[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

/fucko/ General Thread - Security, privacy, ..

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 156
Thread images: 18

File: fucko.jpg (24KB, 368x411px) Image search: [Google]
fucko.jpg
24KB, 368x411px
/Fucko/ General Thread v0.?.? (long time no see?)
"Get on the ground, fucko! Squad, take his computer and all other electronics!"

This edition:
Hardware: Secure hardware. Helpful hardware. YubiKeys. Offensive/defensive hardware. How to buy hardware anonymously? Routers

ITT:
>Computer security
>Home security
>online privacy
>PC and data destruction methods
>How to hide questionable images, video, audio, etc. (stenography)
>What to do in case squad ever actually breaks down your door

>But I dont have anything to hide :^)
https://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/

>If you have done nothing wrong you should have nothing to hide.
If I've done nothing wrong there's no reason to search me.

>LiveUSB/LiveCD Review v1.1
http://pastebin.com/BbmZ8hiR
>Web Posting Assessment v.2
http://imgur.com/T8q7eB0
>TrueCrypt 7.1a [Last official release]
https://www.grc.com/misc/truecrypt/truecrypt.htm
http://istruecryptauditedyet.com/
>Anti-Forensics - Leave no Trace [Windows]
http://imgur.com/9YmNuDf
>The paranoid #! Security Guide
http://pastebin.com/tUvq8Jzj
>Fake info Generator
http://www.fakenamegenerator.com/
>Pretty Good Privacy [PGP]
http://www.gpg4usb.org/
https://www.gnupg.org/
>Off the Record messaging [OTR]
https://otr.cypherpunks.ca/
>Camera Software
https://www.sighthound.com/ (proprietary)
http://www.ispyconnect.com/ (open source)
>Cell Phone guide for Protesters
https://www.eff.org/deeplinks/2014/08/cell-phone-guide-protesters-updated-2014-edition

>Team 1: #Squad
http://pastebin.com/PxcDYUr0
>Team 2: #squad
http://pastebin.com/jd1sEwKL

>/fucko/ squad irc
#Fucko @ irc.rizon.net

All and any supportive comments, template contributions, are welcome and encouraged. NSA shills need not apply.
Lastest template i found here:
http://pastebin.com/rdwhnMUp

Previously on /Fucko/:
Security of truecrypt, stenography, told "i-don't-need-security-:^)"-fags and much more.
>>
File: I-must-be-GNU.jpg (70KB, 311x311px) Image search: [Google]
I-must-be-GNU.jpg
70KB, 311x311px
>>59015304
Forgot about the squads. I'll use this one tho.

>pic related it's for me forgetting about this
>>
File: 1478345413903.png (369KB, 1880x3148px) Image search: [Google]
1478345413903.png
369KB, 1880x3148px
Some more useful info
>>
>>59015380
Very nice thanks anon!
>>
>>59015304
How is stenography used in privacy matters?
>>
>>59015304
how secure would this online backup solution be?
>self hosted nextcloud
>FDE
>individual user encryption
>hosted through a VPN
>>
File: SWAT BTFO.webm (2MB, 480x360px) Image search: [Google]
SWAT BTFO.webm
2MB, 480x360px
>>
>>59015545
Hiding your sensitive data in regular looking files is pretty useful no?
E.g. storing your keepass database on a cloud storage provider but without them knowing its a keepass database?
>>
How would you set up a drive to nuke itself after only one misspelling of its fairly simple password?
>>
File: 1426546316548.jpg (3KB, 219x93px) Image search: [Google]
1426546316548.jpg
3KB, 219x93px
>But I dont have anything to hide :^)
https://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/

Does anybody have a copy of this article? Fucking paywalls.
>>
>>59015619
I'll try to find it for you hang on.
>>
>>59015619
got it.
http://web.archive.org/web/20110521001525/http://chronicle.com/article/Why-Privacy-Matters-Even-if/12746

Fucking retarded paywall that is...
>>
>>59015619

These are better in many respects:

