[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y ] [Home]
4chanarchives logo
>uses dark underground browser because it's 'non-botnet'
Images are sometimes not shown due to bandwidth/network limitations. Refreshing the page usually helps.

You are currently reading a thread in /g/ - Technology

Thread replies: 39
Thread images: 4
File: unnamed.gif (749 KB, 500x229) Image search: [Google]
unnamed.gif
749 KB, 500x229
>uses dark underground browser because it's 'non-botnet'
>uses only open source stuff because le freedoms
>protonmail, tor messenger and other memes

>IAmA with NSA ex director
>'no OS is safe from surveillance'

So what now, /g/?
>>
You cannot be safe when using an internet connected device.
If you don't understand this then you're hopeless. Using a shitty autismal Linux distro instead of Windows does absolutely nothing to address this underlying issue. The backbone of the internet itself is vulnerable down to the very core.
If you want privacy, do not use the internet.
>>
>>51302187
/thread
>>
>>51301833
TempleOS
>>
>>51302187
Thanks, mister NSA sir. I'll keep that in mind.
>>
>>51301833
All I read from your post is "IAmA with NSA ex director: 'please stop using secure operating systems!'"
>>
>>51302187
In the presence of no OS-level backdoors/vulnerabilities and also a proper encryption algorithm that cannot be broken trivially, this wouldn't necessarily be the case. Doesn't matter if the endpoints are secure and the encryption used for data transport is secure, they can read encrypted traffic that they can't decrypt all they want.

The question is if the secure software (OS, crypto) exists and if it's being used by some big-business server that pretty much everything connects to in order to function these days.
>>
>>51302187
Normies will need that to be simpler and a lot dumber
>>
>>51301833
MenuetOS
>>
I send half my packets via smoke signals, it's pretty secure.
>>
>>51302437
this desu
>>
>>51302405
If you are connected to the internet you are subject to all the meta data collection of the average user no matter what you do.
Unless every single email you send and receive is signed with an encryption key you can consider it no different from putting a pad lock on a paper house.
Nothing you do on the internet is hidden. TOR is not safe. VPNs are not safe.
SSL is not safe from the intelligence community, no connections can be considered safe. The very systems you connect to cannot be considered safe.

It has been shown that the NSA will go as far as to create hardware bugs, intercept mail, and implant hardware bugs into consumer devices. If you believe that they cannot find a way to get a file onto your machine to decrypt any encrypted volumes on your system then you are living in a fantasy. Even if its a simple keylogger, they will find a way to access data if they want it bad enough.

The only way to avoid this is to keep the machine off the internet. The only way to compromise the machine then is physical contact.
>>
if you're not doing hacktivism/political activism or leaking government information I think we should care about privacy to stop giving free information(money) to companies like facebook and google.

Tor and VPN are safe if you know what you're doing.
>>
>>51302453
>>51302437
>implying the NSA don't have binoculars
>>
>>51302809
VPNs are never safe.
>>
>>51302837
>not burning 256 different types of wood in the same fire for high security smoke encryption
>>
>>51302864
The wood type is chosen randomly by a gypsy woman using a top of the line crystal ball
>>
>>51302911
for extra security you have the local shaman summon a windstorm to scramble the data further
>>
>>51302845
I know the NSA put a lot of effort into VPN exploitation, but can someone explain how they go about decrypting these connections, assuming you owned and controlled the machines on both ends and used something with a good reputation, eg, AES not those cracked 1024 bit diffe-hellman keys.
>>
>>51302939
>assuming you owned and controlled the machines
Tip top kek.
>>
>>51302537
>If you are connected to the internet you are subject to all the meta data collection of the average user no matter what you do.
You aren't through proper usage of Tor/I2P/FreeNet
>Unless every single email you send and receive is signed with an encryption key you can consider it no different from putting a pad lock on a paper house.
This is trivially easy to do, it's even easier in Instant Messaging
>TOR is not safe.
[citation needed]
>SSL is not safe from the intelligence community
There's other transport encryption schemes aside from SSL, current theory it's that the NSA can break SSL thanks to forcing CA to hand over keys, and by breaking the default primes used in key exchange, both of which are trivially easy to avoid by using another set of primes and self-issued certificates
>It has been shown that the NSA will go as far as to create hardware bugs, intercept mail, and implant hardware bugs into consumer devices. If you believe that they cannot find a way to get a file onto your machine to decrypt any encrypted volumes on your system then you are living in a fantasy. Even if its a simple keylogger, they will find a way to access data if they want it bad enough.
They can, but it's expensive and only used to target high profile objectives, the point of using safe and stupidly easy to use encryption schemes is to stop the dragnet surveillance
>>
>>51302405
>secure software
You need secure hardware too m8
http://blog.invisiblethings.org/papers/2015/x86_harmful.pdf
>>
>>51303250
So much this, it's scary the shit Intel's Management Engine does, and those SMM vulnerabilities are even scarier
>>
>>51302933
Throw in a canister of Morton for a good salt.
>>
>>51303236
>This is trivially easy to do, it's even easier in Instant Messaging
how do I into?

