Privacy & Security Goys
11.8K subscribers
432 photos
117 videos
28 files
623 links
"One well-known neo-Nazi channel that provides tradecraft to evade authorities online" –VICE News

"A great and important channel... performing probably one of the best forms of online activism" –Robert J. Corner
Download Telegram
Concerned that someone may be listening in to your cell phone’s microphone without your permission?

There are countless spy programs out there to allow others to remotely listen in on your phone at any time.

If you’re using Android and carelessly install apps you are at greater risk for this sort of spying.

But most of us are vulnerable to the spying capabilities of the alphabet soup agencies of both foreign and domestic governments.

In the event you think that your device may be, or may become compromised, it is advised to desolder the microphone within your device.

From there you can purchase a splitter like this:

https://www.amazon.com/gp/product/B004SP0WAQ

Then purchase a lapel microphone like this...

https://www.amazon.com/gp/aw/d/B07M6JBJ1G/

Plug in your head phones and you’re ready to go. Now any time you don’t want to be spied on simply remove the splitter from your headphone jack on your phone. Since your internal mic is gone you’re safe.

Note: There may also be a microphone specifically for your camera when recording videos.
👍21
Hopefully none of you are using (((WhatsApp))) at this point.

WhatsApp Confirms a New Threat; Android And iOS Users at Risk From Malicious Video Files

https://www.solutionfactory.in/whatsapp-confirms-a-new-threat.html
Sharing screenshots can be really bad opsec. If you’re not careful you can reveal missing bits of information that can help narrow down or confirm your identity such as...

1. Your time zone. If you post a screenshot and your clock says 3:14PM and you’ve posted the screen shot at 5:14PM my time then I know you’re likely 2 hours behind me.

2. The make/model of your device. Judging by the contents on the screen one could identify your make and model of your device which could later be used to tailor an exploit specifically to your device.

3. Your name, number, friends, location, etc... depending on the details within the screen shot you may be giving away friends real names, your real name, number, or location.

4. The resolution of the image may be used to identify or narrow down the device used to take the screen shot.

5. Active services on your phone. This can let the enemy know things like what email provider you use and what apps you use.

6. If the battery was recently charged judging by the battery percentage one could get the assumption that you’ve just woke up not long before. This establishes the beginning of mapping out your daily routine.

Tips...

Posting screen shots is a bad idea. If you must do it, always at the bare minimum crop out the info bar at the top of the screen and show only the required information.

Posting screenshots that aren’t yours while pretending they are can be great opsec. Keep in mind the time of the screenshot vs when you’re posting it.
If you're interested at all in learning more about governments spying on their own citizens and mass surveillance, watch Edward Snowden in Citizenfour.

https://invidio.us/watch?v=EDhB-A23IUk
👀
Take a picture or load a photo/video from the Gallery, and ObscuraCam will automatically detect faces that you can pixelate, redact (blackout) or protect with funny nose and glasses. You can also invert pixelate, so that only the person you select is visible, and no one in the background can be recognized.

This app will also remove all identifying data stored in photos including GPS location data and phone make & model. You can save the protected photo back to the Gallery or share it directly to any other “Share” enabled app.

https://guardianproject.info/apps/obscuracam/
Something as trivial as printing something on a piece of paper can be traced back to you. Thanks to machine identification code many printers leave a unique microscopic identification on every sheet of paper they print.

This list is no longer updated and I cannot personally vouch for the results found so take that for what it is. But here is a list of printers and wether or not they display an identifying code.

https://www.eff.org/pages/list-printers-which-do-or-do-not-display-tracking-dots

I would assume that all modern printers do this on some level and that your ink and paper will be scrutinized if what you're printing strikes a chord with the right people. Keep in mind these dots are mainly used to catch counterfeiters.

See this project which attempts to defeat the MIC

https://github.com/dfd-tud/deda
For those who want to use a VPN without paying for it, here is a free download for ExpressVPN (with unlimited trials).

[I am not endorsing the use of ExpressVPN or this .apk file over any other VPN and make no claims to its safety in using this.]
Forwarded from Modded Central Channel (彡[ ᏨLᎧᎠᎧUX]彡 Private Message = BAN Now you know it!)
Please open Telegram to view this post
VIEW IN TELEGRAM
For those living in the USA: If you’re concerned about being in local government databases you can help yourself out by putting your home and property in a trust. You don’t have to be rich and you don’t have to pay (((Goldberg))) thousands of dollars to get started. Using something like this free template can get you started.
SecureShare is an open-source website that utilizes 128-bit client-side AES encryption and sitewide SSL encryption to securely store files that expire when you want them to (all files being automatically purged after 7 days).

It doesn't utilize full 256-bit AES encryption, and uses Javascript, but is open source and simple enough for anyone to use.
Pirate box project closed in 2018, but this can still be a great way to spread our ideas in your area, especially among those more tech savvy folks.

1. PirateBox provides easy file sharing and messaging over a local area network.

2. PirateBox is designed to educate the public and make them aware about online censorship, surveillance and freedom of speech.

3. PirateBox truly respects privacy and thus does not collect any access or connection logs from its users.

4. PirateBox has an educational purpose and aims to teach about computer programming and computer networks.

5. PirateBox network (AP) should be open, and use open networking standards to allow communication with other users.

https://www.piratebox.cc/
Proof that Google and YouTube are actively trying to subvert and deradicalize people who believe that the White race deserves to exist.

Boycott the enemy and starve them of your data.
🔥1