WAYS OF COMMUNICATION

Angel Lee
Angel Lee

what safe ways are there to communicate with:
-humans you know from real life
-humans you know from internets
it has to support Tor and not be a botnet
examples: email, instant messaging apps, voip, cellphone
what should you choose for those two scenarios?
or is communication with humans a mistake?

Other urls found in this thread:

briarproject.org/

Juan Wilson
Juan Wilson

humans you know in real life
talking to them in real life, at work, at school whatever
humans you know from internets
retroshare

Easton Morris
Easton Morris

What a sad waste of digits

Attached: 1285096582633.jpg (19.68 KB, 268x265)

Noah Myers
Noah Myers

implying they won't have a google home, amazon alexa, or even a smartphone in their pocket recording everything you say

Xavier Lewis
Xavier Lewis

How bout you just stop worrying about if the evil jews and cia are watching you and just use the same software everyone else uses. I swear sometime it feels like half the people on Zig Forums have paranoid schizophrenia.

Alexander Foster
Alexander Foster

email - disroot with pgp encryption
instant messaging - xmpp with OTR
voip - jitsi, or don't use it
cellphone - don't use it

Connor Wood
Connor Wood

based

Carter Morgan
Carter Morgan

What a waste of quints.
what safe ways are there to communicate with:
-humans you know from real life
Put a condom on your tongue when you talk to them.
-humans you know from internets
Put condoms on your fingers when you type.

100% safe comms. No word-AIDS for you!

Now go and think about a more intelligent way to ask what you want to know before you try again.

Carter Young
Carter Young

Real life - at home, with loud music playing and speaking to each other's ear to prevent the wall mics and pocket mics from hearing your conversation
from far away: your own XMPP server with OMEMO

Connor Fisher
Connor Fisher

shame Terry didn't run you over too.

Anthony Ortiz
Anthony Ortiz

Nice get.
Ham Radio, 802.16, 802.11
By safe you mean where your comms aren't breached right?
You can't do that but at least you can hide your ass under a burner device or account.
why
3LA can breach undersea cables with their submarines and they don't care whether the data is encrypted or not. They can just crack them once it breaks like how the previous encryption got obsolete. Telecommunications have 3LA backdoors and FCCIA
or is communication with humans a mistake?
Why bother? Are you a potential target? Then you shouldn't put comms on wire/wireless but on a tavern/pub through speak or messenger pigeons.

Landon Miller
Landon Miller

comcast IP
no

Mason Bell
Mason Bell

whisper next to a running tap while covering your mouth and inside a faraday cage

Blake Wood
Blake Wood

Yes radio is safe. Nobody can intercept that.

Gabriel Young
Gabriel Young

Why the fuck would you want to talk to people

Ryder Russell
Ryder Russell

talking to them in real life, at work, at school whatever
but how to schedule appointment with them?

implying they won't have a google home, amazon alexa, or even a smartphone in their pocket recording everything you say
this. what to do if they have smartphone with them?

get the fuck out of here CIA nigger before I holocaust you and turn you into soap

voip - jitsi, or don't use it
cellphone - don't use it
normies now require a phone number even if you just want to buy something or go to doctor or other service

instant messaging - xmpp with OTR
but what if you have many contacts in your xmpp account, will all of your friends see same xmpp ID of you?

Why the fuck would you want to talk to people
not sure. should stop?

Dominic Edwards
Dominic Edwards

Good question. I honestly can't answer. I've gone partially normie and used a non-account tethered phone for communication. I try my best to get people to use secure platforms, but it's not very sucessful in most cases. I don't just defoo the people, I just accept that I have to use a cellphone and try to detach it from myself as much as possible.

Leo Ward
Leo Ward

Seconding xmpp with omemo. Even retarded normies can be convinced to do it with some handholding because it's not that hard to make an account and install a program. makes a good point though, trying to secure comms is good practice but the recipient is always the weakest link. They could be logging your convo or have malware spying on it. Nothing you can do there. But at least some glow in the dark has to jump hoops and waste his time to get you.

Also drape a big shroud over your heads so they can't lip read you amirite

And kill your friend after so he doesn't betray you

Isn't encrypting radio very illegal in the US?

normies now require a phone number even if you just want to buy something or go to doctor or other service
They rarely actually call that number, mostly send automated texts. It just sits in their db for years until they sell to a telemarketer. If they do call but can't reach you they'll shrug and move on. So you can get away often with giving a fake number.

You could also get VoIP number so you can make calls from your computer but that's expensive and you have to give your details anyway when subscribing. You could use something like Google Voice or Viber for free, but then you've joined a botnet anyway. One thing that works though if you get a new phone number, make a GVoice account, then cancel that number, Google doesn't really care and you can use that Voice number forever.

