[ / / / / / / / / / / / / / ] [ dir / doomer / eris / lit / lovelive / omutsu / s8s / sonyeon / wjsng ]

/pol/ - Politically Incorrect

Politics, news, happenings, current events
Winner of the 68rd Attention-Hungry Games
/d/ - Home of Headswap and Detachable Girl Threads

January 2019 - 8chan Transparency Report
Comment *
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
(replaces files and can be used instead)
Show oekaki applet
(replaces files and can be used instead)

Allowed file types:jpg, jpeg, gif, png, webm, mp4, swf, pdf
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 5 per post.

<The 8chan Global Rule>
[ The Gentleperson's Guide to Forum Spies | Global Volunteers | Dost Test | FAQ ]

File: b6fe2f7a26a4c7a⋯.png (589.9 KB, 2044x1056, 511:264, 51a416b603a924f1830f23e6a7….png)

9d191a  No.12072949

Hello anons.

I just want to say, I'm a medfag so I'm a complete retard when it comes to this shit.

How can you avoid being under surveillance? Halfchan is hosted by ustar so they're compromised (not surprising ).

I've been paying attention in other threads when the subject is mentionned but I'd like to dedicate a whole thread to it.

From what I saw, Tor is compromised as well?

Using vpns and proxies which one would you recommend? As for communication I use tox and telegram.

Anything elsz? Dump info here for other /pol/acks like me who are illiterates on the subject.

7447ef  No.12072972


You can never ever be safe online if what you're doing is enough of a threat.

The government has infinite resources and will track you down if they deem it sufficiently reasonable.

It costs too much to trace every wrong thinker and pirate. But it doesn't stop them from building a profile of you.

247588  No.12072987

It's impossible. Do not have any /tech/ on your property.

aa4d76  No.12072990


>that image

Go shit up the trumpnigger general on cuckchan and then you'll know who the "deep state" really supports.

477d00  No.12072997


Learn to search the catalog, faggot >>11699120

4df037  No.12073014


>"…track you down if they deem it sufficiently reasonable"

Fear pR0n. That's what that is. Name a single instance of "the government" tracking someone down to prosecute them for something they said/did online that got them into trouble/jail/prison/Guantanamo Bay

>No, Europe/The EU doesn't count

>that whole fucking continent is under Talmudic laws

>"They" and their loyal shabbos have fucked Europe straight the ass lube-free

>Europe and technology current-day are like oil & water

ac5f46  No.12073025


100% of all internet traffic is stored on NSA servers, since at least 2011. Talking about Exabytes of data here. They use millions of gallons of water a day to cool the facilities.

All hardware is backdoored. All software is backdoored.

931039  No.12073057


You're fucking retarded. There was the guy who sent a seizure gif to kike Ershenwald and is now in court. And don't forget the guy who got fucked thanks to 8chan's SUNSHINE totally offline now, goys. The 8chan guy made violent threats, and lo and behold was caught. The assault gif guy used his real name and phone number to get on Twitter so he was fucked because he didn't practice OPSEC.

Remember anons, /pol/ is a board of peace. :^)

4df037  No.12073079


Indeed! No one knowing full well the shit is compromised makes threats online without not giving a fuck. OP, isn't necessarily talking about threats, he's talking about a conspiracy to commit freedom of speech.

>CIANiggers got rounded-up, with many killed/disappeared by China. Chinese operatives broke the CIA's fucking communication network, and arrested or killed the lot of 'em

Is anyone here expected to develop a better system that the fucking CIANiggers, spying on China? It's time to put on our big girl panties. The whole fucking planet can hate the US constituency, but our OpSec is as good as it gets, and when that doesn't work, WGAF? …we're going take out some trash before we're taken out. Otherwise, Ass Up, here it comes lube-free.

fc7145  No.12073096


China "broke the CIA's fucking communication network" because one or more of the following happened:

A. Dianne Feinstein's Chinese spy leaked them the info (look it up if you don't know what I'm talking about).

B. Imran Awan sold them the info.

C. Hillary sold them the info.

It most certainly did not have to be China's leet haxors doing anything. It was traitors and/or spies working for our own government that got those people killed.

55e7f3  No.12073115


Exactly 100% this. It's all their shit, don't get too redflagged.

bec3fe  No.12073123


there's an application called fraudfox that is pretty proficient at keeping you anonymous when you need to be.

You have to use a dedicated computer and never use your own network service. General hacking is necessary as you will need to hijack a neighbors wireless signal.

It is possible, but unless you have a real reason a bit impractical. For the most part an offshore VPN service paid for with crypto works fine. Very hard to get doxxed utilizing using this method unless you insist on using your own sign-ins and google. never use google. If you have it installed, you're pretty much fucked on anonymity.

Ccleaner helps clean up search history, but you have plenty of hidden files that send information without your permission.

Linux is definitely preferred and if you're serious about working in the black-realm, learn python.

In short, there are ways but it's a PITA so unless you're putting yourself at serious risk, just use the offshore VPN method. Find your own. If your VPN provider doesn't offer anonymous registration, don't sign up with them.

d345a5  No.12073139

you basically can't. the methods you can accomplish it with are either illegal or require too much resources or time for the average joe to bother.

an illegal way would be through sneaking malware onto poeple's cell phones or routers and then using their connection to do your stuff. or just crack peopls wifis with something like aircraft or reaver. those are both very illegal though.

another way would be to host your own VPN server. configure the servers to be totally logless so that even if you get subpoenad there is nothing there. you can also offer payment methods that are 100% anonymous, such as cash by mail or paying via gift card codes. by doing these things it becomes pretty difficult to correlate any one users traffic with whatever is being posted, and even if you manage to, the user themselves is anonymous.

a lot of busses also have onboard wifi. so you could buy a ticket using fake name, and leave a repeater on there then get off. similar thing could be done with hotels, aprtments that have free wifi, etc. mount a parabolic dish on top of your car and then follow the bus from like a mile away

mobile hotspots or cellphones that you pay somebody else to buy for you are probably the most feasible for the average person. however both of those have unique IMEI (which difficult to spoof) so even its pretty easy to connect it with anything else you do with that device. meaning you probably shouldn't use it more than once, and if you do it should be in an identical geographic area as the previous uses, to cut down on the profile they could theoretically be built

for 'consumer use' anonymity for stuff like privacy and torrenting movies, just use a vpn. if you want to ratehct that up, pair it with a VM like whonix. a dedicated VPN router is also a good thing.

keep in mind, that if you actually managet to become bona fide 100% anonymous to anybody who is looking, you get grouped in with all the other people who are also 100% anonymous. and guess what? those people are criminals of the worst variety pretty much exclusively…not the types you wanna be assosciated with

my advice is to get a fish tank or setup a garden you can tend to. because chances are it will make you happy. running around in the dark is silly and humans aren't meant to live like that.

bec3fe  No.12073151


>my advice is to get a fish tank or setup a garden you can tend to. because chances are it will make you happy. running around in the dark is silly and humans aren't meant to live like that.

God damn that is probably more telling than you really want to be.

987929  No.12073188

File: 013e7b79582a743⋯.png (372.58 KB, 1865x910, 373:182, 1460149568553.png)

48ca19  No.12073214

File: fd75c839d80fca8⋯.jpg (27.36 KB, 396x396, 1:1, le_glowing_cianibber.jpg)


>you basically can't.

Go glow in the dark somewhere else, faggot.

d88d68  No.12073228


It's almost impossible to be anonymous online and you need to have money to burn and you need to do a lot of jumping through unironic spook loops to be fully safe (burner pc's, avoiding cameras and credit cards in netcafes etc). Everything is being recorded and i do mean Everything. But honestly it doesn't matter for the regular shitposter/bloke, just grey man it so to say. The only case it matters is if you're doing something bigly illegal in which case you need to do that shit offline as much as possible.

4ffb01  No.12073236

HookTube embed. Click on thumbnail to play.


Watch this video.

4ffb01  No.12073246

HookTube embed. Click on thumbnail to play.


Also, watch this

32e1f2  No.12073252


Use analog electronics, or no electronics at all. No wireless recievers and transmitters and preferably dont even use wires.


8dd277  No.12073277


the only way to keep your computer safe from (((their))) surveillance is to build it yourself from the ground up, even going so far as to not only design the circuitry yourself, but also to smelt the metal yourself

and on top of all of that, you'll also have to keep (((them))) from looking at your computer via. binoculars and drones

and thats just for offline computers that never connect to the internet

if you want to connect to the internet safely, one of the first things you should do is to make your own operations system from scratch that you never, ever tell a soul about

and thats just the beginning; for the rest, ask another anon

8dd277  No.12073281


oh, and by designing the circuitry yourself and smelting the metal yourself, I mean doing that for every single part of the computer, including the peripherals

but you can just buy the glass for the monitor

ef679f  No.12073561

File: 9773cbe6a8b6bd2⋯.png (197.44 KB, 1184x347, 1184:347, nsa_spcma.png)

File: 08e5e2c76e09c05⋯.png (225.95 KB, 874x729, 874:729, gchq_next_gen_events_1.png)

File: 5a353545880a1b2⋯.png (205.55 KB, 887x645, 887:645, gchq_next_gen_events_4.png)

File: bd8a28425c1b845⋯.png (219.01 KB, 883x706, 883:706, gchq_next_gen_events_3.png)

File: 477956b8c9e9804⋯.png (245 KB, 871x735, 871:735, gchq_next_gen_events_2.png)

Most Wanted Hacker Guccifer the Shadowbroker here (well, 1-of-8 that is–we're a small team), and i am posting from behind 7 SPCMA proxies hosted on NSA TAO's ORBs, which i hacked, and then relaying through a Tor exit node hidden inside a Pringles can mounted onto a tree next door to your wife's boyfriend's grandma's nursing home.

the bad news is that it impossible to be Anonymous on the Internet and Privacy no longer exists.

you the teeming unwashed masses of Internet users all are truly fucked up shit creek without a paddle and with a hole in your canoe.

how many pages of the Top Secret 21,000 pages leaked from Snowden have *YOU* read?


what fucking part of "Building Geo-Profiles for every Internet identifier we see" don't you fucking get?

what part of "population scale bulk unselected events" do you think you can fucking escape from?

do you live in a spider hole like one Saddam Hussein?

and that's just one sub-sub-sub-program from GCHQ.

GCHQ are themselves just a tiny, sleepy suburb cull de sac outside Metropolis-NSA.

Hello? McFly? Do you get it now?

ef679f  No.12073616

File: d3f0556f373ab09⋯.png (337.81 KB, 787x587, 787:587, gchq_blackhole_3.png)

File: 0d5c70b5e46fdb6⋯.png (325.62 KB, 790x587, 790:587, gchq_blackhole_2.png)

File: cd8ba4362c85cd3⋯.png (279.55 KB, 787x593, 787:593, gchq_blackhole_1.png)

File: a719fa2700288d3⋯.png (162.15 KB, 824x584, 103:73, gchq_social_anthropod_2.png)

File: 039ec763242a9b0⋯.png (190.22 KB, 794x559, 794:559, gchq_social_anthropod_1.png)




how can you or any of us possibly escape from FVEYs shit like SOCIAL ANTHROPOD, which is itself a sub-program inside SAMUELPEPYS, which is

also a sub-program of who-gives-a-shit it's-turtles-all-the-way-down?

now for the good news.

all the limitless power wielded by the faggots at NSA and GCHQ has gone to their heads, making them drunk with their own supremacy. the seeds of their destruction have been sewn in their own smashing success.

there is one teensy tiny Achilles' Heel in the NSA's system of Omniscience. think of this hole like a THINTHREAD, which once you pluck and pull, the whole

dorky Christmas sweater unravels into a ball of yarn.

