Morning Spam

Undiscussed Groomed for Male Slavery, One Victim of Many gmkarl+brainwashingandfuckingupthehackerslaves at gmail.com
Fri Nov 10 09:48:34 PST 2023


we also formed a guess regarding how to secure a system.
only parts are preserved here.

- user forms digital trance habits (you know digital trance, like
checking email, or navigating twitter or youtube, or coding for hours)
that can keep going the same way offline
- user transitions to airgapped devices and continues offline
note: when engaging online people or online behaviors be very careful,
take slowly, learn from each event. [if you can, try to go longer each
time. prefer to not do this at all.]
- after getting trance habits familiar with offline behavior, user
transitions to clean devices
- after adjusting to being offline with clean devices, user begins
security logging and moves into shielded environment


More information about the cypherpunks mailing list