It is outdated?

It is outdated? Lets say police came to house and tried to break into my desktop(I used the FDE that comes with the Linux Mint installer), would my shit be safe?

POSIWID: The Purpose Of A System Is What It Does Shirt $21.68

Black Rifle Cuck Company, Conservative Humor Shirt $21.68

POSIWID: The Purpose Of A System Is What It Does Shirt $21.68

  1. 4 weeks ago
    Anonymous

    funny captcha btw haha
    phoneposting cuz im on the gyn (im not a fat nerd like yall)

  2. 4 weeks ago
    Anonymous

    They probably wouldn't be brute forcing the password. Remember, of you paint a big enough target on your back, they'll bring a $5 wrench and beat the shit out of you until you give them the passwords they want. They can blame the bruises on you resisting arrest.

    • 4 weeks ago
      Anonymous

      >they'll bring a $5 wrench and beat the shit out of you until you give them the passwords they want.
      ion live in a shithole tho

    • 4 weeks ago
      Anonymous

      This. No amount of passwords, encryption, etc. will save you if they really want to get you.

      >they'll bring a $5 wrench and beat the shit out of you until you give them the passwords they want.
      ion live in a shithole tho

      All countries are corrupt and will violate your human rights and person while smiling at you.

      • 4 weeks ago
        Anonymous

        >t. fed

      • 4 weeks ago
        Anonymous

        I insist, I live in the EU, they prob gon legalize having small amounts of 'p

    • 4 weeks ago
      Anonymous

      This moronic argument always comes up. If they were that eager, you would booby trap the entire property and fight to the death.

      >would my shit be safe?
      Maybe if you had a really strong passphrase, but there are clouds dedicated to breaking LUKS. It hands LE everything they need (cipher, hash, existance of encryption) except for the passphrase. Safer from them would be dm-crypt plain for your data volumes using a non standard cipher and hash. There are no LUKS headers and thus plausible deniability.

      If you do have a strong LUKS passphrase it will however protect from random crackhead that broke into your place looking for shit to sell to get more crack.

      The standard algos are considered safer because they are more researched. While you might be lucky with a good one, you might also be using a flawed one. https://gitlab.com/cryptsetup/cryptsetup/-/wikis/FrequentlyAskedQuestions

      • 4 weeks ago
        Anonymous

        Algo's are orthogonal to this. The clouds used to break LUKS just brute force them. People are lazy and pick really shitty passwords.

        Could I buy you a cup of coffee?

      • 4 weeks ago
        Anonymous

        >you would booby trap the entire property and fight to the death
        Drug addicts, manufactures, etc. already do this. It doesn't stop the police from getting them.

    • 4 weeks ago
      Anonymous

      >gives fake password that activates my army of killer death robots
      Checkmate atheist

      • 4 weeks ago
        Anonymous

        good morning fbi sirs
        please follow advice https://www.kicksecure.com/wiki/Passwords

        also this

        • 4 weeks ago
          Anonymous

          3 word passphrase can be cracked in 165 days
          Well frick me

      • 4 weeks ago
        Anonymous

        Fake password should erase the secret data but then boot as normal.
        Also make sure to have some mildly embarrassing and criminal stuff on their like cuck porn and pirated games - that must have been the stuff you didn't want them to see.

    • 4 weeks ago
      Anonymous

      This is an attack vector that the glowies actively think about because they themselves need to preserve operational security.
      What do you do when your agent is kidnapped by Russians and they pull out the ball zapper and chop off your ear?
      Schizos on IQfy and glowies have a lot in common.
      The solution is deniable encryption, and not allowing the agent to know the credentials in the first place.
      An irreversable dead-man's switch which once activated, the agent also loses access.

    • 4 weeks ago
      Anonymous

      shit a dirty rag and a bucket of water will get anyone talking

  3. 4 weeks ago
    Anonymous

    >would my shit be safe?
    Maybe if you had a really strong passphrase, but there are clouds dedicated to breaking LUKS. It hands LE everything they need (cipher, hash, existance of encryption) except for the passphrase. Safer from them would be dm-crypt plain for your data volumes using a non standard cipher and hash. There are no LUKS headers and thus plausible deniability.

