@Icpiper, GFTO you JTRIG shill, try carrying water FOR the Constitution for a change instead of crapping on the ideals you swore to protect and defend.
I love this response, especially when looking at the emails where they discuss sending a death squad to kill the Lead Technologist of the ACLU. Oh the irony.
AV Vendors purchase access to windows API that is hidden from normal developers, this API allows the AV Vendors to shim into the OS in such a way to allow the AV to function, those function call can be traced with tools like Ida pro, its weak protection, with the plugins Ida has assembler hasent...
Trusting Trust
Pandora Box
Forsaken Left hand rots while the Right Slashes and burns.
Popcorn time and a copy of Brave new world.
We did it all for the nuggy, wha? the nuggy.
TROLOLOLOLOL.
https://twitter.com/thegrugq/status/616330591177281536This is why everyone always brings up the NSA now.
Professionalism is gone in our government, so people bring there own personal agendas to work, you get officials targeting Americans who want to reign in Government power(Tea Party...
The Carnivore program is still in operation but has been wrapped up in other projects, just like the way of most govt projects another more expansive one gobbles up and takes over others. Use GPG. pfSense rocks. Host your own DNS server, and add DNSSEC.
And I am sure he still thinks Skype communications are safe as well. :D
If you are recommending anything that has inbuilt key escrow as "secure", may you be tar and feathered and branded a peddler of snake oil for the rest of your days or at least until you wake up.
Ubuntu has had full disk encryption built in since v11.04 iirc, at least that is how long I have been using it. Full disk encryption is not on by default, you have to set that up during the install, home dir is encrypted by default regardless of Full disk encryption. If you want one that is...
I ended up running wireshark on the 12 box over the weekend then grepping for the evil MAC, turns out it was a different box on the network that is "remembering the evil mac" incorrectly and trying to issue querys to that non-existent box. Upon further digging it was an app I was running on the...
Most ISP's, hijack DNS requests so you'll need to use DNSCrypt-proxy, google "DNSCrypt-proxy site:privateinternetaccess.com", and follow there guide. Use an OpenDNS server in the US that supports DNSCrypt-proxy, they are listed in the documentation.
I'd follow Syran's suggestion, and...
My pfSense firewall running arpwatch detected one of our ancient Server 2003 boxes doing this:
May 1 10:11:54 kernel: arp: 10.1.1.12 moved from XX:XX:XX:XX:XX:0c to XX:XX:XX:XX:XX:08 on bge0
May 1 10:10:46 kernel: arp: 10.1.1.12 moved from XX:XX:XX:XX:XX:08 to XX:XX:XX:XX:XX:0c on bge0...
I have the same VPN provider and same ISP but different part of the US. FOIS throttles normal VPN ports, you need to use TCP port 443 for your vpn, dont use UDP, that way FOIS cant tell if this is normal https traffic or not, and PIA supports that port. I went from 1MB capped to full speed on...
This is blateant propaganda from Wired to stop people from using Tor, NSA/GCHQ has a much lower success rate of tracking a user while they use Tor, the more people that use it the better. Don't forget Wired was has also run several OpEd's from Snowden haters, while I am all for hearing all...
So since MSK is toast, switching to RSA, and I can not find a guild for pfSense anywhere. Has anyone accomplished this? When creating the crts what identifying information is needed and with what encoding tag?
I tried following a moonwall setup that was posted to the pfSense docs and ended...
I just switched from DD-WRT to pfSense and I would recomend you do the same if you have a spare box with 2 nic's.
Here is the thing with DD-WRT and VPN's, the various builds use different versions of OpenVPN and to have it work with your VPN provider you will have to try multiple builds, it...
Hardware implants are unlikely after you have possession of the device, LEO's don't bother with them at all now if the device is in the targets possession, they will however interdict packages enroute to the targets. Look on youtube for the 30c3 presentation given by Jacob Applebaum titled "To...
Ok then why is no one saying BREAK UP THE CURRENT ISP's into baby bells again.
I dont think that alone is the solution, I do think we need at least an acknowledgement that we do as ISP consumers have thr right to have a connection that the ISP is not data mining, throttleing, traffic...
I have been trying to diagnose an issue with my VPN b/c according to Verizon they do not do any traffic shaping or throttleing, and it HAS to be my hardware becuse there screen tells them my router is fine. /s
So I am paying for 50/25 and only getting 1/1 with my VPN, is this a common...
He sure as hell did. I had a screensaver around 95 for win95 with his mug and a wave file that played the quote before the screensaver stars to distort his face.
It sure as shit happened.
They cant afford to keep anyone around that helped the NSA design the HOWLERMONKEY jtag implants.
Personally I think any company that intentionally sold compromised hardware should DIAF. FU DELL/HP/CISCO.