Jump to content

Some GLOWING tips to be safer online in modern times


Recommended Posts

It’s your favorite glowie here.  I am going to front load this post with a sentence some people might find alarming, and some might already know:

 

Online habits are the most likely method in modern times that average citizens in the US will end up on a kill list.

 

I will start with some basics first, because this topic is multi-layered and there is a massive amount of things that happens behind the curtains that I could write a book on.  Alternatively, I will provide some information on how you can not only protect yourself, but also blend in and create fake noise that lowers your threat level to the automation queries and algorithms designed to find people with “wrong think.”  In fact, rejecting people who think differently than leftists is already being done with enhanced hiring processes that use APIs and aggregated data-lakes from not only legitimately shared sources, but also darkweb databases chock full of stolen credentials, names, addresses, and other personally identifiable and even health information.  Many of the industry leaders in AI driven hiring data discovery are knee deep in lawsuits because their practice is shady and slanted by opinion, but it’s also absolutely the future and not going away.

 

The core of the problem is hard to solve.  Major American tech companies are run by and staffed by leftist ideologues who have no moral qualm with dumping and using data that you’ve agreed to hand over through terms of service agreements.  Opting out or requesting GDPR deletion is useless because even if you opt out, or request deletion, the workflows responsible for servicing your requests are so broken that your data still resides in various geographically diverse redundant systems and also within various types of back-up storage, even if they delete it from the live production data.  The fines big companies face if anyone brings the multi-millions in cash required to sue them is cheaper than implementing the systems to search for and delete all of your data in all repositories.  They’d rather eat the fines because they know no one is going to shut them down.  Imagine banning Google like Trump did Tik-Tok.  The exposure of your data and your blind trust is the cost of using big tech companies’ products.

 

The current state of protests today is something we viewed as unlikely in tabletop exercises.  What you’re seeing is vast amounts of white multi-class people that have surrendered their self-respect and identity while marching to bring awareness and attention to the perceived injustices of other groups loosely bound together by leftist ideology.  This is untenable because these people are doing this out of moral charity, and they’re signaling that they’re superior to Americans whom prescribe to other ideologies while avoiding meaningful debate by simply attributing all opposing views to either racism, sexism, or homophobia.  It’s most likely these leftist groups will cannibalize each other because coexisting alongside such entitlement and elitism will breed resentment and agenda conflicts, but not before they do a significant amount of damage to those they universally define as their enemy. 

 

What does this have to do with Data?  Well the same people who work for (MEGA TECH COMPANY) are the same people who get off work, don black attire, boots, masks, and helmets and go light stuff on fire.  Since tech work is a majorly white male dominated industry, the access to your private details and habits by people who HATE you is unprecedented in current times.

 

KEY BEHAVIOR: Separate your idealistic identity from your online identity.

 

I shop on Amazon with Prime, I have a couple of big name tech company emails, I even have a gmail address logged into my browser.  I not only don’t care if an analyst at Amazon sees my shopping habits, or if a Google devops engineer sees my google drive, I want them to see it.   I meticulously carve out pieces of data I don’t want them to see and I intentionally litter my google searches, twitter views, and youtube videos to paint a picture of “Moderate American Person” and sometimes even a little left leaning.  Liking or retweeting a BLM post, or a LBGTQXYZ+ post builds steady, consistent data that makes it less and less likely that this online identity is not an enemy that they wish violence upon, but rather an apologetic ally of theirs.  I even vote for Biden on polls to skew data.  Bad data infuriates these people more than no data.

 

For everything else, I use Icelandic, Romanian, Hungarian, Czech, or Swiss email servers paid in Monero or Bitcoin.  If I use Bitcoin I’ll buy the coin, send it to a hardware wallet, tumble the coins and send them to an illicit darkweb black market website with a randomized key that’s only good for 48 hours, and then I pay the email server directly from that wallet.  Why?  I’m blending in with traffic, and every single one of my transactions uses one-time use wallet address.  I know many eyes including federal LEO is watching my bitcoins moving around, but it's too much work to piece it together and pinpoint one identity.  They might if they suspect I were producing and selling CP or kilos of coke, but they wont bother otherwise, and we both know that.  The end result is a fresh new email account and 10 or 25 account aliases that are like individual email accounts.

 

Most people sign up for everything using an email like [email protected] or similar.  Some people have hundreds of registrations on various websites using the same email address, and sometimes the same credentials.  This makes it extremely easy with aggregated data from various sources to track your habits, hobbies, views, and beliefs just through your registrations, many of which use a traceback verification email which is SAVED FOREVER.  Yes, that mymilitia email verification email is in your inbox forever even after you think it’s deleted.  Your username doesn’t matter.  Your email, date of birth, name and/or initials, phone number, sex, race, and location matters.  This can all be cross referenced even if you use unique usernames everywhere.

