1. Posts must be related to the preservation of ones technological security and privacy to remain on-topic 2.  To be taken seriously always cite a statement or prove with the tools of reason! 3. Along side digital; political, philisophical and physical based discussion of safety is encouraged
This post will prob be lost in the abyss, but I have been using chromium on xubuntu for years, with the dark theme. I had previously made a thread on /gg/ about it here: https://enrive.org/gg/thread/7449 Just now, stylish became disabled, and I had to manually re-enable it. It still works, but I seen this message when I went to my extensions tab: >This extension violates the Chrome Web Store policy.
So I am looking for a more update method to spoof the serial number of my hdd like https://www.raymond.cc/blog/changing-or-spoofing-hard-disk-hardware-serial-number-and-volume-id/ Most of these links are void and I'm not sure if a newer version has been released for win 10. Any suggestions or links would be appreciated
I'm not saying you guys should buy into litecoin while it's low because on the 26th the price rockets, but it would be smart :D
Two things: 1. For someone new to Linux who is accustomed to Windows, what's the best way to start getting familiar with it. Either a linux install on a standalone machine or a good version to use on VM to learn it. I got a copy of Zorin 11, is that a good version to start out in a familiar environment and learn as you go? Is there any guide that gives a side by side comparison, so you can understand what's closest to the Linux equivalent of what you're familiar with in Windows? (device manager, updating, etc). 2. For machines that you can't get away from Windows on just yet (setting up machines for friends or family, gaming rig, etc), how best to manage privacy? To start with, use either 7 or 8.1 (no 10) and remove the telemetry updates? After that, any preferred apps to use and to stay away from (eg using Firefox not Chrome)?
"Republicans are about to let telecoms sell your internet browsing history — for your ‘protection’" >Sen. Jeff Flake (R-AZ) introduced S.J.Res 34, which would expand the Congressional Review Act to strip away privacy protections established in October by the Federal Communications Commission with broad bipartisan support, reported Privacy News Online. >Flake’s bill, which has gained more than 20 Republican co-sponsors, would allow lawmakers to repeal Obama-era privacy rules by a simple majority vote in the House and Senate and would prevent the FCC from establishing similar regulations in the future. >The rules passed last year prohibit internet providers such as Comcast and Verizon from collecting and selling virtually any subscriber data, including browser history and app usage, without prior user permission. http://www.rawstory.com/2017/03/republicans-are-about-to-let-telecoms-sell-your-internet-browsing-history-for-your-protection/
https://www.rt.com/viral/382080-nightskies-cia-infiltrate-iphone/ >WikiLeaks has revealed the CIA’s alleged ability to infiltrate and control iPhones through a tool called NightSkies, which is physically installed onto factory fresh iPhones and allows the CIA to monitor and download files from targets’ phones undetected. Good night sweet prince His company is finished
opinions on https://traceless.me/ as a service? anyone had experience with speed limits of the subscribed service. Also general BitX discussion thread
on our other site we have a button "traffic sources". it shows a bunch of links that come to our place. suddenly we have http://18.104.22.168/bg/BBB_Urgent2_ID/index.html?policy=23&policyname=FNotice2&category=GblOptOut&time=1503628201&url=http://tinylotusmembers.blogspot.com/2017/04/one-youngsite-only.html the IP is from Buckeye cable vision in Mich. the BBB is the better business Brgh. is someone reporting us ? . what the fuck is that
Let's have Tor Thread Post links that still work. Torch: Tor Search Engine http://xmh57jrzrnw6insl.onion/ DuckDuckGo http://3g2upl4pq6kufc4m.onion/ The Hidden Wiki http://wikitjerrta4qgz4.onion/ TorChan zw3crggtadila2sg.onion/imageboard/ Imperial Library http://xfmro77i3lixucja.onion/ Sigaint http://sigaintevyh2rzvw.onion/mail/ Library(Good stuff) http://3cpleimu2getp5q7.onion/library/ Shells http://jq77mc73wz5wuawt.onion/ The Tin Hat | Privacy Guides and Tutorials http://qza32xuddl3guikc.onion/index.html TorFlix http://jl4m7ubpotnu2yos.onion/ Mail2Tor http://mail2tor2zyjdctd.onion/ The Secret Story Archive http://tssa3saypkimmkcy.onion/ OnionDir http://auutwvpt2zktxwng.onion/?cat=6 :3
https://wikileaks.org/tpp-ip3/WikiLeaks-TPP-IP-Chapter/WikiLeaks-TPP-IP-Chapter-051015.pdf?t=dXNlcmlkPTU0MjUyMDgxLGVtYWlsaWQ9MTAwMzA= Last week, WikiLeaks released the final text of the TPP’s intellectual property rights chapter and it is absolutely terrifying. These are just a few of its most dangerous pieces: >Compel ISPs to take down websites without any sort of court order, just like SOPA. (Appendix Section I) >Extend the US’s copyright regime to require copyrights stand for life plus 70 years, preventing anyone from using works that belong in the public domain. (Article QQ.G.6) >Criminalize whistleblowing by extending trade secrets laws without any mandatory exemptions for whistleblowers or investigative journalists. (QQ.H.8) >End anonymity online by forcing every domain name to be associated with a real name and address. (Article QQ.C.12) >Make it illegal to unlock, modify, or generally tinker with a device you own. (Article QQ.G.10) >Export the US’s broken copyright policies to the rest of the world without expanding any of the free speech protections, like fair use. (Article QQ.G.17)
>With Windows 10, Microsoft Blatantly Disregards User Choice and Privacy: A Deep Dive https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive
A new backdoor has been found recently that allows hackers to possess your system files and send them back to a linux-based server. FFMPEG which a popular codec has some backdoors so beware when opening video files from your media player since it can be backdoored to let them get access to your data. The backdoor can affect most operating systems including linux, mac, and windows. More detailed descriptions can be found here on those 2 links >http://news.softpedia.com/news/zero-day-ffmpeg-vulnerability-lets-anyone-steal-files-from-remote-machines-498880.shtml >https://news.ycombinator.com/item?id=10893301
Assange and wikileaks has been compromised. The insurance files released on the 14th November do not match SHA-256 hashes tweeted in October. This is shortly after many Podesta and Hillary emails disappeared from the leaks.
Why are there still websites that arent using HTTPS when Let's Encrypt is handing out SSL certificates for free? Is there any valid reason for still using HTTP?
Devuan, Systemd-Free Debian Fork, Rolls Out First Beta Release Where were you, when Italy saved Linux? DEVUAN BETA RELEASED sytemdcucks BTFO CELEBRATE! https://archive.is/jYr9h https://beta.devuan.org/
>Lepton image compression: saving 22% losslessly from images at 15MB/s what's the point in losslessly encoding jpgs... source: https://blogs.dropbox.com/tech/2016/07/lepton-image-compression-saving-22-losslessly-from-images-at-15mbs/
>In celebration of Data Privacy Day, SpiderOak today announced Semaphor, a new workplace collaboration tool for teams and businesses that care about privacy >Semaphor will be available on all major operating systems as an open source applicatio So, is this the new TOX, but that will actually have day to day development to it and will actually be a secure chat room option? https://spideroak.com/articles/press-release-semaphor-to-give-team-collaboration-privacy As a tool for privacy collaboration, I suppose this will even have a secure webcams system.
