>Security >Tox Do you mean the same tox that had to change their domain because they lost the original one and it was instead letting people download malware not even a few months ago?
Parker Price
bitch i dont care because im not a pedo
Hudson Taylor
>not fabricating your own hardware to avoid the intel cumstain engine this is unironically one of my life goals that i'll never achieve
Jose Diaz
Whonix-Qubes.
Chase Thomas
I didn't make the image user I just googled Linux Starter Pack don't even know what Tox / PGP / VCC cards are
Anthony Reyes
Desktop: Debian (But only for Gaming and watching Porn) Notebook: Qubes OS (For literally everything else) Passwords for KeePass and Disk Encryption: OnlyKey Phone: Nexus 6p (I soon either switch to a Pixel 2 with Copperhead OS, or a cheap ass Nokia with Lineage OS) Email: Posteo.de Its getting more and more over the time. Recently set up my own mailserver on a VPS in Norway, using Whonix (Tor) or VPN from my Notebook etc.
Blake Anderson
I hide in plain sight. As long as you are connect to the web, there is a way to tack you. Being "that guy" only makes you standout even more. You can be the beacon, I'll be the insignificant line of data amongst billions.
Mind if I watch you take a shower, get your address and browse around your computer, user?
Sebastian Bailey
>Make my life hard as fuck and use all these shit Unless youre some pedophile that run a site on deepweb or a junkie that sell drugs, nobody gonna givea fuck about the midget porn you google and if youre anything from those shits you deserve what you get anyway.
You really think the NSA that hire the most sophisticated hackers and mathematicians in the world will have problem catching a pedo that goes to starbucks to use a bootable tails usb to upload the shit they take huh.
Isaac Flores
>Security/privacy >using the Internet Pick one and only one.
Asher Russell
>Security/Privacy >Stock\non-validated android OS Choose one, only one, and no excuses at all.
Angel Allen
sure man if you want
Brayden Walker
then give us all your passwords user nothing to hide, right?
Austin Wood
Alright brudder, post your address and I'll send over some pizza.
>how far have you gone for the sake of security / privacy? Nothing really. Fbi vans usually come and go around my city but I have nothing to hide.
Dominic Moore
All you need is a stolen computer, a public wifi connection and never ever log in to any social media or mention your name or any relative to you. there is pretty much no chance of anyone finding your name or find the person the computer belongs to
Angel Barnes
Stupid argument. Yes, there is a lock on my front door.
Cypherpunk logic would be to only take a shower at a random public place at a different time each day, getting out of the shower fully covered with towels so no one recognizes you, and switching shampoo brand every day so the government can't track you based on that.
Adrian Green
>don't refer to public holidays, celebrations, etc. >don't refer to current weather or environment >don't talk about routines, patterns in your life >don't refer to brands of good you know, buy, or are familiar with >don't refer to meals, food or drink >don't mention musical artists
Basically, don't discuss anything. You don't need OpSec for that. Just turn your router off and look at the wall.
Blake Peterson
What's stopping you? Someone hand etched the board for the apple 2. Im sure with enough research and effort building your own cpu and board is not only possible, but far easier than back then.
Henry Butler
This is absolute bullshit. 'Hiding in plain sight' requires the investigating side to work with target selection due to data processing limitations. They don't have limits. They don't need to pick just the suspicious guys. They pick everyone by default and then they run those, including you, through filters. They don't overlook you.
William Smith
>libreboot/coreboot >linux-libre custom kernel >luks+lvm crypt + encrypted /boot >vpn-tor-clearnet Also you can use sel4.
Robert Ramirez
>Cypherpunk logic would be to only take a shower at a random public place at a different time each day, >getting out of the shower fully covered with towels so no one recognizes you, >and switching shampoo brand every day so the government can't track you based on that.
no, if there were numerous surveillance cameras and microphones in your bathroom Cypherpunk logic would be cutting into the wall and removing them manually, while ensuring the shower curtain was closed every time you showered
Austin Powell
You can still talk about most of the board topics on this site. Including this board, assuming you aren't one of those faggots that thinks Jow Forums is a consumer review board or your personal blog.
Connor Green
I saw a YT video about a dude who made his own computer from individual transistors and ran some kind of Linux on it (no X obviously). You can also just get pre-ME platform. Go to libreboot website and see what hardware is supported.
Sebastian Brooks
Yardbird never got caught.
Liam Mitchell
>Get run through the filter. >Get added to group A1C9, with a million other anons who fap to hentai at 2am. >Filters continue to filter. Nobody gives a shit beyond this. Or >Be "That Guy" >Get run through the filter. >Get red-flagged for using super-secret-protect-my-butthole software. >Get added to "THE LIST" and became priority #1 for monitoring.
so how many of you here are socially aware enough to realize OP's image is just a paid advertisement for PIA?
Justin White
>do shady things with Tor >shady talk done with no phones in the room or with battery removed >signal even for non-shady sms >no shady sms >encrypted drive
Andrew Evans
What if you plug it in but don't connect to the internet? Or is that too risky because someone could break in your house and gain access.
Jaxon White
>unironically wasting precious time of your life on placebo garbage because you ruined your sexual life being a pedo
Honestly, just kys irl. ur worthless trash and no one will cry when u die.
