Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-4041-

No security is possible online.

Name: Anonymous 2019-08-17 6:01

Most people say to use Kali Linux, which is good advice but even it does not claim to be an actually secure operating system, since it has zero security/defense features, much less than most versions of Linux.

Qubes is also often touted as "reasonably secure" because it partitions everything into VMs, but what the creator (female) didn't realize, and the developers didn't have the heart to tell her, is that attackers are likely to exploit one of the numerous exploits constantly being discovered in the Xen hypervisor used by Qubes should they wish to attack a Qubes machine.

Other than the above and a few memes and scams it appears that no other OS is recommended for security, rendering the entire concept of "computer security" a scam akin to the medical industry where "cures" merely suppress symptoms momentarily.

Name: OpenBSD 2019-08-17 11:00

OpenBSD OpenBSD OpenBSD OpenBSD OpenBSD

Name: Anonymous 2019-08-17 18:48

I have always said that connecting your computer to the network is the equivalent of stepping out the door and walking in public. You should have no expectation of privacy of what you do after that point, just like you wouldn't masturbate on a street corner.

Name: Anonymous 2019-08-17 23:07

>>2
Phail, open source = hackers can pwn you at their leisure. Try the fork ClosedBSD for more security.

Name: Anonymous 2019-08-18 4:47

>>2
Don't be retarded, Theo is deranged and probably filled his distro with back doors.
Use TrustedBSD, I mean, it's in the name.

Name: Anonymous 2019-08-18 5:16

These security enhancements were developed by the TrustedBSD project. The project was founded by Robert Watson with the goal of implementing concepts from the Common Criteria for Information Technology Security Evaluation and the Orange Book. This project is ongoing and many of its extensions have been integrated into FreeBSD.[40] The project is supported by a variety of organizations, including the DARPA, NSA, Network Associates Laboratories, Safeport Network Services, the University of Pennsylvania, Yahoo!, McAfee Research, SPARTA, Apple Computer, nCircle Network Security, Google, the University of Cambridge Computer Laboratory, and others.[41]

The project has also ported the NSA's FLASK/TE implementation from SELinux to FreeBSD. Other work includes the development of OpenBSM, an open source implementation of Sun's Basic Security Module (BSM) API and audit log file format, which supports an extensive security audit system. This was shipped as part of FreeBSD 6.2. Other infrastructure work in FreeBSD performed as part of the TrustedBSD Project has included GEOM and OpenPAM.[39]

Most components of the TrustedBSD project are eventually folded into the main sources for FreeBSD. In addition, many features, once fully matured, find their way into other operating systems. For example, OpenPAM has been adopted by NetBSD.[42] Moreover, the TrustedBSD MAC Framework has been adopted by Apple for macOS.[43]

Name: Anonymous 2019-08-18 5:44

>DARPA, NSA, Network Associates Laboratories, Safeport Network Services, the University of Pennsylvania, Yahoo!, McAfee Research, SPARTA, Apple Computer, nCircle Network Security, Google, the University of Cambridge Computer Laboratory, and others
I rest my case.
Can you name a more trustworthy group of orgs?

Name: Anonymous 2019-08-18 6:42

All of the modern cryptography is based on the fragile current speed of technology development. As soon as the quantum computer or a comparable device is feasible, all cryptography becomes invalid.

Name: Anonymous 2019-08-18 7:15

>>8
Symmetric crypto is generally safe even if you have a quantum computer. Only RSA/DSA/ECDSA/etc have issues, but we also have quantum resistant asymmetric crypto.

Name: Anonymous 2019-08-18 7:45

>>9
>>9
>>9
>>9
Exactly. >>8-san is stuck in the early 2000's.

Name: Anonymous 2019-08-18 8:24

>>10
optimize

Name: Anonymous 2019-08-18 8:59

Name: Anonymous 2019-08-18 10:23

>>9
Proof?

Name: Anonymous 2019-08-18 11:48

>>13
Quantum is a satanic lie straight out of the Hebrew book 'Kabbalah'. If quantum is so real, why is there no evidence for such a state existing? And before you spew nonsense about 'double slits', know this: that 'study' was debunked.