 

KEY BEHAVIOR:  Randomize email aliases for each registration that you don’t want data-mined and archived forever.  You can make some exceptions, like I did for this website because I wanted my email address to be easily remembered.  Randomize your demographic data and birthdays too.  Use a cryptocurrency paid email server.  I use password generators for both the username (letters only) and passwords (letters, numbers, special symbols) to make this easy, example:

 

Website 1: [email protected] Password: _.^h!~##[{#6Af|h;EjC

Website 2: [email protected] Password: _R\dFM/+z^%Q"9c7YYR.

 

Fun fact… I don’t know any of my passwords.  I have around 300 active accounts and none of the passwords are known by heart.  I use minimum 20 character passwords and I use a cloud hosted password vault for my online identity and a local only password vault for my idealistic identity.  I save demographic data I made up in the notes section of the credential in the vault, because birthdays are sometimes used for verifications.   Don’t use browser integrations.  And speaking of browsers, use separate browsers for separate purposes.  Never allow browsers to save your user accounts or passwords, just copy/paste them from the vault.  If your Gmail is logged into google on any browser, your browsing habits are saved forever on that identity, and possibly other identities that log into that same browser using fingerprinting.  Fingerprinting uses commonalities including fonts, screen size, underlying computer or phone hardware, and possibly serial numbers of individual hardware components to track you.  Fingerprinting can identify you even if you multi-boot operating systems or format and re-install all together, this is why trying to hide for the average user is impossible, it’s easier just to litter and poison the data that is collected.  For more secure stuff, VPS systems paid by the hour using cryptocurrency is better, but the average American wont need to go that far hopefully.

 

Use Chrome if you want to announce your browsing habits to everyone on the internet like a bullhorn, and you want to do your part for maximizing corporate profits by creating human habits content that big companies sell between each other.  Use Brave, Iridium, or Epic browser for more privacy, but you can’t bank on full privacy.   The browser landscape is volatile both in new offerings and in exploits that are discovered.  Always keep up and current on browsers.  I regularly use Chrome, Edge, Brave, Waterfox, Iridium, Tor, and Opera depending on what I am doing, and which sites I go to.  I never use bookmarks and I have an encrypted text file in one of my password managers for bookmarking instead.  I distrust browser plug-ins as much as I distrust smartphone apps, that is to says, I don’t trust them at all.  Use them at your own risk.  I do use ad blockers and no-script plug-ins on my public facing identity browsers.

 

If a website requires your phone number, don’t ever sign up using your own real phone number, even for 2FA purposes.  Phone numbers are kept for years or decades by most people and systems latch a ton of personally identifiable information onto your phone number.  I am sometimes successful with T-Mobile by walking into a storefront and paying cash for a pre-paid, no-ID needed family plan and a handful of sims, but this practice is dying quickly and many of the verification systems are getting wise on texting apps and even google voice as being invalid for verification.  If a registration system requires your real phone number, rest assured you’re nothing but a data commodity to be sold (looking at you Parler).

 

On the topic of phones, most phones now either use iOS or Android, complete with location services enabled.  Opting out changes how obvious it is to the end user that tower tri-angulation and GPS data is tracking you, but it is never not collected and is always sent to the hive.  LEO has to go through a difficult subpoena process just to get triangulation data from your cell carrier.  Modern phone operating systems track, upload, and save data that’s even better than tower data because of the additional GPS overlays.  This is one reason why Huawei is banned, but in the hands of Antifa, this data is more damaging to you than in the hands of the Chinese at this current time.  Any training, drilling, or meeting locations that you think are private, are actually easily discovered if you have a cell phone in your pocket or in your car.  Correlating times, dates, places between members of the same group in the US is massively easier for rogue employees of Apple, Google (or 3rd party contractors) than it is for any federal agency trying to track the Taliban or ISIS.  The most secure phone is no phone, the second most is made in Korea, because even the US Federal agencies trust Koreans more than corporate Californians.

 

KEY BEHAVIOR: Use a VPN in a foreign country with lax data retention laws. Icelandic, Romanian, Hungarian, Czech, or Swiss but the laws in the EU change daily almost.  Keep up and don't be afraid to dump a service or migrate.  Hungary and Czech republic are here purely for political corruption reasons.  They tend to say one thing and do another, which is exploitable if their politicians use internal corporate services for shady stuff (they do).

