"Get on the ground, fucko! Squad, take his computer and all other electronics!"
ITT:
-==COMMON BULLSHIT==- "If you think privacy is unimportant for you because you have nothing to hide, you might as well say free speech is unimportant for you because you have nothing useful to say." -- Ed Snowden If I've done nothing wrong there is no reason to search me.
I saw this happen to an acquaintance not long ago. The police took all his computers but left external HDDs and usb sticks on his desk. One drive was filled with encrypted CP. Thankfully he was utterly incompetent in using computers and is now in serious trouble. They'd have found the keys to decrypt it in a word document anyways.
Your average cop has no idea what a HDD does anymore than you know how a defibrillator works.
Adam Wright
True, but the spookier agencies likely have digital forensics teams ready for situations they deem necessary
So the only what they need to do is to wait when your PC is running. Will you shutdown PC on every occasion you leave your room? Like when going to toilet or opening a door when someone's knocking? Also if you do not live alone, someone else can open the door when you don't know.
With FDE, everything is accessible while PC is running. EncFS beats FDE. Also, FDE makes it clear you are encrypting something. And when they get password (or just running PC) they access everything.
Additionally, FDE makes you need to shutdown PC often. And that gives them information about when do you use your PC. When you shutdown your network and TOR connections are disconnected. They can use that to track your activity and confirm if you are some person on anonymous forums.
Elijah Morales
This is actually wrong imo, because there isn't a single person in the world with nothing to hide. It's just that they only realise when all their stuffs already in the wild for everyone to see.
Why do you have questionable images, video, audio, etc. OP?
Adrian Fisher
What are safest os for a smart phone ? (I don't want to remove every single microphone and my camera)
Gabriel Collins
How good is Ring (ring.cx/)? If I wanted to replace my phone / text with it, is that viable? I'd use Tox but I need something normalfag-compatible for my family etc. - plus Antox is garbage. Is Ring reasonably secure / trusted, and is the Android app on F-droid any good?
Levi Wilson
If you're really concerned about your privacy/security on your mobile device then just don't use one. As simple as this. Androids security is a total train wrack because nobody thought about this at the beginning and all the current efforts are just hopeless attempts. Apple did a better job Jobs, get it :----DDddd with the app-isolation in iOS but a great part of their system is security by obscurity and you don't even have a chance to rice the phone as you like. Than there are some exotics like Sailfish OS which looks quite promising but simply won't ever be relevant on the market. Also I don't know anything about their 'security' but won't hope for too much. tl;dr: Why even smartphone?
Jaxon Gomez
I guess I bought the whole cool phone cool guy meme , looking back on it I should've bought a laptop or a 125cc bike.
John Nguyen
There is also a guide on /g/ about privacy.
Adrian Johnson
Unfortunately I am too bad to tell which is good.
Matthew Jones
It's like you're asking to get searched
Colton James
It's like you're asking to get scorned
David Reed
Who i2p here? I always ignored it because it was more work than tor, but it's actually pretty sick. Wish GNUnet was usable.
Jayden Adams
multiple disk give you shit. If you use same password, they can decrypt with same hash from RAM. If you use different, how will you remember? And they will be mounted entire time anyway if you just use stuff and listen to music.
Linuxers always said that loonix guarantees you security no matter what you do.
Jose Sanchez
You could suspend to disk with an encrypted swap so that you don't have to completely shut down your system if you leave it for a bit. Another option is a script that shuts down the computer in 10 minutes if a password isn't entered. Most likely if the police do kick down your door and take your computer they won't go through it until they bring back to the station and by then your script will have shut down the system.
Landon Smith
All of your tactics to protect yourself involves things that are illegal. For example, you're not allowed to destroy evidence, so the magnet and thermite shenanigans would land you in prison
And if your disk is encrypted, you're required by law to hand over the password and the police have the right to hold you in jail indefinitely until you do.
Austin Edwards
Well, except for hidden volumes. You could pretty quickly destroy a micro SD card in such a way as to leave no evidence.
Gavin Wilson
Finally, the first sensible post that actually provides privacy without landing you in jail for obstructing or deleting evidence. Tomorrow if I have the time I will do some research to see if I could get this setup with LUKS encryption.
Unless you pulverize it into dust, that's not going to work. The fact that the cops see broken storage like that, they will believe you destroyed it deliberately which is illegal and would get you into jail anyway.
Grayson Gutierrez
While it is true that laziness or incompetence is why most Internet criminals get caught, to actually fed-proof your PC is not a simple task. If the data is intact but inaccessible, not giving them access to it is a felony in itself, so you need to jury rig some way to destroy your data as fast as possible while leaving no evidence that you were trying to do this.
Honestly, if the government really wants you in prison, they will find an excuse one way or another.
Jayden Collins
Have fun living in the hellhole that is america
Zachary Thomas
I have no idea where to get started with i2p. Can never connect to anything. There used to be this white power blog that I stumbled onto that seemed like the rantings of an actual schitzo. That shit was fun to read, but I can't find it again.
Lincoln Watson
Oh please, where is it better to be an electronic citizen?
I dare say the only place you can get real freedom on the internet anymore is somewhere in Africa or something like that, and you'd still need to lock down your computer to prevent other countries from trying to spy on you.
