Andrew Anlin fails to cognize the intentions of China, shills for globalism

Karl gmkarl at
Sat Jul 18 06:17:06 PDT 2020

Zig is white and is saying n.gger in a coordinated way that disrupts
cultures intersecting with this group.  That's all I know about that.

I have two flaky laptops I keep usually only in text mode.  Right now I
have DC power and haven't set up their power system.  My android phone is
presently out of space in a funny way.

The things said below are important.

On Sat, Jul 18, 2020, 12:40 AM Zig the N.g <ziggerjoe at> wrote:

> PS., the TDS BBS/forum, requires JavaShaft unfortunately. It's on my
> agenda to write them a new one, but that's probably about 4 years away from
> today.

This shows the users and administrators of that website have other insecure

When I get the rare moment to get on there, I do ONLY some TDS browsing and
> posting, after enabling JavaShaft, then disable when done and completely
> shut down the TBB (Tor Browser Bundle), and do NO other browsing at the
> same time.

This sounds to me like incredibly good advice to stay anonymous and should
be repeated elsewhere.  I have lost these habits and need to hear them
again to fight the creeping tentative antiprivacy cultures; possibly like
the racism culture that could possibly have eaten Zig a little.

EVEN if you use profiles (say, one JS-enabled profile for TDS, another
> JS-disabled profile for all other sites), if ANY SINGLE WEBSITE or profile
> has JavaScript enabled, you must consider yourself identified - ID is a
> per-host thing (your phone is a "host" computer BTW!).

This is the same good advice.  The user can be identified from things like
mouse movement habits, windowing dimensions, etc.

So, be very careful.

(Do not _ever_ associate your legal name with something political unless
you cannot help the cause very much or want to discover what it is like to
be unable to kill yourself when there is nothing in your universe but
suffering.  Or if you know you are tougher than your worst nightmares and
are ready to lose your life completely.)

If you're not up on cryptsetup (or Veracrypt if you demand a GUI), then you
> need to be.

Here Zig is helping me again.  I am no longer able to encrypt my root
partition with a removable boot partition on a usb drive chained to me, an
approach I used to have.

Encrypting raises the difficulty of stealing data from you significantly.
Law enforcement need more reason to try to access it than because it makes
it clear it is private.  Casual visitors need to visit multiple times with
more preparation and expertise.  If you _stop_ using the device before it
is compromised, such as in a kidnapping or arrest, and the device is _off_
before found, it can be nearly impossible to access the data.

Encryption has some well known problems right now, and we need to use it
more to raise the cultural norm of fighting those.  Notably, distros need
to support putting the boot partition on removable media to prevent the
well known evil maid attack.  Antiprivacy culture creep has been delaying
this severely.

If you do not encrypt your home directory and disable non-encrypted swap,
> then you really need to install TBB "relocatable" (this is default with the
> TorProject download) inside an encrypted volume.
> ALL sensitive encrypted files for upload AND download MUST be kept in
> encrypted volumes (preferably with detached headers stored in a master vol
> - make sure this is backed up though :D)

If this is not done then somebody who can access your system can see what
you did on Tor without going through decryption rigamarole.

Here I fuzzed out.  I was like, what is the point of this?  If somebody who
cares enough to access the physical blocks of your harddrive sees you have
encrypted it, they'll simply figure a way to decrypt it.  And then I
remembered Veracrypt, mentioned by Zig above.

VeraCrypt is considered "classified"/"illegal"/"forbidden" technology in my
deceptive new universe.  VeraCrypt can hide that the encrypted data is
there at all.  Like Tor, the developers have the footprints of political
targeting on them.

It frustrates those used to being able to hunt everything down, to be in
research competitions with people who don't want everything to be hunted
down.  (sustaining corporate mafia coverups etc)  And then all us kind
developers get our lives messed up.

I need to be able to recover my data when my media gets too damaged to
mount, by scraping the undamaged sectors or using a tool like autopsy ( ) and I am happy to roll my own code to
do this because I did it a lot before this situation landed.  I wonder if
there's a way to do this with VeraCrypt's encryption.

Then also read up on the FAQs on how to increase security,
> which is a start, then come back here for any questions, and no doubt the
> BatSoup n.gger will set you straight on how bad your security is and how
> stupid you are for even  thinking  of using or in any way trusting TBB ;D

What privacy vulnerabilities remain in Tor if browser fingerprinting and
exploits are dealt with and traffic between nodes is maintained at a
constant rate?

Good luck and stay safe,
> Your not so friendly security N.ggerBot

Sorry about the Bot thing.

Do you have a Bot community?

I was able to move back into my truck, off the floor of my friend I had
been sleeping on for a few months, after the last email exchange, with goal
of returning to caving.  So wonderful, thinking of caving again.

On Sat, Jul 18, 2020 at 02:20:37PM +1000, Zig the N.g wrote:
> > Dude, folks normally assume a desktop. Bad assuption these days I guess.
> >
> > BEFORE loading any Tor sites, but after installing, DISABLE JAVASCRIPT!

Woah!  Hide instead of reveal?  Fun thing to learn.  _avoiding_ bad stuff,
what a crazy idea.

uhhhhhhh O_O  i'll try to learn to hide my identity if you try to stop
saying n.gger-like or femin*zi-like words?   i'll keep this idea of hiding
my identity kicking around.  i should probably be able to do that somehow,
huh ...

no more replies below just the ref to behavior meme software

> > Tor n.ggers do not do this setting by default, on the basis that they
> want Tor Browser to be more popular.
> >
> > In reality, it is a trap to catch newcomers, and even old timers who
> install on a new device or etc.
> >
> > The Tor n.ggers also enable JavaShaft by default on every other Tor
> Browser platform too.  You have been warned.
> >
> > Really, that's as n.ggardly as it gets!
> >
> >
> > Be careful out in the real world.. lotta n.ggers out there.
> >
> >
> >
> > On Fri, Jul 17, 2020 at 10:19:29PM -0400, Karl wrote:
> > > I had a dream once where I was spamming a cryptography list talking
> about a
> > > dream, where a surveillance worker was watching a crypto hacker who had
> > > been targeted as a terrorist, taking notes on them over breakfast when
> they
> > > didn't actually need to be working.  The story was they were taken off
> the
> > > case because they were displaying care for the suspect.
> > >
> > > I am in a bind around installing Tor on my phone but I expect to
> resolve it
> > > within 9-15 months, possibly an hour.
> > >
> > > On Fri, Jul 17, 2020, 10:01 PM Punk-BatSoup-Stasi 2.0 <punks at>
> > > wrote:
> > >
> > > > On Fri, 17 Jul 2020 13:06:06 -0400
> > > > Karl <gmkarl at> wrote:
> > > >
> > > > > On Thu, Jul 16, 2020, 3:37 AM Zig the N.g <ziggerjoe at>
> wrote:
> > > > >
> > > > > > Andrew Anglin continues his globalist shilling rather than
> uniting the
> > > > > > troops behind the nationalist, pro White fertility agenda.
> > > > > >
> > > > >
> > > > > whaaat  who the heck is andrew and why are you talking about them?
> > > >
> > > >
> > > >         "andrew anglin" is harkness' favourite white supremacist.

There is proof inside many peoples' electronics.  Proof that a marketing
group would contract development of a frightening virus.  A virus that
responds to peoples' keystrokes and browsing habits, and changes what
people see on their devices.  A virus that alters political behavior en
masse, for profit.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 12188 bytes
Desc: not available
URL: <>

More information about the cypherpunks mailing list