/cyb/ - Cyberpunk Fiction and Fact

Cyberpunk is the idea that technology will condemn us to a future of totalitarian nightmares here you can discuss recent events and how technology has been used to facilitate greater control by the elites, or works of fiction


If you want to see the latest posts from all boards in a convenient way please check out /overboard/

Name
Email
Subject
By clicking New Reply, I acknowledge the existence of the Israeli nuclear arsenal.
Comment
0
Select File / Oekaki
File(s)
Password (For file and/or post deletion.)

lewd.gif
OPSEC
Anonymous
No.65
66 70 71 1234
How many layers of autism OPSEC are you on?

My router runs DD-WRT (Hardened), I use DNSCrypt, and I have a librebooted Dankpad running OpenBSD. (I use the thinkpad for things that require privacy) and I follow the obvious practices of OPSEC.

My main machine runs Debian GNU/Linux using only free software. I dual boot with windows server 2017

My home folder is encrypted using eCryptFS over in GNU/Linux land
Anonymous
No.66
67
>>65
I run my main on a windows 8 machine using the RTM that was leaked on /g/ a few years back, I install and immediately turn off updates, I then turn off the fire wall and install chrome without an anti virus
my login goes right to desktop without a password
Anonymous
No.67
68
>>66
nice meme
Anonymous
No.68
69
>>67
not a meme, that's actually my setup
Anonymous
No.69
>>68
Well, I'll give you some unironic advice.

>The RTM that was leaked on /g/ a while back
MyDigitalLife forums has unmodified MSDN ISOs that you can use. Verify the checksums on the MSDN download center yourself.

>I turn off updates
Don't. Just don't. That's one of the most retarded things you can do in terms of security.

>I then turn off the firewall
Well, most routers provide one anyway, but again, for what purpose?

>Install chrome
Install Pale Moon or Firefox ESR, along with uBlock Origin and HTTPS Everywhere. Enable some filterlists.

>without an anti virus
Most people don't need an antivirus, unless they install shit from torrent sites regularly.

>my login goes right to the desktop without a password
set one
Anonymous
No.70
>>65
I'm using a VPN, am careful with letting Javascript and ads in and that's pretty much it.

Going to put together my fully encrypted workstation with separate VMs for everything Any Day Now, I'm just going to read one more greentext pastebin first though.

>OpenBSD
Nice. The community has a reputation for being full of raging autistic condescending assholes, but I've met a few guys in person and had a great time. Should probably try it out someday.

And their "put up or fuck off, idiot" attitude should at least keep SocJus entryists away from the project.
Anonymous
No.71
72 295
>>65
0 layers
I have given up
99% of security methods are not good enough
If i route everything through secure networks I'd be more suspicious
right now all i can do is attempt to fly under the radar of my near fascist government

My opinions are illegal
my vidya are illegal
my memes are illegal
my god damn memes are fucking illegal

I was raised to question things, be sceptical
There are a things in my country that being even slightly skeptical of will get me jailed for years, and heavily fined

I lost this war for freedom before I was even born
Anonymous
No.72
73
>>71
Are you German?
sempai
No.73
>>72
yes
Anonymous
No.229
294
OPSEC is a meme. Software is nothing more than placebo when your hardware may potentially be compromised without your knowledge.
Anonymous
No.294
>>229
Big Brother isn't the only threat out there. There are countless weaker threats on the web that you can defeat with good security practices.

