
What if i don’t remember my own password?
It says “until” so you’ll be having plenty of time to remember it.
I’il probably have internal bleeding before i remember them
Well in reality they will use waterboarding or some other technique that ensures suffering while not being life threatening. There’s actually a great movie called Unthinkable about this.
That still doesn’t mean you’re gonna remember it. I forget my master password all the time. Torture would just ensure I’d forget it even worse.
That’s the whole thing with torture. It demonstrably doesn’t work, but people who use it aren’t the people who’re concerned with scientific reality
It does work for people who value their wellbeing more than they value the information they remember. For remembering stuff there may be some medical injestions before torture.
Feels more and more likely living in the land of freedum right now.
there was another crypto kidnapping (also in russia) a few years ago, they tortured him and got all his apes. DeFi, kinda scary
give them the duress password gg
“If this password doesn’t work, I’m going to break your thumbs.”
“Uh…”
“Yeah, its not the real password. Lets break his thumbs and ask him again.”
a duress password typically wipes the device when entered.
so the data would be destroyed
And then they would just keep hitting him for his defiance
Gonna become the $2 waterboard rag method for insubordination
Anyone remember rubberhoseFS or Veracrypt multiple hidden vols?
It’s cute that anyone thinks situation 2 would be necessary and that encryption couldn’t be broken with the press of a button if someone seriously wanted your info.
Fantasy land.
Privacy is a human right, but our rights were eroded long ago.
“Well, we raided his mom’s house and confiscated all his cobbled-together e-waste.”
“And!?”
“His drives were encrypted. Apparently he ‘applied PQC patches to dm-crypt himself’, whatever that means. All I know is that it made the guys from NSA scream. There was nothing we could do.”
“So we’ve got nothing?”
“Oh no. He happily gave us both the keyfile and the passphrase.”
“So…?”
“No warez, no CSA, no political manifestos or illicit recipes. Not even tax evasion - it’s not like he has an income. Just… copyleft source code as far as the eye could see.”
I lol’d at this. But seriously, privacy is a fundamental human right. You don’t need to have something to hide to assert your right of privacy.
Yeah the government doesn’t understand we don’t want you to be sociopaths with the excuse of our safety.
There’s also the issue of changing legality; what’s legal today might be illegal tomorrow
Only Asymetric encryption, like PGP has Problems with Quantum Computers. Symmetric, like AES, used by dm-crypt is not affected by Quantum Computers. It doesn’t rely on multiplied big prime numbers or stuff like that.
Is it a proved theorem that quantum computers dont have an advantage for AES, or is it just unkown?
The question isnt whether quantum computers have an advantage over regular computers (they pretty much always do for code cracking as the parallel superposition computation is some crazy shit that changes cryptography forever) instead the question is whether or not AES-256 is able to resist our current quantum compute and how long it can do that.
Its a simple equation, as long as it takes longer than the lifespan of the universe to compute with our most powerful supercomputers its considered good encryption. However as computers get more powerful, the projected time decreases potentially to the point of human lifespan time frames. Thats when it becomes a problem and the standard fails.
Currently AES is quantum resistant but it almost certainly won’t be forever. New standards are gonna need to be adopted at some point.
copyleft source code is a telltale sign of communism, thus anon can be associated with Big terrorist like the Antifa.
open source collaborative software is anarchy. Book him
FOSS gang rise up!
my spirit animal
Linux nerds literally only want one thing and it’s fucking the idea that your full disk encryption will pay off one day.
That’s the best part, it can never really “pay off.” It can only mitigate. Hardly seems worth it to me. Alas.
It’s when your disk breaks and you can just throw it away without worries.
What’s þe fun in þat? I bought þe giant electromagnet electric media wiper for a reason.
It can, but most likely it only would if you’re doing illegal shit and get caught. They’d search your place for evidence and FDE could keep them from discovering some things.
But uh, if they got that far into investigating you then you’re probably already screwed.
Not true at all. Governments regularly raid political dissidents. It’s a disciplinary tactic in and of itself. I’ve been raided for plenty of shit and never been convicted of any crime.
I mean the average dork not cool people like you (if you’re being truthful)
Persons of interest to governments should always be diligent.
