[ / / / / / / / / / / / / / ] [ dir / animu / caco / dempart / doomer / gif / lewd / tingles / vtest ]

/tech/ - Technology

Winner of the 68rd Attention-Hungry Games
/d/ - Home of Headswap and Detachable Girl Threads

January 2019 - 8chan Transparency Report
Email
Comment *
File
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Flag
Oekaki
Show oekaki applet
(replaces files and can be used instead)
Options

Allowed file types:jpg, jpeg, gif, png, webm, mp4, pdf
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 3 per post.


File: 99f672d67506003⋯.png (525.18 KB, 1289x572, 1289:572, fedirino.png)

 No.1007449

>Home security

>online privacy

>PC and data destruction methods

>How to hide questionable images, video, audio, etc. (stenography)

-==COMMON BULLSHIT==-

>B-but I dont have anything to hide!

https://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/

>B-but if you've done nothing wrong you should have nothing to hide!

If I've done nothing wrong there is no reason to search me.

-==TOOLS TO USE==-

>LiveUSB/LiveCD Review v1.1

http://pastebin.com/BbmZ8hiR

>Web Posting Assessment v.2

http://imgur.com/T8q7eB0

>TrueCrypt 7.1a [Last official release]

https://www.grc.com/misc/truecrypt/truecrypt.htm

http://istruecryptauditedyet.com/

https://wiki.installgentoo.com/index.php/Encryption

>The Paranoid #! (now #!!) Security Guide

http://pastebin.com/tUvq8Jzj

>Fake info Generator

http://www.fakenamegenerator.com/

>Pretty Good Privacy [PGP]

http://www.gpg4usb.org/

https://www.gnupg.org/

>Off the Record messaging [OTR]

https://otr.cypherpunks.ca/

>Cell Phone guide for Protesters

https://www.eff.org/deeplinks/2014/08/cell-phone-guide-protesters-updated-2014-edition

>Team 1: #Squad

http://pastebin.com/PxcDYUr0

>Team 2: #squad

http://pastebin.com/jd1sEwKL

>/fucko/ squad irc

#Fucko @ irc.rizon.net

All and any supportive comments, template contributions, are welcome and encouraged. NSA shills need not apply.

Template ALWAYS here: https://wiki.installgentoo.com/index.php/Fucko

Previously on /fucko/:

I don't fucking know

Mumble Server:

mumble://167.99.178.127

 No.1007454

File: 2e484ec17acbe9e⋯.png (902.78 KB, 1920x1080, 16:9, blurredtextdensitytest.png)


 No.1007461


 No.1007495

>>1007461

lol u mad


 No.1007564

What's the most disgusting thing you've masturbated to?

When did you lose your virginity?

How many sexual partners have you had?

Does your woman shove fingers up your ass while she gives you a blowjob?

Do you enjoy watching your woman get railed by random niggers?

Do you like shoving things up your shitter?

What is your masturbation routine?

All these and more are things to hide!

And none of them are illegal!

Yet all of them give others power over you.


 No.1007568

>>1007564

>Do you enjoy watching your woman get railed by random niggers?

>Yet all of them give others power over you.

cucks will deny this


 No.1007711

>>1007564

>Does your woman shove fingers up your ass while she gives you a blowjob?

Who the fuck does this it's gay af might as well walk over to the gay bar and get fisted on stage


 No.1007863

>>1007564

>Yet all of them give others power over you.

>tfw (You) just wrote down that you fit in all categories

Na, I don't think that's important.

What's actually important is that data alone gives other people who work against you a tool to construct evidence.

Even the most garbage data can be used to somehow prove that you think a certain way or committed some thought crime or have some other disposition.

In the CY-3 barely anyone would even hate you for the things you listed. That's how run down society is.


 No.1007865

>>1007564

and since you were talking about porn.

How can one verify the age of some person in a video?

The pixels certainly can't. You can't. A lawyer can't. Unless you're only looking at grannies you could run into it.

Or random postings with underage content. Happens relatively often. Even here on infinitychan.