Hello this is /nsa/ admin I wanted to make this thread due to the voiced concern that the sticky is out of date (and it is) People can post in this thread any information that they think would be relevant or useful and I will consider it, then add it to the new sticky image. I will leave this thread up until the new year, anything decent that has been suggested since then I will introduce permanently to the sticky.
old thread on /b/ is dead, so i'm reposting this. How to evade ban on 4chan: This is few methods how to evade ban on 4chan. Let me remind you that no matter what method you're using, you must always clear your cookies before another attempt, because they are trying to stop you from evading by identification cookie. 1. Using Hola unblocker This is not safe. because this shit is using you as an exit node, so you shouldn't use it. But if you want to shitpost on 4chan so much that you don't care about the risk, you can. Also many hola ips are already banned on 4chan, so it takes several tries most of the time. 2. Using 3G connection via phone or 3G modem with prepaid sim card. This is the best way i know of so far. 3.Setting up your own proxy using glype or something similar. Problem with this is that freehosts don't allow this and block attempts to create proxy. You would need a paid one. 4.Setting up VPS and use remote desktop to browse web If you have a VPS, you should be able to connect with some remote desktop software, install webbrowser and surf the web with it. 5.Wi-fi hotspots Easy method. I'm sure many of you already thought about that. You can take your laptop, phone or tablet and go look for some hotspots near you. You can google hotspots in your city. The downside is that you're in public of course. 6.Cross Site Request Forgery You could make some website where after clicking some button user would send POST request to 4chan with message that was a hidden element in your site and fool people into clicking this, so they would actually make those posts for you without them knowing. People who know PHP know what i'm talking about. https://www.youtube.com/watch?v=vRBihr41JTo The problem would be dealing with captcha. This is probably too complicated for average mchan user. 7.Social engineering You could social engineer 4chan's mods to unban you. You can tell them that "it's a shared ip, it wasn't me" or "someone else was using my computer" or "i recently got a new ip and it was already banned, halp".
>Connect to Tor >First node is the same node >panic Anyone have the same problem like i am? I always have the same node also sometimes it gives me a long address with X n shit telling me that i'm not using Tor. Note: It is updated
Haxing and Penetrating thread Learning: http://www.securitytube.net/ http://cybrary.it// http://null-byte.wonderhowto.com/how-to/ http://n0where.net/ http://www.offensive-security.com/metasploit-unleashed http://www.exploit-db.com/ https://siph0n.net/ http://www.cvedetails.com/ http://resources.infosecinstitute.com/ http://www.windowsecurity.com/articles-tutorials/ http://www.securitysift.com/ http://www.sans.org/reading-room/
any developers here? how do I go about finding an open source project i can contribute to? I lurk and browse GitHub for projects and i can't find anything to contribute to the projects i found or have an interest in are either too advanced for me to contribute to and require some serious understanding (like a 3ds emulation) or are written in a programming language i don't care about (for example lua or java)
/nsa/ admin, sorry it's been so long, I am now working on the new sticky along with links and info, it should be done very soon
If you're interested how HT got hacked: https://my.mixtape.moe/caifvn.txt
Everything is using this bullshit Akamai Technologies so i looked for it and i find out that it is made by a fucking jew oy vey the spooky part is that he died in 911 on the plane and "stabbed" to death before the plane hit the tower https://en.wikipedia.org/wiki/Akamai_Technologies https://en.wikipedia.org/wiki/Daniel_M._Lewin Coincidence???? I think not
Peter Thiel tells you to be happy with being a good goy https://archive.is/s9x4N >Internet Would be a Wild and Dangerous Place Without Facebook Says Peter Thiel >Peter Thiel, a longtime friend and mentor of Mark Zuckerberg, recently gave a talk that imagined what a Zuckerberg-less world would look like and it's pretty grim. According to Thiel, the web would be a not-very-safe, not-very-fun, totally anonymous place and it wouldn't be baked into our social lives at all. "You can imagine an alternate history in which people don't become comfortable using [the Internet] to meet their friends and family," said Thiel. "It could have remained a wild and dangerous place — maybe an exciting place to escape for a while, but maybe not part of your daily social life. Facebook has led a long and subtle but deeply important trend away from mob behavior, away from the kind of nastiness that hides behind masks and rules in shadow." >Thiel added that without Zuckerberg, information would be at the center of the Internet, not people. "If you could go back to the first years of the new millennium in Silicon Valley, you would hear a lot more about 'information' than about people. 'Organizing the world's information' was the idea of the age," Thiel told the audience. "While the implicit goal of computer science had been to build a machine that can do everything a human can do, Facebook has made software that only makes sense as a tool for humans. Its success in doing so has helped to gradually orient software developers away from the mania for replacing people."
https://www.rt.com/op-edge/345470-nsa-leaks-snowden-whistleblower/ >Thanks to Edward Snowden’s revelations, the US government can no longer directly collect everything that we communicate with each other electronically, Tom Devine, legal director at the Government Accountability Project, told RT America’s Manila Chan.
Alright fuckers wake up, we need to give some tips on how to stay safe and anonymous online and we ask some questions about some softwares
Hello people! Today I was setting up a laptop for "privacy", and as we lack any kind of basic guide I decided to share what I did, so it might help others as well. First step: Get one of the following ThinkPads: X61, T61, T61p, X200, X200s, X200 Tablet, T400, T500, W500, W700, but make sure you get one with the intel Wifi Link 5100 or 5300. Debian will work 100% well with these. Of course others will probably work just as well, but I can't guarantee that. The cheaper models can be had for as low as $80-100 on ebay, and they are more than enough for internet browsing or watching movies on Linux. Second step: Installing Debian. Use full-disk encryption, and use a properly long password. I chose the xfce desktop environment, because it uses very lightweight but still gets the job done. How to install the wifi driver: https://wiki.debian.org/iwlwifi How to add backports repository: http://backports.debian.org/Instructions/ Third step: Get TOR browser: https://www.torproject.org/projects/torbrowser.html.en#linux After this you should be good to go. Obviously, you can be still tracked with enough effort, but where I live this is pretty much enough. If you have any questions I will try to answer to my best knowledge.
I am writing a simple website for fun and thought i'll upload it to a webhost.. so I was wondering, is it possible for a company that hosts websites to steal sensitive info from their clients? I suppose they will lose all their customers if they did, but what if they were pressured by the authorities? let's take for example whoever is hosting masterchan, can they modify the server code to for example make it log IPs without gadmin being aware they did so? if the answer if yes, is there a way to prevent this other than buying servers and running them at home?
>go on IRC >find interesting guy >ask if he has OTR >says no >explain it to him >"if you have to go to such lengths to hide what you want to say, I think I don't want to hear it" This is 2016, this is what the Internet has become.
