Along those lines, depending on how far the black project surveillance goes, DPA with smart power meters should pick up coded comms if the flare can make hardware with known power draw characteristics modulate power use. In physical penetration scenarios, mics getting coil whine could be used in a 1-2 punch on a totally isolated (no any-net) system.
Bah, I am digressing!
Logan Kelly
A steganographic file system, for example, is a partition of your hard drive hidden within the normal file system. Hidden not like a "hidden file" in the OS, but rather the bits which make up the partition itself are spread all around the hard drive rather than being a big lump of gigabytes all together. This hides the existence of the partition from data dump systems and makes all of the information look like junk data if you're just reading files straight off the drive.
Thomas Edwards
exactly I am against just shutting down the sites like the retards have done on voat.co seriously they are dumb asf I posted this there and a retard commented on the pop-ups he got from some game ??? like wtf trying to derail asf and they just shutdown sites (((Gaetanne Antat))) as if that solves anything
Hunter Phillips
Can you go into any detail why this over Tails? I don't know that much about this stuff and anything that is less well known will have less attackers. Curious why you like this one user.
Jackson Hernandez
Forgetting the password would net them less jail, but if only one is arrested so there's no Nash squeezing possible.
Doesn't this require a map of all written files to prevent collision on write?
Brandon Brown
But there's nothing hidden in those files. What another user suggested is probably the case, posts by bots smart enough to inject context into their comments. Files are too small, data is not compressed. At best there's URLs hidden somewhere in the pictures, which point to the real cp and it's those off-site pictures that perverted comments refer to. But I still think bots is more likely.
Grayson Perry
I'm the same user, but these threads are always useful to try to learn things from other anons who know about these things. I think we should all strive to know a bit about this type of stuff given the age we live in, but some of us might be "to old" to learn such a thing in depth.
Christopher Brown
One VM is the router, with one side facing the net and the other a virtual LAN (etherstub), hosting Tor with SOCKS port on the virtual LAN side, and a second 'view' VM with ONLY the virtual LAN for connection.