> Fuckos bust door down
> 3 seconds before they restrain you
> Why are you not fucked three ways to Sunday?
I have the door to my room lined with powerful electromagnets. If they come, I hit the switch to turn the magnets on. They try to carry my harddrives through the door, poof, all the data gone.
I'd probably die of a heart attack because of my severe morbid obesity just at the shock
There is no known instance of recovering unencrypted data from a hard drive that has been "zero passed" ONCE. So please don't do that 35 pass tinfoil hat bullshit, it takes forever, it rapes your disk, and no one can prove it's useful in reality. So encrypted or not, once you've zero passed a drive your data is gone.
Recovery of partially destroyed encrypted data can be tricky. But the specifics of your question depend on the encryption implementation.
Let's look at Truecrypt(therefore it's forks too)
Truecrypt will let you change the password to a volume without needing to re-encrypt the entire volume. It does this by generating it's own "volume key" and then applying your password to the volume key instead of to the drive directly. Volume key destroyed = data unrecoverable.
I'm a tripfag in this case. I usually post anonymously, only when I feel it would be beneficial to everyone to be able to keep track of various posts through a thread do I apply a trip.
stop trying to build a fucking brand. this isnt your fucking blog
Also remember that Truecrypt has NOT been fully audited yet. Phase 1 of the audit is done, phase 2 is the nitty gritty.
>The first phase of the audit focused on the TrueCrypt bootloader and Windows kernel driver; architecture and code reviews were performed, as well as penetration tests including fuzzing interfaces, said Kenneth White, senior security engineer at Social & Scientific Systems.
>The second phase of the audit will look at whether the various encryption cipher suites, random number generators and critical key algorithms have been implemented correctly.
Algorithms like AES are solid. The math behind it is good. Problems arise when people program implementations of the AES algorithm.
It is important to remember that the actual encryption algorithm is only one piece to a secure cryptographic framework. The NSA doesn't like going directly at an algorithm like AES because it is a losing game. They will do something like poison the random number generator that feeds the encryption algorithm, they will intercept device shipments for firmware level implants, blah blah.
I started typing this before you started typing that. We don't know why they closed the project, they said there are issues with their code and recommended bitlocker. Truecrypt is still being audited. The reason they're choosing to finish the audit with Truecrypt is because it will be easier to translate that into Truecrypt-forks than start with a fork.
I'm a 37 year old kissless virgin. I literally have nothing to lose. What do you think will happen?
I'm not too familiar with that product. I was only using Truecrypt as a base in my examples because everyone knows it. Most of my examples like applying your password to a volume key which is then applied to a drive are easily translatable to how other platforms work.
Oh thanks, glad it'll apply. one final question I only use FDE to protect from people actually stealing my PC not really too bothered about the government getting it. so will this be good against the average criminal?
Definitely. As long as you don't do something stupid like store the key in the clear on the drive, I don't think any criminal can break that...unless they use rubber hose cryptanalysis
I don't know. The claimed weaknesses in the Truecrypt code is only known to the developers of the project if those weaknesses actually exist and it wasn't an excuse to close the project.
Just pay attention to the Truecrypt audit. Once a fork like Veracrypt has been standing awhile feel free to switch if you like how Truecrypt was laid out.
Yes. To build on what was said here
You probably also want to require a password to unlock the operating system in use and then a short idle time to lock. They will be able to use it if they steal it in an unlocked state.
okay can anyone explain to me briefly what does hard drive backdoors mean?
How can government still spy when the drive is encrypted, i mean the data is encrypted, its not readable unless you apply a particular decryption algorithm with a specific key??
Just what IS this harddrive backdoor and what can the NSA do with it?
Here's a screenshot of disk cyptor, it has a feature so you can setup a keybind (ctrl alt shift or whatever) to blue screen you, guessing it's for if you get raided
>grab USB from poo
>stomp and grind
>or just reswallow it
>may not even be readable to to stomach acids
>may not come out at all
>they most likely wouldn't even check your shit,it's a computer crime bust.Not a smuggling ring
Still don't think they'd check feces
That leaves evidence behind.Leaving evidence that I destroyed something would not look good on me.Swallowing it,or leaving it hid in my drywall is the best way.