Can all be used against you. That stuff only touched your ram? No, there is a thing called browser cache these days and website content is written to disk and can be recovered.

Even by amateurs like you. See this random website: http://www.sparxeng.com/blog/software/recovering-images-from-google-chrome-browser-cache


 No.1007871

>anonymous VPN

>hard drive encryption

>32+ char randomly generated password

>Firewall

>AppArmor or SELinux

>USB storage disabled

>Screenlock or lightlocker

>secure delete / shred

>unattended upgrades

>encrypted email

What else am I missing here?


 No.1007891

notFBI

>>1007871

>anonymous VPN

We have accounts too

>hard drive encryption

Firmware bypass and disk platter analysis

>32+ char randomly generated password

Size limit, random only good as the seed & algo: human randomness can beat computer seeds

>Firewall

UPnP

>AppArmor or SELinux

Hehehe, monolithic bypass, fuzz microprocessor

>USB storage disabled

Open bus still open.

>Screenlock or lightlocker

Depends Xsc, but cold boot attacks succeed: open RAM

>secure delete / shred

Disk platter evidence, NAND ionization

>unattended upgrades

Fav. vector, esp. unsecure downloads

>encrypted email

Tu metadata es mi tesoro


 No.1007930

>>1007449

>https://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/

>This content is available exclusively to Chronicle subscribers

Excuse me, Mr. Goldstein?


 No.1007935

>>1007863

>>1007865

I chose common Cosmo-sexual preferences because they're easy pressure points for typical fags.

It goes beyond porn. Bank statements could be used to construct "dangerous" spending patterns.

meme-posting shows intent as proven by James Field's trial.

Even visiting this site can be used to prove that you've committed a crime.


 No.1007958

>>1007871

>anonymous VPN

vpn are similar to cloud gay. it's just passing your information to someone else's computer and who knows what kind of security they even implement with their Indian coders. bet they use MS-CHAP internally.

>hard drive encryption

encryption only protects you from a minutes worth of intrusion.

>32+ char randomly generated password

passwords are vulnerable to keyboard signal leaks, radiation attacks, and hiring a scryer to shouldersurf you / or that expensive transparent sky camera equipment though monitors are upright so they'd have to reach certain angle

>Firewall

>>1007891

remove upnp/samba and dmz

>AppArmor or SELinux

NSA(tm) linux lol, the fuck is apparmor? some ring 3 trash?

>USB storage disabled

lol. keyboard? BT is much worse

>Screenlock or lightlocker

or better make your own locker program not something that they've already cracked and if not - tried to negotiate inserting backdoors for muh patriotism-autism.

>secure delete / shred

this >>1007891

platters are strong, they just flag bad sectors so it can no longer be accessed but it still can be read with better equipment and multiple sampling of corrupted bytes /etc

NAND is much worse, they have reserve unallocated spaces for performance increase which means the files are duplicated and in case a NAND area dies it just uses the other backup NAND areas (much like RAID because NANDs decay fast or reserved sectors for HDD).

same concept they use on SSHD. avoid SSHD

>unattended upgrades

legacy OS with pure opsec + virtual emulator with necessary opsec and up-to-date stuffs

>encrypted email

,ail is shit. Use radio and implement your entire radio facility algo etc. even deviating from FCC standards. make sure no one finds out about it.


 No.1007960

>>1007958

>transparent sky camera equipment though monitors are upright so they'd have to reach certain angle

okay. it doesn't have to be angled since how you type on keyboards can be seen above. angled for eavesdropping what's on your screen


 No.1007962

>>1007958

>lol. keyboard? BT is much worse

You can blacklist uas and usb_storage modules and still use usb mice and keyboards.


 No.1007964

>>1007958

>,ail is shit. Use radio and implement your entire radio facility algo etc. even deviating from FCC standards. make sure no one finds out about it.

Also, well memed. I can tell I'm dealing with people who know what they're talking about instead of larping on chinese cartoon forum.


 No.1008000

Reminder that the FBI is a large government bureau and, as such, is incredibly incompetent and bureaucratic [potentially by design].

