hello friends! new(ish)!

Fucko: Difference between revisions

From InstallGentoo Wiki v2
Jump to navigation Jump to search
>GANOOSLASHLOONUCKS
m (grammar)
>GNUadeen
(Corrected information)
 
(17 intermediate revisions by 8 users not shown)
Line 1: Line 1:
/fucko/ threads are dedicated to personal defense against LEA (Law Enforcement Agencies) kicking your door in and storming into your bedroom before you read the end on this sentence.
/fucko/ threads are dedicated to personal defense against LEA (Law Enforcement Agencies) kicking your door in and storming into your bedroom before you read the period on the end of this sentence. They talk about data encryption, OPSEC, and how to not get fucked if (we all know when) LEA kicks that door.


You hear a loud bang and crash, shake your head in shock that this is actually happening, in real life, to you, right now. Every moment is crucial, and you just wasted three seconds.
On [[/g/]] and [[/tech/]], /fucko/ threads used to be created weekly. On /tech/ they were constantly. If there isn't an existing /fucko/ thread on either board, please start a new one with [http://ix.io/1Eri this template.]


You have, at best, five more seconds before the boots get to your bedroom door. Are you prepared?
== Preparedness ==
As Snowden said, [[Encryption|encryption]] works. Full disk encryption is your first stop for anti-fucko. With GNU/Linux dm-crypt, running a shutdown script will unmount encrypted drives and overwrite the encryption keys in memory.
Be aware that in [[Wikipedia:Key_disclosure_law|many countries]] failing to disclose your encryption keys is a criminal offense. Whether the punishment for failing to give up your key is worse than your charges is another question. The Fourth and Fifth Amendments of the United States Constitution protect in most cases. There are some exceptions for this, such as if a Legal Official has physically seen the incriminating evidence on the computer, such as [[Wikipedia:In re Boucher|a 2009 case]] where the US Immigration and Customs Enforcement had already seen illegal content upon initial inspection, and a [https://arstechnica.com/tech-policy/2017/03/man-jailed-indefinitely-for-refusing-to-decrypt-hard-drives-loses-appeal/ 2017 case] where a male was ''suspected'' of downloading Child Pornography by torrent hash files.
 
The [https://cheekyvideos.net/murdoch/Burqas%20in%20Bongland.html UK] has no privacy protection clauses whatsoever, and you will face immediate arrest for not allowing the authorities to decrypt your machines. You should consider leaving the United Kingdom immediately as it is a disgusting Orwellian nightmare where kids are arrested for having dull butter knives, and the legal minimum age to purchase a Nerf Gun is 18.


On /g/, /fucko/ threads are created pretty much weekly. On /tech/ they are up constantly. If there isn't an existing /fucko/ thread on either board, please start a new one with [https://archive.is/9Mg0R this copypasta (now Tor friendly!)] or alternatively [https://archive.is/QHDJ1 the all archived one.]
Don't be stupid, use Full Disk Encryption, avoid Proprietary Software, and use hardened network security.


===Things to consider===


== Preparedness ==
* [http://www.bbc.co.uk/news/technology-31753934 UK Police] don't kick your door in;
As Snowden said, [[Encryption]] works. Full disk encryption is your first stop for anti-fucko. With gnu/linux dm-crypt, running a shutdown script will unmount encrypted drives and overwrite the encryption keys in memory.
* The Dread Pirate Roberts bust happened [http://arstechnica.com/tech-policy/2013/10/how-the-feds-took-down-the-dread-pirate-roberts/ with his laptop open];
Be aware that in [https://en.wikipedia.org/wiki/Key_disclosure_law many counties] failing to disclose your encryption keys is a criminal offence. Whether the punishment for failing to give up your key is worse than your charges is another question.
* [http://www.wired.com/2012/09/barret-brown-raid/ Hiding your laptop in a dish-rack] doesn't work.
* [http://www.bbc.co.uk/news/technology-31753934 UK Police] don't kick your door in.
* The Dread Pirate Roberts bust happened [http://arstechnica.com/tech-policy/2013/10/how-the-feds-took-down-the-dread-pirate-roberts/ with his laptop open].
* [http://www.wired.com/2012/09/barret-brown-raid/ Hiding your laptop in a dishrack] doesn't work.


== Reaction ==
== Reaction ==
Line 20: Line 22:


Do not say a word to the police. For example, acknowledging that there are files of interest on your electronic devices [https://www.eff.org/deeplinks/2012/03/tale-two-encryption-cases supersedes your Fifth Amendment rights] in the United States under the "foregone conclusion" principle; you would be legally compelled to decrypt your encrypted storage.
Do not say a word to the police. For example, acknowledging that there are files of interest on your electronic devices [https://www.eff.org/deeplinks/2012/03/tale-two-encryption-cases supersedes your Fifth Amendment rights] in the United States under the "foregone conclusion" principle; you would be legally compelled to decrypt your encrypted storage.
'''EVEN IF YOU ARE INNOCENT, YOU SHOULD NEVER TALK TO THE POLICE. THERE ARE [https://invidio.us/watch?v=d-7o9xYp7eE EXTREMELY GOOD REASONS] WHY THIS IS THE CASE.'''


