Shit pedes...Get in here!!!! The Q Confirmation we have been L👀king for?
(media.greatawakening.win)
C O N F I R M A T I O N
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (153)
sorted by:
negative ghostrider. You can use a burner laptop at mcdonalds and still get caught
Yup, if you're doing it wrong.
I'm considered an "expert" in the field of high assurance/robustness computing/networking systems. I'm happy to address what threats you think may exists, but right now you're just spreading FUD.
Enlighten me. PGP can be cracked...supercomputers exist.
Let me know how to be invisible with TOR please because right now I dont believe
you are spreading BS
then enlighten me
Yes, PGP can be cracked... kinda. 56bit, definitely, but as the key size increases, the difficulty increases exponentially. Even 80bit will be out of reach for many years.
TOR most uses AES-128 and 256 as well as a few other ciphers for various tasks. I apologize for the reddit link, but it was the most informative conversation I could find on the subject with people giving voice to both sides of AES cracking.
https://www.reddit.com/r/sysadmin/comments/qwpqxk/aes_broken/
When using TOR, you may also use a free VPN service and ideally are accessing services with end-to-end encryption, like TLS or HTTPS. These will dramatically increase the complexity of your situation by protecting you against TOR end point attacks.
Keep signals analysis in mind. Try to not always connect to TOR from the same place, don't just connect to do what you're doing and then disconnect, etc.
Finally, mind your local system, encrypted VM, no javascript, etc.
Thank you for the follow up with good information to back it up. I will yield to your superior knowledge on this one but if quantum tech exists then im honestly jist not sure what is truely anonymous anymore. Is tails sufficient in place of the encrypted VM? Should financial transactions be executed with Monero?
I am not at the forefront of this stuff which is why my confidence in it isnt as high as yours. Thank you for the knowledge either way!
Tor can be compromised via one of the nodes being a honey pot or something