/fucko/ General Thread

"Get on the ground, fucko! Squad, take his computer and all other electronics!"

ITT:

-==COMMON BULLSHIT==-
"If you think privacy is unimportant for you because you have nothing to hide, you might as well say free speech is unimportant for you because you have nothing useful to say." -- Ed Snowden
If I've done nothing wrong there is no reason to search me.

-==TOOLS TO USE==-
privacytools.io/
prism-break.org/en/
wiki.installgentoo.com/index.php/Encryption

pastebin.com/tUvq8Jzj
fakenamegenerator.com/
gpg4usb.org/
gnupg.org/
eff.org/deeplinks/2014/08/cell-phone-guide-protesters-updated-2014-edition

Other urls found in this thread:

bbc.co.uk/news/technology-31753934
browserleaks.com/
panopticlick.eff.org/
ring.cx/)?
geti2p.net/en/faq#slow
archive.fo/4iOTI
en.wikipedia.org/wiki/Key_disclosure_law#United_States
en.wikipedia.org/wiki/Key_disclosure_law
archive.is/HMuKn
pastebin.com/tUvq8Jzj
github.com/NateBrune/silk-guardian
kali.org/tutorials/emergency-self-destruction-luks-kali/
thatoneprivacysite.net/vpn-comparison-chart/
riseup.net/en/about-us/policy/government-faq
twitter.com/SFWRedditGifs

*flips killswitch*

I saw this happen to an acquaintance not long ago. The police took all his computers but left external HDDs and usb sticks on his desk. One drive was filled with encrypted CP. Thankfully he was utterly incompetent in using computers and is now in serious trouble. They'd have found the keys to decrypt it in a word document anyways.

Your average cop has no idea what a HDD does anymore than you know how a defibrillator works.

True, but the spookier agencies likely have digital forensics teams ready for situations they deem necessary

FDE is shit.

bbc.co.uk/news/technology-31753934

So the only what they need to do is to wait when your PC is running. Will you shutdown PC on every occasion you leave your room? Like when going to toilet or opening a door when someone's knocking? Also if you do not live alone, someone else can open the door when you don't know.

With FDE, everything is accessible while PC is running. EncFS beats FDE.
Also, FDE makes it clear you are encrypting something. And when they get password (or just running PC) they access everything.

Additionally, FDE makes you need to shutdown PC often. And that gives them information about when do you use your PC. When you shutdown your network and TOR connections are disconnected. They can use that to track your activity and confirm if you are some person on anonymous forums.

This is actually wrong imo, because there isn't a single person in the world with nothing to hide. It's just that they only realise when all their stuffs already in the wild for everyone to see.

browserleaks.com/
Is there anything this site misses?

Haven't seen this one before, good find. Alternatively panopticlick.eff.org/

...

Why do you have questionable images, video, audio, etc. OP?

What are safest os for a smart phone ? (I don't want to remove every single microphone and my camera)

How good is Ring (ring.cx/)? If I wanted to replace my phone / text with it, is that viable? I'd use Tox but I need something normalfag-compatible for my family etc. - plus Antox is garbage. Is Ring reasonably secure / trusted, and is the Android app on F-droid any good?

If you're really concerned about your privacy/security on your mobile device then just don't use one. As simple as this.
Androids security is a total train wrack because nobody thought about this at the beginning and all the current efforts are just hopeless attempts. Apple did a better job Jobs, get it :----DDddd with the app-isolation in iOS but a great part of their system is security by obscurity and you don't even have a chance to rice the phone as you like. Than there are some exotics like Sailfish OS which looks quite promising but simply won't ever be relevant on the market. Also I don't know anything about their 'security' but won't hope for too much.
tl;dr: Why even smartphone?

I guess I bought the whole cool phone cool guy meme , looking back on it I should've bought a laptop or a 125cc bike.

There is also a guide on /g/ about privacy.

Unfortunately I am too bad to tell which is good.

It's like you're asking to get searched

It's like you're asking to get scorned

Who i2p here?
I always ignored it because it was more work than tor, but it's actually pretty sick.
Wish GNUnet was usable.

multiple disk give you shit. If you use same password, they can decrypt with same hash from RAM. If you use different, how will you remember?
And they will be mounted entire time anyway if you just use stuff and listen to music.


