[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y ] [Home]
4chanarchives logo
FUCKO THREAD / General Security
Images are sometimes not shown due to bandwidth/network limitations. Refreshing the page usually helps.

You are currently reading a thread in /g/ - Technology

Thread replies: 159
Thread images: 27
File: fucko.jpg (24 KB, 368x411) Image search: [Google]
fucko.jpg
24 KB, 368x411
> Fuckos bust door down
> 3 seconds before they restrain you
> Why are you not fucked three ways to Sunday?
>>
>implying anyone here knows shit about infosec including the people who "studied infosec in an university"
>>
>>46837309
> tfw I have the basic ability to encrypt my fucking hard drive
>>
> Why are you not fucked three ways to Sunday?
might as well try to take one of them with me
>>
>>46837387
I've never actually spoken to someone who knows more than me about it, and I don't know much about it.
>>
>>46837408
try ##security on freenode. They'll push your shit in
>>
>>46837414
>irc

Fucking nerd.
>>
>>46837408
Now you have. How can I help you?
>>
>>46837414
>##security
So we're basically baiting this whole thread? I'm in
>>
>>46837414
But freenode makes me disable my vpn
>>
>>46837309
>Fuckos bust door down

but you are the fucko op...
>>
>>46837454
If I have full disk encryption and run dban on them what percentage until I'm moderately safe; got any infographics?
>>
Because I have an auto ctrl alt delete bound to nuke my pc
>>
>>46837462
that's the spirit!
>>
>>46837489
>pc crashes
>press ctrl alt delete out of habit
>lose everything
>>
>>46837474
I don't fully understand your question.

So I'm correct, you have FDE and you're running DBAN and you want to know how far DBAN needs to get before the data is unrecoverable?
>>
>>46837505
> implying that someone who went through the effort to make this happen did it on Windoze
>>
File: chip.jpg (48 KB, 541x498) Image search: [Google]
chip.jpg
48 KB, 541x498
>>46837505
>habit
I've been on debian for 4 years now anon
>>
>>46837518
Nah, he's saying he has DBAN as a cron job and is wondering when he gets his social security because he is quite clearly retarded
>>
>>46837518
Yeah and you got any general tips? (windows)
>>
I have the door to my room lined with powerful electromagnets. If they come, I hit the switch to turn the magnets on. They try to carry my harddrives through the door, poof, all the data gone.
>>
>>46837550
> 2015
> not using SSDs
Ok, kid
>>
File: pat.png (128 KB, 308x308) Image search: [Google]
pat.png
128 KB, 308x308
> let's talk about our anti-fed setups online
>>
I'd probably die of a heart attack because of my severe morbid obesity just at the shock
>>
>>46837542

There is no known instance of recovering unencrypted data from a hard drive that has been "zero passed" ONCE. So please don't do that 35 pass tinfoil hat bullshit, it takes forever, it rapes your disk, and no one can prove it's useful in reality. So encrypted or not, once you've zero passed a drive your data is gone.

Recovery of partially destroyed encrypted data can be tricky. But the specifics of your question depend on the encryption implementation.

Let's look at Truecrypt(therefore it's forks too)

Truecrypt will let you change the password to a volume without needing to re-encrypt the entire volume. It does this by generating it's own "volume key" and then applying your password to the volume key instead of to the drive directly. Volume key destroyed = data unrecoverable.
>>
>>46837682
Thanks
>>
File: lynch.jpg (15 KB, 360x240) Image search: [Google]
lynch.jpg
15 KB, 360x240
>>46837682
> reasonable response
> still a namefag
>>
File: filgun.jpg (827 KB, 1800x1200) Image search: [Google]
filgun.jpg
827 KB, 1800x1200
lol
>>
>>46837733
timestamp or get the fuck out
>>
>>46837743
>timestamp
>burt
back to >>>/a/ with you
>>
>>46837729
I'm a tripfag in this case. I usually post anonymously, only when I feel it would be beneficial to everyone to be able to keep track of various posts through a thread do I apply a trip.
>>
File: 1424094900030.jpg (41 KB, 512x384) Image search: [Google]
1424094900030.jpg
41 KB, 512x384
>>46837861