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565

https://www.aclu.org/blog/you-may-have-nothing-hide-you-still-have-something-fear

https://www.wired.com/2013/06/why-i-have-nothing-to-hide-is-the-wrong-way-to-think-about-surveillance/

https://mic.com/articles/119602/in-one-quote-edward-snowden-summed-up-why-our-privacy-is-worth-fighting-for#.4VqPHxoeK
>>
>>59015304
You could get a good door and keep it locked like a normal person.
Burglar-proof doors (idk what americunts call them) are proven to be completely ram resistant.
>>
>>59015578
Always depends on your threat model. Hard to say without stating your goal. Are you hosting it to anons you don't know? To very close friends? To family? What kind of info will they store on it?
>>
>>59015646

Archive.org doesn't have it, get the PDF from here:

https://www.uwec.edu/academics/blugold-seminar/portfolio/loader.cfm?csModule=security/getfile&PageID=123487
>>
>>59015780
threat model is hackers/thieves, hosting it for myself and close friends, I'll be using it to share files with anons on 4chan though (hence the VPN) I'd have no way to know could be anything from pictures of dogs to bomb schematics
>>
And the original article published in 2011:

http://www.webcitation.org/5ywPn2n6L
>>
>>59015781
wtf they had it literally half an hour ago. God dammit should have screenshotted. Shit they must have updated it to not show now. Found it there on a date around 2011 i think.
>>
Also, "Why Privacy Matters":

https://www.youtube.com/watch?v=pcSlowAhvUk

One of the best presented and most concise talks about privacy in today's world that's ever existed, by Glenn Greenwald
>>
>>59015813
God i love it when i don't close a tab. Screenshoting it now. hang on!
>>
And also for Firefox users (if you're not using Firefox then fuck you and your privacy because that's about how much you care about it):

http://12bytes.org/articles/tech/firefoxgecko-configuration-guide-for-privacy-and-performance-buffs

Just updated within the past 24 hours as well, it get regular updates whenever something useful is discovered.
>>
>>59015304
I use social media to promote my business, but I also heavily care about privacy (I even run a systemd free distro on my laptop).

I'm thinking of getting a new phone with either Sailfish OS or Copperhead OS and carry it around in a Faraday bag. What do you think?
>>
File: Nothing-to-Hide-archive.org.png (301KB, 924x919px) Image search: [Google]
Nothing-to-Hide-archive.org.png
301KB, 924x919px
>>59015903
see told yah they had it
>>
>>59015903

>59015802 is the original article word for word.
>>
>>59015646

That copy-pasta left off the 1/ at the end hence it didn't work, and yes it's still cached there.
>>
>>59015802
>>59015918
Oh thanks didn't notice.

>>59015937
ooh damn i'm a retard. Sorry about all this :/
>>
>>59015908

I think you don't seem to realize that there is no privacy anymore, and carrying a smartphone in a Faraday bag or whatever kinda defeats the purpose. At some point you're going to need to remove it and make use of it and as soon as that happens you're vulnerable, regardless of whatever 'secure' OS it is supposedly running.

Nothing is secure anymore, nothing is private, especially if you have to connect to the Internet in any way, shape, or form - everything is monitored and can be traced back to you at some point in time, anonymity is a myth anymore if some TLA decides to focus on you.
>>
What firewall do you use at home? I've been using a Checkpoint 600 appliance w a license for a year for the past ... Year. Work wants it back now. Thinking ubiquiti?
>>
>>59015962
Do you have a phone? Is there any mobile phone you would recommend?

And are you saying you believe there is no internet privacy whatsoever, even outside the world of mobile devices?
>>
File: Nothing-to-Hide-archive.org-full.png (978KB, 924x6013px) Image search: [Google]
Nothing-to-Hide-archive.org-full.png
978KB, 924x6013px
>>59015959
Well, here is it anyway. Enjoy the read! Save and share. :-)
>>
>>59016050

You could just offer up the entire book itself, like so:

http://www80.zippyshare.com/v/bgQWXZ2R/file.html
>>
File: 1389004000851.jpg (96KB, 500x714px) Image search: [Google]
1389004000851.jpg
96KB, 500x714px
>>59015304
Any tips on what router I should buy? Obviously should be flashable with DD-wrt or the likes.

