ccluster[a / b / biz / c / co / g / gg / global / k / lit / Movies / mu / nsa / pc / pol / sci / toon / tv / x]

Tutelary Technology - /nsa/[Catalog][Board FAQ]

[New Thread]
[?]

OT

TopBottom
Image Thumbnail

1. Posts must be related to the preservation of ones technological security and privacy to remain on-topic 2. [citation needed] To be taken seriously always cite a statement or prove with the tools of reason! 3. Along side digital; political, philisophical and physical based discussion of safety is encouraged

>>

Firefox security addons: https://addons.mozilla.org/en-GB/firefox/extensions/privacy-security/ Note: Many of these addon functions can be covered with about:config changes Firefox privacy and security about:config lists: http://kb.mozillazine.org/About:config_entries#Security. http://kb.mozillazine.org/About:config_entries#Privacy. VPN service: https://disconnect.me/ Security and Privacy apps for mobile phones: https://guardianproject.info/ Open source network protocol: http://openbts.org/ Open source hardware and software web server: https://wiki.debian.org/FreedomBox Opensource lightweight software: http://suckless.org/ Recommended systems for a full open source environment: http://www.fsf.org/resources/hw/systems



Media deleted

Let's have Tor Thread Post links that still work. Torch: Tor Search Engine http://xmh57jrzrnw6insl.onion/ DuckDuckGo http://3g2upl4pq6kufc4m.onion/ The Hidden Wiki http://wikitjerrta4qgz4.onion/ TorChan zw3crggtadila2sg.onion/imageboard/ Imperial Library http://xfmro77i3lixucja.onion/ Sigaint http://sigaintevyh2rzvw.onion/mail/ Library(Good stuff) http://3cpleimu2getp5q7.onion/library/ Shells http://jq77mc73wz5wuawt.onion/ The Tin Hat | Privacy Guides and Tutorials http://qza32xuddl3guikc.onion/index.html TorFlix http://jl4m7ubpotnu2yos.onion/ Mail2Tor http://mail2tor2zyjdctd.onion/ The Secret Story Archive http://tssa3saypkimmkcy.onion/ OnionDir http://auutwvpt2zktxwng.onion/?cat=6 :3

55 replies and 2 media omitted.
>>

http://xydkgrfx7emqt2gv.onion/ >good site

>>

>>4373 >(temp off time UTC 5am-5pm) >Time of work all time, except UTC 5am-5pm temp off(work only for DONATERS).

>>

>>4373 >XXXPTHC Gallery Get the fuck outta here pedo.

>>

>>4386 Not spam.

>>

>>4387 But it links directly to CP galleries. And they're accessible right now.



Image Thumbnail

Am I fucked?

6 replies and 0 media omitted.
>>

>>4170 tails spoofs browser and system information by default

>>

fucked for being an innocent TAILS user? hehe check this out btw: https://heads.dyne.org

>>

>>4169 Not true. If the security settings are set to High there is very limited fingerprint surface, even if an external addon is used. Medium or Low equals owned, that's the why javascript must be disabled always.

>>

>>4166 RIP



Image Thumbnail

https://www.rt.com/viral/382080-nightskies-cia-infiltrate-iphone/ >WikiLeaks has revealed the CIA’s alleged ability to infiltrate and control iPhones through a tool called NightSkies, which is physically installed onto factory fresh iPhones and allows the CIA to monitor and download files from targets’ phones undetected. Good night sweet prince His company is finished

8 replies and 2 media omitted.
>>

>>4195 >everyone has something that they wish to hide. But they do nothing, they're the reason we've reached this point.

>>

>>4197 Because they don't understand.

>>

>>4198 That's not even an excuse, nothing is stopping them from learning.

>>
Image Thumbnail

>>4200 Yes there is. It's normally right in their fucking faces.

>>

Ther to lazy to care



Image Thumbnail

"Republicans are about to let telecoms sell your internet browsing history — for your ‘protection’" >Sen. Jeff Flake (R-AZ) introduced S.J.Res 34, which would expand the Congressional Review Act to strip away privacy protections established in October by the Federal Communications Commission with broad bipartisan support, reported Privacy News Online. >Flake’s bill, which has gained more than 20 Republican co-sponsors, would allow lawmakers to repeal Obama-era privacy rules by a simple majority vote in the House and Senate and would prevent the FCC from establishing similar regulations in the future. >The rules passed last year prohibit internet providers such as Comcast and Verizon from collecting and selling virtually any subscriber data, including browser history and app usage, without prior user permission. http://www.rawstory.com/2017/03/republicans-are-about-to-let-telecoms-sell-your-internet-browsing-history-for-your-protection/

>>

>>4173 Whole internet must be encrypted it is the only way

>>

>>4173 >these fucks can easily repeal Obama-era privacy rules but cant do anything about Obamacare even though they had years to think of a plan



Image Thumbnail
>>

can we do a keyword search inside all these doc. from vault7 ? are they avlbl to us ?

