[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]

/cyber/ - Cyberpunk & Science Fiction

A board dedicated to all things cyberpunk (and all other futuristic science fiction) NSFW welcome

Catalog

See 8chan's new software in development (discuss) (help out)
Advertise on this site
Name
Email
Subject
Comment *
File
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Flag
Embed
(replaces files and can be used instead)
Options
Password (For file and post deletion.)

Allowed file types:jpg, jpeg, gif, png, webm, mp4, swf, pdf
Max filesize is 8 MB.
Max image dimensions are 10000 x 10000.
You may upload 5 per post.


Young man, in mathematics you don't understand things. You just get used to them. - John Von Neumann
Rules & Guidelines

File: 1444384498954.png (458.17 KB, 1239x1640, 1239:1640, paranoid anons tech guide.png)

 No.35041

This is an excellent place to drop off this special package of secret information THAT EVIL PEOPLE DON'T WANT YOU TO KNOW ABOUT. I hope this helps you all.

https://8ch.net/g/res/3537.html

 No.35042

>>35041

>network.dns.disableIPv6 Set to true

I too like not being able to access any server in a years time. IPv6 is an improvement/expansion on IPv4. Blocking IPv6 would make as much sense as blocking all IPv4 addresses.


 No.35043

This guide looks pretty bland. I always thought that at least 1/3 of 8ch follows such.


 No.35053

What's wrong with ublock orgin?


 No.35066

>>35042

then how am I still posting


 No.35067

>>35053

its shilled alot by some shills who want to kill good addons.


 No.35068

>>35043

bland? for you I suppose?

at least others can benefit.


 No.35071

ANONS ANONS HEAR YE HEAR YE

give this guide a quick glance, link has more complete parts of the guide with more redpills.

without a doubt there are at least a few things each anon has overlooked within the Paranoid /Tech/ Guide.

this isn't just some spazzbot dumping wackynoodle text, this is a figurative WAR against lies and disinformation at the hands of the evil shills who want to take all your cyber tech away!

will you stand for that!


 No.35099

>>35042

>ipv6

>secure or any bit improved

Oh you poor ignorant shazbot.


 No.35100

>>35071

IIRC, there are many options at about:config that needs to be switched off. Also add section about VPNs, and recommendation of services.

>a figurative WAR

>the evil shills

I hope you are 12, otherwise bad news for you

>>35099

IPv6 isn't meant to be improved or more secure, its just an address space expansion.


 No.35102

Doesn't Adblock edge allow companies to whitelist themselves globally. I'm really not trying to shill but unlock origin definitely does not allow companies to pay for whitelisting


 No.35103

This guide does not suggest to obfuscate your user agent info (instead suggests you use "most common", which will stay that way until you decide to manually switch it again, among other problems); this guide suggests tons of user settings that both break and needlessly restrict your own use of your browser; it does not educate you of why you would set any of this; it calls Linux Mint a trojan OS with no evidence (stating that it uses SystemD when it's optional and containing no substantial argument against SystemD, in fact immediately after listing KISS philosophy as a bad thing); far too much EMPHASIS TEXT; suggesting Ablock Edge, an adblocking addon that allows Google panoptic ads. Despite whatever interests, this likely just discredits privacy awareness.

There are some good things in the guide, sure. A lot of tracking features to disable and good addons are suggested. But the tone and arrogance really puts me, and I'm sure others, off.

My tl;dr-ish guide to privacy:

-Use an open source OS. Better if it uses KISS philosophy, but even if not, you're far better off than using MS shit.

-Keep your identifying social networks separate from your regular use. Avoid Facebook, Google, and any other popular service that benefits from identification as much as possible, if not completely.

-Avoid Javascript as much as you can stand; obfuscate all other software and hardware details as much as possible.

-Use a non-Five Eyes-based VPN service. Do not allow personal connection to such VPN and change service often. Bitcoin is not an anonymous payment method unless you tumble to a new wallet first. Pass through port 443 to appear as encrypted HTTP traffic.

-Avoid Android and Microsoft OSes. Apple is suspect being closed source, but they have been acting in favor of privacy. Use Linux when possible.

-Cover, faraday, and/or remove batteries of devices that contain mics or cameras when possible.