Do combined 4g/wifi routers with battery exists that have this possibility?
>>
>>59016082
Ah thanks man! But for the uninitiated the article is a good start i think.
>>
>>59016112
bbuuump
>>
File: freenet-logo.png (84KB, 580x387px) Image search: [Google]
freenet-logo.png
84KB, 580x387px
Whats some cool shit to check out on freenet?
>>
>>59016599
if you're asking, you shouldn't even care about "cool stuff".
>>
>>59015761
>>59015761
>>59015781

Thanks! But I also would love to have a simpler one that I can show to normies and convince them, do you have something like that?
>>
File: ca.jpg (1013KB, 2560x1920px) Image search: [Google]
ca.jpg
1013KB, 2560x1920px
I'm starting to wonder if ">install Kali" should become the ">install Gentoo" of security threads.

>install Kelly
>>
>>59016599
Secret stach and the fantasy freesite are good
>>
>>59016945
Personally I'd rather go hardened gentoo over kali from a defensive standpoint.
>>
Thinking about slamming SE Linux on a toughbook good idea bad idea?
>>
>>59017243
or should I go for tails persistently on an SSD
>>
>>59017256
I hear vising the TAILS website puts you on an instant watch list.

What happens then?
>>
>>59018840
I imagine that there are varying levels of surveillance.

For example - everyone, regardless of who they are, is part of the all-encompassing botnet. All text messages, ISP logs, general information is held at one level.

Then, you got guys who would warrant slightly more watching. People who have the awareness of 4chan, voat, reddit? Maybe use linux? They are probably on a list that is slightly higher. We aren't being actively monitored, but now we are getting there.

A guy who uses Linux and browses 4chan? Who is aware of privacy/security based operating systems? Who doesn't have a facebook? Who maintains a limited online presence? Who watches porn? Everything about him is probably being retained now, but you still aren't a person of interest. I imagine at this point they simply maintain everything you do on record, so that in the future SHOULD you become someone they wish to look into, then they will be able to go back and scour through everything you've done using the algorithms they have developed.

No matter who you are, assume that you are already on a list. What we are uncertain of is the level of intrusion that we are subjected to. For sure though, not exaggerating, 4chan merits being on a list, I'm not trolling or anything I really can't express that enough
>>
File: A.jpg (34KB, 500x750px) Image search: [Google]
A.jpg
34KB, 500x750px
Get a phone with sdcard backdoor. For example huawei ones look for dload/update.app during boot - https://github.com/worstenbrood/HuaweiUpdateLibrary - this is made of kernel and squashfs image.

You can just rip those from internal phone ROM, and modify the squashfs image of /system slightly so that fstab mounts sdcard partitions to /cache and /data (running whole system off sd is possible too, but a bit involved to bastardize the rom for it). Repack kernel and new image as update.app, put the card in, start the phone and there it is - a removable boot drive for your phone. Remove the card, and its back to original.

I did this mainly because the sdcard image is rooted and heavily customized, while the internal rom is the original vendors (to not void warranty, as the local suppliers are fags about if you RMA a brick and there's a modified ROM). But as a side effect, this way you get perfect plausible deniability at airports by simply ejecting the sd card. Without it, the phone is pretty much stock, with no indication that entirely different world exist on some card that isn't there.
>>
Sorry, I completely realize that I failed to answer the main part of your question

yeah, just visiting the site is instant watchlist. same for cubes
>>
>>59018840
ALL deep web traffic is stored so it can be decrypted when quantum computing happens
>>
>>59019345
Still have to crack each stored connection individually to learn anything useful Needle in haystack.

>>59019090
Know any other chink brands which do this with unlocked bootloader?
>>
>>59016586
Anyone can guide me on picking a router?
I mean it's basically the first device that protects you right so makes sense to have it in this threat no?
>>
>>59015380
What do I do if there are a bunch of accounts that I no longer use and don't know the password or don't even remember that they exist?