 

Some of the more OPSEC savvy folks out there are already thinking I am a dumbass glowie and that a VPN is useless, and you should build your own VPN or use a VPS server, or both.  You’re right if you’re a criminal, a VPN is useless and VPS hopping constantly is the better option, but you have to pivot a little here based on who the perceived enemy is.  In this presumed scenario here I have, left extremists have destroyed their cities, all city innocents who can move have moved, their cities now look like the worst parts of Detroit or Aleppo.  The rioters and communists are now expanding outwards out of necessity because the stores have abandoned stocking their looted inner city locations and truck drivers have refused to deliver any closer than the suburbs.  The threat of starvation mandates a move into the suburbs to loot gas stations, apartment buildings, and homes in the name of equality and reparations.  This is where the militias become impactful in most tabletop scenarios.  This is also why a VPN is relevant, because you’re not trying to defeat a judge with a cross border subpoena, you’re just trying to mask your internet traffic from local internet service providers and American based companies with employees willing to break company policy to supply intelligence to their extremist pals on twitter.  A VPN does this by encrypting everything in a secure tunnel that leftist network admins can’t sniff into while they try and find out who in your suburb has prepper supplies, MREs or the time and date of your next Amazon Fresh delivery so they can porch pirate you at gunpoint.  So in this scenario, a foreign VPN is effective against in-country corporate technology intelligence gathering, which is legal for your ISP to do believe it or not.  MOST traffic between browser and server is already TLS encrypted, but a VPN is still something I would use to guard against deep packet inspection.

 

Antifa used automatic license plate recognition systems (ALPR) in Portland.  They were trying to gather names and addresses of vehicle registrants so they could learn where federal agents lived, and who their relatives are.   If the agents didn’t use rental cars and one of them happened to drive one of their own vehicles one day, the extremists could publish their data online, go to their homes, threaten their families, and maybe shoot their 5-year-old son if they saw him riding his bike in his front yard (RIP Cannon Hinnant).  If you learn nothing else from this post, know that corporate policies, regulations, and even laws don’t protect you from any tactics involving cancel culture.  Even though some states have laws around ALPRs and their use only by LEO, the technology is accessible, and pathetic white apologists will go to work with their elevated credentials and root access and try and get information from their big data databases in which to harm you and your families.

 

The biggest threat here is not at the VP, board or CEO level of these companies that aggregate human data, the biggest threat is the journeyman storage engineer or system engineer that dumps a bunch of back-up databases into a test environment to perform his or her own little Nazi hunt on right wing CIS white male pigs.  Snowden was an entry level systems administrator, and look at the impact he had just by breaking the rules in his off time at work.  Entry Level.  Your data is available to tens of thousands of people smarter than Snowden and with more experience than him.  The sifting of immense amounts of data can be done by worker level people and the entire process is naturally obfuscated because it looks exactly like what they do day in and day out.

 

The next evolution of cancel culture is murder culture.  While freedom of expression is something we value and must retain, at this specific point in the timeline, it could endanger you and your family until we recognize that some of these modern movements are domestic terrorism, and we start treating them like it.

 

Advanced topics that would probably only need to be reviewed if SHTF:

Advanced Bitcoin practices

Darkweb and onion sites

OpenPGP communication and encryption keys

Veracrypt hidden volumes

Steganography

Tails distro

Communication through “Foldering”

VPS systems

 

I might write more later on some conflict / modern civil war scenarios and what kinds of tactics and problems are expected eventualities, but I wanted to get this out there first because it’s stuff everyone can start doing now to be less visible if you want to be.

 

Who am I: I am an Intelligence and exfiltration expert, trained by you the taxpayers, giving back where I can because white men are unfairly being vilified and de-humanized both in person and by biased journalism.  I've always been aligned down the middle, politically.  Over the past year left has been pushing me forcefully to the right.

 

PM me if you want my email address.  Below is my pub PGP key, which will show my email address if you know how to use it.  I am willing to offer consultancy services for free to any American Patriot, militia group, or defense force dedicated to the preservation of this nation and its inherent freedoms.  I’m a descendant of people whom like I, have dedicated their lives and risked their lives in the name of patriotism and the preservation of this great nation.  I won’t see it extinguished without a fight.  I’ll offer advice on any questions or concerns you might have regarding privacy, secrecy, or maintaining a low profile. 

 

PS: In all scenarios I participated on concerning a civil war between left and right, the left was always significantly better at intelligence gathering, data manipulation, aggregation, and tracking because they have years of experience coding, building systems, building drones, data centers, networks, etc.  Marksmanship, loyalty, leadership, field tactics, self sustainability, movements, and mechanical ability were some strengths on the right.  If you or someone you know owns a store or business that sells guns and ammo, stop selling to leftist extremists now.  You can easily search them and identify them through social media.  These weapons will be aimed at you and your communities if SHTF, and indiscriminate selling to anyone with cash is creating a shortage of available resources and arms.

