[ / / / / / / / / / / / / / ] [ dir / asmr / aus / d / f / htg / just / kpop / wai ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Name
Email
Subject
Comment *
File
Select/drop/paste files here
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

File (hide): 565eebde15278ce⋯.png (48.93 KB, 731x600, 731:600, VeraCrypt_Logo.svg.png) (h) (u)

File (hide): a495f09b4d71055⋯.png (76.75 KB, 636x278, 318:139, keepass.png) (h) (u)

File (hide): 2990dfca9912e08⋯.png (446.78 KB, 3401x924, 3401:924, openssl-logo.png) (h) (u)

[–]

 No.784316>>784331 >>784334 >>789376 >>798011 >>805126 [Watch Thread][Show All Posts]

>tfw migrating all my hard disks, internal and external, to either Veracrypt NTFS or LUKS ext4

>tfw setting up dnscrypt and having dnsmasq enforce DNSSEC

>tfw setting up OpenVPN on the router level and connecting to a VPN 24/7

>tfw migrating all my saved passwords on Firefox and Chromium into KeepassXC

Who else /goteverythingtohide/ here?

 No.784320>>784329 >>805128

File (hide): 7734d1f244f25f9⋯.png (485.43 KB, 490x476, 35:34, 773.png) (h) (u)

Is this you?


 No.784329>>784330 >>789510 >>805128

>>784320

Less anime and more gay porn.


 No.784330

File (hide): 05d70be874bb6c4⋯.jpg (80.71 KB, 819x1080, 91:120, 101531514.jpg) (h) (u)


 No.784331>>785163 >>785906 >>789397

>>784316 (OP)

>he follows best open source practices

>his hardware is still compromised at ring -2

enjoy your placebo


 No.784334>>784346 >>784384 >>784781 >>789462 >>789471 >>789513 >>799685

File (hide): 8a182f5f4a5a0c0⋯.mp4 (4.03 MB, 640x480, 4:3, gondola_room.mp4) (h) (u) [play once] [loop]

>>784316 (OP)

>encrypting everything

>gets tortured due to not giving out a password

>continue to be tortured indefinitely due to possible second layer deniable encrypted volumes

I never get you people who encrypt stuff. You're just asking to be killed in the most horrifying ways possible.


 No.784346

>>784334

Yeah, but they won't see what a fap to. It's a win/win


 No.784365

For me, computer privacy is a mix of a hobby, being paranoid and wanting to be ready for the future where lolicon is illegal.


 No.784375>>784386 >>784430 >>788659

>hurrdurr hardware is compromised

Remember that one guy the FBI wanted? He used TC and they never got his shit.


 No.784384

>>784334

Id rather die on principal than live in submission.


 No.784386>>784420 >>784421 >>785127

>>784375

Really? Isn't Truecrypt broken?


 No.784420


 No.784421

>>784386

Your brain is broken


 No.784430>>784433

>>784375

Is it true that TC was written by anonymous arms dealer?


 No.784433

>>784430

>anonymous

no

>arms dealer

yes


 No.784542>>784730

is this bait?

let's see all the memes you listed:

>keepAss

>ext4

>DNSSEC

>VPN

can't remember what veracrypt is but it's probably a meme as well

>hurr dur nobody can spy on me now that i forwarded all my traffic to some other single IP address


 No.784730>>784779 >>799659

>>784542

You odn't understand what a meme is, do you


 No.784779>>784786

>>784730

VPN is a MITMeme


 No.784781>>785906

File (hide): 0af4758f826341c⋯.jpg (68.76 KB, 444x637, 444:637, mAHO.jpg) (h) (u)

>using Windows

>bringing it online

You've already been compromised, but good job anyway.

>>784334

You think the fucko squad is going to roll up to the door of every NEET on /tech/ and beat them bloody until they cough up the passwords to their gay porn stash? There is literally no reason not to use full disk encryption.


 No.784786

>>784779

You odn't understand what a MITM is, do you


 No.785007>>785164

Should I use TrueCrypt or VeraCrypt?


 No.785127

>>784386

not in a way that allows to attack an offline system.


 No.785163>>789526

>>784331

>coreboot doesn't disable AMT

get with the times gramps


 No.785164

>>785007

Veracrypt is a better honeypot if you download binaries

Truecrypt trusts the backdoored TPM

compile from source


 No.785192>>785853 >>785892 >>799675

> setting up dnscrypt

HTTPS GET still goes in plaintext, your VPN provider will see you visiting forums full of inane comments and mark you as suspicious for feds for being too smart and not using google dns like everyone else.

DNSSEC is literally useless unless you are gonna check every domain you visit for compliance manually, because there are maybe 5 or 6% overall, and let me guess, CZ NIC firebox addon? Nice, now you have a non-unique browser fingerprint.

