User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 21
  6. 22
  7. 23
  8. 24
  9. 25
  10. 26
  11. 27
  12. 28
  13. 29
  14. 30

Posts by EasyDoesIt

  1. EasyDoesIt Tuskegee Airman
    All tell ya wat bod


    owl greb yer kwok
  2. EasyDoesIt Tuskegee Airman
    ...Tell ya wat bod


    owl greb yer kwok
  3. EasyDoesIt Tuskegee Airman
    Tell ya wat bod


    owl greb yer kwok
  4. EasyDoesIt Tuskegee Airman
    Oh shit you actually read that?
  5. EasyDoesIt Tuskegee Airman
    eeee
  6. EasyDoesIt Tuskegee Airman
    I just smashed a few windows . jail is option #2

    SCronaldo you're a fucking straight up idiot man.

    If RDFRN was one of the few things keeping you out of a depression then you are fucking crazy. Go to a shelter, quit trying to be high 24/7, get a job, and make your situation better for yourself. All the options you ever talk about are having somebody else take care of you or relying on a social support network because you can't fucking take care of yourself.

    Seriously what do you expect when you fucking chug cough syrup.
  7. EasyDoesIt Tuskegee Airman
    https://en.m.wikipedia.org/wiki/Satellite_Internet_access My network gets unlimited uptime Yo network gets DDOS downtime My network on space ships Yo network underground with worm shit My network uses high power lasers Yo network look like IBM punch cards https://en.m.wikipedia.org/wiki/Free-space_optical_communication

    Do you ever write anything that isn't fucking completely stupid?
  8. EasyDoesIt Tuskegee Airman
    Can't have enough encryption lol. But i take it you mean encrypting your Linux install during the installation process?

    Yeah basically.

    I overwrote existing disk space and then selected the encrypt option when installing my distro. Afterwards I created a temporary user, logged in, encrypted my home folder, logged into my user account, deleted the temp user and destroyed the logs.

    Then I toyed around and changed the splash screen and stuff.

    I have a math exam I've been studying for so I haven't been paying as much attention to my computers. I plan on installing VeraCrypt tonight if I don't wind up seeing this MILF tonight.
  9. EasyDoesIt Tuskegee Airman
    http://www.pcworld.com/article/2987439/encryption/newly-found-truecrypt-flaw-allows-full-system-compromise.html

    Just one of 100 articles like that discussing various TrueCrypt vulnerabilities.

    So what do you think about just encrypting your drives when you install the Linux Distro and adding a 35+ character password? What if I already did this, should I encrypt it again through VeraCrypt? Suppose I already encrypted my home folder, my drive, and put a 17+ character password to lock my HDD.

    Speaking of OS encryption, believe it or not, for a while one of the strongest encryption algorithms was actually in Windows XP! It's outdated now, but many Cyber Forensics textbooks (as recent as 2008) explore the difficulties of trying to recover data encrypted through Window's XP's cipher command. Not a lot of people knew about it, but you could encrypt stuff very easily right through your command line prompt.

    Anyway, this kind of brings me to my point about cryptography. The computers of today can break (many of) the encryptions of yesterday's computers somewhat easily. You have to keep up with Cryptography in order to make it useful and, if that algorithm gets compromised, your data is vulnerable. This is easy to keep up with, but that assumes you have access to your computer.

    I can't find the article, but there was a dude who got arrested for a computer that was confiscated over 14 years ago. They took over a decade to break the encryption, but as technology progressed, he didn't have it in his hands to do anything about it.

    My point is that cryptography is an old workhorse and has proven itself to be very useful, but it's not my end-all-be-all of data security. It's more like my last line of defense.

    Also check this out for laughs
  10. EasyDoesIt Tuskegee Airman
    Since zoklet there's been endless handwringing over merging forums. I was all for the big merge once upon a time but ultimately it costs nothing to have a subforum no one posts in and rolling them together tends to generate drama "ala MY THING is not the same thing as OTHER THING and should have its own forum".

    Just my two cents

    Yeah I mean the forum has spoken. Literally everybody thought it was a bad idea besides me.

    Also I missed you Lanny. Quit your job so you can hang out with us more.
  11. EasyDoesIt Tuskegee Airman
    I'd redirect you to the PA thread on Baphomet but if this is the person who i think it is i don't think you'd like a bunch of bapholes having said person's PI.

    Yeah that doesn't typically end well.

    Just pay one of us.