NSA and the FVEYs trust the end points. the "handsets"–your Crapple spyPhone, your Jewgle Android, your BADBIOS'd Specter'd Foreshadowed Melted down Intel-Inside CPU, your PRISM partner Operating System "Design in California" or in Redmond, your backdoored Broadcom baseband, your Carnivored ISP's CALEA compliant backbones–all of this is at once what NSA used to fuck you, and it will be what fucks NSA in the end.

the faggot Bruce Schneier (((somehow))) got privileged access to Greenwald's Snowden Cache, but he never told us anything specific that he saw, just that we should "Trust the Math"–that based on what he saw, NSA BULLRUN can't crack crypto ciphers (yet), and his Professional Recommendation to us as one of the most "respected" cryptographers in the world was that we all should adopt cryptographic best practices.

me amigo, i don't recommend you take (((Schneier's))) advice at all.

because cracking crypto is the weakest link in NSA's Fortress of Solitude.

when NSA slurps up your GSM phone beacon every 20ms, when your phone pings the nearest cell tower, when NSA reads your Gmail and knows it's you because they know your IP address because your ISP gave your Customer Detail Records to them, when NSA builds a profile of you based on your cookies,

how does NSA really really know it's YOU?

follow me on a little Thought Experiment.

what if i was a fucking Mentat math genius the likes of which haven't been seen on Earth since Sir Isaac Newton walked London, and let's say i cracked RSA, AES, SHA-256, 3DES, and KASUMI, what would that mean?

that would mean i could *IMPERSONATE* you or anyone, and NSA would never know it, because they Trust The Math.

i could clone your spyPhone's SIM card just sitting next to you on the train. i sit outside your house and decrypt your wifi. i could take all your passwords out of the air. i could use them to *BE* you on the Internet. now that your SIM card is my SIM card, all of your online accounts are my accounts. you were smart to enable 2FA on all the things, but my SIM card will now receive your SMS code.

now imagine this scaled out to clone and impersonate thousands of people.

NSA would find itself right back where it started in 1953–in the dark. if any cell phone or wifi can no longer be tied to a known Identity, how can NSA spy on everyone at the same time, much less automate that shit?

NSA would be toast.

by the way, this isn't hypothetical.

Cryptopocalypse is Coming.

ee7763  No.12073676

Read the Art of Invisibility by famous hacker Kevin Mitnick. Take notes, do your research, it's got a lot of useful tidbits for non 1337, but it's not a how to guide.


48f44f  No.12073728


>hidden inside a Pringles can mounted onto a tree

No, no, no, hang on. You missed a step. The Pringles can has to be wrapped in a large potato chip bag, creating a Faraday cage. It's simple network physics, really; the larger the potato chip bag, the more anonymous your internet connection is.

301e52  No.12073770

File: 4fad9edfc281f58⋯.png (222.76 KB, 1182x1116, 197:186, 201206011000013.png)


Forget completely safe from gov. You simply want to be a complete nuisance and waste of resources to track when all you are guilty of is having a shit waifu tastes.

1. Get a VPN network

2. Use a TOR browser

Be suspicious and harder to track and only be guilty of having a love for "teh Rei". That'll show those fucking glow in the dark asuka fags.

c0f4c3  No.12073771



f925af  No.12073781


Go out in the woods and construct a shelter. Never contact anyone, ever. Grow and hunt your own food. Good luck.

2bc496  No.12073794


The only way to have valid comms is to use a one time pad where you share the secret pad with someone that you're trying to talk to beforehand.

A book full of random numbers / words works best because you can rotate the pad via date in a pre arranged fashion.

If you're going to use a computer to do this, it better be airgapped from the rest of the world, which is highly unlikely in 2018 because everything has touched the internet before you get it. Real glow in the dark secret shit happens on devices where the entire infrastructure to manufacture it is actively secure, and they only communicate over encrypted satcom shit that regular folks don't have access to.

02717f  No.12073830

File: 82580d2faecb24c⋯.jpg (289.05 KB, 1596x902, 798:451, Benji.jpg)

62016b  No.12074358

File: 985f244b6d4f422⋯.png (477.95 KB, 767x794, 767:794, tumblr_ovfdacrF691s7grqco1….png)

The bad news is that it's actually completely impossible. The good news is soooooo many people are being tracked that unless you trigger a ton of red flags, they'll never bother enough to specifically look at you, much less actually act on the intel. Many of the ways of hardening your security might actually make you a bigger target. The only thing I reccomend is a VPN, anything else (even tor) makes you more suspicious.

Any real organization must be done IRL, which is the only way you could theoretically be safe. Unless you have so many high priority red flags (usually by falling into a honey pot) that they bother sending an undercover fed.

acb3e1  No.12074376


Ross Ulbricht, Silk Road


f02977  No.12074542


this thread is pretty much a contest of who is the best at running around in the dark. I am attempting to bring some light into the lives of those reading. glow in the dark. if you meant to do that nice job, it made me smile

don't get me wrong - the process of developing pristine OPSEC is "light-bringing" in and of itself. you will have to learn all kinds of stuff about all kinds of things that aren't readily publically available, and then combine that with your logical capabilities. and then run that through your head over and over and over again til you got a perfect system. it's critical thinking in its purest form, and it doesn't come with a user's manual which makes it that much more enjoyable. stuff like that in modern society is few and far between

ultimately, what good is that skill set? if you're trying to sell drugs on the darknet, or card, or CP related stuff, or blackmail/doxxing it's a great skill set. but are those things you want to spend your time doing?

27ed10  No.12074615


This.. your CPU literally, unironically is built to record every single calculation.

Literally everything you do is copied and stored by the NSA

5762b0  No.12074679


Well that shut him up.

cc537c  No.12074997

File: 21a273eae553d13⋯.png (379.69 KB, 1920x1200, 8:5, 1449455620220.png)

458250  No.12075028

File: f8bca4898b322fa⋯.gif (1.84 MB, 320x240, 4:3, laughing-hard-gif-8.gif)

I am very sorry but I just couldn't help myself

>mount a parabolic dish on top of your car and then follow the bus from like a mile away

f02977  No.12075104


a motorcycle would work too

d3e84c  No.12075134

File: 9cf2229f32ad23e⋯.jpg (44.3 KB, 640x626, 320:313, 1519108388274.jpg)


the trump general threads on cuckchan are notoriously owned by the the_donald jews

being blindly in favor of any authority figure is music to the jews' ears

87b8ec  No.12075147


Buy a fucking rolltop desk. Drill two holes, on either end. One is intake, the other exhaust. Put a fucking fat in front of one of the holes. Point it so it's blowing in. Put your fucking electronics inside, and you'll use this to charge them. Now fucking close the lid. Hell, even lock it if you want to. The fan your electronics cool. That's what you tell people. In actuality it creates so goddamn much noise that even if you're in the same room with these wondrous electronic devices (read: 3rd amendment violation assrape of america wiretap devices), unless you raise your voice, you won't be eavesdropped.

Then you buy a fucking Ditto Wearable. It's a shit product that mostly deaf people use. It fucking vibrates when you have shit happening on your phone. It doesn't have a microphone, or any sensors. It's retarded. In other words, it's incapable of spying.

Oh, and you fucking start to use paper for your fucking ideas and shit.

And another thing, you probably talk to yourself some. Stop that shit if you can. Really work on it. The CIA can find out your fucking passwords because you say them to yourself as you're typing them lulz.

Oh, and gaming devices have microphones too.

Oh, and you should probably transition toward having all of your devices stripped at least of mics and cameras. But people may think you a bit odd if you do this (you'll have to use a handsfree set, and to video chat you'll have to plug in a USB camera…) It's only very slightly inconvenient.

Cameras are shit and so are smart watches. Fucking everything is. But these are the worst. Your tablets too. They have all kinds of goddamned sensors. So, like, let's say you carry your phone with you to do a drug deal. Let's say you removed the camera and microphone. Let's also say you jammed the radios, or used an RF bag. OK, that's cool. But did you know that it has a compass, and it also has a g forces meter? This can be used to fingerprint where you went lulz pwned.

So yeah, those RF bags are nice, but be sure to also remove the fucking battery.

All devices with non-removable batteries should be considered a permanent installation of NSA. Most tablets are like this, you know…

Where is freedom? How can it be that it is impossible to get all features in a tablet/phone/watch, but without the ones you wish to not have? The reason is simple enough. The CIA works behind the scenes to (((assure))) the conditions of their "success".

Yet there remains hope for us. We shall find a way!

8b5d7d  No.12075191

File: 01903a9335583c8⋯.png (1.15 MB, 1057x593, 1057:593, 1515936949677.png)

File: 5a97ffb4a569865⋯.png (1.23 MB, 1041x586, 1041:586, 1515939170769.png)

File: e558a24e45b0183⋯.png (1.08 MB, 1029x585, 343:195, 1515939778041.png)

File: e1986ad0c792701⋯.png (1.22 MB, 1057x593, 1057:593, 1515938781079.png)

Everything is listening and trying to predict your actions and thoughts.

It's probably too late unless you go live in the forest.

87b8ec  No.12075200


o wow lol

7eb1fe  No.12075239


That last one is very interesting.

547c29  No.12075241

Get off the internet. That's how you avoid being watched. (((They))) own the ISPs and VPNs and especially (((TOR))) which was made by the government. You can be too safe. So many shills have infiltrated this board and will tell you not to listen to me. Do not be Jewed by these kikes I am here ro help.

292037  No.12075456


>It is in fact adviceable to do ones normal webbrowsing over TOR, to prevent nosy ISP, Cloudfire and Add networks to profile you.

>the TORposter recommends shitposting on TOR


143c58  No.12075534

Learn Proper OPSEC:



648fc2  No.12075563

File: 651a3773cb0be9f⋯.gif (21.58 KB, 800x600, 4:3, 14514d63f17cc4621e51f5ff49….gif)

9cc0db  No.12075633

File: 71d7e6000f7625e⋯.png (1.62 MB, 1500x2122, 750:1061, 1535028909877.png)


Even your Hardware is compromised.

There is no escape when you use any hardware made after 1999.

cfed48  No.12075634

The NSA is incompetent, all you have to do to be totally safe is be someone they would actually be interested in. They only stalk anonymous losers who never do anything, you know.

Lol you people suck, I can't believe there are people retarded enough to be racists. You must all be getting manipulated by far left extremists, yup.

e379f8  No.12075656

Ok, finnfag here from ylilauta.

I'm a newbie so help me. There are leftist pushing interracial cuckold porn in our beloved home chan.

I heard there are ways to dox someone by tricking them to click a link. If so gibs me info or help. Right now the guys thread is basically dead. So if I post with "sage" only the bastard will get a notification. If it's a link, he might be dumb enough to press it.

The best way to stop this is to dox.

cfed48  No.12075713

The intel agencies are only mostly pointless.

They're not just ripping up society for no reason. They're suicide factories. People who think they could fix everything if only they could see enough get to make a go at it. They get to experience a world in which everything they look at maddens them by being boring, untouchable, or hopeless, and no matter how invasice they get they never see the right things at the right time to make a difference. People spend their lives at that. Decade after decade, growing old in the futility of it.

In their personal lives, they have one kid who grows up to do some other bullshit, if they ever have kids at all. It's never going to be anyone's ancestral profession, and anybody who likes spies enough to make it that way isn't discreet enough to have relationships with them. Eventually there won't be anyone left to do the work and the rest of us will be free of the kind of people who would make the attempt.

In the meanwhile? They manage to take down an actual criminal here and there. Rock on, spies. You'll be done soon enough.

For everyone else… I mean, if you're so scared of the consequences, have you tried not being evil? I get that intelligence agencies aren't only threats to evil people, that spies and creeps tend to overlap, that integrity isn't what draws people into thinking they need to see everything forever to have any security. I know. But on average, spies are just people. The odds are only so much worse, and better than the odds for the kind of organizations espionagers get sicced on. If some skullfucker gets out of control, well, the spies watch the spies, too. It's part of the grand futility exercise. They can't even keep their noses clean - so why do they think they can do it for everyone else?

c05938  No.12075837


What are the odds that the first true AI, the Skynet kind, emerges from it? -D


The world isn't just China, the US and the EU. Just sayin.




Kaspersky Lab was able to block the NSA/CIA backdoors, causing massive butthurt.


- Take randome faggotry.

- Encrypt it.

- Pass around.


How, glownigger?

458250  No.12075931


So if I like to mutter " I want to rape you for hours you black boned whore" as you jack off to porn on your little pad that's not a good idea then?

87b8ec  No.12075999


Why do you think the CIA gives a rat's botfly what happens to women?

87b8ec  No.12076000

Consider this: Mexico, mostly due to the CIA.

b3a703  No.12076214

tldr you cant if they put enough means to survey you

ea1d04  No.12076230

ea1d04  No.12076237


Literally shit talking kikes, you can't "store the internet" anymore than you can kick back the ocean.

ea1d04  No.12076304



Utter trash Nazi moon base tier shit. The nsa fears independent content creators exposing the Jewish hegemony in a hard to track way. These threads always get shill barraged.

d88d68  No.12076372


>How, glownigger?