 

-----BEGIN PGP PUBLIC KEY BLOCK-----

 

mQINBF84Ut8BEADoKZGPn2Nb/nJeOXn1+nL5M5mTiVfJUpu9sTAgNVeX0jvYvHYW

IqldeqPNX9bvKy6/nSs2cNpPX8GRINRkTh+jElF/gDDhwH65mAguMJLjoC8/4DAb

2NQLrdCTA9RYt51pZYIaBD59Y0pvQQfI3qgXH5/j27bI0hqwbjYOM8w2GievXynC

3fq3+CYNzVW38tqPXGoD6kxiHo8qfuBxKpuzgRBOOgF0dE1tf9tjwboFK3n7cJ7k

QrvB/SJeqXtEkGzs5qIXLlTFdOe8nwohQkLpbohv2JSA/glWQdipAFwtxpYxnGek

GTZfyYQpdT7NjGpje1Gdy+UZuZz3t9qzrS/+wTWHlin3LB2iu28gQPxQl25PrRpl

xbDIjsoCH7OmHPzqSgrRUp0cc8ESMjhWT9KjJ75i23lwTO9AfiCRy2Czf+MewoSO

pE2eVpHJjGbFUXv72cotnMtbJCOUACLqKVBKEGbSevIsyZufsJW8dMjcvxiBz0e+

CnyWSdIpAB/Hh0WRKjlCYxBfr3WczjVSFU91YnrGIjB9rdiPwwwu5PWApKQF29E/

k77I53JghplVi9Y5o1SQs2fB5KLDQRz1bD1pFBhROcJAhINYFCavzPQf6hid7oiH

ZpZS7VYNLkt+bhJB8azAKmhu1MO5h9kau/UYUENLapf7+4K6ZklXh7ey+QARAQAB

tCFHbG93Tm9nIDxnbG93bmlnZ2VyQGN0ZW1wbGFyLmNvbT6JAlQEEwEIAD4WIQRh

ljCvcxqDWxUwBKZCg/0M3WcZ+QUCXzhS3wIbAwUJA8IaoQULCQgHAgYVCgkICwIE

FgIDAQIeAQIXgAAKCRBCg/0M3WcZ+SfxD/9HaVJuZeeECDKg81EzRIhZWp6Fg8Qp

K0+AxW7HFwF8s5kO4cVsTS7eYmKA2pDICWID9rDwIH+EyLKjMtWN9E4NuRQ0Cyeo

1TYOPd+zc1MdWT2H5CpKP7am1bqXr7VVs3FylbAVqGBYatSJFbYJT76RSEAXf/mc

B90g+ElTsXAF+vzT/QteFZ+O/XQfERkdxKXz2gbMLyRrjEQq4EHsXHmj6xEeZLYU

S1zivmcJAc13XYFx9JKV/Np66VPZw7+oYoMjwlY5w5NTSMcogdhDjYMulgK0pEuB

03EIwPzLvk9dP9jmJ5BVVyMIxAbTwThL7xpr4y20FqVTsEYtfWX6FRZpErxsslTI

BKdpp/EDXaZHuPfEE1KprqhPkUBmCBdHREsKRLMLRla8Jxn9JzGnmWHor/js3YfA

ipGCi/5IJ+1NxQFvNt+NBnq+CNI5ROEM7uEVT8M9f0IWaockNrpVl7/AFR9yis6j

mH1Zzrs1/uAY+DvDpYjq1Y/tGxif1yvlxUkY/KJ/J527dRcqM1bA7B8PMlNl5y/w

en0F4UTcVUWwqoTRvsTKOLUV08ljSgQd7QZZgrP+STXQNlAnz0Dx3yl+YVS0PQr2

VqWmcpLQrw0N+AVtfeGUmiWRDyXuFtPMhzZhStxD/pFhycvsEqmH08snL5sDCt6L

Ph9wsBj7+YY+DbkCDQRfOFLfARAA8U0O9FiyGXtbe58216e3hZo0Mah4JrEwUJ7v

F1pWYZSIOjk8PF1pXyi5OzP02vKnHFq2vYXruokMOlX3FvQZ19g84HMEj6TkLIGP

xISM8p08gGXtxHWt33CjsqSc8fqo4UAvQOMZjgRncKbwbG9T5uCSx0BoxtmJYVUI

1s+cJVPfc9vwAoasgB+/SQcGSpGGmBfT43ZzRYJFSFVMT8iMdoyK0Hdc9RxkwbGq

yKpJUxV9Wvxe5zpM/Ij+2+XlHegv9lQqBPXFprdZoxevMu0fdeZt7SJzKnme7am8

jZLOqNlpoyxsMHAX0gx2o2GqNOYXMyoF5tfy7vj7Alf6fXZrAfgIPwZ3qXeFXZsN

DZX7RM8U+Mqr+iUa4JvhK6jHnqLAezqZzXOym3tjjIzJG2wj+KPksw67SlTRux+p

WSIJvQ2Ym50ijrdnFgoUap1jbwpVgZd4GrF0aBeUUmYYKYC4nZWLYtYWJl3pELbb

ar5y9nXXdT3jPS2aQQ/glYWOq7mfTAVXK1m1DE1t4p7Mb6QkMrLxVsg2GSYxDlzb

Tf/EagIReRWtBS+Ae0pQzmuftF6/mKlBMssL04vNZuAf2d8N1RIbgf6chGjbspwf

WB7IbZy5fjUDNugkaQ9SYkVrEvqqHlOue8FjgAu7gFJNb3oVu01MmG/LM5inLdhb

VlkrbTUAEQEAAYkCOwQYAQgAJhYhBGGWMK9zGoNbFTAEpkKD/QzdZxn5BQJfOFLf

AhsMBQkDwhqhAAoJEEKD/QzdZxn55E4P+Mt1fzr9o5aZkTOLXFuTn23CXda7c1KG

nxVs2uSRJhGFiNQskM1vKPXtgy77aLTcPiP7BkxarrbsdmYaCRkbECZsEjOQnqjs

VzWXi8k/eXTTSQHNoPKEAGXljcUMyw1hT4mbfohrb9J2U5BaZtxXILTQPRtElI8m

1Cp2vQpXX4MLd7+UBeZSkLPSES6zKURJMWuDjaqzhtBOYd8Dz7kwaIomTQoauGS/

giB7W4vPlpa/UbxrkuOUaaRuQXTCMff966EEJCrV8TZ9+5BrFg6ZWPgFX+2llAbl