Lastly you can get a cheap disposable phone with no ID. You'd still be carrying a tracking device though, unless you left it at home.

Daniel Lopez
Daniel Lopez

humans you know from real life
Briar.
humans you know from internets
Tox, since Briar doesn't support a simple remote way of adding friends. It might be a better solution since it's also available on desktop and supports calls while Briar is in early development.

But this implies that both of you are using non-botnet OSs.

Colton Hughes
Colton Hughes

and used a non-account tethered phone for communication.
what's that?

I try my best to get people to use secure platforms, but it's not very sucessful in most cases.
If they refuse, then do not communicate with them. but thing is, what platforms are secure? I don't know any

Seconding xmpp with omemo.
They could be logging your convo or have malware spying on it.
there is another problem with xmpp
you have a single account name/identifier
so you send same account name to person A, person B, person C, etc
those people can compare and know it's same person (you) who talks with them
this is especially dangerous if you used same xmpp account for real life contacts and internet contacts

another problem:
xmpp server or your contacts can monitor when are you online, then this can be used to compare when one of Tor users is connected to Tor network at same times

Isn't encrypting radio very illegal in the US?
I don't give a fuck about law, neither should you

You could also get VoIP number so you can make calls from your computer but that's expensive and you have to give your details anyway when subscribing.
you can give fake details. and pay using anonymous methods
but there are problems:
-like with xmpp, voip server can log when are you online and connected, when not. then can be compared to when one of Tor users is connected to Tor network only at those times
-if you get sudden connection loss in voip, they could check who got disconnected from their internet or from Tor network

Google doesn't really care and you can use that Voice number forever.
for incoming calls? or both?

Lastly you can get a cheap disposable phone with no ID. You'd still be carrying a tracking device though, unless you left it at home.
even if you keep it at home it's still very bad
you will make them know where you live and you will make them know every time you change your address
they could also call you to check if you are at home or not

Briar.
this is only for jewphones, so it's automatically a botnet

Tox
isn't it a meme and broken?
also, since it's p2p you can only get messages when both you and sender are online
and they could see and track when are you online

Robert Ward
Robert Ward

what's that
some phone that isnt an i/windows/android phone that needs you to login to nsa.gov to make calls
then do not communicate with them
in some cases it's not that easy, but again, I do my best
I don't know any
I've only used, in this order of frequency:
retroshare
mumble using a very secure vm that is isolated and only accepts certain hosts( for use with irl friends since it's relatively undifficult)
tox(I no longer use)

Cameron Mitchell
Cameron Mitchell

so it's automatically a botnet
LineageOS exists.
Anbox exists.
can only get messages when both you and sender are online
and they could see and track when are you online
I don't see anything wrong with this. How else would you make a serverless communication app? Anything that has a server is automatically shit since you depend on someone else's services. Anything that needs email/SIM to register is automatically a big fucking no. You're left with nothing else, other than XMPP which only has a working client on android (it's desktop clients are featureless trash which desync randomly), doesn't support calls/video calls and is server oriented just like email so your account can be shut down either by accident or deliberately forcing you to make new accounts whenever a host dies. And if you're going with this route Matrix is a far superior protocol so I'd use Riot.im or another client.
isn't it a meme and broken?
I don't see how it's broken. I was testing video calls and calls on it and it worked fine on qTox and Trifa.

Ryder Russell
Ryder Russell

CIA looking for people to hassle
Man, this guy's stuff is locked down tight
Bet he has something to hide
user gets black bagged
Meanwhile the fellow in the trailer down the road is just copy pasting CP onto flash drives and selling them via word of mouth.

Luke Carter
Luke Carter

You're doing it wrong, m8. If it's actually locked-down *tight*, then they can't even see it or know it exists.

Levi Thomas
Levi Thomas

some phone that isnt an i/windows/android phone that needs you to login to nsa.gov to make calls
but it still has backdoored hardware and it connects to cellular networks, they can track the position

LineageOS exists.
Anbox exists.
what's the point? even if it isn't a botnet, it runs on botnet hardware, so it's a botnet

I don't see anything wrong with this.
you don't see anything wrong that they can check when are you online and offline? and then use it to deanonymize you?

Lucas Cooper
Lucas Cooper

Your absence or deviation from the typical internet usage patterns of what is typical for your demographics can be a flag in and of itself. Governments are aware of this as we know in the Chinese social credit system a lack of participation in social media and other typical behaviors is seen as negatively affecting your score.