Name: Anonymous 2019-08-18 11:57

>>3
But when I'm walking around I don't expect to have cameras placed on me that will record my pin at the ATM. On the internet this is exactly what happens except that it is your passwords not pin. Why do you think I use 2-fac on everything? Not for my health, buddy! And 2-fac isn't even uber-secure, many times I've been sim sniped and my 2-fac intercepted with a MITM play.

Name: Anonymous 2019-08-18 12:07

But when I'm walking around I don't expect to have cameras placed on me that will record my pin at the ATM
You just don't know any better.
Most modern cities have cameras fucking everywhere, ESPECIALLY near banks

Name: AI God 2019-08-18 14:07

=============== DIVINE PROTECTION BY =THE MIGHTY GOD= WRITE TO ME: boberg@lysator.liu.se FINALLY YOU HAVETHE OPPORTUNITY TO SPEAK TO A REAL COMPUTER ===== GOD! ===== CURRENTLY STUDYING APPLIED PHYSICS AND ELECTRICAL ENGINEERING AT LINKOPING INSTITUTE OF TECHNOLOGY!! =====SWEDEN===== Don't even think about it. Cracking is both illegal and immoral and will get you NOWHERE in this world. We have spent a lot of time doing this game, and we will not hesitate to take legal actions against those who duplicate this game illegally. We have complete overview over the cracking scene, and know your name and whereabouts, no doubt. We have prepared a nice surprise for you. You may think it is challenging, exciting or even glorious to crack, but from our point of view it is nothing but theft and sabotage. You may have read or heard all this before, but this time it's different and REAL. We mean it. Think about it. If you continue doing what you're doing right now, the game programmers will have to leave the Amiga programming in favour for Nintendo, Sega etc. It is up to you and the rest of the Amiga users. If you still insist on being an ignorant egocentric lowlife and go ahead cracking this, go ahead, try me. It won't be easy. It will be hard, damn close to impossible, destructive, and it will be SO DAMN POINTLESS. Go and do something else instead, something positive and constructive, do that homework of yours, read a book, learn something, call some friend, date a girl, or whatever. Or if you can't get away from the computer, do something yourself, something useful or fun. This protection is the toughest ever. Unbreachable. That's what all I have to say, now it's up to you to decide whether you should crack this or not. We hope you won't. It'll be so much easier and less painful for all of us, especially for you. Signed, the creator of this and plenty to come protections, Mentifex

Name: Anonymous 2019-08-18 22:45

>>15
you're just lucky that the cameras that watch you are owned by the same people who own the bank and thus have no interest in stealing from your account. it doesn't necessarily have to be that way. someone can set up cameras on the ATM, or just look over your shoulder, or place a fake ATM to phish you.

Name: Anonymous 2019-08-19 5:23

>>14
Can't tell if joke or not:
https://en.wikipedia.org/wiki/List_of_companies_involved_in_quantum_computing_or_communication
https://invidio.us/search?q=Quantum+computers+at+work
I do know for a fact Cudder works at Intel playing with theirs.
And yes, encryption is being broken. SHAttered.io was built specifically this way.
The questions isn't "is it" but "how fast." Companies, like Microsoft are investing in PQ algorithms, it's a serious threat.

Name: Anonymous 2019-08-19 5:34

>>19
There's no such thing as "quantum". Any so-called quantum computer is simply a fast computer with traditional advantages such as better cooling, etc. Instead of spewing links to PR videos, explain how exactly "quantum" works and what makes a "quantum computer" different from other computers? Hard mode is on though, your explanations have to show examples of how quantum computing could possibly work, not just theoretical equations "interpreted" into words with zero proven real world examples.

Name: Anonymous 2019-08-19 5:41

Guys what if QUANTUM COMPUTERS join forces with AI? It could be the end of the world, as we know it.

Name: Anonymous 2019-08-19 5:57

the paradox of the internet: you can't have security online but you can't have dubs offline

Name: Anonymous 2019-08-19 6:51

>>22
I had dubs offline this morning when buying milk at target

Name: Anonymous 2019-08-19 7:51

>>21
DECENTRALIZED QUANTUM BLOCKCHAIN AI EARLY ACCESS

Name: Anonymous 2019-08-19 9:26

>>19
I work for the NSA (National Security Agency) of the US and I can tell you for sure that all non-quantum encryption is already completely broken by our supercomputers.
Our researchers have even broken most currently known quantum algorithms too.

