/fucko/ FBI edition

Logan Price
Logan Price

Home security

online privacy

PC and data destruction methods

How to hide questionable images, video, audio, etc. (stenography)

-==COMMON BULLSHIT==-

B-but I dont have anything to hide!

chronicle.com/article/Why-Privacy-Matters-Even-if/127461/

B-but if you've done nothing wrong you should have nothing to hide!

If I've done nothing wrong there is no reason to search me.

-==TOOLS TO USE==-

LiveUSB/LiveCD Review v1.1

pastebin.com/BbmZ8hiR

Web Posting Assessment v.2

imgur.com/T8q7eB0

TrueCrypt 7.1a [Last official release]

grc.com/misc/truecrypt/truecrypt.htm

istruecryptauditedyet.com/

wiki.installgentoo.com/index.php/Encryption

The Paranoid #! (now #!!) Security Guide

pastebin.com/tUvq8Jzj

Fake info Generator

fakenamegenerator.com/

Pretty Good Privacy [PGP]

gpg4usb.org/

gnupg.org/

Off the Record messaging [OTR]

otr.cypherpunks.ca/

Cell Phone guide for Protesters

eff.org/deeplinks/2014/08/cell-phone-guide-protesters-updated-2014-edition

Team 1: #Squad

pastebin.com/PxcDYUr0

Team 2: #squad

pastebin.com/jd1sEwKL

/fucko/ squad irc

#Fucko @ irc.rizon.net

All and any supportive comments, template contributions, are welcome and encouraged. NSA shills need not apply.

Template ALWAYS here: wiki.installgentoo.com/index.php/Fucko

Previously on /fucko/:

I don't fucking know

Mumble Server:
mumble://167.99.178.127

Attached: fedirino.png (525.18 KB, 1289x572)

Other urls found in this thread:

sparxeng.com/blog/software/recovering-images-from-google-chrome-browser-cache
chronicle.com/article/Why-Privacy-Matters-Even-if/127461/
malwaretech.com/2015/04/hard-disk-firmware-hacking-part-1.html
mdpi.com/1999-5903/10/12/121/pdf
hackaday.com/2015/06/08/hard-drive-rootkit-is-frighteningly-persistent/
zigforums.com/thread/12072949/politics
desuarchive.org/netplus/thread/97/
fakenamegenerator.com/
en.wikipedia.org/wiki/Intel_Active_Management_Technology#Known_vulnerabilities_and_exploits
en.wikipedia.org/wiki/AMD_Platform_Security_Processor
youtube.com/watch?v=eQ2OZKitRwc
aclu.org/other/constitution-100-mile-border-zone
web.jfet.org/hw-rng.html
blog.cloudflare.com/ensuring-randomness-with-linuxs-random-number-generator/
vanheusden.com/aed/
vanheusden.com/ved/
onerng.info/onerng/

Logan Hernandez
Logan Hernandez

Attached: blurredtextdensitytest.png (902.78 KB, 1920x1080)

Robert Moore
Robert Moore

/fringe/index.html

Angel Watson
Angel Watson

lol u mad

Nicholas Gray
Nicholas Gray

What's the most disgusting thing you've masturbated to?
When did you lose your virginity?
How many sexual partners have you had?
Does your woman shove fingers up your ass while she gives you a blowjob?
Do you enjoy watching your woman get railed by random niggers?
Do you like shoving things up your shitter?
What is your masturbation routine?

All these and more are things to hide!
And none of them are illegal!
Yet all of them give others power over you.

Alexander Murphy
Alexander Murphy

Do you enjoy watching your woman get railed by random niggers?
Yet all of them give others power over you.
cucks will deny this

Angel Long
Angel Long

Does your woman shove fingers up your ass while she gives you a blowjob?
Who the fuck does this it's gay af might as well walk over to the gay bar and get fisted on stage

Nicholas Adams
Nicholas Adams

Yet all of them give others power over you.
tfw (You) just wrote down that you fit in all categories
Na, I don't think that's important.
What's actually important is that data alone gives other people who work against you a tool to construct evidence.
Even the most garbage data can be used to somehow prove that you think a certain way or committed some thought crime or have some other disposition.
In the CY-3 barely anyone would even hate you for the things you listed. That's how run down society is.

Kevin Taylor
Kevin Taylor

and since you were talking about porn.
How can one verify the age of some person in a video?
The pixels certainly can't. You can't. A lawyer can't. Unless you're only looking at grannies you could run into it.
Or random postings with underage content. Happens relatively often. Even here on infinitychan.
Can all be used against you. That stuff only touched your ram? No, there is a thing called browser cache these days and website content is written to disk and can be recovered.
Even by amateurs like you. See this random website: sparxeng.com/blog/software/recovering-images-from-google-chrome-browser-cache

Aaron Mitchell
Aaron Mitchell

anonymous VPN
hard drive encryption
32+ char randomly generated password
Firewall
AppArmor or SELinux
USB storage disabled
Screenlock or lightlocker
secure delete / shred
unattended upgrades
encrypted email

What else am I missing here?

