[–]▶ No.784316>>784331 >>784334 >>789376 >>798011 >>805126 [Watch Thread][Show All Posts]
>tfw migrating all my hard disks, internal and external, to either Veracrypt NTFS or LUKS ext4
>tfw setting up dnscrypt and having dnsmasq enforce DNSSEC
>tfw setting up OpenVPN on the router level and connecting to a VPN 24/7
>tfw migrating all my saved passwords on Firefox and Chromium into KeepassXC
Who else /goteverythingtohide/ here?
▶ No.784329>>784330 >>789510 >>805128
>>784320
Less anime and more gay porn.
▶ No.784331>>785163 >>785906 >>789397
>>784316 (OP)
>he follows best open source practices
>his hardware is still compromised at ring -2
enjoy your placebo
▶ No.784334>>784346 >>784384 >>784781 >>789462 >>789471 >>789513 >>799685
>>784316 (OP)
>encrypting everything
>gets tortured due to not giving out a password
>continue to be tortured indefinitely due to possible second layer deniable encrypted volumes
I never get you people who encrypt stuff. You're just asking to be killed in the most horrifying ways possible.
▶ No.784346
>>784334
Yeah, but they won't see what a fap to. It's a win/win
▶ No.784365
For me, computer privacy is a mix of a hobby, being paranoid and wanting to be ready for the future where lolicon is illegal.
▶ No.784375>>784386 >>784430 >>788659
>hurrdurr hardware is compromised
Remember that one guy the FBI wanted? He used TC and they never got his shit.
▶ No.784384
>>784334
Id rather die on principal than live in submission.
▶ No.784386>>784420 >>784421 >>785127
>>784375
Really? Isn't Truecrypt broken?
▶ No.784420
▶ No.784421
>>784386
Your brain is broken
▶ No.784430>>784433
>>784375
Is it true that TC was written by anonymous arms dealer?
▶ No.784433
>>784430
>anonymous
no
>arms dealer
yes
▶ No.784542>>784730
is this bait?
let's see all the memes you listed:
>keepAss
>ext4
>DNSSEC
>VPN
can't remember what veracrypt is but it's probably a meme as well
>hurr dur nobody can spy on me now that i forwarded all my traffic to some other single IP address
▶ No.784730>>784779 >>799659
>>784542
You odn't understand what a meme is, do you
▶ No.784781>>785906
>using Windows
>bringing it online
You've already been compromised, but good job anyway.
>>784334
You think the fucko squad is going to roll up to the door of every NEET on /tech/ and beat them bloody until they cough up the passwords to their gay porn stash? There is literally no reason not to use full disk encryption.
▶ No.784786
>>784779
You odn't understand what a MITM is, do you
▶ No.785007>>785164
Should I use TrueCrypt or VeraCrypt?
▶ No.785127
>>784386
not in a way that allows to attack an offline system.
▶ No.785163>>789526
>>784331
>coreboot doesn't disable AMT
get with the times gramps
▶ No.785164
>>785007
Veracrypt is a better honeypot if you download binaries
Truecrypt trusts the backdoored TPM
compile from source
▶ No.785192>>785853 >>785892 >>799675
> setting up dnscrypt
HTTPS GET still goes in plaintext, your VPN provider will see you visiting forums full of inane comments and mark you as suspicious for feds for being too smart and not using google dns like everyone else.
DNSSEC is literally useless unless you are gonna check every domain you visit for compliance manually, because there are maybe 5 or 6% overall, and let me guess, CZ NIC firebox addon? Nice, now you have a non-unique browser fingerprint.
>Keepass
Good luck with rootkits and keyloggers stealing all your passwords, get a hardware password manager and auth token or make one yourself with faggot ducky or arduino.
My next revelation will be that "full disk encryption" is not really full, unless you have an external bootloader no one knows about.
▶ No.785853
>>785192
you seem to know your shit, tell me about bane, why does he wear a mask?
▶ No.785892
>>785192
>HTTPS GET still goes in plaintext,
Incorrect.