What the hell is wrong with me today.
I really hate you people.
You choose to live in your own comfort zone by thinking that if you dont have anything illegal, you dont need to worry about government spying.
Let me tell you, regardless of if you have something illegal or not, the government will spy on you. They dont choose to magically spy when you have illegal content but they spy all the time. So unless you want your diary to be read, bank details leaked, you fiance/girlfriend's nudes leaked, your family pictures ending up as fap material for NSA employees, you better watch out.
Moreover, wouldn't improving you security protect you from virtually all other malwares? There's literally no reason to not have a high level of privacy and security on your machine.
Bait or not, i took it
> because even if im not home my computer is locked and drives encrypted.
Literally don't have to do anything, so what ever happens next is just for kicks and a good story.
> if i was home
> hit kill switch
> dd/shred script to take care of the headers
Have the option of doing nothing and asking them how they take their tea, or doing nothing and making a scene. I win either way.
>police bust in
>yank out powercord
>they slam me to the ground and cuff me
>"AM I BEING DETAINED?"
>"AM I UNDER ARREST?"
>"AM I BEING DETAINED?"
>"I DON'T HAVE TO GIVE YOU MY NAME"
>"AM I FREE TO GO?"
>They let me go for being an annoying little shithead
Nah. Those sorts aren't unaware they're being watched, it's more that they're perfectly aware and simply choose not to care under the false belief that if they aren't doing anything defined as wrong, nothing bad will happen to them. They believe they are living within a grand screening filter, that's protecting them, the children, and their family. Or something.
It's a naive idea, and a myopic one, The reality is that they choose to look at it in a limited sense, ie, refusing to put 2 and 2 together, because they know they can't do anything about it. They feel anxiety and choose to get rid of it. There might also be an element of them just, for whatever reasons, simply lacking the mental faculty to think in such a way. People walk by cameras everywhere, all the time, every day, and they don't even think about it. Because it's detached, they think they know its purpose and likely use. Yet run up to them with a camera, start filming, they'll freak out. They've been met with what they think is greater ambiguity. Again, a naive idea.
If you offered to install cameras all throughout their house and claimed you'd only check em on a random whim, or when they've done something wrong, most people would object. Yet it's no different. They don't like being watched in the bathroom. Why not? Ain't doin' anythin' wrong, are ya? What, you just like a bit of... oh, there's that word again, privacy. And yet in the same breath they'll say they don't care about the government and various corporate bodies having information that allows them to build extremely accurate psyche profiles. Where they go. Who they know. What they say, what they DON'T say, and when. Who those people know, their social circles. What stress them, how to push them, where they'll break, their constant location even. Everything down to what to something as basic as when they sleep and what they jerk it to. Yet a stranger on the street taking pictur
es is someone more invasive, threatening, and meaningful. Because it's direct. Nothing more, nothing less. They refuse to see a bigger picture and weight ambiguous ideas with any kind of accuracy.
I've also begun to think about it from an evolutionary perspective. Are some people perhaps hardwired with an affinity towards faith in authority? Towards mindlessness? Is it not a function of upbringing, environment, or whatever, at all? Perhaps some people really are born to be followers. Perhaps this can be correlated with muscle ratios, I imagine those who's ancestors developed slow twitch fibers would have developed those sort of complex hierarchies. Whereas the relatively crippling, inefficient, and food source limiting nature of high ratios of fast twitch, would have necessitated high individual intelligence and perception. That's just an idea fermenting... I try to push such thoughts out of my own mind, and not take it too far. Hypocritical in a way.
Either way. You can't always know what's "wrong" and to who. You can be set up. You can be manipulated. They can know where to find you and how to break you. There are any number of ways that being spied on for some delusional collectivist greater good is an awful thing to blindly accept. These morons are going to drag everyone else down with them, it's already nearly a 1:1 Orwellian society If you want to look at it through that lens.
I half expect to leave a word out in the statement correcting my initial one, despite the fact that I should be more rigidly running checks on my preparser / post processing functions as a result of being aware of the possibility of further fucked sentences.
>> Why are you not fucked three ways to Sunday?