What do you mean how? The chips and boards have inbuild backdoors for external access to your system at the factory. Didn't you pay attention to that huge intel cpu scandal around last December where we found out (for sure) that intel cpu's have their own separate OS not accessible to the end user which allows third party access to it and which has full access to your OS and you HDD contents. And that's just one component by one manufacturer.

86985f  No.12076383

How many of these threads do we need? You can't find us in our caves.

924a41  No.12076401

>insane cia niggers stockpile 666 jerilion bytes of storage space

>copy entire internet into it

>still 99% empty

>mass collect every byte of data from users

>slowly fill the bottemless pit with info

is this how the satan AI god is created? image an ai having access to this black hole of data

86985f  No.12076410


You mean the guy that got arrested?

87b8ec  No.12076420


The funniest part is that Intel is literally like Windows 95. Fake security, fake isolation, barely works…

86985f  No.12076424


Fuck off endkike.

7eb1fe  No.12076427

File: 6f1ce3a740e301f⋯.jpg (1.28 MB, 1659x1000, 1659:1000, tanya pol b-a.jpg)


What would you say the odds are its first words will be "Heil Hitler!"?

86985f  No.12076434


Kill yourself.

01a2e6  No.12076510


What you're saying doesn't make sense. If a device is connected to something, it is still under threat from L33tH@)(0r$. It's just a matter of time, energy and money as well as profiling information that will be used to get at someone. The only security is in layers and obfuscation.

87b8ec  No.12076568


However, if a useful location is not available (due to never using it at home), and if there are no personally-identifying materials on the device, what have haxorz gained?

18d2a6  No.12076652

How to stay safe… go innawoods dig hole ten feet down , oh wait satellites can still probably see and hear you

87b8ec  No.12076670


Go die CIANigger.

b6c75b  No.12076708

File: 973e94aed78fe31⋯.png (179.84 KB, 363x370, 363:370, 973e94aed78fe31fc4add96030….png)

You can anonymize yourself against third parties who would snitch on you, but you can't anonymize against five eyes. Don't poke out of the noise too much. The great anti-autistic irony of the situation being that seeking out the means to anonymize and become untraceable are easily flagged online behaviors.

The disinfo is thicker than the real info on the matter, even offline resources (photocopied crypto books, anarcho-kiddies with thumb drives, "hackathons") are all fed corrupted knowledge to an extent. The only guys who are fully capable of pulling off 1337 shit anymore work inside of high-ranking institutions, government agencies, and are known entities.

The system is closed, just blend in and pray for their incompetence to eventually backfire when they hand the keys to pajeets.

shitposting and ironyposting, creating overtly fake identities that corrupt the private data pipeline, confusing the AI learning, they'll have just a tight a grip on these within the decade as well. Sorry boys, you're either on the grid voluntarily or involuntarily at this point.

Don't blackpill though, chances are they don't give a single shit about any of us, and we're useful enough to them that they allow us to continue to exist as an info mob. Rejoice in the fact that they can't actually hunt us down and kill us individually, and we can be annoying irreverent niggers in their eyes potentially forever.

4b65b2  No.12076766


I’m only replying to mention that racism is zionism, and this site works directly, and practically only, to that purpose.

fa8557  No.12077776



The kosher government faggots are worse than anyone they call a criminal, by far.

adadf0  No.12078684

File: 00228604f4ea406⋯.jpg (12.01 KB, 248x248, 1:1, images.duckduckgo.jpg)




Trips confirmed, CIAfags own mexico.

1f13aa  No.12078745


>How can you avoid being under surveillance?

buy a phone that does not have your name on it then post from the library, if anyone wants to know who said what from the library they need a warrant signed by a judge

1f13aa  No.12078750


>The only security is in layers and obfuscation.

if they want you they will come get you, if you have something digital they have it no matter how much encryption you have,

8ab86d  No.12078756

I got the hale hortler banner when I opened this thread. That’s apparently correct.

92e414  No.12078771



Best solution is just have a dedicated machine (phone or computer) that you use only for your non-professional life on the chans or wherever you frequent. Always use it from a different location from where you do your regular stuff as a doctor or day-to-day business. Just pick out someone from the phone book of whatever area you are in and fill out all your forms as if you are that person when you set up your dedicated shitposting box. They may be able to see everything you're doing, but they're not going to associate it with your real-life activities if you practice strict discipline. They're going to profile your chan activities as being the guy you signed up as, who with any luck will look totally different from you the Doctor.

7ca8f5  No.12078826


>you can't anonymize against five eyes

Nonsense. It's quite possible to go dark.

7ca8f5  No.12078829

And we KNOW it's possible to go dark, because numerous individuals have accomplished it.

49e792  No.12079526


>type with one hand on work computer

>type with OTHER hand on TAILS computer


badd5b  No.12079545


Going dark entails completely abandoning all electronics in your home and never using your house for any internet connections, and at the same time never standing out doing so even though doing that immediately causes some people to raise eyebrows. Since you already have a footprint though going back on to the grid the regular way will immediately destroy whatever you did to go dark like an unraveling thread that is why you're always told never to visit clearnet sites and darknet places with your VPN and browser.

Even when you succeed it's only because going after you is a waste of time that could be spent elsewhere.

7ca8f5  No.12079610


No, you can absolutely have electronics. Going dark is more complicated than you suppose. I mean, you're right, that will do it… but it's quite possible to seem to exist, but also to not have your real activities be tracked…

190b32  No.12079611

No such thing as anonymity. Ever heard of IDF Unit 8200? If you have "Intel Inside" then sitting next to Intel is the fucking Mossad.

No escaping Total Information Awareness (TIA). Echelon to Prism to whatever it's called now. No software solution exists to get around the hardware (Ragemaster RF flooding to bounce signal off your chips and reads your monitor screen, same can be done with your keyboard). TOR and I2P plus any amount of software and hardware VPNS and proxies can NOT get you around this. Not to mention, as soon as you start buying software and hardware VPNs and the like you are getting flagged to be watched more closely.

nb4 blackpilled

7ca8f5  No.12079616

So, as an analogy, consider the task of following ants. Since ants are actually quite similar, it's vital to tag them. This is how the CIA and NSA operate. They aren't that good at getting signatures (stylometry may be quite decent, but with more limited bandwidth, such as activity styles, it's pretty shit quality).

So they're looking down on the ant mound, and they appear when they exit the hole (ie enter into the tracked systems, the Internet, phone systems, radio). But there can be things which obscure, confuse matters. In fact, without being tagged, they are greatly troubled in their attempts to track you.

It's a tremendous blessing we're so ordinary, so similar.

7ca8f5  No.12079624


Your theory of total transparency is pretty much only their wet dream. It's not reality, yet. There are complications. Example: they need pros to utilize the systems to investigate things to achieve the highest quality tracking product. Problem: what to task to which person? So unless something is detected as suspicious it won't get fully looked into.

This is why, after a disaster, they are able to know so much.

Edward Snowden talked about this. It's the needle in a haystack problem.

And you can be the needle, if you want. There are many many needles.

3455d2  No.12079647


>What are the odds that the first true AI, the Skynet kind, emerges from it? -D

Its already did. Deep state is guided by AI.

2a0591  No.12079708

File: 34ec92b6e23a9e8⋯.jpg (81.09 KB, 500x500, 1:1, Anime is real and buff.jpg)


>just be a faggot on the internet.


503b7d  No.12081354


It's completely impossible that's why most people who hacked into multi-million companies or gov agencys don't get caught.

503b7d  No.12081376


You see the people who get caught have obvious fuck ups and well known opsec fuck ups, but otherwise, it doesn't happen if you're not retarded and are willing to put ton of effort into securing yourself.

b92f1a  No.12085858


>No, you can absolutely have electronics

Toasters from the 1940's sure, or a classic lighting system where it's just mechanical switches controlling a current to heat up some metal in a glass bulb. But all that means is that they'd have to put up with only getting information from manipulating whatever electronics they can via powerlines.

I don't really mean those types of things when I say electronics anyways. btw modern toasters have circuit boards, display screens, and other things making them completely insecure.

9f6b3a  No.12085962

I'm not going to type it out because it's probably the easiest way to guarantee you'll get on a surveillance watch list. Use TOR to search for the story of:

A dog runs around the back ____. (4 letters)


A ____ flies in the sky. (4 letters)

277261  No.12086527


Yep. Apparently it's a backdoor at CPU cache level (probably multiple vectors actually, but that one at least I've seen reliably confirmed). I'd heard some processors up to roughly Core2 era were still clean though (so buy a secondhand Thinkpad if you want to be hopefully a bit safer!). About the only ways around it long term would be either an open hardware initiative or to figure out a way to encrypt & obfuscate the contents of the cache itself (already exists for RAM). I favor a combination of the two personally. Performance would take a hit of course, but if you were simply using it for basic tasks like message encryption it might be fine. I've wondered about some of the low power ARM based processors that are open sourced, but until there's a way to reliably detect the exploit I'd assume every CPU is compromised.

7ca8f5  No.12087511


Microphones aren't magical, you know. A loud fan near them and they hear nothing. Cameras cannot see if they are covered, in a drawer, whatever. And passive wifi (etc.) radar can't see into your cellar.

The main problem is getting phones that don't have any sensors that aren't necessary, and which can be 100% turned off. The demand is enormous, though, at this point. If you could manage to make these you'd get rich, because you'd be able to charge 8x what an equivalent one would be priced at.

7ca8f5  No.12087523


>assume every CPU is compromised

I agree, but you also have to realize that the CIA must assume that every computer could be a honey pot. So, they'll only use 0-days on you if you've attracted top-level attention…

… but if you're stupid enough to buy Intel, now that it's publicly known how to hack the hell out of them, you've invited the spying. So buy a Ryzen, and when the hi five comes out, buy it (and expect shit performance), and consider an Intel rig that's airgapped AND isolated in a faraday cage. I'm not fucking joking about the faraday cage.

7ca8f5  No.12087527


Though I would add that I prefer lead lining. Tell people you're worried about the nuclear apocalypse. Why not? Nukes never went anywhere. Expensive, very, sadly.

b1ed21  No.12093446


Daily reminder that you are safer fully anonymizing than not.

Daily reminder that you are safer partially anonymizing (Tor, false personas/belieffs) than not.

Never say anything illegal in your country.

Daily reminder that this is all easy if you learn it, which is easy.

Daily reminder that you should voice your opinions strongly in person. Fears or social reprisal are overblown when the stakes are the survival of your offspring and their future offspring.

b1ed21  No.12093456


door bird.

c447f9  No.12093506


Just don't use your credit card or post your name online? You already did both? Then too bad, you are no longer anonymous to an ABC who wants to put in the effort to know.

ec1857  No.12093545


>Microphones aren't magical, you know.

In one sentence you clearly demonstrated you have no clue what I just said, the information they'd get from things without a CPU via powerlines is limited and requires manipulating the object if able.

02a99a  No.12093655

File: 48531adfa27b2ad⋯.jpg (73.78 KB, 640x701, 640:701, 309195354e977d2ce4050c85c2….jpg)


What telegram channels do you find pol related?

4ea56b  No.12093794

If you read nothing else in this thread read these




If you read nothing else in this thread read these

>Cryptopocalypse is Coming.

IIRC in the long term forecasts I read about 10 years ago, the date expected for this was 2019

5e8516  No.12094398


Who is paying for it?

(May be a separate question, maybe not)Who is buying this idea and the subsequent abilities?

Why? What is the long-term goal?

None of their plans work without electricity. Electricity doesn't work without stable polarities.

Magnetic storage doesn't happen when electro-magnetics turn all of that hard work into digital spaghetti.

Fortunes represented by digits are the Achilles heal of those who believe they're untouchable.They can reduced to nothing in a very short amount of time, but it's better to destroy their lives slowly and methodically; the very way they prefer to do to their cattle/chattel

aa705f  No.12094499


Follow the archive

2fc995  No.12094550

File: 8477b80f5192bcf⋯.jpg (56.82 KB, 400x400, 1:1, feds on 8chan w archive.jpg)

b0ade2  No.12094694

TL;DR You cannot

Long version: You can only become too bothersome to bother with. No amount of measures will keep you safe from a motivated national level intelligence agency. None. The backdoors have backdoors. Then there's the old HUMINT methods and wetwork. You can't hide from a motivated attacker. You can only make it prohibitively costly. For most anons, this will suffice.