Since when does free software not include the freedom to run whatever version we want? What a nagging jackass. Also, worst logo ever.
my end goal is to become opsec but to do so i ask you *whats the best encryption software *whats the best browser *whats the best browser addons *whats the best/most secure os *how to block unwanted traffic and just the general in between of how to stay hidden
>Bill Gates Says Apple Is Wrong for Not “Helping” the FBI, Built Back Doors into All Windows Software Since 1999 >The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors) http://www.activistpost.com/2016/02/bill-gates-says-apple-is-wrong-for-not-helping-the-fbi-built-back-doors-into-all-windows-software-since-1999.html Archive link: https://archive.is/AW7qI
How to send emails? Where to create a email box which won't be controlled by your nearest intelligence agency? What email providers you suggest? If paid, I would need to buy bitcoins and then to wash them. Should I have separate mailbox for each project/aspect? Separate has many pros but it had to be free ones than paid (otherwise would need 20 paid mailboxes). Should I use mailbox through TOR? Even if I send mails using my real name? Or is SSL enough?
So... here's a question for you. Is it possible/safe to run something like Tails in a VM? (in particular virtual box). Does that defeats the purpose of tails?
Since we often recommend Linux to new users and may have some converted I think I should post this here: The website of Linux Mint was hacked and pointed to a fake ISO with a trojan. If you downloaded a Linux Mint ISO on Feb 20 get rid of it, download a new one and reinstall. For details see http://blog.linuxmint.com/?p=2994
Researchers have developed an app that blocks third parties from identifying an individual's location based on what they search for online. >BU professor, student researchers create “ciphertexts” to encrypt users’ information >Keeping a user’s location private is achieved by using ciphertexts. A ciphertext is information that has been encrypted and is therefore unreadable, so when a user uploads their location, the service provider receives the encrypted information instead of raw data. This way, they can still provide information for the user but the user’s location will not be stored. >The app will be available first on Android devices and will be free to download. In addition to hiding their location, users can add friends from their contact list who would be allowed to see their location on a map provided in the app. This allows users to choose who they want to share their location with and who they want to keep it hidden from. www.eurekalert.org/pub_releases/2016-01/bu-na011316.php http://www.ibtimes.co.uk/computer-engineers-develop-app-that-hides-location-when-searching-things-online-1539117 www.ws.binghamton.edu/guo/Globecom15.pdf ieeexplore.ieee.org/xpls/icp.jsp?arnumber=6831142
The Captcha system on this site keeps failing correct input. It's clearly hacked. Do you know why? Is it just me? For name fags who doesn't have to deal with captchas: Not only are the captchas so garbled that they're often unreadable, but sometimes you can confirm (like in the image example) beyond any doubt, that what you're typing in is correct. On average we're talking 3-5 captcha tries per post. This has been going on for at least a few months. Can it be fixed somehow?
John McAfee is running for president, one of his primary points is privacy. Weird right? https://mcafee2016.com/
Would any of you fags happen to know how to run nmap through the Whonix Gateway? When you scan an IP, it results in like 100+ open ports and a latency less than 1 second. This obviously makes no sense. The only thing I can think of is that the scan actually hits the whonix gateway instead of the target. My inability to figure this out is seriously eating away at me. Having to route nmap through tor manually, with proxychains, fucking sucks and over time you're almost guaranteed to eventually fuck up a command and have a leak.
I need a program that actually wipes free disk space because ccleaner claims it does but everything is still recoverable so i need something that actually works
Let me offer you a few thoughts about the future /nsa/ People were talking about how the latest South park episode was pretty good (and it was, they did something original for once instead of regurgitating pop culture as they have been doing since season 4) here is the episode http://www.wootly.ch/?v=YJUEEEE4 It made me think about the future of discussion boards. If in the near future, someone is able to code a bot that either a) has some primal AI capabilities to keep an argumentative conversation going on or b) a much simpler concept, a bot that picks up on some key words and posts a somewhat pre-formated opinion related to the subject, it will be over to discussion forums. For example, someone makes a thread on Encryption. A bot picks up on those keywords, and replies to the thread with a copy/paste entry it had dealing with encryption. It will be at least semi-related to the thread, people will reply to it, and you'll be wasting your time replying to a fucking bot, with no actual conversation between two people taking place. Ad-bots already do this by commenting on blogs things such as "nice article, I wrote something similar myself here (insert ad link)", but it is very rudimentary. But in a few years, people may do a huge deal of damage to discussion boards with bots, especially on anonymous forums like here, where telling who is a bot and who isn't is not possible since it is anonymous. pro tip: this thread may have been created by a bot I coded that will post this on different boards. The replies on this thread will come randomly from the bot as well replying to itself by picking up keywords. You may be the only actual person browsing and replying to this thread
How to post images on 8chan by using Tor hidden service. First convert your image to base64 here: http://base64.wutils.com/encoding-online/image-to-base64/ You can use it with Tor. It will give you 3 results. The first is just raw base64 that is missing that "data:image/jpeg;base64," stuff. Scroll down and there are results for html and css. Look at the image, so you know what part to copy. Don't copy what is marked red. Now if you copypaste that string to your browser url bar, it will show the image. No, this is not a link, the image is constructed from the data string. Now go to https://pastee.org/ You can also use it with Tor. Paste your string there. You'll get a link like this, you can test if the image shows in your browser https://pastee.org/zbcjc Now go to 8chan's hidden service oxwugzccvk3dk6tj.onion and post link to your pastee. Done.
>NSA faces congressional probe over Juniper backdoor vulnerability >Juniper warned its customers in December that a review of the code in their ScreenOS firewalls revealed an unauthorized “back door” into the software. The vulnerability was quickly patched, but questions about who inserted the illicit code remained unanswered. >Backdoors were first linked to NSA because of the similarity of the technique used in the vulnerability’s code. https://www.rt.com/usa/330660-nsa-juniper-firewall-probe/
How do we know that Masterchan Anonymous Accounts are safe? I've read that the evil government agencies can identify you by your typing patterns and they can follow people by Google Captcha. So when I made an Anonymous Account I had to type the captcha a couple of times. If the goons have my typing pattern already stored, they could associate my Masterchan Anonymous Account with me. Right?
Are Seagate hard drives safe for /nsa/ folk? Is there any hardware on the market that /nsa/ should steer away from?
to put it simply im looking at making a tox but i want it to be secure and untraceable back to me so how would i go about doing this while remaining opsec during the whole process
Which anonymous network do you trust the most? Tor? https://www.torproject.org/ I2P? https://geti2p.net/en/ Freenet? https://freenetproject.org/ Tribler? https://www.tribler.org/ GNU Net? https://gnunet.org/ I'm not sure which one is the most trustful for me. I really like Freenet, but there was almost no development in recent years. Tor is the largest and most used one. It's probably technically much further than the other ones. But because it's well known it's also attacked too often. And as we all know it's far from being impenetrable. I2P is new and fresh. I think it may have potential. I'm thinking about donating money to them. I know nothing about Tribler and GNU-Net. What are your thoughts?