Just because you may not be able to defeat nation state level intelligence services that may have compromised hardware at a base level doesn't mean that you should give up on security. There are plenty of Chinese scammers, drunk Russian hackers, and the 400 pound basement man known as 4chan that you can stop.
Anonymous
No.295
>>71
Nigga you should consider moving to the U.S.
Anonymous
No.1233
File (hide): 16BC06F8DEB46F3310A04D25E98E4E24-4200068.mp4 (4.0 MB, Resolution:854x480 Length:00:00:40, Hot Identity Protection Tip.mp4) [play once] [loop]
Hot Identity Protection Tip.mp4
Hot Identity Protection Tip.
Anonymous
No.1234
1236
>>65
glad to see this topic got a bump. have another.
I am only just smart enough to install and deploy openwrt, does anyone know how to harden it?
Anonymous
No.1236
1258
>>1234
>install and deploy
I can't even seem to do that, just bricked a router the other day. Did you have to go through a couple steps or was it as easy as clicking "upload firmware" on the config screen?
Anonymous
No.1258
>>1236
This was me, updating. It really wasn't too hard, just don't be a clueless newb and try to install firmware via a wireless connection. Be sure to follow the instructions to the letter, but it's got a decent GUI so it's much like using any other one after you get past the first part (which was exactly as described). Maybe try to practice with a cheaper router first if one's available. There's lots of used ones around.
Anonymous
No.1280
1.png
2.png
3.png
12F8D9E89F5BE7F5B4D9EC6C57E176E0-309545.png
>InfoSec 101: Disk Encryption
>Securing your data versus an adversary with physical access to your devices
>In this article and guide we will discuss the whys and hows of securing your data versus an adversary that has physical access to your computing and data storage devices (desktops, laptops, cell phones, removable storage media, etc.).
https://wolfish.neocities.org/posts/articles/infosec_101_disk_encryption/
A very, very, very informative article.
Recommended is the introductory section about "plausible deniability" with Veracrypt.
Anonymous
No.1307
1308 1309
1986098.png
I hate to say it but if one of the 5 eyes are directly on your ass then no amount of OPSEC will work. Like I said they would have to be directly interested in you. Only true OPSEC for complete security is in person or in writing.
Anonymous
No.1308
>>1307
This is known.
https://wiki.installgentoo.com/wiki/Security
Anonymous
No.1309
B0B331DE4E8494F2F75BF10A58EB56BE-352754.png
DBEF3F693604C213407042A346743E27-124364.jpg
When all else fails paranormal operational security is something that is rarely accounted for when in relation to technological landscapes.
Piss poor passwords aside, being 'lost' in the data is a great boon.
>>1307
That reminds me printers are scary machines.
Anonymous
No.1414
kax-17.jpg
glowniggers.jpg
>Hundreds of Tor Relays are Being Used to De-anonymize Users
>In this video I discuss KAX17, the name of a threat actor who has been trying to de-anonymize users on the Tor network since 2017, and has recently scaled their efforts. Read the full article for yourself
https://nusenu.medium.com/is-kax17-performing-de-anonymization-attacks-against-tor-users-42e566defce8
https://www.youtube.com/watch?v=pvBAaUPzvBQ
Anonymous
No.2482
2513
File (hide): 995D4C6C9F8145591A51B12B404D7ED7-1263430.mp4 (1.2 MB, Resolution:222x480 Length:00:00:54, Im Not A Robot Check EXPOSED).mp4) [play once] [loop]
Im Not A Robot Check EXPOSED).mp4
What happen when you press the "I'm not a robot" button.
Anonymous
No.2512
opsec.jpeg
>Anonymity Online: Is It Possible to Not Leave a Trace?
>Given that close monitoring online (online surveillance) now begins at an early age, digital hygiene should be well taken care of ever since one’s childhood.
>All in all, one should bear in mind that your unique digital signature consists of:
>1 - factory identifier IMEI of your smart phone
>2 - the list of apps and files on your device such as your laptop or your mobile phone which is available to many devices and apps, your antivirus, your computer viruses and your Trojans, your browser, your operating system, your office apps and all the office apps of your colleagues etc
>3 - your Bluetooth environment – all the devices your Bluetooth gets in touch with to share data or which it has ever got in touch with and joined digitally, your music devices at home or in your car, your ear phones, your voice tools etc.
>4 - your Wi-fi environment – a list of all the Wi-fi devices around your place of work or your home.
>5 - your browser history – a list of the websites and internet services you regularly visit
>6 - your list of friends on social media – your social impression is unique even if you decide to use a pseudonym to go online. That list exists with the social media platform as such, and with all the ‘monitoring’ programmes and in your browser as well.
>7 - your lexical signature – a group of your favourite words, phrases and sayings, and even a unique combination of your common typos
>8 - your face and faces of others on your photos and videos on social media – a combination of all the faces including yours among others, is also a unique identifier.
>9 - your geographical signature – a list of your routes and geographical points you go to, either in your own city or outside. It exists in >10 - your navigator or your navigation apps
>11 - your voice signature – your voice digital footprint or ‘impression’ you leave either while using your mobile phone or the microphone on your laptop.
>12 - your search list key words – apart from the situational keywords to search depending on the situation, there are regular search keywords you often look up and type in, and their combination is certainly unique i.e. your own, and it exists on your favourite search engine and browser.
>13 - your list of favourite topics – for examples in the news portal
>14 - a list of the devices in your neighbourhood – for example, your internet provider ‘can see’ which other mobile devices are normally in the immediate vicinity such as your family members or close colleagues.
https://strategic-culture.org/news/2023/04/04/anonymity-online-is-it-possible-to-not-leave-a-trace/
Anonymous
No.2513
I want.jpg
to smooch a mare.PNG
on her butt.jpg
>>2482
What in fuck's name is a "fitzy wippa"?
Anonymous
No.2597
26bed0bc6fdfa3f2.jpg
Be aware faggots, check for cyrillic characters before you click any link.
Anonymous
No.2664
code.jpeg
intentional.png
code2.png
>Code Kept Secret for Years Reveals Its Flaw — a Backdoor
>The backdoor, known for years by vendors that sold the technology but not necessarily by customers, exists in an encryption algorithm baked into radios sold for commercial use in critical infrastructure. It’s used to transmit encrypted data and commands in pipelines, railways, the electric grid, mass transit, and freight trains. It would allow someone to snoop on communications to learn how a system works, then potentially send commands to the radios that could trigger blackouts, halt gas pipeline flows, or reroute trains.
>The vast majority of police forces around the world, aside from the US, use TETRA-based radio technology, the researchers found, after conducting open source research. TETRA is used by police forces in Belgium and the Scandinavian countries, East European countries like Serbia, Moldova, Bulgaria, and Macedonia, as well as in the Middle East in Iran, Iraq, Lebanon, and Syria.
>Additionally, the Ministries of Defense in Bulgaria, Kazakhstan, and Syria use it. The Polish military counterintelligence agency uses it, as does the Finnish defense forces, and Lebanon and Saudi Arabia’s intelligence service, to name just a few.
https://www.wired.com/story/tetra-radio-encryption-backdoor/
Anonymous
No.2668
>>2667
Ttttthhhhanks?