-Encrypt any and all media you own. Keep as many passwords as possible or separated by its purpose. Assume that any infiltrator knows your password generation philosophy and create strong passwords with that assumption (XKCD password philosophy is a good start, but generally longer=better).

-Practice online communication patterns different from your own, and prefer sites that are relatively unknown or that you have not visited often to further obfuscate your identity.

Lastly, know WHY you take any specific security measure, and what threat model your practices fulfill. While you may wish to protect yourself from advanced spying techniques, such as those utilized by the NSA, GHCQ, etc, you're better off assuming these agencies have already compromised your system, and instead work on minimizing revealing information that can be obtained. However, there are many other lower level agencies and private parties you can and should protect yourself against. From copyright trolls to career hackers, strong security practice will protect your individual freedom and security for many years. Practicing even one of the points I have mentioned will set you far above the common person.


 No.35132

>>35102

uBlock Origin and uMatrix are fine. It's just a single guy who has been trying to force that meme on /tech/ just because a lot of people recommended it when it got released simply because it was good.

Following his same logic, it would be more or less like saying Linux is botnet just because /tech/ loves recommending it.


 No.35140

uBlock Origin is a fine substitute for the discontinued Edge (or Latitude for Pale Moon users).

Flashblock is pointless, since you shouldn't be using flash anyway, plus NoScript/uMatrix can handle that. These last two are a toss up, they share some features and each one has an advantage over the other, but due to the resources they eat, they aren't really complimentary.

Https Everywhere is a must.

FEBE/Cleo/Opie are pointless. Ypu can do the same by copypasting your profile folders.

Better Privacy, Cookie Monster and Cookies Manager are fluff once you have the ones recommended bove+Self-Destructing Cookies

>>35053

Nothing besides being the best and thus some anons getting mad at it being mentioned so much.


 No.35144

Any browser plugin can spy on you, you're trusting a 3rd party with seeing everything you type and browse.

Even worse, if that plugin utilizes the NDK then you can break out of the sandbox.

My advice would be to block ads at the network level, then your browser should be a minimalist custom build which disables all extentions.


 No.35147

>>35099

>>35100

IPv6 is certainly an improvement, and was most certainly designed to be such.

If you have any evidence to the contrary state it plainly.


 No.35148

>>35147

the problem is nobody can properly configure their ipv6 stack http://www.theregister.co.uk/2015/06/30/worlds_best_vpns_fall_flat_in_security_tests/

tons of inaccurately configured ipv6 stacsk around easily exploitable


 No.35151

>>35102

adblock PLUS is the one that pulled a ghostery on everyone.

Adblock Edge is a fork meant to not whitelist any badguys by defualt.


 No.35152

>>35103

>all this butthurt

>anti-paranoid anon guide shilling

>tl;dr

I have a head ache, please try again.


 No.35153

>>35132

>uBlock Origin and uMatrix are fine. It's just a single guy who has been trying to force that meme on /tech/ just because a lot of people recommended it when it got released simply because it was good.

DAMAGE CONTROL


 No.35154

>>35140

>uBlock Origin is a fine substitute for the discontinued Edge (or Latitude for Pale Moon users).

wow, would you like a glass of fancy bread with that fine?

>Flashblock is pointless,

OY M8

>since you shouldn't be using flash anyway,

so you didn't read the fucking guide?

>plus NoScript/uMatrix can handle that. These last two are a toss up, they share some features and each one has an advantage over the other, but due to the resources they eat, they aren't really complimentary.

noscript is the only way to go, why trust umatrix, same maker as ublock.

>Https Everywhere is a must.

Trying to confuse people by telling lies Half the time eh?

to break the confusion- yes Https everywhere is good.

>FEBE/Cleo/Opie are pointless.

OY M8 CHIPPY F*** WAFFLES

>Ypu can do the same by copypasting your profile folders.

depends on how you want to do backups.

>Better Privacy, Cookie Monster and Cookies Manager are fluff once you have the ones recommended bove+Self-Destructing Cookies

Better privacy is actually very useful because it can handle a very dangerous type of cookie that isn't normally accessible by your browsers cookie deleting functions.

cookie monster is like a request policy/noscript for cookies

cookies manager is an easy to use frontend GUI for another setting in your cookie preferences that makes it alot more clear and well presented.