    Seriously, what are you paying and what's the scope of the project.
  12. EasyDoesIt Tuskegee Airman
    What are you paying.
  13. EasyDoesIt Tuskegee Airman
    For me, there's also an element of "fuck you, big brother." There's a mass informational campaign out there to get Americans afraid of the all seeing eye, and implementing really good electronic security measures allows me to exercise my freedom in a way that's kind of liberating.

    I mean, I've got some cool shit here.
  14. EasyDoesIt Tuskegee Airman
    What's wrong with TrueCrypt?

    Development for TrueCrypt stopped in early 2014 after it was endorsed by Edward Snowden and the group actively encourages you to switch to more secure software. TrueCrypt is open source. I thought I had heard that VeraCrypt was also bad news but I'll have to check that again now.

    Interesting turn of discussion. Would you say that security is a spectrum and while protecting yourself against your nosy neighbor-skiddie at home or asshole-sysadmin at work is a bit different than protecting yourself against an enemy with relatively infinite resources compared to you (state sponsored)?

    I try to keep myself secure against skiddies. Anything else - I'm not qualified enough to do with any degree of certainty.It's stuff like this -> http://www.wired.com/2013/07/nsa-cra...os-before-cia/ (nsa decyphered something that the cia was working on to decipher years before the latter - but they didnt say they did) why I can't have any reasonable degree of certainty.

    The NSA and American government's major tactic is misinformation. It works in their favor to get people to believe that they're peeking through every webcam, listening to every phone call, and browsing everyone's internet traffic to see what we're looking at. The reality is that they do not have the resources or competence to accomplish anything to this scale. This is not to say that their power should be taken lightly but, to answer your question, the same principles apply in either scenario. Whether you're protecting yourself from nosy neighbors, protecting your identity when making online purchases, or even just want to protect the sanctity of your email, you can employ many of the same tactics to the same result. Believe it or not, there have been many cases where the law enforcement confiscates computer equipment that they cannot analyze or do not know how to use.

    The question is what lengths you want to go to in order to protect your information. I think calling it a spectrum is a good idea, because you're always just adding layers. I go to some pretty obscene lengths to protect my data and identity simply because I find computer science interesting (and I also don't want people finding out who I am).

    I guess what I'm saying is don't underestimate the power of a curious, intelligent person who knows their way around a computer. All the highest paid agents in the world with the best resources still can't hold a candle to really good principles of opsec.
  15. EasyDoesIt Tuskegee Airman
    Sorry i didn't read your post entirely, in any event though, if people don't opsec, that's their problem not mine.

    Yeah basically.

    Hey I thought everyone was staying away from Veracrypt?
  16. EasyDoesIt Tuskegee Airman
    I'd trust you if I wasn't afraid of you stealing my body Matrix style, Agent Smith.

    I wouldn't want a body of indistinguishable gender.
  17. EasyDoesIt Tuskegee Airman
    Don't be silly.

    Your box -> Hidden VeraCrypt Volume -> Favorite distro in VM -> TOR -> Anonymous VPS paid in crypto -> scripts/tools -> target.

    This doesn't really address my point at all seeing as you're talking about a pretty decent set-up. The average person isn't using that many layers of anonymity, which is what I was talking about. Using a VPN and TOR was the discussion at hand, which in and of themselves don't t leave people as anonymous as most of them think they are. I've even heard this kind of talk in tinychat where people think they're invincible because they're on TOR.


    Also I don't use VeraCrypt.


    I'm pretty happy with my setup.
  18. EasyDoesIt Tuskegee Airman
    I trust Lanny, I dunno if I trust anyone else from here (maybe Sophie).

    Lol nobody trusts oplus.
  19. EasyDoesIt Tuskegee Airman
    So I'm going to weigh in on some commonly held axioms of anonymity and privacy. As per my reputation, I'm pretty paranoid about the fact that we have no privacy anymore, and am known to disseminate false information about myself just to further obscure who I actually am. As a matter of fact, I'm probably going to disappear from the community again for a while. Privacy isn't necessarily security, but it's worth mentioning since that's where the conversation is going.

