Anon Archived Serious thread: infosec, opsec, guerrilla war, advice (8chan)
submitted ago by 2980539?
Posted by: 2980539?
Posting time: 1.9 years ago on
Last edit time: never edited.
Archived on: 4/19/2019 10:00:00 AM
Views: 308
SCP: 1
1 upvotes, 0 downvotes (100% upvoted it)
Anon Archived Serious thread: infosec, opsec, guerrilla war, advice (8chan)
submitted ago by 2980539?
view the rest of the comments →
[–] 16204066? ago
One thing that's gotta happen ASAP is an extra otp layer for fde and for coms, particularly text chat & (text) email.
Even with 90's tech it was already possible to establish a 100% uncrackable line of communication with someone with whom you have occasional physical contact, by physical exchange of CD's containing otp. Imperfect, because they couldn't be destroyed. Well, now we have HDD, which can be erased, and also which can be effectively destroyed (by heating the platter with a flame).
This is to be used in ADDITION to whatever encryption you may prefer, AES being surely adequate for most purposes.
[–] 16204111? ago
Huh? You can easily destroy CDs or DVDs by dousing them in gasoline and setting them on fire. Destroying HDD is harder. You have to sand down the platters.
[–] 16204072? ago
>>11836708
>>11839060
Also, in addition to DBAN, you want to always be using full disk encryption (FDE) - but, if you use FDE, you need to have an excellent backup system, with offsite backups.
And this gets into the topic of keyfiles, like using a thumb drive to store a key for VeraCrypt. The degree to which this increases security is amazing. You go from "maybe they can guess your password" to "they gotta find that damn thumb drive".
[–] 16204078? ago
>>11839076
about the thumb key drive, isn't it possible for someone to just map the usb drive then crack it that way? something about this doesn't add up. someone mind shedding some light on this?
[–] 16204074? ago
That is, "they gotta find that damn thumb drive AND then try to guess the password"