Sam Bent's avatar
Sam Bent
contact@sambent.com
npub1y7rv...d0r3
Agorist. Counter-economist. Privacy maximalist. Student of OPSEC. Anti-authoritarian. Free speech absolutist. Logician. Ex-Darknet Vendor. Youtuber.
Sam Bent's avatar
SamBent 2 weeks ago
#OPSEC365 015/365 Every package you order creates a record linking your name to your address. That Amazon order, that supplement you'd rather keep private, that gift that reveals your relationship status. Somewhere there's a database connecting your identity to your home and your purchasing habits. Most of them don't need it. They asked because you gave it. A PO Box or private mailbox service breaks the link between your name and home address for most deliveries. It costs around twenty dollars a month and keeps your physical location out of dozens of corporate databases that will eventually get breached.
Sam Bent's avatar
SamBent 2 weeks ago
Most Tor Docker images are running outdated Tor, no guard protection, and leave telemetry on by default. HiddenForge v2.0.0 (my creation): Tor 0.4.9.6 + Vanguards, every dependency SHA256-pinned, zero telemetry, read-only filesystem, rootless Podman support. Built for a state-level adversary threat model. image
Sam Bent's avatar
SamBent 2 weeks ago
Monero has survived ten years on donations and volunteer labor while VC-backed "privacy" projects burned through millions building compliance tools, turns out you don't need a marketing budget when the product actually works. image
Sam Bent's avatar
SamBent 2 weeks ago
#OPSEC365 014/365 Who has a key to your home right now? Family members, the ex who never returned theirs, the neighbor watching your place while you travel, the cleaning service, the property manager. Each one is a potential entry point you don't control. If you can't name every person with access, you've already lost track. Re-keying is cheaper than replacing entire locks and takes about fifteen minutes per door. If you've lost track of who has copies, it's worth the cost to reset the access list. Smart locks with revocable codes solve this for new access but create their own attack surface.
Sam Bent's avatar
SamBent 2 weeks ago
#OPSEC365 013/365 Alcohol removes the filter between what you know and what you say. The classified project you're working on, the friend going through a divorce, the coworker you can't stand. After a few drinks, those things slip out to whoever happens to be sitting next to you at the bar. Next time you're out drinking, notice what you almost said and what stopped you from saying it. Professional intelligence officers target bars and social events specifically because people talk more freely there. If you work with sensitive information, consider who might be listening when your guard is down and adjust your drinking accordingly.
Sam Bent's avatar
SamBent 2 weeks ago
#OPSEC365 012/365 Your car tells people more about you than you realize. The parking permit reveals where you work. The bumper stickers broadcast your politics, your kids' schools, and the gym you go to. The pattern of where you park and when tells anyone watching exactly where you'll be tomorrow. Look at your car like a stranger and count how many facts they could learn from it. You don't need to strip your car bare, but consider what each sticker or accessory reveals. The honor student bumper sticker just told a stranger your child's school and approximate age. The parking permit narrows down your employer. Each one is a piece of a puzzle.
Sam Bent's avatar
SamBent 2 weeks ago
Finally, an honest warning label about what financial privacy actually threatens. image
Sam Bent's avatar
SamBent 2 weeks ago
#OPSEC365 011/365 Google your full name in quotes and see what comes up. Data broker listings, old forum posts, voter records, that 10K you ran in 2014. Most people have no idea how much of their history is indexed and publicly searchable by anyone who wants to find it. Whatever shows up on page one is what your adversary finds first. Services like DeleteMe and Privacy Duck can remove you from data broker sites, but they're not perfect. The free version is doing it yourself by finding the opt-out page for each broker and submitting removal requests manually. It takes time, but it works.