Linuxers always said that loonix guarantees you security no matter what you do.

You could suspend to disk with an encrypted swap so that you don't have to completely shut down your system if you leave it for a bit. Another option is a script that shuts down the computer in 10 minutes if a password isn't entered. Most likely if the police do kick down your door and take your computer they won't go through it until they bring back to the station and by then your script will have shut down the system.

All of your tactics to protect yourself involves things that are illegal. For example, you're not allowed to destroy evidence, so the magnet and thermite shenanigans would land you in prison

And if your disk is encrypted, you're required by law to hand over the password and the police have the right to hold you in jail indefinitely until you do.

Well, except for hidden volumes.
You could pretty quickly destroy a micro SD card in such a way as to leave no evidence.

Finally, the first sensible post that actually provides privacy without landing you in jail for obstructing or deleting evidence. Tomorrow if I have the time I will do some research to see if I could get this setup with LUKS encryption.

Unless you pulverize it into dust, that's not going to work. The fact that the cops see broken storage like that, they will believe you destroyed it deliberately which is illegal and would get you into jail anyway.

While it is true that laziness or incompetence is why most Internet criminals get caught, to actually fed-proof your PC is not a simple task. If the data is intact but inaccessible, not giving them access to it is a felony in itself, so you need to jury rig some way to destroy your data as fast as possible while leaving no evidence that you were trying to do this.

Honestly, if the government really wants you in prison, they will find an excuse one way or another.

Have fun living in the hellhole that is america

I have no idea where to get started with i2p. Can never connect to anything. There used to be this white power blog that I stumbled onto that seemed like the rantings of an actual schitzo. That shit was fun to read, but I can't find it again.

Oh please, where is it better to be an electronic citizen?

I dare say the only place you can get real freedom on the internet anymore is somewhere in Africa or something like that, and you'd still need to lock down your computer to prevent other countries from trying to spy on you.

weew

Bretty gud
Too bad it's slow as fuck and many i2p websites don't even work

Why was he vanned in the first place?

i2p's speed is dependent on your connection
geti2p.net/en/faq#slow

This true for America?

>I want 150 from 4chan, whatever you can get from 8. I want 1000 top reddit drivers exposed and I want content analysis for their posts. I want the people who are really driving their narrative.

archive.fo/4iOTI

Not going to make a thread for this since it might be bullshit

looks way bullshit to me

All drives can be unmounted on command and memory purged and overwritten in less than 50ms with a press of a button, which you would propably have if being paranoid.

Couldnt they just break an sd card themselves and accuse you anyway if they find nothing?

I'd say finland. You have to have screwed yourself real deep to loose the court battle.

Not entirely. Yeah, you can't destroy evidence, but encrypted drives are 100% legal.
There have been cases where judges have required the defendant to hand over passwords, and there have been cases where judges say "we can't make the defendant to that".
USA is like a bunch of little countries that do whatever the fuck they want. it's alost like there's no standard but "community standard" which actually determines the outcome of a lot of sex-related cases.

If you're worried about someone knocking while you're on the shitter, you could keep an SSH session to your machine running letting you issue a hasty "sudo shutdown -h now" when needed.

If you have CP you should get shot by cops.

Hold the fuck up, why have I never heard about this and why is it not brought up as a skype alternative?

en.wikipedia.org/wiki/Key_disclosure_law#United_States

The fifth amendment seems to be a valid defense in the US.

Although many countires have laws protecting people from 'self-incrimination', there is often specific laws for decryption.

Defenses include hidden volumes (plausible deniability) and steganography.


Why pulverize it? MicroSD cards are small enough to swallow. Xraying suspects for storage devices isn't exactly a common practice. Otherwise flush it down the toilet.

You have to leave i2p on for a few hours the first time you use it so it can build connections. A lot of sites also just aren't there anymore, especially due to the lack of popularity. I don't always have my connection up but I'm thinking about putting a raspi to use for it.

