User Controls

there needs to be an open source means of communication that can't be tampered with

  1. #21
    Sudo Black Hole [my hereto riemannian peach]
    Originally posted by aldra https://puri.sm/products/librem-5/


    is what I meant to post

    Lol, that's a kiddie phone but is more functional than cipher which is just for sending messages and pictures back and forth and costs 1k every 6 months

    Sorry for the vice

    https://www.vice.com/en_us/article/gyewe9/phantom-secure-ceo-pleads-guilty-vincent-ramos

    The only issue I can find with the phone is that every phone has the same preprogrammed password which seems a little sketchy and like there's a way to use it to bypass certain things. The CEO definitely made the FBI mad as hell tho so he must have been doing something right
  2. #22
    aldra JIDF Controlled Opposition
    Originally posted by Sudo https://www.vice.com/en_us/article/gyewe9/phantom-secure-ceo-pleads-guilty-vincent-ramos

    The only issue I can find with the phone is that every phone has the same preprogrammed password which seems a little sketchy and like there's a way to use it to bypass certain things. The CEO definitely made the FBI mad as hell tho so he must have been doing something right

    https://www.vice.com/en_us/article/pa73dz/fbi-tried-to-plant-backdoor-in-encrypted-phone-phantom-secure

    looks like they busted him because he wouldn't let them play with his toys
  3. #23
    -SpectraL coward [the spuriously bluish-lilac bushman]
    Most of these are actually honeypots, financed by intelligence agencies from around the world. Advertised and hyped as safe havens, when they're actually portals to everything you hold dear.
  4. #24
    Bueno motherfucker
  5. #25
    Kuntzschutz African Astronaut
    Originally posted by -SpectraL Most of these are actually honeypots, financed by intelligence agencies from around the world. Advertised and hyped as safe havens, when they're actually portals to everything you hold dear.

    Welllllp, I was in a semi remote location last night, nowhere near any kind of electronic device and I mentioned "maroon 5" and the first thing that pops up on google today was a maroon 5 ad. I don't like that band, but these little coincidences happen all the time. Satellites using interferometry and electrostatic imaging can record your passwords and conversations without a backdoor or bug on whatever device you're using.

    So unless you're using the secured device inside a faraday cage that is double walled, you're not really secure at all.

    If I didn't know what I know, I'd be feeling like they had a bug in my clothes or something.
  6. #26
    -SpectraL coward [the spuriously bluish-lilac bushman]
    Read up on air gap hacking. Frightening.


    https://www.wired.com/story/air-gap-researcher-mordechai-guri/
    https://www.sciencebuddies.org/science-fair-projects/project-ideas/Cyber_p006/cybersecurity/air-gap-computer-hacking

    https://en.wikipedia.org/wiki/Air_gap_(networking)

    "Sophisticated computer viruses for use in cyberwarfare, such as Stuxnet[6] and agent.btz have been designed to infect air-gapped systems by exploiting security holes related to the handling of removable media. The possibility of using acoustic communication has also been demonstrated by researchers.[7] Researchers have also demonstrated the feasibility of data exfiltration using FM frequency signals.[8][9]"
  7. #27
    Kuntzschutz African Astronaut
    Originally posted by -SpectraL Read up on air gap hacking. Frightening.


    https://www.wired.com/story/air-gap-researcher-mordechai-guri/
    https://www.sciencebuddies.org/science-fair-projects/project-ideas/Cyber_p006/cybersecurity/air-gap-computer-hacking

    https://en.wikipedia.org/wiki/Air_gap_(networking)

    "Sophisticated computer viruses for use in cyberwarfare, such as Stuxnet[6] and agent.btz have been designed to infect air-gapped systems by exploiting security holes related to the handling of removable media. The possibility of using acoustic communication has also been demonstrated by researchers.[7] Researchers have also demonstrated the feasibility of data exfiltration using FM frequency signals.[8][9]"

    I've read up on that quite a lot. Lots of interesting methods, although not too practical for your average run of the mill hacker.

    EDIT: side note, I want google employees burned alive and blown to bits along with every intelligence agency spook and fusion center within a 100 mile radius from me. It's going to happen. The more they invade people's privacy like this, the more they are sealing their fate.

