this post was submitted on 05 May 2024
809 points (100.0% liked)

4chan

4698 readers
35 users here now

Greentexts, memes, everything 4chan.

founded 2 years ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] NateNate60@lemmy.world 300 points 11 months ago (3 children)
[–] MudMan@fedia.io 106 points 11 months ago (1 children)

Right? It's kinda nuts how much this quixotic prepper-style power fantasy permeates some parts of the Internet. Hell, even that strip is conceding the basic point that there will be a cabal of evil people digging for all their super-important secret files at some point.

[–] MrVilliam@lemmy.world 11 points 11 months ago* (last edited 11 months ago) (10 children)

Kinda makes you wonder what's on their drive that they're so concerned about being uncovered. I'm all for privacy as a right, but people don't usually go balls to the wall on their computer security just to protect cat memes or tax documents. People won't even assume just regular porn stuff. People will assume terrorist plots or sex crimes or stolen classified stuff. Idk, if my NSA agent cares enough to break basic security just to find out my porn search history, then I'm just thinking that that's wasted tax dollars. I'm not that interesting.

Edit: I'm not saying don't do simple encryption, I'm saying that putting up ten barriers and having paid services and using multiple vpns has drawbacks of cost and performance, so what are the odds that somebody would go to all the trouble for data that nobody would care about. If you saw a giant vault in somebody's basement, you would assume there's something interesting in there.

[–] rob64@startrek.website 75 points 11 months ago

That was a long walk for a short drink of "I've got nothing to hide."

[–] Ookami38@sh.itjust.works 42 points 11 months ago (2 children)

Kinda makes you wonder what's in their bedroom they're so concerned about being uncovered. I'm all for privacy as a right,but people don't usually go balls to the wall on their bedroom privacy just to not be seen changing. People wont even assume just regular sex stuff. People will assume terrorist plots or a murder dungeon or your mom.

Privacy is privacy is privacy. There's no need to justify it. Desiring it isn't an indicator of any wrongdoing. The second you are okay with literally every aspect of your existence being completely public, and I mean all of it, is the second your statement holds any ground.

[–] NounsAndWords@lemmy.world 9 points 11 months ago (4 children)

I get your example, and agree with the premise that "if you have nothing to hide..." is never a good argument, but if someone had security cameras surrounding/within their house, and 4 different locks on their bedroom door, and then a high quality safe in the bedroom, I would absolutely think there's something more than sex toys in there. That's still never a valid basis to search their stuff, but if there was nothing significant in there, that would feel odd.

[–] Ookami38@sh.itjust.works 17 points 11 months ago

I completely disagree. It may feel excessive, but my only thought would be "there's someone who cares about privacy." We only assume this stuff is weird because we've indirectly encouraged only weirdos to do these things. If we instead normalize it as just part of home security, like locking your doors, then it's just another thing careful people do.

[–] photonic_sorcerer@lemmy.dbzer0.com 14 points 11 months ago

What if I find enjoyment in cryptography and privacy as a hobby?

[–] semperverus@lemmy.world 7 points 11 months ago

fuck, he found out about my sex-toy safe

[–] aStonedSanta@lemm.ee 6 points 11 months ago

This is what we call Bias.

load more comments (1 replies)
[–] semperverus@lemmy.world 27 points 11 months ago* (last edited 11 months ago)

I explicitly go balls to the wall to protect my tax documents and cat memes, for a couple of reasons:

  1. I am very passionate about the concept of "You shouldn't have to have anything to hide to deserve the right to privacy."

  2. People should't "poop with the door open" (to use a metaphor), so I keep my door shut.

  3. Opinions and ideals can get people hurt if made public, and I want to protect both mine and those of the people i talk to (even if i don't agree with them).

  4. If everyone took their security and privacy this seriously, nobody would have to worry about some nonce assuming they were committing crimes just because they were protecting their right to privacy. I'm being just one more drop in the bucket.

[–] Prunebutt@slrpnk.net 27 points 11 months ago

Climate activists are currently prosecuted as domestic terrorists in the US.

Encryption is there for protection against the state (who can't easily drug you and beat you up for giving out a password).