My point is that raids are for the purpose of gathering evidence. The way it usually works is that the state decides they want to criminalise you for something so they search your place for anything they can use to incriminate you—not vice versa, ie they dont already have enough evidence to incriminate you when they plan the raid.
I don’t know about a majority of people, but with the rise of the far-right across many countries I think it is a significant number of people who are at risk of this, and I think it’s rather short-sighted to assume only a small number of “cool people” are affected (thank you though). Like I am a nobody, I’m not famous, and there are lots of political organisers and militants like me you’ve never heard of being targeted for their political activities. You don’t need to be a Snowden to have some degree of state interest in you, and most state repression (raids, incarceration, arrests, etc) is relatively cheap to dish out willy-nilly.
I think he’s over blowing the 5 dollar wrench method.
Unless you live in a place where human rights are disregarded like every possible moment, they’d probably only resort to torturing you to gain access if they believe you are somehow connected or have ancillary evidence that points to you. IE that darkweb dude they tortured in Turkey to gain access to his encrypted laptop containing incriminating evidence.
Otherwise they’ll just do a preemptive raid hoping that it leads to new information.
Like right now border patrol has been forcing foreigners to show data on their mobile devices to see if you have any roasted vance memes so they can turn you away. But in many cases, it has been done because they already had you flagged as posting or sharing roasted vance memes online.
Of course you could also always be in a craphole country where they’ll torture you anyway, regardless if they have any reason to believe you are connected to something, but simply due to the fact that you opted to use FDE or any practical security scheme.
Is there any reason to do full disk encryption, vs encrypting a single partiton or a folder with eCryptfs? It’s not like your /usr/bin, etc… needs to be encrypted, but encrypting it reduces performance.
Suppose you’re in some hypothetical country where torrenting is illegal. The presence of
/usr/bin/qbittorrenton your disk could be enough to face charges. Unencrypted/var/log? Maybe they can see you’ve been running a cryptocurrency miner. There could be plenty of data outside of$HOMEon your computer which a cop might try to use against you.In the most paranoid hypothetical scenario, someone could mount your unencrypted
/usr/binand replaceopensslwith a compromised version./var/log and the likes aren’t really issues, I just have mine as a link to the real one in an eCryptfs folder. Though I guess you’d be right about qbittorrent, this is something pretty rare.
In the most paranoid hypothetical scenario, someone could mount your unencrypted
/usr/binand replaceopensslwith a compromised version.I suppose if you’re in this situation, you have way more important things to deal with. That would imply someone has physical access to your computer, at that point if they really want to know what you’re doing they might as well setup a camera.
What I’m getting at is that for people using FDE, any performance hit is worth it compared to worrying that you’ve covered every angle.
By default, most FDE have horrible performance hits and require significant tweaking, configuring and benchmarking to get it right depending on hardware, use cases, conditions… I’m sure there are quite a bunch of people out there who don’t want to do any tweaking while still having the performance they paid for.
Unless what you are doing is heavily I/O dependant (mostly heavy database workloads), that’s not really true anymore, especially with a modern CPU and say, LUKS encryption. Phoronix has a recent review of FDE using LUKS, and apart from synthetic I/O tests, the difference isn’t really observable.
Try
cryptsetup benchmarkon your pc and look at the results for aes-xts for example.
check the IP logs
Its all encrypted? This guy uses VPNs and Tor?
Presuming that Mossad can be topped with a subscription to ProtonVPN or a Tor browser is adorable. Hell, presuming nobody in the intelligence services is familiar with Linux is even more adorable. “We’ve got everyone at the NSA fooled because we’re Arch users”. Yeah, sure buddy. What do you think these professional computer nerds are doing in their own free time?
Where do you even think encrypted applications come from?
most of these security agencies effectiveness is just in the myth’s they’ve built around themselves of actually being effective.
mossad in particular, just has a complete disregard for killing innocents and a really good propaganda wing to suppress all their fuckups.
most killers are not right in the head, they act on pure emotion, they post “i am going kill X” online to their social media of choice the night before going to kill X…it’s dumb as shit. that’s how low the bar is on utilizing violence
fact is lone wolf threats are practically unstoppable, especially if they have a modicum of competency
this is also why it’s said killing gets easier/“first ones the hardest” etc. even if your not some sociopath (which, most people as a whole arent)…once you know and understand just how easy it is to kill people and get away with it…lot of the worlds problems start to look like they have very easy solutions…
all the 3-letter agencies pool their resources
billions of dollars are dumped into the project
several years later they manage to decrypt all of this guy’s communications
it’s nothing but chats about how to encrypt shitNot a hackerman, but I really don’t think that 12yo CPU is much more secure than a modern one.