>>

its the first day of spring , BTW



Image Thumbnail

Two things: 1. For someone new to Linux who is accustomed to Windows, what's the best way to start getting familiar with it. Either a linux install on a standalone machine or a good version to use on VM to learn it. I got a copy of Zorin 11, is that a good version to start out in a familiar environment and learn as you go? Is there any guide that gives a side by side comparison, so you can understand what's closest to the Linux equivalent of what you're familiar with in Windows? (device manager, updating, etc). 2. For machines that you can't get away from Windows on just yet (setting up machines for friends or family, gaming rig, etc), how best to manage privacy? To start with, use either 7 or 8.1 (no 10) and remove the telemetry updates? After that, any preferred apps to use and to stay away from (eg using Firefox not Chrome)?

>>
>>

Zorin is good, so is Ubuntu (or Xubuntu). Learn how to use info(1) to learn more. Get to know the GNU core utils. Learn how to write small programs (like loops for renaming). Get to know cryptsetup(1) for security. Join the Linux community. linuxquestions.org is a good place to start. I'm using Linux Mint at the moment and it's as intuitive as you might want. Most distributions these days are. (Zorin among them.)

>>

>>4154 >Outlander >replying to a year old thread I like xubuntu, its my first dive into linux. I dual booted my win vista laptop with it a year ago. I only use windows because I can't get the dual display to work on xubuntu 14.04. I've been thinking of getting a ssd for my 7yo laptop and trying ver 16.04

>>

Ubuntu and its forks are ass. They are not worst than Windows but they are not trustful at all. Hardened Gentoo & OpenBSD are really secure, all the people should be using them. Other distros to study are Alpine, Qubes & OpenIndiana. Most of the secure distros aren't begginer-friendly, but you will learn a lot.



Image Thumbnail

opinions on https://traceless.me/ as a service? anyone had experience with speed limits of the subscribed service. Also general BitX discussion thread



Image Thumbnail
Thread was moved to Off Topic

https://wikileaks.org/tpp-ip3/WikiLeaks-TPP-IP-Chapter/WikiLeaks-TPP-IP-Chapter-051015.pdf?t=dXNlcmlkPTU0MjUyMDgxLGVtYWlsaWQ9MTAwMzA= Last week, WikiLeaks released the final text of the TPP’s intellectual property rights chapter and it is absolutely terrifying. These are just a few of its most dangerous pieces: >Compel ISPs to take down websites without any sort of court order, just like SOPA. (Appendix Section I) >Extend the US’s copyright regime to require copyrights stand for life plus 70 years, preventing anyone from using works that belong in the public domain. (Article QQ.G.6) >Criminalize whistleblowing by extending trade secrets laws without any mandatory exemptions for whistleblowers or investigative journalists. (QQ.H.8) >End anonymity online by forcing every domain name to be associated with a real name and address. (Article QQ.C.12) >Make it illegal to unlock, modify, or generally tinker with a device you own. (Article QQ.G.10) >Export the US’s broken copyright policies to the rest of the world without expanding any of the free speech protections, like fair use. (Article QQ.G.17)

>>

>>3083 bump

>>
Image Thumbnail

holy fuck

>>

>>3083 holy shit

>>

Trump killed TPP

>>

>wikileaks Y'all co'ws thet lied tawk a boot givan awee freedom. You can all blame yourselves. Submitted. Going out of your way to justify bullshit that sets up others as the good guys. Don't like it. Don't spread it. Don't say it is a part of you or what you like. Govt is shit. A herd of parasites that confine others in order for themselves to seem superior to themselves. It has nothing to do with anything good. Exploitation is the same thing. Journalists are the same thing. Exceptions are precious, largely comprised of hope. Like little characters, mass produced and thrown away. They deserve better and they are the truth, Something good. Maintaining that isn't a witch hunt, it's an effort for what is joined to such to be nice, proving that truth and making it important. The wrong thing is obvious, abundant. Shouldn't matter and is nothing against what does. Traitors try to remove beauty, put it up again. They do it to make it seem as if from them. Like all religion. Those who comply to avoid being victimised further such. If you want to talk about something by bad, because your faggot ass wants to be on the winning team, remember what little had faith in you and do something for them instead they might like to be a part of. If the bad guys appeal to you as a good guy you should see that as true and do what you can so their attempt at existence isn't hopeless.



Image Thumbnail
>>

>for iOS



Image Thumbnail

Assange and wikileaks has been compromised. The insurance files released on the 14th November do not match SHA-256 hashes tweeted in October. This is shortly after many Podesta and Hillary emails disappeared from the leaks.

