Setting up PGP
gmkarl at gmail.com
Wed Oct 14 17:34:34 PDT 2020
I have not preserved nor fed to the Democratic party the information Zenaan
shares. If that needs to be done, somebody more free than me, do so.
On Wed, Oct 14, 2020, 7:45 PM Karl <gmkarl at gmail.com> wrote:
> I might respond to your smart argument here (against security on a
> security-focused list) but I'm more worried about all the strange things
> that follow it.
> Do you know why I want to pressure you into stopping or changing your
> posts? In me I think it has to do with disagreeing with you and having no
> Are you trying to manipulate us?
> On Wed, Oct 14, 2020, 7:33 PM Zenaan Harkness <zen at freedbms.net> wrote:
>> The top down regimes are the only regimes we see. There are no
>> significant non-hierarchical regimes which dominate, and hierarchical
>> regimes dominate. At least historically.
>> This presents the dilemma:
>> - better tech is co-opted by the regime of the day, or is used to create
>> a new, more dominant, regime
>> - if better tech = "un-breakable" tech, this may also mean an
>> unchallengable dominant regime
>> - present tech is so riddled with "backdoors", at every level (hw, bios,
>> drivers, kernel, comms, devices, apps), that improving one level likely
>> poses exactly Zero threat (of "lack of back door to escape/ prod the
>> regime") to dissidents
>> - any better-than-Tor Tor replacement, even a very good one, is
>> presently "bound" by the limitations of Apple and Gewgoyle 'walled
>> gardens', backdoored uefis and wifis and usb-is and central network-skis
>> and etc-is, that said better than Tor alt net poses relatively little
>> obstacle to neo-traditional "full take" bulk spy us all, and likewise
>> little limitation to regime prodding hacker crackers and their "flashing
>> GIFs and they're on the Internet and nobody can find them please make me
>> Sec Def my arse is about to do serious prison time forget Benghazi pls
>> focus on Burisma"
>> Soap, one more time: in the short to medium term, we are nowhere near
>> "crack hack proof" tech, hw, nets, etc. Privacy improvements, for what
>> they're worth, and to the extent the balance tilts to their being utilized
>> by lower downs in their dissidence against higher ups (rather than vice
>> versa), may well be useful stepping stones to #100+435, or the next Goldman
>> doc dump, or whatever floats yer boat.
>> Every meme, caution, constructive step to take, consideration, is time
>> dependent, and time track dependent. The backdoor caution is future time,
>> a possible future track. Today's actions by we "little butterflies
>> flapping our Lorenzian wings of intention nudging towards future outcomes
>> from the chaotic soup of present possibilities" are bound in the present
>> moment, notwithstanding their potentially incredible futures.
>> Much to consider.
>> Some easy answers, some tough cnuts.
>> On the scale of ~380 million USA population, today's engagement in 'the
>> public political discourse' is a huge rung above what most of history
>> discloses. Thank memes. Thank Pepe le Begotten Son of Kek. Thank the
>> "bad" orange man who grabbed US backruptcy laws by the coccyx to succeed
>> where few goys have succeeded.
>> The NRA beckons - protect your great Second Amendment - become a paid
>> member - target weak red and blue seats - grab that present public
>> engagement surfboad and ride the bloody wave already - opportunities
>> muffas! - wreak some libertine havok - teach the #NeverTrump ers a bloody
>> lesson - embrace your inner gun nut, or free speech nut, or leadership nut,
>> or cheerleader nut or or or ....
>> - If you take a Red or Blue seat in 2022, and you are a "3rd or 4th or
>> independent seat holder", you can STILL give your vote to Trump (or whoever
>> of course...) in the "race to 270" electoral college vote.
>> - When targetting a weak seat, there are many ways to target, e.g.:
>> - run within the party of the seat you are targetting (R or D),
>> - or run with a 3rd or new party if that is a better strategy e.g.