No cheese pizza. Nothing too crazy besides maybe one or two torrented movies and chinese cartoons. No previous arrests, serious violations or complaints of any kind.
Show DoD badge.
Probably free to go. If not, call close relative who owns and operates a law firm. kek all the way to the bank.
magnets inside door frame
thermite underneath tower
is what I would do with an extra grand randomly lying around ( i actually have no idea how much powerful enough magnets would cost, nor thermite, but I'm assuming $1k USD would cover it)
but I do/have nothing of interest except torrenting a movie here or there so I'm an unlikely target
How viable is this?
>somehow set 2 passwords.
>one unlocks the pc, the other triggers format/turns fans off to blow up termite/ect
>nigger safety agents come in
>ill give you the password m9 dont shoot
>give them the kill password
>no loli for obongo
No. They do not bypass the firmware on the device, HDD or SSD.
But the paper linked here might give you more insight
This paper looks interesting. I'll have to sit down when I can absorb it sometime, thank you for sharing.
>There is no known instance of recovering unencrypted data from a hard drive that has been "zero passed" ONCE
>" As Gutmann explains, when a computer attempts to write a one or a zero to disk, the media records it as such, but the actual effect is closer to obtaining 1.05 when one overwrites
with a one and 0.95 when a one overwrites a zero. Although normal disk circuitry will read both values as ones, “using specialized circuitry it is possible to work out what previous ‘layers’ contained.”"
Improbable, but not impossible, anon.
Give me something with some substance, show me my errors, and maybe I will.
"Get over yourself" doesn't cut it.
He didn't say it was impossible. He was just saying that if it's that fucking tough to recover a 1-pass, then it's obvious that 35 is way overboard. I'd go with 3 random passes. I doubt the NSA could recover that at that point
Find me one person that has actually done it, then. I'll wait. Take your time.
Don't quote Gutmann to me. I brought up why a 35 pass wipe was bullshit for this reason specifically. Did you know most of the passes in the Gutmann wipe are designed to flip the bits in MFM/RLL encoded disks, which is an encoding that modern hard disks do NOT use? No, you didn't know that.
//In the time since this paper was published, some people have treated the 35-pass overwrite technique described in it more as a kind of voodoo incantation to banish evil spirits than the result of a technical analysis of drive encoding techniques. As a result, they advocate applying the voodoo to PRML and EPRML drives even though it will have no more effect than a simple scrubbing with random data. In fact performing the full 35-pass overwrite is pointless for any drive since it targets a blend of scenarios involving all types of (normally-used) encoding technology, which covers everything back to 30+-year-old MFM methods (if you don't understand that statement, re-read the paper). If you're using a drive which uses encoding technology X, you only need to perform the passes specific to X, and you never need to perform all 35 passes. For any modern PRML/EPRML drive, a few passes of random scrubbing is the best you can do. As the paper says, "A good scrubbing with random data will do about as well as can be expected". This was true in 1996, and is still true now.\\
— Peter Gutmann, Secure Deletion of Data from Magnetic and Solid-State Memory, University of Auckland Department of Computer Science.
Hard drive platters are hitting 1TB per square inch. Go over it with an electron microscope if you want. Maybe you'll find what you're looking for in 15 years.
>that dude in the background doing this pose
>SWAT busts in
>seize all my stuff
>find tranny porn and pirated video games
>I feel embarassed
>release me, apologize for hitting up the wrong house
>tell me I'll have my stuff returned to me soon
>build new pc
>the torrenting continues
>finally have my stuff returned to me after a ridiculously long time
>I now have twice the porn, twice the games, and twice the computer
>mfw I'm okay with this
Basically... I always try to find the silver lining in life.
That's the problem with persistent identity. Perhaps you gain some credibility, sense of authority, or intimidation in people's minds as they see you around relative to any given topic. Perhaps you just become some tripfag.
But either way, it tends to result in some overplayed response to mistakes rthre thann juts
rather than just correcting*.
This form of communication is not suited to deep proofreading, catching all mistakes, and have levels of confidence what you just said will be interpreted (or be at all) how it is intended.
You'll be alright. Not at all intending to be predatory or prick-like. You were just a bit of a pushy asshole to the anon above, and then pulled a self security 180.