Tails is designed to be used against Bugmen governments, and should work against Fiveeyes if you're not consuming much traffic.


 No.1008016

>>1007891

>Firmware bypass and disk platter analysis

Nice fucking larping.


 No.1008342

File: b55f63803144483⋯.jpeg (231.48 KB, 683x512, 683:512, infrared-thermal-imaging.jpeg)

File: 4ac2d305a6384a9⋯.pdf (1.11 MB, futureinternet-10-00121-v2.pdf)

notFBIagain

>>1007958

>remove upnp/samba and dmz

You didn't comprehend. Soft issue aren't architecturally safe

>NSA(tm) linux lol

I know right! What department are you from?

>BT

Serials r still good, but dat signal noise mang, 15m recog

>already cracked

Cold Boot bypass

The illusion of security is worse than no [expectation] security at all

>virtual emulator

ROFL, did you skip the few months of news?!?

>Use radio

WE GOT A LIVE ONE HERE BOYS!

You got a FCC license for that hot red band we can see from orbit m8?

>make sure no one finds out about it.

You're a funny dude

>>1007962

>blacklist

I like my undergarments pink too. Bloody Pink.

>>1008000

We seem to be doing just fine, burring Clinton, Podesta, Obama, and Epstein evidence. Wasn't Assange being delivered yesterday?

>>1008016

https://www.malwaretech.com/2015/04/hard-disk-firmware-hacking-part-1.html

https://www.mdpi.com/1999-5903/10/12/121/pdf

https://hackaday.com/2015/06/08/hard-drive-rootkit-is-frighteningly-persistent/


 No.1008918

>>1008342

can we like, encrypt RAM?


 No.1009103

>>1008918

Yes, but why? What you need is to flush RAM as soon you hit your Killswitch.

I won't reveal my storage regimen for the FBI to read here, but it's blatant.


 No.1009111

>>1009103

>I won't reveal my storage regimen for the FBI to read here, but it's blatant.

I bet you aren't even using a non-x86 arch combined with a FIPS 140-2 certified crypto module you scrub.


 No.1009379

>>1009111

I used some thing far more tested, and readily available than say having running electricity.


 No.1009424

>>1009379

Fuck off with your cellulose bullshit


 No.1009449

>>1009103

I hate how modern UEFI crap behaves in such a way that it stores stuff from RAM to disk and dumps it back to RAM during boot just for the 6 seconds boot speed. I've had trouble with it a few times especially that damned hybrid boot. UEFI technology is obviously an attack vector and it's here to stay.


 No.1009459

>>1007891

Seriously, the more I know, the more I want to go back to paper and never ever touch any computer again. It is so difficult... I mean, I don't see how you can be any secure if you're not yourself a hardware/software expert... A paper have so much downside compared to emacs+org mode, but at least, you burn it and you're done.


 No.1009806

>>1009459

>paper

>burn

This is how the legitimate 'occult' does things.

Use magitech or some astral technology if you want pure security.

larp :^)


 No.1009819

File: 913be55c90fe6e2⋯.jpg (135.78 KB, 540x924, 45:77, hint, not it.jpg)

>>1009424

>your cellulose bullshit

Organic material dies in like a day of exposure, what are you babbling about?

>>1009449

Don't use?

>>1009459

Close close: paper is biodegradable and highly corruptable. I'll hint. It isn't even it, but it should give you an idea


 No.1009887

Gas the CIA.


 No.1009960

Fun fact: You get electricity from the gov and your internet is also regulated by the gov.

Check mate.


 No.1009967

>>1009819

>Don't use?

how? every fucking mb Manny has forced it on every single new mb released in the past, what, 7 years at least?