== Classic Bullshit ==
== Classic Bullshit ==
"Destroy your drive"
On destroying your hard drive/SSD:
 
* Microwaves
* Microwaves
* Thermite
* Thermite
* Power drills
* Power drills
This is all bullshit. At best it's destroying evidence. At worst (power drills) you keep 1% of your data away from forensics experts, and you won't have time for any of it in a raid.
 
This is all bullshit. It's just evidence of evidence destruction. A power drill through all the platters will probably make the data unreadable, but most cheap power drills aren't powerful enough to cut through a hard drive and you won't have time during a raid. The easiest and fastest thing to do is to just overwrite the whole HDD with one pass of zero's (shred -n 0 -z /dev/sdx) and ''then'' physically destroy it (take the platters out and shatter them). You can do multiple wipes if wanted (shred -z /dev/sdx), but a single pass is more than enough (a case of data overwritten with 0 on a modern HDD being recovered hasn't been reported).
 
==Dale Gribble Effect==
You may think you are safe from spying. However, the very act of knowing too much makes you a target in the contemporary police state. This is called The Dale Gribble Effect after ''King of the Hill'' character Dale Alvin Gribble. Dale Gribble is naturally afraid of the government and has spent most of his life prepping and studying conspiracies of the government. He also believes that the government, as well as insects, spy on him. While the Government early-on most likely did not spy on him, the preparations he has made (and should have made), along with his own research, have made him a prime target for government spying.
 
Every single person who reads this wiki most likely is victim of the Dale Gribble Effect. You should fundamentally prepare for a fucko situation. Besides the Dale Gribble Effect, there is also SWATing which has become a hobby for bored /b/tards in recent years.


== See Also ==
== See Also ==


* [[Encryption]]
* [[Encryption]]
* [[Data_recovery#Data Destruction/Anti Forensics]]
* [[Data Destruction]]


[[Category:HowTo]]
[[Category:HowTo]]

Latest revision as of 12:26, 9 May 2022

/fucko/ threads are dedicated to personal defense against LEA (Law Enforcement Agencies) kicking your door in and storming into your bedroom before you read the period on the end of this sentence. They talk about data encryption, OPSEC, and how to not get fucked if (we all know when) LEA kicks that door.

On /g/ and /tech/, /fucko/ threads used to be created weekly. On /tech/ they were constantly. If there isn't an existing /fucko/ thread on either board, please start a new one with this template.

Preparedness

As Snowden said, encryption works. Full disk encryption is your first stop for anti-fucko. With GNU/Linux dm-crypt, running a shutdown script will unmount encrypted drives and overwrite the encryption keys in memory. Be aware that in many countries failing to disclose your encryption keys is a criminal offense. Whether the punishment for failing to give up your key is worse than your charges is another question. The Fourth and Fifth Amendments of the United States Constitution protect in most cases. There are some exceptions for this, such as if a Legal Official has physically seen the incriminating evidence on the computer, such as a 2009 case where the US Immigration and Customs Enforcement had already seen illegal content upon initial inspection, and a 2017 case where a male was suspected of downloading Child Pornography by torrent hash files.

The UK has no privacy protection clauses whatsoever, and you will face immediate arrest for not allowing the authorities to decrypt your machines. You should consider leaving the United Kingdom immediately as it is a disgusting Orwellian nightmare where kids are arrested for having dull butter knives, and the legal minimum age to purchase a Nerf Gun is 18.

Don't be stupid, use Full Disk Encryption, avoid Proprietary Software, and use hardened network security.

Things to consider

Reaction

  • Press the power button on your computer to shut it down.

If there is anything else you can think of, you will not have time to react to it.

Do not say a word to the police. For example, acknowledging that there are files of interest on your electronic devices supersedes your Fifth Amendment rights in the United States under the "foregone conclusion" principle; you would be legally compelled to decrypt your encrypted storage.

EVEN IF YOU ARE INNOCENT, YOU SHOULD NEVER TALK TO THE POLICE. THERE ARE EXTREMELY GOOD REASONS WHY THIS IS THE CASE.

Classic Bullshit

On destroying your hard drive/SSD:

  • Microwaves
  • Thermite
  • Power drills

This is all bullshit. It's just evidence of evidence destruction. A power drill through all the platters will probably make the data unreadable, but most cheap power drills aren't powerful enough to cut through a hard drive and you won't have time during a raid. The easiest and fastest thing to do is to just overwrite the whole HDD with one pass of zero's (shred -n 0 -z /dev/sdx) and then physically destroy it (take the platters out and shatter them). You can do multiple wipes if wanted (shred -z /dev/sdx), but a single pass is more than enough (a case of data overwritten with 0 on a modern HDD being recovered hasn't been reported).

Dale Gribble Effect

You may think you are safe from spying. However, the very act of knowing too much makes you a target in the contemporary police state. This is called The Dale Gribble Effect after King of the Hill character Dale Alvin Gribble. Dale Gribble is naturally afraid of the government and has spent most of his life prepping and studying conspiracies of the government. He also believes that the government, as well as insects, spy on him. While the Government early-on most likely did not spy on him, the preparations he has made (and should have made), along with his own research, have made him a prime target for government spying.

Every single person who reads this wiki most likely is victim of the Dale Gribble Effect. You should fundamentally prepare for a fucko situation. Besides the Dale Gribble Effect, there is also SWATing which has become a hobby for bored /b/tards in recent years.

See Also