>security / privacy why do people do this? security is not privacy and privacy is not security
Gabriel Hall
t. CIAnigger
Michael Walker
>duck duck go literally sells your info not using superior sear.me >PIA Using an american company as your vpn provider >tox using a shit program that has not been audited
Oliver Reed
For all the good advice on there, I absolutely hate the GNU project and GPL licenses so I just use openBSD and port only what I cant get to work with its base
He is right You can be absolutely secure from anything if you want, but you wont have privacy As a matter of fact,automated security usually comes in the cost of privacy, since you dont trust the end user to do some tasks themselves
Isaac Ramirez
There is no such thing as security/privacy on computers. Just because you are connected to TOR through Tails doesn't automatically make things secure, in fact that assumption is even more dangerous.
If a device is powered on or connected to the internet assume it has been compromised in 100 different ways. The only truly secure way to transmit information is encrypted data physically written down and transferred in person, and even that isn't 100%.
Samuel Sanchez
>or connected to the internet tfw there are airtight devices getting hacked with some new malware Soon you wont even need to have a computer to get hacked, and im not memeing either
Josiah Peterson
There for a while, I used Tails pretty exclusively. Not sure why, but I was REALLY feeling distrustful of the government at the time. I had to switch to windows since, for whatever reason, it wouldn't even detect my universities wifi signal. :-/
Unless you built the CPU from scratch and wrote your own instruction set the CPU may still be hijacking your input.
Point is no matter how hard you try you are still fucked.
Austin Smith
HW >oneplus 5 >disposable bitcoin sticks >stock ISP router >raspberry pi >x220 >couple of burners on different networks
SW >lineage (wifi police, adaway, VPN, firewall, no gapps) >fedora (on desktop, VPN) >QubesOS (on laptop, VPN and sometimes tor) >firefox (spoof and block most everything identifiable) >protonmail >pi hole (for network wide ad blocking and custom DNS) >mumble >xmpp + OTR >email + PGP all my devices have FDE and I store encrypted full system backups in a mates house, so wiping and destroying isn't a big issue also I have normal social media accounts that iuse from my laptop, they get routed through a VM of their own using a different VPN server than I use and I also have snapchat and stuff on my phone but I don't use my phone for much other than socializing also use webcam covers not the most paranoid in the world but for me it's the perfect blend between function, security and privacy
Logan Rivera
Desktop: openbsd with full system encryption Notebook: void Linux (just bc i want that goddammit Broadcom wifi adapter to work) with full system ecryption Phone: lineage OS without gapps (+encryption for what it worth) Email: personal domain + one with protonmail (mainly for some Bugzilla account) Vpn: none yet. I use tor often, sometimes I tutnel my traffic to my VPS with ssh (to ignore some stupid local firewall)
Jordan Robinson
A usb i use as a trip wire. Its power is tied to a magnetic sensor. The computer it is attached you watches udev to wait for it disappear (thus the magnetic contact broken). And a script is run. i.e. unmounting encrypted volumes shredding the headers, clearing ram, etc.
Private keys held in encrypted escrow (i.e. only available after a periodic time) for specific VPS.
Use compromised wifi hotspots (xfinity whitelisted mac, reaver-ng susceptible routers, etc) with yagi antenna + wifi amplifier (30dB). Creating a geographic disconnect. I've gotten .9km from line of sight, but of course I'd settle for 400meters or so. Multiple associations to multiple hotspots disperses metadata. Squid proxies allow me to utilize specific routing by hostname through different networks. (uses iptables as well).
I use shamir shared secrets encoded into qrcodes and spread them geographically IRL.
I also use a diode RNG which uses electron tunneling effect to create true randomness. (iank.org/trng.html).
For physical security, I've replaced all my locks with superior tumblers and physical barriers to access. I use a 5 camera ($399) camera system. Closed circuit of course.
Jonathan James
encrypted usb thumb drives containing encrypted password container files Run a fairly high speed server which does deep packet inspection on certain protocols and traffic from certain ports on the desktop machines (it's faster than it sounds). I have my wireless on a VLAN which comes off a router downstream from the desktops which also run off a VLAN and have their own router upstream. I keep a computer offline for editing security files and storing any sensitive data my internet facing desktops are two windows 10 machines and two linux desktops. My servers are linux I keep a firewall between the windows and linux machines,
Evan Powell
I’m in an odd boat - I’m pursuing a career involving privacy, civil liberties, and surveillance from the legal side of things. So the laws that govern tech are my professional specialties, but not the underlying comp sci that underlies it.
So what would Jow Forums recommend as an above-average privacy setup wherein a) I will need to use a computer, cell phone, Internet, etc. for work, b) I will already be on whatever ‘list’ by simply existing in my field, c) I will need to deal with clients who worry about their privacy (attorney client privilege) and d) I will be actively be fighting against surveillance advocates / the government on a legal front and need to keep personally embarrassing or blackmail-worthy habits to myself (porn, etc. - any sort of less-than-professional trail).
I know I’m barely scratching the surface on *true* privacy with the bare setup I have now, but what would you consider the bare minimum for this situation?