ON THE GROUND /FUCKO/
STEP AWAY FROM THAT BLACK IBM LAPTOP
Would it be possible to make a wrist attached killswitch cord for you laptop so that you can rip your hand away when you get dread pirate roberts'd?
Is this a viable method of not getting life inprisonment?
You guys came to my country, armed and preaching allegiance with US corporatocracy, and you think you can just run about doing whatever you want without suffering the genocidal consequences?
Think again motherfuckers.
How did you just called it? Black? Are you saying it's black only because i'm using it for work i don't want to do myself? Say, are you racist? I think you should calm down this racist, misogynic attitude of yours a litle
just step back and go away, maybe i won't press charges
you can either invest a fuckton of time into decrypting my dm-crypt and LUKS encrypted /home or you can ask me nicely and i'll do if for you, but you have to take down your weapons for that.
having police going to my home in order to get my data is the only acceptable way that they are getting my data.
This requires a judge signing off on the search and that will only happen if I am suspected of a crime.
Getting my data to see if I am committing a crime without having a warrant is another thing.
Here's my thing senpai.
I can't whether it's safer from a hypothetical party van perspective to have a physical decryption key (eg. microsd) or a long ass password.
If you use a physical one, what the fuck do you do with it when you get fucko'd?
If you use a password, you're liable to have it beaten, drugged, or coerced out of you in some fucked up fashion aren't you?
educate me family.
>If you use a password, you're liable to have it beaten, drugged, or coerced out of you in some fucked up fashion aren't you?
You could just not be a weak minded faggot desu familam.
>not keeping your Luks headers on a microSD you can swallow, immediately rendering the encrypted drive useless
Also, figure this is a good place to ask, is anyone familiar with Qubes OS? Is it worth using as a daily driver? Snowden's endorsement is nice, and the theory checks out, but is it usable?
why not rig the windows so that kills your drives instead?
Then you just have to leap through the window to escape the police and kill the drives in the process.
Assuming the drives takes a minute to die, having them running after you is a good distraction.
Or you could, have more than one door and use the non obvious one.
>not keeping your Luks headers on a microSD you can swallow, immediately rendering the encrypted drive useless
but is this destruction of evidence is what I'm wondering. And is there any way that they can detain you and pull it out of your poo? serious question. I doubt that shit would digest.
>encrypted my files and filesystem
>shut down pc as soon as I hear shouting
>STEP AWAY FROM THAT BLACK IBM LAPTOP
>SIR PLEASE COME WITH US AND DON'T RESIST
2 hours later
>sir, you need to hand over your encryption keys
>nah, I don't have to. law clearly states that I don't have to help getting myself sentenced, it's your job to provide evidence, not mine
>their faces when
damn, feels good not to live in a shithole
"The decryption order is an order which suspects can be forced to hand over the password from encrypted files so that the police can decrypt it. The order, however, goes against the right of suspects not to participate in their own condemnation. The Dutch authorities therefore have removed the decryption order from their legislation"
The entire thing would immediately have you arrested for destruction of evidence, along with any other charges they pull out their ass because now you're 99% more likely to have been doing illegal shit.
I highly recommend against that, even if you have 300tb of loli.
Depends if you're doing really illegal shit or not.
Clearly they have reason to be there if they're sending a swat team to get the laptop meaning they already have evidence against you. By destroying evidence you basically make their circumstantial evidence fact.
If it's minor shit just take the hit, pay the fine and move on.
If it's deep shit you're fucked at that point.
I have a solution.
Always keep the decryption key on a microsd inside a small capsule in your mout while doing your super l337 shit so that they never see you put any thing in your mouth and just make sure you turn the machine off in time.
kek I was just saying this.
Has it been done?
Unless you have actual childporn, evidence of cyber crimes (hacking, heists, etc...) or generally proof of very illegal shit you should be good.
Typically the small things people do, streaming, pirating, and the like aren't handled by the police you're just sent a fine in the mail.
If you have done something to warrant that you will need to turn off your computer at a moments notice it would be easy to set up up
I press the button at least one a week on my power bar with my foot accidently. So it should be easy for someone trying actively to turn off a computer.
*Pulls out cellphone*
"it's been a good life..."
