They call me paranoid for wanting military grade encryption

Jack Jenkins
Jack Jenkins

They call me paranoid for wanting military grade encryption. Now only if Intel and AMD processors didn't have back doors I would even more secure.
anyone have any good opsec suggestions or software?

William Powell
William Powell

It's all OK, Brad Robinson of Beaverbrook, North Dakota. We know where you live.

Adam Jones
Adam Jones

not impressed.

Brad M Robinson
46 years old
701-567-6561
405 N Main Street, Hettinger, North Dakota (Home)
309 S 1st Street, Beresford, South Dakota (Home)

Carson Sanchez
Carson Sanchez

Pretty soon I hope to "compile" my own processor or something like an FPGA on something akin to a 3D printer using an automatically mathematically verifiable programming language such as one with dependent types in the same vein as Agda or Idris. Watch for developments in the next 5-10 years or do your own small part in making it happen. Computational independence is within reach.

Wyatt Kelly
Wyatt Kelly

Computational independence is within reach.
Can I inject it into my skin?

Joseph Taylor
Joseph Taylor

No, it'll probably be huge and slow like one of your turds.

Nicholas Lewis
Nicholas Lewis

mmmmmmmmmmmnice

Christopher Wilson
Christopher Wilson

are you a wizard?

Owen Rivera
Owen Rivera

No, hes just a retard

Sebastian Morris
Sebastian Morris

Or just use tor

Jose Wilson
Jose Wilson

Tor is slow af with monitored exit nodes, nty

Hudson Smith
Hudson Smith

Funny way of saying i2p

Daniel Jenkins
Daniel Jenkins

Yeah, install TempleOS, or get a computer from the 1980's.

Matthew Jackson
Matthew Jackson

this music is what i've been waiting for all my life. thank you very fucking much.

Levi Hall
Levi Hall

Do all your computing on a Commodore 64. If you need more power buy an actual IBM mainframe. Naturally don't put any of these machines on the internet.

Jordan Nelson
Jordan Nelson

use gnupg. aes, twofish, and any other standard symmetric encryption should be good. 256-bit is good. i suggest a 30-character pass with letters numbers and caps distributed.

windows?
shouldn't use windows for that kinda thing since everybody knows windows is damn insecure, but, winGPG works.

Owen Gray
Owen Gray

vpn and/or tor network should be good. vpns aren't ultimate protection though, nothing is ultimate protection. delete your internet browser cache regularly as it temporarily saves any files opened in the browser (in the system, don't delete with the browser settings. you want secure delete. i tend to use linux's 'srm' tool since it is overkill, but i suggest using any secure deletion that makes use of the methods taught by gutmann's lectures.)

Christian Foster
Christian Foster

gnupg only encrypts single fiiles, so you'll wanna zip or tar it. it /does/ compress(lossless) files it encrypts, so there's no need to do that again with zip as opposed to tar.

No security is lost by encrypting an archive file whatsoever.

Luke Nelson
Luke Nelson

srm
srm overwrites the used filesystem blocks so this only works on hdd's, flash memory such as SSD's use garbage collection. they will write new data to a new block instead of one already allocated to lengthen the light of the flash memory as each bit only has a limited amount of writes. If you wan't secure deletion of a file delete it the normal way and then create a file on your filesystem and fill it with zero's or random data, up until the filesystem is full. Make sure the file system uses all available space for this to work correctly, although doing this too much will severely hinder the performance of an SSD, the best method is to copy your filesystem contents to external media, wipe your SSD with hdparm which interfaces with the ssd's firmware to perform a secure deletion that does not damage the flash. And then copy your files + bootloader etc back over.

Landon Rivera
Landon Rivera

light lol, meant to say Life*

Joseph Scott
Joseph Scott

Fuck me..

want*, zeros*,

Also when referring to using hdparm, make sure before you copy the filesystem contents over that you delete the file(s) you want deleted first..

Dominic Kelly
Dominic Kelly

Also it's good practice to never let your decrypted data touch persistent storage, e.g~ decrypting to a ram filesystem.

Disable AdBlock to view this page

Disable AdBlock to view this page

Confirm your age

This website may contain content of an adult nature. If you are under the age of 18, if such content offends you or if it is illegal to view such content in your community, please EXIT.

Enter Exit

About Privacy

We use cookies to personalize content and ads, to provide social media features and to analyze our traffic. We also share information about your use of our site with our advertising and analytics partners.

Accept Exit