Landon Gonzalez
weew
David Adams
Bretty gud Too bad it's slow as fuck and many i2p websites don't even work
>I want 150 from 4chan, whatever you can get from 8. I want 1000 top reddit drivers exposed and I want content analysis for their posts. I want the people who are really driving their narrative.
Not going to make a thread for this since it might be bullshit
Zachary Wilson
looks way bullshit to me
Gavin Gonzalez
All drives can be unmounted on command and memory purged and overwritten in less than 50ms with a press of a button, which you would propably have if being paranoid.
Ryder Miller
Couldnt they just break an sd card themselves and accuse you anyway if they find nothing?
Daniel Campbell
I'd say finland. You have to have screwed yourself real deep to loose the court battle.
Hunter Smith
Not entirely. Yeah, you can't destroy evidence, but encrypted drives are 100% legal. There have been cases where judges have required the defendant to hand over passwords, and there have been cases where judges say "we can't make the defendant to that". USA is like a bunch of little countries that do whatever the fuck they want. it's alost like there's no standard but "community standard" which actually determines the outcome of a lot of sex-related cases.
Caleb Collins
If you're worried about someone knocking while you're on the shitter, you could keep an SSH session to your machine running letting you issue a hasty "sudo shutdown -h now" when needed.
Juan Peterson
If you have CP you should get shot by cops.
Daniel Myers
Hold the fuck up, why have I never heard about this and why is it not brought up as a skype alternative?
The fifth amendment seems to be a valid defense in the US.
Although many countires have laws protecting people from 'self-incrimination', there is often specific laws for decryption.
Defenses include hidden volumes (plausible deniability) and steganography.
Why pulverize it? MicroSD cards are small enough to swallow. Xraying suspects for storage devices isn't exactly a common practice. Otherwise flush it down the toilet.
David Nguyen
You have to leave i2p on for a few hours the first time you use it so it can build connections. A lot of sites also just aren't there anymore, especially due to the lack of popularity. I don't always have my connection up but I'm thinking about putting a raspi to use for it.
Nathan Morgan
It's basic voip software, the p2p communication aspect isn't anything special. Good luck getting anyone to install and use it.
I've used their previous SFLphone program and it worked well enough for SIP calls.
Austin Nguyen
The only solution i could see to this is having some sort of power killswitch or USB panic button that shuts down the computer as fast as possible.
I guess this doesn't apply to me because I am a law abiding citizen. Glad I was raised by good white American parents.
Noah Butler
Sounds about right
Adrian Cruz
Of course it doesn't, which means nobody would be able to plant an encrypted drive on you and then inform the authorities that you own CP. No, nothing like that would ever happen.
Oliver Jenkins
No it wouldn't. Because... why would anyone do that.
Michael Campbell
Because you post here
Dylan White
No I don't. I get my Gimp to post for me.
Eli Scott
Police don't always raid the guilty, user. Enforcement against crimethink is real. archive.is/HMuKn
Beyond that, privacy is a matter of control. Controlling how you present yourself to the world. Controlling what others know about you.
The police exist to enforce the law, but law enforcement isn't an end unto itself. If it cannot respect personal boundaries outside of investigating criminal matter it had prior knowledge of, it is no better than vigilantism. And there's nothing wrong with wanting to protect oneself against vigilantes who are infamous for their extralegal tactics towards enacting their conception ofjustice.
Yes, the Kali devs implemented this into cryptsetup quite a while ago. It will probably have to be taken from their repos to get it on any other distro. However in practice LE forensics will duplicate the drive making nukes useless.
After years of apathy, my ISP- and in extension, muh gubbernmint- knows all of my browsing habits by now. I'm especially ashamed of my pornographic tastes.
Fuck do I do if I'm already drowning in my own shit? Which VPN has the least amount of faggots spouting ">no logging"? Mullvad sticks out to me.
This guy has reviewed countless VPNs and put them into a table. Filter out unappealing 'features' and you might find whichever is right for you.
Thomas Wood
Thanks a lot Mokochi
Ryan Scott
It would be interesting to hack the drive firmware to trigger a self-destruct procedure when a specified canary sector is read. Leave a hole in the partition layout there and presto! Anybody trying to dupe the drive nukes it for you.
Brody Foster
does anyone here use riseup? how is it?
Lincoln Ross
I have never used it. It provides multiple services (VPN, email, filesharing) through one company in the US. They could easily be (or already may have been) slapped with a court and gag order, which would compromise all of those services. It's a security/convenience tradeoff. Do you want all of these services in the same place? It could be called putting all of your eggs in one basket.
Ayden Edwards
I was thinking of using it myself. There doesn't seem to be a real downside aside from:
But other providers seem to have equal or better free services.
Gavin Russell
That's kind of a deal breaker, isn't it?
Luis Cooper
They also say they might cooperate with law enforcement if you do things they don't like.
"Those things violate Riseup’s Terms of Service and, unlike some more “American Libertarian” service providers, we do not exist to provide privacy for doing anything you want. We would close the accounts of people doing those things and the collective may even decide to cooperate with law enforcement rather than set all the servers on fire and destroy the organization, and your email."
They could never prove anything. It was their fault for damaging the harddrive.
It's the local cop station, not the NSA.
Noah Flores
Depends where you are. In a small country town, forensics wouldn't be up to scratch. However it's standard proceedure to clone all drives. It's literally the first thing they do.