Packet Pusher
2.74K subscribers
773 photos
41 videos
11 files
557 links
InfoSec, Tor Relays, Monero, Linux. Shares ≠ Endorsements.

Mail: [email protected]
GPG: t.iss.one/packet_pusher/3
XMR:
858UDWfimHGPaTyckAjdLVhZcXztHMHfZNqNiuSw3545P1MACspMWqtimdULiwMSWsP47QNGwPeFUSaDTN9wfTUU6tKL1nQ
Download Telegram
Excellent script for finding public proxies that allow https traffic. What you decide to use them for is up to your imagination. Do also be careful and never trust a public proxy - ie use a VPN/Tor before connecting to said proxy.
https://github.com/stamparm/fetch-some-proxies
A good reason to ditch Bitcoin and similar cryptocurrencies in favor of Monero.

With that being said, the SPLC's publishing of Monero addresses holds no weight because, unlike other cryptocurrencies, there is no way for them to surveil the inputs and outputs of the Monero blockchain.

TLDR: Basically, they can't see who sends Monero to a given wallet, where funds from that wallet go, or even if the given wallet has funds in it to begin with. That is the power of Monero.
https://mobile.twitter.com/Hatewatch/status/1480651996302557187
***Repost, but still highly relevant.***

BLUF: Use at least a 7 to 8 word passphrase for encryption.

For something like full disk encryption, you will want to use some kind of randomly generated passphrase consisting of at least 7 to 8 words for security against normal bruteforcing.

Why a couple of words and not just some 16 or 20 random character password? Memorization. A passphrase is significantly easier to memorize compared to a password, and it holds up stronger thanks to key stretching.

For security against an adversary (like the NSA/FBI) who will probably have a quantum computer within the next decade, the passphrase needs to be longer.
Packet Pusher
***Repost, but still highly relevant.*** BLUF: Use at least a 7 to 8 word passphrase for encryption. For something like full disk encryption, you will want to use some kind of randomly generated passphrase consisting of at least 7 to 8 words for security…
It really boils down to what your threat model is. It could include any number of things from simple unauthorized access, all the way to the feds confiscating your mobile device and hooking it up to one of Cellebrite's black boxes - in the end, its up to you.
Packet Pusher
https://www.eff.org/dice
Use something like a password manager as well. Say you use something like KeePassXC or Bitwarden to manage passwords and have a phone and a laptop. You would only have to memorize 3 passphrases. One to unlock your password manager and the other two to unlock your devices. The rest can all be safely stored in your password manager.
1
Remember to back your stuff up - you never know when you'll accidentally '$ rm -rf /incredibly-important-system-directory' 🙄
1
Packet Pusher
Remember to back your stuff up - you never know when you'll accidentally '$ rm -rf /incredibly-important-system-directory' 🙄
Oh a little word on this - if you are lazy like me, you can create a bash alias for rm to help prevent mistakes from being made.

Just append alias rm='rm -i' to your bash aliases (can be found at ~/.bash_aliases). With that set, whenever you use the rm command, you will be prompted before removing a file. It helps because having to enter y or n for every removal makes you think twice before deleting a file. It's not foolproof, but it is better than no bash alias for rm.
👍91💩1
Uh oh looks like one of my relays has been down for like ~5days 😳
Just checked with cockbox and checked my cockmail and nothing out of the ordinary it seems. Might need to adjust the bandwidth though because it may have become overloaded.
Server is back up and running now. Tor will likely be restarted on both relays after I adjust the bandwidth because they both use the same torrc.