Also does Google delete everything? How they know how many accounts and shit you have?
>>
>>59015603
Who is to say that they don't analyze your data for that already? You cucks made it mainstream enough that would warrant such precautions
>>
>>59019877
Do you even know what stenography is?
>>
>>59015304
Nigger kikes want mass surveillance so they can profit more for Israel
>>
File: court-reporter.jpg (41KB, 825x800px) Image search: [Google]
court-reporter.jpg
41KB, 825x800px
>>59019936
Yes, I think you mean steganography, which is also detectable with a little scrutiny
>>
>>59019580
buy one which can run openwrt. if you're too normie to run GNU/Linux on elcheapo proprietary chinkbox, buy Turris which is basically the same, but comes preconfigured with paranoia defaults and normie web interface, yet still decent hardware for the buck.
>>
>>59019580
Stock firmware is trash. All of it. It's poorly secured and rarely updated because companies making no-sharp-corners plastic boxes for the consumer market know that good security is expensive, and an ongoing commitment. They don't want to pay that expense, since 99% of consumers don't know or care about security, and so of course they won't pay for it. Also the company has made all the money they'll ever make from the device as soon as its sold, so they don't want to go on providing patches and new firmware for the thing for years. That's expensive.

So at a very minimum you want something that you can flash OpenWRT on. You can also take the crappy device out of the loop by putting it in dumb access point mode, and having something else do the routing, like a computer running pfSense.
>>
>>59017243
>>59017256
Do you understand what selinux and tails are? They do completely different things.

A good access control system is essential if don't want your web browser to have full read write access to all the files your user has.
>>
Been waiting eons for basef op and his thread. Thanks
>>
>>59020810
This

I think about /fucko/ everyday. papa bless OP
>>
>>59015304
>using the smiley with a carat nose
>>59015619
>quoting the smiley with a carat nose
>>
>>59017243
The fuck is SE Linux?
>>
>>59021826
NSA Security-enhanced Linux is a set of patches to the Linux kernel and some utilities to incorporate a strong, flexible mandatory access control (MAC) architecture into the major subsystems of the kernel. It provides an enhanced mechanism to enforce the separation of information based on confidentiality and integrity requirements, which allows threats of tampering and bypassing of application security mechanisms to be addressed and enables the confinement of damage that can be caused by malicious or flawed applications. It includes a set of sample security policy configuration files designed to meet common, general-purpose security goals.
>>
Isn't it sort of pointless to try to protect your computer against no-knock raids? I was always taught that physical access to a computer means all the data will be eventually compromised
>>
>>59021838
I know what SELinux is. You will note the lack of a space between E and L. You will also note that it's not a Linux distribution and, as such, the concept of "slamming [it] on [sic] a toughbook" does not make any logical sense.
>>
>>59019756
If the account has been dormant for years then what does it matter, autismo?
>>
Remember kids, if you're in America, you'd better have hidden volumes in all of your hard drives or you're going to get fucked.

https://arstechnica.com/tech-policy/2017/02/justice-naps-man-jailed-16-months-for-refusing-to-reveal-passwords/
>>
>>59021944
Because they still exist and can be viewed, especially something like a Facebook.
>>
>>59015962

You cannot claim that 100% fail safety is possible. On any system for that matter. Case in point:

https://en.wikipedia.org/wiki/List_of_military_nuclear_accidents

With that said, this defeatist attitude is literally psyop, as in: don't even try you cannot win.

Pro tip: you can have enough safety, to live a worry free life, provided you have a shred of intelligence and willingness.