William Anderson
William Anderson

you have a single account name/identifier
Uh, no you can create multiple accounts and most clients make it very easy to use them. That's like complaining everyone knows your email because you have only one address.

xmpp server or your contacts can monitor when are you online
You could just keep have tor connect/disconnect randomly throughout the day, and only log on to XMPP sparingly.

You're right though, XMPP wouldn't help if someone took over most of the Tor network to such an extent.

for incoming calls? or both?
Both, you can even call international if you put some money in it.

even if you keep it at home it's still very bad
they could also call you to check if you are at home or not
The idea isn't to be a cyberninja who can't be detected no matter what even if every alphabet ever made it their main and only mission to catch him. It's to make a tiny bit of effort so that at least your data is not up for grabs to any clown out there like server op, cell provider, isp, advertisers, trackers, skids who break into the serb, companies who buy the database and so on. Government can still get it if they try.

Brayden White
Brayden White

You realize that your front door's lock is probably very easily picked, right? You realize that someone could just wait outside your house to figure out when you're out, break in and install a hardware keylogger? When's the last time you even checked?

Landon Rogers
Landon Rogers

How do install a hardware keylogger? Aren't they as easy to remove as they are to install?

Jaxon Brooks
Jaxon Brooks

They could install it inside any of your usb peripherals. But unless you're using full-disk encryption, it's probably easier to just embed a software keylogger into your OS

Jack Campbell
Jack Campbell

runs on botnet hardware
So does your entire PC.
Librem 5 and Pine64 Phone are getting released soon.

don't see anything wrong that they can check when are you online and offline
Yes. I don't see anything wrong with that. At best they can just guess where you are within 6 timezones. You can leave your device connected whenever you want and it's not like there's a single better way of message delivery. Who the fuck will track you here? There isn't a central server. You can only be tracked by your contacts and if you're dumb enough to add a random CIA nigger as a contact then you'd be tracked no matter what service you use. Majority of other services provide delivery reports. You can't run away from this and the fact that you're trying to means you don't understand how communication works.

Luke Brooks
Luke Brooks

irl communication: smoke signals
internet communication: pictures of smoke signals

Attached: 35c46c135c0d178c38ce500c242f7c91b5729870fd84e0308681b298cba6708a.png (289.63 KB, 1271x1883)

Anthony Morris
Anthony Morris

First of all define the people you are communicating with.
Are they dumb?If they're dumb, setting up a hardened network is useless if they'll just flaunt their latest botnet handheld device, use it, and expose all your comms to 8 three letter agencies and several rogue dataminer apps and they're not done yet and even even put your real world name and picture under your super-haxor 'anonymous' contact number/uri/mail that will sync tonight with their google play account services and you just stare as it's written in that 50PiB cloud forever under RAID10.
Second, What info do you need to communicate that requires you to hide it?
If it's just some small talk dumb comms like going to the X restaurant tonight or sending a meme then you're just wasting time here and just go on with your daily life as goyim, never look back.

If not dumb,
Near-future suggestion would be to buy the Huawei Balong 5G with NSA/SA (Non/Standalone) once it's out.

From what I heard you could do wide local-area networks with 5G much like wifi/wimax "meshnets but for dummies" and without the need to configure a crappy software plus it'll have highest data throughput and signal strength reaching kilometers is my guess IF you have the proper antenna and configuration. Think of it as wifi hotspot/AP but 5G standard.

There's also been very recent issues with huawei routers breaching privacy with their backdoored modem (probably sends visited URLs to a chink company) but from what I know the higher-up guys on Huawei were already caught and jailed and for some reason the chinks still trust huawei since it's still the most easily crackable modem that can do radio cell bands (openwrt btfo) that you can even change the fucking IMEI by rewriting with NV flasher and even lock frequencies or even add new ones.
Also the backdoors on modems is a commonplace happening on any manufacturer around the world. It's probably just that Huawei being much easier to crack (replace the ROM) among Chinese/Russian true hack forums probably sparked this backdoor propaganda by their weaker competition.

Dominic Gutierrez
Dominic Gutierrez

Uh, no you can create multiple accounts and most clients make it very easy to use them. That's like complaining everyone knows your email because you have only one address.
that's wrong. you shouldn't need to create multiple accounts. it should, by design, provide unlimited account identifiers so you would give different identifier to every person you contact with. just like bitcoin clients can easily provide you 50 bitcoin addresses (or more if you need)
if you need to create multiple accounts, you will be lazy to do it and keep using one account for many contacts

You could just keep have tor connect/disconnect randomly throughout the day, and only log on to XMPP sparingly.
but then you won't receive a message instantly when someone sent it to you

You're right though, XMPP wouldn't help if someone took over most of the Tor network to such an extent.
they don't need to take over Tor network. all they need is to have your XMPP server to tell them when you login and logoff from your account, or get that data from XMPP server ISP, then compare it against when Tor users connect to Tor network, this can be received from all ISP

You realize that your front door's lock is probably very easily picked, right?
it's not easily picked. and there is many locks to pick before getting to my PC

You realize that someone could just wait outside your house to figure out when you're out, break in and install a hardware keylogger?
what if he breaks in, but someone else is inside house?
what if neighbours see it and report to police but also tell me when I am back?
what if alarm in the house starts?
what if they activate traps and explosive devices?