    If you do have a strong LUKS passphrase it will however protect from random crackhead that broke into your place looking for shit to sell to get more crack.

    • 4 weeks ago
      Anonymous

      I doubt LUKS can be bruteforced by whatever agency

      • 4 weeks ago
        Anonymous

        It's done every day. I've done it. Expensive but when a government (your tax dollars) are paying for it, not a big deal. People are lazy and pick really shitty passwords.

        • 4 weeks ago
          Anonymous

          let me guess, you cracked a 4 alphanumeric characters password in a controlled setting?

          • 4 weeks ago
            Anonymous

            Maybe you have a really strong passphrase but I can assure you 99% of people do not. And that is fine, if the goal is to protect data from crackheads. Don't be upset and don't lose sleep over it.

    • 4 weeks ago
      Anonymous

      Even with a relatively easy password you can configure it so it takes a lot of processing power for each try.
      That way trying even a few million passwords can become impossible on a super computer or massive botnet.

  4. 4 weeks ago
    Anonymous

    All placebo my dude. If you don't want to look over your shoulder every day simply don't save anything on your computer by default (run the OS from RAM) and put on a SD card whatever you want to save.

    • 4 weeks ago
      Anonymous

      That won't even work anymore. Adobe is already stealing everyones shit while they're creating it. It's easy for the powers that be to harvest all data remotely without you ever knowing.
      >but muh open source
      Means nothing and just an illusion of safety

      • 4 weeks ago
        Anonymous

        >Adobe is already stealing everyones shit while they're creating it.
        Run that shit in a VM

        • 4 weeks ago
          Anonymous

          Firejail can also disable networking for applications.
          sudo install firejail
          sudo firecfg
          mkdir -p ~/.config/firejail
          echo "net none" > ~/.config/firejail/app_name.profile

          • 4 weeks ago
            Anonymous

            should be app_name.local but otherwise good

  5. 4 weeks ago
    Anonymous

    >formats your drive
    >puts cp on it
    >drags you to court for possessing cp
    >makes you sign a plea deal, where you agree to rat out your friends

    • 4 weeks ago
      Anonymous

      That's FBI, not CIA. CIA and Mossad will save your content looking for new material to blackmail people with.

    • 4 weeks ago
      Anonymous

      They probably wouldn't be brute forcing the password. Remember, of you paint a big enough target on your back, they'll bring a $5 wrench and beat the shit out of you until you give them the passwords they want. They can blame the bruises on you resisting arrest.

      If he was that high profile, he'd have the resources to flee the country the moment he hears his house has been raided. The tech works. Rest is on you.

      • 4 weeks ago
        Anonymous

        Someone high profile may even have a silent home alarm that replaces the home with a giant crater.

      • 4 weeks ago
        Anonymous

        You don't have to be high profile for an FBI agent to plant cp.
        That's a very straight forward process that any little diversity hire agent can do.
        If you are important enough to be raided by glowies, you are also important enough for that.

  6. 4 weeks ago
    Anonymous

    bumo

  7. 4 weeks ago
    Anonymous

    How many threads are you going to make about this?
    If you're that worried about the feds finding your cheese pizza, just delete it. You don't need it.

    • 4 weeks ago
      Anonymous

      this is the only thread I made tho???

      • 4 weeks ago
        Anonymous

        Why lie?

        • 4 weeks ago
          Anonymous

          u the one lying Black person

  8. 4 weeks ago
    Anonymous

    Why doesn't like luks offer nested partitions like truecypt so you can create a fake decoy?

    • 4 weeks ago
      Anonymous

      No need. Make a LUKS volume that is the decoy then dm-crypt plain for the real volumes, all using different ciphers, hashes, modes. Also just use LUKS for your OS volume and dm-crypt plain for data volumes inside that volume.

      if a TLA comes after you, it's already over

      No, you get a lawyer and a cup of coffee.