 No.35155

>>35147

get the fuck out ipv6 shill


 No.35167

File: 1444558129875.gif (45.33 KB, 462x700, 33:50, LainPrism4.gif)

>>35147

the biggest problem with ipv6 is that Protocol Seven doesn't exist yet


 No.35175

>>35154

Betterprivacy is useless because it only deletes flash cookies, which you only have if you use flash. Same for flashblock.

I read the guide, the guy basically copypasted a bunch of shit from plugin guides and the arch wiki. He has little understanding of what's actually going on and rants about systemd for about 3 full posts instead of just suggesting that people use openrc.

Nobody uses uBlock here, only uBlock Origin which is faster than ABE while being more adaptable. uBlock is shady like ABP.


 No.35176

>>35155

>I don't know anything about IPv6 so I'll call him a shill


 No.35177

>>35175

>Betterprivacy is useless because it only deletes flash cookies, which you only have if you use flash. Same for flashblock.

both have use and functionality beyond flash. having fun bitching and whining about easy to implement second layers of protection?

flashblock prevents all videos from running the moment the page loads among other things.

>I read the guide, the guy basically copypasted a bunch of shit from plugin guides and the arch wiki.

Oh no I saw someone reccomend noscript on a wiki so this OP must be full of shit! I'm going to cry and drink my own tears now, boo hoo

>He has little understanding of what's actually going on and rants about systemd for about 3 full posts instead of just suggesting that people use openrc.

and there you have it, Proof that this dumbass troll didn't read a freaking thing and just wants to stir up shit.

>Nobody uses uBlock here, only uBlock Origin which is faster than ABE while being more adaptable. uBlock is shady like ABP.

Both Ublock and origin are on my blacklist. you trying to muddy the waters.


 No.35179

File: 1444581788345.jpg (52.67 KB, 729x650, 729:650, 23453425.jpg)


 No.35184

Okay, seriously. What's wrong with uBlock Origin?


 No.35185

>>35184

did you read ANY of the OP


 No.35186

>>35185

Yes. So, what's wrong?

Can anyone explain to me, what exactly is this "shilling" mentioned here? Because OP's image looks more like trolling and less like facts.

I would like to know more about why uBlock is bad.


 No.35188

File: 1444585277201.jpg (71.08 KB, 467x460, 467:460, 0_5-shillings-1953.jpg)

>>35186

I have a plan

>Make a ridiculous but detailed guide to how one should wipe his ass

>Call it The Ultimate Ass Wiping Guide

>People say that most of the guide is bullshit which was added just in case

>Call them shills

>Make updated version

>Call it The Ultimate Ass Wiping Guide v2.0

>"Shills absolutely hate this guide."

>Bring it on /cyber/

>Shits starts boiling

>Start to call everyone shills again BECAUSE NSA DO NOT WANT YOU TO HAVE HEALTHY ASSHOLE

Here, have a coin everyone. It is worth 5 shillings.


 No.35189

>>35188

That's exactly how I see this entire thread, but since everyone seems so butthurt over uBlock I wanted to ask if there is any legitimate reason behind it


 No.35209

>>35189

There's literally no reason to hate it. Most people only hate it because I think it's been said that the creator was a jew. And I've also heard most people hate it because the person made it for free then "had the hide" to ask for donations.

It's okay when linux distro makers do it though, of course.


 No.35210

>>35188

Yep this is pretty much it. Doesn't help that everyone is only capable of attacking each other (oh geez I created a feedback loop).

This guide is so incoherent yet correct enough to be a real 10/10 troll attempt. Bravo, OP, I am rustled, butthurt, and I hope you and everyone else in here kills themselves. Also brb killing myself.


 No.35243

>>35210

>>35209

>>35189

>>35188

all you pathetic deception artists can do is desperately damage control and accuse the guide "le epic trolling" because you don't want anyone to take it seriously. too fucking late. the pidgeon has landed.


 No.35244

>>35243

Someone needs to revise this guide so it can be taken seriously. I'm not expecting something like privacytools.io, just something that actually educates instead of a plain list and sounding ridiculous while at it. I'd like to do it myself but honestly I'm a lazy fuck.