If we’re talking about security, the newer CPUs have better microcode. Those older CPUs are vulnerable to attacks such as Spectre. Older boards supported by Libreboot, such as the Haswell boards (e.g., Dell 9020 OptiPlex), which support 100% free BIOS firmware, which is to be used in conjunction with 100% free software. If you do so, you will have more security, freedom, and privacy than any other modern consumer grade computer.
Then again, these boards are old, so, given the microcode is old, if you’re running a virtual machine with a bunch of malicious software, an attacker can potentially exploit your host’s CPU and break out of that VM. Of course, determine your threat model. Are you running no JavaScript ever and only using libre software?
A deblobbed kernel isn’t great either in some cases, you may need some patches. For example, someone was able to exploit Intel’s iGPU on these older boards and gain complete access to your machine. The only way to fix this is by using a blob. Though, if you strictly only use libre software, this wouldn’t be a concern as much so you wouldn’t need this blob.
If you stick strictly to 100% free software, older hardware and a deblobbed kernel might be appropriate. But if you need to run blobs along with other proprietary software like JavaScript, the security provided by something like the Intel iGPU blob patch could be beneficial.
Time for the $5 wrench…
Or just beat the shit out of them and get the info you need (or more likely want).

Relevant xkcd: https://www.explainxkcd.com/wiki/index.php/File:security.png
that did actually happen to a guy, over the password to his bitcoin account
https://abcnews.go.com/US/nyc-crypto-kidnapping-torture-case/story?id=122280419
Assistant District Attorney Michael Mattson said Woeltz and Duplessie allegedly lured the man to New York from Italy by threatening to have his family killed.
Really a stretch of the word lured…
I love this idea when in reality they probably have some Israeli 3rd party that they use that can just pop any system in under an hour regardless of any protection you think you have.
“Hang on, you mean to tell me this fucker barely uses the internet or TV at all anymore and instead just reads books and watches old films on disc? Like real books, not ghost-written memoirs of our favorite elites?”
I’m in this post and I like it.
Thoughts on Gentoo over something like Fedora? (Or whatever you’re using)
I run Gentoo.
It’s made my fundamentals stronger.
It allows me to run the minimal number of codepaths.
Every now and then it makes me happy. Sometimes proud of myself. All because I solved some problem that was helped by the mindset Gentoo had set up.
it makes me happy
This is the exact way I feel about Gnu Guix_SD
Gentoo is fun and a nice way to learn more about computers. Their wiki and their community was really good when I was into it, I’m sure it still is. But compiling everything from scratch is quite demanding of your CPU and your time, so it’s not really something that you run as your daily driver for long.
But compiling everything from scratch is quite demanding
Or live in a van.
DOWN BY THE RIVER
Ah yes, a Linux teenagers power fantasy. Hardened Gentoo and Selinux beats deblobbing btw, noob.
Selinux
Hey, let’s not get crazy. I still want to use it for practical things, too. /s
You can’t impress me with a bog standard Gentoo. If you want to show power, build a fortress. At least put some tripwire you mostly trip yourself on (program that keeps an encrypted hash database of your system files to find intrusion changes, needs an update with every update of course or it alerts only your negligence).
Rkhunter?
I always wondered, did anyone ever find something with it? Wouldn’t a rootkit that is known enough to be in the detection file be outdated? But yes, you read the docs, points to you!
Yeah rkhunter looks for all the common kits BUT ALSO checks for suspicious changes if enabled as a service.
The extent some people go to refuse their privacy being stepped on. These people like this are pathetic. /s
BRO JUST LET THEM DO WHATEVER THEY WANT YOU’LL BE FINE AS LONG AS
Y O U H A V E N O T H I N G T O H I D E
At least there are cameras tracking everyone’s movements now.
And local cash-accepting taxi companies have been replaced by two cooperative companies, so that loophole is almost closed.
😩






















