Shit pedes...Get in here!!!! The Q Confirmation we have been L👀king for?
(media.greatawakening.win)
C O N F I R M A T I O N
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (153)
sorted by:
Yup, if you're doing it wrong.
I'm considered an "expert" in the field of high assurance/robustness computing/networking systems. I'm happy to address what threats you think may exists, but right now you're just spreading FUD.
Enlighten me. PGP can be cracked...supercomputers exist.
Let me know how to be invisible with TOR please because right now I dont believe
you are spreading BS
then enlighten me
You're saying 'PGP' can be cracked because supercomputers exist.. Unless there is a backdoor into PGP (which would not require a supercomputer), no supercomputer could come close to cracking it.. The math behind proper computer encryption is like trying to identify a single atom in the known universe. Cryptocurrency and normal bank accounts would not be able to be secure at all..
Yes, PGP can be cracked... kinda. 56bit, definitely, but as the key size increases, the difficulty increases exponentially. Even 80bit will be out of reach for many years.
TOR most uses AES-128 and 256 as well as a few other ciphers for various tasks. I apologize for the reddit link, but it was the most informative conversation I could find on the subject with people giving voice to both sides of AES cracking.
https://www.reddit.com/r/sysadmin/comments/qwpqxk/aes_broken/
When using TOR, you may also use a free VPN service and ideally are accessing services with end-to-end encryption, like TLS or HTTPS. These will dramatically increase the complexity of your situation by protecting you against TOR end point attacks.
Keep signals analysis in mind. Try to not always connect to TOR from the same place, don't just connect to do what you're doing and then disconnect, etc.
Finally, mind your local system, encrypted VM, no javascript, etc.
Thank you for the follow up with good information to back it up. I will yield to your superior knowledge on this one but if quantum tech exists then im honestly jist not sure what is truely anonymous anymore. Is tails sufficient in place of the encrypted VM? Should financial transactions be executed with Monero?
I am not at the forefront of this stuff which is why my confidence in it isnt as high as yours. Thank you for the knowledge either way!
You're very welcome! This is a subject I am very passionate about and hope others can use, especially in democratizing and whistleblowing efforts.
Quantum computing is an interesting area with regards to encryption, but it is many generations away from real world practicality. I mean MANY generations, not "you can't buy them yet, but everyone's favorite three letter agencies have them."
Here is the thing, honestly, you don't even need TOR, which is mostly useful for communication in a restrictive state. If you're in the west, you can easily connect to a poorly secured/open wifi network. Just don't use the same one with any regularity, if you live in an urban area this should not be an issue. Being air gapped like this, dramatically spikes the cost of investigation to the point of infeasibility.
For your encyrpted VM, I was a bit unclear, I mean that the drive should be encrypted in case your system is siezed. As for what OS to use as the host or the guest, it really doesn't matter. Anything that can support TOR browser is sufficient. You're really just looking to create another layer of abstraction to hopefully contain anything you overlooked that might give you away. The more generic and default, the better.
For the currency to use, this is getting beyond my area of expertise and I couldn't give anything better than a lay abswer that you should not put much weight in.
Tor can be compromised via one of the nodes being a honey pot or something
Not really, no.
Edited... I mean, this is a threat, but when using TOR, you should assume the entry and exit nodes are compromised.