NcDIz+rP8zHA1+VjeErWo1aA3KBJE3tRkkIunHEwvD+9bLNJ9NcVYR1sYgGRMgEm

iwvnudueHM5Qn1Wkok7QTfmLRKlvQvqsSDUf+uadCpVvdva1mALrFXXiR3I4RqOW

n2rpYFw0MoSfstP89Sl363nImMiFT+ej1PFY8MwKr1tA1cngzfAKsKHn7g5GG999

KmyxujlnnTD60NruGRS9b6aR4budJYA7MN5c9PMIMo89alcinC+DbmWwEiBjLCQA

khzpvbTMtje3TvCd8Es1AKdADs5pUWRBWWHj911dlKJb26tJiko0IY1LtIdcpUND

z9UG8srmeCqCUl1zNaWlU7dPmyvQRGMUF9Uin4B0EQYIn6O5rQ00lxJn1F3QmdNs

cDgJAda58P8=

=3yoL

 

-----END PGP PUBLIC KEY BLOCK-----

 

  • Like 2
  • Funny 1
Link to post

     Great article. It's a bit beyond the scope in some regards, even of me, having an Associates Degree in computer information technology, much more the average computer user without training. Not downing the info whatsoever, because there are many who are more expert than me, who have and haven't had formal training. Thanks mich for your contribution, hope to see much more.

     I have a question or three. With a rooted phone, and changing the ip and mac address, does that hide you? Obviously the isp always knows who you are, your phone.

     Some yrs back a comp sec tech friend told me that a 13 digit pw with upp, low, numb and symb could be cracked using rainbow tables. Has that technology advanced more by now?

     Couple yrs back I was chatting with a gal (supposedly) on Google Hangouts. She, or he, was a money grubber. I'd get mad and block her, she'd unblock herself and message me again. She also tried to hack into my bank account, maybe successfully. I think the feds got her, after I reported it to the ic3.gov. But she was with the CIA then, so just a slap on the wrist, you know. I've also been hacked thru FB Messenger and Whatsapp. So, my question is, are the open source apps and  OS systems as secure as I think? In 2009, Microsoft had 1 million known bugs, Linux had 100. And I know that Microsoft creates backdoors for themselves or anyone they collude with.

     Again, thanks much and welcome aboard.

     Another thing, I've had some bad ops/informants/agents screwing with me for years, due to corruption I uncovered within gov when with the FBI, most of which has been stunted. I firmly believe that sometimes they, thru monitoring my phone, sometimes track gals I chat with on dating sites and unjustly "conscript" them, though they also tackle some nefarious ones. Does that sound like something they can do, even if a subject is using proxy servers, and other goodies?

 

     P.S. My computer professor, who has I think two Masters and maybe a Bachelor degree or two, did tell us how to make a computer totally hack proof. You put it in a room which no radio waves can penetrate, with a solid, pick proof lock. You unplug it, remove the nic and motherboard, smashing both to bits with a hammer, then leave, lock the door, and throw away the key. Lol!