Btw no offense taken at accusing me of being a shill or anything. Internet discussion has gone to shit these past few months and I wouldn't hesitate to blame it on astroturfing.


 No.35245

>>35244

>organize the guide more

Heh, you should'ah seen how it was before m8

this is nice and neat now.

I hope it helps someone out there.


 No.35307

File: 1444830213374.png (120.5 KB, 400x267, 400:267, 13426531245.png)

Celebration bump for GNU ICECAT RELEASE 38.3 !!!!!!!!


 No.35317

>>35243

so what was wrong with uBlock?


 No.35318

read the OP :^)


 No.35325

>paranoid guide

>using clearnet web browsers

My hat goes off to you OP for actually trying to make it easier for people to lock their shit down, but giving a guide on addons for firefox just isn't going to cut it when it comes to the truly paranoid. Under normal circumstances a clearnet web browser, even with heaps of privacy addons, should only be used when doing things you are knowingly using your own personal identity for such as shopping or online banking. This is depending upon your threat model of course, if your enemies don't include the government or agencies with resources that liken to the gov then you probably don't have to worry about it as much.

The unmodified Tor Browser with javascript disabled is your best bet for staying secure and anonymous online. If you're really paranoid then use Tails. It's good enough to keep the pedos, carders, thieves, snowdens, and other users safe from the best the NSA and FBI can throw at it. Just keep in mind that Tor is not a magic bullet and that proper OPSEC is what you really need to be aiming for.

https://cryptome.org/0005/tor-opsec.htm

https://www.youtube.com/watch?v=HHoJ9pQ0cn8


 No.35336

>>35154

>ublock

>same maker as uMatrix

Seems you knowledge is outdated, shill.

>Better privacy

>it can handle a very dangerous type of cookie

Again, seems someone is stuck in the Netscape-era.

>cookie monster is like a request policy/noscript for cookies

Pointless, since it is much more limited than just doing it manually, yet also takes more time than many other optional addons that aren't redundant when paired with the previous recomendations.

>cookies manager

Useless, since it is even more limited than doing it thorugh FF itself.

>>35177

Seems you just are one of those "behind 7 proxies l33t haxors" that think quantity of redundant protection equals actual security.


 No.35339

>>35325

I don't trust tor, its too mainstream. people get screwed using tor ALL the time. hate me if you want.


 No.35340

File: 1444877991462.jpg (15.8 KB, 226x199, 226:199, 432524.jpg)

>>35336

>ublock

>same maker as uMatrix

>Seems you knowledge is outdated, shill.

>Better privacy

>it can handle a very dangerous type of cookie

>Again, seems someone is stuck in the Netscape-era.

check your facts again you cheeky troll

>cookie monster is like a request policy/noscript for cookies

>Pointless, since it is much more limited than just doing it manually, yet also takes more time than many other optional addons that aren't redundant when paired with the previous recomendations.

wait so you're complaining that an addon makes things easier, but you just don't happen to like it? okay? fine?

>cookies manager

Useless, since it is even more limited than doing it thorugh FF itself.

depends on what kind of gui you want to see your cookies thorugh


 No.35341

>>35340

>>35340

*

>cookies manager

>Useless, since it is even more limited than doing it thorugh FF itself.

depends on what kind of gui you want to see your cookies thorugh


 No.35343

File: 1444881075771.png (16.63 KB, 606x341, 606:341, ff-ubo-abp.png)

>>35340

uBlock and uMatrix are not maintained by the same person. Chris Aljoudi owns uBlock, gorhill owns uBlock Origin and uMatrix. ABP is poorly written and ABE performs exactly the same. uBlock Origin can be used for more than just adblocking but I wouldn't advise it, NoScript and RequestPolicy are king when it comes to browser access controls. I'm not sure what you have to gain by being so persistently wrong.

>betterprivacy

>Flash-cookies (Local Shared Objects, LSO) are pieces of information placed on your computer by a Flash plug-in. Those Super-Cookies are placed in central system folders. They are frequently used like standard browser cookies. Although their thread potential is much higher as of conventional cookies, only few users began to take notice of them.

