• 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Secure hardware
#1


What kind of safe computer setup do you use for zoo stuff? I am not asking which VPN you use, but what do you do to prevent the existence of evidence offline in your hardware.




For example:

At one point I wiped all my hard drives, flash drives, sd cards, phone... (several times in fact) and since then I do not own any offline copy of any zoo related porn in any form. The computer I use for interaction with the zoo world runs tails linux and does not in fact save anything permanently to a hard drive. It does not even have an accessible hard drive. The system runs from RAM and starts in a clean state on every boot. Online communication is done either encrypted or through TOR.


  Reply
#2


Nothing crazy actually.




* Make sure browser has HTTPS Everywhere, uBlock Origin, ClearURLs, and CanvasBlocker installed.




* Firefox: make sure the strictest Anti-Phishing / tracking is enabled. Do not use Chrome, use Brave in it's place.




* If REALLY worried about tracking / leaking, use Tor or a VPN, NOT a pure secure solution.




* ProtonMail / Tutanota email addresses are good.




Those are the online basics.




For your hardware, any PC will do: it's more software than anything. I use Arch Linux and occasionally run the 'secure-delete' toolchain: srm, sswap, sdm, smem, etc...




Cryptographically signing a partition, a drive, etc... using VariCrypt, or even encrypting EXT4 ZFS BTRFS or BitLocking an NTFS filesystem is typically enough to get you by.




If you REALLY want to go overboard for security: get something like a NitroKey or a PHYSICAL signature key ('SmartCard' / physical crypto key) for unlocking your PC: BioMetrics aren't even really that secure.




 


  Reply
#3

I cleaned out all of my zoo stuff recently. But before then, I used a MyBook Duo with encryption enabled. On top of that, my zoo stuff was stored on the Duo in an encrypted file container created by VeraCrypt. For my secure deletion needs, I used Eraser. For additional security, I utilized a YubiKey, which is similar to the NitroKey that WinterGreenWolf mentioned.

  Reply
#4


Not bad, not bad at all. [img]<fileStore.core_Emoticons>/emoticons/wink.png[/img]/emoticons/[email protected] 2x" title=";)" width="20" /> Especially in a 'sus area' like the Pacific Northwest... Those laws gotta' go.. Good lord...




 


  Reply
#5


I used to use SEDs...  were required for my job anyways so it seemed like a good excuse to use it for both.  Course SEDs have known flaws now, but the drives have long been destroyed from those days.




These days I just do without.  They can't jail you for talking.


  Reply
#6


My "special" files are on a Kingston Data Traveler Locker+




https://thinkcomputers.org/kingston-data...ve-review/




It's a solidly constructed (metal) USB flash drive, hardware encrypted by default, password protected.  




Inexpensive, fast, easy to use.  




It will destroy all your data if someone tries 12 times to access it incorrectly.




I don't use the Cloud storage feature.  I keep a second backup instead--


  Reply
#7

Quote:
On 8/14/2021 at 5:51 AM, heavyhorse said:




It will destroy all your data if someone tries 12 times to access it incorrectly.




Nitpicking a bit, but like most SEDs, it doesn't destroy the data, just erases the key.




With today's tech it's mostly an academic difference.  But in the future, it may not be, so be aware.




I would honestly use Veracrypt before trusting any kind of hardware security.


  Reply
#8

Quote:
On 8/20/2021 at 5:47 PM, cervids said:




Nitpicking a bit, but like most SEDs, it doesn't destroy the data, just erases the key.




With today's tech it's mostly an academic difference.  But in the future, it may not be, so be aware.




 




Maybe so, but that's a secondary defense anyway.  The unauthorized user still hasn't guessed the password, and won't get further chance because the device has bricked.  


  Reply
#9

Quote:
On 8/22/2021 at 5:09 AM, heavyhorse said:




Maybe so, but that's a secondary defense anyway.  The unauthorized user still hasn't guessed the password, and won't get further chance because the device has bricked.  




I did say it's mostly academic...  the important caveat being "for now."  Quantum computer tech is likely to crack conventional encryption like an egg and law enforcement will probably be one of the first with access.  Just things to think about.


  Reply
#10


We'll have to re-think everything when/if Quantum Computing becomes a thing.




I would pretty much assume, the marketplace being what it is, that Quantum Encryption would quickly follow.




But yeah, any "old" secure tech laying around would be wide open.  Or after about a 13 millisecond delay.




Which brings us to the other part: Physical security.  A drive about the size of your finger, safely hidden away in some architectural crevice of your home, can remain hidden even after you die and after the structure is torn down and the debris buried.  Unlike someone finding your phone or laptop.  


  Reply


Forum Jump:


Users browsing this thread: 2 Guest(s)