Pro tip 2: You can win.
>>
>>59021876
>>59021948
the lesson of this is that if the authorities take an interest in you personally and know who you are, you've lost. You need take precautions against that ever happening, not rely on anything to save you once it does.
>>
>>59022462
You need to do both. Staying out of sight is the most important thing, but it doesn't always work out.
>>
Gentoo hardened + grsecurity+PaX + SELinux with strict setup, https://wiki.gentoo.org/wiki/Project:Hardened
>>
>>59024620
what is the point of your post?
>>
>>59024693
Are you mentally retarded or just a fucking idiot?
>>
>>59024711
Just a fucking idiot, I'm afraid. I can't seem to figure out what you're trying to tell us.
>>
Just droppin that there
htll dot info
>>
File: password_strength.png (91KB, 740x601px) Image search: [Google]
password_strength.png
91KB, 740x601px
True?
>>
>>59027116
the thing that makes cracking conventional passwords easy is that people are very non-random. They're very likely to make the first character a capital letter, much more so than other characters. They usually tack on numbers at the end. If the numbers are in the middle it's probably an l33tsp34k style substitution, etc.

Thing is, passphrases don't really solve this very well. Ask people to string together some words and they won't pick random ones, they'll pick something memorable. It stands a good chance of being something that makes sense as an English phrase or sentence. There goes most of your entropy, right off the bat. Rhymes are a good guess, as are song lyrics, famous quotes, etc.

The only thing that'll stand up to a guy with hashcat and a rack full of GPUs is something that's actually random, and long enough to blow up the number of guesses needed into huge numbers. "cp98rre12vfnXeG6wizHJz+A" is not in any danger. Of course it's impossible to remember. So what though, we have password managers. Its our attempts to maintain passwords that we can store in our heads, instead of in an encrypted file, that's making them all so ridiculously insecure.
>>
>>59015380
>don't use Oxford commas

Why?
>>
>>59027116
No, dictionary attacks are a thing.
>>
>>59027116
Eh, yes and no. Yes because the people who take that advice will have a password like that anyway, and longer is always better. Randomxd sentences like that especially, since it would be more difficult to guess what the next word might be through looking at common usage. A lot of master password sections of key manager guides for normies recommend exactly that.

No, because it will never be remotely as strong as an equally long random string with a character set of 90+ (ie letters both caps and lowercase, numbers, and symbols) instead of 26-62 (letters and maybe numbers only).

>>59027322
I think it was a joke since that statement followed an Oxford comma
>>
>>59027116

Maybe. From what I can tell, I'm not sure if this accounts for dictionary attacks.

You can treat each word in the English Language to be 1 bit in a dictionary attack. If you limit your guesses only to include real words the amount of combinations is possibly reduced.

I am incapable of doing the math to figure out by how much :/
>>
>>59027116

useful only if you use a dead language like ancient sumerian
>>
>>59027411
well you determine the possible combinations by taking the length of a password and raising it by a power using the number of characters.

So if you have a 6 letter password, all lowercase, it would have 6^26 possible combinations.

If you applied this to a sentence, it would be (number of words in the sentence) ^ (number of words in the dictionary), so a 6 word sentence would have 6^180000 possible combinations.

That's before you get into capitalization, punctuation, participles, all those permutations like 7 instead of t, etc.
>>
File: g kiddies.webm (3MB, 1280x544px) Image search: [Google]
g kiddies.webm
3MB, 1280x544px
>>59015304
I'll give you a webm for the next thread
>>
File: tsa.jpg (397KB, 4288x2848px) Image search: [Google]
tsa.jpg
397KB, 4288x2848px
"I'm sorry, sir, you have to give me your computer's password before you are allowed past the checkpoint."
wat do?
>>
>>59027727
plead the fifth, as the american constitution protects against self-incrimination
>>
>>59027516
That's backwards you donkey. It's charset^stringlength
>>
>>59027516
>6^26
Wrong. With my PC that would take roughly 80,000 years to brute force.
It's actually 26^6, which would (and does) take only a fraction of a second to brute force with something like ophcrack.
>>
want to encrypt my hdd but bitlocker doesnt come with my windows version

