On 10/12/20, Karl <[email protected]> wrote: > Received this reply late. > > On 10/12/20, John Young <[email protected]> wrote: >> Use of any online or digital programs and/or devices for >> comsec/infosec should be avoided unless completely enclosed and >> transmitted with non-online or non-digital means. There are a number >> of non-onlne and non-digital means available, the first and most >> reliable is your brain so long as it is not contaminated with belief > > This shows that this guy has never been [s/hit in the head with a > baseball bat by a corporate goonie/forgetful/] or at least is too > [s/embarrassed among all these hackers/scared among all these > international influences/] to talk about it straight. Brains are > reliable because they teach us how to jump into burning dumpsters to > escape being hunted by goonies, not because they can store anything > permanently. > >> in online and digital prejudice now over a century in promulgaton. >> The principal efforts for this promulgation is computers, coding, >> obfuscation, propaganda, arcanity, scientism, residual astrology, >> confidence gaming, spouting mantras, i.e., "cypherpunks write code."
Adding recognition, late, that John is expressing _dislike_ of technology and software development. punk-stasi would like that, I imagine. > > You can tell this guy is a legit hacker because he is proposing to > write software instead of doing anything else. He's even reminding us > that it is expected that everybody here has that opinion. I can't > really understand most of what else he's saying. > >> >> https://www.google.com/search?q=cypherpunks+write+code&rlz=1C1AOHY_enUS708US708&oq=cypherpunks+write+code&aqs=chrome..69i57.5595j0j7&sourceid=chrome&ie=UTF-8 > > I typed this into duckduckgo ("cypherpunks write code") and got > results that look really great to me. I haven't tried google, > although usually I do try to [s/brainwash myself permanently in the > databases of people who hate my values/work with any success with my > corporate friends/] with it. > >> This oh so cool mantra derives from the magicial, bewitching >> lodestone "national security," the abiding weapon of nations governed >> as royalty, heirarchical, the few overlording the many with force, >> elections, education, faith and trivializing deriviatives of >> entertainment, media, chat, parties, militants, rebels, >> revolutionaries, independents, intellectuals, geniuses, "democracies" >> ruled by kingdoms of presidents, congresses, courts. >> >> Nonetheless, always a nonetheless apologia for top-down regimes, far >> more rewarding to cooperate with authorities than to defy them, more >> lucrative too. So backdoors in crypto, each and every version, must >> be inherent code, along with outpourings of assurances there are >> workarounds to escape the many and be one of the few. Today, that is >> marketed as "smart." > > Some of these words are likely a pretty avenue for new upcoming > hackers, like looking at a sunrise. If understood, you might be able > to use them to [s/manipulate everyone using google into ignoring the > cypherpunks movement and becoming corporate workers/make peace with > the people here who seem able to out-hack you/]. > > It sounds like he's also saying that cypherpunks is totally coopted by > government. Maybe we should ask them if they can help us with our > [s/spy mafia/forgetfulness/] issues? > > Noo ..... we know that govcorp is bad because it has [s/ripped our > bodies and communities to shreds/raised prices on important things > that people need/]. If this guy is a legit hacker (which is implied > by his "cypherpunks write code" expression), then by talking about > valuing backdoors in everything and national security, he would be > being _obviously sarcastic_, _begging for help_, a _corporate goonie > smart enough to say "cypherpunks write code"_, or most likely has been > _coerced by extensive mean experiences stemming from corporate > goonies_. This means he is somebody who can help us, and somebody we > can help, both! > >> At 06:23 AM 10/12/2020, Stefan Claas wrote: >>>Karl wrote: >>> >>>[...] >>> >>> > After finding a good candidate airgapped device, you'll want to be >>> > careful with how you use it. Remember, whenever a new vulnerability >>> > is found, trojans cover the world taking advantage of it, and then try >>> > to find a way to hide inside the corners of all the systems they find. >>> > So, any drive you put in your new device, anything you plug into it, >>> > any update you apply, could be filled with computer-measles that would >>> > find a way to trick it into giving remote control to them. Keep it >>> > isolated until you have things set up for use. >>> > >>> > The next step after getting a reasonable airgapped device, maybe a pi >>> > zero, and ideally keeping it isolated, would be to install gnupg on >>> > it. Maybe in a forthcoming email! >>> >>>GnuPG should be already installed with Linux (Raspberian OS etc.). The >>>thing I would like ask you, how would you communicate securely with your >>>air-gapped device? >>> >>>What I did in the past was to install on the online device and offline >>>device the free (cross-platform) software CoolTerm and I connected both >>>devices with an FTDI USB to USB cable, so that I could do serial >>>communications >>>and was also able to see how many bytes (from a PGP message) was >>> transfered. >>> >>>Another approach I am currently playing with is to play with NFC tags and >>>a reader/writer device, which can be used offline as well. >>> >>>Regards >>>Stefan >>> >>> >>>-- >>>NaClbox: cc5c5f846c661343745772156a7751a5eb34d3e83d84b7d6884e507e105fd675 >>> The computer helps us to solve problems, we did not have without him. >> >> >> >