Luke Bell
Luke Bell

notFBI
anonymous VPN
We have accounts too
hard drive encryption
Firmware bypass and disk platter analysis
32+ char randomly generated password
Size limit, random only good as the seed & algo: human randomness can beat computer seeds
Firewall
UPnP
AppArmor or SELinux
Hehehe, monolithic bypass, fuzz microprocessor
USB storage disabled
Open bus still open.
Screenlock or lightlocker
Depends Xsc, but cold boot attacks succeed: open RAM
secure delete / shred
Disk platter evidence, NAND ionization
unattended upgrades
Fav. vector, esp. unsecure downloads
encrypted email
Tu metadata es mi tesoro

Anthony Wright
Anthony Wright

chronicle.com/article/Why-Privacy-Matters-Even-if/127461/
This content is available exclusively to Chronicle subscribers
Excuse me, Mr. Goldstein?

Gavin Garcia
Gavin Garcia

I chose common Cosmo-sexual preferences because they're easy pressure points for typical fags.
It goes beyond porn. Bank statements could be used to construct "dangerous" spending patterns.
meme-posting shows intent as proven by James Field's trial.
Even visiting this site can be used to prove that you've committed a crime.

Parker Baker
Parker Baker

anonymous VPN
vpn are similar to cloud gay. it's just passing your information to someone else's computer and who knows what kind of security they even implement with their Indian coders. bet they use MS-CHAP internally.
hard drive encryption
encryption only protects you from a minutes worth of intrusion.
32+ char randomly generated password
passwords are vulnerable to keyboard signal leaks, radiation attacks, and hiring a scryer to shouldersurf you / or that expensive transparent sky camera equipment though monitors are upright so they'd have to reach certain angle
Firewall
remove upnp/samba and dmz
AppArmor or SELinux
NSA(tm) linux lol, the fuck is apparmor? some ring 3 trash?
USB storage disabled
lol. keyboard? BT is much worse
Screenlock or lightlocker
or better make your own locker program not something that they've already cracked and if not - tried to negotiate inserting backdoors for muh patriotism-autism.
secure delete / shred
this platters are strong, they just flag bad sectors so it can no longer be accessed but it still can be read with better equipment and multiple sampling of corrupted bytes /etc
NAND is much worse, they have reserve unallocated spaces for performance increase which means the files are duplicated and in case a NAND area dies it just uses the other backup NAND areas (much like RAID because NANDs decay fast or reserved sectors for HDD).
same concept they use on SSHD. avoid SSHD
unattended upgrades
legacy OS with pure opsec + virtual emulator with necessary opsec and up-to-date stuffs
encrypted email
,ail is shit. Use radio and implement your entire radio facility algo etc. even deviating from FCC standards. make sure no one finds out about it.

Austin Nelson
Austin Nelson

transparent sky camera equipment though monitors are upright so they'd have to reach certain angle
okay. it doesn't have to be angled since how you type on keyboards can be seen above. angled for eavesdropping what's on your screen

Daniel Martinez
Daniel Martinez

lol. keyboard? BT is much worse
You can blacklist uas and usb_storage modules and still use usb mice and keyboards.

Bentley Fisher
Bentley Fisher

,ail is shit. Use radio and implement your entire radio facility algo etc. even deviating from FCC standards. make sure no one finds out about it.
Also, well memed. I can tell I'm dealing with people who know what they're talking about instead of larping on chinese cartoon forum.

Grayson Stewart
Grayson Stewart

Reminder that the FBI is a large government bureau and, as such, is incredibly incompetent and bureaucratic [potentially by design].
Tails is designed to be used against Bugmen governments, and should work against Fiveeyes if you're not consuming much traffic.

Jayden Phillips
Jayden Phillips

Firmware bypass and disk platter analysis
Nice fucking larping.

Jace Brooks
Jace Brooks

notFBIagain
remove upnp/samba and dmz
You didn't comprehend. Soft issue aren't architecturally safe
NSA(tm) linux lol
I know right! What department are you from?
BT
Serials r still good, but dat signal noise mang, 15m recog
already cracked
Cold Boot bypass
The illusion of security is worse than no [expectation] security at all
virtual emulator
ROFL, did you skip the few months of news?!?
Use radio
WE GOT A LIVE ONE HERE BOYS!
You got a FCC license for that hot red band we can see from orbit m8?
make sure no one finds out about it.
You're a funny dude
blacklist
I like my undergarments pink too. Bloody Pink.
We seem to be doing just fine, burring Clinton, Podesta, Obama, and Epstein evidence. Wasn't Assange being delivered yesterday?
malwaretech.com/2015/04/hard-disk-firmware-hacking-part-1.html
mdpi.com/1999-5903/10/12/121/pdf
hackaday.com/2015/06/08/hard-drive-rootkit-is-frighteningly-persistent/

Attached: infrared-thermal-imaging.jpeg (231.48 KB, 683x512)

Carson Ramirez
Carson Ramirez

can we like, encrypt RAM?

Angel Young
Angel Young

Yes, but why? What you need is to flush RAM as soon you hit your Killswitch.
I won't reveal my storage regimen for the FBI to read here, but it's blatant.

Owen Ortiz
Owen Ortiz

I won't reveal my storage regimen for the FBI to read here, but it's blatant.
I bet you aren't even using a non-x86 arch combined with a FIPS 140-2 certified crypto module you scrub.

