Mfw Cred Forums doesn't encrypt every drive they own

>mfw Cred Forums doesn't encrypt every drive they own
Its like you want the NSA to cuck you.

Other urls found in this thread:

nakedsecurity.sophos.com/2016/04/28/suspect-who-wont-decrypt-hard-drives-jailed-indefinitely/
arstechnica.com/security/2015/11/truecrypt-is-safer-than-previously-reported-detailed-analysis-concludes/
en.wikipedia.org/wiki/VeraCrypt#License_and_source_model
twitter.com/NSFWRedditImage

Who cares, the NSA can't read your hard drive online.

whole disk encryption with VeraCrypt
never bother using incognito mode
feels good man

I have nothing to hide so it doesn't concern me ;^)

>mfw Cred Forums doesn't use GNU/linux with only free software
Its like you want the NSA to cuck you. :^)

This et al

>he thinks he can evade the NSA's monitoring of him
Don't try it, buddy.

>he doesn't have his system set up with fingerprint verifying, retinal scanners and a death switch so that if you dont use type your password in every 6 minutes your hard drive explodes

>never be taken alive

feels good, fed

Show me your entire browsing history, upload it on MEGA.

Certainly, you didn't browse the internet yesterday.

>inb4 "well i don't trust you"

But you had noting to hide ;^)

Oops!

Checked

Im using incognito mode!

so after we redpill some NSA agents we get new allies ?

i mean for real. when real statisitics and quotes with sources are antisemitic then i guess the reality is antisemitic...

other than that i dont know what you guys are worried about ?

just quit the porn jew and you will sleep like little babies.

>implying you dont have a pound of thermite in your computer ready to go at the flick of a switch

>not leaving one drive half filled with the nastiest (but legal) porn and the other half filled with copies of this pic

I want the NSA to view my propaganda folder so they get redpilled.

Oh, and pepper in some Steganography in the snowden pics alluding to hidden messages in the porn

What's the best way to encrypt your desktop? I've had my phone encrypted for awhile because the process is easy as shit but for desktops I have no idea.

You can, to some extent. Modern encryption is effectively unbreakable. But the NSA is able to:
>Do timing and pattern analysis over a very large part of the Internet. This allows them to track VPN tunnels and TOR circuits.
>Intercept traffic, log it (this is what the Utah facility is for), and divert it.
>They can decrypt that traffic if they acquire the keys. HTTPS sites will probably share them on-demand (if they don't already) or don't protect them properly. They may be able to decrypt logged traffic after the fact in certain cases.
>They are incredibly good at finding and exploiting vulnerabilities. When they find new vulnerabilities, they sometimes chose to share them with the vendors to get them fixed, or to keep them for themselves.
>They can divert your connections and redirect them to an impersonating server that will serve you malware. Even with secure sandboxed applications, exploiting them might at least allow them to track you.
>They have "friends" all over the place that will plant malware wherever needed.
And lots of other stuff surely.
You can hide from them, but it is difficult and requires discipline. It's probably hard to use the modern web safely from them.

Oh shit, the NSA might see some picture I saved from Cred Forums, my tax returns, or my accounting homework.

or your rare pepes

can you really afford that drop in market share?

Encryption is pretty useless when you're posting stuff online or someone gets malware onto your computer desu senpai, it protects data at rest an that is it.

Yeah, it's for when they send ninjas to kill me and steal my computer. I don't want those bastards to get my porn stash and judge me. Or the draft of my manifesto. IT'S NOT DONE YET.

this happens when people brings Cred Forums to Cred Forums

NSA doesn't have jurisdiction in my country

ironic Cred Forums shitposters

>VeraCrypt

i will post some Cred Forums standar for newfags here
>don't use botnet OS (windows - OSX)
>install gentoo
>or opensource distro, ubuntu for newfags works as well
>chromium -nosync or SJWfox (no add-ons)
>only install open source software
>protonmail is a good email service (comunication with OpenPGP for everyone)
>built your PC
>don't browse CP or illegal content in your desktop if you don't want to be cucked by your ISP, hack someone else net and change your mac adress after and before (never do this in VM)
>have a keyboard code to delete all your data (ctrl+tab+s+space+intro+f12+insert)
>truecrypt 7.0 still a good encrypter, never downaload 7.++ versions

in other words, be richard stallman

>have a keyboard code to delete all your data
why? If the disk is encrypted, just powerdown the computer.

