Security

how far have you gone for the sake of security / privacy?
in terms of hardware / software
(custom / not)
and the modifications you've made

I intend to switch to Linux soon
but I want to know how much of a normie I am right now by your standards

HW
>Galaxy S6
>Dell Latitude
>ISP provided modem
>SSD not encrypted

SW
>Android 7
>Win 8.1
>Google chrome
>Gmail
>no VPN
>no AV

Modifications
>none

Attached: sec.png (2000x1280, 522K)

Other urls found in this thread:

pastebin.com/5XfDX4wL
github.com/mayfrost/guides/blob/master/SECURITY.md
iank.org/trng.html).
en.wikipedia.org/wiki/Dual_EC_DRBG).
twitter.com/SFWRedditVideos

Hold my beer, Jow Forums, I gonna kick OP's ass

>Security
>Tox
Do you mean the same tox that had to change their domain because they lost the original one and it was instead letting people download malware not even a few months ago?

bitch i dont care because im not a pedo

>not fabricating your own hardware to avoid the intel cumstain engine
this is unironically one of my life goals that i'll never achieve

Whonix-Qubes.

I didn't make the image user
I just googled Linux Starter Pack
don't even know what Tox / PGP / VCC cards are

Desktop: Debian (But only for Gaming and watching Porn)
Notebook: Qubes OS (For literally everything else)
Passwords for KeePass and Disk Encryption: OnlyKey
Phone: Nexus 6p (I soon either switch to a Pixel 2 with Copperhead OS, or a cheap ass Nokia with Lineage OS)
Email: Posteo.de
Its getting more and more over the time.
Recently set up my own mailserver on a VPS in Norway, using Whonix (Tor) or VPN from my Notebook etc.

I hide in plain sight.
As long as you are connect to the web, there is a way to tack you. Being "that guy" only makes you standout even more. You can be the beacon, I'll be the insignificant line of data amongst billions.

Attached: 1289466419932.jpg (543x431, 62K)

Mind if I watch you take a shower, get your address and browse around your computer, user?

>Make my life hard as fuck and use all these shit
Unless youre some pedophile that run a site on deepweb or a junkie that sell drugs, nobody gonna givea fuck about the midget porn you google and if youre anything from those shits you deserve what you get anyway.

You really think the NSA that hire the most sophisticated hackers and mathematicians in the world will have problem catching a pedo that goes to starbucks to use a bootable tails usb to upload the shit they take huh.

>Security/privacy
>using the Internet
Pick one and only one.

>Security/Privacy
>Stock\non-validated android OS
Choose one, only one, and no excuses at all.

sure man if you want

then give us all your passwords user
nothing to hide, right?

Alright brudder, post your address and I'll send over some pizza.

>Security/Privacy
>Anything with GPS

Attached: ex1.jpg (960x712, 28K)

>useless uninformed paranoia
>useful measured paranoia
choose one, retard

thread from a bit ago i found it useful

Attached: 1478345413903.png (1880x3148, 369K)

How much do they pay you to shitpost here?

Attached: CIA.jpg (384x288, 30K)

Rules of computer security
#1. Don't buy a computer.
#2. If you own a computer, don't plug it in.
Some famous guy said this.

thanks user
saved

>601 4th St NW, Washington, DC 20535

thank you

I'm gonna watch this thread now

Attached: 1518625905544.jpg (540x305, 18K)

>how far have you gone for the sake of security / privacy?
Nothing really. Fbi vans usually come and go around my city but I have nothing to hide.

All you need is a stolen computer, a public wifi connection and never ever log in to any social media or mention your name or any relative to you. there is pretty much no chance of anyone finding your name or find the person the computer belongs to

Stupid argument. Yes, there is a lock on my front door.

Cypherpunk logic would be to only take a shower at a random public place at a different time each day, getting out of the shower fully covered with towels so no one recognizes you, and switching shampoo brand every day so the government can't track you based on that.

>don't refer to public holidays, celebrations, etc.
>don't refer to current weather or environment
>don't talk about routines, patterns in your life
>don't refer to brands of good you know, buy, or are familiar with
>don't refer to meals, food or drink
>don't mention musical artists

Basically, don't discuss anything. You don't need OpSec for that. Just turn your router off and look at the wall.

What's stopping you? Someone hand etched the board for the apple 2. Im sure with enough research and effort building your own cpu and board is not only possible, but far easier than back then.