stop trying to build a fucking brand. this isnt your fucking blog
>>
>>46837682
Except Truecrypt isn't safe anymore. They website even says it's not secure anymore.
>>
>>46837691

http://istruecryptauditedyet.com/
Also remember that Truecrypt has NOT been fully audited yet. Phase 1 of the audit is done, phase 2 is the nitty gritty.

http://threatpost.com/so-far-so-good-for-truecrypt-initial-audit-phase-turns-up-no-backdoors/105433

>The first phase of the audit focused on the TrueCrypt bootloader and Windows kernel driver; architecture and code reviews were performed, as well as penetration tests including fuzzing interfaces, said Kenneth White, senior security engineer at Social & Scientific Systems.
>The second phase of the audit will look at whether the various encryption cipher suites, random number generators and critical key algorithms have been implemented correctly.

Algorithms like AES are solid. The math behind it is good. Problems arise when people program implementations of the AES algorithm.

It is important to remember that the actual encryption algorithm is only one piece to a secure cryptographic framework. The NSA doesn't like going directly at an algorithm like AES because it is a losing game. They will do something like poison the random number generator that feeds the encryption algorithm, they will intercept device shipments for firmware level implants, blah blah.

>>46837946
I started typing this before you started typing that. We don't know why they closed the project, they said there are issues with their code and recommended bitlocker. Truecrypt is still being audited. The reason they're choosing to finish the audit with Truecrypt is because it will be easier to translate that into Truecrypt-forks than start with a fork.
>>
File: 1415658866251.jpg (66 KB, 600x525) Image search: [Google]
1415658866251.jpg
66 KB, 600x525
I'm a 37 year old kissless virgin. I literally have nothing to lose. What do you think will happen?
>>
>>46837987
Thanks a ton, but I'm currently using dick cryptor (better benchmarks on SSDs)

http://blog.alexou.net/?truecrypt-vs-diskcryptor-on-ssd-windows-7-fd
>>
>>46838013
I'm not too familiar with that product. I was only using Truecrypt as a base in my examples because everyone knows it. Most of my examples like applying your password to a volume key which is then applied to a drive are easily translatable to how other platforms work.
>>
>>46837990
The only truthful /g/ reply.
>>
>>46837987
Bitlocker's file containers are too complicated, I don't really have to switch from truecrypt do I?
>>
I dont know what I get shit for though.
Pirated software? Mixed with software provided by the school? Music mixed with my own music rips?
>>
>>46838032
Oh thanks, glad it'll apply. one final question I only use FDE to protect from people actually stealing my PC not really too bothered about the government getting it. so will this be good against the average criminal?
>>
>>46838069
Definitely. As long as you don't do something stupid like store the key in the clear on the drive, I don't think any criminal can break that...unless they use rubber hose cryptanalysis
>>
>>46837462
>vpn
>>
>>46837534
Can I have that image of her making that face with the rest of her body?
>>
>>46838063
I don't know. The claimed weaknesses in the Truecrypt code is only known to the developers of the project if those weaknesses actually exist and it wasn't an excuse to close the project.

Just pay attention to the Truecrypt audit. Once a fork like Veracrypt has been standing awhile feel free to switch if you like how Truecrypt was laid out.