This is authoritative book on the subject. The number one thing to do is separate your assets from your name via LLCs. Internet doesn't even come into it until you've achieved that step. https://www.amazon.com/How-Be-Invisible-Protect-Children/dp/1250010454

b0ade2  No.12094719


Heil Our Cyber Samurai!

924a41  No.12094727


riddle me this, how does ISIS get away with using the internet to communicate if everything is kiked and backdoored

0a32af  No.12094743


Gee, I fucking wonder. Really gets the noggin' joggin'.

864556  No.12094750


> the authorities will not arrest you because they must explain how they determined your identity

This is patently false. Not to contribute to the general panopticon effect that threads like this generate, but please research "parallel construction". There would be no need for them to disclose warantless surveillance, they would simply build an evidentiary case alongside it.

2fc995  No.12094769



b58cc4  No.12094774

File: 6176a3600d39cd1⋯.png (141.89 KB, 641x481, 641:481, Your memes have no effect ….png)


>Free epilepsy test

I stared at said gif for five minutes.

What do I win?

4b8b18  No.12094778


Buy an old PPC core, the early RISC is faster than the CISC of its days and neither have microcode or integrated ethernet. Might be difficult finding old PCI or even ISA ethernet cards though.

13d45e  No.12094779

Being safe from surveillance is as easy as being a person of interest. These organizations miss everyone who matters. They're too busy laughing at whoever amuses them and writing justifications for poor allocations of time and resources. This conduct is excused as making up for all the dreary work that depresses them too much to ever get around to doing.

4b8b18  No.12094780


needs more changing colors tbh

13d45e  No.12094789

Obvious enough yet?

db2d6d  No.12094814


Do all the retarded shit that people are suggesting in this thread it will work I swear. I majored in computer science trust.

seriously though get just get a decent vpn and stop using chrome

c538d2  No.12096796


Imagine how much they'd cum if this were true.

d283e0  No.12112358

everyone who posts on 8ch has a higher level security priority than your typical jihadi muslim trying to get porn in pakistan on his motorolla phone. this is a farm for school shooters and domestic terrorism under the guise of white nationalism. eventually you will be in a discord or voice chat, you will be approached to meet irl, you will be physically bugged etc. where do you think the 500 billion goes towards? recruiting retards who would use violence to larp their 19th century political goals.

good example is someone like cody wilson, who is completely oblivious and will be used to ban downloading in ~10-15 years when the internet is just streaming cloud and physical storage is a controlled product you require federal license to purchase and use.

ec1857  No.12112377


If you are the only one that uses a VPN at a website then you'll stand out more then if you didn't because of metadata you share with every website you visit, metadata has information about you that ranges from the OS you're using to the browser you use and any website you're currently linked to will have this information shared with them. A VPN without doing anything else is good for casual browsing because Tor users taint adbots by dismissing VPN traffic as another Tor user but the best security of not being found out is being exactly the same as everyone else.

5fc6dc  No.12112455

I'm so glad I live outside of US jurisdiction, americans love to spout how they live in the "land of the free" when their own government is secretly watching their every move and are always planting spooks in grassroots movements so they can arrest everyone by way of entrapment when things become serious.

Say what you want about chink state surveillance but at the least the soulless yellow creatures are open about it.

c4b3af  No.12112476

There is a way, make everyone into it, if you are the only one using tor then it doesnt matter how many proxies you use, but the number they have today are so big that you cant backtrace tor users if they arent stupid or you dont waste a lot of money, basically tell all people to use tor to prevent datamining, credit card stealing, etc, if the entire planet is on the list that list will be just years wasted for them.

d0a9d6  No.12112505


This is the right answer.

You can and should take precautions, but ultimately, you must accept the fact that being online is inherently risky and that you are taking a risk by discussing these topics online.

Ultimately, being online and discussing these things are equivalent to being in a "minute man militia". You're risking a lot by joining, but it's an honorable risk, a risk worth taking if you believe in the cause.

a01d05  No.12114132


This but it is a bit more targeted for longer term storage. They still do have shit tonnes though.

Back in 01-02 they bought the entire world's supply of SCSI disks for over half a year, someone close in the industry high up confirmed this to me.

>estimated a few Pb back then

>net was 175Pb a month


167258  No.12114939


Pretty much… Even TOR was made by the Navy.

Good luck, anywho

82695e  No.12114966

computer security should be a perpetual thread on /pol/

0a0c1c  No.12115577


>net was 175Pb a month


1e6eae  No.12121272

You cannot hide from the government

Do not think you can

Do not try

They will always catch you

6d98ef  No.12139649

fuck sliding shills

4cce76  No.12139992


Blogger Shane Dowling jailed for contempt for naming Tim Worner's alleged lovers


I can't remember their names (but luke mckee could if he's still around) but there are two Australians serving jail in NSW for hosting (((illegal))) papers on their blog.

aff7ef  No.12140454


>I'm a medfag so I'm a complete retard

Please stop reinforcing negative stereotypes. We all have areas in our life we can strengthen. It's beneath our proud white heritage to embrace ignorance.

"A human being should be able to change a diaper, plan an invasion, butcher a hog, conn a ship, design a building, write a sonnet, balance accounts, build a wall, set a bone, comfort the dying, take orders, give orders, cooperate, act alone, solve equations, analyze a new problem, pitch manure, program a computer, cook a tasty meal, fight efficiently, die gallantly. Specialization is for insects." — Robert Heinlein

-t. MD with /tech/ capacity

c05938  No.12140992


That is precisely why the CIA was butthurt at Kasperky lab, they found a way to block that.



Find it. It can be disabled or compromised.

7e1595  No.12141748

File: 98658579e4f9edf⋯.jpg (933.73 KB, 1024x576, 16:9, Nasim-Aghdam.jpg)


thats cool and all, nerd, but you don't need to be a math genius to be completely anonymous online right now today. here let me take care of this one:

get an android phone on a payment plan and install google chrome make a gmail and facebook account using a secure password such as password1234 then start erratically posting and browsing schizophrenically in easily recognizable dialect and behind so many layers of irony that nothing of value can be discerned from monitoring your activity. make sure to fedpost in prominent places like halfchan regularly so they don't even bother reading it anymore, allowing you to freely spread your manifestoes and bomb making instructions at your leisure.

since they can read the subtle vibrations of your jaw to hear you think whenever you're around cameras, which could be anywhere, it's best to start thinking in this manner as well, all the time.

take a front facing cell phone camera and just run that thing 360* around your cock. because you like it. jokes on the NSA, beta pencil necked fags.

thank me later, heil hitler

99b3a9  No.12141776

This is a CIA post. Newbies, care to guess how I know?


f3aed0  No.12141782


Seriuosly check this shit out, it'll be vital with the coming (((censorship))):




Here is a trove of good information:


Seeing how these Euroclaps are trying to (and probably will) pass (((§13))) I really need to look into way of how an underground internet can be created, joined and maneuvered.

f3aed0  No.12141784



What the fug, what did I do wrong?

f3aed0  No.12141788




What the fuck happened to Baphomet REEEEEEEEEEEEEEEEEEEEEEEEE

f3aed0  No.12141791


By the looks of it it was probably CP being posted.

How I hate this shit.

I would hang all pedofags, but I bet over half of CPposters are doing it to censor.


f3aed0  No.12141923




I am a blatant and unceasing homsexual, here it is:


Be careful, tholugh, there are a lot of /baph/oles on there.

31e068  No.12141985

ZOG sees all. The (((internet))) is compromised. We need to set up a new internet.

34b315  No.12142020


I agree with you, but to be completely fair about Ross it was because he fucked up and posted his irl email on a darknet forum. If he had just taken a second to employ basic opsec he would still be free today.

7e1595  No.12142423


This is a post from a nigger. Newbies, care to know how I can tell?

7d7f9e  No.12162092


okay agent fud

55f20e  No.12162165


There's probably many ways, but without organizing capital behind whatever reason/motive you have for remaining anonymous to this govt you wouldn't really be able to do anything to your enemy other than keep them from spying on you. Truth is any organized resistance to modern globo homo wont come from le hacker extraordinaire in his mother's basement, but will probably come from mass rioting over racial and class issues the current American elite are creating. If anything the destruction of anonymity by globo homo assets is just the system digging its own grave, it should actually be encouraged because it will hasten their demise.

befa4c  No.12162362


The cans shape creates an identifiable unidirectional cone-shaped radio signal.

This in theory could be detectable. Tree hights are also very specific, i doubt they climbed very high up.

Those fuckers just screwed up their own opsec.

befa4c  No.12162374

File: 2e5444597d566f0⋯.jpeg (294.43 KB, 1242x1334, 27:29, accelerationism_did_not_h….jpeg)


The accelerationist method has failed every time just like communism.

ec1857  No.12162379


Cloudflare decrypts and re-encrypts all encrypted traffic that passes through it the NSA just needs to be the ones who own and operate cloudflare and they have full access to everything. Other intelligence agencies just need to backdoor Cloudflare and they also have everything.

btw 8chan is on Cloudfare.

84cfd0  No.12162450


Well, internet have been build as a spying tool…

So, it have to be destroyed and rebuild by us, the people who knows the nasty things…..

Start a thread, to regroup mathematician's, programmers and hackers.

Create a website to expose all the cybertactics, and cyberweapon used by intels to redpill ignorant humans.

Then, all of us have to contribute to build stronger OS..

With new ways to communicate..

After that, destroy the internet, and implement the new one…

There is no way to be safe out there, they have unlimited amount of money. scientists and engineers…

The only thing that we have, is a lot of people that only need to get regrouped.

dea9b3  No.12162451


Only Marxists push for accelerationism. So called "right-wing" accelerationism is a retarded concept, because you cannot purposely accelerate the current system in place without considering deeply and logically of what it is that should take it's place naturally and so on, and I believe that is called "progression" in the traditional sense and of which would be sped up with homogenity, accelerationism is not PROGRESS you can speed up technological processes but that isn't acclerationism, it seeks to simply push our current Civilization down into the fires (good luck getting out of the rubble this time, it won't be like Rome, we'll be turned into ashes in the fallout). It's a chaotic push into chaos itself.

Most of whom adhere to accelerationism just want pure destruction of all current systems and tend to place their idealised version of which system will be in place of it, just like Marx but to a worse extent. But not before half of the world dies or all of it in a nuclear fallout and the ideas will be lost, it feels like most of the elites want that ever so badly while they hide away, especially a particular race.

There's no room for the logic of lifelong thinking when it comes to it, it appeals to the ego, not the family or future. "It must happen now and in my lifetime. Now now now, I want to see change now!" It's what the Jews are doing now, accelerating conflict, everywhere. No one will escape it, the ones that will escape are probably the ones pushing people into it while they hide away wherever and birth something "new".

Just adhere to destruction and violence in a thoughtful way, as long as it's noble then it shall be fine, for example, killing all the undesireables.

dd01db  No.12162576


>they would simply build an evidentiary case alongside it

True. However, there have been cases where criminals have not seen the inside of a courtroom because it would compromise the sources and methods used or unlikely was flat out illegal to begin with. Simply because that was the only evidence constructed.

Imagine a scenario like that which happens from time to time. Bet the neighbors would be pissed figuring out Candyman Dan won't have to leave town for the next 10 years or have to register as a sex offender because good ol ZOG wouldn't do their jobs the proper way.

a1d5db  No.12162957


>TOR was made by the Navy

false. TOR had multiple funding sources, only one of those being Naval Intelligence. Don't open your mouth if you don't know what you're talking about

aa7dda  No.12166877


That's too extreme. If you don't want to handle stuff like firewalls just don't have any tech that connects to the Internet and you'll be fine.

0f40ab  No.12167911

>anglos turn tim berners lee's invention into a culturally non threatening corporate shithole slavegrid

As you'd expect from the land of beady eyes and tea jews

d2a57c  No.12168807

>No mention of counter-intelligence ITT

Amateurs. Anons should seriously learn something about it, you must be efficient and properly manage your resources if you want to accomplish something. Sure, total anonymity has it's uses, but in many cases it's not necessary, and costs (time, resources, mental energy) outweigh the benefits several times over. We should focus on how to operate under total transparency instead (with certain exceptions). Never forget, behind every system there is a man. And human psyche is rather … flawed. We must become ghosts, now you see us, now you don't.

