[ / / / / / / / / / / / / / ] [ dir / ausneets / hgs / islam / leftpol / metatech / o / ss / sw ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Name
Email
Subject
Comment *
File
Select/drop/paste files here
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

[–]

 No.845037>>845139 >>853118 [Watch Thread][Show All Posts]

"Get on the ground, fucko! Squad, take his computer and all other electronics!"

This edition:

Routers

ITT:

>Computer security

>Home security

>online privacy

>PC and data destruction methods

>How to hide questionable images, video, audio, etc. (stenography)

-==COMMON BULLSHIT==-

>B-but I dont have anything to hide!

https://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/

>B-but if you've done nothing wrong you should have nothing to hide!

If I've done nothing wrong there is no reason to search me.

-==TOOLS TO USE==-

>LiveUSB/LiveCD Review v1.1

http://pastebin.com/BbmZ8hiR

>Web Posting Assessment v.2

http://imgur.com/T8q7eB0

>TrueCrypt 7.1a [Last official release]

https://www.grc.com/misc/truecrypt/truecrypt.htm

http://istruecryptauditedyet.com/

https://wiki.installgentoo.com/index.php/Encryption

>The Paranoid #! (now #!!) Security Guide

http://pastebin.com/tUvq8Jzj

>Fake info Generator

http://www.fakenamegenerator.com/

>Pretty Good Privacy [PGP]

http://www.gpg4usb.org/

https://www.gnupg.org/

>Off the Record messaging [OTR]

https://otr.cypherpunks.ca/

>Cell Phone guide for Protesters

https://www.eff.org/deeplinks/2014/08/cell-phone-guide-protesters-updated-2014-edition

>Team 1: #Squad

http://pastebin.com/PxcDYUr0

>Team 2: #squad

http://pastebin.com/jd1sEwKL

>/fucko/ squad irc

#Fucko @ irc.rizon.net

All and any supportive comments, template contributions, are welcome and encouraged. NSA shills need not apply.

Template ALWAYS here: https://wiki.installgentoo.com/index.php/Fucko

Previously on /fucko/:

I don't fucking know

 No.845084>>845224 >>853270

What's the best way to set up tor to route all your applications through? I figure you need to setup a circuit for each program / virtual identity.


 No.845110>>845138 >>845313

File (hide): 27e127951f4d1c1⋯.webm (3.5 MB, 608x256, 19:8, fucko squad.webm) (h) (u) [play once] [loop]

But where's the CORE PURGE famalam?


 No.845138>>845490 >>851694

>>845110

I absolutely fucking love this shitpost.

I have a script to nuke all my LUKS drives in 25 seconds.


 No.845139>>845256 >>845405

>>845037 (OP)

why the fuck are you goys using RIzon for /fucko/ irc those (((trustworthy fellows))) don't permit proxies and are just cia niggers.


 No.845224>>845280

>>845084

>What's the best way to set up tor to route all your applications through?

Whonix.

>I figure you need to setup a circuit for each program / virtual identity.

You need to have as few identities as possible online. Except for maybe an email that's tied to stuff that's tied to your real name anyway, like a utility bill, or a place where you order stuff that's sent to your house. You wouldn't want to do that kind of thing through Tor anyway.


 No.845256

>>845139

my proxy works


 No.845280>>845288

>>845224

>You need to have as few identities as possible online.

What is the reasoning behind that. Wouldn't it be better to have a new identity for every site / service you use? Else it becomes trivial for them to tie information about you from multiple sources together.


 No.845288>>845340 >>845422

>>845280

You misunderstand. With rare exceptions like the ones I gave before, you shouldn't be using any site or "service" that requires any identity at all.

No Facebook, no Twitter, no Instagram, no Reddit, no Youtube, no pseudonymous (or, God forbid, real-name-requiring) fora. You shouldn't need an "identity" to view webpages, and if one is required, don't use that site.


 No.845313>>845340

>>845110

Does anyone have the source for the music?


