Right? It's kinda nuts how much this quixotic prepper-style power fantasy permeates some parts of the Internet. Hell, even that strip is conceding the basic point that there will be a cabal of evil people digging for all their super-important secret files at some point.
Kinda makes you wonder what's on their drive that they're so concerned about being uncovered. I'm all for privacy as a right, but people don't usually go balls to the wall on their computer security just to protect cat memes or tax documents. People won't even assume just regular porn stuff. People will assume terrorist plots or sex crimes or stolen classified stuff. Idk, if my NSA agent cares enough to break basic security just to find out my porn search history, then I'm just thinking that that's wasted tax dollars. I'm not that interesting.
Edit: I'm not saying don't do simple encryption, I'm saying that putting up ten barriers and having paid services and using multiple vpns has drawbacks of cost and performance, so what are the odds that somebody would go to all the trouble for data that nobody would care about. If you saw a giant vault in somebody's basement, you would assume there's something interesting in there.
Rubberhose (file system) Deniable encryption https://en.m.wikipedia.org/wiki/Deniable_encryption
The notion of "deniable encryption" was used by Julian Assange and Ralf Weinmann in the Rubberhose filesystem (...)
In cryptography, rubber-hose cryptanalysis is a euphemism for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by coercion or torture—such as beating that person with a rubber hose, hence the name—in contrast to a mathematical or technical cryptanalytic attack. (...)
That's all very clever and good, but Assange has been cooling his heels in Belmarsh Prison since 2019 awaiting extradition to the US and Ralf Weinmann only escaped the same fate by dropping off the face of the earth.
Wikileaks has been a dead letter for over a decade and the western public is now so thoroughly poisoned against big intel leaks that its doubtful an effort to reinvent the site would have any benefit.
So we're still back to a guy with a wrench being an effective means of dealing with entrepreneurial hackers.
Buy a thinkpad x230 and install heads. Write protect the flash chip. Put nail polish on the screws and take high resolution pictures to ensure signs of tampering. Do NOT use a HDD or SSD. They have DMA so a malicious firmware could do a lot of damage, use of USB is preferred since they do not have DMA. Completely remove the microphone, sound card, webcam and the WWAN card from the laptop. Remove the fan to prevent binary acoustic data transmission. Replace the default wifi card with a supported atheros card. Disable wifi when not in use, preferably by physically removing the card. Make your own independent Linux distro from scratch. Most Linux distros value convenience over security and will thus never have good security. Your only option is to make your own. Use musl instead of glibc, Libressl instead of openssl, sinit instead of systemd, oksh instead of bash, toybox instead of gnu coreutils to reduce attack surface. Enable as little kernel modules as possible. Use a hardened memory allocator. Apply strong SELinux and sandboxing policies. Restrict the root account heavily to make sure it never gets compromised. Disable JavaScript and CSS in your browser. Block all FAGMAN domains in your hosts file. Monitor all network requests. Do not use a phone. Never speak near anyone who owns a phone, they are always listening. Never use any non-corebooted technology made after 2006. Never leave your devices unattended. Tape triple layer aluminum foil all around your room as tempest shielding. Type really quietly as defense against audio keylogging. Use ecc ram to minimize rowhammer and rambleed. Encrypt everything multiple times with various different encryption implementations. Compile everything from source. Use hardened compilation flags. Always read through the source before installing something if possible. Only use the internet when absolutely necessary.
Remove the anti-glare protective layer from your display so there is like a 30 degree radius from which you can actually see what’s on the screen. Attach the USB flash drive to your wrist with a string, set up the system to automatically shut down when the stick is removed.
That is kind of the problem. Everyone else is getting scammed, their data stolen and tried to be manipulated by targeted advertising, algorithms and addictive, yet unhealthy social media platforms.
I mean, the scary part of that thought is acknowledging availability heuristics. The pedophiles dumb enough to regularly get caught are the pedophiles we know about.
>That is because pedophiles are dumb and regularly get caught.
The ones with bad opsec that you habe heard about. This kind of underestimation is what fucks feds in the ass, this is how Mr swirl went so many years free.
I don't know why but I read raiding, I thought He's RAIDing his house. So, like, one hard drive on a computer in this house, another hardrive in another computer in another house, as a RAID 0, so there is no point in raiding the house.
Blob free capable computers are so old though. After trying one I don't know how I survived that era without even using ssds. Before that how the hell did live with Pentium 2, 3, and 4?
I literally did this. My senior year in college I had a single dorm room and I’m guessing some overlocked Celeron CPUs in a dual-socket motherboard. I never once turned on the heat. I’d often come home and open my window when it was snowing outside.
I don't think the NSA or CIA has ever had any interests in my specific online activity, purely because the manpower is never that well utilized in our world, but in the age of automation that could all change soon.