3rd party doesnt let me encrypt without reformatting the drive or do it easily on hdd with partitions

why bother. make it easy or I'm just going to leave it be
>>
File: 1487463821177.png (2MB, 1440x900px) Image search: [Google]
1487463821177.png
2MB, 1440x900px
>>59028647
>using Windows
>Trusting Bitlocker
>>
>>59015304
What are some good alternatives to google docs?
>>
>Devuan GNU/Linux
>encrypted SSD
>vanilla torbrowser installed
>firefox-esr w/ uMatrix, uBlock Origin, HTTPS everywhere.
>planning to install dnscrypt

Smartphone-wise (I know smartphones are a no-no):
>LineageOS
>encrypted
>no GApps, no microG either
>95% of apps from f-droid
>dnscrypt installed and operational

Am I doing okay? (spare me the smartphones are massive botnet speech - I realise this completely).
>>
>>59027778
Correct me if I'm wrong, but wasn't there some retarded court ruling that said that surrendering passwords doesn't count as self-incrimination? Could've sworn I read about that somewhere.
>>
>>59015761
https://action.aclu.org/secure/trumpFOIA?

DRUMPFT BTFO!!!
>>
uMatrix or No Script?
>>
>>59030216
No Script
>>
Need advice please. I travel a lot so I need a smartphone were I can read and edit my documents, write email, great battery life and secure. Security is really import for my job. What should I buy?
>>
TrueCrypt or VeraCrypt? Which is more secure, and why?
>>
>>59030737
veracrypt

truecrypt is obsolete
>>
>>59020810
>>59021089
Thanks guys. I always enjoyed these threads too. So let's blow some new life into it!
>>
>>59030578
Interested in suggestions as well.

Some general mobile device though:
+Always do updates asap.
+Never use open wifi without a vpn.
+Use full disk ecryption with a strong pw(default with latest android/ios).
+Don't use fingerprint scanners they're shit.

+App suggestions:
--Signal for regular coms (convince your friends it's a really nice app getting a lot of traction).
--Orfox/orbot for browsing anonymously
--Google authenticator for all your 2 factor auth (sms/call 2FA < app 2FA usually)

From a security perspective rooting is not recommended. Altough an adblocker on a rooted phone would probably help your security now i think of it (malvertising is rampant).
>>
>>59030737
VeraCrypt obviously, TrueCrypt isn't updated anymore and the developers announced it insecure.
>>
>>59031315
>--Signal for regular coms
Another good one I've found is Wire. End-to-end encrypted messages and video calls, open-source, audited. The only issue I know of is that the server isn't open-source, but if I remember correctly, it will be in the near future.
>>
>>59020025
>Turris
Is it worth the moneyz?
Tips/guide for self-building one? With a good security configuration ofc.
>>
The Chronicle article is paywalled
>>
>>59031361
Didn't know Wire yet, thx anon. Looks cool wondering about their business model tho.
>>
>>59031407
Yup it is see:

>>59016050
>>59016082
>>59015802
>>
>>59031445
Right, now that you mention it, that's another concern of mine. It seems too good to be true. Where's the money?
>>
>>59031458
Well for Open Whispers Systems (org behind Signal) the model is non-profit based on donations. They actually pay out ~60d dollas for accepted pull requests for bugfixes/new features.
>>
I want ublock to continue to block sites from tracking me on the web, but it makes using Google shopping (a really convenient tool) impossible

What lists do I have to disable to stop googleads and the like from blocking me, and is it worth it to disable those lists?
>>
>>59031315

Thanks for reply. I really appreciate your help!!
Do you have a specific smartphone to recommend?
Currently I have an iPhone 6s but I can't edit document/Mail and the screen is small. I have it due to my employer's need of security communication.
>>
>>59029520
You are doing good.
>>
>>59030578
>>59031640

http://redmine.replicant.us/projects/replicant/wiki/GalaxyS3I9300
Expensive but is the most secure phone as of now. Use F-Droid instead of gapps.
>>
>>59031771
Sorry wrong link, here https://tehnoetic.com/mobile-devices
>>
>>59031771