>>
Image Thumbnail

>>4136 TOR is also possible compromised but there's no way to prove it is or it isnt

>>

ROFL

>>

>>4137 If TOR exit relays are compromised, how can I be tracked? What about the entry guard and the middle relay? What about encryption? If it is indeed compromised, what can we use to talk securely using a website or group chat?

>>

>>4137 >global pedophile ring Come on. I mean, there is definitely some pedo shit going on with the higher ups, but the way this is worded makes it sound like the world is controlled by pedos. Also, tries to make the NSA sound better. As though the only reason Snowden leaked info was to help the CIA. Discredit Snowden, and you make the NSA sound a bit better. If that were true though, I'd expect that the powers to be would work hard to shut down the NSA, NOT support it and say how Snowden needed to be killed by a drone strike. Hard to say what could prove this guy correct though (short of say, Assange reappearing and confirming it...even then he could be compromised). NSA and CIA struggling is not really surprising, so that wouldn't prove anything. Everyone already knows that the FBI is involved in drugs. So the pedo info would need to come out. Not entirely sure it would collapse governments though.



Media deleted

Is full virtualization the future?



Media deleted

>The cypherpunk revolution >How the tech vanguard turned public-key cryptography into one of the most potent political ideas of the 21st century. http://passcode.csmonitor.com/cypherpunk



Media deleted


Media deleted

I just updated to Tor 6.0.5 >pic related It says * Update Firefox to 45.4.0esr There are a few pages of vulnerabilities for that version of Firefox. How secure can tor be?

3 replies and 3 media omitted.
>>
>>
Media deleted

https://blog.torproject.org/category/tags/tbb-60 Tor Browser 6.0.5 is now available from the Tor Browser Project page and also from our distribution directory. This release features important security updates to Firefox including the recently disclosed extension update vulnerability. All users should upgrade as soon as possible. That vulnerability allows an attacker who is able to obtain a valid certificate for addons.mozilla.org to impersonate Mozilla's servers and to deliver a malicious extension update, e.g. for NoScript. This could lead to arbitrary code execution. Moreover, other built-in certificate pinnings are affected as well. Obtaining such a certificate is not an easy task, but it's within reach of powerful adversaries (e.g. nation states). Thanks to everyone who helped investigating this bug and getting a bugfix release out as fast as possible. We are currently building the alpha and hardened bundles (6.5a3 and 6.5a3-hardened) that will contain the fix for alpha/hardened channel users. We expect them to get released at the beginning of next week. Until then users are strongly encouraged to use Tor Browser 6.0.5. Apart from fixing Firefox vulnerabilities this release comes with a new Tor stable version (0.2.8.7), an updated HTTPS-Everywhere (5.2.4), and fixes minor bugs.

>>
Media deleted

Unrelated, but that page looks really cool in full screen..

>>
Image Thumbnail

http://seclists.org/dailydave/2016/q3/51 So the prior version of TOR was completely unsecured, and anyone using it could have reviled their IP with all their activities done while using tor logged.... Firefox uses its own static key pinning method for it's own Mozilla certs instead of using HPKP. The enforcement of the static method appears to be much weaker than the HPKP method and is flawed to the point that it is bypassable in this attack scenario. The bug appears to be fixed as of the September 4th nightly build of Firefox but is obviously still unpatched in both the current production versions of Firefox and Tor Browser. I'm posting about this publicly now instead of waiting because @movrcx's post still shows how to take advantage of these flaws even if it doesn't describe (and he didn't know at the time) exactly how and why it bypassed certificate pinning.



Media deleted
>>

>>4107 notice how so many of them are DC FeelsGoodMan

>>

Any super hero that doesn't know how to protect him/herself on the web is going to be outted faster then Rolf Harris. It's a fun add but I wouldn't trust it.

>>

Hit Girl is my fave!



Media deleted

our favorite coder gurl is back

>>
Media deleted

>>4096 fuck off. Kristen Titus is the ultimate gurl coder.

>>

I sit in on a few programming classes in uni. Her work seems like an assignment from intro to programming. I don't even know what the male program means but hers seems to be totally different. Maybe she should post one of the same type as hers instead of comparing apples to oranges.



Media deleted

>Lepton image compression: saving 22% losslessly from images at 15MB/s what's the point in losslessly encoding jpgs... source: https://blogs.dropbox.com/tech/2016/07/lepton-image-compression-saving-22-losslessly-from-images-at-15mbs/

>>

very cool savage little loli, more of her. shes like something from the tiny lotus cult place

>>

so cute

>>

do you know her name?



Media deleted
Thread was moved to Off Topic

hai check out /tech/ on librechan https://librechan.net/tech posting on Tor without Anonymous Accounts!

>>

>>4092 >on topic

>>

>>4092 >Libre advertisement They need more CP thus they want ppl to get there