>> libertarian or NRA affiliate or whatever,
>> - e.g. to split the vote of say a D seat and help hand that seat to
>> Trump, consider do this by pre-arrangement with your actual Memester or NRA
>> buddy (this relationship unknown publicly) running for Trump, whilst you
>> feign to "vehemently" oppose him as you split the D vote for that
>> particular seat :D
>> - Consider to reduce false dichotomies - If any topic gets too hot for
>> you to handle when being questioned, run it as "conscience vote", that is,
>> certain social or socio-political issues (e.g. abortion), if it gets too
>> hot to handle, handball it to "that should be a conscience vote".
>> Have fun muh gritties ...
>> If the Blue or some other pill is your thing, put brain into gear, target
>> the weak spots, coordinate, engage, wrangle some joy outta life as you do
>> your thing. Some will appear to assist you as many prefer to follow.
>> If politics is not your thing, figure out what is your thing in your
>> life, perhaps farming, family, shooting, fishing, travelling.
>> Live your best life in this world you find yourself in.
>> Good luck and God speed,
>> On Mon, Oct 12, 2020 at 08:39:12AM -0400, John Young wrote:
>> > Use of any online or digital programs and/or devices for comsec/infosec
>> > be avoided unless completely enclosed and transmitted with non-online or
>> > non-digital means. There are a number of non-onlne and non-digital means
>> > available, the first and most reliable is your brain so long as it is
>> > contaminated with belief in online and digital prejudice now over a
>> century in
>> > promulgaton. The principal efforts for this promulgation is computers,
>> > obfuscation, propaganda, arcanity, scientism, residual astrology,
>> > gaming, spouting mantras, i.e., "cypherpunks write code."
>> > This oh so cool mantra derives from the magicial, bewitching lodestone
>> > "national security," the abiding weapon of nations governed as royalty,
>> > heirarchical, the few overlording the many with force, elections,
>> > faith and trivializing deriviatives of entertainment, media, chat,
>> > militants, rebels, revolutionaries, independents, intellectuals,
>> > "democracies" ruled by kingdoms of presidents, congresses, courts.
>> > Nonetheless, always a nonetheless apologia for top-down regimes, far
>> > rewarding to cooperate with authorities than to defy them, more
>> lucrative too.
>> > So backdoors in crypto, each and every version, must be inherent code,
>> > with outpourings of assurances there are workarounds to escape the many
>> and be
>> > one of the few. Today, that is marketed as "smart."
>> > At 06:23 AM 10/12/2020, Stefan Claas wrote:
>> > > Karl wrote:
>> > >
>> > > [...]
>> > >
>> > > > After finding a good candidate airgapped device, you'll want to be
>> > > > careful with how you use it. Remember, whenever a new vulnerability
>> > > > is found, trojans cover the world taking advantage of it, and then
>> > > > to find a way to hide inside the corners of all the systems they
>> > > > So, any drive you put in your new device, anything you plug into it,
>> > > > any update you apply, could be filled with computer-measles that
>> > > > find a way to trick it into giving remote control to them. Keep it
>> > > > isolated until you have things set up for use.
>> > > >
>> > > > The next step after getting a reasonable airgapped device, maybe a
>> > > > zero, and ideally keeping it isolated, would be to install gnupg on
>> > > > it. Maybe in a forthcoming email!
>> > >
>> > > GnuPG should be already installed with Linux (Raspberian OS etc.). The
>> > > thing I would like ask you, how would you communicate securely with
>> > > air-gapped device?
>> > >
>> > > What I did in the past was to install on the online device and offline
>> > > device the free (cross-platform) software CoolTerm and I connected
>> > > devices with an FTDI USB to USB cable, so that I could do serial
>> > > communications
>> > > and was also able to see how many bytes (from a PGP message) was
>> > >
>> > > Another approach I am currently playing with is to play with NFC tags
>> > > a reader/writer device, which can be used offline as well.
>> > >
>> > > Regards
>> > > Stefan
>> > >
>> > >
>> > > --
>> > > NaClbox:
>> > > The computer helps us to solve problems, we did not have without
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 10375 bytes
Desc: not available
More information about the cypherpunks