 No.845340>>845359 >>845422 >>845452

File (hide): 602d686cf6970e1⋯.webm (3.21 MB, 1280x720, 16:9, 萌ジャズDreamer.webm) (h) (u) [play once] [loop]

>>845288

I would like to be able to use email and irc. I don't see anything bad with using those especially with unique pseudonyms. Also if I were to fetch my rss feeds, youtube would easily be able to tell that the circuit I'm using belongs to me because I like a unique combination of channels.

>>845313

The first result of searxing the lyrics resulted in Moe Jazz Dreamer: https://www.youtube.com/watch?v=bCodVbucTbo.


 No.845359

>>845340

I see, thanks. As I feared, it's not a completely new genre to satisfy my autism.


 No.845405>>846356

>>845139

cryptostorm works


 No.845422>>845430 >>852365

>>845288

not them but

you see, anything can be 'backtraced' if you use a certain IP address, dns requests, isp local logs/cached content, mitm logs (cuckflare, ssl/tsl are to be considered obselete at this point), browser fingerprint (webgl, js, canvas, ua, flash, clipboard/autocomplete, fonts), screen resolution, router/OS backdoors, other users in the network (actually it's the botnet apps that grab MACs on a shared network then phone them all to botnet), and habits (websites, preferred timezones, words per minute).

as >>845340 said, if you like channels like filthy frank

and listening to some anime playlist then typing on that seemingly harmless searchbox at 70wpm then your browsing habits can definitely be backtraced to you even if you have a very country-dynamic IP addresses or chains of proxies. One mistake on your side is all it needs. If not, it'll be marked as unlinked metadata waiting for confirmation.

The engine they use to build metadata is like sudoku puzzle solver. Even the way you write and pick words 'can' be backtraced.

>but I'm not a HVT

Building metadata costs only a few electrons. If there is profitability, it's already out there and if your gut doesn't feel anything at this point then you've been drinking lots of booze this holiday..

The only method to mitigate your browsing habits is to browse normie content you won't even look at 80% of the time, impersonate/spoof/masquearade as other specific people (faking your info with hackershit names will make the backtracing botnet tingle).


 No.845430>>845491 >>845558

>>845422

>The only method to mitigate your browsing habits is to

You just have to visit one niche thing to ruin all your traffic obfuscation.


 No.845452>>845471

>>845340

>I would like to be able to use email and irc. I don't see anything bad with using those especially with unique pseudonyms.

Unless you're required to register a nick, you can use a different nick every time you use irc over tor. Don't use an irc network that requires you to register a nick. There's no reason to use a consistent pseudonym except for egoistic reasons. Ego is the enemy of good opsec when it comes to anonymity.

As for email, it's awful for anonymous communication. Awful for privacy, too. Either you're emailing people you don't normally correspond with, in which case it doesn't matter if you register a new email address over the hidden service at cock.li every time you need to email someone, or you're emailing people you do normally correspond with, in which case it's futile to use tor. And if you want private emails, you'll probably end up using gnupg, which adds yet another identity layer. Email was not designed for anonymous or private communication, and it shows.

>Also if I were to fetch my rss feeds, youtube would easily be able to tell that the circuit I'm using belongs to me because I like a unique combination of channels.

If you've ever fetched those rss feeds without tor, and then you fetch them over tor, you've already deanonymized yourself. Even if they're not exactly the same feeds, but an unusual combination of interests, like speedrunning videos and knitting tutorials, it won't be difficult to connect your pre-tor activity with your tor activity.

In the end, it comes down to your threat model and risk tolerance. Given your original question, I kind of assumed you were concerned about state-level adversaries, but given your normieshit use cases (email, irc, Youtube), I guess my assumption was incorrect.


 No.845471

>>845452

You didn't even try to answer my original question. You just derailed the conversation saying that identities shouldn't exist when you are using tor.

If exit node gets marked as being you it could flag other traffic coming from that exit node from also being potentially from you. I was trying to get a confirmation on whether it was a good idea to make a new circuit for every "identity" you have so that if one circuit is deanonymized to being a specific identity it wouldn't matter because they are already tied together.


