leftAF [comrade/them]

✌🏾🐻

  • 0 Posts
  • 17 Comments
Joined 11 months ago
cake
Cake day: September 20th, 2024

help-circle



  • Yeah it is not the end of the world, not much is. Humans didn’t even have endoscopy until the past couple hundred years. We’ll just always hope that the human labor saved by computerization was worth offloading, bugs aside if all goes well it should be more standard and there won’t be anything missed/delayed as a result. Outcomes materially affecting individuals are most sympathetic but there can be lost innovations from having fewer people exposed to inner working of a practice and potentially doing something no computer or human has before. Maybe endoscopy was worth it, I’m not an expert.




  • Truly anonymous networking looks like this:

    • Home -> Tor -> VPN/Proxy -> Tor -> VPN/Proxy -> Tor -> Web

    If they start restricting VPN technologies, look into the tlsfragment/V2Ray/shadowsocks proxy software out there for the first hop.

    Any VPN/Proxy is paid for with Monero via Tor. The network traffic is encrypted to one of the proxy servers with symmetric keys, installed by writing terabytes of data to them via SSH and then uploading a script which pulls the key from some random bytes throughout those terabytes. NSA isn’t logging every byte out of terabytes, just start/end & intermittent packets.

    I’ve never found a link to it again but I use something known to me as ts (tombstone, I think?) and it is a virtual driver which I add on the self-hosted proxies/VPNs that effectively forces everything to the pagefile, which is encrypted on a ramdisk volume. They have to be unlocked via KVM though.


  • You can’t just instruct ISPs to block all VPN-like traffic, making a total ban impossible to enforce

    I wholeheartedly believe they can and likely will before humanity’s brush with capitalism is over. They would just filter traffic from residential network endpoints more heavily than corporate/business users and start culling “illegitimate” business users. Then gradually close the loop on other methods of evading censorship. I do have a background contributing bug fixes to one of the big anti-censorship P2P networks out there.


  • Careful out there! Wifi network names (SSIDs) can be geolocated thanks to BeaconDB and other mass data collection. The more names from your device’s list of nearby networks someone else knows, the more accurately they can potentially be. Some firms just sell the Wifi network lists from consumer devices, some including the IP address the device used to report that list at the time too which is crazy.


  • The original one is pretty much nonfunctional for anything resembling “currency”, but there are improved versions of the “truly decentralized” tokens on distributed ledger. Monero is the only one with real utility nowadays, the others are just for speculation or useless.

    State-issued/single-miner tokens are actually probably pretty useful. Can provide total transparency on the volume of currency, totally prevents counterfeiting, and can be integrated with other national systems (lending, welfare, taxation, reversals/anti-fraud, maybe even removing money from the political process if some state wanted to take it that far, the ultimate statistics collection vehicle too if invoices or summaries in standard formats were embedded in the notes on each transaction for central planners). The privacy protection afforded by Monero & similar projects could even be supported for a reasonable amount of total monetary value per month, like cash allows, for each individuals’ wallet, to prevent privacy abuses where it’s not warranted.






  • I would run the tunnel from the local travel router (just another GL iNet one I guess) to your US wireguard server, and make sure nothing can route anywhere if that tunnel drops!

    Disconnecting the antennas is undetectable remotely, but the card will still sometimes pick up signals I think. Maybe a non-conductive faraday cage/bag/material can be wrapped/taped around it to make the odds very low.

    Removing the card entirely can theoretically trigger a TPM holding eg BitLocker keys to reset and make the drive unable to be decrypted without the recovery key. Save your recovery key within the OS if it’ll let you. If you can’t, from my research it doesn’t seem like TPMs generally reset over Wi-Fi cards going missing.


  • I’d remove the Wi-Fi card. Then use a travel router to bridge any Wi-Fi network you need to use and connect to the laptop via Ethernet.

    WiFi databases are a pain in the ass. For me the path of least resistance was leaving the laptop in the US with a KVM (PiKVM) to control it I had to use a home automation finger robot to access the power button in case of a hard reset being required and left an emergency way back in over an LTE. I’d had 8 hours of video calls in (then) 5 years working there so wasn’t worried about any of that. My microphone for meetings was Droidcam, I was in a position to install that on the laptop, and route to it “locally” over the same wireguard setup from my phone as I used to access the PiKVM.

    Sounds like your laptop is not very locked down, if you can attach any old USB device to it. If I were reattempting this today I’d probably go with the travel router as mentioned. Maybe if there’s an open USB Wi-Fi card we can hack it to always show a fake Wi-Fi list + real nearby networks added manually.