I didn't know F-Droid before. You've help me a lot!
Do you think is good Oneplus 3t as an alternative to my iPhone 6s?
It has a big screen so I can sent attached files and edit :)
>>
>>59030216
uMatrix, but blocking all by default except css and images.
>>
>>59031841
I didn't use any of those, can't help.
>>
>>59015304

How does /g/ feel about scriptsafe?
>>
not sure i should be posting here or make a tread but oh well. how private is facebook messenger and what alternatives would you recomend? i've been chatting with some people and they tell me it's not really safe to talk through messenger though i dont see a reason why not. Anyone who can help or at least refere me to a good source?
>>
When I upgrade to my next computer I am looking at building it in a way that it has as little connection to the Internet before being as locked-down as possible. Totally new accounts and so on.

Any guides for such a thing? It'd be a lot of taking installation media and such from another computer of course. Is it possible to use a Windows VM inside such a thing, or is that just asking for it?
>>
>>59033445
>how private is facebook messenger
Not at all. You should assume that nothing run by an advertising company is private or secure.
>>
>>59033639
Can you elaborate on what you're planning on using the Windows VM for? Also, in what ways were you thinking of locking it down?
>>
My drive is encrypted and Veracrypt randomly sometimes freezes at the start when it asks for my password. Anyone else had this?
>>
>>59027727
Don't have any information on your devices. Keep no actual data in your computer.
>>
Here's what I do

I use internet only on a Live USB environment loaded onto RAM.
>LXLE
>Porteus
>PartedMagic
If I need office utilities I'll load Ubuntu.

I can not escape the need for online accounts, that includes facebook, most people I know communicate through FB Messenger, so it is mandatory, but I keep in mind it is like talking in a public room where everyone can hear you.

I keep no data on my computer, this comes more from experience than security POV, shit happens because of reasons and poof there goes your data, I keep shit on external drives.
>>
>>59033445
It's unsecure as shit. They literally data mine your private messages. Talk about wanting to buy a laptop and you will get ads about laptops.

No end-to-end encryption so they read everything and will hand/sell everything to any party they deem necessary or profitable.

Whatsapp owend by fb should be viewed at with the same caution. It's flipswitch propriatary 'end-to-end' encryption. As soon as they see value in disabling it for your account they will.
>>
>>59035673
This sounds like a huge pain in the ass.
>>
>>59019976
Lol.
I'm sorry i'm just dyslexic and didn't realise the difference in both words. Mea culpa. 10/10 reaction tho
>>
>>59036945
It just depends on what you do I suppose. I don't have a job that is tech related in anyway and computers are more of a hobby for me.

The risks of having your data exposed to whatever because you're online are to great, you can argue that if I knew more about technology I could protect myself, that argument is not wrong but at the same time its not right, everyday there are exploits being found out, you can't ever possibly keep up. Best way to deal with it is to remove your data from the equation, as long as it is safe, you are free to do whatever to your PC without fear of losing data.

The advantage of LiveUSB sessions everytime you use your PC is obvious, you get a clean environment that you literally don't have to worry about, Porteus gives you the choice between Chrome or Firefox, when I load it I get a clean environment everytime, no cookies no logins no history to worry about. Loading ublock takes no time and there is no data to be snooped. It works for me.
>>
>>59036945
>quation, as long as it is safe, you are free to do whatever to your PC without fear of losing data.

Security is inherently inconvenient
>>
>>59036945
I had asked who else did this on r/privacy once. One guy claimed to do the exact same thing with puppy linux, with the extra feature of encrypted persistence residing on the hard drive. He claimed he could keep personal settings, data and applications on a encrypted file and it was automatically setup and detected by puppy linux. So I recommend that if you want to fool around with it.
>>
>>59037800
/r/privacy is an oxymoron
>reddit
>privacy
>>
>>59030178
No, they threaten to hold you indefinitely and everyone they've pressured to do it has so far pussed out. Nobody's actually tried to challenge it so the court hasn't had to make a ruling.