Am i the only who is feeling that someone is after him, like i just keep changing my ip everyday and change my MAC address like every hour too. I feel like someone is trying to find who i am or what am i doing.I'm paranoid. Maybe because after what i heard about the NSA but this is more than that. I've been doing these things for like 3 years, never talk to people, never share my information on the internet. Are you paranoid like me? Or i'm just being very secure, i know that if i want to be safe on the internet there is only one choice, and it is unplug my pc and turn off my router. Help me, is this normal? Am i the only fag here who keeps hiding from everything and anything on the internet
For Stallman's sake /nsa/, we're getting nowhere: we desperately need a better sticky, with good links and information; a guide like "how to escape the matrix" etc would be great for any newcomer or interested individual (eg. me "haha") with no knowledge in computers; we need to grow our numbers, get people off Windows OEMs/firmwares and make people independent, despite this: the irony is that self-digging doesn't work for most people considering so many sources can be faulty and there are too many distractions like take the example of the debian picture in the sticky, it took me ages to finally chance it - i still have no idea who the tiny little man with sunglasses is :D - also it is more than a year old now we can start pointing out step by step hardware/software acquisition, some basic info on computer parts/maths/script language, live USB setup, uninstalling factory OS etc if any of you work in IT/EE you shouldn't just laugh at plebs doing other things and pet them when they come to you asking basic things - drop the bomb on them - let's be better, get a cloak and chat on IRC - its always just 2 people sitting there Hopefully board owner will see this, i will be interested in what you thinks alright thanks for reading chums TL;DR we need a better sticky
>Chaum is also building into PrivaTegrity another feature that***s sure to be far more controversial: a carefully controlled backdoor that allows anyone doing something "generally recognized as evil" to have their anonymity and privacy stripped altogether. Anyone using PrivaTegrity for something "generally recognized as evil" can have their anonymity and privacy stripped altogether. https://archive.is/kPQRR kek Agencies are attempting to infect anonymity software with pseudo-anonymous replacements in the hopes that some people who don't know any better adopt their system because it is "better" or "faster." Why else would you even bother developing a system that has in it defeating the entire point of the software? No developer actually concerned with anonymity would bother wasting their own time developing this and then implementing a backdoor. Its utterly retarded.
If a person was limited to only browsing the internet using Tor Browser Bundle what are some chans that allow posting or chat sites/rooms and irc that aren't blocked?
https://www.tomshardware.com/news/juniper-backdoor-nsa-dual-ec,30805.html Juniper recently "discovered" a backdoor in it's ScreenOS software that allows one to decrpyt traffic in ScreenOS' VPN, and another backdoor that bypasses authentication. The backdoor was most definitely code for the NSA that third parties found and used for their own purposes. This NSA backdoor has been in there since 2007 and was leaked a little less than two years ago and now we see the problem with giving government agencies digital lockpicks. Juniper firewalls and routers werent alone in being infected with NSA malware. Dell Servers, hard drives from WD, Seagate, Samsung, and Maxtor, as well as routers and firewalls from Cisco and Huawei are confirmed to be compromised. Youre not even safe if you avoid American companies. Will security companies start reconsidering giving the NSA backdoors anytime soon?
Maybe if software anonymous networks aren't good enough, it's time to create hardware based anonymous networks. http://freedomboxfoundation.org/
I got an ipod for Christmas and it needs an account before I can use it. What all will I need to do before I can use this thing it wants to start with a Wifi password or preexising itunes account.
So, CISA ended up getting passed a few days ago. It was attached to Omnibus spending bill. http://www.zerohedge.com/news/2015-12-18/congress-just-passed-second-patriot-act-and-nobody-noticed-how-cisa-became-law >/pol thread https://masterchan.org/pol/thread/6147 Someone can start an online petition, this might be a good idea Can't believe there is not a thread about this already.
Can /nsa code better than Klossi? https://youtu.be/Bwiln7v0fdc
https://bits.debian.org/2015/12/mourning-ian-murdock.html >Ian started the Debian project in August of 1993, releasing the first versions of Debian later that same year. Debian would go on to become the world's Universal Operating System, running on everything from embedded devices to the space station. Apparently he had some issues with the police and killed himself? http://pastebin.com/yk8bgru5 allegedly his tweets What happened here?
Anyone here got experience with whonix? I saw their website and I'm really fucking tempted to switch to it, especially due to the fact that I'm currently using ubuntu, it just doesn't feel secure enough
How does it make you feel to know that Masterchan is running on CentOS? It's actually not bad taste. Not the best, but pretty good.
Compression thread! 7zip: >unreliable >compresses to super small size tar.gz: >Just werks >slow as dicks rar: >1.6gb to 1.5gb
This /pol/ thread relates to /nsa/. https://masterchan.org/pol/thread/6147 In fact, since one of the primary things on masterchan is privacy this should be stickied on all boards or something...
Because the old cyber-anarchy thread on /b/ doesn't exist anymore, i think i should make here a new one. I won't bother to copypaste all that old stuff again. You can find it all in: https://pastee.org/b5bcf If you have something new to add, feel free to do so.
this is some what of a "now you know" suggestion if you want to access the us version of netflix try >http://ultrasurf.us/ because its fast enough for hd and it has no time limit unlike vpn's >now you know
Is TeamSpeak3 safe? I noticed that they save all logs in C:\Users\"yourpc"\AppData\Roaming\TS3Client\chats What is the meaning of this? Does these logs are being uploaded somewhere?
How do I convince everyone I know not to install windows 10? There's the wifi password sharing and a few of my friends have my password, I don't want them leaking that shit to their friends.
Can HTTPS prevent ISPs to detect which sites you are browsing? That's a pretty important question I'd say
breddy gud https://archive.is/1m3wW
France Interior Ministry wants to ban Tor, backdoor encryption and record all open wifi data. http://www.numerama.com/politique/133795-wi-fi-ouvert-interdit-tor-bloque-les-nouvelles-idees-de-la-police.html Enjoy not having any privacy or freedom on the internet Frechfags.
I'm downloading the windows 10 ISO for my virtual machine but I'm really scared that this piece of malware will fuck up all my shit by somehow getting at my non Virtual machine partition, maybe I'm just paranoid but it's better to be safe than v& right?
I need your help anons. Give me some tips to stay shady on facebook. I'm going to create a Facebook page (oh no anon is gay) Well i'm trying to stay anonymous as possible while using Facebook, my plan is to use another name and browse with tor (well that will makes me a target to the NSA? right xd) The purpose is so i can talk to real humans since i'm embarrassed when they find out that i don't use social media rip Please reply kek
TOX THREAD #1 ITT: We talk about a secure messaging system and all of it's glory Have you downloaded TOX yet?
What do you think about ZeroNet? http://zeronet.io/ Would be someone willing to run or seed the "second masterchan" there?
EEVblog #825 - Your Printer Is Spying On You https://www.youtube.com/watch?v=sit6zUQKpJc Did you know that your colour laser printer is secretly printing a forensic code on every one of your printouts so the government can track it? Sounds like a nutjob conspiracy theory, but it's true.
I have a few 'blogspot' sites that I keep up. I get some funky shit in my "traffic sources" section ...shit like http://127.0.0.1:49153/unlock/http%3A%2F%2Ftinylotuslinkslist.blogspot.com%2F2016%2F02%2Fromainian-home-movie-1-mill-views.html I guess someone from that Addy, came to my blogspot site. DA fuc is that ? I et lots pof other weird stuff to, I wmma know if its the NSA, FBI, MIBs coming to see me.