The above is taken from BetterPrivacy's about page. BetterPrivacy literally does nothing except delete LSO cookies, which don't exist if flash isn't on your computer. If you have a flash plugin, your browser is not secure. If you don't have a flash plugin, BetterPrivacy is useless and only wastes resources while increasing your attack surface. If you must open swf files, do it in a read-only sandbox with the offline flash player.

Cookie Manager can be used to modify the cookie settings for individual sites. Firefox doesn't have that capability built in. It's not useless.


 No.35346

>>35339

>too mainstream

Security through obscurity doesn't work. Tor has been tested and still proves to be secure as far as we know. 99% of the times people get caught are when they fuck up with opsec

https://grugq.github.io/blog/2013/10/09/it-was-dpr/

i2p and freenet are perfectly valid alternatives, you just don't have access to the clearnet through them


 No.35348

>>35346

What about JohnDonym? Tor brings a lot of attention to one's self, and a browser built for private clearnet browsing seems like a good middle ground.


 No.35355

>>35343

>uBlock and uMatrix are not maintained by the same person.

>Chris Aljoudi owns uBlock, gorhill owns uBlock Origin and uMatrix.

I don't know why you are bringing that up as a point, not as if it were ever argued against. the point is Both are bad.

>ABP is poorly written and ABE performs exactly the same.

Personally, like a million years ago I used to use adblock plus from wladmir.

then a bunch of "whitelisted by default" advertisements made their way into the addon and defeated the purpose of the addon in the first place. that is when everyone moved to the FORK of adblock plus called Adblock Edge, that was made for the very specific reason of having no whitelisted garbage. It's job was to block ads, nothing more, nothing less. That being said, I perhaps had my previous browsers on different computers very long ago in the past have slow down's with ABP, but I never experienced my browsers have any problems, or did they ever slow down with Adblock Edge.

>uBlock Origin can be used for more than just adblocking but I wouldn't advise it,

I don't care what extra speshul features it has, I don't trust it and I'm never going to use it.

>NoScript and RequestPolicy are king when it comes to browser access controls. >I'm not sure what you have to gain by being so persistently wrong.

But I said I LIKE NoScript and RequestPolicy. are shills slowly becoming retarded?

>betterprivacy

>Flash-cookies (Local Shared Objects, LSO) are pieces of information placed on your computer by a Flash plug-in. Those Super-Cookies are placed in central system folders. They are frequently used like standard browser cookies. Although their thread potential is much higher as of conventional cookies, only few users began to take notice of them.

>The above is taken from BetterPrivacy's about page. BetterPrivacy literally does nothing except delete LSO cookies, which don't exist if flash isn't on your computer. If you have a flash plugin, your browser is not secure. If you don't have a flash plugin, BetterPrivacy is useless and only wastes resources while increasing your attack surface. If you must open swf files, do it in a read-only sandbox with the offline flash player.

That's why the guide specifically mentiones you shouldn't be using flash anyway, but I always keep the addon just in case some screwed up flash cookie is given to me by accident (or intentionally as many aggressive websites tend to do)

>Cookie Manager can be used to modify the cookie settings for individual sites. Firefox doesn't have that capability built in. It's not useless.

I didn't say it was useless.


 No.35356

>>35348

>>35346

the biggest mistake is believing you are 100% secure running what is supposed to be "good software" on really bad and compromised hardware.

>are you using an ordinary computer from an ordinary store?

well you are not 100% secure.

what we really need to do is create free and open source hardware and software.


 No.35360

>>35348

https://anonymous-proxy-servers.net/en/law_enforcement.html

>JonDonym does not make it impossible to uncover individual users

>JonDonym is no technology for preventing law enforcement on the internet.

It all depends upon your threat model, who are your adversaries?

>>35356

>the biggest mistake is believing you are 100% secure running what is supposed to be "good software" on really bad and compromised hardware

You're right in thinking that open hardware and free software is more secure, but even completely open hardware and completely free software systems can be compromised. The US and other governments stockpile zero-days, some of which are for free software no doubt. While you might be far better off running only free software debian on a beaglebone black, or trisquel on a libreboot x200, there are still a plethora of attacks potential adversaries might use. There is no system that is truly 100% secure, new attacks are being found every day.