It's basic voip software, the p2p communication aspect isn't anything special. Good luck getting anyone to install and use it.

I've used their previous SFLphone program and it worked well enough for SIP calls.

The only solution i could see to this is having some sort of power killswitch or USB panic button that shuts down the computer as fast as possible.

>en.wikipedia.org/wiki/Key_disclosure_law
Of course the UK and Australia would put you in jail for not disclosing encryption keys.

I guess this doesn't apply to me because I am a law abiding citizen. Glad I was raised by good white American parents.

Sounds about right

Of course it doesn't, which means nobody would be able to plant an encrypted drive on you and then inform the authorities that you own CP.
No, nothing like that would ever happen.

No it wouldn't. Because... why would anyone do that.

Because you post here

No I don't. I get my Gimp to post for me.

Police don't always raid the guilty, user. Enforcement against crimethink is real. archive.is/HMuKn

Beyond that, privacy is a matter of control. Controlling how you present yourself to the world. Controlling what others know about you.

The police exist to enforce the law, but law enforcement isn't an end unto itself. If it cannot respect personal boundaries outside of investigating criminal matter it had prior knowledge of, it is no better than vigilantism. And there's nothing wrong with wanting to protect oneself against vigilantes who are infamous for their extralegal tactics towards enacting their conception ofjustice.

He's got some more insightful quotes though:

>pastebin.com/tUvq8Jzj
E486: Pattern not found:

So yeah, without even reading that I already know it is full of bad advice. or at least sub-par advice.

...

Everything is a shill /;^3
Just strange the cuck who wrote it left out a major security module


Yes, I am very angry. Argh

Is it possible to set up fde on gnu with a duress password? That way if subpoenaed you can dive them a fake pass that scrambles the drive.

SELinux is shit, and so is your opinion.

heil holy hitler

Not an argument.

link?

I brought my computer to the recycling center yesterday. They shredded it.

My new computer arrived today. I need to assemble it.

github.com/NateBrune/silk-guardian
That's one I know of.


Yes, the Kali devs implemented this into cryptsetup quite a while ago. It will probably have to be taken from their repos to get it on any other distro. However in practice LE forensics will duplicate the drive making nukes useless.

Forgot link
kali.org/tutorials/emergency-self-destruction-luks-kali/

After years of apathy, my ISP- and in extension, muh gubbernmint- knows all of my browsing habits by now. I'm especially ashamed of my pornographic tastes.

Fuck do I do if I'm already drowning in my own shit? Which VPN has the least amount of faggots spouting ">no logging"? Mullvad sticks out to me.

thatoneprivacysite.net/vpn-comparison-chart/

This guy has reviewed countless VPNs and put them into a table. Filter out unappealing 'features' and you might find whichever is right for you.

Thanks a lot Mokochi

It would be interesting to hack the drive firmware to trigger a self-destruct procedure when a specified canary sector is read. Leave a hole in the partition layout there and presto! Anybody trying to dupe the drive nukes it for you.

does anyone here use riseup? how is it?

I have never used it. It provides multiple services (VPN, email, filesharing) through one company in the US. They could easily be (or already may have been) slapped with a court and gag order, which would compromise all of those services. It's a security/convenience tradeoff. Do you want all of these services in the same place? It could be called putting all of your eggs in one basket.

I was thinking of using it myself. There doesn't seem to be a real downside aside from:

But other providers seem to have equal or better free services.

That's kind of a deal breaker, isn't it?

They also say they might cooperate with law enforcement if you do things they don't like.

"Those things violate Riseup’s Terms of Service and, unlike some more “American Libertarian” service providers, we do not exist to provide privacy for doing anything you want. We would close the accounts of people doing those things and the collective may even decide to cooperate with law enforcement rather than set all the servers on fire and destroy the organization, and your email."

riseup.net/en/about-us/policy/government-faq
(down the bottom)

...

...

They could never prove anything. It was their fault for damaging the harddrive.

It's the local cop station, not the NSA.

Depends where you are. In a small country town, forensics wouldn't be up to scratch. However it's standard proceedure to clone all drives. It's literally the first thing they do.

...