This is the guy that /pol/ worships... >we are losing lots of people because of the Internet >we need go see Bill Gates and other people who understand what's happening... to SHUT THOSE PARTS OF THE INTERNET DOWN >somebody will say "freedom of speech, freedom of speech" >well, these are foolish people https://archive.is/cEi82 http://www.theregister.co.uk/2015/12/08/donald_trump_wants_bill_gates_to_close_the_internet/ I don't know what is more intriguing, Trump's naive understanding of the Internet and the role of Bill Gates in it or his outspoken fascism. https://archive.is/TWzuO https://theintercept.com/2015/12/07/obama-hints-at-renewed-pressure-on-encryption-clinton-waves-off-first-amendment/ Let's gas all /pol/tards chums.
Another encrypted p2p network. http://morph.is I have no idea how it works, or even if it works already, or how good it is. Just giving links...
https://youtu.be/WRWrmT0ovPE If you are currently in College make sure you don't use Ubantu
Women's advocacy groups in tech were trying to frame men in tech, according to ESR. http://esr.ibiblio.org/?p=6907 >The short version is: if you are any kind of open-source leader or senior figure who is male, do not be alone with any female, ever, at a technical conference. Try to avoid even being alone, ever, because there is a chance that a “women in tech” advocacy group is going to try to collect your scalp. >the Ada Initiative was trying to pre-generate outrage and collect scalps.
Did some of you try ReactOS? https://www.reactos.org/ Is it usable already? Is it really compatible with windows applications?
Things that are basically guaranteed to happen in the (near) future: >windows 10 will start automatically removing pirated content (software, music, movies) without the consent of the user, likely through windows defender as a "safety precaution" >surveillance infrastructure combined with liberally interpreted law will see that infrastructure used to target more than just terrorists, at first dealers in child exploitation material and drugs, and then to target those that infringe copyright >governments will heavily restrict strong crypto and ban anonymization technologies like onion routing for non-corporate entities, citing law enforcement concerns, making the use of such tech prima facie evidence of a crime >some guy fawkes mask wearing kid will likely do something stupid and violent, and the fallout will be that hackers and activists will be considered terrorists >hardware (routers etc.) will be required to ship with locked proprietary firmware to appease government regulators, making open source software unusable on such devices >further advances in trusted computing will force open source software off new hardware, and dominant virtualization solutions will require signed enterprise versions of linux >google's native client browser technology will be increasingly invoked to run native code on your machine, and the use of this will quickly evolve to be mainly distributed computing, essentially turning every web connected computer into everyone's (read: corporations') hardware >legal enforcement of the internet as a public speech zone whereby hate speech and bullying is criminalized, precipitating a push for legislation whereby "real id" only logins are required on all sites that fall under EU/US jurisdiction
Guys, I've a couple of stupid questions. It's so idiotic I marked this off topic. sorry in advance. So I would like to join Masterchan IRC, (if it's public, IDK to be honest), but I can't find information on the server/room, do any of you have the data? Also I would like to use some chat client that won't spew all my data to the server, because I wouldn't feel comfortable. Do you have any suggestions? (linux or mac, I don't use windows). Thank you in advance.
They are coming for encryption. What are the chances this will end in physical violence against governments attempting to do that? How big will the riots be?
Help me understand this NSA An exit node is a place that decrypts your TOR browsing data so you can go from TOR to the clearnet. Therefore, an exit node can spy on your whole communication: your passwords, what you are posting and so on. Basically, you should never use TOR to login to say facebook, because the exit node people could spy on your private communication. But say I use TOR for masterchan. I don't care if an exit node sees my anon ID, my posts and so on, because the information is not even private. What I do care about though is: does the exit node see my actual IP, or the TOR IP? Please enlighten us /nsa/, I could not find an answer to this on the internet
http://thehackernews.com/2015/09/truecrypt-encryption-software.html TrueCrypt compromised.
I'm able to boot linux on my MacbookPro but unable to get the wifi working on it. Since I'm doing this to test security I decided to come here and ask the question on what I could do to get it to work. Some one from another website once told me that I had to mess around with something called a wpa_supplicant but that shit is complicated.. I can't even get it to run so I'm looking for other suggestions.
Dear /nsa/! 8chan is having these data archival threads lately. They all refer to the TPP being almost passed. I find downloading and backuping stuff a worthwhile endeavour but why the sudden focus on this topic? As far as I can understand, the main effects of the TPP on the Internet will be that the copyright maffia will reach other countries too. So we are to expect more takedowns of file sharing sites, etc. Or am I missing the point? What will the TPP actually mean for the average chum? Please don't use scaremongering.
This will be quick. Then, I will fade back into obscurity. Directories in masterchan.org Http code will be 200 if said otherwise. Http with 200, is okay. 403 is forbidden. Total directories: about 1000 Pic not related. /conf/ /enterprise/ /voip/ /micro/ /ppts/ /host/ /shop/ /fr/ /ua/ /serial/ /mobiles/ /problems/ /get/ /d/ /mag/ /guides/ /delicious/ /db/ /kernal/ /ascii/ /mssql/ /fk/ /masters/ /zm/ /manage/ /consumer/ /shells/ /index/ /sess/ /state/ /bugs/ 1 / ???
so im trying to delete a file but im having issues doing so >this file name(s) would be too long for the destination folder -i can't rename the file in order to delete it changing the file properties doesn't help at all either bleach bit and shredder doesn't work either so im asking for help
>this New Campaign Wants To Help Surveillance Agents Quit NSA or GCHQ http://www.wired.com/2015/09/campaign-help-surveillance-agents-quit-nsa-gchq/
Hey, /nsa/ Since the new changes to Masterchan's CSS, have brought on a new account system. Several questions have been asked of how friendly this new account system is to Tor users in particular. As we all know you shouldn't be logging into a regular account using Tor, over several sessions. This completely eliminates any anonymity you might have sought using Tor. Having read some of the comments from the global thread over the past several days, an idea come up which might make this new anonymous account system viable for Tor users. This idea is, >we share accounts That's right, if you are using Tor, each time you want to upload images or create a new thread you simply have to look for a shared Anon ID and password. You can post with this shared Anon account, as much as you'd like or as little as you'd like. Sharing accounts is allowed under the new rules. If we all use a few Anon accounts and alternate between several accounts during one Tor session, we can make this new system work in a manner that doesn't tie as onto one account over several Tor sessions. Using Tor with this websites has been part of Masterchan culture since the beginning, our GADMIN has set up a system of Anonymous accounts that truly respects our privacy. Using proxies and Tor is generally encouraged here, and the site layout allows us to do just that. Taking all this into consideration ITT we post accounts that have more than 5 posts tied to them, post the Anon ID and the password. When you post with these shared accounts please do not spam threads with them or post illegal content. Help /nsa/ keep Tor users anonymous under these new rules, consider this a public service from /nsa/ to the Masterchan community. Help make new shared anon accounts, post with them. And most importantly stay anonymous.