Sam Bent's avatar
SamBent 2 weeks ago
Congress forced telecoms to build surveillance backdoors in 1994. Chinese hackers found them. The government's response is to ban your router. image
Sam Bent's avatar
SamBent 2 weeks ago
#OPSEC365 010/365 Your phone logs every call you make, every text you send, and the duration of each conversation. Even with encrypted messaging, your carrier knows who you contacted, when, and for how long. Pull up your call history and imagine someone trying to map your relationships based purely on who you talk to and how often. The connections are already logged. Content can be encrypted, but metadata often can't. Who you call, when, and how often creates a pattern that reveals relationships, habits, and associations without anyone reading a single message. The structure of your communications tells its own story.
Sam Bent's avatar
SamBent 3 weeks ago
Anon, Feds hate you, it's not just a meme. ๐—”๐—น๐—ถ๐—ฐ๐—ฒ ๐— ๐—ฎ๐—ฟ๐—ถ๐—ฒ ๐—๐—ผ๐—ต๐—ป๐˜€๐—ผ๐—ป | ๐—Ÿ๐—ถ๐—ณ๐—ฒ ๐˜„๐—ถ๐˜๐—ต๐—ผ๐˜‚๐˜ ๐—ฝ๐—ฎ๐—ฟ๐—ผ๐—น๐—ฒ + ๐Ÿฎ๐Ÿฑ ๐˜†๐—ฒ๐—ฎ๐—ฟ๐˜€ Relaying phone messages in a cocaine conspiracy. First arrest ever. ๐—ช๐—ฒ๐—น๐—ฑ๐—ผ๐—ป ๐—”๐—ป๐—ด๐—ฒ๐—น๐—ผ๐˜€ | ๐Ÿฑ๐Ÿฑ ๐˜†๐—ฒ๐—ฎ๐—ฟ๐˜€ Three sales of $350 worth of marijuana with an alleged ankle holster. No prior record. ๐——๐—ถ๐—ฐ๐—ธ๐˜† ๐—๐—ผ๐—ฒ ๐—๐—ฎ๐—ฐ๐—ธ๐˜€๐—ผ๐—ป | ๐—Ÿ๐—ถ๐—ณ๐—ฒ ๐˜„๐—ถ๐˜๐—ต๐—ผ๐˜‚๐˜ ๐—ฝ๐—ฎ๐—ฟ๐—ผ๐—น๐—ฒ Transported meth on his truck route to pay for his dying toddler's $250,000 bone marrow transplant after insurance dropped them. ๐—š๐—ฒ๐—ผ๐—ฟ๐—ด๐—ฒ ๐— ๐—ฎ๐—ฟ๐˜๐—ผ๐—ฟ๐—ฎ๐—ป๐—ผ | ๐—Ÿ๐—ถ๐—ณ๐—ฒ ๐˜„๐—ถ๐˜๐—ต๐—ผ๐˜‚๐˜ ๐—ฝ๐—ฎ๐—ฟ๐—ผ๐—น๐—ฒ Pleaded guilty to drug charges expecting 40-54 months per the prosecution's own recommendation. The judge gave him the maximum to pressure him into snitching on the Philly mob. ๐—ง๐—ถ๐—บ๐—ผ๐˜๐—ต๐˜† ๐—ง๐˜†๐—น๐—ฒ๐—ฟ | ๐—Ÿ๐—ถ๐—ณ๐—ฒ ๐˜„๐—ถ๐˜๐—ต๐—ผ๐˜‚๐˜ ๐—ฝ๐—ฎ๐—ฟ๐—ผ๐—น๐—ฒMailed LSD to a Grateful Dead concert friend. Two prior nonviolent drug offenses triggered the federal three-strikes provision. ๐—™๐—ฎ๐˜๐—ฒ ๐—ช๐—ถ๐—ป๐˜€๐—น๐—ผ๐˜„ | ๐—Ÿ๐—ถ๐—ณ๐—ฒ ๐˜„๐—ถ๐˜๐—ต๐—ผ๐˜‚๐˜ ๐—ฝ๐—ฎ๐—ฟ๐—ผ๐—น๐—ฒ Acted as a $5 middleman in a $20 crack sale to an undercover cop in Shreveport, Louisiana. ๐—–๐—ผ๐—ฟ๐˜ƒ๐—ฎ๐—ถ๐—ป ๐—–๐—ผ๐—ผ๐—ฝ๐—ฒ๐—ฟ | ๐—Ÿ๐—ถ๐—ณ๐—ฒ ๐˜„๐—ถ๐˜๐—ต๐—ผ๐˜‚๐˜ ๐—ฝ๐—ฎ๐—ฟ๐—ผ๐—น๐—ฒ Federal marijuana conspiracy. Never touched the product, no violence. Sentenced under the federal three-strikes drug law. ๐—ฃ๐—ฎ๐˜๐—ฟ๐—ถ๐—ฐ๐—ธ ๐— ๐—ฎ๐˜๐˜๐—ต๐—ฒ๐˜„๐˜€ | ๐—Ÿ๐—ถ๐—ณ๐—ฒ ๐˜„๐—ถ๐˜๐—ต๐—ผ๐˜‚๐˜ ๐—ฝ๐—ฎ๐—ฟ๐—ผ๐—น๐—ฒ Stole tools from a shed in Slidell, Louisiana. Enhanced by prior nonviolent convictions under habitual offender laws.