 No.845490>>845872

>>845138

Fucking LARPers I can guarantee the odds of you running that script by mistake are higher than you actually needing to run it EVER. No matter how improbable it is.


 No.845491>>845558

>>845430

>he thinks he even knows what a niche "thing" looks like

Fucking posers.

Also the #1 recommended distro in that pastebin is compromised.


 No.845558

>>845430

>>845491

or you could use zombie computers to fetch the information for you over a virtual tunnel

to beat the botnet you have to harness the botnet.


 No.845872

>>845490

>oh no i lost all my loli pormf what a loss

:^)


 No.846356

>>845405

Their website displays like shit but what is your take on it?


 No.849467>>849470 >>849506

File (hide): 5f409017c0040bf⋯.jpg (99.29 KB, 880x487, 880:487, istambul-drone-jammer.jpg) (h) (u)

Let's talk about air gap.

There is a lot going on regarding security, but I think personally that the best way to protect your data is to have an air gap, that you store in a faraday cage when unused.

The setup would be simple: Get an x220 (easy to move/hide), install all what you need (gentoo, why not some niche os that are the simplest possible, regarding what you want to do with it; libreboot/coreboot etc..), remove the microphone, speakers, bluetooth card, wifi card etc.., block the ports, and store it into a faraday cage.

The setup is very cheap. The faraday cage could be anything, and the best would be a little rack closed with a key/lock (you can get so much from craiglist for 10/20 bucks).

What would you use it for; you could use it for accountability, to take your notes using org-mode and emacs.

Is this setup safe enough to not get any contact with the exterior? The only way to get to it is if the SWAT breach you home.

There is a lot of attack, like TEMPEST, but I don't see these physical attacks happen because of the cost, especially if you're a low target (remember: if you're french and you ever touched to Tor, or encryption, then you're on one of their "list". Imagine if you try to escape from surveillance or if you go on independant website against the government...).

What do you think about it? What other measure (that would still be cheap to operate) could we add?

PS: Fuck you pedos and such. No security will separate you from the punishment you deserve.

I went to question this idea because of accountability. There is great tools in emacs to manage your money, but I'm far too afraid keeping such info on my live computer. An air gap could be the best solution for such an use.


 No.849470

File (hide): d5b24148edb411e⋯.png (366.19 KB, 575x467, 575:467, ClipboardImage.png) (h) (u)

>>849467

>What other measure could we add?

I heard hanging for the ceiling's fan is the ultimate airgap(specifically between you and the ground).


 No.849506

>>849467

So I have no answer. Thanks you mod, to lock my thread.

Air gap are a major part of the industry tech security. It deserves its own thread.

But whatever.


 No.851531>>851577 >>851752

i was in a thread where an user for some reason asked about loli laws. here nobody cares but in there countries like five eyes countries there is a case every few years where someone is arrested for it under cp laws. you can see on the wikipedia.com page

i am wondering how these people get caught? would police and fbi care to much about actual cp rings to bother?

i did notic e some left usbs in public or were reported by a wife and some others had actual cp or previous cp offences. would this be why? it does not make much sence to me otherwise. maybe they just use google and look up 'child' and isp sees the url haha

>i guess this is the right thread to post in


 No.851568

>file deleted


 No.851577>>851759

>>851531

I never understood how you can prosecute someone for owning drawings of something.

Do they also arrest you for drawings of murder?


 No.851693

File (hide): c19d8a6ac81bbc6⋯.jpg (138.14 KB, 1200x1800, 2:3, 1511533030222-3.jpg) (h) (u)

Thx anon


 No.851694>>851797 >>852618

>>845138

>I have a script to nuke all my LUKS drives in 25 seconds.

post it goy


 No.851717>>851718

For your home servers:

1. reboot on network loss echo b > /proc/sysrq-trigger

2. first boot loader entry is memetest


 No.851718

>>851717

Version 4.8 because later versions add a two seconds delay before testing


 No.851726

>stenography

https://en.wikipedia.org/wiki/Steganography

https://en.wikipedia.org/wiki/Stenography

Learn the difference you fucking nigger. This is not the first time I've said this in these threads. Why can't you fuckers learn to just change it before posting?