[–] 4am@lemm.ee 17 points 11 months ago

Your false assumption is that basic security isn’t broken constantly and automatically for them to just browse the results of on a whim.

The issue is that you don't have any say in what it is to be concerned about being uncovered. Regimes change, and so do the things that are dangerous to uncover. Today it might be ok showing support for LGBTIA+ rights where you live, but that might change at a votes/coups notice. Damn, supporting trans rights might get you in physical altercations in some areas in the US if you are found out, or might make it impossible to land a job.

The Nazis used data that was accumulated by prior administrations to choose their victims.

[–] surewhynotlem@lemmy.world 10 points 11 months ago

if my NSA agent cares enough to break basic security just to find out my porn search history,

Police have regularly used their inappropriate levels of access to stalk and harass women they like. You may not be interesting to the government, but you could easily be interesting to a malicious actor who works for the government.

[–] meiti@lemmy.world 10 points 11 months ago

Everything I use is encrypted as hell. What do I have inside? To be honest nothing. Just your usual stuff. But why the heck should I let someone to get into my fucking harddrive? No, let's make it as difficult as possible for those assholes.

Having said that, I'm stuck multiple times by my own encryption. Lost the keys, etc. And in case something happens to me, no one can access my legacy or docs. That's my only doubts. Moreover, I'm aware that it only protects my data at rest, while the PC is on, there are probably a zillion zero-days I'm not aware of.

load more comments (2 replies)
[–] A_A@lemmy.world 39 points 11 months ago* (last edited 11 months ago) (3 children)

Rubberhose (file system) Deniable encryption
https://en.m.wikipedia.org/wiki/Deniable_encryption
The notion of "deniable encryption" was used by Julian Assange and Ralf Weinmann in the Rubberhose filesystem (...) In cryptography, rubber-hose cryptanalysis is a euphemism for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by coercion or torture—such as beating that person with a rubber hose, hence the name—in contrast to a mathematical or technical cryptanalytic attack. (...)

[–] Lojcs@lemm.ee 7 points 11 months ago

Encrypted stenography

load more comments (2 replies)
load more comments (1 replies)
[–] shneancy@lemmy.world 190 points 11 months ago* (last edited 11 months ago) (2 children)

this is exactly the sort of thing you imagine in the shower to feel good about yourself

[–] Worx 42 points 11 months ago (1 children)

I imagine other things in the shower when I want to feel good ;)

[–] Huschke@programming.dev 52 points 11 months ago

Like compiling a kernel? Same!

[–] Dasus@lemmy.world 19 points 11 months ago

Imagining that they're hide&seek world champions because they've always won.... when playing with imaginary friends.

[–] doggle@lemmy.dbzer0.com 90 points 11 months ago (2 children)

what does he do all day?

He administers his system.

[–] dubyakay@lemmy.ca 17 points 11 months ago

He's also a fursuit connoisseur.

[–] iAvicenna@lemmy.world 10 points 11 months ago

and configures vim obviously

[–] OozingPositron@feddit.cl 77 points 11 months ago (6 children)

Buy a thinkpad x230 and install heads. Write protect the flash chip. Put nail polish on the screws and take high resolution pictures to ensure signs of tampering. Do NOT use a HDD or SSD. They have DMA so a malicious firmware could do a lot of damage, use of USB is preferred since they do not have DMA. Completely remove the microphone, sound card, webcam and the WWAN card from the laptop. Remove the fan to prevent binary acoustic data transmission. Replace the default wifi card with a supported atheros card. Disable wifi when not in use, preferably by physically removing the card. Make your own independent Linux distro from scratch. Most Linux distros value convenience over security and will thus never have good security. Your only option is to make your own. Use musl instead of glibc, Libressl instead of openssl, sinit instead of systemd, oksh instead of bash, toybox instead of gnu coreutils to reduce attack surface. Enable as little kernel modules as possible. Use a hardened memory allocator. Apply strong SELinux and sandboxing policies. Restrict the root account heavily to make sure it never gets compromised. Disable JavaScript and CSS in your browser. Block all FAGMAN domains in your hosts file. Monitor all network requests. Do not use a phone. Never speak near anyone who owns a phone, they are always listening. Never use any non-corebooted technology made after 2006. Never leave your devices unattended. Tape triple layer aluminum foil all around your room as tempest shielding. Type really quietly as defense against audio keylogging. Use ecc ram to minimize rowhammer and rambleed. Encrypt everything multiple times with various different encryption implementations. Compile everything from source. Use hardened compilation flags. Always read through the source before installing something if possible. Only use the internet when absolutely necessary.