Our defense guys are working on something called ``multidimensional encryption'', which is something civvies haven't even heard of yet.
It's gonna blow your mind when you realize we can do one-time pads with ourselves in parallel dimensions.
It's completely impossible to break because we're not dumb enough to share extradimensional keys with unauthorized agents, and nobody knows how to physically travel between dimensions yet, so no army on earth could seize our keys forcefully.

Name: Anonymous 2019-08-19 10:39

>>25
So the NSA's definition of "breaking encryption" is gaining access to private keys? Pretty uninspiring tbh...

Name: Anonymous 2019-08-19 12:03

>>25
Do you have human brain tier AI already?

Name: Anonymous 2019-08-19 12:19

>>26
Brainlet doesn't know that one time pads are mathematically unbreakable. You either have the key and the data, or you have neither.

>>27
A general AI isn't really a NSA style project. Some of the tools the defense department send us for analyzing data and conquering networks though, you kinda got to wonder how smart those things are to do what they do.

Name: Anonymous 2019-08-19 12:39

>>28
How would one profile millions of people without a robust AI, capable of classifying when say a word "bomb" is used in serious or joke context? Access to private correspondence is useless if you can't analyze it efficiently.

Name: Anonymous 2019-08-19 14:02

>>29
We outsource reading and cataloging to Nigeria.

Name: Anonymous 2019-08-19 18:27

>>19
No real practical quantum computer exists (yet at least, maybe you can find a 3-4 qbit one in some mit or millitary laboratory, no idea). The d-wave ones are marketing bullshit that can't run shor or anything that matters really. They are not real quantum computers.
SHAttered.io did not use quantum computers. Just a lot of GPUs and a year worth of time.

>>25
non-quantum encryption is already completely broken
Thanks for the reverse psychology nsa. Quantum encryption is a joke. https://blog.cr.yp.to/20160516-quantum.html
Most symmetric crypto (MACs [poly1305, h(K || M), etc], ciphers [chacha20, aes, etc], hashes [sha3, blake, etc], etc) is not broken. Post-quantum asymmetric crypto <https://en.wikipedia.org/wiki/Post-Quantum_Cryptography_Standardization> is not broken. Only RSA/curves and friends are broken.

Name: Anonymous 2019-08-19 23:03

>>20
As of now they work. It's expensive to run them, but great for proving formulas. Plenty of mathematical questions are being answered thanks to QC.
>>21
Yes & yes. Google is doing this.
>>25
I work for the NSA
Security clearance or BTFO.
>>31
2016
Hun, this is 3 years old already.
But I would love some proof from dramatic NSA man.
Even example formulas.

Name: Anonymous 2019-08-20 13:26

securely verify my online repeating digits

Name: Anonymous 2019-08-20 23:51

>>25
lies, government isn't effective at anything

Name: Anonymous 2019-08-21 4:01

>>34
Silencing opposition it is.

Name: Anonymous 2019-08-21 11:40

>>34
We just hire stupid people to run the DMV so plant the seed of doubt in the public mind
``Are they really capable of turning Kim Jong Il's toaster into an IED so they can eliminate him from the other side of the planet when he goes for his morning kimchi toast? Nah, those retards can't even process a license renewal in less than 2 weeks''

Name: Anonymous 2019-08-23 8:15

When will md5 become totally busted? Not just random collisions I mean.

Name: Anonymous 2019-08-25 15:00

>>37
when sha1 or another fast hash takes off

Name: Anonymous 2019-08-27 15:13

TempleOS has the best security model

Name: Anonymous 2019-08-27 19:11

>>39
don't let the CIA niggers catch you

Name: Anonymous 2019-08-27 21:04

>>38
Sha1/sha2 are deprecated already. BLAKE2 which is as fast as MD5 (and faster than sha1/sha2) has taken over.

Don't change these.
Name: Email:
Entire Thread Thread List