 No.1010216

File: ed49d02672d5146⋯.jpg (243.98 KB, 1030x752, 515:376, homebrew8088.jpg)


 No.1011691

File: 59cd5e730f973e4⋯.png (753.65 KB, 1945x6002, 1945:6002, CYBERLOLI Elite Unit.png)

Found this on /pol/ thread. Maybe it will help some of you faggots.

https://8ch.net/pol/res/12072949.html


 No.1011695

File: 3007cffeae4b4ef⋯.png (104.71 KB, 1131x575, 1131:575, Screenshot from 2018-12-23….png)

>>1007449

>https://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/

>Wanted to read why privacy matters

>Get this error

>Can't learn why privacy matters without first giving up my privacy


 No.1011705

>>1011691

I remember seeing that on:

>>>/netplus/103

>>>/netplus/213

It's an interesting read in a morbid way, but that retard who keeps talking about his kid needs to shut the fuck up and also stop


 No.1011849

>>1007564

Pornography is a weapon of mass destruction.


 No.1011851

>>1007865

Thank you for your service.


 No.1011858

>>1011695

You also have to be a subscriber.


 No.1011959

>>1007449

If you watch, anon, it's like joining in on the abuse


 No.1011960

>>1007449

>http://www.fakenamegenerator.com/

for what use is this nonsense?

Hugo R. Varnado

781 Rosewood Lane

New York, NY 10019

Mother's maiden name

Davis

SSN

095-94-XXXX

You should click here to find out if your SSN is online.

Geo coordinates

40.862454, -74.046628

Phone

Phone

212-974-4137

Country code

1

Birthday

Birthday

April 2, 1968

Age

50 years old

Tropical zodiac

Aries

Online

Email Address

HugoRVarnado@teleworm.us

This is a real email address. Click here to activate it!

Username

Commerea

Password

ohvaKoT7Ka

Website

lolaymaria.com

Browser user agent

Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3578.80 Safari/537.36

Finance

MasterCard

5549 5960 9730 6942

Expires

4/2020

CVC2

061

Employment

Company

Muscle Factory

Occupation

Treasurer

Physical characteristics

Height

5' 8" (173 centimeters)

Weight

175.8 pounds (79.9 kilograms)

Blood type

A+

Tracking numbers

UPS tracking number

1Z 013 3V4 10 5481 120 1

Western Union MTCN

2394859646

MoneyGram MTCN

66250723

Other

Favorite color

Purple

Vehicle

2002 Kia Sorento

GUID

97522463-b81d-4a02-a088-474eb78af255

QR Code

Click to view the QR code for this identity


 No.1011962

>>1008342

>https://www.malwaretech.com/2015/04/hard-disk-firmware-hacking-part-1.html

News that a hacking group within or associated with the National Security Agency compromised the firmware of hard drive controllers from a number of manufacturers as part of a 14-year cyber-espionage campaign has led some to believe that the manufacturers were somehow complicit in the hacking—either by providing source code to controller firmware or other technical support. But it's long been established that hard drive controllers can be relatively easily reverse-engineered without any help from manufacturers—at least, without intentional help.

Despite keeping hardware controller chip information closed, hard drive manufacturers' use of standard debugging interfaces makes it relatively simple to dump their firmware and figure out how it works—even inserting malicious code that can trigger specific behaviors when files are accessed. Reverse-engineering it to the point of creating a stable alternative set of firmware for multiple vendors' hard disk controllers that also includes persistent malware, however, is a significant feat of software development that only the most well-funded attacker could likely pull off on the scale that the "Equation group" achieved.

Hard drive controller boards are essentially small embedded computers unto themselves—they have onboard memory, Flash ROM storage, and a controller chip that is essentially a custom CPU (usually based on the ARM architecture). They also generally have diagnostic serial ports, or other interfaces on the board, including some based on the JTAG board debugging interface. Using software such as Open On Chip Debugger (OpenOCD), you can even dump the "bootstrap" firmware from the controller and analyze it with an ARM disassembler.

But an attacker doesn't need to necessarily perform hands-on brain surgery on every hard drive to get a persistent attack. The best way to deal with this is to use the same sort of tool hard drive manufacturers use to send out legitimate firmware updates to customers—with a software tool that uses vendor-specific ATA or SCSI commands to re-flash the drive controller's ROM. While these commands aren't exactly documented, they have been reverse engineered for open-source diagnostic tools.