Ayden Carter
Ayden Carter

I used some thing far more tested, and readily available than say having running electricity.

Joshua Young
Joshua Young

Fuck off with your cellulose bullshit

Gabriel Thomas
Gabriel Thomas

I hate how modern UEFI crap behaves in such a way that it stores stuff from RAM to disk and dumps it back to RAM during boot just for the 6 seconds boot speed. I've had trouble with it a few times especially that damned hybrid boot. UEFI technology is obviously an attack vector and it's here to stay.

Jason Diaz
Jason Diaz

Seriously, the more I know, the more I want to go back to paper and never ever touch any computer again. It is so difficult... I mean, I don't see how you can be any secure if you're not yourself a hardware/software expert... A paper have so much downside compared to emacs+org mode, but at least, you burn it and you're done.

Ryder Fisher
Ryder Fisher

paper
burn
This is how the legitimate 'occult' does things.
Use magitech or some astral technology if you want pure security.
larp :^)

Lincoln Jackson
Lincoln Jackson

your cellulose bullshit
Organic material dies in like a day of exposure, what are you babbling about?
Don't use?
Close close: paper is biodegradable and highly corruptable. I'll hint. It isn't even it, but it should give you an idea

Attached: hint,-not-it.jpg (135.78 KB, 540x924)

Parker Fisher
Parker Fisher

Gas the CIA.

Elijah Ortiz
Elijah Ortiz

Fun fact: You get electricity from the gov and your internet is also regulated by the gov.
Check mate.

Sebastian Sullivan
Sebastian Sullivan

Don't use?
how? every fucking mb Manny has forced it on every single new mb released in the past, what, 7 years at least?

Benjamin Gomez
Benjamin Gomez

Don't

Attached: homebrew8088.jpg (243.98 KB, 1030x752)

Thomas Reed
Thomas Reed

Found this on /pol/ thread. Maybe it will help some of you faggots.
zigforums.com/thread/12072949/politics

Attached: CYBERLOLI-Elite-Unit.png (753.65 KB, 1945x6002)

Nicholas Bailey
Nicholas Bailey

chronicle.com/article/Why-Privacy-Matters-Even-if/127461/
Wanted to read why privacy matters
Get this error
Can't learn why privacy matters without first giving up my privacy

Attached: Screenshot-from-2018-12-23-02-47-11.png (104.71 KB, 1131x575)

Lucas Roberts
Lucas Roberts

I remember seeing that on:
desuarchive.org/netplus/thread/97/
desuarchive.org/netplus/thread/97/
It's an interesting read in a morbid way, but that retard who keeps talking about his kid needs to shut the fuck up and also stop

Ryan Gutierrez
Ryan Gutierrez

Pornography is a weapon of mass destruction.

Gavin Rivera
Gavin Rivera

Thank you for your service.

Isaiah Parker
Isaiah Parker

You also have to be a subscriber.

Landon Nelson
Landon Nelson

If you watch, user, it's like joining in on the abuse

Sebastian Roberts
Sebastian Roberts

fakenamegenerator.com/

for what use is this nonsense?
Hugo R. Varnado
781 Rosewood Lane
New York, NY 10019

Mother's maiden name
Davis

SSN
095-94-XXXX
You should click here to find out if your SSN is online.

Geo coordinates
40.862454, -74.046628

Phone

Phone
212-974-4137

Country code
1

Birthday

Birthday
April 2, 1968

Age
50 years old

Tropical zodiac
Aries

Online

Email Address
[email protected]
This is a real email address. Click here to activate it!

Username
Commerea

Password
ohvaKoT7Ka

Website
lolaymaria.com

Browser user agent
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3578.80 Safari/537.36

Finance

MasterCard
5549 5960 9730 6942

Expires
4/2020

CVC2
061

Employment

Company
Muscle Factory

Occupation
Treasurer

Physical characteristics

Height
5' 8" (173 centimeters)

Weight
175.8 pounds (79.9 kilograms)

Blood type
A+

Tracking numbers

UPS tracking number
1Z 013 3V4 10 5481 120 1

Western Union MTCN
2394859646

MoneyGram MTCN
66250723

Other

Favorite color
Purple

Vehicle
2002 Kia Sorento

GUID
97522463-b81d-4a02-a088-474eb78af255

QR Code
Click to view the QR code for this identity

Thomas Flores
Thomas Flores

malwaretech.com/2015/04/hard-disk-firmware-hacking-part-1.html
News that a hacking group within or associated with the National Security Agency compromised the firmware of hard drive controllers from a number of manufacturers as part of a 14-year cyber-espionage campaign has led some to believe that the manufacturers were somehow complicit in the hacking—either by providing source code to controller firmware or other technical support. But it's long been established that hard drive controllers can be relatively easily reverse-engineered without any help from manufacturers—at least, without intentional help.

Despite keeping hardware controller chip information closed, hard drive manufacturers' use of standard debugging interfaces makes it relatively simple to dump their firmware and figure out how it works—even inserting malicious code that can trigger specific behaviors when files are accessed. Reverse-engineering it to the point of creating a stable alternative set of firmware for multiple vendors' hard disk controllers that also includes persistent malware, however, is a significant feat of software development that only the most well-funded attacker could likely pull off on the scale that the "Equation group" achieved.