Some kike watching me masturbate won't make him any more knowledgeable about my plans. Which plans? I don't have any, I'm just an average bloke, an internet troll :>)

67a060  No.12168885


Probably something similar to the Gray Man philosophy.

dec6ae  No.12168932

Best solution is to steal an identity, use machines that are stolen/hacked, drop information about the other person's life, etc… The trick to this is that they only care about convictions, not about actual justice or accountability. As long as their numbers check out and they get their promotion feds don't give any further fucks. No prosecutor/judge is going to give a fuck about a suspicion that the person isn't the perpetrator. If the details match enough that is all that matters.

97fafe  No.12194716

Bump a day keeps the glownigger away

ef8b4f  No.12195052

(((Totally organic threads))). Or you're retarded and can't search the catalog.



7c75e6  No.12196018






Microwave your cellphone and PC.

Use public transportation.

Use disguises and sunglasses and face paint.

Use cash.

You'll still be found.

The state is too powerful to go up against directly.

You have to infiltrate and subvert.

a4b328  No.12196267


You can't be completely anon or completely safe. Everything is life worth doing, has a risk. Nobody is ever safe against surveillance. You are posting on a board, in a thread, filled with shills, CIA, FBI, NSA, JIDF, etc. The only way to be completely safe, is to completely unplug, go into the woods, and avoid human interaction until death.

ddda5c  No.12196355

File: a6e0af30a51bfae⋯.jpg (80.09 KB, 1100x619, 1100:619, 411363.jpg)


>Use disguises and sunglasses and face paint.

If you want to fuck with facial recognition, creating asymmetry is the best way. Hair parted to one side, asymmetric designs using facepaint, anything that breaks symmetry makes it significantly harder to identify faces. Glasses aren't that effective at all.

e0859a  No.12197860




If you don't know about the NSA's fiber taps that mirror the entire Internet into their datacentres then you are literally nigger cattle and need to lurk moar.

0ff770  No.12204489


Eat dick. Onion routing began at the United States Naval Research Laboratory. Then they moved it to DARPA. Tor literally was made by the Naval Research Lab and then was moved to DARPA as the original creators moved on from their positions.

The Navy made Tor is a factual statement.

aee969  No.12204515

Simply proceed on the assumption that all of your activity is read. All of it. Move wisely.

We spend our days tickling the tiger's tail.

30f573  No.12204643

File: 683e815c54e592f⋯.jpg (108.99 KB, 950x960, 95:96, 5858whfjwg.jpg)


A very basic and easy thing you can do is to use cash for everything. Go out of your way to use cash. Otherwise, every single purchase and received payment of yours is permanently recorded. Ever wonder why (((they))) are pushing the cashless society drivel? Use it or lose it fam

30f573  No.12204682


Startpage feeds data into )ewgle

It's probably better to use vanilla ixquick or disconnect.me

30f573  No.12204699


The alphabet cunt flapper said they don't track bad people, they track interesting people. If you stand out as a potentially charismatic dissident, you may find yourself being faggotstalked.

2abba8  No.12204821

File: 21031eb2f53475a⋯.jpg (136.21 KB, 945x945, 1:1, 42513360_170239390533998_7….jpg)


hey medfag, dental fag here.

it depends on your habits. If you go to far, people with think you are developing paranoid schizophrenia. But most people are sheep who believe anything society feeds them.


Linux > Windows > Mac > Chrome OS

Search engine:

Startpage.com > ddg.com > google.com

Use firefox with addons: HTTPS Everywhere, smart referer, ublock, noscript, privacy badger

use dnscrypt

use a logless trustworthy vpn or create your own by hiring a vps.

Also the most important thing is knowing when to keep your mouth shut.


Julian Assange, Edward Snowden, Manning, Ross Ulbricht

countless of people bro.

and China is even worse.

ff148b  No.12204876


Thanks anon I needed that.

b0f2d8  No.12204901


Kevin Mitnick. He even wiretapped the feds trying to hunt him down.


This nigger speaks the truth.

While you can't stop it, you do have options. Learn about security and opsec, there are basically 3 options open to you.

1.) Fight the man. Cut out social media, and any other potential source of personal data. Especially all big tech and their products. Encrypt literally everything. Learn networking, build your own router and get all network traffic wrapped up in a vpn. (vpn doesn't = anonymous) Make that same router a private dns server and use the firewall to block any dns that isn't your own, be aware that chrome bypasses this. Use your dns server to block all tracking, ads, social media, google, etc. Say goodbye to the kikenet. Get yourself a laptop with a chip that predates IME. Buy it with cash, and never let it touch any network you own. Get access to a free unix shell account and use your shitbox laptop to connect to it from free wifi over a vpn paid for with crypto. Learn to love the terminal. (tmux, emacs, w3m, et al.) Once you get to this point, you should be educated enough to know what more you need to do.

2.) anonymity through obscurity. Learn OSInt techniques, and start using them on yourself (jewgle Michael Bazzell, good starting point.) Learn about the butterfly war and become a nigger.

3.) Take the black pill, and let the kikes have their data.


<you basically can't. the methods you can accomplish it with are either illegal or

gas yourself, kike.

>require too much resources or time for the average joe to bother.

This is a deep, ever changing rabbit hole. If you don't do it, who is going to protect your family for you?

>>12073277 (criminally unchecked)


Gas yourselves, you larping faggots.


And all the other books about the morons that got caught.


Yes, because your dumb nigger mind can't understand leaning from others, including what not to do.


words of wisdom for those unwilling to plumb the darkest depths of the rabbit hole.


<Any real organization must be done IRL, which is the only way you could theoretically be safe.

Ask the Klan how this works out.


Tails is SJW systemdtranny shit. Use heads.


>what good is that skill set?

What happens when you can't buy food because you are on the run for wrongthink?

3641b1  No.12205007


The don't store every video, every picture, etc… you idiot. The facebook photos stay of facebook, the youtube videos stay on YT, etc…

They store all the metadata, all the requests, and the SMS and other text messages, all the emails, all the image board posts (and in this case the pictures and videos too since they are manageable in size).

Every netflix movie watched, every YT video watched, every post made, every email sent, even data relating to mouse hovers is recorded by the javascript in some websites.

All this stuff is very easy to compress and store. So essentially, they do record the internet.

3641b1  No.12205023


To make this clear, if you and a bunch of other people download some video that they deem extremist, they only need a single copy of that video and the info that shows you all downloaded it. So if it's 1000 downloads, that's still a 50MB video and maybe 1kB of metadata showing who downloaded it.

They don't save the same 50MB video 1000 times.

ec4b9a  No.12205189

Snowden said use TailsOS.

ec4b9a  No.12205196

YouTube embed. Click thumbnail to play.

d24d30  No.12206833

Any of you use BolehVPN, Mullvad, Trust.Zone, SecureVPN, Expressvpn, or no? Been thinking about switching to one of them but after reading this in regards to anonymous registration:


I'm not sure.

a373fc  No.12207349


dead mod knew too much

a8de4d  No.12207521

File: 59cd5e730f973e4⋯.png (753.65 KB, 1945x6002, 1945:6002, Security Information.png)

32852b  No.12209944


/tech/ here, install TempleOS

d6b574  No.12213612


>Avoid being under surveillance

>Get off the internet.

You need to do more than that. Think about your grocery discount card as well as your credit/debit cardkeeping a record of everything you purchase and how often. Banks are keeping a record of your deposits and withdrawals and are required to report "suspicious" activity. The cell company has a record of every cell tower that your phone connected to and when. Not to mention the potential spying from the camera and mic. You got a mortgage or car payment? What about health insurance and medical records. This information is freely shared with the gov't. Do you own a car that has a wireless connection to the outside world? Some states and police cars are equipped with license plate readers that can be used to help track your movements. The smart electric meter on your house is creating a profile of your electric usage habits. Also your entertainment from Redbox, Netflix, etc is recorded. Walmart and other big box stores are using facial recognition technology on people entering their stores.

Did I miss anything?

Analyze this data with AI and you can predict a lot about someones life etc

c6c9cb  No.12213662


This is genuinely sick. It takes a lot to make me actually light-headed with disgust but holy hell I want everyone in that conversation dead.

88f0ef  No.12213743


>Did I miss anything?

Yes, but everyone always will (myself included) - that's what makes it basically impossible.

>grocery discount card

Absolutely this. Every one of those shopping "rewards" cards. The entire point of them is to link your identity to a list of things you buy.

>Some states and police cars are equipped with license plate readers that can be used to help track your movements.

Toll roads with electronic tag readers use these too. In fact, the bar is so low for Optical Character Recognition these days that you could implement this yourself, only the average joe doesn't have access to the DMV database.

So people may think, "well, cars = surveillance" (and rightly so), and opt for public transport instead, but this equals MORE surveillance;

- Cameras on every bus and train

- Those electronic 'smartcard' tickets = an identity. They have a serial number, eg. 00123456789 and it is used for tracking against the location (again by serial number) of every card-reader you swipe it at. Ever notice how they always offer discounts if you sign up online for automatic credit card billing? That's to get a real name and address to link your travel habits to.

Then there's the Samsung "Smart TVs" that were caught out listening in on people through the built-in mic and transmitting the audio back to Samsung (unencrypted of course).

Basically any tech with the word "Smart" in front of it, you can read as "Spy" instead, because it has surveillance capabilities.

8d510b  No.12213770

The CIAniggers got us good on that front. Even computer hardware has built in backdoors, so just using the right software isn't enough to be totally safe. I'm not sure you can be totally safe, but luckily you don't need to be. Most people who get spied on or in trouble are the stupid ones. If you make it a pain in the ass to spy on you, and aren't dealing drugs and CP then you probably won't get spied on. They'd rather go after boomers on Stormfront with zero OpSec to speak of.

Just try and hide in obscurity and numbers. Use linux. Get a VPN, something foreign. Don't get an average joe VPN like HMA. If anything that's probably worse than no VPN because it raises suspicion, but the feds can get your data easily. The fact that Tor has jews on its team is a bit concerning, but I've seen nothing that implies that it's actually compromised. (This is kind of similar to when people point out that NASA is Hebrew for "to deceive." It raises alarm bells, but don't prove that the moon landing is fake or anything.) Using a VPN with Tor would probably be enough to stop spying on that front. Try and avoid any big tech software too. I understand that you might want windows, office, vidya, etc. So you could put both windows and linux on your computer, and use windows for normie stuff. (and as a decoy) I'm not all that tech savvy, so I don't know if just having windows installed would be a major security risk. But running a videogame in windows in a VM is probably really inefficient resource wise.

d6b574  No.12213782


Thanks anon. I live in the country. No toll roads or public transit here.

c4be30  No.12213792


100% of pedos? Tor

There is no privacy. None. Wave to the alphabets faggot

f47302  No.12213996

File: 306dd05ea265069⋯.jpg (39.83 KB, 640x180, 32:9, hillarys it guy asking for….jpg)


>it was a traditional leak, not lax computer security

Why not both?

ec4b9a  No.12214144


>I wonder why?

It's how he managed to transfer shit tons of intel from the jews.

461c4a  No.12214396

Reminds me of back when people first found out the FBI had files on most of America. They passed a Law that said you could get access to your file by request. Morons actually asked for it. Guess what? If they didn’t have a file on you when you asked, they did afterwards. Morons never learn. The quickest way to get the NSA’s attention is start trying to learn how to avoid it.

461c4a  No.12214398

Swim with the fishes…>>12213770

016752  No.12236238

bumping useful thread

3c9724  No.12248149

Wear clear UV paint in your face, cameras won't ever pick you up

2acff5  No.12248160

I've barebacked on imageboards since 06 and I hope they know exactly what my beliefs and inclinations are. I don't fear them or the truth

327ef9  No.12276602


Tails isn't secure, heads is far better in that department for encryption.

7e221b  No.12277006

7e221b  No.12277030


I'm here to correct you slightly:


NetBSD >>> FreeBSD > GNU/Linux >>> Windows

>Search engine:

Searx.me >>> anything else > Google

181539  No.12277088


land shoe

tail hawk

side kite

yard bird

181539  No.12277097


A drool trough

181539  No.12277142


For just this reason I tap out esoteric Balkan folksong phrases with my jaw everywhere I go, intermixed with a series of poetic scansion/meter patterns.

