. The exit node issue will be completely eliminated. Using a partly compromised service is still better than using a VPN, which could be a honeypot.

They catch the kiddie porn idiots because they monitor and exploit the shit out of their them. This can be mitigated but I for one am glad they are being caught. My point was, it's better than browsing RVF on the Clearnet. Nobody here is a blackhat.
Reply
#27

Cambridge Analytica and Weaponized AI

Quote: (03-22-2018 05:28 PM)ivansirko Wrote:  

Cambridge Analytica is not the only one doing this. Any company who requests permission to access Facebook, Google, Twitter, Instagram, etc. is accessing personal data for mining and Deep Learning algorithms. The idiots in the media, government, wherever who tried to set up Trump with this were all for the Obama Campaign getting a lot more useful information for free from Zuckerburg.

The funny thing is this company was selling magic (i believe they admitted as much). Chances are they were just gathering metadata to sell to other people.

Quote: (03-22-2018 04:54 PM)Mr_Nobody Wrote:  

IMO, it's not worth the energy even trying to use a VPN.

If you want a practical level of anonymity and privacy, and want to save energy, just use Tor on public WiFi.

Using Tor and VPN is useless if you choose to give away your own data for free. You are the product they sell and these pieces of human debris can figure out even anonymously who you are (think of the 6 degrees of Kevin Bacon). Facebook has a tor website so you can use anonymous connections to give away your own personal information.

If you use one of of 6 main social media sites....it is the equivalent of using all 6. If you know a second cousin or a grandmother who uses facebook, you might as well be using it. Even if you are anonymous you really are not.

I don't use social media. I've never had a Facebook account, ever. Nor should anybody on this site, who still depends on a boss for a career, IMO.

I am aware Facebook has a pointless Tor site. How would that ever be anonymous? My advice was for RVF members to browse this forum.
Reply
#28

Cambridge Analytica and Weaponized AI

Not legal advice but if you're doing actual illegal shit and looking to RVF for advice on how to evade authorities you are fucked lol

Feds are probably running nodes but who cares... all of the guys you listed got caught by other opsec issues and because there is a lot of money and smart guys going after them... but when you are making it dead easy by using the same email everywhere and posting identifying information... well

If your threat is a three letter agency or other state actor... better do your fucking homework lol. time, money and just hanging around waiting for you to fuck up.

For regular people just trying to get out the surveillance economy

You can try and avoid FaceBook, but let's say that you give your number to a girl, she has FB, she connects her phone to her FB...

Now they have all of her numbers and contact info including you...

Doesn't matter if you have a Facebook account or not you are now in the graph

Now you use that same number for anything on the web and it gets back to FB or another company with a similar graph... done got your info, correlate that with any other database you show up in (or someone with your similar data profile - location, gender, age, address, etc. etc.)

Most folks aren't willing to make the necessary life style changes
Reply
#29

Cambridge Analytica and Weaponized AI

Quote: (03-22-2018 06:17 PM)Mr_Nobody Wrote:  

I don't use social media. I've never had a Facebook account, ever. Nor should anybody on this site, who still depends on a boss for a career, IMO.

Even though you do not have a Facebook account Facebook still knows who you are. Having any online presence even if anonymous allows Facebook (or whomever wants you to be a product) to know who you are.

The point is: You cannot use VPN or Tor to hide from these guys. The only option is to stay offline (and sometimes that isnt a failsafe)
Reply
#30

Cambridge Analytica and Weaponized AI

Quote: (03-22-2018 05:22 PM)TravelerKai Wrote:  

Quote: (03-22-2018 05:08 PM)Black Caesar Wrote:  

dawg that is not how things work at all

Prove it then. Show me where they are not running Tor nodes.

https://arstechnica.com/information-tech...f-its-own/

https://arstechnica.com/tech-policy/2016...break-tor/

https://arstechnica.com/information-tech...t-funding/

https://arstechnica.com/information-tech...web-sites/

https://arstechnica.com/tech-policy/2016...t-malware/

Rawmeo, had he ever told me personally what he was doing before it happened, I would have told him he was fucked (if it was even true to begin with). It's clear he was not a real hacker or even security professional.