please don't start talking about alice and bob
>>
you guys are really believing a reddit thread lmfao

cmon lads, we're better than this
>>
>>51303477
Signal werks perfectly for mobile, iOS and Android, does calls too
Chatsecure can use OTR by default, it's an Android XMPP client, it werks with Facebook and anything that uses XMPP
There's Telegram too, shittier than TextSecure though
There's SMSSecure for SMS, Android only, uses the same encryption as Signal
In PC there's Jitsi, it comes with OTR by default, will work with any of the protocols it supports including XMPP, it also does calls, it's basically a Skype substitute
There's Pidgin and the OTR plugin too, less plug and play but less bloat than Jitsi

For email you can use anything that supports OpenPGP, the FSF has a nice guide to use PGP, this is quite trickier than IM though, still easy if you can follow instructions
>https://emailselfdefense.fsf.org/
On Android you can use K9Mail and APG, dunno' about iOS
>>
>>51303554
>There's Telegram too, shittier than TextSecure though
TextSecure=Signal, they recently changed the name when they integrated phone calls
>>
>>51302382
Yeah, because paranoid dickfoils like you hear someone say that CyberFox isn't private and run straight back to Chrome, right?
>>
>>51303236
>You aren't through proper usage of Tor/I2P/FreeNet
Sorry, are you connected to a different internet to the rest of us? One that doesn't have main servers owned and run by US Government?
>>
>>51302187
>If you want privacy, do not live in murica
Fixed that for you.
>>
File: Capture.png (17 KB, 911x235) Image search: [Google]
Capture.png
17 KB, 911x235
>>51303666
>Sorry, are you connected to a different internet to the rest of us? One that doesn't have main servers owned and run by US Government?
The packets might go through their servers, but they have no way to know who's sending them, it's really hard to pull off stuff like timing attacks, even for the NSA
>pic related
Also, see the NSA slides about Tor
>>
>>51303723
So using unsafe browsers and operating systems allows them to identify the source of those packets?
>>
File: 1440199756868.gif (559 KB, 400x276) Image search: [Google]
1440199756868.gif
559 KB, 400x276
>>51302371
this is what denial looks like
>realizes everything he has done for privacy is useless
>"Thanks mister NSA"
>>
>>51303790
>So using unsafe browsers and operating systems allows them to identify the source of those packets?
Which they don't pull off if you aren't a high profile target
Also, there's safe browsers and OS'es
Proof of that was that they had to use a vulnerability in Firefox to be able to trace TAILS users
They won't pull off the real scary stuff with common people, like SMM vulnerabilities, hardware backdoors, or modifiying your hardware before it reches you, the main reason being that this is supposed to not be known, the least you use it the least someone will notice
Also, the point it's to stop dragnet surveillance, fucking shills trying to stop people from using easy and secure practices
>>
File: 000286.jpg (32 KB, 417x407) Image search: [Google]
000286.jpg
32 KB, 417x407
>The NSA knows literally everything and you cannot stop it
>>
>>51302809
hacktivism/political activism or leaking government information

You could of just sais "SJW" for short and everyone would have known what you meant.
>>
>>51305468
>>>/tumblr/
>>
I find it hilarious that you tinfoilbeards think that Linux doesn't have zero-rated exploits that would let NSA spread your cheeks. Those people keep the exploits to themselves, only revealing them when it's no longer safe to exploit them.
Thread replies: 39
Thread images: 4

banner
banner
[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y] [Home]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
If a post contains personal/copyrighted/illegal content you can contact me at [email protected] with that post and thread number and it will be removed as soon as possible.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com, send takedown notices to them.
This is a 4chan archive - all of the content originated from them. If you need IP information for a Poster - you need to contact them. This website shows only archived content.