Hard drive controller boards are essentially small embedded computers unto themselves—they have onboard memory, Flash ROM storage, and a controller chip that is essentially a custom CPU (usually based on the ARM architecture). They also generally have diagnostic serial ports, or other interfaces on the board, including some based on the JTAG board debugging interface. Using software such as Open On Chip Debugger (OpenOCD), you can even dump the "bootstrap" firmware from the controller and analyze it with an ARM disassembler.

But an attacker doesn't need to necessarily perform hands-on brain surgery on every hard drive to get a persistent attack. The best way to deal with this is to use the same sort of tool hard drive manufacturers use to send out legitimate firmware updates to customers—with a software tool that uses vendor-specific ATA or SCSI commands to re-flash the drive controller's ROM. While these commands aren't exactly documented, they have been reverse engineered for open-source diagnostic tools.

So, in theory, if an attacker was able to use another exploit to gain remote access to a machine and identify the hard drive on the system, they could then drop a customized installer onto the victim system that installs modified drive controller code that gives them a persistent backdoor. The problem, of course, is having a custom set of ROM code for precisely the hard drives that are on the targeted systems—a bit of work that would quickly elevate the cost of development of the attack to something attainable only by an organization with deep technical skill and deep pockets, or a relationship with someone willing to pay for it.

The National Security Agency would seem to meet those criteria. It's already been documented that NSA has funded the development of other persistent attacks, especially as presented in NSA's infamous ANT catalog. But other state-funded actors and criminal organizations could certainly benefit from the same approach in instances where a target uses a relatively consistent set of hardware, such as corporate environments with standardized desktops and notebooks.

Andrew Brown
Andrew Brown

Radio and renewable energies like solar panels / geothermal steam power / water fall or wind turbine.
Hard mode: personal nuclear fusion reactor

It is regulated but not if they dead.

Austin Foster
Austin Foster

Dear captain blowjob
Thanks for your comedy thread, I enjoyed reading every last one of the data at the end of those links
Unfortunately the author of those insane texts are completely oblivious to just how much computing power for decryption and surveillance is actually in the hands of the secret services and other military forces. However much you believe you can secure a computer system and/or its data, think again, the agencies can suck you up their asshole into their mouth, chew you up and spit you out like a blob of snot hocked up from the back of their throat. Give it up, dood. The government spends billions recruiting the best of the best. Most university professors work for government agencies if they are called to do so, and whole teams of the best minds in the world can hoover you up from a half a world away

Benjamin Bailey
Benjamin Bailey

leaked info only shows that government spergs out whenever people encrypt anything
governments all over the world trying to outlaw encryption
<nope, some user's romanticized neo-con fantasy of the world has convinced me to just give up xD

Liam Bailey
Liam Bailey

Attached: 009a.jpg (55.39 KB, 948x450)

Thomas Williams
Thomas Williams

I have a question lads, how resource intensive is running whonix in a VM on a 4th gen i3 laptop, also how much more secure is it compared to the regular TBB?
sorry for the retarded question

Joseph Jenkins
Joseph Jenkins

When did you lose your virginity?

Attached: 1544954259561.png (35.17 KB, 600x600)

Luis Gutierrez
Luis Gutierrez

TBB
TBB was compromised
Guess who owns mozilla :^)

Henry Rogers
Henry Rogers

Need recommendations on outdoor security cameras. Needs to be IP based but not smart (doesn't talk to an internet service, no mobile app, open protocol, no backdoors)

Carson Perry
Carson Perry

Net 10 surveillance cameras n gear. Old brand.

Thomas Mitchell
Thomas Mitchell

Net 10 cameras attach to serio port. runs digital signal thru 120Volt house system. IP based controls, remote handheld controls. Sense Win95-

Benjamin Morgan
Benjamin Morgan

Stopped [email protected]
Hardware
Not relevant
Every Crime Scene Forensics Expert I've met, will swear your hardware matters more than software, esp. regarding backdoor hardware, from physical leak to firmware.
It's probably law enforcement himself.
Equation group" achieved.
It's NSA.
The National Security Agency would seem to meet those criteria
And which 3LA actually has contributed to FOSS?
Cameras don't save anything, Patrol does.

Angel Howard
Angel Howard

DO NOT BUY INTEL OR AMD CPUs. THEY ARE BOTNET

en.wikipedia.org/wiki/Intel_Active_Management_Technology#Known_vulnerabilities_and_exploits
en.wikipedia.org/wiki/AMD_Platform_Security_Processor
Intel and AMD cpu's have a secondary CPU that is outside of your operating system control. this chip can access your storage, keyboard, mouse, network, it can remotely send your files or keystrokes. it can also remotely destroy your PC. Installing Linux won't deactivate it. The only solution is to not buy and not use those CPUs
Also, Intel is israeli jewish company, if you support them financially you support the white genocide and jewish supremacy.

Bentley Brooks
Bentley Brooks

B-but I dont have anything to hide!
Everybody has something to hide: CCN, SSN, home address, your kid's class schedule.
Nobody needs to hide everything all the time. You dont need to hide that you played Skyrim for an hour last night, or that you watched "top ten scariest haunted places" on youtube

Luis Hill
Luis Hill

Redpill me on veracrypt full disk encryption

Carter Martinez
Carter Martinez

good for europoors
bad for mericucks

Jace Peterson
Jace Peterson

PC and data destruction methods

Transparent encryption of all data using trustworthy cipher and implementations. Keys generated and stored on tamper resistant cryptoprocessor sitting on a USB device. To destroy the data, destroy or erase the device holding the keys.