Tor is done. It's been done for a while. No black hat worth his salt, that is not compromised or a plant is using it without added obfuscation.

Don't fill these dudes heads up with illusions of grandeur. Unless you really know what you are doing (and you likely would not be reading advice on RVF), nothing is anon these days. It's mostly over. Unless you live in a country with no consequences (Russia/China), it's Live CDs and obfuscation (Which is not real security) like throw away dope phones. Problem is, they got access to cameras so they will try to catch your face on whatever wifi you bumming on, because the ISPs will betray you like someone else said.

Proxy hoppin still works, but the countries you do it through matter more than anything.

This is not the 90s or the 2000s.


This. X1000.

The level of sophistication you have with computers, coupled with your affinity for throwaway donkey work that will just eat up time and cost you money, is what the name of this game is about now.

TK knows his onions!

It is still possible to be anonymous on the internet, but you need to have been studying this for years, or start studying and come back in a year or two.

You also need time to travel out of town, buy burners, research coffee shops/free wifi points you can easily hijack. It is possible. But it will cost you both in time and money.

Expertise + Time + Money = Security/anonymity.

Insecurity and de-anonymisation has been built in to computers and networks ever since the dawn of the platform. Hell, the whole TCP/IP stack and whatnot that the WWW is built on is just a hack and inherently insecure. They made it more insecure from there with back doors.

Back doors in software of your OS. Backdoors on firmware in your hard disk. Back doors on your CPU that can phone home even when your computer is turned off via its ethernet cable which can power it down your phone line.

Never mind about the breaking of encryption, not so much by mathematical means but by getting the companies involved to provide back doors and keys. Which makes the whole protocol more vulnerable to hackers/crackers. Which has been exploited because once Russia/China knew there were holes to be popped, they sent their finest in to rummage around. Who knows what they know. It's cat and mouse. Industrial espionage.

My Router is made in China. Prolly should change it at some point.


So, to sum up what TK is saying here, and in a more crass manner: We are fucked! Truly fucked.

Don't listen to me. Listen to him. This shit is just a hobby for me.


So that's hardware/firmware/software, but what about the end client point software like browsers? Someone mentioned fingerprinting. It's possible to detect the same person on a different website with 95 percent plus accuracy. All it takes is sharing of information. FaceBook anyone?

And the more blockers and security you use, the more you get fingerprinted, hence needing to set up unique IP's via VPN's and unique fingerprints by throwaway Virtual Machines. I never did get around to doing my Data Sheet on VM's but maybe I will. I did some half - assed stuff on some VPN threads.

I remember Thebeast asking me 'but why? it doesn't protect you really, what do you get out of it?'. And I knew what he was saying. The truth is even a VPN doesn't cover you that much. Depends what you want to do. Eventually I explained what I wanted it for and he understood. Like TK, I think he knows a whole lot more about computers than I do, and I know more than 'most' people.

A VPN is a tool. It's a hammer, not a chisel.
Tor is a tool. It's a saw, not a file.
A Virtual Machine is a screwdriver, not a hammer.

I'm pretty sure there are a few people here that could do some very nefarious stuff (or just remain anonymous) if they wanted to. But they won't be able to do that without considerable effort. It's not just a case of paying for a VPN, seting up a VM, and going over TOR just to be sure.

TOR over VPN is very secure though, but that is an argument for another day. You need a certain level of skill, and you need to find a VPN provider that will provide that service for you.

But I don't believe any of us are talking about learning this to break the law here. I know I am not. It's just to stay anonymous. Well, like TK said, tough, you can't. So it's just to obfuscate as much as you can to hide your tracks if you don't want to be tracked and sniffed and slurped and mined.

Good luck with that!

The best way, again as TK has pointed out, is to withdraw from these platforms, perhaps even keep some kind of presence as to not arouse suspicion (what you don't have a FaceBook? - dodgy). You don't really need them. If you need facebook to stay in touch with your family then, sorry, there is something deeply flawed with your family. I'm sure there are some exceptions but I stand by what I say, generally speaking.