So, in theory, if an attacker was able to use another exploit to gain remote access to a machine and identify the hard drive on the system, they could then drop a customized installer onto the victim system that installs modified drive controller code that gives them a persistent backdoor. The problem, of course, is having a custom set of ROM code for precisely the hard drives that are on the targeted systems—a bit of work that would quickly elevate the cost of development of the attack to something attainable only by an organization with deep technical skill and deep pockets, or a relationship with someone willing to pay for it.

The National Security Agency would seem to meet those criteria. It's already been documented that NSA has funded the development of other persistent attacks, especially as presented in NSA's infamous ANT catalog. But other state-funded actors and criminal organizations could certainly benefit from the same approach in instances where a target uses a relatively consistent set of hardware, such as corporate environments with standardized desktops and notebooks.


 No.1011995

>>1009960

Radio and renewable energies like solar panels / geothermal steam power / water fall or wind turbine.

Hard mode: personal nuclear fusion reactor

It is regulated but not if they dead.


 No.1012360

>>1007449

Dear captain blowjob

Thanks for your comedy thread, I enjoyed reading every last one of the data at the end of those links

Unfortunately the author of those insane texts are completely oblivious to just how much computing power for decryption and surveillance is actually in the hands of the secret services and other military forces. However much you believe you can secure a computer system and/or its data, think again, the agencies can suck you up their asshole into their mouth, chew you up and spit you out like a blob of snot hocked up from the back of their throat. Give it up, dood. The government spends billions recruiting the best of the best. Most university professors work for government agencies if they are called to do so, and whole teams of the best minds in the world can hoover you up from a half a world away


 No.1012361

>>1012360

>leaked info only shows that government spergs out whenever people encrypt anything

>governments all over the world trying to outlaw encryption

<nope, some anon's romanticized neo-con fantasy of the world has convinced me to just give up xD


 No.1012362

File: 156df4cd8eb0bd4⋯.jpg (55.39 KB, 948x450, 158:75, 009a.jpg)


 No.1012376

>>1007449

I have a question lads, how resource intensive is running whonix in a VM on a 4th gen i3 laptop, also how much more secure is it compared to the regular TBB?

sorry for the retarded question


 No.1012382

File: f31a3fb5f2f6950⋯.png (35.17 KB, 600x600, 1:1, 1544954259561.png)

>>1007564

>When did you lose your virginity?


 No.1012384

>>1012376

>TBB

TBB was compromised

Guess who owns mozilla :^)


 No.1012434

Need recommendations on outdoor security cameras. Needs to be IP based but not smart (doesn't talk to an internet service, no mobile app, open protocol, no backdoors)


 No.1012437

Net 10 surveillance cameras n gear. Old brand.


 No.1012445

Net 10 cameras attach to serio port. runs digital signal thru 120Volt house system. IP based controls, remote handheld controls. Sense Win95-


 No.1012569

>>1011691

>>1011705

Stopped reading@

>Hardware

>Not relevant

Every Crime Scene Forensics Expert I've met, will swear your hardware matters more than software, esp. regarding backdoor hardware, from physical leak to firmware.

It's probably law enforcement himself.

>>1011962

>Equation group" achieved.

It's NSA.

>The National Security Agency would seem to meet those criteria

And which 3LA actually has contributed to FOSS?

>>1012434

Cameras don't save anything, Patrol does.


 No.1012598

DO NOT BUY INTEL OR AMD CPUs. THEY ARE BOTNET

https://en.wikipedia.org/wiki/Intel_Active_Management_Technology#Known_vulnerabilities_and_exploits

https://en.wikipedia.org/wiki/AMD_Platform_Security_Processor

Intel and AMD cpu's have a secondary CPU that is outside of your operating system control. this chip can access your storage, keyboard, mouse, network, it can remotely send your files or keystrokes. it can also remotely destroy your PC. Installing Linux won't deactivate it. The only solution is to not buy and not use those CPUs

Also, Intel is israeli jewish company, if you support them financially you support the white genocide and jewish supremacy.