Christopher Evans
Christopher Evans

Yeah, we know. What CPUs, then? There are no real contenders.

The only real way to counter these trust issues is to make our own CPUs just like we make our own software. Obviously, no single person can make modern CPUs at home.

Colton Bell
Colton Bell

get your PC from the good guys
Vikings.net - They even have a workstation with 32-core processors and libreboot (SICK!)
minifree.org - edgy tranny sells librebooted thinkpad

Lucas Moore
Lucas Moore

...s

Levi Bennett
Levi Bennett

they don't accept cryptocurrencies

Jack White
Jack White

Could Trusted End Node Security be trusted with online banking

Gabriel Jones
Gabriel Jones

bump in the midst of spam

Bentley Jackson
Bentley Jackson

no, use backbox

Jaxon Lee
Jaxon Lee

your hardware not relevent
wew
tor use fixed cells that are exactly 512 byte size which can be used to id you as a tor user
Yes that is well known because it limits finger printing, and the only solution to not let your ISP know if you use tor is to always use tor.
see:
youtube.com/watch?v=eQ2OZKitRwc
Nowadays encryption has been compromised thanks to intels implementation of crypto in hardware aka backdoors
from physical leak
That's not really backdoors, it's more a very advanced hacking technique.

Joshua Diaz
Joshua Diaz

your hardware not relevent
IT security is only as good as the physical security.
Physical security ensures the device can enter a logical secure state before an adversary has access.

encryption has been compromised thanks to intels implementation of crypto in hardware aka backdoors
AES encryption instructions are difficult to compromise because its result are predictable and uniform, means it can be decoded on an AMD or an older Intel in software.

Dubious are Intel's hardware random number generator in newer processors, due to their intransparency. Random number generation is the number one difficulty in cryptography, as well as checking for proper randomness, nearly impossible, a major weak point.

Gavin Howard
Gavin Howard

Random number generation is the number one difficulty in cryptography
Real talk, how can one inject randomness into the kernels entropy pool? Say I have a script that makes random numbers from a rtl dongle using radio noise. How do you actually use it in the kernel?

Jace Clark
Jace Clark

I am curious and have a few questions. In advance I apologize if this is not the correct place to ask.

I have decided to travel outside of the US and I plan to bring along my laptop. Now I don't have any data that could get me into trouble, but I still do not want anyone snooping through my hard drive. My drive is encrypted and I was told that agents can confiscate my drive or even my entire laptop if I refuse to give them the code. Is this true, and can I get in any kind of trouble for not providing the code?

If it is a common practice, is there a way to fool them? I was thinking something along the lines of disconnecting the hard drive and having the computer automatically boot an OS from an SD card. Not so clever, though I have not thought of anything else yet.

Any information about how common this is and tips on dealing with this situation would be greatly appreciated.

Colton Evans
Colton Evans

I have decided to travel outside of the US and I plan to bring along my laptop. Now I don't have any data that could get me into trouble, but I still do not want anyone snooping through my hard drive. My drive is encrypted and I was told that agents can confiscate my drive or even my entire laptop if I refuse to give them the code. Is this true, and can I get in any kind of trouble for not providing the code?
Other countries can (and do) do whatever they want once you arrive on their soil. Many countries offer no meaningful protection against searches and have no doctrine of presumption of innocence. Depending on where you travel, having them confiscate your laptop could be the least of your worries.

Upon return to the U.S., in practice, customs and border authorities have broad latitude to search your belongings, including your devices.

aclu.org/other/constitution-100-mile-border-zone

Unless you're keen on being the next test case for the ACLU, you'll either unlock your drive when you're told to like a good boy, or not take your laptop with you in the first place.

I was thinking something along the lines of disconnecting the hard drive and having the computer automatically boot an OS from an SD card. Not so clever, though I have not thought of anything else yet.
Maybe that would work. But what do you do if they think something's fucky, and they disappear with your laptop for 30 minutes, then bring it back and say you're free to go? Would you ever trust that machine again?

Sebastian Cook
Sebastian Cook

Think they can keep for 90 days and make clones. Be careful of extra hardware and special firmware updates when you get it back. Can detain and hassle you for a while, but it's not illegal to refuse. Some set up a vpn server with their data and bring only a basic os and vpn client across the border.

Grayson Campbell
Grayson Campbell

I thought about them taking it into a back room and messing with the hardware, and no, I would never trust the machine ever again.

I was too focused on dealing with agents while leaving the US, dealing with agents in another country slipped my mind. I think now I may have to purchase some really cheap laptop and let them check it. All I really wanted was to bring along my digital collection of language learning books to keep me busy if I get tired of picture taking and such things. Maybe a chromebook. Any way, thank you for your input.

