1441
Security / Re: Advice for extending a wireless signal, sharing internet access.
« on: February 26, 2013, 12:58 pm »
if they are line of sight go with an amplified directional antenna, otherwise amplified omni directional antenna.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
They also have dozens of Narusinsight super computers hooked up to split fiber optic cables at major internet exchange points in the USA, and they sample a metric fuck ton of internet traffic for analysis. They also have powerful traditional super computers, and although nobody knows for sure it is likely that they are working towards quantum computers capable of breaking most currently used asymmetric crypto systems. I know smart mathematicians and physicists who are worried about this, it is no longer in the realm of tinfoil hats to be concerned about quantum computing attacks on cryptography.
80% of internet traffic is video and a good chunk of that is porn. If they are randomly sampling at IXs, they are wasting their time.
Even if they were storing terabytes of data, there's no way that humans could cull it manually. They most likely search for key words related to terrorist groups and such.
So, if you can invent a steganographic technique that hides your Tor circuits (or email, or whatever) in porn videos, you're good to go.
In the Netherlands we have a "" so called"" secret sevice specialist. He told on national radio that everything is stored on hdd-nr 1 and screened. Al conversations that have a lot of words that are used in private ""sex"" conversations are dumped. Only those conversations that lack those "sex'""words and have a certain number of words like bomb, kill, etc are screened by humans. His name is Roger Vleugels. When you use substitute words for a hit and mix them with words used in a private sex conversation, your conversation should never make it to the second harddrive, let alone be listen to by a human of the secret service.
Roger Vleugels ... thank you for this """free"" info ! Now we know what to do.
wouldn't quantum computing computing also give us the advantage of being able to encrypt better tho ?
Also something else that may be of importance is that whilst I can't access my files like spreadsheets and word documents I can still access my GPG key-chain and encrypt things even though GPG is stored on the USB??? Wouldn't this indicate that the data itself isn't fucked but this is just a glitch that can be fixed? I haven't tried to decrypt anything yet but I'll let you know how that goes when I get round to it.
Not sure I understand this. So you can access GPG that is on the USB device? Is it a portable version of GPG or something? So Truecrypt actually does let you mount the device after typing in your password? Is the entire device encrypted or do you have an encrypted file container on it with other things that are not encrypted? If that is the case you need to give the path to the file container instead of the USB device.
Sorry I was not clear. The device is not mounted no but the GPG program and everything to do with it is on the USB but it's working and I can encrypt and decrypt things.
So Ron, would you say your dad was actively cruel towards you or just completely uncaring? Did he 'toy' with you? Or something else entirely? It must have had repercussions on you somehow unless your mom was aware of the condition and protected you somewhat.
Do you find yourself in relationships that are unhealthy today?
I just find these people completely fascinating, partly because I envy how they just don't care about anything other than themselves. I mean really, wouldn't it be a load-off your psyche to not be bothered by a conscience? Imagine the limitless activities you could engage in if you just didn't give a shit about feeling bad! On the other hand I don't understand how they 'fake' it through everything. Generally, they know they're different from 99% of everyone else and they wear a mask of what they think people expect. I mean we all do some acting day to day, but these guys take it a whole other level faking en entire range of emotions they know nothing about! Absolutely enthralling!
The empathizing–systemizing (E-S) theory classifies people on the basis of their scores along two dimensions: empathizing (E) and systemizing (S). It measures a person's strength of interest in empathy (defined as the drive to identify a person's thoughts and feelings and to respond to these with an appropriate emotion); and a person's strength of interest in systems (defined as the drive to analyse or construct a system). A system in turn is defined as anything that follows rules, key classes of systems including mechanical systems, natural systems, abstract systems, and collectible systems. Rules in turn are defined as repeating, lawful patterns.
cognitive empathy (also termed 'theory of mind' or 'mentalizing') defined as the drive to identify another's mental states;
affective empathy, defined as the drive to respond with an appropriate emotion to another's mental states.
Who cares if it looks suspicious... you can't go to jail for having an encrypted hard drive
For example in the UK you actually can:QuoteFirst of all, references – the law is here. You will be sent to jail for refusing to give up encryption keys, regardless of whether you have them or not. Five years of jail if it’s a terrorism investigation (or child porn, apparently), two years otherwise. It’s fascinating – there are four excuses that keep coming back for every single dismantling of democracy. It’s terrorism, child porn, file sharing, and organized crime. You cannot fight these by dismantling civil liberties – they’re just used as convenient excuses.
http://falkvinge.net/2012/07/12/in-the-uk-you-will-go-to-jail-not-just-for-encryption-but-for-astronomical-noise-too/
what i would like to know is how do the feds recover data from the HDD? what software do they use? it perplexes me? any1?
5 business partners decides to make a bitcoin address as a backup plan, if anything happens any 3 of them will have to be enough to access the account, but none of them must know the full password for the brainwallet.
I think this can be done with Shamir's Secret Sharing Scheme, and a brainwallet, but the partners have to remain anonymous to each other so they can't meet IRL to make the brainwallet and share the secret.
It have to be done in a way that they can remain anonymous, and without involving anyone else (eg. an attorney )
Is there a way to do this?