0
0

[–] 16204219? ago 

Subgraph, Whonix, or Qubes?

0
0

[–] 16204223? ago 

you can use all three in this order:

qubes>Whonix>Subgraph

NOTE: the experts are warning to stay away from tails now due to a bug that they've not found a patch for.

When using email for communication with a trusted enduser, use a notepad document to write your message, then put it in a folder. Encrypt the folder, then run a md5/sha256 hash and post the hash value in the comment of the email. Furthermore, you should write your message in coded language and slang in the text document.

>>12282468

That's fine, just remember, it's tacked onto your IP, so if you're visiting unsavory websites, the feds will take notice. jus' sayin'. Also, the idea of making tor/i2p more mainstream, is to make as much noise as possible so it's harder to sift through.

>>12276999

powerpc doesn't work with linux, but a bsd distro does. something seems fishy about what you're saying. Furthermore, from the Snowden Leaks, the fedniggers are not above simply intercepting packages in the mail, opening them up and then inserting hardware/software that spies on the user. Come on anon, you'll have to do better than this.

12248629

The Mongols were actually the first group to protect against caravan and trade theft, only after the mongols conquered baghdad, of course. The mongols being rapists, at least had a code of honor regarding theft in times of peace as opposed to the arabs.

0
0

[–] 16204273? ago 

powerpc doesn't work with linux, but a bsd distro does

Linux runs on powerpc.

0
0

[–] 16204220? ago 

I've been visiting websites on a daily basis in an attempt to simulate behavior that could otherwise be perceived as congruent with a specific character archetype, the principle in mind being to throw off any big-data dragnets with a demonstrably false persona.

Simply put, I like the idea of my data being more expensive. Probable deniability is also hilarious.

0
0

[–] 16204225? ago 

Bamp

0
0

[–] 16204226? ago 

fuck glowniggers. make zem earn their shekelz hard.

https://tails.boum.org/home/index.en.html

https://media.8ch.net/file_store/59cd4bf16f734f7bd71ece94abf992957e16ac51f2b11c2816ecadeb44ecc556.pdf

Security: A Resistance Manual

by Sam Culper

Poor Communications Security (COMSEC) will lead to mission failure.

Mission failure may come as the result of interception of all communications, or the discovery of one piece of information that allows the regime

analyst to complete his understanding of your organization. The regime

analyst may not need every piece of your puzzle to get a good view of the

final image. In the eyes of the regime analyst, your organization is a puzzle waiting to be put together so treat every piece of information as if it’s

his last clue. What we say, when we say it, and where we say it matters.

COMSEC is a trade-off for time and efficiency.

https://archive.org/details/DecryptedSecretsMethodsMaximsOfCryptology4thRevisedExtendedEd./page/n1

https://www.stormfront.org/forum/t3014-27/

0
0

[–] 16204228? ago 

1488 o7

0
0

[–] 16204229? ago 

Bump

0
0

[–] 16204231? ago 

bump a day keeps the (((berg))) away

0
0

[–] 16204232? ago 

B a m p

load more comments ▼ (63 remaining)