>>46838069
Yes. To build on what was said here
>>46838094
You probably also want to require a password to unlock the operating system in use and then a short idle time to lock. They will be able to use it if they steal it in an unlocked state.
>>
okay can anyone explain to me briefly what does hard drive backdoors mean?
How can government still spy when the drive is encrypted, i mean the data is encrypted, its not readable unless you apply a particular decryption algorithm with a specific key??
Just what IS this harddrive backdoor and what can the NSA do with it?
>>
>>46838201
http://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/
>>
>>46838215
beat me to it, security wizard
>>
>>46838159
Here's a screenshot of disk cyptor, it has a feature so you can setup a keybind (ctrl alt shift or whatever) to blue screen you, guessing it's for if you get raided
>>
>>46837309
>why are you not fucked 3 ways Sunday
I keep all my "questionable content" on a micro USB that I can just swallow in the case of a raid.
>>
>>46838201
If there's a backdoor on your HDD then little NSA fairies can open it and walk inside your hard drive to steal your data without you noticing.
>>
>>46838227
I wouldn't be surprised if they check your poo the first couple days after such a high profile arrest
>>
>>46838263
Wouldn't stomach acid destroy a microSD?
>>
>>46838215
>http://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/

>israel has to be behind this, I mean look at the targets
>>
>>46838281
I dunno. If that's your trump card to avoid spending time in prison, I'd test it out.
>>
>>46838281
No it would still be pretty much readable, stomach acid that is HCl does not dissolve playstic.
Better if you chew it to bits, that'll make it impossible to read
>>
>>46838263
>use bathroom
>grab USB from poo
>stomp and grind
>or just reswallow it
>may not even be readable to to stomach acids
>may not come out at all
>they most likely wouldn't even check your shit,it's a computer crime bust.Not a smuggling ring
>>
>>46838364
>implying USB's are 100% plastic
Anon,you might be stupid
>>
>>46838371
It depends what you're hiding on the card, tbh. If they're raiding you with a SWAT team you're probably in some deep shit.
>>
>>46838407
Woulden't swallow that shit, eating plastic doesn't sound like a good idea. I'd just smash it
>>
>>46838407
No anon i was talking about micro sd cards, and its better if you chew them to bits than ingesting them
>>
I don't have anything illegal on my computer.
>>
>>46838454
this guy
>>
>>46838433
Still don't think they'd check feces
>>46838436
>>46838440
That leaves evidence behind.Leaving evidence that I destroyed something would not look good on me.Swallowing it,or leaving it hid in my drywall is the best way.
>>
Because I have nothing to hide :^)
>>
File: smbc-nothing-to-hide.gif (167 KB, 612x1593) Image search: [Google]
smbc-nothing-to-hide.gif
167 KB, 612x1593
>>46838511
get educated nigger
>>
>>46838281
It's only fairly weak and dilute HCL. Pepsin does most of the work, the HCL is just to give an acid environment that pepsin can functionally ideally in.
>>
>>46838511
I'm sure you don't want everyone hearing about your furry collection anon :^>
>>
File: 41466610.jpg (786 KB, 900x900) Image search: [Google]
41466610.jpg
786 KB, 900x900
>>46838537
>HCL
HCl*
What the hell is wrong with me today.
>>
>>46838492
People swallow evidence all the time though. They must have some procedure for trying to recover it.
>>
>>46838511
>>46838454
I really hate you people.
You choose to live in your own comfort zone by thinking that if you dont have anything illegal, you dont need to worry about government spying.
Let me tell you, regardless of if you have something illegal or not, the government will spy on you. They dont choose to magically spy when you have illegal content but they spy all the time. So unless you want your diary to be read, bank details leaked, you fiance/girlfriend's nudes leaked, your family pictures ending up as fap material for NSA employees, you better watch out.
Moreover, wouldn't improving you security protect you from virtually all other malwares? There's literally no reason to not have a high level of privacy and security on your machine.
Bait or not, i took it
>>
>>46837924
Dude shut the fuck up, its fine if someone trips considering he's one of the only decent posters in this thread
>>
>>46838625
I love you
>>
>>46838622
People don't tend to swallow evidence in a computer raid.If I was like a drug dealer on the other hand,they probably would. Worst case scenario I get a finger up my ass.
>>
>>46837309
i dont keep secrets on my computer
>>
>>46837309

> because even if im not home my computer is locked and drives encrypted.