That's how I knew I was a very special person and target: in a cafe I was studiously chomping out Runo 14 of Kalevala and a guy I never even met before came up and whispered "cargo of ivory and apes and peacocks."

317fdb  No.12277145


I'm here to correct you significantly. You spelled OpenBSD wrong. NetBSD is the one that stopped existing 20 years ago and now they just release cross compiled binaries for platforms they don't even have hardware for so they don't realize it doesn't even work.

625785  No.12277691

I have a fake illegal immigrant identity I've developed and used for everything from phones, ISP,etc.

Every service now has setup options for people with no SSN. Sometimes I pay small deposit. If cops come for my roommate pablo Escobar I'll tell them he is in country illegally and is hiding from them.

0a8196  No.12278828

File: a9e1051f1f58f56⋯.jpg (87.61 KB, 750x600, 5:4, Relevent-To-Interests.jpg)


>Every service now has setup options for people with no SSN.

As a resident rebel burger sovereignist who denys the (((14th amendment citizenship))) standing instead remaining on the much firmer ground of state nationalism and freeborn natural inhabitancy, this interests me.

4f68e8  No.12294349

So far


a247f9  No.12294554

File: a97dbd10f6deacc⋯.png (160.27 KB, 1365x588, 65:28, precautiolevels.png)


Glad you asked.

05b10d  No.12295403

Everything counts

Alternatives to Google Products – The Complete List


dda297  No.12295413

simple get rid of nsa/gov

9d6735  No.12295446


The thermal drone network will spot you.

Best to just dig a hole at least 20 meters down during a bad windstorm and never come back out.

0a8196  No.12299444

File: 92d277c67ee9eed⋯.jpg (89.79 KB, 641x350, 641:350, 1388187240420.jpg)


08f6c8  No.12299490

I've been under surveillance for years.

My life is hell so let me give you the 10 rules I learned:

1. It's impossible to prevent spying, what REALLY matters is leaving no evidence.

Tails+vpn+tor+mixed bitcoins etc.

They know, but they can't find legal evidence, so you don't pay.

2. Anyone who is corruptible is not going to help you. Police, doctors etc. Forget about it.

3. Dead man's switch. If your opponent is capable of killing you w/o consequences, the only way to remain alive is to make it so your death has worse consequences than you being alive.

I won't go into details but if your life is at stake this is the only way to survive.

4. The only real way to get away from this is disappearing. If they dont know your location they can do nothing. It's very expensive to actually disappear. You change your car, they place a bug in your new car before you buy it. Same with phones.

But if you succeed at disappearing, you're 100% safe. You can't spy or kill or control something you can't see.

5. Bugs aren't 007 movie stuff. They are incredibly common and every time you speak you should consider this. A decent micro bug with strong automatic self-encrypt and self-destr is just 100 bucks.

Of course most people are not going to be worth being bugged, but if you do anything that could harm any group with $1m/year and above, bugs are just standard procedure.

I was one of the guys who bugged folks for a living, we can place them easily and safely everywhere.

6. Assume all people will turn on you in this situation. Not even your father or brother will risk helping you against something of this level. Looking for help is equivalent to turning yourself in.

7. Resist tortures at least 3 days even if you're not guilty/you're being framed. Anything you say during the first rounds is considered bullshit you say out of fear.

8. Consider that your hardware can be compromised; at some point your phone/pc will have hardware-level flashing and rootkits so they are beyond salvage.

9. Worse comes to worst, consider the idea that if you can't beat them, join them.

10. Remember that they do not win because they are more skilled or anything. They win because they don't play by the rules. The best chess player in the world will lose every match against someone who can move pieces in any direction they wish.

Don't assume that you can win because you're more skilled, you can't beat a cheater when you have to abide the rules.

Otherwise just focus on not leaving tangible evidence. That's all you can do.

43eaec  No.12320582


was looking for this, thanx anon

84bc06  No.12320599


>vpn+tor+mixed bitcoins

one retarded advice after another

7afd9a  No.12320862


Why the need to type with each hand separately?

c4be30  No.12320878


dude think about where you are

we do the work of the fed niggers that they cant (or wont)

havent you got your recruitment letter yet?

000000  No.12322424




Security: A Resistance Manual

by Sam Culper

Poor Communications Security (COMSEC) will lead to mission failure.

Mission failure may come as the result of interception of all communications, or the discovery of one piece of information that allows the regime

analyst to complete his understanding of your organization. The regime

analyst may not need every piece of your puzzle to get a good view of the

final image. In the eyes of the regime analyst, your organization is a puzzle waiting to be put together so treat every piece of information as if it’s

his last clue. What we say, when we say it, and where we say it matters.

COMSEC is a trade-off for time and efficiency.



fd2e46  No.12322539


You arent a real person of interest if you do not have certain exceptional skills that pose a threat, the average fat neckbeard linux user is only a threat in the sense that he will seek out other fat neckbeards. If you use tor then you ll be flagged and some stuff will gather your shit. I assume the stuff they are working on is to get predictive patterns beforehand. That means they put a shablone out of 1000s of other neckbears over yours to estimate the potential threat. The stuff they would probably use is to change your perception aka youtube videos and a certain newsfeed and slightly alter your "go to groups".

You get the real "intensive care package" (military style) once you are an actual threat.

f16ffb  No.12322778

File: da8d14a1a455a5f⋯.jpg (158.27 KB, 1585x1209, 1585:1209, BlackPIlls.jpg)

Knowwhere is sayf. Lrn tuh obfewskate. butt yew r allrtty fucked.


94684b  No.12322833


> how do I hide from the government, anon?

< visit stormfront, they'll set you up


cb29a3  No.12323087

Government surveillance isn't a big deal. Non-government surveillance is worse. This one goes out to the espionagers: don't assume people are too bound and forgiving to each other. Punish violations as you find them. It's good work.

I liked seeing Google get hit over sexual harassment issues recently. If the people of that company aren't perfectly clean already… Well, admittedly, you probably have bigger flesh to fry. Keep up the good work.

Police are good, too. I want to say I have "nothing" but respect for the people who protect safety and integrity, but that would be false. I have a history of opposition and I still retain some skepticism. i have been developing some respect, though. Get out there and rock the worlds of people who think they can get away with anything.

Criminality is submission; I'm clean; I'd be willing to live on the street if my supports were dirty.

cb29a3  No.12323173

The people who have all the data can say what all the data contains - and they are never smart enough to defend a good trendline when it counts. Every empire collapses… unless there's a sudden unexpected humility? But no, of course not. Anyone in a position to offer that would "know better".

0c2c90  No.12323253

5+ years since Snowden revelations and people think that they'll have an edge from disclosures that old. First of all, the best hackers are savants that lack powers of deduction and don't know what to do with their skills, they'll hack the fucking pentagon looking for proof of UFOs and write 'pwned by lizz0rd Fuck Bush iraq i$ a lie"

Global Surveillance, NSA/GCHQ/Five Eyes etc never had anything to do with counter-terrorism or maintaining parity with nation states Cuban Missile Crisis style - that's done by HUMINT/ELINT detective work and open skies type agreements, military operations are not organized over email.

Global Surveillance is a blackmail hoovering system to hold political candidates over a barrel using the slightest bit of dirt they can find to make sure the controlled candidate wins. Even if the candidate is squeaky clean they'll dig up something the candidate said in an interview and make a sync'ed media controversy push to get the candidate to drop out of the race, or #MeToo them. Even if an unblackmailed candidate slips through they get threatened and do as they're told.

The best thing to defeat this bullshit do is do everything in the open with large numbers of people in fast-paced (screencap, download, archive everything when the oz curtain is drawn back) crowdsourced investigations because their weak link is manpower. How many people do they have in Utah MDR & The Doughnut vs millions of autistic diggers on the internet that just grows over time?

0c2c90  No.12323264


And always remember the phrase "The attackers were known to the authorities" because you hear it every time

0c2c90  No.12323619


Pretend Democracy was based on centralized news - papers, radio, TV, news sites and celebs - giving you the topic of the week to be interested in or outraged about and give you talking points to regurgitate so you can Have Your Say. The internet and specifically the anonymous chan format means you have people talking in a manner where there is no concept of an issue being too old/irrelevant or too weird to discuss. People discussing politics in that format is a fucking WMD to the powers that be, the establishment media is afraid to name the chans outright.

You can guarantee the shadow gov are trying to figure out some way to take away anonymous discussion and make sure that the best you'll get is pseudonymous forum namefagging conceit with karma systems like reddit where people don't really speak their mind and just fish for kudos. It's not about doxxing and shaming you so you lose your job and your friends and family know you said hitler did nothing wrong, it's that they don't want you talking anonymously because it creates memes.

Intelligence agencies are treating memes as the next WMD. It disrupts narrative rollouts and can stop wars and influence elections. Memetic Warfare agencies. Compartmentalizing it under counter-terrorism and asymmetric warfare. Cory Booker told a homeland security committee po-faced that there was a 'meme gap' just like the missile and bomber gaps of the 50s-60s and they're treating it very seriously. They're paying faggot nerds at IARPA and other agencies to figure out the science behind humor and how they can be ten steps ahead of the public. They want the "Teller-Ulam design" of viral humor all for themselves and they're holding powerpoint presentations on lolcats and 'the lulz' - the military/tradecraft community always gets the cutting edge weaponry and is usually decades aheads of the civilian sector in science. They don't have an edge on humor because it's not something formulaic you can coax out of a savant.

They would have to create their own wide area network Chan with grunts, generals and glowniggers indistinguishable from each other to get anywhere close to the level of numbers for potent chaotic shitposting and reassurance that they can say whatever they want with no repercussions which no one will believe. The MICC would never allow this because it would just create an opportunity for dissent and it would be too heavily moderated for people to speak freely. Their current doctrine is to stop meme proliferation from leaking into faceberg/twitter (e.g. banning pictures of cartoon grey men) and they're likely looking into disrupting the primordial soup conditions that create memes, paying off chan owners to namefaggerize the sites or using some sort of law to take them down. If you think this talk of meme warfare or 'meme magic' started with T_D boomers and Mossad of Blackdad's kekistani faggotry you just got here - that cringefest was johnny-come-latelies embarrassing themselves.

Memes are narrative jammers with no effective countermeasures. There isn't a meme school or way to become an ace-of-aces of memes. I triggered a one-hit-wonder massively disruptive meme only facilitated by the chan format and the other million posts I made were pure shit or ignored. It's a group phenomenon - some snarky hipster at The Onion can't conjure up these things on command never mind some spook. I follow the rule of what the establishment panics over is where you attack. "Fake News", "Russian Interference", "Alt-Right White Supremacists" this is just the shadow gov using another name for the Meme Gap and how they can't control fast paced internet chaos and trying to corral the masses back to talmudvision and newspapers.

c43b30  No.12323657


If i could act really freely i would push your eyes into your brains. It wouldnt really matter to me if you are a goverment dog or an "analmouse" breed.

In a way this stuff is just a bend projection of the reality the live in. And the measures they use are robotic. A split nothing that you could say "hey that sounds reasonable" in such a sphere.

0c2c90  No.12323668


Either english isn't your first language or you need to lay off the legal highs because you're talking in word salad

548a46  No.12355873


this, so many faggots waste their talents on stupid shit

3c3dee  No.12373845



a7ab01  No.12374020


>That picture

Big data be like **nitric acid, pressure cooker, backpack, bomb, 3D printer, ghost upper, ammonia fertilizer, nitrate, stump remover, chlorine sodium reaction, urea nitrate, ball bearings,

a7ab01  No.12374023

a7ab01  No.12374065


>He didn't walk across the border into mexico illegally, acquire a $200 starter pack, walk back across the border to texas and apply for foodstamps with the credentials of some dead shitskin with 6 kids

Someone somewhere is going to waste a weeks salary investigating this second identity of mine but they'll never find the third or fourth!

>Not having a separate ISP contract for each identity


a7ab01  No.12374145

File: df1abe89bccf5c1⋯.jpg (12.94 KB, 240x210, 8:7, Untitled.jpg)


>Worrying about perverts jacking off to kids when the slave trade is at its height in 2018

Even if they're fucking kids they probably didn't buy them wholesale at auction.




This is the homepage from one year ago, they didn't adopt their heart symbol until recently.

That heart symbol look familiar, anon?