Link to post

The field of data security, intelligence, and obfuscation is very difficult to navigate, because it's constantly changing and there just too much information to understand it all.  I'll go through and answer your questions in order:

 

A rooted phone can make security better if the ROM creator is a saint, or worse of the ROM creator is a normal human being.  Using a rooted phone and a ROM you're just shifting the visibility of your data.  One universal drawback is that ROM creators are always behind on updates compared to un-rooted OS's.  So your phone will be open to all the exploits the last update closed that are now very public until the ROM creator implements those fixes and re-publishes the ROM.

 

Changing the MAC is sometimes useful for circumventing DHCP whitelists on wireless networks, if you can see the traffic and handshakes of PCs using the locked down network.  In this case, you could pretend to be a whitelisted machine when the machine is turned off, so you don't cause conflicts in IP assignment.  Changing the IP would just cause local network conflicts and problems.  Easier to change IP with a VPN or VPS.

 

Open source software is safer because the source code can be inspected by anyone.  If the open source software creator is doing something shady like saving data or tracking or backdoors, it'll be found very quickly.  Closed source code can't be inspected, and yes Backdoors remain hidden in closed source code.  Microsoft is currently a lesser evil to other big name tech companies, in my opinion.  Still not great, but not nefarious in the name of profits and data collection.

 

I have used females in country to coerce men in high positions to be somewhere for x amount of time.  Sexuality is honestly one of the most consistent social engineering tactics available.  Russians overtly exploit this using Ravens (male) and Swallows (female).  Germans also specifically train agents in the 'arts' so to speak.  The biggest operational risk is if you hire a woman to keep a man entertained somewhere so you can get intel from an office or home, and he turns out to be a married closet homosexual, which happens.  If you are high enough on a feds radar, and are actively dating, It's easier to watch your online habits and seed a few agents on the websites you go to, rather than coerce someone you're already talking to.  The latter is possible, just more risk involved because a sympathetic woman who isn't an agent is far more likely to spill the beans and tell you she took money from agents to try and get info from you, or something else.

 

The only hack proof PC is an airgapped machine encased in lead on the bottom of the ocean and even that is temporary until someone goes down and gets it.  So yes smashing it with a hammer I would say your professor is correct. :) I used to work with a standard called "Tempest" protocols.  Tempest uses special coverings, blankets, and other materials to prevent or limit the distance in which EMI intelligence can leak.  Some Army and Navy mobile communication and data centers in certain parts of the world or close to conflict zones still take these measures, but it's expensive and modern equipment battles cooling air path blockages and overheating systems.

  • Like 1
Link to post

Oh I forgot one thing.  Secure messaging apps, I don't trust them.  I have used wikr in a pinch to avoid texting and as far as messaging apps, signal and wikr are ok right now.  I never used wikr plain text.  I always encoded via openPGP and sent encrypted blocks of text (Like the bottom of my first post) that the recipient would decrypt after copying it out of wickr.

  • Like 1
Link to post

     A few years back while doing research, I discovered that there are devices, including homemade ones, which capture the signals from a computer keyboard while the subject is typing, enabling the other to know exactly what is being typed. Apparently they do make keyboards which circumvent that. Can a device also capture the keuboard signals from a phone, other than dogitally thru the phone, as with a keylogger?

     Some years back, when I still banked at Wells Fargo, I had a premonitional brainstorm.

     With 'Fargo, to check your acc bal, other things, you had to type your card numb into the ph keypad. Well, I remembered seeing in a mail order mag a device you hardwire [I think had to be hardwired] to a phone, and as each tone per numb on a ph keypad is slightly different, it tells you what numb is dialed (similar to the old pen counter from the 70s). I thought, if they can do that, wonder if they can use that or other device digitally, to get card numbers (this was before I went to college for comp)?

     Here's the paradoxical glitch. I was sure even then it could be done. But I called Wells Fargo security division, a third party company, and told the idea to 2 or 3 "security" people, in charge of keeping billions of dollars safe and secure. They didn't have an inkling what I meant, and those people are...."trained" [yeah, trained for what?]. So I talk to a manager, and she finally comprehended, and said she'd look into it.

     The concept applies to all fields, from my experience, not just digital: scores of trained personnel who are complete doofs. Lol, I'm just a hayseed, a peon, a grassroots dude. Yet, it's so easy to blast trained investigators methods out of the water. Crazy, huh?

     Back in 2010 I told a girl where I worked, to be careful online, or off, because you could be spied on thru your comp camera. She thought I was mentally ill and got cops to watch me [most of whom know about that stuff and thought they'd stand on me to protect what they thought was a secret. Lol, buncha butt monkeys.