And as to the OP, Hypno, no offense, and this might be seen as nit-picking, but true AI does not exist yet. It's not even on the horizon. Maybe in a few decades we will know if it is possible or not.

What we have now is Machine Learning and whatnot. Not the same. And that is what makes it so dangerous. Because these are very crude algorithms. Sure they can give surprisingly uncanny results and insights, but their capacity for 'gotcha' level BS is well known.

You can't have true AI, without understanding what Consciousness is. No one has a clue about that one, yet.

Also, see the arguments between Weak AI and Strong AI. Again, machine learning will crop up there somewhere.

Google, the government, no one has true AI. It does not exist. Well, according to how I define it anyway, and there are many people who take the same viewpoint.



By all means, get a cheap VPN for five bucks a month. Download free Virtual Machine software and have the ultimate protection from viruses and ransomware. Even run over TOR for a bit of extra security. This can be done and be taught to be done in a matter of hours really. A lot of information already on this very website if you search.

And it's not all just TOR or VPN, there are other anonymisation services such as JonDonym. There is an old program by a guy that died a while back called Proxonimitron. There are even people out there that can use it to do the old 9 proxies trick that will actually work, but you need to know them. Or you could spend months/years working it out yourself. Badly configured Servers are also an option and can be hopped through but you need to know vulnerabilities and how to search for them and how to take advantage of them. They might only last a few hours or days though.

We aren't looking for a bad girl to spend the night with here, we are looking for reliable and secure entities we can 'wife up'.

Read the quote again at the top by TK.
Get used to it - it's the way it is.
Adjust your actions accordingly.

I missed the Rawmeo debacle. But it sounds to me like he was another guy too clever for his own good.

You can achieve a certain amount of good hygiene on the net, but again, it means making hard choices and just coming off some platforms altogether.

But don't listen to me. Listen to what TK has to say and you won't go far wrong.

The game is pretty much over. And unless you are actually doing deeply nefarious shit then really, I doubt you will have the expertise, time, money and inclination to cover your tracks.

You is pwned!

But that isn't to say you can't get a good cheapish VPN, maybe set up a Virtual Machine (for true protection against ransomware/viruses), and get some stuff going on where your browser fingerprint doesn't give you away. That stuff is fairly easily doable, and at little cost.

RVF member 'Valentine' is also another member here that really knows his shit with regard to this, if you want to look up his posts.
Reply
#31

Cambridge Analytica and Weaponized AI

Quote: (03-22-2018 07:00 PM)ivansirko Wrote:  

Quote: (03-22-2018 06:17 PM)Mr_Nobody Wrote:  

I don't use social media. I've never had a Facebook account, ever. Nor should anybody on this site, who still depends on a boss for a career, IMO.

Even though you do not have a Facebook account Facebook still knows who you are. Having any online presence even if anonymous allows Facebook (or whomever wants you to be a product) to know who you are.

The point is: You cannot use VPN or Tor to hide from these guys. The only option is to stay offline (and sometimes that isnt a failsafe)

Yea, I agree trying to hide from them is somewhat pointless. They have a ton of smart people and money. Offline sounds like the best strategy.
Reply
#32

Cambridge Analytica and Weaponized AI

At the end of the day, you will be found if you are doing enough that people want to find you. If you are a Ross Ulbricht, you are going to get found.

VMs, VPNs, and TOR can get you so far, and to the point that you make it quite difficult to find. Couple this with using wifi hotspots outside of your area, and you are next to invisible. If what you are doing is not illegal, nobody will care. If you are doing something dodgy, even then, most people will not care. When you start doing big bad things, that's when you are going to get fucked.

As for social media, I think the curtain is coming off, and some are seeing it for what it truly is, mass surveillance and a way to sell you stuff. Decentralization is the answer, and I've thought a bit about it recently.

Here's a decent video on security on the internet:





"Money over bitches, nigga stick to the script." - Jay-Z
They gonna love me for my ambition.
Reply
#33

Cambridge Analytica and Weaponized AI

Amateurs.

