NSA Spying

Howdy Jow Forums, How do you protect your Linux boxes against massive NSA spying?!

Attached: Screenshot_2018-07-14 Anis ⣢ on Twitter.png (638x523, 407K)

Other urls found in this thread:

bleepingcomputer.com/news/security/systemd-bug-lets-attackers-hack-linux-boxes-via-malicious-dns-packets/
thehackernews.com/2017/06/linux-buffer-overflow-code.html
en.wikipedia.org/wiki/Death_of_Gareth_Williams
prism-break.org/en/
en.wikipedia.org/wiki/Army_Network_Enterprise_Technology_Command
twitter.com/SFWRedditVideos

You need to check your router for chipping, or software backdoors.

Webcam always works tho
Even with libre kernel

unless you write your own kernel, i'd be willing to bet money that the NSA has some kooky 47-step exploit for the linux kernel as well. Anything public and/org heavily used will not be safe.

I wondered: Is it possible to get the X.org server running under the Minix in the Intel Management Engine?

Since NSA spying is mostly dragnet operations performed on services like those offered by Google I just don't use those services.

Attached: 1503455910576.jpg (700x525, 89K)

Fuck off with that shit, if you're going to talk about shit like that, don't bother with scare mongering.
Sure, they control a lot, but they aren't that powerful. The Linux kernel is highly audited by literal autistically obsessed sec specialists.
There isn't a backdoor in the kernel.
I'd be more worried about the proprietary hardware and its firmware.

You don't. Porky gets what Porky wants.

>Porky, no.
>Spooky, yes.
Porky hardly has any resources, there are teenage hackers with access to better resources than porky.

USE="-nsa"

unfunny/10

NSA are the good guys

I thought it was funny.

No you didn't.

I'd just like to interject for a moment. What you're referring to as Linux, is in fact, GNU/Linux, or as I've recently taken to calling it, GNU plus Linux. Linux is not an operating system unto itself, but rather another free component of a fully functioning GNU system made useful by the GNU corelibs, shell utilities and vital system components comprising a full OS as defined by POSIX.

Many computer users run a modified version of the GNU system every day, without realizing it. Through a peculiar turn of events, the version of GNU which is widely used today is often called "Linux", and many of its users are not aware that it is basically the GNU system, developed by the GNU Project.

There really is a Linux, and these people are using it, but it is just a part of the system they use. Linux is the kernel: the program in the system that allocates the machine's resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. All the so-called "Linux" distributions are really distributions of GNU/Linux.

Attached: 1498608710849.jpg (900x675, 231K)

You don't.

You just keep them off both the electrical and network grid.

Attached: 2fd.gif (500x386, 537K)

Why the FUCK are you using digital blackface huh?!?

> Linux kernel is safe
but Systemd isn't

bleepingcomputer.com/news/security/systemd-bug-lets-attackers-hack-linux-boxes-via-malicious-dns-packets/
>Systemd Bug Lets Attackers Hack Linux Boxes via Malicious DNS

thehackernews.com/2017/06/linux-buffer-overflow-code.html
>Your Linux Machine Can Be Hacked Remotely With Just A Malicious DNS Response

Attached: Lennart poettering.jpg (3456x2304, 2.71M)

No they aren't:
>en.wikipedia.org/wiki/Death_of_Gareth_Williams

Just avoid Mr. Poettering when he offers to cram in his SystemD.

install gentoo. it's hilarious.

Attached: oh_you.jpg (680x240, 33K)

>dragnet operation
This
they collect data on idiots who use windows,facebook,google et cetera "along the way" that means they won't waste their time and money hiring TAOs on people just because they run gentoo and use hong kongese VPNs thinkin' they slick.

all you have to do is make sure your hardware isn't part of the vulnerable (intelME/amdPSP, router backdoors...)
then you install a minimalist distro (gentoo,alpine)
then install a good browser with the necessary extensions (self explanatory step but most retards on Jow Forums fail here)
then get a multiple VPNs

That's it, that's literally it, you escaped the bobnet, life isn't a fucking cyberpunk world, now shitpost to your heart's desire.

Attached: 14246794573467.jpg (1920x1920, 1.65M)

Option1: Air gap and embrace life sans interwebs. (Amazingly enough this option leads to all number of positive side effects, like wimenz n stuff)
Option2: Run a goddam packet sniffer and locate/disable that shit dumbass.

Irak the option as number two. On a win7 box do I rox, even. My shit smellllllllls fucking fragrant my man. NSA can lick this tip. Feels good meng.