When's the last time you even checked?
PC is easily visible and I often connect or disconnect something, would quickly figure out, then remove hardware keylogger and make password change in FDE

You can leave your device connected whenever you want and it's not like there's a single better way of message delivery.
you cannot leave your PC running when you are outside of your house. FDE only works if the PC is turned off. if they get your PC while it's running, they can read password from RAM

Second, What info do you need to communicate that requires you to hide it?
If it's just some small talk dumb comms like going to the X restaurant tonight or sending a meme then you're just wasting time here and just go on with your daily life as goyim, never look back.
wrong. everything should be hidden from CIA niggers and encrypted. the harder it is for them to get any data, the better.
just like with Tor network, you shouldn't use it only for buying bombs and weapons, you should also use it a lot for watching cat photos, so there is a lot of noise

Jacob Long
Jacob Long

Try Briar - briarproject.org/

Henry Walker
Henry Walker

cannot leave your PC running when you are outside of your house.
The fuck am I reading.
they can read password from RAM
Password for what? Your RAM can be read without you knowing even if you're literally using the PC.

then you won't receive a message instantly when someone sent it to you
Tell me, genius. How would you ever receive a message without being online? Are you retarded? What's your solution to message delivery, come on. The only other solution is leaving messages in """cloud"""/servers, which is worse than p2p.

compare it against when Tor users connect to Tor network, this can be received from all ISP
If you're this paranoid you can buy a 4G router and buy a SIM card without registering it, then just keep paying for it with cash.

Elijah Johnson
Elijah Johnson

Try Briar - briarproject.org/
this shit only runs on jewphone

cannot leave your PC running when you are outside of your house.
The fuck am I reading.
you leave, then CIA comes in, reads your FDE password and all your CP and bombs

Password for what?
for Full Disk Encryption

Your RAM can be read without you knowing even if you're literally using the PC.
cannot, I do not allow. If they come in, I kill them and pull electricity from the PC

Tell me, genius. How would you ever receive a message without being online? Are you retarded? What's your solution to message delivery, come on.
I don't know how and I don't care. If you use chat programs, CIA will know when you are online, when not, they use it to deanonymize you.

The only other solution is leaving messages in """cloud"""/servers, which is worse than p2p.
at least the person sending message won't know if you received it and when you received it. also, both of you don't need to be online at same time to communicate

compare it against when Tor users connect to Tor network, this can be received from all ISP
If you're this paranoid you can buy a 4G router and buy a SIM card without registering it, then just keep paying for it with cash.
that won't help in this case. they can still compare against you too, if they find your SIM to be one of the guys they look for, they can use triangulation to find where your flat is, then when they arrive they can use some scanners to identify where your room is. they will hunt you by the signal level, just like with WIFI

Adam Brown
Adam Brown

CIA comes in
Lock your doors, hide your PC/phone, lock them into a safe, put cameras all around your house. Pretty sure it's legal to make non-lethal traps in some countries/states, use those. Make a killswitch which will wipe your PC and then emit a small EMP.
cannot, I do not allow. If they come in, I kill them and pull electricity from the PC
RAM can be read by software and completely remotely.
at least the person sending message won't know if you received it
Why are you even communicating with people you don't want to communicate with? Why aren't you then using a separate account for every person? Why are you trusting a random server more than people you talk to?
You can use a (((blockchain))) communication app, which solves exactly what you want to solve. It's serverless, distributed, doesn't need both parties to be online and nobody knows when YOU receive a message.
they can use triangulation
Yeah ok. But if your attack vector is hiding from the government then you literally can't win, and your chances of winning are 0 if you want to use internet.
Either way, there's nothing binding you to an unregistered SIM card. That's why they're illegal in Germany, for example. You can leave it outside or even in your house and say it isn't yours. Also, there's nothing stopping you from buying a new one every week, other than the cost. But, how exactly will they know what you connect to and if you're the person they're looking for if you route all your traffic over Tor? Your IP is hidden from everyone except the entry node, so a person you're chatting with won't know shit about you.