    Invading people's privacy and doing it while rubbing it in their face is two different things. It was as if they had a parabolic mic on me, but it's not even that, it's something more complex and more difficult to get away from. These people need to burn.
  8. #28
    -SpectraL coward [the spuriously bluish-lilac bushman]
    They're now digging through all the recordings and data they are getting from the idiots running these Siri, Alexa and Google Home Assistant devices. They're just shitting pants at how much valuable information they are now able to collect. Voiceprints, intimate private conversations, passwords, names to street addresses, you name it. The sky is now the limit.
  9. #29
    Kuntzschutz African Astronaut
    Originally posted by -SpectraL They're now digging through all the recordings and data they are getting from the idiots running these Siri, Alexa and Google Home Assistant devices. They're just shitting pants at how much valuable information they are now able to collect. Voiceprints, intimate private conversations, passwords, names to street addresses, you name it. The sky is now the limit.

    Of course and the really shitty thing is like I said no electronic device or bug needs to be present at all, no paarabolic mic, no laser mic. They now have satellites to do all of this. You could go into an empty house, alone, no smartphones or anything else, with the power turned off, and say certain keywords and it'll pop up in youtube or google ads if you go to google. Why? Because every thought you have any every word you speak has ELF waves associated with it that are picked up via satellites and decoded into your actual thoughts and feelings. They can also tell which part of your body is in pain at the moment.

    Problem with this is, it isn't just the government doing this shit, evidenced by google obtaining that information. The fact that they're letting google obtain this kind of information is reason enough to kill all of them. Slaughter them all. This is a war.
  10. #30
    AngryIVer African Astronaut [my jade controlled morrigan]
    Oh, wait, I thought of one: Fucking meet people in person.
  11. #31
    -SpectraL coward [the spuriously bluish-lilac bushman]
    Originally posted by AngryIVer Oh, wait, I thought of one: Fucking meet people in person.

    Foot to mouth to ear. The lowest common denominator.
  12. #32
    AngryIVer African Astronaut [my jade controlled morrigan]
    Originally posted by -SpectraL Nonsensical garbage

    Yeah, that's what I thought.
  13. #33
    Speedy Parker Black Hole [my absentmindedly lachrymatory gazania]
    Originally posted by -SpectraL Smoke signals
    Homing pigeons
    Mirrors
    Ham radio equipment
    Foot messengers
    Message in a bottle
    Projecting messages onto clouds (re: Batman)

    Or just a quiet conversation in a park
  14. #34
    -SpectraL coward [the spuriously bluish-lilac bushman]
    Originally posted by Speedy Parker Or just a quiet conversation in a park

    Or even a quiet whisper in the ear.
  15. #35
    AngryIVer African Astronaut [my jade controlled morrigan]
    Originally posted by Speedy Parker Or just a quiet conversation in a park

    That's what I said earlier. Just meet in person. There's no NSA back door to a real life conversation (assuming you don't have cell phones on you or do it somewhere stupid).
    The following users say it would be alright if the author of this post didn't die in a fire!
  16. #36
    Kuntzschutz African Astronaut
    Originally posted by AngryIVer There's no NSA back door to a real life conversation (assuming you don't have cell phones on you or do it somewhere stupid).

    That's false, http://www.measurement.sk/2005/S2/Lipkova.pdf

    The body emits ELF waves associated with everything you say, these are picked up and decoded to re-create everything you say perfectly. The higher the frequency, the shorter the distance the wave can travel, and since ELF is extremely low frequency, it's pretty goddamn difficult to stop your ELF waves from leaving your house and being intercepted by a higher frequency from a satellite or BTS that is then used as an interferometry wave to decode and recreate everything you say.

    This is why remote neural monitoring is the ultimate form of surveillance.

    EDIT: also why the government made spark gap transmitters above 3 kilo volts illegal, they hit almost every frequency with random bits of information


    https://en.wikipedia.org/wiki/Tempest_(codename)

    https://en.wikipedia.org/wiki/ECHELON


    EDIT2: http://xyzhang.ucsd.edu/papers/TWei_MobiCom15_Vibrometry.pdf

    That too. Anything flimsy, including your hair and pieces of paper, will vibrating when you speak, and a wave with a high enough frequency will also pick up that vibration and through interferometry, everything you say can be re-created, with no need for any microphones present in the building that you're speaking in.

    EDIT3: https://cryptome.org/audio-spy.htm

    https://cryptome.org/jya/usic08.htm

    The ease with which signals (whether communications or electronic signals) can be intercepted and understood depends on three factors: the method of transmission, the frequencies employed, and the encipherment system (or lack of) used to conceal the signals meaning form unauthorized personnel.