Sup Chums Can anyone provide a complete package of OS for VirtualBox that is mandatory? Or a list of useful OS/add-ons that will be immensely useful for testing and security? How do I go about in downloading the right version or a clean OS that is safe and valid? Especially Looking for a good version of Win7 and WinXP though I am not sure which is good at all :| if VirtualBox is a shit VM let me know and offer some other option
http://www.rt.com/usa/315924-dlink-publishes-cryptography-keys/ >Router maker D-Link accidentally publishes private cryptography keys >windows and apple computers >lyl
help i just got a new iMac and i would like to install linux mint 17.2 xcfe version on it. the reason i choose mint is because i am relatively inexperienced when it comes to computers and reading the other threads on this board i found that it is ideal for beginners. Help please
Can network monitoring software be enough to know if you are being spied upon by your OS/Installed programs, or not?
Governments need to be way more transparent. >Leaked police files contain guarantees disciplinary records will be kept secret >Guardian analysis of dozens of contracts revealed by hackers shows more than a third allow or require destruction of civilian complaint records http://www.theguardian.com/us-news/2016/feb/07/leaked-police-files-contain-guarantees-disciplinary-records-will-be-kept-secret
I'm trying to use iexpress to activate a batch file but I keep getting this error: <Command.com /c C:\Users\Me\AppdData\local\Temp\IXP000.Temp\filename.bat > Reason: The system cannot find the file specified. anybody know how to fix this? Swear to god I got it to work once. I've heard the 8 bit filename bullshit before, thats a load of horseshit.
In need of a new OS. Im on windows 7 right now, the issue is tha its 32 bit, allowing me to only use 3.5 gb ram, out of my 6gb. That sucks, especially after I just upgraded my cpu, so I need a stable as can be, secure OS that I can play games on. I guess something Linux based. There will be lots of movie editing and rendering done, so its gotta be reliable and use little resources on its own. What would you recommend me chums? pic not so related
http://pastebin.com/8kM6bxbk Hi guys, this is a comprehensive and very detailed guide to creating a secure computing environment. This is useful for anyone who keeps data that they do not want others to view, such as pirated movies or your personal photos with you and your significant other. The guide does not refer to any specific type of content and should not be considered a "how to hide illegal behavior" guide.
has anybody had any luck using Kali operating system? I know there are a lot of penetration tools on it, some of which I've messed with before. (One day I actually managed to crack the hash on my own password using Cain & Able! I was so fricken proud...) I'm at the point where I know what most of them DO, i just don't know/ have the patience to get them to work. A lot of them seem like really really long walks to do something that it would be a lot simpler to just con someone else out of. Other times, shit seems freaking useless. Like what good is fucking ARP poisoning if you have to be on the same LAN? I want to steal the sooper secryt plans, not get a job working for WeFuckOrphans Inc.
It's happening! https://blog.torproject.org/blog/possible-upcoming-attempts-disable-tor-network >The Tor Project has learned that there may be an attempt to incapacitate our network in the next few days through the seizure of specialized servers in the network called directory authorities
>"Get on Skype, anon!" >Tox is a secure, decentralized multimedia messenger aimed at replacing Microsoft's proprietary and NSA-ridden Skype. It offers video and audio chat, group messaging, and file sharing, as well as a robust platform that can allow for endless possibilities, including your own personal version of Dropbox. (https://tox.im/) >Ekiga (formely known as GnomeMeeting) is an open source SoftPhone, Video Conferencing and Instant Messenger application over the Internet. It supports HD sound quality and video up to DVD size and quality. It is interoperable with many other standard compliant softwares, hardwares and service providers as it uses both the major telephony standards (SIP and H.323). (http://www.ekiga.org/) >Ring (formerly SFLphone) is a free distributed (multimedia communication software published under the GNU General Public License 3. It is developed by Savoir-faire Linux with the help of a global community of users and contributors. Savoir-faire Linux is a Canadian company specialized in Linux and free software. (http://ring.cx/) >Mumble is an open source, low-latency, high quality voice chat software primarily intended for use while gaming. (http://wiki.mumble.info/wiki/Main_Page) >Hello is built right into Firefox, you can rest easy knowing that your conversations and information will remain private and secure. And thanks to WebRTC-grade encryption, you’ll enjoy an added level of security. (https://www.mozilla.org/en-US/firefox/hello/) >Jitsi is an audio/video Internet phone and instant messenger written in Java. It supports some of the most popular instant messaging and telephony protocols such as SIP, Jabber/XMPP (and hence Facebook and Google Talk), AIM, ICQ, MSN, Yahoo! Messenger. (https://jitsi.org/) >"We're not downloading those apps lol, just use Skype!" What does /nsa/ use to voice chat with people online?
whats a good search client that doesn't violate my privacies? I heard of duckduckgo, but I also heard about what the owner did with his last company, which was selling data to other companies. anyway, search.disconnect.me is also trusted but I would rather use something else, any suggestions? >pic unrelated, its an image my cousin downloaded
https://www.petri.com/no-back-doors-microsoft-opens-windows-source-code-to-eu-governments Thoughts /nsa/? Is Microsoft running scared that Valve is promoting linux?
http://www.nytimes.com/2015/08/12/opinion/apple-google-when-phone-encryption-blocks-justice.html Hey guys, encryption is bad, mmmkay? Anyone else disgusted at this narrative they are trying to pull?
What's preventing meshnet from being a reality right now? Is is already ready to go? The website is so elusive. Is it run by autists with no marketing sense? The website says all it needs is more people running the meshnet software/hardware right? So why isn't this a thing yet? God fucking dammit I hate austists If this thing is ready to go, can we find a big boobed girl wearing a cleavage to explain meshnet in simple, untechnical terms on a youtube video so normies can get excited about that shit?
https://www.avast.com/en-us/faq.php?article=AVKB230#artTitle Do you have a smar phone? Is it Android?
How can a Checksum algorithm be used to make sure a compiled version of a source code is correct? For example: Your linux distro source code is at github/myLinux. But the installation files you download from mylinux.com are obviously not source code. How would you compare checksums that way? Would someone need to compile the source code into a distribution package first, and then do a checksum comparison?
Hacking Basics Social Engineering The first thing you need to understand about hacking is that 90% of it is about deception, trickery, and flat out lies. The weakest link in the chain will always be the end user. They will write their passwords down and tape them to their monitor, they will open executable files from unsolicited emails, they will download porn from un trusted sites and get a virus. Hacking is, and always will be, a con game. No amount of technical skill is going to change this. Exploits On the technical side of things, what you are generally looking for is not some magic skeleton key that will give you all access to all password fields, its is some sort of flaw in the security code that you are trying to exploit. A cheat code in a video game is an exploit, so is a program that takes advantage of buffer overflow. No Hand Holding Some people might be cool and help you out, but they are generally the exception to the rule. Even they will get frustrated if you are trying to discuss something you saw in a movie or are too slow and can not keep up. As an amatuer, many topics will simply be beyond your understanding at first, and you will have to learn many fundamental skills before you can even approach certain topics. There are just as many people out there who will try to fuck you over for no god damn reason and try their stupid "pranks" on you. There is some real malicious shit out there too, people who will try to blackmail you, steal your credit card info, or sell your information online to shady scam artists.
https://masterchan.org/pol/thread/5391 Check this thread guise
Recommended cloud services. Currently I have a virtualbox Windows where I do some work with g-drive installed, backing my work files. Then on my regular Linux I use dropbox for everything else. However, I'm very careful to not upload anything to dropbox that may get me banned under TOS - including my folder of pictures that I use to post around masterchan, my latest roms, some games that really are pirated like doom 2. I'd like a cloud service now just for these not as important files that are full of semi-piracy, and racist and abhorrent content. What do you guys recommend?
