Setting up PGP

Karl gmkarl at gmail.com
Mon Oct 12 08:41:23 PDT 2020


On 10/12/20, Karl <gmkarl at gmail.com> wrote:
> Received this reply late.
>
> On 10/12/20, John Young <jya at pipeline.com> wrote:
>> Use of any online or digital programs and/or devices for
>> comsec/infosec should be avoided unless completely enclosed and
>> transmitted with non-online or non-digital means. There are a number
>> of non-onlne and non-digital means available, the first and most
>> reliable is your brain so long as it is not contaminated with belief
>
> This shows that this guy has never been [s/hit in the head with a
> baseball bat by a corporate goonie/forgetful/] or at least is too
> [s/embarrassed among all these hackers/scared among all these
> international influences/] to talk about it straight.  Brains are
> reliable because they teach us how to jump into burning dumpsters to
> escape being hunted by goonies, not because they can store anything
> permanently.
>
>> in online and digital prejudice now over a century in promulgaton.
>> The principal efforts for this promulgation is computers, coding,
>> obfuscation, propaganda, arcanity, scientism, residual astrology,
>> confidence gaming, spouting mantras, i.e., "cypherpunks write code."

Adding recognition, late, that John is expressing _dislike_ of
technology and software development.  punk-stasi would like that, I
imagine.

>
> You can tell this guy is a legit hacker because he is proposing to
> write software instead of doing anything else.  He's even reminding us
> that it is expected that everybody here has that opinion.  I can't
> really understand most of what else he's saying.
>
>>
>> https://www.google.com/search?q=cypherpunks+write+code&rlz=1C1AOHY_enUS708US708&oq=cypherpunks+write+code&aqs=chrome..69i57.5595j0j7&sourceid=chrome&ie=UTF-8
>
> I typed this into duckduckgo ("cypherpunks write code") and got
> results that look really great to me.  I haven't tried google,
> although usually I do try to [s/brainwash myself permanently in the
> databases of people who hate my values/work with any success with my
> corporate friends/] with it.
>
>> This oh so cool mantra derives from the magicial, bewitching
>> lodestone "national security," the abiding weapon of nations governed
>> as royalty, heirarchical, the few overlording the many with force,
>> elections, education, faith and trivializing deriviatives of
>> entertainment, media, chat, parties, militants, rebels,
>> revolutionaries, independents, intellectuals, geniuses, "democracies"
>> ruled by  kingdoms of presidents, congresses, courts.
>>
>> Nonetheless, always a nonetheless apologia for top-down regimes, far
>> more rewarding to cooperate with authorities than to defy them, more
>> lucrative too. So backdoors in crypto, each and every version, must
>> be inherent code, along with outpourings of assurances there are
>> workarounds to escape the many and be one of the few. Today, that is
>> marketed as "smart."
>
> Some of these words are likely a pretty avenue for new upcoming
> hackers, like looking at a sunrise.  If understood, you might be able
> to use them to [s/manipulate everyone using google into ignoring the
> cypherpunks movement and becoming corporate workers/make peace with
> the people here who seem able to out-hack you/].
>
> It sounds like he's also saying that cypherpunks is totally coopted by
> government.  Maybe we should ask them if they can help us with our
> [s/spy mafia/forgetfulness/] issues?
>
> Noo .....  we know that govcorp is bad because it has [s/ripped our
> bodies and communities to shreds/raised prices on important things
> that people need/].  If this guy is a legit hacker (which is implied
> by his "cypherpunks write code" expression), then by talking about
> valuing backdoors in everything and national security, he would be
> being _obviously sarcastic_, _begging for help_, a _corporate goonie
> smart enough to say "cypherpunks write code"_, or most likely has been
> _coerced by extensive mean experiences stemming from corporate
> goonies_.  This means he is somebody who can help us, and somebody we
> can help, both!
>
>> At 06:23 AM 10/12/2020, Stefan Claas wrote:
>>>Karl wrote:
>>>
>>>[...]
>>>
>>> > After finding a good candidate airgapped device, you'll want to be
>>> > careful with how you use it.  Remember, whenever a new vulnerability
>>> > is found, trojans cover the world taking advantage of it, and then try
>>> > to find a way to hide inside the corners of all the systems they find.
>>> > So, any drive you put in your new device, anything you plug into it,
>>> > any update you apply, could be filled with computer-measles that would
>>> > find a way to trick it into giving remote control to them.  Keep it
>>> > isolated until you have things set up for use.
>>> >
>>> > The next step after getting a reasonable airgapped device, maybe a pi
>>> > zero, and ideally keeping it isolated, would be to install gnupg on
>>> > it.  Maybe in a forthcoming email!
>>>
>>>GnuPG should be already installed with Linux (Raspberian OS etc.). The
>>>thing I would like ask you, how would you communicate securely with your
>>>air-gapped device?
>>>
>>>What I did in the past was to install on the online device and offline
>>>device the free (cross-platform) software CoolTerm and I connected both
>>>devices with an FTDI USB to USB cable, so that I could do serial
>>>communications
>>>and was also able to see how many bytes (from a PGP message) was
>>> transfered.
>>>
>>>Another approach I am currently playing with is to play with NFC tags and
>>>a reader/writer device, which can be used offline as well.
>>>
>>>Regards
>>>Stefan
>>>
>>>
>>>--
>>>NaClbox: cc5c5f846c661343745772156a7751a5eb34d3e83d84b7d6884e507e105fd675
>>>   The computer helps us to solve problems, we did not have without him.
>>
>>
>>
>


More information about the cypherpunks mailing list