This is absolute bullshit. 'Hiding in plain sight' requires the investigating side to work with target selection due to data processing limitations. They don't have limits. They don't need to pick just the suspicious guys. They pick everyone by default and then they run those, including you, through filters. They don't overlook you.

>libreboot/coreboot
>linux-libre custom kernel
>luks+lvm crypt + encrypted /boot
>vpn-tor-clearnet
Also you can use sel4.

>Cypherpunk logic would be to only take a shower at a random public place at a different time each day,
>getting out of the shower fully covered with towels so no one recognizes you,
>and switching shampoo brand every day so the government can't track you based on that.

no, if there were numerous surveillance cameras and microphones in your bathroom
Cypherpunk logic would be cutting into the wall and removing them manually,
while ensuring the shower curtain was closed every time you showered

You can still talk about most of the board topics on this site. Including this board, assuming you aren't one of those faggots that thinks Jow Forums is a consumer review board or your personal blog.

I saw a YT video about a dude who made his own computer from individual transistors and ran some kind of Linux on it (no X obviously).
You can also just get pre-ME platform. Go to libreboot website and see what hardware is supported.

Yardbird never got caught.

>Get run through the filter.
>Get added to group A1C9, with a million other anons who fap to hentai at 2am.
>Filters continue to filter. Nobody gives a shit beyond this.
Or
>Be "That Guy"
>Get run through the filter.
>Get red-flagged for using super-secret-protect-my-butthole software.
>Get added to "THE LIST" and became priority #1 for monitoring.

Attached: 1292973989531.jpg (217x227, 16K)

so how many of you here are socially aware enough to realize OP's image is just a paid advertisement for PIA?

>do shady things with Tor
>shady talk done with no phones in the room or with battery removed
>signal even for non-shady sms
>no shady sms
>encrypted drive

What if you plug it in but don't connect to the internet? Or is that too risky because someone could break in your house and gain access.

>unironically wasting precious time of your life on placebo garbage because you ruined your sexual life being a pedo

Honestly, just kys irl. ur worthless trash and no one will cry when u die.

Attached: 1500553987097.jpg (300x354, 16K)

place your computer in a vault, buy a bank vault door for your house

this DESU.,..

>shilling kaspersky for """"security""""
AHAHAHAAHAHAHAAHAHAHAAHAHAHAAHAHAHAAHAHAHAAHAHAHAAHAHAHA

RISC-V is open source. You can go ahead and design your own chip or buy one of the SoC built on RISC-V.

>downloading crappy jappy pedo cartoons
you're already on 'the list'

pastebin.com/5XfDX4wL
Post how many of those you manage

why people want to encrypt /boot (is there a way to shutdown pc if kernel & initramfs hashes are not as expected )


hey hey dont flame pls linux beginner .

First for fun, second for security.

the only people that want/need privacy are those that want to do illegal things. privacy shouldn't exist at all.

>smartphone
>having any form of privacy
lol op

what someone can do with laptop where / is encrypted but /boot is not?

laptop is in off state (few hours)

>Removing the sim card prevents you from being tracked

Here is the updated version github.com/mayfrost/guides/blob/master/SECURITY.md

>pic
If you do this, you're a schizophreniac.

Why did Linus stop shilling Tunnel Bear?

>security / privacy
why do people do this?
security is not privacy and privacy is not security

t. CIAnigger

>duck duck go literally sells your info
not using superior sear.me
>PIA
Using an american company as your vpn provider
>tox
using a shit program that has not been audited

For all the good advice on there, I absolutely hate the GNU project and GPL licenses so I just use openBSD and port only what I cant get to work with its base

Because McAfee acquired Tunnel Bear.

Attached: 1290479667535.jpg (243x349, 12K)

He is right
You can be absolutely secure from anything if you want, but you wont have privacy
As a matter of fact,automated security usually comes in the cost of privacy, since you dont trust the end user to do some tasks themselves

There is no such thing as security/privacy on computers. Just because you are connected to TOR through Tails doesn't automatically make things secure, in fact that assumption is even more dangerous.

If a device is powered on or connected to the internet assume it has been compromised in 100 different ways. The only truly secure way to transmit information is encrypted data physically written down and transferred in person, and even that isn't 100%.