2f8876  No.12374256

Anyone have article on how they can use infared enabled devices to map homes? Can't find it

890f10  No.12400809




77f3c0  No.12400898


The only way to be safe is to unplug your computer from the wall and then smash the hard drives and processor with a hammer several times. The NSgAy can access your computer through the hard infrastructure if they so desire. I once heard that they can access your computer even if it is turned off, so you need to unplug it from the wall and disconnect wireless access points also when not in use. If you're on a laptop well then you're basically fucked. The NSA data center tracks everything. I've simply stopped giving a fuck because I don't do anything illegal.

69c53e  No.12401706

File: 1b247f70e5d2725⋯.png (337.01 KB, 600x396, 50:33, brezhnev.png)

>how to be completely safe from nsa/gov surveillance

Don't use a smartphone, don;t use the internet, only pay in cash.

Everything else is just damage control. Most OPSEC is done to keep yourself safe from non-state actors like the media, antifa, disgruntled loons who hang around us. If the CIANiggers want your ass, they're going to get it. This isn't to say do nothing and make it easy for them, but you need to understand everything you do on the computer can be recorded and watched.

fd7f85  No.12401801

File: 5a9b9fd6516e233⋯.jpg (24.48 KB, 1280x720, 16:9, Ayy Lmao.jpg)


>someone goes full madman

>pokes hole in water cooling system somehow

>destroys all of the info


600543  No.12402061


Garbage like the NSA and the batmans of the GCHQ can only exist in a certain sphere, that means society goes down a certain route, which means control on a larger scale and in a very unspecific kind of way.

In a way ignorance is a bliss, and that bliss needs to be used.

8cb963  No.12402071

I have nothing to hide why should I care?

600543  No.12402072


There is no way controlling them via "love" and all that hypermoralistic mindrooms, which is a form of control in itself, or a possible exploit. In a way there arent two teams that fight against eachother.

What will decide our fate in a way is if we get the curve the right way or we dont. If we get the curve the american way we are doomed, it is nothing but exploit, and exploit and artificial garbage.

600543  No.12402078


Just think of mc cartyism the SJWway (which means a publicly motivated lynch mob not just a specific group), they are digging up innocent posts on reddit to have their little quaker fest. Imagine that seeps into intel heads.

600543  No.12402080


And that already did, imagine the scum of humanity at your front door, not in a real but abstract way but yet a possibility.

b30908  No.12402227

File: a0ff34c66672cfd⋯.jpg (113.08 KB, 604x476, 151:119, 14827448601340.jpg)

b30908  No.12402233


At this level the "lax computer security" is violation of law and counts as treason.

2ff192  No.12402289


Just don't do anything stupid bro. I'll go apeshit once DOTR comes. Until the civil service and federal system breaks down, I won't move a finger. Once it does, I'm going all out.

9402f0  No.12402355


>They use millions of gallons of water a day to cool the facilities.

I don't think liquid-cooling computers "uses" water the way you're implying. You make it sound like they turn the water into toxic industrial waste.

c70c0e  No.12402414


>look at cp in a library or at starbucks

I'm pretty sure that most pedos get caught with CP because someone else is in the room and sees it. Plus you will probably draw attention if you start fapping in public.

Dumb list tbh

a9e6af  No.12402447

I have unlimited LTE.

My provider doesn't know my name, address, or credit card number. My account has "X" listed as my first and last name because the store employee was either lazy or wanted to hook me up.

I use a refillable gift card to pay my bill.

I don't do anything worth hiding from the government, though.

e9fd2b  No.12404640

File: 6ce5ffa2598151e⋯.jpeg (2.13 MB, 2224x1668, 4:3, 72DD98EC-3DC9-4684-8A6A-5….jpeg)


It’s low quality for a start, baby is too close to sporty, no shadow on baby from scarey & scary is too sharp around the hair where she’s been cut out from a different background.

0c1ce1  No.12404693

File: 7c53e91df733004⋯.webm (15.26 MB, 640x360, 16:9, Bilderberg_and_the_Digita….webm)


criminally unchecked

2fa1c6  No.12404712

File: bdcc9effe29e387⋯.jpeg (166.34 KB, 707x499, 707:499, B8657240-6120-4910-906E-6….jpeg)

File: 5e885b12f5d9a1e⋯.jpeg (653.89 KB, 472x1184, 59:148, 18457BC9-BF9B-4091-949B-C….jpeg)

File: af25ce87cc1a8fe⋯.jpeg (89.89 KB, 780x405, 52:27, 7647A47E-286C-4952-A1F8-C….jpeg)


I was just banned by /pol/ mods for pointing out an anti race mixing thread was deleted as well.

69ed2b  No.12404735

Snail mail USBs/SD cards into PO boxes.

8ce5b8  No.12417812

You cannot hide from (((them))), do not try

b30e9e  No.12435397

Somebody trying to hide something will stick out like a sore thumb on the NSAs radar, the best you can do is blend in and mimic the traffic of other users

000000  No.12435475

Reposting some useful information:

The correct extension setup is:

>uMatrix (Your main interface for monitoring all connections to sites)

I'll give a quick explanation here. When you connect to a website your browser loads 8 things: >Cookie

>CSS (Page layout and formatting)


>Media (Video players)

>Script (commonly called javascript)

>XHR (Sends or recieves information, for example, to send a message, or recieve a new email)



Nowadays it is rare to connect to a website that does not also connect you to other sites. For example, you can verify this yourself:

Visit https://www.dnsleaktest.com/ (Don't do this with your retarded setup or enjoy Google a(i)ds). Your browser will connect to Google to retrieve an image from maps.googleapis.com. You connecting to Google to load this image provides Google with:

>Your user agent (which browser/OS you are using)

>Your IP address (the address attached to your internet connection, giving an approximate physical location)

>The above information linked with the knowledge that you were looking at https://www.dnsleaktest.com/.

So you use uMatrix to block everything globally, except first party (meaning the actual site you're on) CSS and images. This means that you for each site, you enable what you need to get it working. You'll soon figure out what does what.

Since most sites are bloated garbage in this age, many will not work with javascript disabled. Fuck 'em. Enabling javascript is basically the equivalent of handing your fingerprint over to the site you're looking at (and any third party botnets like Facebook, Google, Twitter, Amazon, Linkedin etc, that the dumb fucking retards who created that site decided to add to it)

>Smart HTTPS (Loads all pages with HTTPS instead of HTTP. With HTTP your ISP (or the DNS server you are using, do not use your ISP's default DNS servers) can see every site you visit. With HTTPS your requests are encrypted, meaning that your ISP can see you visited shoah.com, but cannot see whether you are looking at shoah.com/goodgoy or shoah.com/badgoy)

>Decentraleyes (Lets you enable requests to sites such as ajax.googleapis, making the retarded sites that rely on these things usable, but without actually connecting to the site, instead using a local version, which I hope they are not downloading from something equally as privacy-infringing)

>CanvasBlocker (if you are not using Firefox. Set to "Block everything" or "Ask for permission". Prevents sites that use canvas tracking from getting a unique value based on your browser/OS/hardware that makes you almost completely identifiable, like an actual fingerprint)

Install your browser and set it up with addons with your internet connection disabled.

>how do you make a user.js for your about:config tweaks

Make a file, name it " user.js ", open Firefox, find help, troubleshooting information, open your profile folder, paste the " user.js" file inside.


000000  No.12435479

>[_]Libreboot-compatible hardware

Avoid everything (((Intel))). Scan thoroughly through all hardware pre-prepurchae to ensure it is not mentioned anywhere. Also avoid WD hard drives.

>[_]Trustworthy Linux or OpenBSD distro without systemd/Network Manager/PulseAudio/dbus.

There are also other RedHat backdoors such as Avahi and ConsoleKit, PolKit etc. I do not know them all. Boot up any normie distro and you'll see almost of all the processes in task manager are NSAware.

>[_]Full disk encryption

Do the following to a drive before encrypting:

dd if=/dev/urandom of=/dev/sd(your drive letter) (Repeat twice to be sure)

dd if=/dev/zero of=/dev/sd(your drive letter)

This fully wipes the disk, you can use PhotoRec to test if anything can be recovered. Then encrypt the disk, before transferring any files to it.

>[_]Use of virtual machines and MAC address spoofing


>[_]Browser such as Waterfox or Palemoon with general privacy protective configurations

General isn't good enough. All the other measures are pointless if your browser is phoning home to (((Google))) and (((Amazon))) constantly. I recommend using either IceCat 60+ or Firefox 60+, because nothing else has good fingerprinting defenses. Follow this guide:


Copy the Ghacks user.js onto the end of your created user.js file to fully stop all phoning home. A warning however, each new version of Firefox adds more spyware, I cannot guarantee this setup fully works. You have to test it yourself and check with:

sudo watch netstat -tnp

>[_]Router that can install open firmware like ddwrt

Yes, and use it as a first line of defense to block botnet, similar to the host file on your OS.

>[_]Modem that can have open firmware


>[_]VPN that doesn't log

And also accepts cash.

You also need a firewall (not the placebo kind). There is a bash script called "NSA b gone" that prevents all proccesses from accessing the internet, unless you run a program with the specific command to allow it (this would be your browser). This stops update checking and random phoning home by so-called open source programs that connect to botnet anyway. It also spoofs your mac address.

Also uMatrix and Smart HTTPS are mandatory addons. uMatrix is your browser firewall. Download the .xpi files from the (((Mozilla))) store using Tor and keep them.

893882  No.12452422

File: c701e7759086550⋯.png (654.59 KB, 1361x3055, 1361:3055, op4kXmr.png)

f19b69  No.12457362

File: 8cd3dee07e4cedc⋯.jpg (1.55 MB, 720x7352, 90:919, In-Q-Tel 18Nov18.jpg)

File: d4ed1d1fb18dc6b⋯.jpg (178.98 KB, 597x767, 597:767, Intel Management Engine co….jpg)

>PALANTIR - Peter Thiel

>TRAILBLAZER w/Thinthread graphing - NSA

>ENTRUST - Thoma Bravo LLC = Orlando Bravo = Hillary's Rose lawfirm partner runs the company as a Class 1 Director


df1f7d  No.12457381

File: c18a040614f76aa⋯.jpg (14.12 KB, 228x221, 228:221, 1304002890554.jpg)


>How to be completely anonymous/safe from nsa/gov surveillance

Here's how to be completely anonymous:

Avoid all technology

The backdoors put into CPU hardware via the Talpiot program (jewgle it) allow (((three letter agencies))) to monitor your use of devices bypassing software.

The servers of nearly all the websites on the internet and the 'cloud' are hosted on (((intel))) too.

014dfd  No.12481639


AMD pre-2013 is safe

32e1f2  No.12481656




That is literally the only way

a361fb  No.12481892

File: 1379c73183622b4⋯.jpg (9.29 KB, 200x150, 4:3, ronpaul.jpg)

This whole thread:

>implying "secure" services aren't compromised

>implying "secure" protocols and encryption isn't compromised

>implying your VPN and proxies aren't compromised

>implying using more VPN and proxies doesn't just let more people listen

>implying any host, email service, or other site isn't compromised

>implying every page you visit doesn't have trackers and pixels and all sorts of other things that build an ad profile on you

>implying all that data isn't centralized and put up for sale

>implying the NSA doesn't have all of that information

>implying using excessive security doesn't put you in a behavior pool that gets randomly looked at closer

>implying there aren't algorithms to identify you based on your behavior alone

>implying there aren't algorithms to identify your posting style

>implying your security matters when the people you talk to have none

>implying the people you know you aren't already enough to build a complete profile on you

>implying all the years you spent without security will suddenly vanish just because you start using it

>implying the resources exist to give a shit what autistic rants you post online when Facebook is full of retards with sub-90 IQs attaching all sorts of bullshit to their real life name

>implying if the left ever does build a list of political opponents by using NSA data that you aren't already on it

>implying Obama wouldn't have already stolen all that data for the Democrats when he broke every other constitutional value imaginable

>implying the Obama admin didn't already classify all right wingers as threats for all 8 years of his administration

>implying you wouldn't have been put in an Obama gulag if they actually had the means to round up political opponents when they were already abusing the IRS and spying on everyone

It's literally fucking nothing. Do you know what they'd do if they cared about your online politics? They'd get hosting pulled, ads pulled, billing pulled, and just shut down the platforms you use. The politically repressive forces of the Democratic Party only care about you if you have influence, otherwise they just just consider you a basket of deplorable and will oppress you through impersonal blanket moves and policies that segregate you and restrict your actual ability to mean anything in the political landscape of America.

ee36cb  No.12504848

f16ffb  No.12504884

File: 2148d1b2c9bb7ec⋯.png (5.18 KB, 240x160, 3:2, 1485484368279.png)


Wrong, nothing running x86 is safe.

a5fea1  No.12504903

File: e4b29281a8ca0d2⋯.jpg (126.92 KB, 398x442, 199:221, CIAnigger_192.jpg)


and yet they haven't done shit. Guess they're all just a bunch of pussies

a5fea1  No.12504906


this is true, but there's no such thing as a "stop-all" layer is there? Security is and always has been, a system of layers, techniques, and lifestyle.

f16ffb  No.12504924

File: 33838a41885e486⋯.png (444.86 KB, 768x516, 64:43, 1485387217229.png)


Lifestyle. Hammer meet nail.

a5fea1  No.12504932


I'm stealing that pepe

6c998d  No.12505019

As a Fed I'm pretty sure they do a piss poor job of tracking people anyway.

a5fea1  No.12505036


Affirmative action is a universal cancer

e45208  No.12505150

The basic secret to being safe from the NSA is, as always, to be a person they ought to be interested in. Everyone knows they waste all their time watching nobodies who amuse them, because the NSA hires only jealous exes, crank mathematicians, and hedonistic code washouts who couldn't hack it in the private sector. The NSA captures massive amounts of data and pretends to process it, hoping to chill criminals by sitting on their hands in a world that "knows" they're watching.

