What If your threat model are NSA FBI CIA ?
What will be your privacy setup ?
What If your threat model are NSA FBI CIA ?
What will be your privacy setup ?
Phone:pixel (i don’t recommand using phone)
Phone os:graphene (i don’t recommand using phone)
Cloud: don’t use
Anything alse: get out of US
You do better than Osama Bin Laden’s opsec
Pixels belong to Google, and NSA leaked document said, they worked together with Google, under Prism project, and they have direct access to Google’s database. And if not mistaken, phone privacy is more related to hardware and firmware, rather than OS. Also Prism project is intended to put non-US citizen under surveillance, so get out of US will help, but will not solve the problem.
Do you think Tor can protect us from tracker ?
Either fingerprint based tracker, or cookies based tracker.
I think it obscures our IP and Geo-location only.
And why don’t use email, cloud, encryption software ?
I thought, some countries are trust-able in term of privacy,
for example: Panama, Canada, Switzerland, Norway, etc.
We can use their email, cloud and service.
Do you think NSA can decrypt encryption tools ?
I wonder how North Korea manage to protect its privacy, while the whole world put them under surveillance. For example: the eyes.
For pixel you should find a reseller and north korea dosn’t even have an internet and we all trust encryption tools but i don’t trust emails or clouds because you can’t trust 3rd party with your data just put them in some usb also emails leak metadata and don’t support forward secrecy so use instant messengers instead
why reseller ? to buy second hand pixel ? so Google may consider it as someone else phone ?
but after we use some apps, to communicate with people, or after we insert card, then somehow I think it will be identified as new person.
Some 3rd party clouds use end to end encryption, not trust-able ?
Umm to prevent google from knowing that you bought the phone?
Well you did said your theat models are nsafbicia so it’s better not to have your data stored somewhere
Do thay use real pgp? Like you are the only person who has the key also can i ask the name of that provider?
okay, that is actually make sense
okay, this one makes sense too, we don’t have the key, they have it.
for example: sync, tresorit, nordlocker
Maybe start with Librem Phone built in US. I truly can not afford it.
Which mentions a phone that is now several years old. I also have found that some companies continue to use the same model number for a device while changing some of the component parts.
Phone uses Android. Which some folks who are more knowledgeable than me think can be configured to be safe. But is that for Privacy, or real Security.
I have just noticed the post here. someone advocating installing Graphene OS on a Pixel phone. https://evanmccann.net/blog/snowden-smartphone Interesting, https://grapheneos.org/ I may do that myself.
Some suggest use only phones, with software like Signal or . . . .
There is a fictional book about a character who lived through these questions.
“Little Brother” by Cory Doctrow. Available free on Gutenberg. https://www.gutenberg.org/ebooks/30142
Or for purchase.
I have a problem with much security advice, in that it is dated. Someone is saying do this, and the information is old enough that some one, as time goes by, that tidbit is no longer safe.
For a computer. There is Qubes, and for single use messages, I would think of Tails Linux, with end to end encryption.
Qubes takes some time to learn how to implement and use. Qubes is more about privacy, and preventing ones OS from being insulted by Malware, Unless one does a very knowledgeable, many of hours studying, how to implement to create security.
Tails is small and run from USB flash drive. Has their own documentation on how to safely use their product. Tails uses Tor. Tor was originally written by US Navy. I read is partially funded by US Government. For use by Whistle Blowers. The maintainers of Tor, and Tails appear to be an international group who are computer competent, and not in support of any government. And I am pretty sure, do not want their project to be used to help violent people do violent things.
EasyOS is from Barry Kauler. Puppy OS Founder. Might be interesting to try. But I do not feel it is tested by a large number of people. It is more about using EasyOS and it not be penetrated by others. Not high security.
For those who are much more experienced than I, Pen Testing versions of Linux.
I would not do highly secure communications from home, as that is where your ISP can watch, or even manipulate what you do. Some might point out some highly specialized Routers meant to keep ISP out of your business. I do not know anything about that, and such Routers are not cheap.