Also technically you're not surrendering your passwords, since that has been ruled illegal by the supreme court, through some case in the 70s where they ruled a defendant couldn't be compelled to give out his padlock combination. What they do is make you use your password and decrypt it for them, which is 100%, indisputably, incriminating yourself and I don't understand how they even get away with it.
>>
File: 1320478140982.png (28KB, 500x500px) Image search: [Google]
1320478140982.png
28KB, 500x500px
I'm looking for the chrome equivalent of FF's random agent spoofer
>>
>>59015304
>no one mentions the Dark Mail Technical Alliance
Amateurs.

The Dark Mail Technical Alliance is a group of people developing the Dark Internet Mail Environment (DIME), an environment of protocols that aims to fix the privacy problems of traditional email (SMTP/IMAP/POP3).

Anyone can implement it with Magma and HEY VINCENT CANFIELD NOTICE ME SENPAI
>>
>>59038344
I thought it was already demonstrated that they were ineffective when the FBI bullied Lavabit into shutting down.
>>
>>59038426
>???
>what
>>
>>59038435
>>59038426
They shut down the servers to prevent the FBI from getting the keys. They claim to have fixed the problem now.
>>
>>59038449
They shut down because FBI wanted the keys and Levison thought that was unreasonable, but they had always fully complied with the FBI prior to that.

Their whole deal was that they claimed to be so secure not even the administrators could read your email. Doesn't this prove that was a lie?
>>
>>59038266
If you care about your privacy job one is ditching Chrome.
>>
>>59038512
Why would I need to trust them or give them my keys?
>>
>>59038266
Umatrix has user agent spoofing
>>
>>59038632
You have to remember to keep your list of custom useragents updated yourself though. RAS handles that automatically, and has a lot of other convenient privacy switches thrown in.
>>
>>59038587
You wouldn't need to give them your keys because they had their own. That's what the FBI was after.
>>
>>59038738
Would you mind developing more or does it make you feel like a special snowflake?

>In Trustful mode, we have moved from the SSL key typically stored on the server to a secure hardware device. The former is an extremely common setting for many SSL enabled sites throughout the internet. We have installed FIPS 140-2 hardware security modules which allows us to use a TLS key without having to access it directly. Any attempt to extract the key will trigger a tamper circuit causing the key to self-destruct. The only account capable of extracting the key is the HSM supervisor. To prevent this we set the passphrase blindly thus locking us out. We suggest anyone not comfortable with trusting the provider to utilize the Cautious or Paranoid modes.

The key the FBI was after was the SSL key, which they claim they don't have access to. I have my own GnuPG keyring. How does your comment even make sense?

And I didn't mention Lavabit, though they're founding members of the Dark Mail Technical Alliance. But hey, maybe you're more knowledgeable about PGP than Phil Zimmerman?
>>
>>59027778
Unfortunately you can't plead the fifth cause airports don't technically count as US territory thus the constitution and your rights are worth shit
>>
>>59038869
Neat, I didn't know Lavabit was back.
>And I didn't mention Lavabit
I brought it up because last I heard Levison was working on DIME solo.
>>
>>59038929
Oh ok then, sorry for the misunderstood. You're a bit late in the news :P
>>
File: 1401849740286.jpg (16KB, 311x253px) Image search: [Google]
1401849740286.jpg
16KB, 311x253px
>>59038534
I'm using iridium actually

>>59038632
>>59038671
Umatrix sounds interesting overall but I'm unsure if I should let it remplace my other privacy add ons
>>
>>59038959
Umatrix is a script blocking, user agent spoofer, and HTTPS enforcer
I use it just because it uses less resources than having separate extensions for all of those
>>
Should I bother? Looking back at the past I had a real non chalant attitude with these things. Made some mistakes(done what is advised to not do in this thread) with software, hardware and social media. Am I too late?
>>
>>59037948
>he says as he solves a google captcha
>>
>>59039378
It's never too late. Never give in, anon
>>
>>59038997
[citation needed]
>>
Sigaint has been down for a week wtf happend.
Thread posts: 156
Thread images: 18


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.