Bonus points: Can you guess wat is running on the "passive" machine?
Protip: ucant

>Run a goddam packet sniffer and locate/disable that shit
finally someone who knows

>life isn't a fucking cyberpunk world
But it is though, as your post proves.
High tech, low life.
Literally what're living.
Also, the themes in in that media being, whilst the government controls so much, by being technically knowledgeable (somewhat) you can circumvent much of it.
So, as per your post, yes this is a fucking cyberpunk world.

Option 2 isn't difficult, brother.

That's not the point, my point is that every fearmongering retard and his mother think the NSA is a super duper spying machine that has an exploit and and/or a backdoor for every single OS, software and hardware piece in the world and can h44x0r you without breaking a sweat

I removed the webcan driver from my notebook since I never used it. I wonder if it's still possible for a malware to acess it.

Most of it is automated I'm sure

> Linux highly audited
> let's 2 million lines of code slip in with ties to the alphabets
Pick one because system d isn't audited

ohohOHOHO someone just got v& by GCHQ i reckon

Attached: Capture.png (1616x224, 28K)

Just avoid distros that use systemd, friend,.

Plz dete

user, they buy 0day exploits from 3rd parties. you can be absolutely confident that they DO HAVE some remote linux (and SSH, and windows too) 0day exploits.

>The Linux kernel is highly audited by literal autistically obsessed sec specialists.

Like Spencer? Because he made his grsecurity patches paid only. Fuck off, retard, the Linux kernel has a ton of CVEs assigned to it.

I just unplug my webcam

Which they totally use every time on all of the people on the Internet.
No, you idiot, they save that kind of thing for worthy targets.
The MAJORITY of their surveillance is drag net,
The same with actual hackers, most of time just spamming phising shit, or clickjacking.
It's very rare someone actually takes the time to pentest someone.

I know that nobody is going to believe me, but I was running a scan on my home network recently and found pic related connected.Anyone care to speculate why?

Attached: fuuuuuuuuuuuuuuccccccck.png (1015x665, 229K)

wake up user the matrix has u

What program was connecting you to that ip?

That's how I felt for about a week after.I still can't come up with a logical excuse for this.

I honestly do not remember for certain. I'm guessing Firefox. I usually run Etherape when I'm browsing the web,that's what clued me in to the unusual IP address.

Check your shit non foss addons, switch to waterfox and disable all google/mozilla malware checks

>using a laptop that has a webcam in the first place
The fault is only yours.

>>all you have to do is make sure your hardware isn't part of the vulnerable (intelME/amdPSP, router backdoors...)
I'm 100% certain the NSA has exploits available that use hardware vulns like the MS, spectre, etc. I'm also 100% certain that they don't use those in dragnet collect-it-all attacks, and that they save them for specific individuals that they're interested in. (think Iranian nuclear physicists and such)

Why? Because anything that you deploy internet-wide gets seen. The NSA most decidedly does not want to deploy a dragnet surveillance program and then have it found by security researchers the next day, and be headline news in the tech press the day after that. That burns a valuable exploit that was difficult to write and that you don't have an unlimited supply of, and creates a lot of political risk.

Yeah,but that still doesn't answer why, or what they were doing.I've already hosed the operating system,but this shit has made me paranoid. Can I ask why I should disable the malware checks?

Just physically diable your webcam and mic when you are not using.

Attached: 35F52E61-6D10-44B9-8526-E8359581A339.jpg (150x138, 20K)

The NSA is powerful, but not omnipotent.
I believe fully escaping the botnet, while very hard, is still doable.

you just have to accept it

if you take the steps needed to really protect your system and encrypt everything you do on the internet beyond the normal levels (NSA can crack all the normal levels), then it becomes obvious to them that you're trying to hide something. and therefore you get added to the FBI watch list

so just let them do their thing; they do it to everybody so unless you're actually doing something bad, you'll receive no special attention

It's better to live one day as a lion than 100 years as a sheep.

This.

Webcam on my laptop does not work under linux.

Webcams are useless to the NSA, all they're really going to see is your face. It's the microphone that you need to worry about.

>Can I ask why I should disable the malware checks?
it sends requests to many IPs many of them are google
if you disable all those checks waterfox won't send or receive any packets at all except for the ones related to your browsing, soothing your paranoia.

Thank you.

prism-break.org/en/

Whoa, dude, who did you piss off?
>en.wikipedia.org/wiki/Army_Network_Enterprise_Technology_Command

>What is PRISM?
Buddy, it's been CONFIRMED that they use drag net for most things.
Nice try though, Agent Jackson.

It's actually easier then you think to free yourself from NSA Spaying, You can line the commode you use your computer in with a primarily radioreflective material like aluminum, or even craft a simple hut out of it within which to use computer. This will block out all radio waves which are what the N*A uses for spying. For internet you can just snake an ethernet cable under the foil.