> On /g/ and /tech/, /fucko/ threads are created pretty much weekly. On /tech/ they are up constantly. If there isn't an existing /fucko/ thread on either board, please start a new one with this template
I've been posting on /g/ for years and I've never seen the name or term "fucko"
Certainly the subject matter sometimes but never some common standard template thread.
>I've been posting on /g/ for years and I've never seen the name or term "fucko"
>Certainly the subject matter sometimes but never some common standard template thread.
How could you miss them? They used to be posted almost daily.
MicroSD cards aren't readily digestible. People have done the same thing with other forms of flash memory, the cops have waited until the person has "passed" it, and then recovered the device.
Probably, although then you have the potential danger of fragments in your digestive system, and if they saw the card enter your mouth and recovered the fragments that you passed, you could probably be charged with obstruction of justice (maximum sentence in the United states for which is 20 years).
> not having defense turret systems ready
I only trust my vest and my gun.
>B-but I dont have anything to hide!
>B-but if you've done nothing wrong you should have nothing to hide!
If I've done nothing wrong there is no reason to search me.
>not having a remove installed
It's like you want to become Tyrone's prison wife.
I'd just like to interject for a moment. What you’re referring to as Windows, is in fact, NSA/Windows, or as I’ve recently taken to calling it, NSA plus Windows. Windows is not an operating system unto itself, but rather another expenseive component of a fully functioning Spy system made useful by the NSA core-spyware, reverse shell utilities and vital keylogging components comprising a full botnet as defined by Gen. J. Clapper.
Many computer users run a modified version of the botnet system every day, without realizing it. Through a peculiar turn of events, the version of spyware which is widely used today is often called “Windows”, and many of its users are not aware that it is basically the NSA system, developed by the NSA. There really is a Windows, and these people are using it, but it is just a part of the system they use.
Windows is the cover: the program in the system that hides the spying resources from the other programs that you run. The cover is an essential part of a botnet, but useless by itself; it can only function in the context of a complete botnet. Windows is normally used in combination with the NSA spyware: the whole system is basically botnet with Windows added, or NSA/Windows. All the so-called “Windows” versions are really versions of NSA/Windows.
Even though we are being given W10 "pro" of we had ultimate or pro whatever before, I think what we need is windows 10 enterprise; thats the ungimped version. At least, the best we can get.
i dual-boot windows 10 enterprise lstb n with debian, it is still gimped if you don't manually make sure to uncheck everything and block stuff through your router. you need to redo everything you did to gain privacy after updates btw. also i found it to be unstable and inconvenient. dual-booting is less of a pain.
And he causes all, the small and the great, and the rich and the poor, and the free men and the slaves, to be given a mark on their right hand or on their forehead, and he provides that no one will be able to buy or to sell, except the one who has the mark, either the name of the beast or the number of his name. Here is wisdom. Let him who has understanding calculate the number of the beast, for the number is that of a man; and his number is six hundred and sixty-six.
Yeah and its hard to buy you got some iso right? Probably doesn't help the stability any.
Good guides on router blocking for w10? I've heard some software (peerblock?) can work.. I was considering getting a seperate hardware firewall to keep load off the router.
Yeah I probably will do a dual boot but not on my surface pro, so I'm also interested in securing windows as much as I can.
I think its whonix that goes well with vpn use if I remember correctly. Probably would only use it for web searching and 4chan, why leave a huge web trail with windows? Though right now I'm on iphone so I know everythings out there atm.
No. You can't worry about privacy if you use windows (or any proprietary operating systems for that matter). Every file on your HDD can be sent to Microsoft at any time. Your disks are routinely scanned and checked for legality. You're encryption keys are sent to microsoft and attached you your "profile" that is constantly building. Confirmed backdoors allow windows to bypass any register or UX settings that you think help you.
You have zero privacy on Windows
Stop going to such extreme lengths to justify your videogame addiction. Just accept that you have no privacy on windows or switch to gnu/linux. If you are using a proprietary operating system then you are fucked
Why not have linux and also try to secure windows down what little you can? Why just lay down and take it whenever you use windows?
Also a lot of the time I work on proprietary and confidential information but it must be on windows, I'm only required to use bitlocker by my work, but I want to go further to seal windows up, and out of network access is still necessary.
What would you do if you had to upload a file online and be completely anonymous?