▶ No.785906>>788659 >>789387
>>784331
>>784781
Virtually all systems in the world are trivially accessible to US law enforcement and intelligence agencies using methods that are totally impossible detect, you can't even see the traffic on your network. Despite this, they need to develop exploit and hacking tools against Windows and other systems and need to seize servers and need to undermine encryption. If you believe this, you have gone full /tech/.
▶ No.788659
>>784375
>hurrdurr hardware is compromised
>Remember that one guy the FBI wanted? He used TC and they never got his shit.
he was using old hardware, without INTEL ME
>>785906
They need exploits only for Windows. For linux they just plant backdoors into linux code, as it's open source.
▶ No.789376
>>784316 (OP)
>dnsmasq enforcing DNSSEC
What is the benefit using dnsmasq over unbound?
▶ No.789387>>789388 >>789464
>>785906
>using methods that are totally impossible detect, you can't even see the traffic on your network
▶ No.789388>>789396
>>789387
>he doesnt know about backdoors at the hardware level
lmao
▶ No.789396>>789413 >>789509 >>789534
>>789388
>implying hardware backdoors can hide network traffic
▶ No.789397
>>784331
op is still safe against his mom logging into his pc
also against facebook and google spying
maybe or not safe from microsoft
he is safe from his isp
there are other threats to defend against besides the government
▶ No.789413>>789416
▶ No.789416>>789427 >>789433
>>789413
You're wrong. They can't do that.
▶ No.789427>>789428
>>789416
>backdoored hardware cant lie to you
ok
▶ No.789428>>789497
>>789427
Who are you quoting? Backdoor hardware can lie to you. So stop using backdoor hardware.
▶ No.789433
▶ No.789462
>>784334
>I never get you people who encrypt stuff. You're just asking to be killed in the most horrifying ways possible.
Thinking such people wont kill you anyway because they believe your unencrypted hard drive is a diversion.
▶ No.789464
>>789387
>>using methods that are totally impossible detect, you can't even see the traffic on your network
<Doesn't know networks originate from DARPA
<Doesn't know who DARPA is
▶ No.789471
>>784334
>never encrypt anything
>literal nigger comes into house and steals laptop
>takes all money from bank account
<inb4 muh 2fa muh best practices
▶ No.789477
this thread has taught me i have no chance at all lmao
i'm stlil assuming luks/veracrypt are secure
▶ No.789497>>789499
>>789428
>Backdoor hardware can lie to you.
yes. that is what i wrote.
>So stop using backdoor hardware.
you can't. every piece of hardware is backdoored. prove me wrong
▶ No.789499>>789502
>>789497
your mom is back doored
▶ No.789502
>>789499
LUL XDXDXDXDXDXDXD
▶ No.789504>>789506 >>789516
Make sure to get a powerline conditioner so the gov can't hack you over your powerline.
▶ No.789506>>789507 >>789516
>>789504
also use a back-up battery so they can't isolate your location you via forced brownouts.
▶ No.789507
>>789506
>you
not sure how that got there
▶ No.789509
>>789396
this would be interesting, you would have to have compromised routers AND switches synced up to use a hidden vlan. Would be interesting to produce a demo
▶ No.789513>>804375
>>784334
I use it to securely erase data for system re-installs on ssd devices that would otherwise require secure-erase + dd urandom
▶ No.789516>>789517
>>789504
backdoored
>>789506
backdoored. probably even gps
▶ No.789517>>789519 >>790502
>>789516
enlighten us on how capacitors are back-doored jk im filtering you with the rest of the one-liner non descriptive shitposts
▶ No.789519>>790502
>>789517
>oyyy veyyyy! shut it down!!!
found the damage controlling kike. the holocaust will happen.
▶ No.789526>>789533 >>793603
>>785163
>implying the Jewtel eepro100/eepro1000 chip on your MB which for the past 20 years is powered when off, has direct access to ram, and receives data from the internet isn't compromised
▶ No.789533>>789536
>>789526
Welcome to ARM computing.
▶ No.789534
>>789396
They can. For example, let's say you have some data to exfiltrate. You encrypt it so it's unrecognizable from random data then start passively leaking it out in place of random data in protocols. A good candidate are initial TCP sequence numbers which are random for security. Each TCP connection can leak 8 bytes of your data this way.