The only way you can have real anonymity is to run circuit breaker system whereby you view a separate computer through a remote camera and run a text recognition program though a camera linked to your proxy computer which reads off a screen you send your text to.

Seriously, guys that go full retard on their cybersecurity are only fooling themselves. They represent less than 1% of the world's population. If their government ever went full psychopath then the first thing they would do is arrest every person who had little to no digital or social media footprint. These days you only warrant interest by the powers that be if you're not plugged in like everyone else.

How hard do you really think it is for a government to recognise that you have gigs of data running though your internet connection yet no digital footprint?

Only using public wifi?

You think that being a 20-40 year old man with no internet connection at home isn't throwing up a red flag.

Get real.

The public will judge a man by what he lifts, but those close to him will judge him by what he carries.
Reply
#34

Cambridge Analytica and Weaponized AI

Quote: (03-22-2018 10:16 PM)Leonard D Neubache Wrote:  

Amateurs.

The only way you can have real anonymity is to run circuit breaker system whereby you view a separate computer through a remote camera and run a text recognition program though a camera linked to your proxy computer which reads off a screen you send your text to.

Seriously, guys that go full retard on their cybersecurity are only fooling themselves. They represent less than 1% of the world's population. If their government ever went full psychopath then the first thing they would do is arrest every person who had little to no digital or social media footprint. These days you only warrant interest by the powers that be if you're not plugged in like everyone else.

How hard do you really think it is for a government to recognise that you have gigs of data running though your internet connection yet no digital footprint?

Only using public wifi?

You think that being a 20-40 year old man with no internet connection at home isn't throwing up a red flag.

Get real.



I think you are only re-iterating points already made in this thread.

And I don't really know the focus of the rest of your comments.

Are you well-versed in 'cyber-security'?

You do seem quite well-versed in politics and human nature. But I'm just wondering how many hundreds of hours you have put in to this endeavor. It may be that you have. It may also be that you are just being dismissive of the tech angle because you don't think it important from a wider political perspective.

As I said, you have only just repeated what TK and myself have said: that this is futile for most people. To put it shortly.

The thing is, and I know this is an old saw, but TOR for some people and VPN's for some people are a lifeline. To ask for help, to whistle blow. Granted, most people who need these services are not asking on RVF about them.

You will see a distinct lack of replies with tech stuff here. Not because there aren't some majorly savvy tech guys here (there are - they work behind the scenes keeping our data safe and they do an exceptional job), but because this isn't really a place to discuss security issues beyond a wider scope of general info on VPN's and VM's.

There's a million and one reasons to use a VPN and/or a VM or other such stuff. Some of it is nefarious, but most is well intentioned.

We aren't talking about making ourselves invisible to the world. We aren't talking about ways to break the law. We are just talking about possible ways to circumvent current surveillance should one have a bona fide reason to do so.

Ok, maybe that wasn't what the OP was about, but it did kind of turn in to that.

There's always the odd 'how do I make myself invisible on the internet to do stuff?' thread here on RVF. They never get very far. Usually a few good souls that know what they are talking about point out that you 'can't make yourself invisible on the internet' and the OP fades away.

And as you pointed out 'you can't make yourself invisible on the internet'.

I think we are all in agreement here.

I know you're an intelligent guy Leonard, but these arguments have been had before at length. And most of us that have had them have little interest in going through it all again.

You do raise some good and valid points, but I also think you might have missed what the question was.

Or perhaps that was me!

This is a great place for sharing information, but obviously there is only so much that can be discussed publicly.

It's pretty frightening what can be done when a small group of determined individuals put their mind to it and have access to the latest technology. No one will discuss that here.

So you are right. Less than One percent of the population. Them's the ones you got to worry about.

You really need to study this for years till you work out that this is a futile exercise. But in our defense, those of us that did, thought we might get jobs in 'cyber-security' with it or just some kinds of jobs in IT security - penetration testing and whatnot. It worked out for some people and not for others. C'est la vie.

The skills I've learned are not wasted. But they don't pay money. I might teach others how to set up a VPN or a VM for shits and giggles, but that's as far as it goes.