 No.1012938

>>1007449

>B-but I dont have anything to hide!

Everybody has something to hide: CCN, SSN, home address, your kid's class schedule.

Nobody needs to hide everything all the time. You dont need to hide that you played Skyrim for an hour last night, or that you watched "top ten scariest haunted places" on youtube


 No.1012998

>>1007449

Redpill me on veracrypt full disk encryption


 No.1018304

>>1012998

good for europoors

bad for mericucks


 No.1018337

>>1007449

>PC and data destruction methods

Transparent encryption of all data using trustworthy cipher and implementations. Keys generated and stored on tamper resistant cryptoprocessor sitting on a USB device. To destroy the data, destroy or erase the device holding the keys.


 No.1018341

>>1012598

Yeah, we know. What CPUs, then? There are no real contenders.

The only real way to counter these trust issues is to make our own CPUs just like we make our own software. Obviously, no single person can make modern CPUs at home.


 No.1018366

get your PC from the good guys

Vikings.net - They even have a workstation with 32-core processors and libreboot (SICK!)

minifree.org - edgy tranny sells librebooted thinkpad


 No.1018367


 No.1018758

>>1018366

>they don't accept cryptocurrencies


 No.1018766

Could Trusted End Node Security be trusted with online banking


 No.1025861

bump in the midst of spam


 No.1025963

>>1018766

no, use backbox


 No.1026139

>>1011691

>your hardware not relevent

wew

>tor use fixed cells that are exactly 512 byte size which can be used to id you as a tor user

Yes that is well known because it limits finger printing, and the only solution to not let your ISP know if you use tor is to always use tor.

see:

https://www.youtube.com/watch?v=eQ2OZKitRwc

>>1012569

Nowadays encryption has been compromised thanks to intels implementation of crypto in hardware aka backdoors

>from physical leak

That's not really backdoors, it's more a very advanced hacking technique.


 No.1026517

>>1026139

>>1011691

>your hardware not relevent

IT security is only as good as the physical security.

Physical security ensures the device can enter a logical secure state before an adversary has access.

>encryption has been compromised thanks to intels implementation of crypto in hardware aka backdoors

AES encryption instructions are difficult to compromise because its result are predictable and uniform, means it can be decoded on an AMD or an older Intel in software.

Dubious are Intel's hardware random number generator in newer processors, due to their intransparency. Random number generation is the number one difficulty in cryptography, as well as checking for proper randomness, nearly impossible, a major weak point.


 No.1026550

>>1026517

>Random number generation is the number one difficulty in cryptography

Real talk, how can one inject randomness into the kernels entropy pool? Say I have a script that makes random numbers from a rtl dongle using radio noise. How do you actually use it in the kernel?


 No.1026552

I am curious and have a few questions. In advance I apologize if this is not the correct place to ask.

I have decided to travel outside of the US and I plan to bring along my laptop. Now I don't have any data that could get me into trouble, but I still do not want anyone snooping through my hard drive. My drive is encrypted and I was told that agents can confiscate my drive or even my entire laptop if I refuse to give them the code. Is this true, and can I get in any kind of trouble for not providing the code?

If it is a common practice, is there a way to fool them? I was thinking something along the lines of disconnecting the hard drive and having the computer automatically boot an OS from an SD card. Not so clever, though I have not thought of anything else yet.

Any information about how common this is and tips on dealing with this situation would be greatly appreciated.


 No.1026557

>>1026552

>I have decided to travel outside of the US and I plan to bring along my laptop. Now I don't have any data that could get me into trouble, but I still do not want anyone snooping through my hard drive. My drive is encrypted and I was told that agents can confiscate my drive or even my entire laptop if I refuse to give them the code. Is this true, and can I get in any kind of trouble for not providing the code?

Other countries can (and do) do whatever they want once you arrive on their soil. Many countries offer no meaningful protection against searches and have no doctrine of presumption of innocence. Depending on where you travel, having them confiscate your laptop could be the least of your worries.

