Twitter | Search | |
thaddeus e. grugq
Downside of using Signal and using Tor? Unless you compartmentalize and hide/destroy that compartment after it is no longer needed... you’ll have a bunch of hard to explain spy tools lying around waiting to be found
Reply Retweet Like More
emptywheel May 9
Replying to @thegrugq
If you do a google search on the reporter on your NSA computer chances are finding Tails on your thumb drive is going to be gravy.
Reply Retweet Like
egyp7 May 9
Replying to @thegrugq
As a wise person once said, "opsec will get you through times of no crypto better than crypto will get you through times of no opsec"
Reply Retweet Like
Cut and Pastryarch May 9
Replying to @egyp7 @thegrugq
Also known as Fat Freddy's hack
Reply Retweet Like
p1nt1nho🐥 May 9
Replying to @thegrugq
Someone set up tails on a thumb drive at a cryptoparty ages ago - is that considered a suspicious thing to come across?
Reply Retweet Like
Christiaan May 9
Replying to @thegrugq
Is possession of a multiple use tool a felony? I use Tor when booking flights and hotels to keep the prices down... legitimate use case?
Reply Retweet Like
thaddeus e. grugq May 9
Replying to @egyp7
They smart af
Reply Retweet Like
Deep East Texas Security May 9
Replying to @thegrugq
There should be a national download Tails day where millions of US citizens download a copy. It’s not useful to label these as “Spy Tools” vs. “Privacy Tools.”
Reply Retweet Like
Clint Barton May 9
Replying to @thegrugq
Speaking as someone who has done digital forensics for many criminal defendants, learn how to delete stuff, y’all!
Reply Retweet Like
brian May 9
Replying to @thegrugq
Okay, I thought securely destroying any information on a thumb drive was incredibly difficult because of wear leveling. Is there an actual option for secure destruction out there? Well besides a hammer and fire.
Reply Retweet Like
thaddeus e. grugq May 9
Replying to @brianmoney233
Well, destroy it thoroughly and then discard the pieces separately
Reply Retweet Like
brian May 9
Replying to @thegrugq
Right. The devil is in the details.
Reply Retweet Like
███  ███ says the hamberder May 9
Replying to @emptywheel @thegrugq
that was hard to parse out of context
Reply Retweet Like
Zimmie May 9
Depends. Some drives have a “secure erase” command which is supposed to zero out all the pages in the flash chips. That method should be fine, but I’ve read some vendors implement secure erase by just erasing the key used for the AES wear leveling (not good; many use bad keys).
Reply Retweet Like
brian May 9
Replying to @bob_zim @thegrugq
Ohh neat. I didn't realize that.
Reply Retweet Like
ಠ_ಠ @ you May 9
Replying to @thegrugq
Use Signal, use Tor, use fire.
Reply Retweet Like
Chuck Perry May 9
Replying to @thegrugq
Why are you trying to keep and reuse a thumb drive?
Reply Retweet Like
Jon McCoy May 9
Replying to @egyp7 @thegrugq
Signal is such a weak security and lacks privacy.... If anything it has harmed
Reply Retweet Like
31xr🛡️ May 9
Replying to @emptywheel @thegrugq
Said another way; If you do a reporter search on the Google on your NSA computer, chances are finding gravy on your thumb drive is going to be Tails.
Reply Retweet Like