Literally don't have to do anything, so what ever happens next is just for kicks and a good story.

> if i was home
> hit kill switch
> dd/shred script to take care of the headers

Have the option of doing nothing and asking them how they take their tea, or doing nothing and making a scene. I win either way.
>>
>>46838724
If you swallowed drugs wouldn't they notice you tripping?
>>
>>46837309
>police bust in
>yank out powercord
>they slam me to the ground and cuff me
>"AM I BEING DETAINED?"
>"AM I UNDER ARREST?"
>"AM I BEING DETAINED?"
>"I DON'T HAVE TO GIVE YOU MY NAME"
>"AM I FREE TO GO?"
>They let me go for being an annoying little shithead
>>
>>46838625
Nah. Those sorts aren't unaware they're being watched, it's more that they're perfectly aware and simply choose not to care under the false belief that if they aren't doing anything defined as wrong, nothing bad will happen to them. They believe they are living within a grand screening filter, that's protecting them, the children, and their family. Or something.

It's a naive idea, and a myopic one, The reality is that they choose to look at it in a limited sense, ie, refusing to put 2 and 2 together, because they know they can't do anything about it. They feel anxiety and choose to get rid of it. There might also be an element of them just, for whatever reasons, simply lacking the mental faculty to think in such a way. People walk by cameras everywhere, all the time, every day, and they don't even think about it. Because it's detached, they think they know its purpose and likely use. Yet run up to them with a camera, start filming, they'll freak out. They've been met with what they think is greater ambiguity. Again, a naive idea.

If you offered to install cameras all throughout their house and claimed you'd only check em on a random whim, or when they've done something wrong, most people would object. Yet it's no different. They don't like being watched in the bathroom. Why not? Ain't doin' anythin' wrong, are ya? What, you just like a bit of... oh, there's that word again, privacy. And yet in the same breath they'll say they don't care about the government and various corporate bodies having information that allows them to build extremely accurate psyche profiles. Where they go. Who they know. What they say, what they DON'T say, and when. Who those people know, their social circles. What stress them, how to push them, where they'll break, their constant location even. Everything down to what to something as basic as when they sleep and what they jerk it to. Yet a stranger on the street taking pictur
>>
>>46838832
es is someone more invasive, threatening, and meaningful. Because it's direct. Nothing more, nothing less. They refuse to see a bigger picture and weight ambiguous ideas with any kind of accuracy.

I've also begun to think about it from an evolutionary perspective. Are some people perhaps hardwired with an affinity towards faith in authority? Towards mindlessness? Is it not a function of upbringing, environment, or whatever, at all? Perhaps some people really are born to be followers. Perhaps this can be correlated with muscle ratios, I imagine those who's ancestors developed slow twitch fibers would have developed those sort of complex hierarchies. Whereas the relatively crippling, inefficient, and food source limiting nature of high ratios of fast twitch, would have necessitated high individual intelligence and perception. That's just an idea fermenting... I try to push such thoughts out of my own mind, and not take it too far. Hypocritical in a way.

Either way. You can't always know what's "wrong" and to who. You can be set up. You can be manipulated. They can know where to find you and how to break you. There are any number of ways that being spied on for some delusional collectivist greater good is an awful thing to blindly accept. These morons are going to drag everyone else down with them, it's already nearly a 1:1 Orwellian society If you want to look at it through that lens.
>>
File: Demoniuskatana.gif (959 KB, 250x188) Image search: [Google]
Demoniuskatana.gif
959 KB, 250x188
>>46837309
nippon steel
>>
>>46838911
gave ur mum my nippon steel.
>>
>>46838832
>>46838889
Beautifully said. I've been trying to articulate this for a while, and you worded it perfectly
>>
>>46837733
No AP no life.
>>
>>46838785
Are you baiting anon?
>drugs kept in plastic baggies or condoms anon
>>
>>46839028
Wouldn't stomach acid go through the plastic bags?
>>
>>46839061
Alright,yeah,b8
>>
>>46839061
not condoms. source: prison movies

they can burst and fuck up your week though. source: some documentary on airports
>>
>>46839061
Went into this above. Stomach is actually quite weak.

