Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

Wall Storage

Name: Anonymous 2011-01-02 15:51

So, I was surfing /b/ and somebody was talking about their friend getting caught with CP, and this one guy was like "I'm gonna put a wifi storage in my wall" That got me thinking, what would be the cheapest and safest (I don't want to burn my house down) way to do that, not to save CP, but just to securely save stuff should I ever realize my dream of becoming a spy.

Name: Anonymous 2011-01-02 18:49

Magents

Name: Anonymous 2011-01-02 18:49

>Browsing /b/

why.jpg

Name: Anonymous 2011-01-02 18:58

Fairly straight forward, just a little Atom board with a wireless NIC and a whole bunch of drives would do that trick. Though you'd probably need to think about a way to implement a way to power cycle and turn the broadcast on and off. Perhaps a microcontroller with a radio receiver?

Name: Anonymous 2011-01-02 19:46

Encrypt it in a password protected .rar file

Name: Anonymous 2011-01-02 21:12

Encrypt it with Truecrypt, use default settings and a nice 20+ Digit password, that will show those fags over at the NSA who is boss.

Name: IOIX 2011-01-02 21:23

Are you sure encryption algorithms don't have a government backdoor?

Name: juicy couture 2011-01-02 21:48

Do you know the world famous brand juicy couture? Juicy Couture Sale online at low price!!! You can find all kinds of dream cheap juicy couture, cute juicy couture handbags here. Trendy ladies, get ready! Don’t hesitate to purchase juicy couture outlet products. Hurry up!

Name: Anonymous 2011-01-03 15:33

TrueCrypt AES256 [HDD ENCRYPTION]
TOR Onion Routing [ICLEANDIC BASED PROXY, i.e. Interpol can not reach.]
In-Private Browsing // Incognito [LSO + MACROMEDIA COOKIE DELAY]
CCleaner > Wipe Free Space (4 passes) [OVERWRITES "RECYCLED" FILES WITH 0s and 1s]

Name: Anonymous 2011-01-03 15:42

Additionally note encryption algorithms do have a backdoor:

1) NSA has had monitoring software within Windows Kernel since Windows 95

2) TrueCrypt does not encrypt all partitions. Macintosh, GNU Linux, and Windows Kernels [SOLARIS IS UNKNOWN] all have hidden partitions accessible. Search TrueCrypt site for how to encrypt these partitions as well.

3) Hidden operating systems are also worthy to protect your files, and mislead a forensic analyst. Make sure your encryptions are 20+ password length. Encrypting your disk will slow it down slightly, but you can turn off the "active" start-up program to prevent this and simply keep the "passive" boot-password.

OFF NOTES

Beware of honeypot proxy and VPN services, such are used by keyloggers and occasionally government officials. Honeypots are mostly government owned websites, used to "trap" someone.

If you do not want anything stored. Used a BackTracks GNU Linux "live CD" and unplug your storage devices.

If someone really wanted to know what you're up to, they'd packet sniff your network through the ISP. HIGHLY UNLIKELY, unless you do some serious NOC backbone breaking hacking like the GCHC

Name: Anonymous 2011-01-03 18:32

Fuck TrueCrypt. Use Linux and encrypt all but your boot partition with dm-crypt and LUKS. Thats it. No-one can get in unless you give them the password which is a much more likely scenario as you lie in your cell scared shitless.

Don't change these.
Name: Email:
Entire Thread Thread List