this post was submitted on 05 May 2024
298 points (98.4% liked)

4chan

4208 readers
5 users here now

Greentexts, memes, everything 4chan.

founded 1 year ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 77 points 6 months ago (4 children)
[–] [email protected] 25 points 6 months ago* (last edited 6 months ago) (3 children)

Rubberhose (file system) Deniable encryption
https://en.m.wikipedia.org/wiki/Deniable_encryption
The notion of "deniable encryption" was used by Julian Assange and Ralf Weinmann in the Rubberhose filesystem (...) In cryptography, rubber-hose cryptanalysis is a euphemism for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by coercion or torture—such as beating that person with a rubber hose, hence the name—in contrast to a mathematical or technical cryptanalytic attack. (...)

[–] [email protected] 4 points 6 months ago

Encrypted stenography

load more comments (2 replies)
[–] [email protected] 21 points 6 months ago (26 children)

Right? It's kinda nuts how much this quixotic prepper-style power fantasy permeates some parts of the Internet. Hell, even that strip is conceding the basic point that there will be a cabal of evil people digging for all their super-important secret files at some point.

load more comments (26 replies)
load more comments (2 replies)
[–] [email protected] 70 points 6 months ago (6 children)

Buy a thinkpad x230 and install heads. Write protect the flash chip. Put nail polish on the screws and take high resolution pictures to ensure signs of tampering. Do NOT use a HDD or SSD. They have DMA so a malicious firmware could do a lot of damage, use of USB is preferred since they do not have DMA. Completely remove the microphone, sound card, webcam and the WWAN card from the laptop. Remove the fan to prevent binary acoustic data transmission. Replace the default wifi card with a supported atheros card. Disable wifi when not in use, preferably by physically removing the card. Make your own independent Linux distro from scratch. Most Linux distros value convenience over security and will thus never have good security. Your only option is to make your own. Use musl instead of glibc, Libressl instead of openssl, sinit instead of systemd, oksh instead of bash, toybox instead of gnu coreutils to reduce attack surface. Enable as little kernel modules as possible. Use a hardened memory allocator. Apply strong SELinux and sandboxing policies. Restrict the root account heavily to make sure it never gets compromised. Disable JavaScript and CSS in your browser. Block all FAGMAN domains in your hosts file. Monitor all network requests. Do not use a phone. Never speak near anyone who owns a phone, they are always listening. Never use any non-corebooted technology made after 2006. Never leave your devices unattended. Tape triple layer aluminum foil all around your room as tempest shielding. Type really quietly as defense against audio keylogging. Use ecc ram to minimize rowhammer and rambleed. Encrypt everything multiple times with various different encryption implementations. Compile everything from source. Use hardened compilation flags. Always read through the source before installing something if possible. Only use the internet when absolutely necessary.

[–] [email protected] 14 points 6 months ago (1 children)
[–] [email protected] 31 points 6 months ago (2 children)

Facebook Apple Google Microsoft Amazon Netflix

[–] [email protected] 6 points 6 months ago

M’FAANG

tips hat

load more comments (1 replies)
[–] [email protected] 8 points 6 months ago

ᕕ( ᐛ )ᕗ

[–] [email protected] 6 points 6 months ago (1 children)

The only thing comparable to Meth is Linux.

load more comments (1 replies)
[–] [email protected] 6 points 6 months ago (2 children)

I member the first time I smoked meth 😜

load more comments (2 replies)
[–] [email protected] 4 points 6 months ago* (last edited 6 months ago)

This is why I am on lemmy

load more comments (1 replies)
[–] [email protected] 53 points 6 months ago (2 children)

what does he do all day?

He administers his system.

[–] [email protected] 15 points 6 months ago

He's also a fursuit connoisseur.

[–] [email protected] 9 points 6 months ago

and configures vim obviously

[–] [email protected] 47 points 6 months ago (1 children)

"Finally, we cracked it. What was he hiding in this thing?"

"Mostly ways to keep his data safe"

[–] [email protected] 17 points 6 months ago* (last edited 6 months ago) (4 children)

There are two kinds of people obsessed with their internet security.

  • Computer hobbyists with an inflated opinion of their own importance and a touch of autism

  • IT Security Professionals

You'll notice I left out pedophiles. That is because pedophiles are dumb and regularly get caught.

[–] [email protected] 6 points 6 months ago

Pedophiles are dumb enough to bring their phone in for an upgrade at T-Mobile with an SD card full of CP. That was a fun call with the cops.

[–] [email protected] 5 points 6 months ago

That is kind of the problem. Everyone else is getting scammed, their data stolen and tried to be manipulated by targeted advertising, algorithms and addictive, yet unhealthy social media platforms.

I wish it were more than the nerds who cared...

[–] [email protected] 5 points 6 months ago

I mean, the scary part of that thought is acknowledging availability heuristics. The pedophiles dumb enough to regularly get caught are the pedophiles we know about.

load more comments (1 replies)
[–] [email protected] 42 points 6 months ago* (last edited 6 months ago) (1 children)

this is exactly the sort of thing you imagine in the shower to feel good about yourself

[–] [email protected] 8 points 6 months ago

Imagining that they're hide&seek world champions because they've always won.... when playing with imaginary friends.

[–] [email protected] 30 points 6 months ago* (last edited 6 months ago) (1 children)

Like the feds would care about raiding the house because it was actually his parents’ lmao

[–] [email protected] 9 points 6 months ago

"He lives with his family, so make sure you pack the dog gun."

[–] [email protected] 17 points 6 months ago* (last edited 6 months ago) (10 children)

If you guys don't think the CIA can hack a Linux computer I've got a nice bridge you might want to purchase.

[–] [email protected] 15 points 6 months ago (1 children)

I don't want to buy the bridge, but I'm willing to donate to make the bridge open source, does that count?

[–] [email protected] 7 points 6 months ago

Is this just taxes with extra steps?

[–] [email protected] 11 points 6 months ago

Someone told me there was a bridge sale going on, am I late?

[–] [email protected] 4 points 6 months ago (1 children)

Whoa I love bridges. Which one? Where is it?

[–] [email protected] 5 points 6 months ago
load more comments (7 replies)
[–] [email protected] 15 points 6 months ago (1 children)

And his harddrive isencrypted, so raiding is kinda useless.

[–] [email protected] 21 points 6 months ago (1 children)

I don't know why but I read raiding, I thought He's RAIDing his house. So, like, one hard drive on a computer in this house, another hardrive in another computer in another house, as a RAID 0, so there is no point in raiding the house.

It's late okay. Give me a break.

load more comments (1 replies)
[–] [email protected] 11 points 6 months ago

I don't think the NSA or CIA has ever had any interests in my specific online activity, purely because the manpower is never that well utilized in our world, but in the age of automation that could all change soon.

[–] [email protected] 10 points 6 months ago

feds: proceed to kidnap and torture the VIP target described in OP post for answers

[–] [email protected] 5 points 6 months ago (13 children)

Blob free capable computers are so old though. After trying one I don't know how I survived that era without even using ssds. Before that how the hell did live with Pentium 2, 3, and 4?

[–] [email protected] 7 points 6 months ago

Some of us had to install Windows XP SP2 and 4 on these machines. I made money just sitting in a room watching progress bars.

load more comments (12 replies)
load more comments
view more: next ›