Anyway, I think a few people might have learned something from this thread if they read it thoroughly. That's a good thing.
Reply
#35

Cambridge Analytica and Weaponized AI

[Image: 271r8j.jpg]
Reply
#36

Cambridge Analytica and Weaponized AI

Quote: (03-22-2018 10:16 PM)Leonard D Neubache Wrote:  

Amateurs.

The only way you can have real anonymity is to run circuit breaker system whereby you view a separate computer through a remote camera and run a text recognition program though a camera linked to your proxy computer which reads off a screen you send your text to.

Seriously, guys that go full retard on their cybersecurity are only fooling themselves. They represent less than 1% of the world's population. If their government ever went full psychopath then the first thing they would do is arrest every person who had little to no digital or social media footprint. These days you only warrant interest by the powers that be if you're not plugged in like everyone else.

How hard do you really think it is for a government to recognise that you have gigs of data running though your internet connection yet no digital footprint?

Only using public wifi?

You think that being a 20-40 year old man with no internet connection at home isn't throwing up a red flag.

Get real.

Not even your ISP knows how much data you're using when you're behind a good VPN. That's how VPN users are able to bypass data throttling.

Even China, which is much more totalitarian than the US, isn't able to crack down on the internet in the way you're suggesting.

EDIT: The things TK and others are talking about are a lot more involved then skimming through a big list of names and saying, "oh, look, this guy is downloading 10TB of data per week" or "that guy doesn't have a digital footprint". They're based on actual investigations into specific individuals, sites, etc.

It takes lots of resources and time to even pursue these cases. Even most of the people buying drugs online aren't caught. Rawmeo was running a huge operation and was very sloppy.
Reply
#37

Cambridge Analytica and Weaponized AI

Anyone with half a brain should have realized by now that any public website or service like Facebook would be utilized by the Deep State to spy on people. I know that when I used it (I don't anymore because the librul bullshit got tiring), I only put information that everyone knew was public anyways because why try to incriminate with stuff you already know. There was no religion, politics or anything that could "tick off the wrong boxes". It was set up to be just a front. Also, I am glad that Facebook has begun its death pangs because that site is just pure scum. It is for the better that it suffers a slow slow death!

Btw, it is too bad that most normies don't even have half a brain!
Reply
#38

Cambridge Analytica and Weaponized AI

"If the service is free, then you are the product."

Data Sheet Maps | On Musical Chicks | Rep Point Changes | Au Pairs on a Boat
Captainstabbin: "girls get more attractive with your dick in their mouth. It's science."
Spaniard88: "The "believe anything" crew contributes: "She's probably a good girl, maybe she lost her virginity to someone with AIDS and only had sex once before you met her...give her a chance.""
Reply
#39

Cambridge Analytica and Weaponized AI

Quote: (03-26-2018 08:33 AM)polar Wrote:  

"If the service is free, then you are the product."

Exactly. The reason the dot com crash happened all those years ago is the public felt that the internet should be free. Nowadays successful companies have mastered the art of monetizing user demographics data...and they have to in order to pay for the server resources we take for granted.

And why do people treat this as if it's some sort of new thing, some sci-fi dystopia? Mass marketing and propaganda go back to the early 20th century. Sure, we have more tools to work with, but it's the same old thing.
Reply
#40

Cambridge Analytica and Weaponized AI

Wait a minute, I need to read through those tech articles again. If a tor exit node is compromised how can they trace you? Doesn't tor bounce through like 5 relays?

Also unrelated, but the executive director of the tor project looks like a tranny:

[Image: shari_steele_035-300x400.jpg]

Team visible roots
"The Carousel Stops For No Man" - Tuthmosis
Quote: (02-11-2019 05:10 PM)Atlanta Man Wrote:  
I take pussy how it comes -but I do now prefer it shaved low at least-you cannot eat what you cannot see.
Reply
#41

Cambridge Analytica and Weaponized AI

I didn't know Robert Plant made a career change.

