Zig is white and is saying n.gger in a coordinated way that disrupts cultures intersecting with this group. That's all I know about that. I have two flaky laptops I keep usually only in text mode. Right now I have DC power and haven't set up their power system. My android phone is presently out of space in a funny way. The things said below are important. On Sat, Jul 18, 2020, 12:40 AM Zig the N.g <[1]ziggerjoe@yandex.com> wrote: PS., the TDS BBS/forum, requires JavaShaft unfortunately. It's on my agenda to write them a new one, but that's probably about 4 years away from today. This shows the users and administrators of that website have other insecure habits. When I get the rare moment to get on there, I do ONLY some TDS browsing and posting, after enabling JavaShaft, then disable when done and completely shut down the TBB (Tor Browser Bundle), and do NO other browsing at the same time. This sounds to me like incredibly good advice to stay anonymous and should be repeated elsewhere. I have lost these habits and need to hear them again to fight the creeping tentative antiprivacy cultures; possibly like the racism culture that could possibly have eaten Zig a little. EVEN if you use profiles (say, one JS-enabled profile for TDS, another JS-disabled profile for all other sites), if ANY SINGLE WEBSITE or profile has JavaScript enabled, you must consider yourself identified - ID is a per-host thing (your phone is a "host" computer BTW!). This is the same good advice. The user can be identified from things like mouse movement habits, windowing dimensions, etc. So, be very careful. (Do not _ever_ associate your legal name with something political unless you cannot help the cause very much or want to discover what it is like to be unable to kill yourself when there is nothing in your universe but suffering. Or if you know you are tougher than your worst nightmares and are ready to lose your life completely.) If you're not up on cryptsetup (or Veracrypt if you demand a GUI), then you need to be. Here Zig is helping me again. I am no longer able to encrypt my root partition with a removable boot partition on a usb drive chained to me, an approach I used to have. Encrypting raises the difficulty of stealing data from you significantly. Law enforcement need more reason to try to access it than because it makes it clear it is private. Casual visitors need to visit multiple times with more preparation and expertise. If you _stop_ using the device before it is compromised, such as in a kidnapping or arrest, and the device is _off_ before found, it can be nearly impossible to access the data. Encryption has some well known problems right now, and we need to use it more to raise the cultural norm of fighting those. Notably, distros need to support putting the boot partition on removable media to prevent the well known evil maid attack. Antiprivacy culture creep has been delaying this severely. If you do not encrypt your home directory and disable non-encrypted swap, then you really need to install TBB "relocatable" (this is default with the TorProject download) inside an encrypted volume. ALL sensitive encrypted files for upload AND download MUST be kept in encrypted volumes (preferably with detached headers stored in a master vol - make sure this is backed up though :D) If this is not done then somebody who can access your system can see what you did on Tor without going through decryption rigamarole. Here I fuzzed out. I was like, what is the point of this? If somebody who cares enough to access the physical blocks of your harddrive sees you have encrypted it, they'll simply figure a way to decrypt it. And then I remembered Veracrypt, mentioned by Zig above. VeraCrypt is considered "classified"/"illegal"/"forbidden" technology in my deceptive new universe. VeraCrypt can hide that the encrypted data is there at all. Like Tor, the developers have the footprints of political targeting on them. It frustrates those used to being able to hunt everything down, to be in research competitions with people who don't want everything to be hunted down. (sustaining corporate mafia coverups etc) And then all us kind developers get our lives messed up. I need to be able to recover my data when my media gets too damaged to mount, by scraping the undamaged sectors or using a tool like autopsy ( [2]https://www.sleuthkit.org/autopsy/ ) and I am happy to roll my own code to do this because I did it a lot before this situation landed. I wonder if there's a way to do this with VeraCrypt's encryption. Then also read up on the Topproject.org FAQs on how to increase security, which is a start, then come back here for any questions, and no doubt the BatSoup n.gger will set you straight on how bad your security is and how stupid you are for even thinking of using or in any way trusting TBB ;D What privacy vulnerabilities remain in Tor if browser fingerprinting and exploits are dealt with and traffic between nodes is maintained at a constant rate? Good luck and stay safe, Your not so friendly security N.ggerBot Sorry about the Bot thing. Do you have a Bot community? I was able to move back into my truck, off the floor of my friend I had been sleeping on for a few months, after the last email exchange, with goal of returning to caving. So wonderful, thinking of caving again. On Sat, Jul 18, 2020 at 02:20:37PM +1000, Zig the N.g wrote: > Dude, folks normally assume a desktop. Bad assuption these days I guess. > > BEFORE loading any Tor sites, but after installing, DISABLE JAVASCRIPT! Woah! Hide instead of reveal? Fun thing to learn. _avoiding_ bad stuff, what a crazy idea. uhhhhhhh O_O i'll try to learn to hide my identity if you try to stop saying n.gger-like or femin*zi-like words? i'll keep this idea of hiding my identity kicking around. i should probably be able to do that somehow, huh ... no more replies below just the ref to behavior meme software > > Tor n.ggers do not do this setting by default, on the basis that they want Tor Browser to be more popular. > > In reality, it is a trap to catch newcomers, and even old timers who install on a new device or etc. > > The Tor n.ggers also enable JavaShaft by default on every other Tor Browser platform too. You have been warned. > > Really, that's as n.ggardly as it gets! > > > Be careful out in the real world.. lotta n.ggers out there. > > > > On Fri, Jul 17, 2020 at 10:19:29PM -0400, Karl wrote: > > I had a dream once where I was spamming a cryptography list talking about a > > dream, where a surveillance worker was watching a crypto hacker who had > > been targeted as a terrorist, taking notes on them over breakfast when they > > didn't actually need to be working. The story was they were taken off the > > case because they were displaying care for the suspect. > > > > I am in a bind around installing Tor on my phone but I expect to resolve it > > within 9-15 months, possibly an hour. > > > > On Fri, Jul 17, 2020, 10:01 PM Punk-BatSoup-Stasi 2.0 <[3]punks@tfwno.gf> > > wrote: > > > > > On Fri, 17 Jul 2020 13:06:06 -0400 > > > Karl <[4]gmkarl@gmail.com> wrote: > > > > > > > On Thu, Jul 16, 2020, 3:37 AM Zig the N.g <[5]ziggerjoe@yandex.com> wrote: > > > > > > > > > Andrew Anglin continues his globalist shilling rather than uniting the > > > > > troops behind the nationalist, pro White fertility agenda. > > > > > > > > > > > > > whaaat who the heck is andrew and why are you talking about them? > > > > > > > > > "andrew anglin" is harkness' favourite white supremacist. There is proof inside many peoples' electronics. Proof that a marketing group would contract development of a frightening virus. A virus that responds to peoples' keystrokes and browsing habits, and changes what people see on their devices. A virus that alters political behavior en masse, for profit. References 1. mailto:ziggerjoe@yandex.com 2. https://www.sleuthkit.org/autopsy/ 3. mailto:punks@tfwno.gf 4. mailto:gmkarl@gmail.com 5. mailto:ziggerjoe@yandex.com