Do you believe me when I say these things?

Why do so many people get away with crimes? Think about it! The NSA really is useless. All the surveillance in the world won't do a fraction as much to create public order as I persuading people to be peaceful and honest of their own will.

Surveillance systems only exist to make leaders stupid, bureaucrats stressed, and authoritarian voters dewy; real police work is only done by real police.

PS climate change is a real problem

65e4c6  No.12539206

Im an NSA agent, AMA

d1de88  No.12543658


As a former cybersec bro i can tell you there is nothing you can do to prevent surveillance. The upstream nsa program collected all internet traffic and the prism program asked all the digital companies for your metadata. Furthermore, the US govt spends your tax dollars on hiring security researchers to find security flaws in EVERY SINGLE PIECE OF SOFTWARE, FIRMWARE, AND HARDWARE, that we use, and develop exploits they can use to set up "wiretapping" (or enabling mic) on your phones in under a minute. Look at the eternal blue exploit on exploitdb for example. Maybe it was called eternal dream, or eternal romance…. cant remember. That's an old NSA exploit that was leaked, there is an article going around now, saying hackers can attack your router and enable SMB, server message block, and proceed to use this exploit on it, it's the specific service it attacked. Every app (software) and firmware and whatnot is designed by skilled professionals but will always have security flaws, some buried shallow some buried deep. It's the world's superpowers who have the tax dollars to fund security research to find them, then they keep em secret, so they can use them on the same systems in other countries and on citizens domestically. It's not a great field to go into for work which is why I'm no longer interested. Competing with real fucking hackers for jobs that are a cost rather than an investment to a company, no thanks.

I dont assume youre going to do something illegal but just in case… There's always legal things you can do, talk with people about the issue, write about it anonymously, make propaganda like images or something, even just help out your volk and tell them your views, etc.

d1de88  No.12543669


Oh, and that TOR shit is not secure. It's had a real bad history and was literally designed by the government. Something I learned from reading here. I can't remember what organization developed it, maybe navy researchers or darpa. Kikes were involved.

2dd3c7  No.12546207


Deepstate wants terrorist to flourish

4b8b18  No.12546371

File: f390d718b4167e3⋯.png (55.29 KB, 959x659, 959:659, ClipboardImage.png)


Use NordVPN on a pure RISC PowerPC.

Any post 2010 Intel chip has a hardware backdoor in it and some even have a 3G chip for "Anti-Theft Protection 3.0", but I don't know the how trustworthy the claims AMD chips having similar hardware backdoors might be, the OS has really nothing to do with security anymore, except to prevent script kiddies from causing a remote buffer overflow for giggles. Its all about signals and hardware now, hence the use of the VPN, just because you know your processor and chipset don't have any hardware backdoors doesn't mean your router or stuff along the route don't as well. RSA is a great algorithm but is completely useless when your traffic on the end site is shared directly with agents who now through the use of hardware backdoors have a fairly clear view of most internet communication.

The case is even made better with specific cryptographic instructions being added to processors so a secondary processor would know exactly when you mean to do encryption and what key or round or plaintext you are doing. But even without specific SIMD instructions there is enough standardization in all the major cryptographic libraries to still kind of know when you are running cryptographic algorithms.

89a3d1  No.12546916

Look at it this way…Virtually everything you do on the internet will be stored on some server, somewhere. No matter what length you go to now to maintain your privacy, it is only temporary. How long will you be anonymous? That depends on two things. 1. The amount of resources you put into making your data anonymous; 2. How valuable that data is to your opponent.

The US Government pools resources with allies. It is very close with Israel, as well as the Five Eyes nations. You're up against almost unlimited resources. It's like a police interrogation room. No matter how strong you are, police are paid overtime to be there and are trying to crack you continuously. No matter who you are, if they keep you in there long enough, they will get what they want.

There is no permanent anonymity. We shouldn't need anonymity. We pay for this government, it was supposed to be 'by the people, for the people.' But you are all such sheep, that you are continuing to give bureaucrats and their cronies your money and your rights. In only a short time, they'll have our speech, our guns, our minds (our education system), our privacy (healthcare records, telecoms, banking records) and even more of our money. They've already closed their greedy hands around all of our critical resources–clean water, electricity, communications, arable land. They have us by the balls.

fb0d9d  No.12547710


I wonder if your metadata's enough to who you think is best girl

7532ea  No.12547740


>and thats just for offline computers that never connect to the internet

nobody should be able to access your computer if you never connect to internet

ece665  No.12547782


I would only use a VPN that on public record, has been ask to provide evidence in a case but could not due to no logging.

There is only one VPN that I'm aware of that on public record that have not been able to provide logs simply because they do not have the capabilty.



The safest way to browse is slow and painful, but it's usually what the most scrupulous of hackers do, the only thing that fails people who use this option, is simply OPSEC, blabbermouthing, things that are unique only to you. As an example, there was a case involving very high profile pedophile of whom ran the biggest CP website on TOR, they couldn't break TOR to find him, they found him because he started his announcement posts with "hiyas", which is a very odd and unique. They scoured the internet and came upon a forum post with a similiar usename to his darkweb one, they also found a craigslist ad of him selling a car, using the same greeting. They doxed him, found out that he worked in child care and pounced on that sick fuck.

Simply TOR to VPN, your IP will be hidden from the VPN service, so even if they potentially log, you won't get fucked. You could also hack your neighbours wifi, just for an other layer.

001c03  No.12547874

File: 8f14d8636498a66⋯.png (276.98 KB, 346x477, 346:477, 8f14d8636498a660074121e2ad….png)


>That heart symbol look familiar, anon?

Fuck anon

001c03  No.12547897



> without considering deeply and logically of what it is that should take it's place naturally and so on

this has been any pro-white ideology would be an improvement to what we have now and whats to come.

> It's a chaotic push into chaos itself.

out of chaos comes order

> it appeals to the ego, not the family or future

national socialism is precisely about family and future

>Just adhere to destruction and violence in a thoughtful way, as long as it's noble then it shall be fine, for example, killing all the undesireables.

as if there is anything else to do

177673  No.12548031

File: 06dc5b11048079b⋯.jpg (93.03 KB, 540x289, 540:289, A20-OLinuXino-FRONT.jpg)


Nobody has infinite resources, and even printing tons of fiat doesn't buy you infinite resources. There are hard limitations that nobody can exceed.


You must be thinking of RISC-V. ARM is proprietary and licensed to chip makers by ARM Holdings. Even so, it's better than Intel in the sense that there is no AMT. And you can even buy some SBCs that don't need any kind of closed firmware blobs to operate, and with a processor like Cortex-A7 that doesn't do out-of-order execution or speculation (hence completely immune by design to all Meltdown/Spectre bugs). Here's some useful links:





I have an A20 board with Devuan (because fuck systemd). NetBSD also works, but the video is rather slow in X. Probably needs some 2D acceleration work. The Linux framebuffer is nice and fast.

6cd2aa  No.12548148

First, read the Pentagon papers. Then read all the Snowden leaks. Then constantly learn about OPSEC.

I won't type out the name because I don't want to get put on a list, but there is a high-profile case of the NSA being unable to catch an infamous pedo. They caught half of the ring but didn't catch the other half that used their encryption properly. Learn what the one half did and you'll learn a valuable lesson.

There's a leaked slide showing about 30 "independent security researchers" like thegruq and others. Follow these people.

Avoiding surveillance is not a casual thing.

177673  No.12548184


This tbh. Build a profile all you want, faggots. You're going to get the rope anyway.

177673  No.12548241

File: 239794cc92bda4a⋯.jpg (128.18 KB, 1080x720, 3:2, cyberterry.jpg)


Modern hardware and software are shit anyway, and that's why I lost interest in the IT sector. They will never fucking learn anything, and just keep repeating the same mistakes over and over again. It's all so very tiresome. But at least there's the option to get an old 80's or 90's computer (or even design your own from scratch using old parts), and write all your software in a language like Forth that only requires about 1% of the code that C does. So then you no longer need huge teams of "developers" (more like "buggy ass bloated code shitters") and you can do everything yourself, just like in the early days of the microcomputer. And that is the real freedom, not just some bullshit legalese like BSD or GPL, but the real kind where you just do wtf you want to and don't depend on anyone.


526963  No.12548269


>Snowden said use TailsOS.

>Giving weight to a glownigger's recommendation

526963  No.12548282

File: 5da6a9dae0d17de⋯.jpg (834.18 KB, 1000x1600, 5:8, torsupporter_rabbi.jpg)

File: 13ac6efafc8069d⋯.jpg (26.74 KB, 424x389, 424:389, tor_antistormermeme.jpg)

File: 7d298afbfce2c9f⋯.jpg (642.48 KB, 1600x1600, 1:1, The_TORpedo_Project5.jpg)


>Oh, and that TOR shit is not secure.

abeff8  No.12548327

There's no way to be completely safe from these people. I used to think that being someone they officially ought to care about might do it, but now I think they're capable of marginal competency. Still, I expect these are shoddy programs with bad subtle influences. They track people who care about them - which means they track their own enemies, not only lawbreakers but also lawful critics. The "safety" is in training yourself to total doublethink, caring and yet not; that this leads to shattered personalities is one of the reasons why surveillance programs always need to be used with delicacy. If you're leading a country and you're completely sure you need your surveillance program, you have too damn much surveillance. The totally necessary system will create enough work to destroy itself.

Look. Nothing to hide, nothing to fear… That's false. There ARE bad actors. There ARE unintended consequences. There ARE mistakes. Things happen. At the same time, nothing to hide, less to fear? That's true. So even though it won't fix everything, it's still worthwhile to have nothing to hide.

That doesn't mean being some perfect conformist. It means being lawful, especially in the ways that keep you safe for the people around you. It means partaking in a society where these programs are an absurdity - be good, and help people realize when people are being good.

And because a place labeled politically incorrect needs one total blunder: go abuse anyone you think might be paranoid. Chase them. Stalk them. Justify their fears. Create around them the world they believe in. That's sure to keep surveillance techs off of you. After all, they'll see that they've got more important causes than your shenanigans, and even if they try to reach towards your victim, you'll have rendered them so uncharismatic that the surveillance system will even fall in line on your side instead.

Because that's totally how real world people work, innit?

Remember that the people involved in technology are people. Every technology of sapience was built by a sapient being; every technology of humans was built by a human being. That's really always going to be your key, and like a lot of things, it serves decency as well as scoundrels.

So… Think social dynamics, and try not to ride the blunder bus, no matter what highwayman you fear might come riding.

ca8262  No.12548358


Great picture of Nasim.

I was wondering… Whose cock is she holding?

[Return][Go to top][Catalog][Nerve Center][Cancer][Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / doomer / eris / lit / lovelive / omutsu / s8s / sonyeon / wjsng ]