[–] NaoPb@eviltoast.org 15 points 11 months ago (1 children)
[–] dubyakay@lemmy.ca 32 points 11 months ago (2 children)

Facebook Apple Google Microsoft Amazon Netflix

[–] Zink@programming.dev 8 points 11 months ago

M’FAANG

tips hat

load more comments (1 replies)
[–] deczzz@lemmy.dbzer0.com 11 points 11 months ago

ᕕ( ᐛ )ᕗ

[–] Hootz@lemmy.ca 7 points 11 months ago (1 children)

The only thing comparable to Meth is Linux.

load more comments (1 replies)
load more comments (2 replies)
[–] Zehzin@lemmy.world 49 points 11 months ago (1 children)

"Finally, we cracked it. What was he hiding in this thing?"

"Mostly ways to keep his data safe"

[–] UnderpantsWeevil@lemmy.world 21 points 11 months ago* (last edited 11 months ago) (4 children)

There are two kinds of people obsessed with their internet security.

  • Computer hobbyists with an inflated opinion of their own importance and a touch of autism

  • IT Security Professionals

You'll notice I left out pedophiles. That is because pedophiles are dumb and regularly get caught.

[–] NegativeInf@lemmy.world 7 points 11 months ago

Pedophiles are dumb enough to bring their phone in for an upgrade at T-Mobile with an SD card full of CP. That was a fun call with the cops.

[–] rufus@discuss.tchncs.de 6 points 11 months ago

That is kind of the problem. Everyone else is getting scammed, their data stolen and tried to be manipulated by targeted advertising, algorithms and addictive, yet unhealthy social media platforms.

I wish it were more than the nerds who cared...

[–] themeatbridge@lemmy.world 5 points 11 months ago

I mean, the scary part of that thought is acknowledging availability heuristics. The pedophiles dumb enough to regularly get caught are the pedophiles we know about.

load more comments (1 replies)
[–] adj16@lemmy.world 47 points 11 months ago* (last edited 11 months ago) (2 children)

Like the feds would care about raiding the house because it was actually his parents’ lmao

[–] ramjambamalam@lemmy.ca 10 points 11 months ago

"He lives with his family, so make sure you pack the dog gun."

[–] cows_are_underrated@feddit.de 22 points 11 months ago (1 children)

And his harddrive isencrypted, so raiding is kinda useless.

[–] bitwaba@lemmy.world 24 points 11 months ago (1 children)

I don't know why but I read raiding, I thought He's RAIDing his house. So, like, one hard drive on a computer in this house, another hardrive in another computer in another house, as a RAID 0, so there is no point in raiding the house.

It's late okay. Give me a break.

load more comments (1 replies)
[–] Grass@sh.itjust.works 15 points 11 months ago (13 children)

Blob free capable computers are so old though. After trying one I don't know how I survived that era without even using ssds. Before that how the hell did live with Pentium 2, 3, and 4?

[–] liam070@sopuli.xyz 18 points 11 months ago

Some of us had to install Windows XP SP2 and 4 on these machines. I made money just sitting in a room watching progress bars.

[–] SpaceNoodle@lemmy.world 12 points 11 months ago

There was a lot less data to grind through.

[–] bluewing@lemm.ee 5 points 11 months ago

Still faster than the 286 with math co-processor that I started with at home.

load more comments (10 replies)
[–] unreasonabro@lemmy.world 13 points 11 months ago

doing it the right way

[–] FiniteBanjo@lemmy.today 13 points 11 months ago

I don't think the NSA or CIA has ever had any interests in my specific online activity, purely because the manpower is never that well utilized in our world, but in the age of automation that could all change soon.

[–] NGC2346@sh.itjust.works 12 points 11 months ago

feds: proceed to kidnap and torture the VIP target described in OP post for answers

load more comments