On Fri, Oct 05, 2012 at 05:43:46AM +0200, Maxim Kammerer wrote:
Did anyone try this with devices that are supposed to be resistant to
file shredding due to wear leveling? I tried the following on two USB
Wear levelling is a function of newer devices (your old
USB flash sticks are unlikely to
On Fri, Oct 5, 2012 at 8:33 AM, Eugen Leitl eu...@leitl.org wrote:
Wear levelling is a function of newer devices (your old
USB flash sticks are unlikely to have it, but your new
SSD definitely has) and it hides damaged blocks
transparently by using the overprovisioned flash
block pool (its
I'd at least wipe my phone, if not just get a burner. I suppose encryption is
also an option, so that you can preload it with security apps.
-Andrew
On Oct 5, 2012, at 7:02 AM, Katy P katyca...@gmail.com wrote:
Hi LibTech.
With a certain event coming up, I'm interesting in creating a best
Depends on your threat model but since since I think I know what country
your are talking about, might be worth taking more precautions:
* burner phone
* wiped disposable laptop w Tor etc
* trusted VPN (maybe)
* bootable linux like TAILS
* possibly encryption but frowned upon if not outright
Good day to you all :)
On 10/05/2012 03:57 AM, Griffin Boyce wrote:
Hey all,
Considering both the complexity of material and the time constraints
involved, the handbook came out beautifully. It's well-laid out and
covers a surprisingly large number of topics step-by-step at a beginner
A key recommendations when visiting countries where repression against
activists is well documented is to minimize exposure of data, be it from your
devices or social media accounts
(1) travel pc's
Machines can get compromised by malware, theft or sabotage. As such, steps
should be taken to
On Thu, 4 Oct 2012 14:13:13 -0700
Andrew Mallis o...@ideograph.ca wrote:
This 392 page, Creative Commons licensed handbook is designed to help those
with
no prior experience to protect their basic human right to Privacy in
networked, digital domains.
This seems like good stuff, but I have