A lot of places which offer free WiFi, have services provided by companies, like AT&T which are known associates of the NSA. And by using public WiFi, you are giving up some of your legal protections. But if you have provoked three letter agencies, then they can get a FISA Warrant for your communications. If I was a FISA judge, and some Justice department lawyer brought me a FISA warrant to sign. I would have a very low threshold to signing the warrant, because as a judge, I would choose to believe the three letter agencies are good guys who will do mean or unnecessary harm to anyone. Some folks do not believe the three letter agencies are such well meaning people of good integrity.
I suspect in this age, any cyber company would roll over if pressured by government agencies. Cyber Companies may have “Canaries,” and will adhere to their principles. Promises they have not given up their stated principles, and want to adhere to them, but when government agents come, the government has given them laws they can enforce.
I would build a personal ‘recipe book’ of how to, to keep track of what computer or phone procedures I will do in what situations. There is an old adage about breaking codes, most codes are broken in practice, not in theory. Meaning the math of encryption may be unbreakable for all reasonable purposes, but there are other ways to gain entry to you. Like your using the wrong connection at the wrong time. Beware, online advice for security procedures can be dated.
Avoid doing things to provoke the three letter agencies. Like violence, illegal behavior. is part of volunteering to be watched, and interfered with.
What I am concerned with, is; Finding a means for those who are, like Chinese Dissidents, who want to document the wrong doing of power structures. Or Hong Kong protestors, reporting on their situation.
They need a single, one time download, which includes advice about what not to do. How to be safe as well. Preferably that they could obtain from someone else trustworthy who downloaded it.
If I was advising a would be Cyber Journalist in China about trash mouthing the Chinese Government, or other power structure, like a Chinese company. “Don’t” The odds of being caught are too great. I doubt the NSA are a bunch of slouches.
This may sound creepy and weird, but if your laptop has a webcam built into the screen, cover it with tape
I would use Tails, or Void Linux. The slackware guy seriously neeeds to build a package manager but i dont think he wants to … whatev
lol…I wouldnt carry one If it’s just meta-collection avoidance - then ya im sure it would be fine to carry one… something not a smartphone
Also feel free to change your phone number on a whim. its pretty cheap to do.
About phones in general: they ping the cell phone towers much like the way some OS’s sometimes check the time via the internet lol
If you’re using a phone that allows you to take out the battery, then you can do that as well. It is not necessairly uncommon for certain ppl to take out their cell phone batteries when having a meeting that…ppl want to spy on.
lead shields/prevents phone communications. ever wonder why u dont have cell reception in elevators sometimes
either none or one that allows you to sign up via Tor
lol no , but if you need to - just encrypt it first before uploading something at least 512 bit
I would use duckduckgo.com/html or a nice searx instance, or even metager, maybe mojeek (all over tor)
lol … i think the crypo payment ppl can answer this one better
The world often tries telling ppl they need things that they truly do not need, they tend to be things or practices that spy on you. Amazing idea: pay for things in cash. Oh does your car have a GPS, wow imagine that - you can look up online who to disable it
once you go techicnolgically black, you don’t go back (?) :o
hehe one of these shapes is not like the otherssss
DO YOU THINK NSA CAN DECRYPT ENCRYPTION TOOLS ?
My impression is they can get past SSL/https and VPN/SSH connections
I would like to mention something else tho about encryption… quantum computers are advancing so… its not a great idea to rely on something less than 512-bit encryption for this reason alone
oh btw, ever wonder if anyone can hack your car ?
I WONDER NOW NORTH KOREA MANAGED TO PROTECT ITS PRIVACY:
I don’t know, BUT…if I were a dictator I would likely be doing the following:
oh and i would get a pretty box on my desk made of gold that is lined with lead inside so i can keep my cell phone in there whenever in doubt
aaaand i would also invest a lot of money into emp-based weapons to disable things like drones, planes, etc and i would be like “tehehehehe good luck outrunning an emp pulse”
anything of any importance would of course be underground and i would make sure there is a nice subway system too
As i said it in above North korea dosn’t have an internet i can confirm as a south korean
o thnx thats good to know
ya i’m not korean at all
Thank you, that’s very juicy.
To check keylogger ?
Do you have suggestion, the authenticator app name ?
If not mistaken, GPG is the standard encryption, installed by default in most Linux distro.
So, between many options, why choose this one ?
Or maybe, they all use same algorithm options ?