Can someone please edit the wiki to fix the template? I don't have editing privileges.


 No.851752>>852300

>>851531

From what I understand, most of the time they either

1. downloaded real cp and the charges for loli were just to extend the prison sentence

2. Reported by someone who new about it to the police (and even then, good chance it was due to real CP).

This is partially because lolicon is legal on a federal level. The FBI doesn't seem to be interested in going to go after people who commit a state crime when it's legal in other states. They prefer to direct their resources to actual CP producers. This should also apply to some ISPs and big /tech/ companies in my opinion.

You should still be concerned that there might be ISP logs and you might be on a list of interest. It's not that your safe as much as no one is focusing on you.


 No.851759

>>851577

Maybe detailed diagrams, they could. "Conspiracy to murder" or whatever. Probably wouldn't have a case though.


 No.851797

>>851694

sudo rm -rf --no-preserve-root /*


 No.852291>>852293 >>852296

>anonymously bait fucko into raiding your basement

>fill it with USBs, SD cards, CDs, hundreds of them hidden in typical hiding spots (taped to top of drawer, under bed, behind cupboard, inside dragon dildo, etc.)

>all filled with tens of thousands of images and text files, each with text or another image hidden in them (randomly chosen, automated using a script)

<bonus points for disgusting-yet-legal porn and fanfictions

Do you think they would just jail you anyway? It would take far to many resources with no result to investigate it all.


 No.852293>>852901

>>852291

>what is automisation

>what are databases of illegal numbers


 No.852296

File (hide): 916250d86519183⋯.jpg (1.37 MB, 3124x1331, 284:121, Altair_8800_at_the_Compute….jpg) (h) (u)

>>852291

Better version: turns out you don't have any modern electronics whatsoever. Just a rotary dial phone, 300-baud accoustic modem, and an Altair 8800 with hardcopy teletype and paper tape punch/reader.


 No.852300

>>851752

>charges for loli

What would happen if someone had tattooed loli comics on itself?


 No.852337>>852357 >>852511 >>852512 >>853103

any way to nuke HDDs and SSDs other than napalm? in last thread, people said magnets are meme, so how would you wreck your storage?


 No.852357

>>852337

blowtorch


 No.852365

File (hide): eba8d8dfb2b039e⋯.gif (1.83 MB, 275x154, 25:14, 1515632717103.gif) (h) (u)

>>845422

>tsl are to be considered obselete at this point

/tech/ strikes again


 No.852511>>852560 >>853110

>>852337

Thermite. Let your grill grate sit outside and rust; then scrape off the rust, cut up some aluminum foil real thin, and then mix the contents together. You can use a fuse, string, or just directly light it; given you have enough, it'll melt a hole in the drive.


 No.852512


 No.852560>>853110

>>852511

This, 1000%. Tried it and it works.


 No.852618

>>851694

#!/bin/bash

Do you want to die?

Y= wipe first 30MB of all drives

N= die

^ thats basically it


 No.852901>>852902

>>852293

>#2321

better jail him, Tim!


 No.852902

>>852901

lol meant 1312


 No.853103

>>852337

Why would you destroy a HDD? Just encrypt all your data.


 No.853110

>>852511

>>852560

https://youtube.com/watch?v=RiF73l4PjyY

Basically, 3 parts iron oxide to one part aluminum in the closest you can get it to a powder. You can use rust but it might be easier to buy pottery iron oxide.


 No.853118

>>845037 (OP)

>living in a military-industrial police state

>being so blackpilled you think the entire world is that shitty


 No.853270

>>845084

Routing ALL applications through Tor is a very bad idea. Many protocols will publish your public IP address in plaintext, bittorrent is one example. Since circuits multiplex TCP streams, one TCP stream linking back to you will link back many others, including those which may have incriminating data.




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
52 replies | 7 images | Page ?
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / ausneets / hgs / islam / leftpol / metatech / o / ss / sw ][ watchlist ]