     Ok, sorry to be long winded, and thanks for your reply.

Link to post

Todd... there are "USB Keyloggers" that can be put inline between the keyboard and computer, that are not detectable by the computer O.S.   there is also keylogger software that can be installed, although some anti-viruses will detect it.... There ARE more technical means that are out of reach of all but the most technically savvy (and expensive) operations.   USB does emit RF that can be detected and decoded (and that is one method TEMPEST compliant hardware protects against.)    If audio can be recorded, some systems can differentiate the different sounds of different keys. (You need access to some of their data or a large sample set to build the keymap.

Rumor has it that Intels management engine on chips allowed backdoor access regardless of O.S.

 

The phone tones reader is a DTMF decoder.. easy software these days.

 

  • Like 1
Link to post
45 minutes ago, DasBlinkenlight said:

Rumor has it that Intels management engine on chips allowed backdoor access regardless of O.S

 

There is a way to disable that using an undocumented PCH strap that turns on a special mode disabling the ME during initial boot, but doing so risks bricking your chipset. I have managed to do it on all of my Dells, but it's a definite high anxiety effort.

 

Edit: Added link to the tech article with links to the tools. If you try this you do so at your own risk. http://blog.ptsecurity.com/2017/08/disabling-intel-me.html

  • Like 1
Link to post
On 8/15/2020 at 10:55 PM, Todd A. Slee said:

     Another thing, I've had some bad ops/informants/agents screwing with me for years, due to corruption I uncovered within gov when with the FBI, most of which has been stunted. I firmly believe that sometimes they, thru monitoring my phone, sometimes track gals I chat with on dating sites and unjustly "conscript" them, though they also tackle some nefarious ones. Does that sound like something they can do, even if a subject is using proxy servers, and other goodies?

Monitoring phones is easy and if done properly you will never know it is bring done.

On 8/15/2020 at 10:55 PM, Todd A. Slee said:

 

 

  • Hello 1
Link to post

They ( they guberment ) already know who we are, where we are, and how we feel about them........they have a contingency plan for anything we can come up with, and they have unlimited resources.........anyone who thinks any different is fooling themselves. Everyday our rights are slowly being eroded and just like good little sheep we just keep going to work and complaining And the wheels just keep,going round.  Im hoping trump wins but im planning on biden winning......my .02

  • Like 1
  • Hello 1
Link to post
3 hours ago, Travlr_45 said:

They ( they guberment ) already know who we are, where we are, and how we feel about them........they have a contingency plan for anything we can come up with, and they have unlimited resources.........anyone who thinks any different is fooling themselves. Everyday our rights are slowly being eroded and just like good little sheep we just keep going to work and complaining And the wheels just keep,going round.  Im hoping trump wins but im planning on biden winning......my .02

 

Trust me when I tell you they don't have unlimited resources. You'd actually be shocked at how closely the gov has to manage what it has to make it day to day, especially the DoD. The  days of a bottomless deployment and reset budget are long gone.

  • Like 2
Link to post
Guest ROLLCENTER

BOTTOM LINE 

What you do ONLINE is a FACADE 

YOU ARE IN THE CENTER IN UTAH ALL YOUR PHONE CALLS ALL YOUR ONLINE SESSIONS EVERY FUCKING BIT OF IT 

YOU ARE OWNED PERIOD BY THE DEEP STATE 

only way out is GO FUCKING DARK FOR LIFE NOT EVEN A DEBIT CARD OR A GROCERY CARD ALL CASH and then there are those pesky cameras  on the Highway on every street and back road  and PLATE READERS 

If you buy fuel or walk into a building you are known and it all goes to UTAH So bottom line YOU ARE ALL BUSTED have been will be for life 

https://nsa.gov1.info/utah-data-center/

Link to post
2 minutes ago, FloridaRifleman762 said:

I'm starting to think GlowNog is an actual glowie turned patriot. If such thing makes sense. Anyway great thread, you should post more.

 

Bump!

 

I am and will.  How about a real world example that happened today.  Emily Gorcenski is a transgender activist, and a Data scientist by tradee.  Today, she/he is asking for hi-resolution of boater registrations of boats who merely attended a Trump rally.  According to this activist, merely attending a rally with like-minded Americans is sinful and you need to have your details publicized.  She operates various websites, one of which aggregates and lists Americans, assigning them extremist affiliations and other data with no proof of said affiliation.  Suspected affiliation is all that is needed for you to be listed on: first-vigil.com

 

Today she openly asks for the photos because she wants to doxx people at the rally.  Doxx means to build a dossier of available information on individuals, so that their workplace, home, family, etc can be raided by Antifa extremists and generally harassed.  The biggest reason why this transgender has gotten attention today is because she/he is not only not experiencing any backlash from openly doing something against Twitter's TOS, she's followed by Twitter CEO Jack Dorsey.  The lack of action from Jack is not exactly complicit, but it implies that the CEO of twitter is complicit with doxxing and is ok with only applying punishment aspects of the TOS to ideologies that align with those counter to his own.