Suggestion so far:
Have no problem with 3 letter agencies, use them as an imaginary threat model case example only, with expectation to figure out the maximum solution for privacy and security, considering in term of technology, they may have most advanced of surveillance technology.
VPN: Ivpn but remember to sign up using tor and pay with monero
“If not mistaken, GPG is the standard encryption, installed by default in most Linux distro.
So, between many options, why choose this one ?
Or maybe, they all use same algorithm options ?”
Well GPG allows for up to I believe 4096-bit encryption with RSA. It has also been tried and tested and widely used and made by a very smart guy. (It’s good to use 4096 bit because quantum computers are advancing )
Despite certificate passing, it’s handy and convienent - you can encrypt plain text, files, etc.
I encrypt EVERYTHING lols so if there is anything better I would love to know as well.
lols, now I scared about your data.
umm, because in the most best encryption list I search, it is rarely listed as the first one.
okay, so can we conclude that the bits is more important than the algorithm ?
or maybe, choose the algorithm that can provide the most bits ?
Choose the algorithm and use the highest bit
I recall on of the features of gpg/pgp is that for communication, it has a WOT, “Web of Trust.” To help me list on my own keychain whether I trust (should trust) the Public Key from another person.
Tails Linux has some documentation written about how to use WOT.
I know that GPG/PGP has other encryption schemes, in addition to different sizes of keys. My hunch is that those who really know encryption, put their best choice first.
A site which describes the intricacies of using GPG/PGP is https://riseup.net/en in a more secure manner than some here mention. Notice the documentation on SubKeys.
riseup.net advertises to be an advocate of non-violent Anarchism, and who has rolled over to give up those on its own encrypted email server. Notice riseup does warn people. This is encrypted but.
I think it has been mentioned that some believe that a USB fob be used to create Key. I am thinking this is using (something similar to) NitroKey. Rather than use the "Randomize r on the Mobo, which is usually tied to a corporate made Chip, like Intel. Meaning it is not obvious to me what Intel might have done, whereas Nitro Key seems reviewed by a lot of Security Experts. To be fair, I don’t see Security Experts who criticize the Randomization function of the Intel chip. I could be wrong, anyone know better.
I am curious about the statement’ North Korea does not have internet. I had thought the ordinary North Korean does not have Internet. The North Korean government does, and has some hackers working for the government.
Insofar as Lenovo being suspect for allowing their computers to be pawns to the Chinese government.
Other texts suggesting that the only thing Lenovo did wrong was to allow a bit of Spyware onto their system, which has since been removed. That the Bloomberg story was wrong. ? Or referring to a different incident/story?
Also some story about Servers having spy chips added.
If you want to hide your cell phone from being seen, besides pulling the battery, you can buy an EMP electrostatic bags. Might be better or worse that a “Potato Chip” bag like was used in the movie “Enemy of the State.”
I am a fan of nested Encryption folders/discs on hard drive. Such as, the hard drive is encrypted, then Documents has a folder which is Encrypted, and inside that I have groupings like my record of communications with the “Big Giant Head,” And my clandestine communique with the Martians. (I think the “Big Giant Head” may have a dispute with the Martians, best they don’t know I talk to the other.)
In the early 2000’s , US television rumored that when Terrorists came to US, they communicated to their handlers overseas by logging into a website group chat, like say, knitting. and sent innocuous looking phrases that had special meaning - meaning.
I am sure I am inaccurate in some of what I posted. Please keep others from believing me.
I do not advocate the internet be used to try and create harm to ordinary people, and by extension, legitimate government. I do advocate that individuals, such as college students be able to do things like create ideas which can be profitable, and should be profitable to the one person who created the idea. And to be prepared to keep the ideas of the companies they work for in the future to the value and use of the company. So Encrypt Away.
Oh just found this: https://www.schneier.com/blog/archives/2013/09/surreptitiously.html
Which bottom lines to the Intel processor Randomizer used by, I thought GPG/PGP, has been reduced to 32 bits. Maybe I better get all the coins out of the couch to buy a USB tool that does Randomization for me.
is the following annoying?
-----BEGIN PGP PUBLIC KEY BLOCK-----
-----END PGP PUBLIC KEY BLOCK-----