>>46838537
>>
>>46839094
>>46839108
Thanks
>>
>>46839108
Stomach acid*
I half expect to leave a word out in the statement correcting my initial one, despite the fact that I should be more rigidly running checks on my preparser / post processing functions as a result of being aware of the possibility of further fucked sentences.
>>
>>46839146
at work i have a label in all caps saying PROOF READ on my monitor
>>
>>46837733

thnx for the serial #'s
>>
>>46837309
One hard drive in my laptop which I will smash with my fist because it is a shitty Seagate.
Encrypted backups out of the country.
>>
File: smule.gif (2 MB, 260x229) Image search: [Google]
smule.gif
2 MB, 260x229
>>46837309
>> Why are you not fucked three ways to Sunday?
>Be white.

Also
No cheese pizza. Nothing too crazy besides maybe one or two torrented movies and chinese cartoons. No previous arrests, serious violations or complaints of any kind.
Show DoD badge.
Probably free to go. If not, call close relative who owns and operates a law firm. kek all the way to the bank.
>>
>>46837309
I have nothing illegal in my possession, or on my computing devices (or in the cloud). They probably got the wrong address.
>>
>>46839382
Timestamp'd pic of DoD badge
>>
File: gaf.jpg (338 KB, 804x1208) Image search: [Google]
gaf.jpg
338 KB, 804x1208
>>46839523
Delivered. :^)
>>
>>46839656
OH SHIT
>>
>>46839656
what's it like
>>
File: 1330627752333.jpg (12 KB, 385x278) Image search: [Google]
1330627752333.jpg
12 KB, 385x278
>>46837733
Nice airshit.
>>
>>46837309
disk encryption
magnets inside door frame
thermite underneath tower


is what I would do with an extra grand randomly lying around ( i actually have no idea how much powerful enough magnets would cost, nor thermite, but I'm assuming $1k USD would cover it)
but I do/have nothing of interest except torrenting a movie here or there so I'm an unlikely target
>>
>>46837309
Nice try NSA
>>
>>46837987
Aren't you the same asshat who shills IPv6?
>>
>>46839854
You can make thermite yourself. Also put it on top of the drives, not under.
>>
>>46837309
>BIOS password
>encrypted SSD
>just drop battery out of laptop and I'm good
>>
File: akg master race.jpg (1 MB, 1632x1224) Image search: [Google]
akg master race.jpg
1 MB, 1632x1224
>>
>>46840027
What is there to "shill" about IPv6?
>>
>>46839427
this has happened more than once, even with police-level raids. People fucking died

>>46839236
Do you use a service for backups or do you just have a remove server?
>>
>>46839656
op why
>>
>>46837309
How viable is this?
>somehow set 2 passwords.
>one unlocks the pc, the other triggers format/turns fans off to blow up termite/ect
>nigger safety agents come in
>ill give you the password m9 dont shoot
>give them the kill password
>no loli for obongo
>>
>>46840623
Not very viable. The disk is cloned with a write blocker before it's touched. They know a duress password is a thing. Using it in that context is a very bad choice.
>>
>>46840623
Top kek. They seize your shit first and ask questions later. No dice
>>
>>46840623
>>46840648
However, there is another type of duress password that can unlock a different portion of the system. A deniable filesystem. Those work.
>>
>>46840648
>They know a duress password is a thing.
But what if they're nihilistic sollipsists?
>>
>>46840648
do write blockers bypass firmware if it's an SSD? If not, can't you just trigger something in the firmware to b0rk your shit?
>>
>>46840648
Also see page 2 of this. Really cool
http://jarmoc.com/pocorgtfo/pocorgtfo00.pdf
>>
>>46840708
No. They do not bypass the firmware on the device, HDD or SSD.