Data Sheet Maps | On Musical Chicks | Rep Point Changes | Au Pairs on a Boat
Captainstabbin: "girls get more attractive with your dick in their mouth. It's science."
Spaniard88: "The "believe anything" crew contributes: "She's probably a good girl, maybe she lost her virginity to someone with AIDS and only had sex once before you met her...give her a chance.""
Reply
#42

Cambridge Analytica and Weaponized AI

From https://www.google.com/amp/s/boingboing....i.html/amp

Quote:Quote:

If that final hop isn't protected by an HTTPS connection -- if it takes place without encryption -- then all the traffic between you and the webserver are an open book to the exit node. It can see what you send and what you receive, and it can tamper with the connection (for example, it can inject malicious code that exploits bugs in your browser to take it over). If your session includes identifying information -- your Google cookie, say, or a login and password -- then someone running a spying exit node can figure out who you are without having to poison your session.

The lack of exit nodes means that if you run an exit node and want to spy on people, you can see an appreciable fraction of all the Tor traffic that goes to and from the public internet. Many governments, including the Chinese government, are understood to be running high-availability exit nodes that snoop on and log all the traffic they can see.

The full article is worth a read.

This seems interesting as well https://www.quora.com/Has-the-Tor-Networ...f-the-user

Note, I do not have a background in the subject so I don't have a finely honed BS sensor.

Data Sheet Maps | On Musical Chicks | Rep Point Changes | Au Pairs on a Boat
Captainstabbin: "girls get more attractive with your dick in their mouth. It's science."
Spaniard88: "The "believe anything" crew contributes: "She's probably a good girl, maybe she lost her virginity to someone with AIDS and only had sex once before you met her...give her a chance.""
Reply
#43

Cambridge Analytica and Weaponized AI

Facebook share down another 2% today.
Now at 156$, from 185$ mid march.
Reply
#44

Cambridge Analytica and Weaponized AI

Quote: (03-26-2018 10:19 AM)DJ-Matt Wrote:  

Wait a minute, I need to read through those tech articles again. If a tor exit node is compromised how can they trace you? Doesn't tor bounce through like 5 relays?

Also unrelated, but the executive director of the tor project looks like a tranny:

[Image: shari_steele_035-300x400.jpg]

He's got a look about him but I'm not gonna libel a guy (harsh words I'll keep to myself) who, at least on surface level, is doing something positive.
Reply
#45

Cambridge Analytica and Weaponized AI

Cambridge whistleblower looks like a nut, complete with septum ring and pink hair. Like is this a joke?:

[Image: 5aaea20889188d3c128b4930-750-375.jpg]
Reply
#46

Cambridge Analytica and Weaponized AI

Quote: (04-08-2018 08:34 PM)Dragan Wrote:  

Cambridge whistleblower looks like a nut, complete with septum ring and pink hair. Like is this a joke?:

[Image: 5aaea20889188d3c128b4930-750-375.jpg]

It's a sad era when this man is considered employable. Maybe being an open faggot made them scared of a discrimination lawsuit or something.
Reply
#47

Cambridge Analytica and Weaponized AI

Quote: (04-08-2018 08:34 PM)Dragan Wrote:  

Cambridge whistleblower looks like a nut, complete with septum ring and pink hair. Like is this a joke?:

[Image: 5aaea20889188d3c128b4930-750-375.jpg]

I really hope we can look back years from now and view this sort of fashion trend in the same way as bell-bottoms and parachute pants but my fear is that this is baked into the human genome now. The doughy face with dead-eyes staring through problem-glasses. It's congenital for both genders now.
Reply
#48

Cambridge Analytica and Weaponized AI

Quote: (03-26-2018 11:04 AM)polar Wrote:  

I didn't know Robert Plant made a career change.

Looks more like Tiny Tim.
Reply
#49

Cambridge Analytica and Weaponized AI

Quote: (04-09-2018 11:21 AM)Hypno Wrote:  

Quote: (03-26-2018 11:04 AM)polar Wrote:  

I didn't know Robert Plant made a career change.

Looks more like Tiny Tim.

More like the spawn of Weird Al and Carot Top.

[Image: 1406198841161_Image_galleryImage_Mandato...oto_by.JPG]
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)