If you are going to be publishing sensitive information, don't count on pixelation to safely redact information. Use full black-box redaction to safely redact stuff.
https://positive.security/blog/video-depixelation
https://positive.security/blog/video-depixelation
positive.security
Recovering redacted information from pixelated videos | Positive Security
We explore the history of image unblurring and present a simple yet effective technique to get a high-resolution image from a pixelated video in order to recover redacted information (with no guessing involved).
Packet Pusher
https://lilithwittmann.medium.com/bundesservice-telekommunikation-enttarnt-dieser-geheimdienst-steckt-dahinter-cd2e2753d7ca
AppleInsider
Apple's AirTag uncovers a secret German intelligence agency
A researcher has sent one of Apple's AirTags to a mysterious "federal authority" in Germany to locate its true offices — and to help prove that it's really part of an intelligence agency.
Excellent script for finding public proxies that allow https traffic. What you decide to use them for is up to your imagination. Do also be careful and never trust a public proxy - ie use a VPN/Tor before connecting to said proxy.
https://github.com/stamparm/fetch-some-proxies
https://github.com/stamparm/fetch-some-proxies
GitHub
GitHub - stamparm/fetch-some-proxies: Simple Python script for fetching "some" (usable) proxies
Simple Python script for fetching "some" (usable) proxies - stamparm/fetch-some-proxies
A good reason to ditch Bitcoin and similar cryptocurrencies in favor of Monero.
With that being said, the SPLC's publishing of Monero addresses holds no weight because, unlike other cryptocurrencies, there is no way for them to surveil the inputs and outputs of the Monero blockchain.
TLDR: Basically, they can't see who sends Monero to a given wallet, where funds from that wallet go, or even if the given wallet has funds in it to begin with. That is the power of Monero.
https://mobile.twitter.com/Hatewatch/status/1480651996302557187
With that being said, the SPLC's publishing of Monero addresses holds no weight because, unlike other cryptocurrencies, there is no way for them to surveil the inputs and outputs of the Monero blockchain.
TLDR: Basically, they can't see who sends Monero to a given wallet, where funds from that wallet go, or even if the given wallet has funds in it to begin with. That is the power of Monero.
https://mobile.twitter.com/Hatewatch/status/1480651996302557187
Twitter
Hatewatch
.@splcenter has updated its list of cryptocurrency addresses used by extremists & hate groups to include 500+ publicly advertised addresses used to accept donations in #Bitcoin, #Litecoin, #Ethereum, and #Monero. View the list below. splcenter.org/cryptocurrency…
***Repost, but still highly relevant.***
BLUF: Use at least a 7 to 8 word passphrase for encryption.
For something like full disk encryption, you will want to use some kind of randomly generated passphrase consisting of at least 7 to 8 words for security against normal bruteforcing.
Why a couple of words and not just some 16 or 20 random character password? Memorization. A passphrase is significantly easier to memorize compared to a password, and it holds up stronger thanks to key stretching.
For security against an adversary (like the NSA/FBI) who will probably have a quantum computer within the next decade, the passphrase needs to be longer.
BLUF: Use at least a 7 to 8 word passphrase for encryption.
For something like full disk encryption, you will want to use some kind of randomly generated passphrase consisting of at least 7 to 8 words for security against normal bruteforcing.
Why a couple of words and not just some 16 or 20 random character password? Memorization. A passphrase is significantly easier to memorize compared to a password, and it holds up stronger thanks to key stretching.
For security against an adversary (like the NSA/FBI) who will probably have a quantum computer within the next decade, the passphrase needs to be longer.
Packet Pusher
***Repost, but still highly relevant.*** BLUF: Use at least a 7 to 8 word passphrase for encryption. For something like full disk encryption, you will want to use some kind of randomly generated passphrase consisting of at least 7 to 8 words for security…
The Whonix and Kicksecure wikis both have lots of very good information on topics like this.
https://www.whonix.org/wiki/Passwords
https://www.whonix.org/wiki/Passwords
Kicksecure
Passwords
Generating Strong Passwords
Packet Pusher
***Repost, but still highly relevant.*** BLUF: Use at least a 7 to 8 word passphrase for encryption. For something like full disk encryption, you will want to use some kind of randomly generated passphrase consisting of at least 7 to 8 words for security…
It really boils down to what your threat model is. It could include any number of things from simple unauthorized access, all the way to the feds confiscating your mobile device and hooking it up to one of Cellebrite's black boxes - in the end, its up to you.
Packet Pusher
***Repost, but still highly relevant.*** BLUF: Use at least a 7 to 8 word passphrase for encryption. For something like full disk encryption, you will want to use some kind of randomly generated passphrase consisting of at least 7 to 8 words for security…
Electronic Frontier Foundation
EFF Dice-Generated Passphrases
Create strong passphrases with EFF's new random number generators! This page includes information about passwords, different wordlists, and EFF's suggested method for passphrase generation. Use the
Packet Pusher
https://www.eff.org/dice
Use something like a password manager as well. Say you use something like KeePassXC or Bitwarden to manage passwords and have a phone and a laptop. You would only have to memorize 3 passphrases. One to unlock your password manager and the other two to unlock your devices. The rest can all be safely stored in your password manager.
❤1
Remember to back your stuff up - you never know when you'll accidentally '$ rm -rf /incredibly-important-system-directory' 🙄
❤1
Packet Pusher
Remember to back your stuff up - you never know when you'll accidentally '$ rm -rf /incredibly-important-system-directory' 🙄
Oh a little word on this - if you are lazy like me, you can create a bash alias for rm to help prevent mistakes from being made.
Just append
Just append
alias rm='rm -i' to your bash aliases (can be found at ~/.bash_aliases). With that set, whenever you use the rm command, you will be prompted before removing a file. It helps because having to enter y or n for every removal makes you think twice before deleting a file. It's not foolproof, but it is better than no bash alias for rm.👍9❤1💩1
Just checked with cockbox and checked my cockmail and nothing out of the ordinary it seems. Might need to adjust the bandwidth though because it may have become overloaded.
Server is back up and running now. Tor will likely be restarted on both relays after I adjust the bandwidth because they both use the same torrc.