If you want to see just how far the rabbit hole goes for security…

https://github.com/maqp/tfc-otp

This defeats attacks against encryption, exploitation, and virtually every digital attack vector. If you add a faraday cage to this you can defend against even TEMPEST attacks. At this point the weakest link is going to be your implementation of all of these procedures and physical security. So unless you have the resources to build concrete and steel bunkers set into mountains completely off the grid, this is the best you're going to get.

*And even after all of that this system still has potential weaknesses*

https://iicybersecurity.wordpress.com/2015/07/15/8-technologies-that-can-hack-into-your-offline-computer-and-phone/

You can only do so much to defend yourself against attackers and you will never be perfectly 100% safe, you just have to do the best you can against your known threats. Right now people are using tools that have proven to be secure alongside insecure ones mainly due to ignorance. In addition, people use secure software and use shitty OPSEC. Using GPG to send solidly encrypted messages over i2p isn't going to help you out when you're sending it to an undercover agent. Likewise, using a libreboot laptop with tor isn't going to protect you from shoulder surfers when you're using it in starbucks.

The best thing you can do is educate yourself and start thinking independently.


 No.35365

IPflood is pretty incredible, wish I knew about this earlier


 No.35368

>>35355

>I don't know why you are bringing that up as a point, not as if it were ever argued against.

Actually, you claimed that uBlock and uMatrix were made by the same person.

>the point is Both are bad.

Based on what evidence? I have provided evidence that uBlock Origin is superior to Adblock Plus/Edge. I'm perfectly willing to listen to any reason why I shouldn't use uBlock Origin, since I would like a fast and secure browser which leaks as little information as possible. If you're just going to keep repeating baseless claims then I see no reason for me to continue this discussion.

>something something, i used to use ABP but now I use ABE, it's not slow

We're all aware of the whitelisting issue with ABP, but the only changes made when forking to ABE are whitelist related. ABE and ABP perform the exact same in all tests related to performance. While you might not notice any issues with ABE, it is still poorly written and sometimes performs worse than no adblocker at all.

>But I said I LIKE NoScript and RequestPolicy. are shills slowly becoming retarded?

I know you did. You're overly defensive and have trouble understanding when I'm agreeing with you. They are the most essential addons for any web browser,

>That's why the guide specifically mentiones you shouldn't be using flash anyway, but I always keep the addon just in case some screwed up flash cookie is given to me by accident (or intentionally as many aggressive websites tend to do)

Are you aware that you cannot get a flash cookie if you don't have flash? What you are talking about is beyond the realm of the possible. LSO's are generated by a swf running inside the flash player, web sites do not create or transmit them and your browser is not capable of storing them, end of story.

>I didn't say it was useless.

Neither did I, and I didn't imply that you did. I was just explaining why it's not useless so that other users would have a better understanding.


 No.35382

Any /cyber/ anons have techniques for evading browser fingerprinting? Is there some way of denying websites knowledge of what plugins etc you're running? Would this even be desirable? Because right now I'm feeling pretty snookered.


 No.35388

>>35382

using tor


 No.35428

>>35360

>This defeats exploitation

It's not as simple as that. Read the threat model from white paper or blog posts:

https://maqp3d.wordpress.com/2015/09/28/bulk-cne/

https://maqp3d.wordpress.com/2015/09/29/end-point-security/

https://maqp3d.wordpress.com/2015/09/29/tfc-cev/

RE: Potential weaknesses

#1 TEMPEST

It's not part of the original threat model. This is physical close proximity surveillance. A Faraday cage should fix it.

#2 Power consumption

Make sure everything behind data diode is battery-powered.

#4 Smartphone accelerator

Keep the smartphone in fridge. This should also block FM reception.

#5 Tracking via motion sensor

Maybe relevant when exchanging keyfiles. Leave cellphones at home.

#6 Keyboard monitoring

elecrtical: battery operated TCBs.

visual: Snowden's got this http://i.stack.imgur.com/bDeLe.png

#7 Heat

Again, targeted attack, requires LoS.

#8 Ultrasound

Not sure if you can make a netbook / SoC emit them. Hiding the feature to familiar circuit might be hard, though the transmitter could be covert. Interdiction is a serious problem.

-maqp


 No.35452

>>35382

>>35388

Is the best answer, even things like your screen size are potentially identifying. At the very least the tor browser looks the same everywhere.