>Keepass

Good luck with rootkits and keyloggers stealing all your passwords, get a hardware password manager and auth token or make one yourself with faggot ducky or arduino.

My next revelation will be that "full disk encryption" is not really full, unless you have an external bootloader no one knows about.


 No.785853

>>785192

you seem to know your shit, tell me about bane, why does he wear a mask?


 No.785892

>>785192

>HTTPS GET still goes in plaintext,

Incorrect.


 No.785906>>788659 >>789387

>>784331

>>784781

Virtually all systems in the world are trivially accessible to US law enforcement and intelligence agencies using methods that are totally impossible detect, you can't even see the traffic on your network. Despite this, they need to develop exploit and hacking tools against Windows and other systems and need to seize servers and need to undermine encryption. If you believe this, you have gone full /tech/.


 No.788659

>>784375

>hurrdurr hardware is compromised

>Remember that one guy the FBI wanted? He used TC and they never got his shit.

he was using old hardware, without INTEL ME

>>785906

They need exploits only for Windows. For linux they just plant backdoors into linux code, as it's open source.


 No.789376

File (hide): 038028d8e68b55f⋯.jpg (60.27 KB, 1080x1064, 135:133, 038028d8e68b55f2012c64d4be….jpg) (h) (u)

>>784316 (OP)

>dnsmasq enforcing DNSSEC

What is the benefit using dnsmasq over unbound?


 No.789387>>789388 >>789464

File (hide): c29953e38c7f12e⋯.png (85.03 KB, 492x280, 123:70, Doubt.png) (h) (u)

>>785906

>using methods that are totally impossible detect, you can't even see the traffic on your network


 No.789388>>789396

>>789387

>he doesnt know about backdoors at the hardware level

lmao


 No.789396>>789413 >>789509 >>789534

>>789388

>implying hardware backdoors can hide network traffic


 No.789397

>>784331

op is still safe against his mom logging into his pc

also against facebook and google spying

maybe or not safe from microsoft

he is safe from his isp

there are other threats to defend against besides the government


 No.789413>>789416

>>789396

yes?????????


 No.789416>>789427 >>789433

>>789413

You're wrong. They can't do that.


 No.789427>>789428

>>789416

>backdoored hardware cant lie to you

ok


 No.789428>>789497

>>789427

Who are you quoting? Backdoor hardware can lie to you. So stop using backdoor hardware.


 No.789433


 No.789462

>>784334

>I never get you people who encrypt stuff. You're just asking to be killed in the most horrifying ways possible.

Thinking such people wont kill you anyway because they believe your unencrypted hard drive is a diversion.


 No.789464

>>789387

>>using methods that are totally impossible detect, you can't even see the traffic on your network

<Doesn't know networks originate from DARPA

<Doesn't know who DARPA is


 No.789471

>>784334

>never encrypt anything

>literal nigger comes into house and steals laptop

>takes all money from bank account

<inb4 muh 2fa muh best practices


 No.789477

this thread has taught me i have no chance at all lmao

i'm stlil assuming luks/veracrypt are secure


 No.789497>>789499

>>789428

>Backdoor hardware can lie to you.

yes. that is what i wrote.

>So stop using backdoor hardware.

you can't. every piece of hardware is backdoored. prove me wrong


 No.789499>>789502

>>789497

your mom is back doored


 No.789502

>>789499

LUL XDXDXDXDXDXDXD


 No.789504>>789506 >>789516

File (hide): 25d2870b7607938⋯.jpg (286.86 KB, 3024x1728, 7:4, furman power filter.jpg) (h) (u)

Make sure to get a powerline conditioner so the gov can't hack you over your powerline.


 No.789506>>789507 >>789516

>>789504

also use a back-up battery so they can't isolate your location you via forced brownouts.


 No.789507

>>789506

>you

not sure how that got there


 No.789509

>>789396

this would be interesting, you would have to have compromised routers AND switches synced up to use a hidden vlan. Would be interesting to produce a demo


 No.789510

File (hide): 94c1c76331aacf6⋯.png (21.42 KB, 900x900, 1:1, PepeNotAmused.png) (h) (u)

>>784329

How horrible.


 No.789513>>804375

>>784334

I use it to securely erase data for system re-installs on ssd devices that would otherwise require secure-erase + dd urandom


 No.789516>>789517

>>789504

backdoored

>>789506

backdoored. probably even gps


 No.789517>>789519 >>790502

>>789516

enlighten us on how capacitors are back-doored jk im filtering you with the rest of the one-liner non descriptive shitposts


 No.789519>>790502

>>789517

>oyyy veyyyy! shut it down!!!

found the damage controlling kike. the holocaust will happen.


 No.789526>>789533 >>793603

>>785163

>implying the Jewtel eepro100/eepro1000 chip on your MB which for the past 20 years is powered when off, has direct access to ram, and receives data from the internet isn't compromised


 No.789533>>789536

>>789526

Welcome to ARM computing.