I would buy a cheap burner android phone (without a sim of course), drive a few hours away, go to a place that has free public wifi, make sure there arent any cameras around, then upload it and throw the phone away in a completely different area.
holy shit anon, show this to your boss and tell him to allow you to use libre tools instead. http://thenextweb.com/microsoft/2015/07/29/wind-nos/
all your encryption key are belong to microsoft
>Why just lay down and take it whenever you use windows
Why not obtain 100% privacy on a free (as in freedom) operating system, rather then attempting to counteract closed source software which you have no idea what it might be doing. Do you know anything about computers?
That's definitely possible if you write the software yourself. Just make a program that detects the removing of a usb device attached to your arm. That or make your hard drive encrypted and remove the battery. Then run the dc power through a molex connector or something that attaches to your arm. As soon as you pull the plug the computer powers down and it will need a password to unencrypt the hard drive again.
>SWATd lets you configure 'sensors' that check your PC's external environment. When enough sensors 'fail', SWATd will run a script for you.
>Sensors are commands or scripts that get executed repeatedly. A sensor is said to fail when its exit code makes a transition from zero (working) to non-zero (not working). This makes configuration easy and powerful. For example, you can make a sensor that checks if your website is online, and then make a command to alert you when the sensor fails.
>SWATd was originally written as a tool to defend against theft by criminals or to detect when your computer is captured by police.
Didn't even see it happening until the cops were there.
I'm actually going to start moving towards having the city councilmen start pushing for more laws or I'll be running for the position next election. I want judges to start doing state jail time for possession of hard drugs (heroin/crack/etc.).
Damn you caught me running my illegal torrent clients!
Yeah I know, its not really a situation where the people in charge will listen. They probably get a kickback from microsoft who knows.
I may use bitlocker with another disk encrytion under it; I have to use bitlocker though. Is how it is.
Dude, I already accept that, I agree.
But I HAVE to use windows for my work, so I am trying to make the best of that shit situation, advice saying not to use windows is not helpful.
I just close the lid and smile. Password is stored in a self configured chip installed in my hand, accompanied by my fingerprint and a 64 letter passphrase. You may only reboot the computer on a certain day without another 64 symbol passphrase which is stored in three separate cloud services in AES-256 encrypted bits.
If any of these conditions fail, my computer will automatically trigger a shutdown and stay down -procedure which will eventually render everything unreadable. You can decipher data from my hdd, sure, but if you insert anything but a pre approved devices, you're going to get shirtcircuited and zapped.
Fuck you, NSA. You may drug me. You may force me to tell my passphrases, but you'll never get that data in time.
this video is from a turkish raid on a very famous carder. they got tip from fbi and still just knock the door. if the guy had encrypted his pc he would be a free man now.
> not using headless dm-crypt/LUKS setup
> not unplugging your usb
> not swalloing you usb with the header lost forever
gee wee you dumb faggot
No one answered before, so I'm gonna ask again. What about buying an old phone/itouch/tablet, removing the network hardware, encrypting it, and storing sensitive documents on it for viewing?
It's lenovo, asshole. Now get the fuck out of my house.
Here's my badge/ID number(badge numbers aren't a thing anymore but we still call them that because people are stupid and think we're trying to avoid identifying ourselves when we say we don't have a badge number in my state), I want to know what idiot judge signed the warrant and on what grounds. I'll have his ass if it's not a goddamn federal agent that asked for the warrant.
NFC badge, install Tasker or something on mobile to SSH and run a kill script or something in the event that the NFC badge under your skin is out of range of your mobile.
Just make sure you never leave home without your phone
I use a microSD card for my header file and /boot, and a password for extra security to decrypt my LVM on LUKS. W/o the header file they wouldn't even find anything on the laptop as it looks just like random data.
There are ways to do this, but if you're in trouble this doesn't make sense anyway. Anybody with half a brain makes a 1:1 copy of your HDD/SSD to work on. pic related
Why doesn't someone make a device that let's you use old RAM as a type of SSD?
Think about it, keep the ram powered when not in use to keep everything from returning to 0 and then if you need a quick wipe just unplug.
Someone has got to have done this already, there is no way this haven't been done.
Yes, people do that. It's just really fucking expensive and you lose your data when the power disconnects for a fraction of a second even. Despite that, some data can be retrieved, even from shut-down RAM by forensics.