0
0

[–] 16204049? ago 

Thanks for this thread OP, very interesting read

0
0

[–] 16204053? ago 

important

0
0

[–] 16204055? ago 

have a bump

0
0

[–] 16204059? ago 

Most of this stuff will not work in the US, and the whole organizing militias thing is a trap.

You’re not touching the capacity of the US intelligence infrastructure with your pc and tor. If you think that you’re hidden with tor you’re wrong. The tor posters are usually involved with, in some form or fashion, law enforcement or something entirely different. So you’re only throwing up flags when you log ONTO YOUR HOME ISP TO DO WHAT IS CALLED BUILDING YOURSELF A PROFILE AS A TERRORIST.

Sage, for the love of everything decent sage.

Learn to code and write your own encryption not based on public libraries developed by the alphabets if you’re interested in encryption. Don’t be a terrorist.

0
0

[–] 16204060? ago 

sage

doesn't sage

0
0

[–] 16204062? ago 

Blah blah blah, everyone is out to get you, you are weak, resist in absurd way (build your own crypto), everything is compromised.

I wonder where i've heard all that…

0
0

[–] 16204064? ago 

page 11

0
0

[–] 16204065? ago 

Well, first of all, this site is (((controlled))).

0
0

[–] 16204066? ago 

11836667

One thing that's gotta happen ASAP is an extra otp layer for fde and for coms, particularly text chat & (text) email.

Even with 90's tech it was already possible to establish a 100% uncrackable line of communication with someone with whom you have occasional physical contact, by physical exchange of CD's containing otp. Imperfect, because they couldn't be destroyed. Well, now we have HDD, which can be erased, and also which can be effectively destroyed (by heating the platter with a flame).

This is to be used in ADDITION to whatever encryption you may prefer, AES being surely adequate for most purposes.

0
0

[–] 16204072? ago 

11839039

>>11836708

>>11839060

Also, in addition to DBAN, you want to always be using full disk encryption (FDE) - but, if you use FDE, you need to have an excellent backup system, with offsite backups.

And this gets into the topic of keyfiles, like using a thumb drive to store a key for VeraCrypt. The degree to which this increases security is amazing. You go from "maybe they can guess your password" to "they gotta find that damn thumb drive".

0
0

[–] 16204074? ago 

That is, "they gotta find that damn thumb drive AND then try to guess the password"

0
0

[–] 16204078? ago 

>>11839076

about the thumb key drive, isn't it possible for someone to just map the usb drive then crack it that way? something about this doesn't add up. someone mind shedding some light on this?

0
0

[–] 16204111? ago 

Huh? You can easily destroy CDs or DVDs by dousing them in gasoline and setting them on fire. Destroying HDD is harder. You have to sand down the platters.

0
0

[–] 16204067? ago 

0
0

[–] 16204070? ago 

It's some of the best advice you can get, indeed. So many, throughout history, have been fucked by that.

Consider otp. Every case of cracking of a code could have been prevented had otp been used instead.

Let that fucking sink in. Just some damn dice and a few hours could have, in many cases, even saved entire divisions.

0
0

[–] 16204069? ago 

Thanks for this thread, OP. I have it saved for personal reference.

load more comments ▼ (127 remaining)