I might respond to your smart argument here (against security on a security-focused list) but I'm more worried about all the strange things that follow it.
Do you know why I want to pressure you into stopping or changing your posts? In me I think it has to do with disagreeing with you and having no dialogue. Are you trying to manipulate us? On Wed, Oct 14, 2020, 7:33 PM Zenaan Harkness <[email protected]> wrote: > The top down regimes are the only regimes we see. There are no > significant non-hierarchical regimes which dominate, and hierarchical > regimes dominate. At least historically. > > This presents the dilemma: > > - better tech is co-opted by the regime of the day, or is used to create > a new, more dominant, regime > > - if better tech = "un-breakable" tech, this may also mean an > unchallengable dominant regime > > - present tech is so riddled with "backdoors", at every level (hw, bios, > drivers, kernel, comms, devices, apps), that improving one level likely > poses exactly Zero threat (of "lack of back door to escape/ prod the > regime") to dissidents > > - any better-than-Tor Tor replacement, even a very good one, is presently > "bound" by the limitations of Apple and Gewgoyle 'walled gardens', > backdoored uefis and wifis and usb-is and central network-skis and etc-is, > that said better than Tor alt net poses relatively little obstacle to > neo-traditional "full take" bulk spy us all, and likewise little limitation > to regime prodding hacker crackers and their "flashing GIFs and they're on > the Internet and nobody can find them please make me Sec Def my arse is > about to do serious prison time forget Benghazi pls focus on Burisma" > > > Soap, one more time: in the short to medium term, we are nowhere near > "crack hack proof" tech, hw, nets, etc. Privacy improvements, for what > they're worth, and to the extent the balance tilts to their being utilized > by lower downs in their dissidence against higher ups (rather than vice > versa), may well be useful stepping stones to #100+435, or the next Goldman > doc dump, or whatever floats yer boat. > > > --- > Every meme, caution, constructive step to take, consideration, is time > dependent, and time track dependent. The backdoor caution is future time, > a possible future track. Today's actions by we "little butterflies > flapping our Lorenzian wings of intention nudging towards future outcomes > from the chaotic soup of present possibilities" are bound in the present > moment, notwithstanding their potentially incredible futures. > > Much to consider. > > Some easy answers, some tough cnuts. > > > --- > On the scale of ~380 million USA population, today's engagement in 'the > public political discourse' is a huge rung above what most of history > discloses. Thank memes. Thank Pepe le Begotten Son of Kek. Thank the > "bad" orange man who grabbed US backruptcy laws by the coccyx to succeed > where few goys have succeeded. > > The NRA beckons - protect your great Second Amendment - become a paid > member - target weak red and blue seats - grab that present public > engagement surfboad and ride the bloody wave already - opportunities > muffas! - wreak some libertine havok - teach the #NeverTrump ers a bloody > lesson - embrace your inner gun nut, or free speech nut, or leadership nut, > or cheerleader nut or or or .... > > HINTs: > > - If you take a Red or Blue seat in 2022, and you are a "3rd or 4th or > independent seat holder", you can STILL give your vote to Trump (or whoever > of course...) in the "race to 270" electoral college vote. > - When targetting a weak seat, there are many ways to target, e.g.: > - run within the party of the seat you are targetting (R or D), > - or run with a 3rd or new party if that is a better strategy e.g. > libertarian or NRA affiliate or whatever, > - e.g. to split the vote of say a D seat and help hand that seat to > Trump, consider do this by pre-arrangement with your actual Memester or NRA > buddy (this relationship unknown publicly) running for Trump, whilst you > feign to "vehemently" oppose him as you split the D vote for that > particular seat :D > > - Consider to reduce false dichotomies - If any topic gets too hot for > you to handle when being questioned, run it as "conscience vote", that is, > certain social or socio-political issues (e.g. abortion), if it gets too > hot to handle, handball it to "that should be a conscience vote". > > Have fun muh gritties ... > > If the Blue or some other pill is your thing, put brain into gear, target > the weak spots, coordinate, engage, wrangle some joy outta life as you do > your thing. Some will appear to assist you as many prefer to follow. > > If politics is not your thing, figure out what is your thing in your life, > perhaps farming, family, shooting, fishing, travelling. > > Live your best life in this world you find yourself in. > > Good luck and God speed, > > > > > On Mon, Oct 12, 2020 at 08:39:12AM -0400, John Young wrote: > > Use of any online or digital programs and/or devices for comsec/infosec > should > > be avoided unless completely enclosed and transmitted with non-online or > > non-digital means. There are a number of non-onlne and non-digital means > > available, the first and most reliable is your brain so long as it is not > > contaminated with belief in online and digital prejudice now over a > century in > > promulgaton. The principal efforts for this promulgation is computers, > coding, > > obfuscation, propaganda, arcanity, scientism, residual astrology, > confidence > > gaming, spouting mantras, i.e., "cypherpunks write code." > > > > > https://www.google.com/search?q=cypherpunks+write+code&rlz=1C1AOHY_enUS708US708&oq=cypherpunks+write+code&aqs=chrome..69i57.5595j0j7&sourceid=chrome&ie=UTF-8 > > > > This oh so cool mantra derives from the magicial, bewitching lodestone > > "national security," the abiding weapon of nations governed as royalty, > > heirarchical, the few overlording the many with force, elections, > education, > > faith and trivializing deriviatives of entertainment, media, chat, > parties, > > militants, rebels, revolutionaries, independents, intellectuals, > geniuses, > > "democracies" ruled by kingdoms of presidents, congresses, courts. > > > > Nonetheless, always a nonetheless apologia for top-down regimes, far more > > rewarding to cooperate with authorities than to defy them, more > lucrative too. > > So backdoors in crypto, each and every version, must be inherent code, > along > > with outpourings of assurances there are workarounds to escape the many > and be > > one of the few. Today, that is marketed as "smart." > > > > > > At 06:23 AM 10/12/2020, Stefan Claas wrote: > > > Karl wrote: > > > > > > [...] > > > > > > > After finding a good candidate airgapped device, you'll want to be > > > > careful with how you use it. Remember, whenever a new vulnerability > > > > is found, trojans cover the world taking advantage of it, and then > try > > > > to find a way to hide inside the corners of all the systems they > find. > > > > So, any drive you put in your new device, anything you plug into it, > > > > any update you apply, could be filled with computer-measles that > would > > > > find a way to trick it into giving remote control to them. Keep it > > > > isolated until you have things set up for use. > > > > > > > > The next step after getting a reasonable airgapped device, maybe a pi > > > > zero, and ideally keeping it isolated, would be to install gnupg on > > > > it. Maybe in a forthcoming email! > > > > > > GnuPG should be already installed with Linux (Raspberian OS etc.). The > > > thing I would like ask you, how would you communicate securely with > your > > > air-gapped device? > > > > > > What I did in the past was to install on the online device and offline > > > device the free (cross-platform) software CoolTerm and I connected both > > > devices with an FTDI USB to USB cable, so that I could do serial > > > communications > > > and was also able to see how many bytes (from a PGP message) was > transfered. > > > > > > Another approach I am currently playing with is to play with NFC tags > and > > > a reader/writer device, which can be used offline as well. > > > > > > Regards > > > Stefan > > > > > > > > > -- > > > NaClbox: > cc5c5f846c661343745772156a7751a5eb34d3e83d84b7d6884e507e105fd675 > > > The computer helps us to solve problems, we did not have without him. > > > > >
