vpndb.org's avatar
vpndb.org
npub13dgt...rq2r
vpndb.org's avatar
vpndb 2 years ago
Cyber security month is wrapping up. Don’t forget to: Buy a thinkpad x230 and install heads. Write protect the flash chip. Put nail polish on the screws and take high resolution pictures to ensure signs of tampering. Do NOT use a HDD or SSD. They have DMA so a malicious firmware could do a lot of damage, use of USB is preferred since they do not have DMA. Completely remove the microphone, sound card, webcam and the WWAN card from the laptop. Remove the fan to prevent binary acoustic data transmission. Replace the default wifi card with a supported atheros card. Disable wifi when not in use, preferably by physically removing the card. Make your own independent Linux distro from scratch. Most Linux distros value convenience over security and will thus never have good security. Your only option is to make your own. Use musl instead of glibc, Libressl instead of openssl, sinit instead of systemd, oksh instead of bash, toybox instead of gnu coreutils to reduce attack surface. Enable as little kernel modules as possible. Use a hardened memory allocator. Apply strong SELinux and sandboxing policies. Restrict the root account heavily to make sure it never gets compromised. Disable JavaScript and CSS in your browser. Block all FAGMAN domains in your hosts file. Monitor all network requests. Do not use a phone. Never speak near anyone who owns a phone, they are always listening. Never use any non-corebooted technology made after 2006. Never leave your devices unattended. Tape triple layer aluminum foil all around your room as tempest shielding. Type really quietly as defense against audio keylogging. Use ecc ram to minimize rowhammer and rambleed. Encrypt everything multiple times with various different encryption implementations. Compile everything from source. Use hardened compilation flags. Always read through the source before installing something if possible. Only use the internet when absolutely necessary.
vpndb.org's avatar
vpndb 2 years ago
We find ourselves in the midst of an information war, whether we chose to participate or not. On one side are the data extractors - the tech giants, advertisers, data brokers and other entities that see our personal information as a commodity to be harvested and traded. Their aim is to scoop up every byte of data they can about our online activities, locations, interests, relationships and more. On the other side are individuals seeking to retain ownership and control over their own digital footprints and identities. For them, privacy is not about hiding anything illicit, but rather about exercising autonomy and self-determination in an increasingly digitized world. They understand that our data, in aggregate, reveals intimate details about our lives, and they do not want to relinquish it without fair compensation or say in how it is used. Like any war, this conflict involves tactics and strategy. The extractors deploy surveillance technologies, terms of service agreements and lobbying efforts to legalize ever more intrusive forms of profiling and tracking. Individuals employ tools like encryption, anonymous networks and strategic obfuscation to cloud their movements and activities online. Ultimately, it is a clash over power and information asymmetry. Who gets to see under the veil that individuals try to retain over their own lives and decisions? In whose interests will the vast troves of personal data being amassed be put to use? This information war will shape how privacy and transparency are balanced for years to come.
vpndb.org's avatar
vpndb 2 years ago
I’m sorry you had to find out this way. But an app downloaded via the App Store cannot provide you anonymity. By that point they already have your MAC address, IP address, stylometry, name and billing address, location data, Face ID, etc.
vpndb.org's avatar
vpndb 2 years ago
When’s the last time the FBI stopped a crime?
vpndb.org's avatar
vpndb 2 years ago
The Maine shooter was (as always) known to law enforcement, previously committed to a mental institution and prohibited from owning firearms. If only the FBI would stop spying on Catholics, concerned parents at PTA meetings, and Maga patriots maybe they’d actually stop real terrorists for a change rather than trying to create them.
vpndb.org's avatar
vpndb 2 years ago
Using the web while connected to a VPN is like asking a friend to move to a more private location before having a sensitive conversation. Sure others might not hear what you’re saying but you really have to trust that friend. And what good is it if your other devices are listening as well?
vpndb.org's avatar
vpndb 2 years ago
Encryption was once the exclusive domain of governments, banks and other large institutions. The average citizen saw encryption as something esoteric, only used by spies and criminals. But today, encryption is everywhere. It secures our online banking, our private communications, even our everyday browsing. Strong cryptography is no longer just for the elite few - it now protects the digital lives of people from all walks of life. The power and promise of encryption belongs to the people. Its preservation is a right that we must continue to defend against those who would weaken it. The spread of encryption is a victory for liberty in the digital age.
vpndb.org's avatar
vpndb 2 years ago
Since the beheaded babies story has now been recanted and debunked, I’m getting throwback vibes from when the Ukrainians accused the invading Russian forces all sorts if atrocities then it came out that Ukrainians had tortured and killed prisoners of war. 🤣🤣
vpndb.org's avatar
vpndb 2 years ago
People are saying the recent Hamas attacks are “Israel’s 9/11”. This is true, especially the part about both events being examples of significant intelligence blunders resulting in the deaths of civilians. That and they’re both funded by the CIA.
vpndb.org's avatar
vpndb 2 years ago
Same people falling for the beheaded babies psyop have Ghost of Kiev stickers on their cars.
vpndb.org's avatar
vpndb 2 years ago
Kinda funny how the media will show the death of George Floyd over and over with a ticker of the Covid death count underneath. They absolutely love death. But won’t show images of dead Israeli women and children. 🤔
vpndb.org's avatar
vpndb 2 years ago
News anchor: How can we trust these unverified reports of babies and women being killed? Correspondent: If you saw what I saw, there wouldn’t be any doubt In essence: tRuSt Me BrO Hopefully the same people who fell for the Covid propaganda will see through the bullshit this time.
vpndb.org's avatar
vpndb 2 years ago
🔥 Applying Gus Fring's Lessons to Anonymity & Privacy: Mastering the Art of Stealth 🦋💼 1️⃣ The world of Gus Fring, the calculating drug lord from Breaking Bad, holds valuable lessons for our own quest for anonymity and privacy. Let's explore how we can apply his methods to protect ourselves: 2️⃣ Control your digital realm: Just like Gus maintained a legitimate front, we must establish a secure online presence. Be mindful of the information you share on social media and tighten your privacy settings. Don't make it easy for prying eyes to track you. 3️⃣ Layer your identity: Gus never revealed his true self, and neither should we. Utilize pseudonyms, separate email addresses, and VPNs to create layers of protection. The more barriers you have, the harder it is to trace your true identity. 4️⃣ Think before you act: Gus understood the butterfly effect, and so should we. Every online action can have far-reaching consequences. Consider the potential impact before posting, sharing, or engaging in any digital activity. Stay vigilant. 5️⃣ Encrypt like a pro: To maintain privacy, encryption is key. Use secure messaging apps, enable end-to-end encryption, and safeguard your sensitive data. Make it a habit to protect your digital communication from prying eyes. 6️⃣ Cut loose ends: Gus eliminated witnesses, and we must do the same. Regularly review and delete unnecessary personal data, old accounts, and unused profiles. The less information available, the harder it is for anyone to track you. 7️⃣ Stay ahead of the game: Gus always evolved, and so should we. Stay informed about emerging privacy tools and techniques. Adapt to changing digital landscapes to stay one step ahead of potential threats to your anonymity. 8️⃣ Use the power of obscurity: Gus hid his true intentions, and so can we. Be mindful of oversharing personal details online. Embrace the power of obscurity by keeping a low digital footprint. Don't let the world see the real you unless you choose to reveal it. 9️⃣ Remember, Gus Fring's lessons can be applied to our own pursuit of anonymity and privacy. By controlling our digital presence, encrypting our communication, and staying one step ahead, we can protect our identities in an increasingly connected world. #AnonymityLessons #PrivacyMatters