LOL, well, What was he waiting for ? and what do you mean when you say "westie?" At first I thought you might be referring to an American girl. But then I read the sentence where she actually speaks and I can see a different accent other than American by the type of language that is used.
Slam pig is pretty offensive, I think it is a good and refreshing insult but I hear it also sounds a lil lame.
Sausage wallet made me lol. I never heard that before.
it's an australian/british thing. have you ever heard the bogan or westie accent?
true story: friend of a friend gets fuckin hammered, goes home with some really rough-looking westie girl. gets invited inside, sitting on the couch waiting for coffee to boil, she says,
"well, what are ya waiting for? just chuck it in, aye!"
if you want, but I'll probably just post whenever I think of something worth posting rather than a regular schedule.
and yeah, I will probably write a fair bit on privacy, censorship, surveillance and security, and by extension opsec - I don't particularly like the word or giving direct advice on that though; I believe you should devise your own operational security principles based on what you're trying to protect and what from. the problem with cookie-cutter tutorials like use tails, use tor etc. is that a lot of people will take it as gospel without understanding why, leaving them open to making poor choices or weak configurations due to lack of understanding in the future
give me a few topics if you like, like I said in the other thread I'm planning on setting up a blog primarily to save interesting tech stuff - problems I've come across and solved previously, analyses and the like
Bill Krozby - I saw someone post (in the comments on a news site) about the police using CIs to harass people, similar to the 'gang stalking' you were talking about a while ago. they referred to a 'project infra-' something, I don't recall what it was and I can't seem to work it out just by general searching - do you know what they were talking about? I'm curious to see if it's an actual, documented operation
fa\ir enough, chances are it's one of those Atheros/beta chipsets where the full hardware spec was released allowing for completely open-source drivers, much to the FCC's chagrin. I quite like them, but last I tried it out the only chipsets that had fully open-source drivers (with modules for monitor/inject etc) were fairly old, barely 802.11g capable and missing a bunch of features and extensions. I'm curious if that's still the case but don't really have time to wade through the documentation at the moment.
still, if you're using it for 'research' into wireless standards instead of just day-to-day use, not really an issue. get a YAGI antenna and snipe people off their own wireless networks from the other side of town, lel
is it one of the chipsets with complete lunix drivers or one of those ones that has a windows driver with scanning/monitor/promiscuous etc extensions, because the latter tend to be stupidly expensive
please recommend me your favourite VPN services. I'm planning on starting a blog, and it's become apparent that my political views are often very gross and have a habit of pinning people down and raping them savagely inside their safe-spaces. the only reason I'm even bothering is the proliferation of spastic 'hate' laws and the chance of someone getting so upset about something they read that they feel compelled to track down my employers to discuss their feelings.
I don't mind paying as long as it's not too expensive. minimal logging is preferable on general principle alone. OpenVPN is ideal. I want it to be fairly reliable and fast and using an open or well-known VPN package. I'd like to be able to use it from my phone.
I recall the chans/anons recommending Mullvad, looking at it now, looks solid. let me know if you have any experience with this provider also.
so potentially, even standard brute-force attacks should be relatively quick - the use of that algorithm in the RNG seems to make it possible to discard a large chunk of permutations, practically allowing you to immediately rule out a large number of possible passphrases
given the recent revelations, I would say anyone who knows what they're doing should have already abandoned the idea of brainwallets - any hash secure enough to withstand these attacks is not something most users will be able to remember. sure there may be a few still exploitable, but I'd doubt there's much profit to be made because A) a lot of people will have already stripmined the low-hanging fruit and 2) leaving BTC in a known-insecure wallet format is essentially leaving cash lying around, and people tend to be more careful with their money than almost anything else.