    TOR and VPNs are usually the "go-to" when people talk about online privacy. VPNs are not a bad thing, but they're highly overrated in respect to how much privacy they actually afford you. Not sure if you guys remember, but Lulzsec got busted because their VPN turned their information over to the police when it was requested. Most if not all VPNs would do the exact same thing - paid or otherwise. Even if you're doing something as benign as downloading music or Adobe suite, why would a business risk losing money to protect you? If you want to do something banal like look at vanilla porn at the office or something, you can probably get away with using a VPN for a while (unless an admin where you work feels like being a dick or is vigilant). VPNs can also help you do basic stuff like get back onto services you've been banned from (Omegle, tinychat, whatever), but at that rate you might as well just spoof your MAC and/or change your IP.

    A VPN is just basically going to hide your datagrams between the VPN client and the destination server. Any data before that point or outside of those two points is still using your traditional means of communication, meaning it isn't secure. Furthermore, it doesn't mean that your destination isn't going to see you have a VPN enabled so they know you're trying to hide something. And let's think about this, when using a VPN service, a lot of people are handing over credit card or personal information to a company under the auspices of doing so for privacy (which is pretty ironic when you think about it).

    As far as TOR is concerned, I've heard a lot of worship about how this is the end all be all of privacy. I'd like to think a lot of the guys here are savvy enough to know that's not true. Sure, it's probably the minimal standard of what you'd want to do to remain somewhat anonymous online, but even upon downloading the TOR client, there's a lot of other things you need to do in order to ensure basic privacy (I'm a big fan of add-ons). Even so, people who want to find out who you are can still control TOR Nodes or even potentially flood other nodes with data in order to navigate your traffic to nodes that are being monitored. It's not really debated that TOR has been compromised. Big secure deepweb / darknet sites get shut down all the time and users are regularly arrested in the process. In fact, less than a week before this post, the New York times did an article about how the FBI recently took down a deep web criminal site, moved the servers to Washington, and collected data on something like 10,000 registered users that were using its services for a two week period. So even if you're pretty technologically literate, you're still at risk of getting into trouble if you're doing something illegal online. Part of the reason is because you might have to enable javascript, download something, or give up a drop house in order to complete your goal of what you're on the deepweb for in the first place. All of these things compromise your security.

    Furthermore, I think a lot of people forget that there's an ISP that can see everything you do if their engineers feel like you're a person of interest. Don't forget, it's possible to be arrested for cocaine you sold years ago, so just because you haven't had the police banging on your door yet doesn't mean they won't eventually. In the US, there was talk of ISPs being required to store records of who visited what for like six months at a time. I'm not sure if they ever went through with it in this country, but they definitely did so in many others. It's also really not questionable that the NSA and the government work pretty closely with ISPs. Also, your ISP is going to be able to see if you're using TOR or encrypting all your data, and most user agreements with your ISP give them the liberty spy on your traffic just because they want to. Usually people rush in at this point to say "Well if I'm not doing anything bad enough to warrant attention then that means I'm okay!", but that's not a very reasonable strategy. It fundamentally ignores the fact that they can analyze what traffic they want, whenever they want to.

    At the end of the day, it depends on why you want to keep your privacy. In my case, I like to keep my privacy for work related reasons. I like forums and having discourses with you guys on Tinychat and stuff, but I could lose my job if someone found out where I worked and told them I was affiliated with this website. There's no FBI guys looking for me and, if there were, they probably saw everything about me and get a good laugh about it. For those of you guys who come onto forums and boast about doing drugs, looking at CP, selling fake coupons, carding, hacking, or whatever else, you should be very vigilant because you're basically inviting scrutiny. I think what people fail to realize is that the dudes using stuff like silkroad, posting shady teen pics to 4chan, people who discuss carding, those who admit to breaking the law on sites like evilzone, or even people who spam hate on stormfront probably have enough evidence secured to charge them with a crime. Ad hoc post ergo hoc reasoning that "they didn't do it so that means they won't" doesn't logically follow. In all honesty, it probably hasn't been done because it isn't financially worth it to do and there are bigger fish to fry.

    So what can you do?

    My first advice is don't do anything illegal. It not only prevents you from being investigated, but a clear conscience is a joy forever. That doesn't mean you don't need to protect yourself. There's tons of creative and intelligent strategies and technologies to help your cause. I just wanted to give my two cents on the "common wisdom" because, as usual, it isn't correct.
  20. EasyDoesIt Tuskegee Airman
    Don't you have a cat to fuck?
  1. 1
  2. 2
  3. 3
  4. ...
  5. 21
  6. 22
  7. 23
  8. 24
  9. 25
  10. 26
  11. 27
  12. 28
  13. 29
  14. 30
Jump to Top