 No.789534

>>789396

They can. For example, let's say you have some data to exfiltrate. You encrypt it so it's unrecognizable from random data then start passively leaking it out in place of random data in protocols. A good candidate are initial TCP sequence numbers which are random for security. Each TCP connection can leak 8 bytes of your data this way.

A TLS connection can leak much more via the "random" session key. You have no way of telling that this is happening without access to the source. Even worse, this could be happening in hardware beyond your sight - imagine if the hardware RNG is feeding these components this data.

So all the NSA needs to do is spy on you browsing redtube or your OS downloading security updates or keeping your clock in sync via NTP and reassemble the data from the "random" protocol components.


 No.789536>>789538

>>789533

>ARM

Our ARM boxes have eepro1000 chips. Amusingly, so does China's Loongson-based boards for security. Welcome to being fucked.


 No.789538

File (hide): e84f552316859c2⋯.png (403.68 KB, 902x958, 451:479, chink.png) (h) (u)

>>789536

Adding for reference. They built their own MIPS processors for security but used Intel ethernet controllers on the boards.


 No.790502>>790506 >>790507

>>789517

>>789519

You know if you don't live inside of a faraday cage with no doors or air holes you're backdoored. Prove me wrong.


 No.790506

>>790502

You aren't wrong unfortunetely. Everything is a fucking botnet.


 No.790507

>>790502

How does one test for a GPS in a battery pack?


 No.793577>>793663

So what? VC better/more securely TC or i should stay on TC/tcplay any longer?


 No.793603>>793663

>>789526

dammit

how do i fix


 No.793663>>804488

>>793577

VC

>>793603

Use addin card for NIC


 No.793727>>793748

Ethernet hardware being compromised is practically a given. With that, they can cut through any firewall and network without being detected or observable. Their chips do the routing and those magic packets would never be delivered to userspace so you'd never know even if you were running tcpdump. Even if you turn some of the boxes off they could still route through them. You'd have to physically disconnect them.


 No.793748

>>793727

I guess, passive sniffer built around fpga would sense any activity not meant for userspace.


 No.795331

bump


 No.797774>>797776

Literally everything in technology is compromised. If you haven't made it from scratch yourself , it's compromised.


 No.797776>>797779

File (hide): 8cf41d91edf3a9e⋯.png (113.19 KB, 245x280, 7:8, NEO HA HA.png) (h) (u)

>>797774

<Implying an anon is sane enough to even trust himself


 No.797779

>>797776

>make it yourself

>it's full of holes you don't even know about because you're not a one-man security company

>use one from some corporation

>all the holes are plugged except for the giant one they purposefully put there to spy on you


 No.797881>>798020

Unpower your computer and use pen and paper. ;)

There is no way to hide with a computer today.

Not only does most CPU's have built in backdoors running with ring-2 access.

Your harddrives firmware also have backdoors impossible for you to do anything about.

But do you really have to hide? The paranoia is probably getting you. No one gives a fuck about your secrets and private shit unless you trying to do something really stupid.

The basics to protect against people trying make money on your identity and such stuff is enough.


 No.798011

>>784316 (OP)

BTFO FBI


 No.798020

>>797881

>Unpower your computer and use pen and paper. ;)

>implying pen and paper aren't human-readable

I have build a computer with hermit crabs under a system I call HCSA(Hermit Crab Switching Algebra). It's a little slower than your everyday CPU, but it is still turing-complete, and I'm even working on porting the Linux kernel over to it.


 No.799659

>>784730

>he doesn't understand the meme meme


 No.799675

>>785192

>your VPN provider

Buy vps and set it up yourself. Why would I let some pajeet on a nsa payroll do it for me?


 No.799685

>>784334

It's only a problem if someone is after some particular data with absolute certainity that you have it. Otherwise nothing stops you making double bottom/hidden partition. Make outer layer look suspicious with kali linux and halfchan in bookmarks, put some l33t hacking books on your reading list and spice it up with mlp r34. Keep your rare spurdo memes in the deepest layers that no one will ever reach.

The downside is inconvenience of accessing and working around it. But it's always about trade-offs


 No.804375

>>789513

And even then /dev/urandom would be pretty much useless because of wear leveling.

Encrypt your shit, people, ==ESPECIALLY SSDs==


 No.804488

>>793663

Which add-in NIC's are safe?


 No.805126

>>784316 (OP)

VeraCrypt is good but isn't it exactly the same as Encfs?

I mean, other than storing directories as bins instead of directories.


 No.805128

>>784320

>Nico-chan

Yeah, that's me.

>>784329

本当にはホモですか。いかた自殺べきですか。




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
81 replies | 11 images | Page ?
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / asmr / aus / d / f / htg / just / kpop / wai ][ watchlist ]