      A lot of countries have made laws (or are making) that add jail time for refusing to give up passwords

      Yes, dont expose that you have an encrypted volume in that case. Even better, dm-crypt plain a 512gb memory card and FedEx it to yourself. Have a freshly formatted OS on a USB and an empty disk or no disk.

      Even with a relatively easy password you can configure it so it takes a lot of processing power for each try.
      That way trying even a few million passwords can become impossible on a super computer or massive botnet.

      If its your federal agency they just use an app that puts part of your volume into a cloud and let your tax money pay for it, as long as it takes.

      • 4 weeks ago
        Anonymous

        LUKS2 is fine if you have high PBKDF2 rounds. dm-crypt good additionally for plausible deniability although you'll still have some bin file and they'll potentially see the scripting to mount the volumes.

        Also if you have ZFS, it also has encrypted vdevs similar to LUKS2.

        • 4 weeks ago
          Anonymous

          The entire concept of plausible deniability is thrown out with LUKS. Again, it gives away that it is an encrypted volume. It gives away what cipher, hash and mode are used. The one and only thing missing is the passphrase.

  9. 4 weeks ago
    Anonymous

    >Lets say police came to house and tried to break into my desktop
    They wouldn't have to because it would be already turned on and unlocked.

    • 4 weeks ago
      Anonymous

      tldr security and convenience are a tradeoff. the more secure you'll make the more inconvenient it'll be which the more will be compensated simply letting the computer on all the time because you won't turn off the your laptop all the time and enter the full 50-100 character or more password everytime.
      you'd be surprised how sloppy even the drug dealers on the darknet are.
      this is because convenience always wins (first you'll leave your PC on all the time, then you leave your password manager unlocked all the time, then you'll start writing sensitive information on pieces of paper next to you). Luks strength is the smallest of concerns and it's just a matter of time until you start making big mistakes and the feds come over
      tldr better not to start anything unless it's about millions and you're ready to flee the country at any moment

  10. 4 weeks ago
    Anonymous

    if a TLA comes after you, it's already over

  11. 4 weeks ago
    Anonymous

    A lot of countries have made laws (or are making) that add jail time for refusing to give up passwords

  12. 4 weeks ago
    Anonymous

    Why does every poster asking this always think about police? Normalgays can steal your shit as well, anon.

    • 4 weeks ago
      Anonymous

      normies wont target me and cant do shit

      • 4 weeks ago
        Anonymous

        Of course they can, never underestimate moron strength

        • 4 weeks ago
          Anonymous

          cant think of a scenario where they would

  13. 4 weeks ago
    Anonymous

    Try these:
    https://blog.mimacom.com/fde-with-yubikey/

    Never use the biometrics one since US law does not protect those

  14. 4 weeks ago
    Anonymous

    Its good enough for Tails, so its good enough for me

    • 4 weeks ago
      Anonymous

      Use care, tails devs cooperated with French police and Interpol. No backdoors AFAIK but they enabled options in the available browsers to leave snail trails. Figures Frenchies would do that.

      • 4 weeks ago
        Anonymous

        Source?

        • 4 weeks ago
          Anonymous

          I'm not falling for that again. I link, site gets taken down. Besides, it's a .onion and everyone here is a phonie.

          • 4 weeks ago
            Anonymous

            Self censoring isn't based, anon

          • 4 weeks ago
            Anonymous

            Never suggested it. And I'm 10BaseT

  15. 4 weeks ago
    Anonymous
    • 4 weeks ago
      Anonymous

      cameras all throughout my house being streamed 24/7.

      • 4 weeks ago
        Anonymous

        >disconnect electricity

  16. 4 weeks ago
    Anonymous

    >8 pounds of C4 in my PC case that gets detonated if an incorrect password is entered
    not my problem

Your email address will not be published. Required fields are marked *