>or connected to the internet
tfw there are airtight devices getting hacked with some new malware
Soon you wont even need to have a computer to get hacked, and im not memeing either

There for a while, I used Tails pretty exclusively. Not sure why, but I was REALLY feeling distrustful of the government at the time. I had to switch to windows since, for whatever reason, it wouldn't even detect my universities wifi signal. :-/

Attached: dale.jpg (650x408, 51K)

I also ended up deleting almost all of my social media, save for my goodreads account

Attached: rsz_tumblr_liu3zeh6lz1qzdypz_3534.png (197x264, 78K)

>manually input 1s and 0s into the CPU

You forgot ProtonMail, OP

Unless you built the CPU from scratch and wrote your own instruction set the CPU may still be hijacking your input.

Point is no matter how hard you try you are still fucked.

HW
>oneplus 5
>disposable bitcoin sticks
>stock ISP router
>raspberry pi
>x220
>couple of burners on different networks


SW
>lineage (wifi police, adaway, VPN, firewall, no gapps)
>fedora (on desktop, VPN)
>QubesOS (on laptop, VPN and sometimes tor)
>firefox (spoof and block most everything identifiable)
>protonmail
>pi hole (for network wide ad blocking and custom DNS)
>mumble
>xmpp + OTR
>email + PGP
all my devices have FDE and I store encrypted full system backups in a mates house, so wiping and destroying isn't a big issue also I have normal social media accounts that iuse from my laptop, they get routed through a VM of their own using a different VPN server than I use and I also have snapchat and stuff on my phone but I don't use my phone for much other than socializing
also use webcam covers not the most paranoid in the world but for me it's the perfect blend between function, security and privacy

Desktop: openbsd with full system encryption
Notebook: void Linux (just bc i want that goddammit Broadcom wifi adapter to work) with full system ecryption
Phone: lineage OS without gapps (+encryption for what it worth)
Email: personal domain + one with protonmail (mainly for some Bugzilla account)
Vpn: none yet. I use tor often, sometimes I tutnel my traffic to my VPS with ssh (to ignore some stupid local firewall)

A usb i use as a trip wire. Its power is tied to a magnetic sensor. The computer it is attached you watches udev to wait for it disappear (thus the magnetic contact broken). And a script is run. i.e. unmounting encrypted volumes shredding the headers, clearing ram, etc.

Private keys held in encrypted escrow (i.e. only available after a periodic time) for specific VPS.

Use compromised wifi hotspots (xfinity whitelisted mac, reaver-ng susceptible routers, etc) with yagi antenna + wifi amplifier (30dB). Creating a geographic disconnect. I've gotten .9km from line of sight, but of course I'd settle for 400meters or so. Multiple associations to multiple hotspots disperses metadata. Squid proxies allow me to utilize specific routing by hostname through different networks. (uses iptables as well).

I use shamir shared secrets encoded into qrcodes and spread them geographically IRL.

I also use a diode RNG which uses electron tunneling effect to create true randomness. (iank.org/trng.html).

I manually select most of my IV's or elliptical curve type instead of using standard libraries (en.wikipedia.org/wiki/Dual_EC_DRBG).


For physical security, I've replaced all my locks with superior tumblers and physical barriers to access. I use a 5 camera ($399) camera
system. Closed circuit of course.

encrypted usb thumb drives containing encrypted password container files
Run a fairly high speed server which does deep packet inspection on certain protocols and traffic from certain ports on the desktop machines (it's faster than it sounds).
I have my wireless on a VLAN which comes off a router downstream from the desktops which also run off a VLAN and have their own router upstream. I keep a computer offline for editing security files and storing any sensitive data
my internet facing desktops are two windows 10 machines and two linux desktops. My servers are linux I keep a firewall between the windows and linux machines,

I’m in an odd boat - I’m pursuing a career involving privacy, civil liberties, and surveillance from the legal side of things. So the laws that govern tech are my professional specialties, but not the underlying comp sci that underlies it.

So what would Jow Forums recommend as an above-average privacy setup wherein a) I will need to use a computer, cell phone, Internet, etc. for work, b) I will already be on whatever ‘list’ by simply existing in my field, c) I will need to deal with clients who worry about their privacy (attorney client privilege) and d) I will be actively be fighting against surveillance advocates / the government on a legal front and need to keep personally embarrassing or blackmail-worthy habits to myself (porn, etc. - any sort of less-than-professional trail).

I know I’m barely scratching the surface on *true* privacy with the bare setup I have now, but what would you consider the bare minimum for this situation?

Also, AMA - I love talking about this stuff.