Sam Bent's avatar
SamBent 3 weeks ago
SSL/TLS ecosystem analysis showing pervasive implementation failures. "We systematize knowledge about SSL/TLS and present a comprehensive analysis of its security." - ๐—ฆ๐—ผ๐—ž: ๐—ฆ๐—ฆ๐—Ÿ ๐—ฎ๐—ป๐—ฑ ๐—›๐—ง๐—ง๐—ฃ๐—ฆ: ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐˜€๐—ถ๐˜๐—ถ๐—ป๐—ด ๐—ฝ๐—ฎ๐˜€๐˜ ๐—ฐ๐—ต๐—ฎ๐—น๐—น๐—ฒ๐—ป๐—ด๐—ฒ๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—ฒ๐˜ƒ๐—ฎ๐—น๐˜‚๐—ฎ๐˜๐—ถ๐—ป๐—ด ๐—ฐ๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฐ๐—ฎ๐˜๐—ฒ ๐˜๐—ฟ๐˜‚๐˜€๐˜ ๐—บ๐—ผ๐—ฑ๐—ฒ๐—น ๐—ฒ๐—ป๐—ต๐—ฎ๐—ป๐—ฐ๐—ฒ๐—บ๐—ฒ๐—ป๐˜๐˜€ by Jeremy Clark and Paul C. van Oorschot (2013) https://www.ieee-security.org/TC/SP2013/papers/4977a511.pdf image
Sam Bent's avatar
SamBent 3 weeks ago
#OPSEC365 009/365 Your trash tells a story about you every week. Prescription bottles with your name and medications, bank statements with account numbers, shipping labels with your address, and receipts that show where you shop and what you buy. Anyone willing to go through your garbage can build a detailed profile without breaking any laws. Before your next trash day, look through what you're throwing out and see what you'd learn about yourself. A cross-cut shredder handles paper, but don't forget about labels on packaging and prescription bottles. Peel them off, shred them, or black them out with a marker before they go in the bin. The few seconds it takes is cheaper than the identity theft it prevents.
Sam Bent's avatar
SamBent 3 weeks ago
Medieval peasants kept more of their harvest than you keep of your paycheck. image
Sam Bent's avatar
SamBent 3 weeks ago
#OPSEC365 008/365 Everyone has an adversary, whether they realize it or not. It might be an ex who won't let go, a competitor digging for leverage, a scammer building a target list, or a future employer searching your name. The question isn't whether someone wants information about you, it's who and why. Write down the three most likely people or groups who might want to know more about you than you'd want them to. Your adversary determines your threat model, and your threat model determines what precautions make sense.
Sam Bent's avatar
SamBent 3 weeks ago
Monero devs have never once suggested building backdoors for law enforcement, Zcash's founder suggested it publicly then asked you to memory-hole his own words. image
โ†‘