Stylometry tools. >Researchers, from Drexel University in Philadelphia, studied the leaked conversations and contributions of hundreds of anonymous users in underground online forums. >They were able to identify 80 per cent of users using stylometric analysis to match writing styles to authors. One cant be anonymous by hiding IP alone, not if everything written has a consistent style. Anonymize yourself and oust other samefags. https://psal.cs.drexel.edu/index.php/JStylo-Anonymouth#You-can-download-it-here https://github.com/psal/anonymouth http://www.philocomp.net/humanities/signature.htm
Where were you when Hacking Team was hacked? http://www.forbes.com/sites/thomasbrewster/2015/07/06/hacking-team-hacked/ Among the leaked content is -A list of clients (with countries) http://pastebin.com/MP8zpQ26 https://ht.transparencytoolkit.org/Amministrazione/01%20-%20CLIENTI/5%20-%20Analisi%20Fatturato/2015/02%20-%20Client%20Overview%202015/Client%20Overview_list_20150603.xlsx -Source code for malware https://github.com/hackedteam -A GeoTrust cert https://github.com/hackedteam/GeoTrust -Malware support for at least Ubuntu, Debian, Mint, Fedora and Mageia https://hacked.thecthulhu.com/HT/rcs-dev%5Cshare/Documentation/Compatibility%20List/Compatibility%20List%20%28not%20for%20customers%29.9.6.xlsx https://hacked.thecthulhu.com/HT/rcs-dev%5Cshare/Documentation/Compatibility%20List/RCS_9.5_Features_Compatibility_v1.0.pdf -And CentOS too https://hacked.thecthulhu.com/HT/rcs-dev%5Cshare/Documentation/Prerequisites/RCS%20Prerequisites.pdf -Porn links https://hacked.thecthulhu.com/HT/c.pozzi/Desktop/you.txt -And lots of emails, screenshots, voice recordings, passwords in cleartext and pirated software. Archived Twitter with .torrent links: https://web.archive.org/web/20150706095436/https://twitter.com/hackingteam HTTP mirrors: https://ht.transparencytoolkit.org/ http://ht.musalbas.com/ https://hacked.thecthulhu.com/
Is it possible to download an internet file while skipping its initial parts? Say a text file is 10 megabytes. You want to start your download at 5 megabytes, since you know anything before that is unnecessary Can you do that?
Best Anti-virus software? Preferred anti-virus? I used Norton's anti-virus, and it worked pretty well. I used it to do full scans and it automatically checked some files for malware. I also used it to manually check files. Any good free anti-virus? Most likely not, but please share information on what you chums know about anti-virus.
I need a new downloads manager. I figure this is the correct board to post about this. I used JDownloader but it went to hell long time ago with an horrible UI, advertisement and before uninstalling it it started to fuck with my DNS without me configuring said option. My first need for a download manager is that it can be continued even if the internet goes down, like Jdownloader, and continuous downloads.
Went afk, came back, there were two new notifications on my tor browser, both of which were telling me to update as soon as possible to a new version of tor browser. I restart my browser without downloading anything and there is no yellow explanation mark on the green onion indicating there is an update available like there normally is. Did I just get hacked? Pic unrelated.
Best tool for wipe an HD?i know that isn't the best way to hide data but it's just a precaution for some "sensitive data"
Okay, I have a macbook air and I got some stuff I need to clear off the drive, so I'm going to reinstall the OS. What linux distro do you recommend to someone that has only ever used ubuntu? Is it worth learning to use arch or is there something easier to use?
https://youtu.be/ufuiu--JNfI This is what happens when politicans who understand nothing of technology and want to supress all tech shit stumble on this
I imagine people can be tracked by the photos they upload. I'm not talking about EXIF data, but even a photo with none of that or, irrelevant info (downloaded from some other site or something, so not connected to you). The filename could be used or the exact data for the photo may differ slightly from on version to another due to a tiny change that cannot be seen in the photo itself. Definitely not as accurate as EXIF data, but could be used. Clearly there are some weaknesses in this system, images that are uploaded to websites in mass make it harder to connect people, as it's clearly a popular image. But a less shared image being on two different websites may hint that the accounts that posted the images are owned by the same individual. On smaller communities, like masterchan, it may be able to connect two posts that otherwise would be unconnected. How many unique posters come here? 1000 maybe? I don't know how long users are stated as "online". Nor if those are only posters or also lurkers. Regardless, the chances that only one user here posts a certain image is rather high compared to communities that may have tens of thousands of users. Even if it's an image posted by a few people, the filename may differ and from that it can be determined that Person A uses filename 5466146.png and Person B uses filename 862135.png. Clearly a person could change the name of their image, however if this is an image both users post semi-often and it goes 5466146.png posted, 862135.png posted, 5466146.png posted then it's probably not the case that it's a single user change the name, as who would remember the previous name and switch back to it? Especially as someone who took this care to prevent being tracked would specifically avoid reusing filenames. So how can this be avoided? The filename does seem simple enough, if bothersome. Just change the filename either after or before posting an image. Possible, a feature could be added to allow for an image to be added with a random filename in place of the filename the user has for it. The actual data of the photo itself though would be much harder to hide. It couldn't be encrypted, as that would make the image itself unviewable. I'm not sure if it is possible, but possible images could be made undownloadable. I hear you can disable right-click on websites, but I get the idea that most people would not like that and is probably easily circumvented. Even if it were possible, most people wouldn't like it as it would mean being unable to download the photo themselves quickly (though taking a screenshot and making your own would still be possible). Since the goal is not really to prevent the downloads, but to make two images that are the exact same appear to be different, it may be possible to somehow modify the photo data on the server end without damaging the quality of the image itself. Unfortunately, this is something I'm complet
What email service does /nsa/ recommend? I'm trying to move away from anything google
What are some good websites for Hotlinking? Bonus points go to those, which get a short url, and the filename does't change Please post all Hotlinking webhosting sites you know
Do you think we can send our "Online Networks Constitution" to Stallman and see if he responds to it? Video related, he is talking exactly about some of the issues we are as well. If Stallman ever commented on a internet constitution of sorts, it would be another step for eventually one finding itself in the real world with lots of people behind supporting it How the fuck do you contact this man?
http://www.huffingtonpost.com/ruth-starkman/10-things-you-need-to-know_b_8604570.html Huffingtonpost defending encryption
Have you ever seen the conversation /nsa/? I recommend this movie. This is some analog /nsa/ age, before mass surveillance was possible.