Upon return to the U.S., in practice, customs and border authorities have broad latitude to search your belongings, including your devices.

https://www.aclu.org/other/constitution-100-mile-border-zone

Unless you're keen on being the next test case for the ACLU, you'll either unlock your drive when you're told to like a good boy, or not take your laptop with you in the first place.

>I was thinking something along the lines of disconnecting the hard drive and having the computer automatically boot an OS from an SD card. Not so clever, though I have not thought of anything else yet.

Maybe that would work. But what do you do if they think something's fucky, and they disappear with your laptop for 30 minutes, then bring it back and say you're free to go? Would you ever trust that machine again?


 No.1026558

>>1026552

Think they can keep for 90 days and make clones. Be careful of extra hardware and special firmware updates when you get it back. Can detain and hassle you for a while, but it's not illegal to refuse. Some set up a vpn server with their data and bring only a basic os and vpn client across the border.


 No.1026563

>>1026557

I thought about them taking it into a back room and messing with the hardware, and no, I would never trust the machine ever again.

I was too focused on dealing with agents while leaving the US, dealing with agents in another country slipped my mind. I think now I may have to purchase some really cheap laptop and let them check it. All I really wanted was to bring along my digital collection of language learning books to keep me busy if I get tired of picture taking and such things. Maybe a chromebook. Any way, thank you for your input.


 No.1026575

>>1026563

>I was too focused on dealing with agents while leaving the US, dealing with agents in another country slipped my mind.

I've been out of the U.S. a handful of times. In my (admittedly limited) experience, getting out of the U.S. is no problem. They're keen to make sure your passport is in order, so you don't end up stranded somewhere without proper documents, but otherwise I don't recall any scrutiny more serious than what you get for a domestic flight these days. Getting in to Europe was no problem, either. I guess they see a white, clean-cut guy with a U.S. passport and just don't get worried. Never been harassed or subjected to any unusual scrutiny. In one Euro country, they barely glanced at my passport before waving me through and didn't even look at my bags. Not in front of me, anyway. And this was after 9/11.

In the couple Asian countries with advanced economies I've visited, they were a bit more thorough than that Euro country and asked several questions, but didn't ask to see any of my devices.

Now, getting back in to the U.S. is another matter. Sometimes they only ask a few cursory questions, but occasionally they'll ask more probing questions, like they're trying to trip me up or get me to say something inconsistent so they can drag me to a back room for an interrogation. That's never happened, but of all of the places I've traveled (which are, granted, all countries that get a lot of U.S. tourists and have good relations with the U.S.) I'm less nervous going than coming back home.

So YMMV depending on where you're traveling.


 No.1026577

File: 675c1544748b9c7⋯.jpg (29.99 KB, 958x536, 479:268, MAGAbomb.jpg)

>>1011695

>Can't learn why privacy matters without first giving up my privacy

It's a learning experience to make you understand why privacy matters. You have to be mentally raped before you understand the importance of privacy.


 No.1026617

>use icecat

>spoof useragent

You're set


 No.1026653

>>1026550

>>1026517

>Random number generation is the number one difficulty in cryptography

>how can one inject randomness into the kernels entropy pool? Say I have a script that makes random numbers from a rtl dongle using radio noise.

The problem is where to find a source of randomness.

There are several theoretical physical solutions.

In practice the randomness might be pollute by other predictable signals (noise, but not random), like 60Hz hum for example. difficult to generate real randomness (unpredictability).

I'm not a kernel hacker, but maybe that helps:

old

> interested in using the circuit as input to the /dev/random device in Linux.

https://web.jfet.org/hw-rng.html

https://blog.cloudflare.com/ensuring-randomness-with-linuxs-random-number-generator/

links to

audio entropy daemon

https://www.vanheusden.com/aed/

videorandom

https://www.vanheusden.com/ved/

Silicon video sensors do have a lot of low level pattern noise that needs to be filtered and are not suitable for dark-field random noise generators. I know your device is just a receiver and the idea is probably to use "static" noise as source of randomness.