Something they do at chokepoints and through passive rather than active means. Google, Facebook, and ISPs get NSLs telling them to allow the NSA to install sniffing equipment in their facilities and/or provide access to data they're already collecting for their own (read: advertising) purposes. Why the fuck would they infect a million people's routers when they could instead just tell Cloudflare to let them in on the MitM attack they're already running?

>NSA can crack all the normal levels
No, user, they can't.
As in, using a VPN and Tor is enough to stop most threats from them.
Unless you're being targeted, then they'll get you with zero days, phising; hardware backdoor or a router/processor backdoor.
However, those things can also be largely mitigated with good OPSEC.

They'll just use government accessible cameras, if they want a picture of your face.
Or, y'know, social media.

That's why I'm scared.

Are you a l33t hax0r?

Here is a more interesting question: what if you're actually a "person of interest"? What would you do?

I would read Nietzsche

Actually, there is also evidence of them router tampering. Chipping it.
Although, I would imagine this is normally a targeted affair. It does seem unlikely that they'd just chip a bunch of random routers.

Define "person of interest"?

No,more of an experimenter.Only things I can think of that might have pissed somebody off are scanning for unsecured AWS buckets and collecting data dumps. Nothing that would warrant this level of attention though.

Probably the best OPSEC I can get, I would meditate to keep the anxiety in check and become this sort of Zen demon, and then play it by ear.

One of those people against which the NSA, FBI and the like would consider exploiting hardware backdoors worth their time.

Try to get a date and maybe a little stink finger if thins go well.

>There isn't a backdoor in the kernel.
not once did I say there was a backdoor. I said I'm sure there's some exploits of some kind out there for the kernel. please learn how to read.

You never know, you might've sniffed something you weren't meant to and they put you onto a watchlist?

I hope you mean the l33t hax0ring kind, and not the utterly piece of shit disgusting worthless pile of scum kind?

Someone with alot of cheese pizza

Oh yeah, there are definitely exploits.

you guys underestimate the fact that you're fucked against any state level actor. period.

>I hope you mean the l33t hax0ring kind, and not the utterly piece of shit disgusting worthless pile of scum kind?
Any kind, I doubt it would effectively make a difference in the end.

But you mathematically aren't, and no matter how powerful you perceive them to be, they cannot best mathematical improbability, and in some cases impossibility.

You gave an unintended answer, you piece of shit.

Oh yeah? Known me long?

Feel free to believe what you want, I'm just curious.

If someone was l33t hax0ring they wouldn't be afraid to admit it, it isn't like you're tying yourself to any particular system intrusion.
However, if you were the other kind, you would be afraid to admit it.
Besides, there are plenty of skids and professionals were to act as "noise" if you were the decent kind of "person of interest".

Settle down Miss Bothered. No need to perform virtue in a purely hypothetical discussion.

>*were = here

There is, if they're the piece of shit kind, you don't aid and abet.

So you're still afraid of telling what, hypothetically, you would do, instead trying to accuse someone with no basis.
It looks like you're the one who is hiding something.

Why would I be afraid to admit that I was a child pornographer? The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact. Not that guy, by the way.

Sweet innocent Summer child.

The very hardware you use is compromised.

you're trying to argue that you can win against an actor, with nearly unlimited funds, who can collaborate with similar actors. the same type of actors who write the most complex malware to date, the payload of which has yet to be decrypted. even if they didn't directly employ the best cryptanalysis, security researchers, they could just buy zero days from someone. if they want to get into your system, they will.

Wat, I never admitted to being the person of interest, you moron.

No one here did.

Look, idiot, you might want to read up on encryption.
No one, including them, can break AES 256, unless it has been implemented incorrectly, or you've left plaintext passwords lying around.
End of discussion, it is MATHEMATICALLY IMPOSSIBLE to break AES 256 in any time scale that isn't utterly ridiculous.

you're implying they're trying to compromise the channel of communication, not the end systems. that data exists in an unencrypted format on your computer. they only need to know who you're communicating with.

see He literally did, verbatim:
>Here is a more interesting question: what if you're actually a "person of interest"? What would you do?

>i can't read: the post

For communications, use PGP.
For storing data on your device, that shouldn't just be casually broadcasting, use AES 256, or better.
As for things like VPNs, many of them also use strong encryption, besides SSL.
Whilst, I know SSL has been POSSIBLY compromised.

He then admits he's referring to him in the next two posts.
Don't be a pedantic, disingenuous fuck.
Also, if you're having trouble reading between the lines, you might want to get yourself screened for autism.

oink oink

Nigger you're overanalyzing it like a fucking womyn.
Why are you so desperate to accuse people on the internet?