 No.35455

>>35452

TBB warns the user about changing the size of window.

Check how identifiable your browser is here https://panopticlick.eff.org/


 No.35460

>>35428

Do note that I was referring to digital attack vectors and was trying to make the point that even if you have a theoretically perfect digital setup with a perfect encryption scheme and perfectly isolated computing systems you are still vulnerable to physical attacks, some of which are absolutely unbelievable to someone who has never heard of things like Van Eck phreaking. I know the first time I ever heard about these attacks I just wanted to throw every electrical device I owned in the trash and go innawoods. To think that even if you use a one-time-pad and digital diodes to prevent attackers from being able to exfiltrate data you can still be exploited by the FBI van across the street listening to the fucking electromagnetic radiation of your house…

The link for the air-gap vulnerabilities wasn't intended to be an exact list of potential weaknesses but more to show ways that this system can be broken if you don't know of these attacks. It's not like you're going to be using a smartphone to send TFC-OTP chat messages. And like I mentioned before, new attacks are being discovered every day, you can hardly defend yourself against attacks you've never heard of.

I'm sure if someone had the resources to setup an implementation of TFC-OTP properly they would use appropriate measures to protect against all of those physical attacks as is outlined in the whitepaper and more. [faraday cage, soundproof room with no windows, physical locks on doors, proper OPSEC when it came to defending your house, using an off-grid power supply for all devices behind data-diodes, etc] But all of that is well beyond anybody that isn't proud to wear their tinfoil hat. The best thing to do is to educate yourself, learn just what's going on under the hood, understand why you shouldn't use short passwords, why you should use encryption, why you should use GNU/linux or BSD, how hackers might be able to attack you and what you can do to prevent that from happening and so forth.


 No.35529

>>35460

>you can still be exploited by the FBI van across the street listening to the fucking electromagnetic radiation of your house.

If you trust the RxM hasn't been exploited in a way it shows different ciphertext, you could edit the software to do OTP say, mod 26.

You could then do OTP by hand provided that you have a way to tamper-evidently store the pad and a way to detstroy messages and pad. This approach is TEMPEST proof.

>wasn't intended to be an exact list of potential weaknesses–

Naturally. TFC addresses many known unknowns and possibly even some unknown unknowns – not all; Users need to create an informed threat model.

I don't think you should be choosing between whether you use TFC with every additional layer or whether you don't use the tool at all. Choose between the ways you're going to secure the physical environment. Tails is a great way to anonymize your identity and physical location, it doesn't necessarily protect your endpoint from compromise. TFC does that. If you're using

TFC through Tails, you just might be able to hide your physical location, so the combination it's all you need. Most of XMPP-servers are reached via exit nodes, yet some operate as hidden services; You should use them. I'm looking into integrating NH.py features with Ricochet that uses more decentralized approach inside Tor network. The developer seems to be busy with his work atm.

The most important thing is to ensure the separation of TxM and RxM. If you use netbooks as TxM and RxM, you already have battery operated devices, so there's very little to do apart from removing the sensors etc.

Secure communication isn't just about principle and basic human rights, many people depend on these tools with their lives. It would also appear mass surveillance is expanding to bulk CNE, where anyone's computer can be exploited in the future. TFC remains for now, the only tool that keeps you safe from this modern panopticon.


 No.35533

Can someone explain to me what's wrong with uBlock Origin? I see people complain everywhere but no one tells me why it's actually bad.


 No.35537

>>35533

There is a line between "using free software to stay safe", and "being a filthy hipster who just HAS to be different". The people claiming that uBO is bad crossed that line long ago, and now that it's becoming FOTM, are spreading disinfo simply because it makes them more hip in their own eyes, and purist in the eyes of other freetards. So people swallow it without a second thought.


 No.35542

>>35537

So there's nothing wrong with it and its the work of a handful of lone trolls. Makes since considering the posting patterns (seems like there are only one or two shazbots repeating the same shit baselessly).


 No.35649

File: 1445341808336.png (163.85 KB, 1498x947, 1498:947, strange possible shill tac….png)

>>35368

>I don't know why you are bringing that up as a point, not as if it were ever argued against.

>Actually, you claimed that uBlock and uMatrix were made by the same person.

