805
He is a ghost (lemmy.basedcount.com)
top 50 comments
sorted by: hot top controversial new old
[-] NateNate60@lemmy.world 303 points 6 months ago
[-] MudMan@fedia.io 101 points 6 months ago

Right? It's kinda nuts how much this quixotic prepper-style power fantasy permeates some parts of the Internet. Hell, even that strip is conceding the basic point that there will be a cabal of evil people digging for all their super-important secret files at some point.

load more comments (26 replies)
[-] A_A@lemmy.world 37 points 6 months ago* (last edited 6 months ago)

Rubberhose (file system) Deniable encryption
https://en.m.wikipedia.org/wiki/Deniable_encryption
The notion of "deniable encryption" was used by Julian Assange and Ralf Weinmann in the Rubberhose filesystem (...) In cryptography, rubber-hose cryptanalysis is a euphemism for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by coercion or torture—such as beating that person with a rubber hose, hence the name—in contrast to a mathematical or technical cryptanalytic attack. (...)

load more comments (3 replies)
load more comments (2 replies)
[-] shneancy@lemmy.world 188 points 6 months ago* (last edited 6 months ago)

this is exactly the sort of thing you imagine in the shower to feel good about yourself

[-] Worx@lemmynsfw.com 41 points 6 months ago

I imagine other things in the shower when I want to feel good ;)

[-] Huschke@programming.dev 52 points 6 months ago

Like compiling a kernel? Same!

[-] Dasus@lemmy.world 17 points 6 months ago

Imagining that they're hide&seek world champions because they've always won.... when playing with imaginary friends.

[-] echodot@feddit.uk 117 points 6 months ago* (last edited 6 months ago)

If you guys don't think the CIA can hack a Linux computer I've got a nice bridge you might want to purchase.

[-] Rolando@lemmy.world 32 points 6 months ago

I don't want to buy the bridge, but I'm willing to donate to make the bridge open source, does that count?

load more comments (1 replies)
[-] Syd@lemm.ee 31 points 6 months ago

Someone told me there was a bridge sale going on, am I late?

[-] monkeyslikebananas2@lemmy.world 26 points 6 months ago

Whoa I love bridges. Which one? Where is it?

[-] towerful@programming.dev 20 points 6 months ago
[-] TwoBeeSan@lemmy.world 20 points 6 months ago
[-] huginn@feddit.it 12 points 6 months ago
load more comments (1 replies)
load more comments (6 replies)
[-] doggle@lemmy.dbzer0.com 87 points 6 months ago

what does he do all day?

He administers his system.

[-] dubyakay@lemmy.ca 14 points 6 months ago

He's also a fursuit connoisseur.

[-] iAvicenna@lemmy.world 9 points 6 months ago

and configures vim obviously

[-] OozingPositron@feddit.cl 75 points 6 months ago

Buy a thinkpad x230 and install heads. Write protect the flash chip. Put nail polish on the screws and take high resolution pictures to ensure signs of tampering. Do NOT use a HDD or SSD. They have DMA so a malicious firmware could do a lot of damage, use of USB is preferred since they do not have DMA. Completely remove the microphone, sound card, webcam and the WWAN card from the laptop. Remove the fan to prevent binary acoustic data transmission. Replace the default wifi card with a supported atheros card. Disable wifi when not in use, preferably by physically removing the card. Make your own independent Linux distro from scratch. Most Linux distros value convenience over security and will thus never have good security. Your only option is to make your own. Use musl instead of glibc, Libressl instead of openssl, sinit instead of systemd, oksh instead of bash, toybox instead of gnu coreutils to reduce attack surface. Enable as little kernel modules as possible. Use a hardened memory allocator. Apply strong SELinux and sandboxing policies. Restrict the root account heavily to make sure it never gets compromised. Disable JavaScript and CSS in your browser. Block all FAGMAN domains in your hosts file. Monitor all network requests. Do not use a phone. Never speak near anyone who owns a phone, they are always listening. Never use any non-corebooted technology made after 2006. Never leave your devices unattended. Tape triple layer aluminum foil all around your room as tempest shielding. Type really quietly as defense against audio keylogging. Use ecc ram to minimize rowhammer and rambleed. Encrypt everything multiple times with various different encryption implementations. Compile everything from source. Use hardened compilation flags. Always read through the source before installing something if possible. Only use the internet when absolutely necessary.

[-] NaoPb@eviltoast.org 15 points 6 months ago
[-] dubyakay@lemmy.ca 31 points 6 months ago

Facebook Apple Google Microsoft Amazon Netflix

load more comments (2 replies)
[-] deczzz@lemmy.dbzer0.com 10 points 6 months ago

ᕕ( ᐛ )ᕗ

load more comments (7 replies)
[-] Zehzin@lemmy.world 47 points 6 months ago

"Finally, we cracked it. What was he hiding in this thing?"

"Mostly ways to keep his data safe"

[-] UnderpantsWeevil@lemmy.world 20 points 6 months ago* (last edited 6 months ago)

There are two kinds of people obsessed with their internet security.

  • Computer hobbyists with an inflated opinion of their own importance and a touch of autism

  • IT Security Professionals

You'll notice I left out pedophiles. That is because pedophiles are dumb and regularly get caught.

load more comments (4 replies)
[-] adj16@lemmy.world 47 points 6 months ago* (last edited 6 months ago)

Like the feds would care about raiding the house because it was actually his parents’ lmao

[-] ramjambamalam@lemmy.ca 10 points 6 months ago

"He lives with his family, so make sure you pack the dog gun."

[-] cows_are_underrated@feddit.de 21 points 6 months ago

And his harddrive isencrypted, so raiding is kinda useless.

[-] bitwaba@lemmy.world 24 points 6 months ago

I don't know why but I read raiding, I thought He's RAIDing his house. So, like, one hard drive on a computer in this house, another hardrive in another computer in another house, as a RAID 0, so there is no point in raiding the house.

It's late okay. Give me a break.

load more comments (1 replies)
[-] Grass@sh.itjust.works 15 points 6 months ago

Blob free capable computers are so old though. After trying one I don't know how I survived that era without even using ssds. Before that how the hell did live with Pentium 2, 3, and 4?

[-] liam070@sopuli.xyz 18 points 6 months ago

Some of us had to install Windows XP SP2 and 4 on these machines. I made money just sitting in a room watching progress bars.

[-] SpaceNoodle@lemmy.world 12 points 6 months ago

There was a lot less data to grind through.

load more comments (11 replies)
[-] unreasonabro@lemmy.world 13 points 6 months ago

doing it the right way

[-] FiniteBanjo@lemmy.today 11 points 6 months ago

I don't think the NSA or CIA has ever had any interests in my specific online activity, purely because the manpower is never that well utilized in our world, but in the age of automation that could all change soon.

[-] NGC2346@sh.itjust.works 11 points 6 months ago

feds: proceed to kidnap and torture the VIP target described in OP post for answers

load more comments
view more: next ›
this post was submitted on 05 May 2024
805 points (98.6% liked)

4chan

4258 readers
29 users here now

Greentexts, memes, everything 4chan.

founded 1 year ago
MODERATORS