I need your help /nsa/. While lurking 8ch, I came across a thread, http://8ch.net/b/res/4414991.html I downloaded the file, and have been running a brute force attack on it ever sense. It make take days, but wat if it really is the jackpot. I'm willing to take the risk. Anyways, I am the poster that derailed the thread, claiming it to be a 160MB hitler mp4, as I don't want those fags to claim responsibility for leaking it.. This was prob a bad idea, as they needed as much help as they could get, and my laptop could take years brute forcing the password on this webm. I will report back if and when, my ol laptop ever figures out the password. Also, lets race, anyone got a better program? I'm using the slow ass fcrackzip on windows lel
https://www.eff.org/deeplinks/2015/10/partial-victory-obama-encryption-policy-reject-laws-mandating-backdoors-leaves >Partial Victory: Obama Encryption Policy Rejects Laws Mandating Backdoors, But Leaves the Door Open for Informal Deals
ITT: we pick and or admit to why we use what and which web browser is more superior than the other, ill start. I use nightly because firefox used to be top tier but lately they're just screwing every thing up, I don’t care for emojis and if you’re using chrome good rest in peace.
What's NSA's opinion of this show? have you seen it? And was the haxxing parts realistic?
N-no one here uses Ubuntu right? https://archive.is/vxt6x
My long last dream is finally being achieved. >All my work/personal non sensitive files are stored on DropBox >Sensitive stuff (passwords) are stored on DropBox under a truecrypt container >On a Windows virtual machine that I still need for work I use google drive, backuping the work files >Firefox saves all my links on the internet automatically as I save/update them >I use SpiderOak to backup my chan post folder. The reason I don't use dropbox for it is because I'm afraid they may terminate my account if I have "offensive" maymay images on my post folder. Fucking bullshit, that would be discrimination wouldn't it? All is well but one issue: I can't cloud synch my pirated stuff (music, emulator roms) nor I am willing to backup my porn stuff for obvious reasons. Not just my privacy (I don't care spideroak claims to have privacy, not uploading porn there) but because you may save a video from some hot girl like Traci Lords to find out she was 17 at the time of the shooting, and now you have that evidence on some cloud service for life. Fuck that. Too risky. But at this point, losing porn/some pirate stuff is really not a big issue. Hard drive failure, come at me.
I'm completely inept when it comes to technology, but please hear me out. I post on masterchan's /b/ (as Lucy) and I have been told that I could get advice on how to protect myself from being doxxed. Any advice would be great- I post using an iPad mini sometimes. Thank you!
hi /nsa/ I'm moving to college and there I'll have to register all my devices by their MAC address on the network to be able to access the internet. Any advice what to do so I can access edgy shit without it being noticed? TOR? Freenet? MAC spoofing? VPN? Proxy?
The tmp file/chip thing, can it be deleted or will that ruin the computer? I really need help with this
How do you guys cope with the crushing depression of knowing that the tech world is so fucked up? At every level in any given stack of technology, there is a myriad of exploits and vulnerabilities, most of which can't be solved with a simple software patch. In desktops, this manifests in overly complex ISAs with hidden instructions, encrypted microcode hiding unknowable subroutines, vPro and co's always-on backdoor, undocumented firmware waiting to be maliciously reflashed, overly large kernels brimming with bad drivers, OpenSSL-esq libraries for written for 'security', ancient protocols endlessly repurposed into situations where they barely cope if at all, software so intelligent it makes the choices you don't want, compilers compiled from compilers compiled from compilers just asking for a Thompson hack and operating systems so muddled, you can get root access in a line of code. That's just one computer, and it's not an exhaustive list. The internet is barely holding itself together, and really would be better collapsed at this point. Tor is barely treading water, and will always face fundamental physical limits to anonymity and latency. Same with i2p. GSM is laughably easy to attack, and phones are pitch black boxes. Your smartcars are trivially hacked, and likely so are the airplanes that keep crashing. Your bank is probably the most secure technology you're associated with. Great feeling, that. And the real kicker? You can't escape it, even if you threw all your tech away, tech will always surround you, from security cameras with facial recognition and gait tracking, to casual use of drones, to increasingly powerful satellites. And even if you lived in the woods, one stuxnet gone wrong, and you have a nuclear holocaust to enjoy. Did I tell you about how CMEs can easily fuck us up if they so much as look at us? These aren't 1 in 2 million year chances, like a local supernova. These are things that can happen any moment. How the hell do you guys cope?
https://masterchan.org/islam/thread/1 '8chan's hidden service address is not fullchan4jtta4sx anymore. Hotwheels accidentally gave his private key to the public.' What is a private key, is this pgp? screencaping this learning journey..
I am in need of advice chums I need a secure mail service, for sensitive communication. The person I am trying to setup communication with is a journalist, and has no experience with freenet or tor type services. read complete retard. I was looking at Safe-mail.net anyone have any other recommendations?
**accidentaly posted this on /b/** >have windows 7 >pc slow as fuck today >decide to run malwarebyts to check for viruses >0 threats found >think I have too little free space (30gb) and it might be causing the slowness >run CCleaner drive wiper to free up some more space >go clean the house while it wipes shit >some hours later notice pic related >it's the windows update screen >my windows is from PirateBay >I never do updates >this shit went into update mode all by itself What the fuck? I thought I was in complete control of my computer, I just look away for a second and this shit updates without my permission? Been using this for about a year now with disabled updates, how could this happen out of nowhere? I don't know what to do right now. I handle extremely sensitive files on this machine (read: pizza), the last thing I want is a company spying on my "information reports" or shit like that. So what do I do now? I'm afraid of opening my Veracript partitions in a machine which updates without its owners permission, this is shady as fuck.
Hi /nsa/ Which would you consider better for my laptop for privacy? 1.: - Windows 7 - drive fully encrypted with Bitlocker with TPM - TPM+PIN used on startup - very long random password to login used with a fingerprint scanner advantages: - fingerprint reader works - 3G modem works - TPM works - built-in wacom digitizer works - touchscreen works - all funcion buttons work disadvantages: - not linux 2.: - Elementary OS - full disk encryption with dm-crypt - strong password used on startup - strong password on linux advantages: - no NSA backdoor (i guess?) disadvantages: - basically nothing extra works what normally does under Windows The device is a Thinkpad X200 Tablet
I want to use linux but I also want to game, do you guys have a solution for my oh so common problem.
Daily reminder that 8chan has a Tor hidden service -- what's Masterchan's excuse?
Kim Dotcom is no longer involved in mega http://yro.slashdot.org/story/15/07/27/200204/interviews-kim-dotcom-answers-your-questions?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Slashdot%2Fslashdot+%28Slashdot%29
I am looking for an open source desktop recorder for Linux that will do the following: 1) allow me to preset a screen size, with hotkeys to prompt the recording window 2) allow me to drag on the desktop to set a recording window size on the fly 3) will save the files in a small format, with good (not best) quality, but with files that aren't huge. Snagit for windows is a good example of that, videos are only a few megabytes per minute. Open Broadcaster Software will not work on my PC by the way, crashing for some reason.