But the paper linked here might give you more insight
>>46840717
This paper looks interesting. I'll have to sit down when I can absorb it sometime, thank you for sharing.
>>
>>46840708
don't think so, you'd need custom firmware
>>
File: 1409085221829.png (599 KB, 922x730) Image search: [Google]
1409085221829.png
599 KB, 922x730
>>46838832

Jesus Christ, get over yourself.
>>
File: G161Sp5.gif (351 KB, 500x312) Image search: [Google]
G161Sp5.gif
351 KB, 500x312
>>46837682

>There is no known instance of recovering unencrypted data from a hard drive that has been "zero passed" ONCE
>http://cdn.cs50.net/2014/fall/psets/4/garfinkel.pdf

>" As Gutmann explains, when a computer attempts to write a one or a zero to disk, the media records it as such, but the actual effect is closer to obtaining 1.05 when one overwrites
with a one and 0.95 when a one overwrites a zero. Although normal disk circuitry will read both values as ones, “using specialized circuitry it is possible to work out what previous ‘layers’ contained.”"

Improbable, but not impossible, anon.
>>
File: 1424292935690.jpg (136 KB, 500x500) Image search: [Google]
1424292935690.jpg
136 KB, 500x500
>>46840808
Give me something with some substance, show me my errors, and maybe I will.

"Get over yourself" doesn't cut it.
>>
>>46840850
He didn't say it was impossible. He was just saying that if it's that fucking tough to recover a 1-pass, then it's obvious that 35 is way overboard. I'd go with 3 random passes. I doubt the NSA could recover that at that point
>>
>>46840850
which only brings us back to the multi-pass zero write as the best bet
>>
>>46840850
Find me one person that has actually done it, then. I'll wait. Take your time.

Don't quote Gutmann to me. I brought up why a 35 pass wipe was bullshit for this reason specifically. Did you know most of the passes in the Gutmann wipe are designed to flip the bits in MFM/RLL encoded disks, which is an encoding that modern hard disks do NOT use? No, you didn't know that.


//In the time since this paper was published, some people have treated the 35-pass overwrite technique described in it more as a kind of voodoo incantation to banish evil spirits than the result of a technical analysis of drive encoding techniques. As a result, they advocate applying the voodoo to PRML and EPRML drives even though it will have no more effect than a simple scrubbing with random data. In fact performing the full 35-pass overwrite is pointless for any drive since it targets a blend of scenarios involving all types of (normally-used) encoding technology, which covers everything back to 30+-year-old MFM methods (if you don't understand that statement, re-read the paper). If you're using a drive which uses encoding technology X, you only need to perform the passes specific to X, and you never need to perform all 35 passes. For any modern PRML/EPRML drive, a few passes of random scrubbing is the best you can do. As the paper says, "A good scrubbing with random data will do about as well as can be expected". This was true in 1996, and is still true now.\\

— Peter Gutmann, Secure Deletion of Data from Magnetic and Solid-State Memory, University of Auckland Department of Computer Science.

Hard drive platters are hitting 1TB per square inch. Go over it with an electron microscope if you want. Maybe you'll find what you're looking for in 15 years.
>>
>>46840953
WHOOPS. I meant a lowercase b. Terabit, not byte.
>>
File: starbucks.jpg (66 KB, 457x343) Image search: [Google]
starbucks.jpg
66 KB, 457x343
>>46837309

>that dude in the background doing this pose
>>
File: 1279514224626.jpg (280 KB, 400x509) Image search: [Google]
1279514224626.jpg
280 KB, 400x509
>>46837309
>SWAT busts in
>arrests me
>seize all my stuff
>find tranny porn and pirated video games
>I feel embarassed
>release me, apologize for hitting up the wrong house
>tell me I'll have my stuff returned to me soon
>yeahokay.jpg
>build new pc
>the torrenting continues
>finally have my stuff returned to me after a ridiculously long time
>I now have twice the porn, twice the games, and twice the computer
>mfw I'm okay with this

Basically... I always try to find the silver lining in life.
>>
>>46840975
>tell me I'll have my stuff returned to me soon
>no legal obligation to do so
>>
>>46840965
That's the problem with persistent identity. Perhaps you gain some credibility, sense of authority, or intimidation in people's minds as they see you around relative to any given topic. Perhaps you just become some tripfag.