The problem is to find a (random) noise signal/source that has very good signal to not-so-random-noise relationship.


 No.1026702

>>1026617

>spoof user agent to jewgle chrome

>browser sends other information inconsistent with its spoofed user agent

>suddenly you have less common fingerprint

>even CIAniggers start laughing at your sheer stupidity


 No.1026728

Funny thing is, security measures like that (searching notebooks at airports) are pointless anyways as you could literally email yourself the encrypted plans on how to bomb the infidels and just download them in your destination country with a there-purchased computer or even in an internet cafe. It's just another excuse to infringe on people's rights and snoop on them and their hardware.

My advise is to simply do that and not take electronic devices across borders. Take a book. Staying away from all your electronic shit for a few hours is sometimes quite healthy.


 No.1026734

>>1026728

>Funny thing is, security measures like that (searching notebooks at airports) are pointless anyways

You are living in the free western world, are you disagreeing with the leadership of party and country, comrade?


 No.1029529

Redpill me on hard drive destruction


 No.1029531

>>1026653

Just get on the highway and play the fucking license plate game. Pick random cars, write em down, and then convert to '\xXX\xXX' string that you can pass to openssl.


 No.1029545

>>1007564

>When did you lose your virginity?

Try stealing that data from me. I dare you.


 No.1029817

>>1029529

LUKS + microwave = unrecoverable shit


 No.1029835

>>1029545 A big black guy raped him and it's the time when he lost his virginity!


 No.1029859

>>1029835

I actually lost my virginity that way.

Not the anon you were replying by the way.


 No.1029891

>>1029859

Was it as bad as people make it out to be?


 No.1029977

>>1029817

>>1029529

As with everything, depends on your threat model.

Full Disk Encryption grants some basic levels of comfort. Someone steals your machine, luks will keep your data safe from the lowlife thief, and the person he shills it to. Drive in an array fails, luks will let you bin it or send it in for warranty repairs/replacement without needing to worry about leaking the partial data on it. Re-purposing the drive? `cryptsetup luksErase <drive>` will return it to near-enough random noise in two seconds by destroying the headers (there are backup sectors, `dd`'ing the first few MB is not enough).

Nation state threats, harder to solve. Digital then physical destruction is best - modern disk controllers do all sorts of clever things that make it harder to digitally erase (another bonus point for FDE - you've never written a plaintext block of data) so total physical destruction is next to ensure coverage. Shoot it, hit it with hammers, shatter the platters, drill through the flash chips, set it on fire, toss it in an engine shredder.

Worried the FBI is coming down the hallway and about to kick in your door? Probably too late by now, they've got enough shit on you to kick in your door but luksErase that shit and hurl the drive out the nearest window as fast as you can. But again, if they're who you are worried about, you'll probably do things differently.

But what is more likely? Your drive fails or is stolen, or the NSA want to get all up in your shit?


 No.1029979

>>1026517

>>1026550

>>1026653

I have at least one of these in every computer: http://onerng.info/onerng/

I put a USB hub inside my X200 too, and embedded one inside that - keeps my USB ports free of kinda obnoxiously sized/shaped dongles, and always travels with me.


 No.1030778

What's the best OS for securing yourself against the US government and corporate dataminers?


 No.1030797

>>1029891

Yes. I still didn't recover from it.


 No.1030837

>>1030778

You would need your behavior to change. It is all the same shit that just needs to be configured/hardened by someone competent. All your software isn't really much use when you buy ALL of your hardware from these (((corporations))) in the first place. Physical access to a box has been accomplished.


 No.1030840

>>1030778

Same as other responder.

Using Qubes/Whonix dispVMs is possibly the best other than Tails.


 No.1034185

>>1018341

IBM Power9 is free of backdoors as far as I'm aware




[Return][Go to top][Catalog][Nerve Center][Cancer][Post a Reply]
Delete Post [ ]
[]
[ / / / / / / / / / / / / / ] [ dir / animu / caco / dempart / doomer / gif / lewd / tingles / vtest ]