Adrian Peterson
Adrian Peterson

I was too focused on dealing with agents while leaving the US, dealing with agents in another country slipped my mind.
I've been out of the U.S. a handful of times. In my (admittedly limited) experience, getting out of the U.S. is no problem. They're keen to make sure your passport is in order, so you don't end up stranded somewhere without proper documents, but otherwise I don't recall any scrutiny more serious than what you get for a domestic flight these days. Getting in to Europe was no problem, either. I guess they see a white, clean-cut guy with a U.S. passport and just don't get worried. Never been harassed or subjected to any unusual scrutiny. In one Euro country, they barely glanced at my passport before waving me through and didn't even look at my bags. Not in front of me, anyway. And this was after 9/11.

In the couple Asian countries with advanced economies I've visited, they were a bit more thorough than that Euro country and asked several questions, but didn't ask to see any of my devices.

Now, getting back in to the U.S. is another matter. Sometimes they only ask a few cursory questions, but occasionally they'll ask more probing questions, like they're trying to trip me up or get me to say something inconsistent so they can drag me to a back room for an interrogation. That's never happened, but of all of the places I've traveled (which are, granted, all countries that get a lot of U.S. tourists and have good relations with the U.S.) I'm less nervous going than coming back home.

So YMMV depending on where you're traveling.

Ryder Taylor
Ryder Taylor

Can't learn why privacy matters without first giving up my privacy
It's a learning experience to make you understand why privacy matters. You have to be mentally raped before you understand the importance of privacy.

Attached: MAGAbomb.jpg (29.99 KB, 958x536)

Christopher Butler
Christopher Butler

use icecat
spoof useragent
You're set

Parker Thomas
Parker Thomas

Random number generation is the number one difficulty in cryptography
how can one inject randomness into the kernels entropy pool? Say I have a script that makes random numbers from a rtl dongle using radio noise.
The problem is where to find a source of randomness.
There are several theoretical physical solutions.
In practice the randomness might be pollute by other predictable signals (noise, but not random), like 60Hz hum for example. difficult to generate real randomness (unpredictability).

I'm not a kernel hacker, but maybe that helps:
old
interested in using the circuit as input to the /dev/random device in Linux.
web.jfet.org/hw-rng.html

blog.cloudflare.com/ensuring-randomness-with-linuxs-random-number-generator/
links to
audio entropy daemon
vanheusden.com/aed/
videorandom
vanheusden.com/ved/
Silicon video sensors do have a lot of low level pattern noise that needs to be filtered and are not suitable for dark-field random noise generators. I know your device is just a receiver and the idea is probably to use "static" noise as source of randomness.
The problem is to find a (random) noise signal/source that has very good signal to not-so-random-noise relationship.

Ryan Ortiz
Ryan Ortiz

spoof user agent to jewgle chrome
browser sends other information inconsistent with its spoofed user agent
suddenly you have less common fingerprint
even CIAniggers start laughing at your sheer stupidity

Ian Gray
Ian Gray

Funny thing is, security measures like that (searching notebooks at airports) are pointless anyways as you could literally email yourself the encrypted plans on how to bomb the infidels and just download them in your destination country with a there-purchased computer or even in an internet cafe. It's just another excuse to infringe on people's rights and snoop on them and their hardware.

My advise is to simply do that and not take electronic devices across borders. Take a book. Staying away from all your electronic shit for a few hours is sometimes quite healthy.

Mason Cooper
Mason Cooper

Funny thing is, security measures like that (searching notebooks at airports) are pointless anyways
You are living in the free western world, are you disagreeing with the leadership of party and country, comrade?

Michael Carter
Michael Carter

Redpill me on hard drive destruction

Aaron Martinez
Aaron Martinez

Just get on the highway and play the fucking license plate game. Pick random cars, write em down, and then convert to '\xXX\xXX' string that you can pass to openssl.

Gabriel Roberts
Gabriel Roberts

When did you lose your virginity?
Try stealing that data from me. I dare you.

Andrew Gray
Andrew Gray

LUKS + microwave = unrecoverable shit

Isaiah Carter
Isaiah Carter

A big black guy raped him and it's the time when he lost his virginity!

Jason Cruz
Jason Cruz

I actually lost my virginity that way.

Not the user you were replying by the way.

Robert Torres
Robert Torres

Was it as bad as people make it out to be?

Henry Evans
Henry Evans

As with everything, depends on your threat model.

Full Disk Encryption grants some basic levels of comfort. Someone steals your machine, luks will keep your data safe from the lowlife thief, and the person he shills it to. Drive in an array fails, luks will let you bin it or send it in for warranty repairs/replacement without needing to worry about leaking the partial data on it. Re-purposing the drive? `cryptsetup luksErase <drive>` will return it to near-enough random noise in two seconds by destroying the headers (there are backup sectors, `dd`'ing the first few MB is not enough).

Nation state threats, harder to solve. Digital then physical destruction is best - modern disk controllers do all sorts of clever things that make it harder to digitally erase (another bonus point for FDE - you've never written a plaintext block of data) so total physical destruction is next to ensure coverage. Shoot it, hit it with hammers, shatter the platters, drill through the flash chips, set it on fire, toss it in an engine shredder.

Worried the FBI is coming down the hallway and about to kick in your door? Probably too late by now, they've got enough shit on you to kick in your door but luksErase that shit and hurl the drive out the nearest window as fast as you can. But again, if they're who you are worried about, you'll probably do things differently.

