Shit pedes...Get in here!!!! The Q Confirmation we have been L👀king for?
(media.greatawakening.win)
C O N F I R M A T I O N
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (153)
sorted by:
It does, if used properly anyhow.
negative ghostrider. You can use a burner laptop at mcdonalds and still get caught
Yup, if you're doing it wrong.
I'm considered an "expert" in the field of high assurance/robustness computing/networking systems. I'm happy to address what threats you think may exists, but right now you're just spreading FUD.
Enlighten me. PGP can be cracked...supercomputers exist.
Let me know how to be invisible with TOR please because right now I dont believe
you are spreading BS
Yes, PGP can be cracked... kinda. 56bit, definitely, but as the key size increases, the difficulty increases exponentially. Even 80bit will be out of reach for many years.
TOR most uses AES-128 and 256 as well as a few other ciphers for various tasks. I apologize for the reddit link, but it was the most informative conversation I could find on the subject with people giving voice to both sides of AES cracking.
https://www.reddit.com/r/sysadmin/comments/qwpqxk/aes_broken/
When using TOR, you may also use a free VPN service and ideally are accessing services with end-to-end encryption, like TLS or HTTPS. These will dramatically increase the complexity of your situation by protecting you against TOR end point attacks.
Keep signals analysis in mind. Try to not always connect to TOR from the same place, don't just connect to do what you're doing and then disconnect, etc.
Finally, mind your local system, encrypted VM, no javascript, etc.