But either way, it tends to result in some overplayed response to mistakes rthre thann juts

rather than just correcting*.

This form of communication is not suited to deep proofreading, catching all mistakes, and have levels of confidence what you just said will be interpreted (or be at all) how it is intended.

You'll be alright. Not at all intending to be predatory or prick-like. You were just a bit of a pushy asshole to the anon above, and then pulled a self security 180.
>>
>>46841047
I wasn't a bit of a pushy asshole. I was a full pushy asshole. Because the person I am replying to is an idiot.

I said there is no known instance of recovering unencrypted data from a disk zero-passed once, he links me to a decade old paper that is dealing with old encoding technologies to make sure I understand it's "improbable" but not "impossible."

There is a certain type of person that deserves to be treated like an idiot.
>>
>>46838830
When they busted DPR they took care that he couldn't even close his laptop
>>
File: 1279514705841.jpg (81 KB, 485x706) Image search: [Google]
1279514705841.jpg
81 KB, 485x706
>>46841012
You sir, do not try to find the silver lining in life.
>>
File: 1425448308332.png (379 KB, 922x730) Image search: [Google]
1425448308332.png
379 KB, 922x730
>>46840808
I could not help but notice your png was not optimized anon.
I have optimized your png.
Your png is now optimized.
>>
File: Dpr_brb_fbi.png (334 KB, 530x530) Image search: [Google]
Dpr_brb_fbi.png
334 KB, 530x530
>>46841091
DPR couldn't be helped.
>>
>>46841090
>Because the person I am replying to is an idiot.
And? So which is it, do you care or not?
What do you want from the situation?
You need to make up your mind.

>to make sure I understand it's "improbable" but not "impossible."
Anon is correct. Your have no proof it is impossible, your only evidence is purely indirect and merely suggestive, but not close to what any reasonable sort would consider absolute or conclusive. You are ignoring ambiguity in favor of believing you possess an absolute truth that you do not possess. There are countless prominent examples of this all throughout history, pre-"science" included, many of which were eventually proven wrong, sometimes even mere months after they were stated to be immutable truths. Ultimately, you don't know if there are techniques (viable affordances of physics relative to the medium) to recover data, you don't even know if they exist right now and are known by others. You're assuming, and doing a poor job of putting your framework of knowledge in a realistic perspective. Even if everything points to, supports, and implies your conclusions, that is not proof.

If you're just pissed about the way they said, or the context they put that forward in, what's all this other shit about?

To be entirely blunt, from my angle there's an equal number of ways you deserve to be treated like a narrow minded, arrogant fool. Guess I'm taking some kind of high road for today.
>>
>>46841370
That isn't what I was doing at all. Really long post to still consider yourself taking the high road.

I never implied it was impossible. I said no one has given any evidence they have done it, and they have not. Half of the information he brought up is entirely irrelevant to modern disks. We are talking about modern disks. He is an idiot.
>>
>>46837309
My door has a reinforced frame as well as a large metal bar. The minute it takes to break down would be enough time to smash the external and put on some pants.
Except if they come through the windows or ambush me outside, but I doubt they're getting paid enough for that.
>>
>>46841566
100% of tax dollars doesn't go to buying weed for jobless niggers.
>>
>>46840145
finfag weaboo detected
where is your moderator you inconsiderate cur
>>
>>46837990
On the bright side, you'll lose your virginity in jail.
>>
>>46840863

It's not even that you're necessarily "wrong" about something, you just come off as the classical, elitist, neckbeard going off on some anti-societal megalomaniacal rant assuming the worst about everyone. Your post just served as a vehicle for self-masturbation.