I wasn't a bit of a pushy asshole. I was a full pushy asshole. Because the person I am replying to is an idiot.
I said there is no known instance of recovering unencrypted data from a disk zero-passed once, he links me to a decade old paper that is dealing with old encoding technologies to make sure I understand it's "improbable" but not "impossible."
There is a certain type of person that deserves to be treated like an idiot.
You sir, do not try to find the silver lining in life.
I could not help but notice your png was not optimized anon.
I have optimized your png.
Your png is now optimized.
>Because the person I am replying to is an idiot.
And? So which is it, do you care or not?
What do you want from the situation?
You need to make up your mind.
>to make sure I understand it's "improbable" but not "impossible."
Anon is correct. Your have no proof it is impossible, your only evidence is purely indirect and merely suggestive, but not close to what any reasonable sort would consider absolute or conclusive. You are ignoring ambiguity in favor of believing you possess an absolute truth that you do not possess. There are countless prominent examples of this all throughout history, pre-"science" included, many of which were eventually proven wrong, sometimes even mere months after they were stated to be immutable truths. Ultimately, you don't know if there are techniques (viable affordances of physics relative to the medium) to recover data, you don't even know if they exist right now and are known by others. You're assuming, and doing a poor job of putting your framework of knowledge in a realistic perspective. Even if everything points to, supports, and implies your conclusions, that is not proof.
If you're just pissed about the way they said, or the context they put that forward in, what's all this other shit about?
To be entirely blunt, from my angle there's an equal number of ways you deserve to be treated like a narrow minded, arrogant fool. Guess I'm taking some kind of high road for today.
That isn't what I was doing at all. Really long post to still consider yourself taking the high road.
I never implied it was impossible. I said no one has given any evidence they have done it, and they have not. Half of the information he brought up is entirely irrelevant to modern disks. We are talking about modern disks. He is an idiot.
My door has a reinforced frame as well as a large metal bar. The minute it takes to break down would be enough time to smash the external and put on some pants.
Except if they come through the windows or ambush me outside, but I doubt they're getting paid enough for that.
It's not even that you're necessarily "wrong" about something, you just come off as the classical, elitist, neckbeard going off on some anti-societal megalomaniacal rant assuming the worst about everyone. Your post just served as a vehicle for self-masturbation.
As a heads up, 99.9999% of all Internet users (yourself and I included) have used the Internet for hours if not days on end without any negative government interference. Yes, like you said, the possibility is there, but it just simply isn't intuitive to be paranoid about such stupid, insignificant shit. People have better things to worry about. We've been doing this Internet gig for 30 years.
I swear it's like guns come with a complimentary Spice and Wolf nowadays.
An adequate way to act & prepare:
>36 Separately encrypted volumes in a sort of RAID 0 fashion (if you don't have access to all 36 volumes, you can only access partial data)
>Login program takes multiple passwords in rotation/sequence (to prevent physical spying), including a trip (to relinquish in interrogation).
>USB stick must be plugged into a certain USB port corresponding with the day of the week, or trip.
>> Fuckos bust door down
>Press pre-determined keys in tandem
>Unmounts all volumes
>modifies cloud-based boolean value to true so friends/loved ones know my station has been compromised (awareness, and prevents impersonation)
>shows some CP or something illegal so they don't think I was trying to hide anything
Not sharing all.
Also, I've always wondered, what if you just happened to leave a bear trap or some really slippery banana peels right in front of the door (on the inside)? You couldn't possibly be held responsible for where you place things on your own property, right?
>tfw never participated in criminal activities
>tfw they'd find nothing on my computer
>tfw you live a pretty bland life
guess i'd be fine. you fuckos got some fucked up shit on your computer or what?
sorry for spooking you anon. i'm just a boring dude. not trying to get anyone here to incriminate themselves. it's just funny that you guys pretend like you're hiding state secrets and shit when in reality it's just pirated music/games/chinese cartoons. that shit is a civil issue, not a criminal one. the worse you get is a letter in the mail, not swat busting down your door.
Have you ever saved any image from a thread in which people were posting innocent images along a theme?
Have you checked all of them to make sure that there is only one image in the file?
Try running some through imagemagick's identify mode, with verbose enabled.