>jurisdiction
okay I lol'd

I think they have bigger fish to fry tinfoil hatters.

you don't want to be this guy
nakedsecurity.sophos.com/2016/04/28/suspect-who-wont-decrypt-hard-drives-jailed-indefinitely/

i posted again, lol'd

> thinking the american government needs jurisdiction to cuck you

i l o l e d

Plenty of room in their frying pans.
Yeah, that worries me.
Deniable encryption is probably a safer way to defend from that. Kind of a hassle though. I never bothered. And if they suspect you might be doing that, they'll keep you locked up for a while anyway.

Why TrueCrypt and not VeraCrypt? Why only 7.0 and not subsequent versions?

I didn't follow the whole story. The TrueCrypt servers might have become compromised. One day there was a warning on their homepage telling people that TrueCrypt was not to be trusted anymore. It looked like a dead man's switch that got triggered. Some developer got arrested or disappeared I think. People looked into the repos and nothing bad happened. Code audits were made too. Development was forked into VeraCrypt. It's interesting, I should've looked into it more. Maybe other user knows more.

There was a case in Australia not long ago of a woman murdering her husband, she bashed his head in with a giant mallet.

The court significantly reduced the sentence because they believed her story that he'd been downloading CP to his encrypted HD. They never gained access to the HD or found anything via the VPN, but they accepted her story.

Truecrypt
arstechnica.com/security/2015/11/truecrypt-is-safer-than-previously-reported-detailed-analysis-concludes/

opencryptoaudit.org/reports/TrueCrypt_Phase_II_NCC_OCAP_final.pdf


>veracrypt is not open source, that's why

>veracrypt is not open source
Yeah it is. They just changed the license. It's still completely opensource AFAIK.

Senpai please, NSA is the agency that proposed the specifications for the RSA encryption pretty much everyone uses.

>saving browser history

what am I? an idiot?

The NSA and other agencies do a lot to help secure the civilian infrastructure. It's their job. Not everything they do is a ploy. The US needs it to be secure. RSA was studied independently by cryptographers all over the world. It will probably be safe for many decades with large enough key sizes. Looks like only quantum computers will break it. And the NSA will probably publish new standards for cryptosystems more resistant to it in the next years. Which will also be independently verified.

they have no power here.

en.wikipedia.org/wiki/VeraCrypt#License_and_source_model
sure.

t. NSA
t. goyim
t. plumedia

which one are you?

plugmedia*

Whats it like being an adult who has nothing of value worth protecting?

don't listen to this jerk that is a lot of work.
We are fine with just your IP, SSN, and home address.

If you're actually including the NSA into your threat model, I would suggest moving out of the country and selling state secrets to governments like Snowden. Ohh yeah, I would download TAILS.

>not shooting and melting down your hard drives

I'm confident in my irrelevancy.

>having hard drives
its as if you wanted to get v&

Hello Nsa

>decide to be elite hacker and migrate to volatile memory
>power outage because third world

All those folders. Gone.

I use incognito mode

You do realize that the NSA has programmed back doors into virtually all computers, mobile devices etc? Hell some companies are either fronts for intelligence agencies or complicit with their activities. Any encryption algorithim your computer utilizes was most likely designed by them and probably has parameters set to where they can very easily break it.
TL:DR if a state power, especially the US wants to see what your doing they will and theres not really anything you can do about it. Encryption is really only useful against hackers