As a heads up, 99.9999% of all Internet users (yourself and I included) have used the Internet for hours if not days on end without any negative government interference. Yes, like you said, the possibility is there, but it just simply isn't intuitive to be paranoid about such stupid, insignificant shit. People have better things to worry about. We've been doing this Internet gig for 30 years.
>>
File: 1421529217174.jpg (16 KB, 300x300) Image search: [Google]
1421529217174.jpg
16 KB, 300x300
>>46840145
I swear it's like guns come with a complimentary Spice and Wolf nowadays.
>>
>>46837309
An adequate way to act & prepare:
>36 Separately encrypted volumes in a sort of RAID 0 fashion (if you don't have access to all 36 volumes, you can only access partial data)
>Login program takes multiple passwords in rotation/sequence (to prevent physical spying), including a trip (to relinquish in interrogation).
>USB stick must be plugged into a certain USB port corresponding with the day of the week, or trip.
>> Fuckos bust door down
>Press pre-determined keys in tandem
>Unmounts all volumes
>modifies cloud-based boolean value to true so friends/loved ones know my station has been compromised (awareness, and prevents impersonation)
>shows some CP or something illegal so they don't think I was trying to hide anything
Not sharing all.
Also, I've always wondered, what if you just happened to leave a bear trap or some really slippery banana peels right in front of the door (on the inside)? You couldn't possibly be held responsible for where you place things on your own property, right?
>>
>>46838889
well atheismed anon.
>>
>>46842476
Thanks.
>>
>tfw never participated in criminal activities
>tfw they'd find nothing on my computer
>tfw you live a pretty bland life
guess i'd be fine. you fuckos got some fucked up shit on your computer or what?
>>
>>46842819
Fuck off NSA, I'm not admitting anything.
>>
>>46840145
>how to make /k/ cream its pants.jpg
>>
File: 1418568652419.gif (2 MB, 370x281) Image search: [Google]
1418568652419.gif
2 MB, 370x281
>>46837309

>pic related
>>
>>46842862
sorry for spooking you anon. i'm just a boring dude. not trying to get anyone here to incriminate themselves. it's just funny that you guys pretend like you're hiding state secrets and shit when in reality it's just pirated music/games/chinese cartoons. that shit is a civil issue, not a criminal one. the worse you get is a letter in the mail, not swat busting down your door.
>>
>>46842819
Have you ever saved any image from a thread in which people were posting innocent images along a theme?

Have you checked all of them to make sure that there is only one image in the file?

Try running some through imagemagick's identify mode, with verbose enabled.
>>
>>46837433
>4chan
Fucking nerd.
>>
File: IMAG_94.jpg (211 KB, 1275x833) Image search: [Google]
IMAG_94.jpg
211 KB, 1275x833
>>46842888
Also this.
>>
>>46842896
Did you know that the NSA targets sysadmins so that they can gain the keys to large organisations? They might not be "busting down doors", but close enough.
>>
>>46842918
That's a pretty neat unregistered SBR, anon.

Serial number visible, reported to the cops.
>>
>>46842958
>SBR
Hahahahahahahaha stay cucked jobless nigger. Hahahahahahahaha your eurocuck is showing. Hahahahahahahaha I can sense you are getting cucked right now.
>>
>>46842958
0 for 2
>>
>>46842958
>Serial number visible

No its not, try again libcuck.
Thread replies: 159
Thread images: 27

banner
banner
[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y] [Home]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
If a post contains personal/copyrighted/illegal content you can contact me at [email protected] with that post and thread number and it will be removed as soon as possible.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com, send takedown notices to them.
This is a 4chan archive - all of the content originated from them. If you need IP information for a Poster - you need to contact them. This website shows only archived content.