But what is more likely? Your drive fails or is stolen, or the NSA want to get all up in your shit?

Connor Gray
Connor Gray

I have at least one of these in every computer: onerng.info/onerng/

I put a USB hub inside my X200 too, and embedded one inside that - keeps my USB ports free of kinda obnoxiously sized/shaped dongles, and always travels with me.

Nathaniel Roberts
Nathaniel Roberts

What's the best OS for securing yourself against the US government and corporate dataminers?

Samuel Gutierrez
Samuel Gutierrez

Yes. I still didn't recover from it.

Brayden Phillips
Brayden Phillips

You would need your behavior to change. It is all the same shit that just needs to be configured/hardened by someone competent. All your software isn't really much use when you buy ALL of your hardware from these (((corporations))) in the first place. Physical access to a box has been accomplished.

Ethan Sanders
Ethan Sanders

Same as other responder.
Using Qubes/Whonix dispVMs is possibly the best other than Tails.

Wyatt Baker
Wyatt Baker

IBM Power9 is free of backdoors as far as I'm aware

Michael Thompson
Michael Thompson

I've heard some people talk about "undeletable cookies" that are picked up by your browser even if you don't accept any cookies at all from sites. Does anyone here know more about this and how to protect against them?

Jaxon Gomez
Jaxon Gomez

Font fingerprint
js can fetch it with one liner -minified
Other is just vanilla cache if you rarely delete cache
They can also detect if X site favicon is cached (usually not cleared on history deletion)
If favicon is cached and you replied a request that it's not needed to be redownloaded bc cache they will know which sites you visit or probably not yet until they read this.
Browser screen can be spoofed with the right tools.

Other method is if you're using bare IP. they can fingerprint your machine public name immediately easily and even benchmark your speeds and latency or rtc your local NAT IP.

At best you can use a newly installed ubuntu on a decent spoofing VM and spoof the most common canvas though tbb removed that feature from what I've heard.
Actually it would be much more easier to just use android x86 for such cases.
Your problem would be if the kernel is malicious (which is usually the case where it phones and bypasses firewall) this is the time you should be compiling from scratch, use root and AFwall, spoof device IDs and all easily compared to a linux desktop or botnet VM which leaks everywhere.

Xavier Gray
Xavier Gray

Or just use Tor Browser.

Robert Wright
Robert Wright

coverage. Shoot it, hit it with hammers, shatter the platters, drill through the flash chips, set it on fire, toss it in an engine shredder.
no, no, no. most of the time platter fragments can be restored, if only somewhat. get a torch, get the platters fuck hot, bonus points if they melt, and do it to as much surface area as you can. this will destroy the ability of the material to be magnetic ever again, making the data unrecoverable afaik.
of course, you should still drop it off buildings or blow it up in your backyard or put it in a car crusher or whatever just to be sure, but always do both.

Robert Myers
Robert Myers

how about some really strong magnet? wouldnt it be empty or even destroyed if you put it in some really strong industrial magnet.. like those that can lift really heavy things

Kevin Collins
Kevin Collins

Wouldn't encrypting the drive beforehand simply suffice? There should be no need for physical destruction.

Asher Cooper
Asher Cooper

You'd better use hidden volumes of VeraCrypt in case of torture.

Julian Ross
Julian Ross

it could work, but the only 110% way I know of is getting it past the curie point. also, fuck dealing with big magnets.

well sure it would, depending on what threat you're trying to counter. if it's some dude liberating you of your computer, encryption would work. if we're talking hardcore life-on-the-line data, like corporate espionage, gov whistleblowing, crime, etc. you gotta nuke that shit from orbit. any form of encryption can be broken in part or in full by a nation state or similar institution with sufficient funding and motivation, and if they're seizing your hardware, I guarantee they have both.

Samuel Price
Samuel Price

How about overwriting the drive with random data before tossing it into the trash? It was 6 years ago but if we learned anything from Snowden leaks its that encryption cannot be cracked without cooperation of the person who has the keys.

Noah Evans
Noah Evans

There's a typo in the OP and I assume the template.
How to hide questionable images, video, audio, etc. (stenography)
I'd assume you meant steganography and not stenography.

David Davis
David Davis

Common thing some big companies sue is make a backup of their devices, encrypt it, upload it to their private server, then wipe the device. During travel even if you do get stopped the device would have nothing on it, and then nothing for the TSA to suspect.

Once at your final location you can reload the backup to your device (or a new one if you think it had been tampered) and continue on.

Evan Long
Evan Long

Whats the best open source hardware?

Christian Davis
Christian Davis

Stenography might actually work. how many people are still around that can read shorthand? Court stenographers use that special typrewriter. If you started writing shit down in gregg shorthand, who would be able to read it?

So I did some googling, and apparently, cops know shorthand. Kinda invalidates my whole idea. The only people that still know shorthand would be the last people you want to read it in this case.

Cameron Young
Cameron Young

Any sort of "sekrit code" is going to be about as effective as Pig Latin in the face of a determined adversary.

Jason Wilson
Jason Wilson

If you're looking to go cheap, libreboot is a good bet. I've had people vouch for the Talos computers, if you have the money, but those are clearly expensive. I don't know of any non-botnet, non-x86 laptops either, so you're out of luck if you're looking for something decently sized and powerful.