 

I know who currently employs Emily, she/he is a contractor and will be taking some action myself, but just to let you know how active your enemies are at trying to find out where you live.

 

antifa-5.jpg

jackdoxx.png

  • Hello 1
Link to post
8 hours ago, Travlr_45 said:

They ( they guberment ) already know who we are, where we are, and how we feel about them........they have a contingency plan for anything we can come up with, and they have unlimited resources.........anyone who thinks any different is fooling themselves. Everyday our rights are slowly being eroded and just like good little sheep we just keep going to work and complaining And the wheels just keep,going round.  Im hoping trump wins but im planning on biden winning......my .02

 

You don't have to worry about the government.  I will tell you why,

 

In the event where a presidential leadership in the US ordered a strike internally, It is estimated between 70-90% of people like me would defect in the sense of doing our trained duty (FBI/CIA/ATF/NSA).  Over 50% of the military would go inactive or actively try and eliminate the threat to Americans, even if it came from other Americans.

 

Think... take for example a situation where the order comes down for an F-15E to drop a small (B-61 bomb) nuke on Memphis because the entire city is on fire and the government wants to set an example and bring order to all the other cities that are rioting. The order has to go from the President, through the Joint Chiefs, down to a Squadron commander, to the maintenance officer to load the nukes, the pilots to brief, the primary and secondary aircraft, etc.  All those people grew up in America and have dedicated their lives to defending it, not nuking it.  Even if the USAF JCOS found enough 'robots' (servicemen/women who blindly follow unlawful orders) to pull this off without sabotage, you still have the Army JCOS to try and shoot down the jets with patriot missiles, Marines and Navy JCOS to intercept, etc.  Less than 1% chance a presidential order to nuke a city goes through without the presence of aliens or Russians/Chinese.

 

So give a little credit to the Generals and the commanders in the ranks, in all situations I have worked through, orders to harm Americans even in small engagements with MRAPs and Bradleys have resulted in refusing the unlawful orders, and immediate coups if the civilian politicians try to work around them or replace them.  Lots of very patriotic men with stars on their shoulders and family all throughout the nation.

 

Remember, we're all alive right now because of one man.  Stanislav Petrov.  You should know his name and if you do not go ahead and read up on him.

  • Like 1
Link to post
On 8/16/2020 at 12:33 PM, Todd A. Slee said:

     With 'Fargo, to check your acc bal, other things, you had to type your card numb into the ph keypad. Well, I remembered seeing in a mail order mag a device you hardwire [I think had to be hardwired] to a phone, and as each tone per numb on a ph keypad is slightly different, it tells you what numb is dialed (similar to the old pen counter from the 70s). I thought, if they can do that, wonder if they can use that or other device digitally, to get card numbers (this was before I went to college for comp)?

Touch Tone utilizes Dual Tone Multi Frequency signalling (DTMF) consisting of 8 tones 4 row 4 column forming a matrix of 16 buttons, though standard sets only utilize 12 buttons.

 

DTMF_Table.png.e0d73a52140c413c5847dd06c67f58b8.png

Decoding DTMF is very simple utilizing a rather inexpensive board.

 

https://www.amazon.com/Channels-Decoder-MT8870-Decoding-Controller/dp/B07VCHFSLC/ref=asc_df_B07VCHFSLC/?tag=hyprod-20&linkCode=df0&hvadid=416695724605&hvpos=&hvnetw=g&hvrand=3716839161576018371&hvpone=&hvptwo=&hvqmt=&hvdev=c&hvdvcmdl=&hvlocint=&hvlocphy=9012023&hvtargid=pla-870330679802&psc=1&tag=&ref=&adgrpid=94693386715&hvpone=&hvptwo=&hvadid=416695724605&hvpos=&hvnetw=g&hvrand=3716839161576018371&hvqmt=&hvdev=c&hvdvcmdl=&hvlocint=&hvlocphy=9012023&hvtargid=pla-870330679802

 

I know people myself included who can decode DTMF by hearing it, if you are sitting near me and call a number and I can hear what you are dialing, I know the number you dialed. 

  • Funny 1
  • Hello 1
Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...

Important Information

Use of this site is confirmation and acceptance of your understanding of our Terms of Use , Privacy Policy and site Guidelines . We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.