    The most secure form of transmission is that sent by cables, either land lines or underwater cables. Communications or other signals transmitted through such cables cannot be snatched out of the air. Interception of cable traffic has involved physically tapping into the cables or using "induction" devices that are placed in the proximity of the cables and maintenance of equipment at the point of access. This might be unobtainable with respect to hardened and protected internal landlines, the type of landline that carries much high-priority, secret command and control communications. Undersea cables are most vulnerable since the messages transmitted by them are then transmitted by microwave relay once the cable reaches land.

    A tremendous volume of communications is sent via satellite systems. Domestic and international telephone messages, and military and business communications are among those regularly transmitted via satellite using ultra, very, super, and extremely high frequencies (UHF, VHF, SHF and EHF). Thus, the United States has established major programs for the interception of Soviet and international commercial satellite messages. By locating satellite dishes at the proper locations, an enormous volume of traffic can be intercepted. Ground stations that send messages to satellites have antennas that direct the signals to the satellite with great accuracy; satellite antennas, on the other hand, are smaller and the signals they send back to earth are less narrowly focused–perhaps covering several thousand square miles.6

    Often, communications that are transmitted through part of their path by satellite are sent via microwave towers through the rest of their path. In other cases, particularly telephone calls within a country, microwave towers serve as the entire means of transmission and reception. For example, in Canada, the majority of telephone calls are transmitted via microwave. As one observer has written with regard to microwave relay towers:

    Interception of cable traffic has involved physically tapping into the cables or using "induction" devices that are placed in the proximity of the cables and maintenance of equipment at the point of access.

    I always wondered about doing that.
  17. #37
    Speedy Parker Black Hole [my absentmindedly lachrymatory gazania]
    Originally posted by Kuntzschutz That's false, http://www.measurement.sk/2005/S2/Lipkova.pdf

    The body emits ELF waves associated with everything you say, these are picked up and decoded to re-create everything you say perfectly. The higher the frequency, the shorter the distance the wave can travel, and since ELF is extremely low frequency, it's pretty goddamn difficult to stop your ELF waves from leaving your house and being intercepted by a higher frequency from a satellite or BTS that is then used as an interferometry wave to decode and recreate everything you say.

    This is why remote neural monitoring is the ultimate form of surveillance.

    EDIT: also why the government made spark gap transmitters above 3 kilo volts illegal, they hit almost every frequency with random bits of information


    https://en.wikipedia.org/wiki/Tempest_(codename)

    https://en.wikipedia.org/wiki/ECHELON


    EDIT2: http://xyzhang.ucsd.edu/papers/TWei_MobiCom15_Vibrometry.pdf

    That too. Anything flimsy, including your hair and pieces of paper, will vibrating when you speak, and a wave with a high enough frequency will also pick up that vibration and through interferometry, everything you say can be re-created, with no need for any microphones present in the building that you're speaking in.

    EDIT3: https://cryptome.org/audio-spy.htm

    https://cryptome.org/jya/usic08.htm





    I always wondered about doing that.

    https://getlambs.com/products/boxer-brief?variant=20852036010073&gclid=CjwKCAiA8K7uBRBBEiwACOm4d5jN5gOOayVVpbuYtp6dkwsnI7tYyYzsP0bvoxCH4AkSi36IT_TotBoCtXsQAvD_BwE
  18. #38
    aldra JIDF Controlled Opposition
    Originally posted by AngryIVer That's what I said earlier. Just meet in person. There's no NSA back door to a real life conversation (assuming you don't have cell phones on you or do it somewhere stupid).

    lol, the UK has placed listening devices in all sorts of public spaces under the guise of 'combatting terrorism'.

    I actually assume there's a project to build and deploy low-cost networked surveillance devices in a mesh network to collect audio indiscriminately, only to be organised by pseudo-AI back at base. The only reason I'm not certain is that it'd be a very difficult thing to keep quiet and nobody's 'blown the whistle', so to speak
  19. #39
    aldra JIDF Controlled Opposition
    Originally posted by Speedy Parker https://getlambs.com/products/boxer-brief?variant=20852036010073&gclid=CjwKCAiA8K7uBRBBEiwACOm4d5jN5gOOayVVpbuYtp6dkwsnI7tYyYzsP0bvoxCH4AkSi36IT_TotBoCtXsQAvD_BwE

    you laugh but it's actually a pretty good idea; I've seen some evidence that the radiation given off by wireless devices can potentially impact sperm count, especially since most people keep their phone in their pants pocket

    ***1 pair for $45 though, goddamn
  20. #40
    -SpectraL coward [the spuriously bluish-lilac bushman]
    Two tin cans, really long string.
Jump to Top