Depending on which ones you are talking about, this is correct, but only if you want to get into pedantic semantic goalpost moving strawman shillery.

>the point is Both are bad.

>Based on what evidence? I have provided evidence that uBlock Origin is superior to Adblock Plus/Edge. I'm perfectly willing to listen to any reason why I shouldn't use uBlock Origin, since I would like a fast and secure browser which leaks as little information as possible. If you're just going to keep repeating baseless claims-

Based on everything mentioned in the OP.

>-then I see no reason for me to continue this discussion.

okay, bye.

>something something, i used to use ABP but now I use ABE, it's not slow

>We're all aware of the whitelisting issue with ABP, but the only changes made when forking to ABE are whitelist related. ABE and ABP perform the exact same in all tests related to performance. While you might not notice any issues with ABE, it is still poorly written and sometimes performs worse than no adblocker at all.

Adblock edge runs incredibly smoothly for me, and never fails to block all the annoying garbage on the internet. Why should I listen to your trash? So that I might switch to shillU ?

>But I said I LIKE NoScript and RequestPolicy. are shills slowly becoming retarded?

>I know you did. You're overly defensive and have trouble understanding when I'm agreeing with you. They are the most essential addons for any web browser,

>drooling.webm

>That's why the guide specifically mentiones you shouldn't be using flash anyway, but I always keep the addon just in case some screwed up flash cookie is given to me by accident (or intentionally as many aggressive websites tend to do)

>Are you aware that you cannot get a flash cookie if you don't have flash? What you are talking about is beyond the realm of the possible. LSO's are generated by a swf running inside the flash player, web sites do not create or transmit them and your browser is not capable of storing them, end of story.

It is our duty as people of earth to try to always be prepared for the impossible.

>I didn't say it was useless.

>Neither did I, and I didn't imply that you did. I was just explaining why it's not useless so that other users would have a better understanding.

>what.webm


 No.35651

>>35455

https://panopticlick.eff.org/

>Currently, we estimate that your browser has a fingerprint that conveys . bits of identifying information.

only useful if those bits of information are in anyway actually correct.


 No.35654

>>35533

>doesn't read the OP

>acts like a dumbass


 No.35655


 No.35658

>>35655

I read the OP, pic in the OP and link in the OP. Discussion is becoming ridicilous right now, because no one answered what is wrong with ublock.

Rephrasing for autists:

– What is wrong with ublock?

– Don't you know? Its shills. Shills!!!

Please don't answer anymore, prevent yourself from zashquaring even more


 No.35659

>>35658

you can leave now, shill.


 No.35662

>>35655

>>35649

Given your fervor in pushing people away from what appears to be a good ad blocker, it makes me wonder if you might be the shill here.


 No.35663

>>35662

so you didn't read the OP


 No.35665

File: 1445364862318.png (1.91 MB, 750x600, 5:4, imageOct-20-13-11-25.png)

>ITT


 No.35666

>>35665

>didn't even read the OP intensifies

>keeps saying they don't trust OP

>OP points them to the guide they stupidly refuse to read

>they keep not reading the guide and complaining

GET OUT


 No.35667


 No.35674

>>35663

>>35666

I did, and the OP guide says nothing about why it's bad, only that you should use an adblock fork with worse performance that's not being updated anymore.

Fuck off back to doubleclick or wherever you came from, shill.


 No.35722

pretty good list of addons, i don't know/need all of them though.

ad blockers are entirely useless imho.

evil ads are blocked through refcontrol/noscript already and if there are any tracking methods left then Disconnect (which is missing on the list) should take care of that, or is there reason to distrust that too?


 No.35864

File: 1445719437394.jpg (125.5 KB, 745x778, 745:778, awwwww so CUTE.jpg)

>>35667

>>35674

>>35722

*** checking success of thread

>people informed of paranoid guide

>check

>shills really mad and in full damage control mode

>check


 No.35866

>>35864

Fuck off shazbot

>>35722

I believe Disconnect is just a more botnetty RequestPolicy


 No.35919

>>35866

why are you disagreeing with me, and then going on to say disconnect sucks? I'm on your side aren't I? OP mentions how bad disconnect is.




[Return][Go to top][Catalog][Post a Reply]
Delete Post [ ]
[]
[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]