A TLS connection can leak much more via the "random" session key. You have no way of telling that this is happening without access to the source. Even worse, this could be happening in hardware beyond your sight - imagine if the hardware RNG is feeding these components this data.
So all the NSA needs to do is spy on you browsing redtube or your OS downloading security updates or keeping your clock in sync via NTP and reassemble the data from the "random" protocol components.
▶ No.789536>>789538
>>789533
>ARM
Our ARM boxes have eepro1000 chips. Amusingly, so does China's Loongson-based boards for security. Welcome to being fucked.
▶ No.789538
>>789536
Adding for reference. They built their own MIPS processors for security but used Intel ethernet controllers on the boards.
▶ No.790502>>790506 >>790507
>>789517
>>789519
You know if you don't live inside of a faraday cage with no doors or air holes you're backdoored. Prove me wrong.
▶ No.790506
>>790502
You aren't wrong unfortunetely. Everything is a fucking botnet.
▶ No.790507
>>790502
How does one test for a GPS in a battery pack?
▶ No.793577>>793663
So what? VC better/more securely TC or i should stay on TC/tcplay any longer?
▶ No.793603>>793663
>>789526
dammit
how do i fix
▶ No.793663>>804488
>>793577
VC
>>793603
Use addin card for NIC
▶ No.793727>>793748
Ethernet hardware being compromised is practically a given. With that, they can cut through any firewall and network without being detected or observable. Their chips do the routing and those magic packets would never be delivered to userspace so you'd never know even if you were running tcpdump. Even if you turn some of the boxes off they could still route through them. You'd have to physically disconnect them.
▶ No.793748
>>793727
I guess, passive sniffer built around fpga would sense any activity not meant for userspace.
▶ No.795331
▶ No.797774>>797776
Literally everything in technology is compromised. If you haven't made it from scratch yourself , it's compromised.
▶ No.797776>>797779
>>797774
<Implying an anon is sane enough to even trust himself
▶ No.797779
>>797776
>make it yourself
>it's full of holes you don't even know about because you're not a one-man security company
>use one from some corporation
>all the holes are plugged except for the giant one they purposefully put there to spy on you
▶ No.797881>>798020
Unpower your computer and use pen and paper. ;)
There is no way to hide with a computer today.
Not only does most CPU's have built in backdoors running with ring-2 access.
Your harddrives firmware also have backdoors impossible for you to do anything about.
But do you really have to hide? The paranoia is probably getting you. No one gives a fuck about your secrets and private shit unless you trying to do something really stupid.
The basics to protect against people trying make money on your identity and such stuff is enough.
▶ No.798011
▶ No.798020
>>797881
>Unpower your computer and use pen and paper. ;)
>implying pen and paper aren't human-readable
I have build a computer with hermit crabs under a system I call HCSA(Hermit Crab Switching Algebra). It's a little slower than your everyday CPU, but it is still turing-complete, and I'm even working on porting the Linux kernel over to it.
▶ No.799659
>>784730
>he doesn't understand the meme meme
▶ No.799675
>>785192
>your VPN provider
Buy vps and set it up yourself. Why would I let some pajeet on a nsa payroll do it for me?
▶ No.799685
>>784334
It's only a problem if someone is after some particular data with absolute certainity that you have it. Otherwise nothing stops you making double bottom/hidden partition. Make outer layer look suspicious with kali linux and halfchan in bookmarks, put some l33t hacking books on your reading list and spice it up with mlp r34. Keep your rare spurdo memes in the deepest layers that no one will ever reach.
The downside is inconvenience of accessing and working around it. But it's always about trade-offs
▶ No.804375
>>789513
And even then /dev/urandom would be pretty much useless because of wear leveling.
Encrypt your shit, people, ==ESPECIALLY SSDs==
▶ No.804488
>>793663
Which add-in NIC's are safe?
▶ No.805126
>>784316 (OP)
VeraCrypt is good but isn't it exactly the same as Encfs?
I mean, other than storing directories as bins instead of directories.
▶ No.805128
>>784320
>Nico-chan
Yeah, that's me.
>>784329
本当にはホモですか。いかた自殺べきですか。