Cooper Cox
Cooper Cox

Are there any good tor remailers or a list of them to line up a good mail circuit? I've damned tried to look for one. Can someone help a fellow user out? What should I search for?

Ethan Mitchell
Ethan Mitchell

Open source hardware is nowhere near fruition. Maybe buy the 4000$ riscv pc that can't even do anything right now or get build the lowest spec Talos II for around ~2500$ while using your own hardware for ram and hdd and also case.
Novena laptop is not entirely open source but more of like "open for hackers" thing especially if you're a fan of hacking into jtag and unlocking system's potentials (tl;dr reverse engineer -enthusiast's wetdream). You can do it yourself as long as you have the parts available.

Chances are these are well-shielded to avoid your magnet and you won't easily find good magnets anyway.
Just bake it in the oven (not microwave).
Snowden leaks its that encryption cannot be cracked without cooperation of the person who has the keys.
That's why you should escrow your keys so they'll just ask some /x/ tier person to find where you hide your phrases.
That doesn't make sense, even AES something will be crackable and it's just a matter of time. Wonder why we're not using the older ciphers? They got owned, shhh. Once this one we are using is owned we'll raise the bar for standards over again and market it as "takes billion years and entire universe's electrons to crack" when there's only some clever trick that makes use of a bug or some cool math algorithms that every hobbyists are doing right now like optimizing prime numbers and sudoku/rubiks every year.
p = np bullshit.

Henry Taylor
Henry Taylor

anonymous VPN
helps but for browsing you need to add browser fingerprint resistance and private browsing too. just use Tor when you can
encrypted email
you need to compartmentalize your accounts and not bridge metadata for this to work

Luke Ortiz
Luke Ortiz

Was it a... pain in the ass

Elijah Murphy
Elijah Murphy

I've never been into disgusting things so I guess gay shit will have to do.
21 years old
3
No
No
I don't really jerk off anymore since my gf is a fucking nympho and I am completely worn out. The only times I get a break is when she is on her period.

Did I do good?

Anthony Sullivan
Anthony Sullivan

gay bestiality
never
none
no, but i shove them up my own
no
yes
nipple electro-stimulation, vibrator-dildo/aneros, and robo-fleshlight

Noah Evans
Noah Evans

hey how about posting your real name and address now?

Gabriel Edwards
Gabriel Edwards

I did not realize this thread was still up when I made another one. Since the template was apparently last updated in 2014, I made a new one I am currently revising. Please read the new one, and suggest improvements to the template.

Landon Lewis
Landon Lewis

modern disk controllers do all sorts of clever things that make it harder to digitally erase
noob. the controllers even have cache now, all strings of file names, it's own computer with its very own network and 3G wireless network stack. It even has a microphone which is used for spying and safely idling when there's strong background acoustics.
destroying drive that can still be put together
not heating it up

Oliver Jackson
Oliver Jackson

Fuck de fed

Henry Morgan
Henry Morgan

tfw shitposting box is librebooted, full disk encrypted and hardened
Wow.

Jacob Richardson
Jacob Richardson

Wow.
I take it this is not standard practice where you come from?

Brayden Lewis
Brayden Lewis

HAPAS ARE SUPERIOR TO WHITES

Julian Turner
Julian Turner

So what is the security status of the raspberry pi exactly? I know it has some non-free components but is it actually botnet? I'm fairly certain it has nothing on par with ME/similar. What's bad about it and what's good?

Justin Parker
Justin Parker

HAPAS ARE SUPERIOR TO WHITES

Michael Thomas
Michael Thomas

HAPAS ARE SUPERIOR TO WHITES

Carson Allen
Carson Allen

HAPAS ARE SUPERIOR TO WHITES

Charles Mitchell
Charles Mitchell

HAPAS ARE SUPERIOR TO WHITES

Blake Young
Blake Young

HAPAS ARE SUPERIOR TO WHITES

Isaac Fisher
Isaac Fisher

HAPAS ARE SUPERIOR TO WHITES

Christopher Mitchell
Christopher Mitchell

HAPAS ARE SUPERIOR TO WHITES

Anthony Gonzalez
Anthony Gonzalez

HAPAS ARE SUPERIOR TO WHITES

Luke Cooper
Luke Cooper

HAPAS ARE SUPERIOR TO WHITES

Ayden Wright
Ayden Wright

HAPAS ARE SUPERIOR TO WHITES

Lucas Cooper
Lucas Cooper

HAPAS ARE SUPERIOR TO WHITES

Benjamin James
Benjamin James

HAPAS ARE SUPERIOR TO WHITES

Camden Phillips
Camden Phillips

Bump. Fuck this spammer
Where are the fucking hot pockets?

Attached: large-1.jpg (37.36 KB, 750x497)

Jaxson Scott
Jaxson Scott

e-celeb thread

Liam Green
Liam Green

Judensheim pls go

Ryan Myers
Ryan Myers

Wow. Just wow.

Adrian Flores
Adrian Flores

Yeah, right, and the moon is made of cheese.

Jeremiah Perez
Jeremiah Perez

Where are all these shills coming from?

Sebastian Butler
Sebastian Butler

Can you jewish paid shills go kill yourselves already?