Received this reply late. On 10/12/20, John Young <[email protected]> wrote: > Use of any online or digital programs and/or devices for > comsec/infosec should be avoided unless completely enclosed and > transmitted with non-online or non-digital means. There are a number > of non-onlne and non-digital means available, the first and most > reliable is your brain so long as it is not contaminated with belief
This shows that this guy has never been [s/hit in the head with a baseball bat by a corporate goonie/forgetful/] or at least is too [s/embarrassed among all these hackers/scared among all these international influences/] to talk about it straight. Brains are reliable because they teach us how to jump into burning dumpsters to escape being hunted by goonies, not because they can store anything permanently. > in online and digital prejudice now over a century in promulgaton. > The principal efforts for this promulgation is computers, coding, > obfuscation, propaganda, arcanity, scientism, residual astrology, > confidence gaming, spouting mantras, i.e., "cypherpunks write code." You can tell this guy is a legit hacker because he is proposing to write software instead of doing anything else. He's even reminding us that it is expected that everybody here has that opinion. I can't really understand most of what else he's saying. > > https://www.google.com/search?q=cypherpunks+write+code&rlz=1C1AOHY_enUS708US708&oq=cypherpunks+write+code&aqs=chrome..69i57.5595j0j7&sourceid=chrome&ie=UTF-8 I typed this into duckduckgo ("cypherpunks write code") and got results that look really great to me. I haven't tried google, although usually I do try to [s/brainwash myself permanently in the databases of people who hate my values/work with any success with my corporate friends/] with it. > This oh so cool mantra derives from the magicial, bewitching > lodestone "national security," the abiding weapon of nations governed > as royalty, heirarchical, the few overlording the many with force, > elections, education, faith and trivializing deriviatives of > entertainment, media, chat, parties, militants, rebels, > revolutionaries, independents, intellectuals, geniuses, "democracies" > ruled by kingdoms of presidents, congresses, courts. > > Nonetheless, always a nonetheless apologia for top-down regimes, far > more rewarding to cooperate with authorities than to defy them, more > lucrative too. So backdoors in crypto, each and every version, must > be inherent code, along with outpourings of assurances there are > workarounds to escape the many and be one of the few. Today, that is > marketed as "smart." Some of these words are likely a pretty avenue for new upcoming hackers, like looking at a sunrise. If understood, you might be able to use them to [s/manipulate everyone using google into ignoring the cypherpunks movement and becoming corporate workers/make peace with the people here who seem able to out-hack you/]. It sounds like he's also saying that cypherpunks is totally coopted by government. Maybe we should ask them if they can help us with our [s/spy mafia/forgetfulness/] issues? Noo ..... we know that govcorp is bad because it has [s/ripped our bodies and communities to shreds/raised prices on important things that people need/]. If this guy is a legit hacker (which is implied by his "cypherpunks write code" expression), then by talking about valuing backdoors in everything and national security, he would be being _obviously sarcastic_, _begging for help_, a _corporate goonie smart enough to say "cypherpunks write code"_, or most likely has been _coerced by extensive mean experiences stemming from corporate goonies_. This means he is somebody who can help us, and somebody we can help, both! > At 06:23 AM 10/12/2020, Stefan Claas wrote: >>Karl wrote: >> >>[...] >> >> > After finding a good candidate airgapped device, you'll want to be >> > careful with how you use it. Remember, whenever a new vulnerability >> > is found, trojans cover the world taking advantage of it, and then try >> > to find a way to hide inside the corners of all the systems they find. >> > So, any drive you put in your new device, anything you plug into it, >> > any update you apply, could be filled with computer-measles that would >> > find a way to trick it into giving remote control to them. Keep it >> > isolated until you have things set up for use. >> > >> > The next step after getting a reasonable airgapped device, maybe a pi >> > zero, and ideally keeping it isolated, would be to install gnupg on >> > it. Maybe in a forthcoming email! >> >>GnuPG should be already installed with Linux (Raspberian OS etc.). The >>thing I would like ask you, how would you communicate securely with your >>air-gapped device? >> >>What I did in the past was to install on the online device and offline >>device the free (cross-platform) software CoolTerm and I connected both >>devices with an FTDI USB to USB cable, so that I could do serial >>communications >>and was also able to see how many bytes (from a PGP message) was >> transfered. >> >>Another approach I am currently playing with is to play with NFC tags and >>a reader/writer device, which can be used offline as well. >> >>Regards >>Stefan >> >> >>-- >>NaClbox: cc5c5f846c661343745772156a7751a5eb34d3e83d84b7d6884e507e105fd675 >> The computer helps us to solve problems, we did not have without him. > > >
