We are still actively working on the spam issue.

Difference between revisions of "Fucko"

From InstallGentoo Wiki
Jump to: navigation, search
m (typo fix)
(14 intermediate revisions by 8 users not shown)
Line 1: Line 1:
/fucko/ threads are dedicated to personal defense against LEA (Law Enforcement Agencies) kicking your door in and storming into your bedroom before you read the end on this sentence.
+
/fucko/ threads are dedicated to personal defense against LEA (Law Enforcement Agencies) kicking your door in and storming into your bedroom before you read the period on the end of this sentence. They talk about data encryption, OPSEC, and how to not get fucked if (we all know when) LEA kicks that door.
  
You hear a loud bang and crash, shake your head in shock that this is actually happening, in real life, to you, right now, OMG.
+
On [[/g/]] and [[/tech/]], /fucko/ threads are created pretty much weekly. On /tech/ they are up constantly. If there isn't an existing /fucko/ thread on either board, please start a new one with [https://spit.mixtape.moe/view/5561b378#xxeP0Dm9NySwzuf5cWHreFV0piRZu7sC this template.]
 
 
You have five seconds as boots stomp up the hallway. Are you prepared?
 
 
 
On /g/, /fucko/ threads are created weekly(?). On /tech/ they are up constantly. If there isn't an existing /fucko/ thread on either board, please start a new one with the following copypasta: http://pastebin.com/rdwhnMUp
 
  
 
== Preparedness ==
 
== Preparedness ==
As Snowden said, [[Encryption]] works. Full disk encryption is your first stop for anti-fucko. With gnu/linux dm-crypt, running a shutdown script will unmount encrypted drives and overwrite the encryption keys in memory.
+
As Snowden said, [https://wiki.installgentoo.com/index.php/Encryption encryption] works. Full disk encryption is your first stop for anti-fucko. With GNU/Linux dm-crypt, running a shutdown script will unmount encrypted drives and overwrite the encryption keys in memory.
Be aware that in [https://en.wikipedia.org/wiki/Key_disclosure_law many counties] failing to disclose your encryption keys is a criminal offence. Whether the punishment for failing to give up your key is worse than your charges is another question.
+
Be aware that in [[Wikipedia:Key_disclosure_law |many countries]] failing to disclose your encryption keys is a criminal offence. Whether the punishment for failing to give up your key is worse than your charges is another question.
* [http://www.bbc.co.uk/news/technology-31753934 UK Police] don't kick your door in.
+
* [http://www.bbc.co.uk/news/technology-31753934 UK Police] don't kick your door in;
* The Dread Pirate Roberts bust happened [http://arstechnica.com/tech-policy/2013/10/how-the-feds-took-down-the-dread-pirate-roberts/ with his laptop open].
+
* The Dread Pirate Roberts bust happened [http://arstechnica.com/tech-policy/2013/10/how-the-feds-took-down-the-dread-pirate-roberts/ with his laptop open];
 
* [http://www.wired.com/2012/09/barret-brown-raid/ Hiding your laptop in a dishrack] doesn't work.
 
* [http://www.wired.com/2012/09/barret-brown-raid/ Hiding your laptop in a dishrack] doesn't work.
  
 
== Reaction ==
 
== Reaction ==
 
* Press the power button on your computer to shut it down.
 
* Press the power button on your computer to shut it down.
Anything else you can think of you won't have time to react to.
+
If there is anything else you can think of, you will not have time to react to it.
  
 
Do not say a word to the police. For example, acknowledging that there are files of interest on your electronic devices [https://www.eff.org/deeplinks/2012/03/tale-two-encryption-cases supersedes your Fifth Amendment rights] in the United States under the "foregone conclusion" principle; you would be legally compelled to decrypt your encrypted storage.
 
Do not say a word to the police. For example, acknowledging that there are files of interest on your electronic devices [https://www.eff.org/deeplinks/2012/03/tale-two-encryption-cases supersedes your Fifth Amendment rights] in the United States under the "foregone conclusion" principle; you would be legally compelled to decrypt your encrypted storage.
  
 
== Classic Bullshit ==
 
== Classic Bullshit ==
"Destroy your drive"
+
On destroying your hard drive/SSD:
 +
 
 
* Microwaves
 
* Microwaves
 
* Thermite
 
* Thermite
 
* Power drills
 
* Power drills
This is all bullshit. At best it's destroying evidence. At worst (power drills) you keep 1% of your data away from forensics experts. You won't have time for any of it in a raid.
+
 
 +
This is all bullshit. At best it's destroying evidence. At worst (power drills) you keep 1% of your data away from forensics experts, and you won't have time for any of it in a raid. Most power drills aren't strong enough anyway to cut through a hard drive and into the platter without first removing the case.  
  
 
== See Also ==
 
== See Also ==
  
 
* [[Encryption]]
 
* [[Encryption]]
* [[Data_recovery#Data Destruction/Anti Forensics]]
+
* [[Data Destruction]]
 +
 
 +
[[Category:HowTo]]

Revision as of 10:50, 2 December 2016

/fucko/ threads are dedicated to personal defense against LEA (Law Enforcement Agencies) kicking your door in and storming into your bedroom before you read the period on the end of this sentence. They talk about data encryption, OPSEC, and how to not get fucked if (we all know when) LEA kicks that door.

On /g/ and /tech/, /fucko/ threads are created pretty much weekly. On /tech/ they are up constantly. If there isn't an existing /fucko/ thread on either board, please start a new one with this template.

Preparedness

As Snowden said, encryption works. Full disk encryption is your first stop for anti-fucko. With GNU/Linux dm-crypt, running a shutdown script will unmount encrypted drives and overwrite the encryption keys in memory. Be aware that in many countries failing to disclose your encryption keys is a criminal offence. Whether the punishment for failing to give up your key is worse than your charges is another question.

Reaction

  • Press the power button on your computer to shut it down.

If there is anything else you can think of, you will not have time to react to it.

Do not say a word to the police. For example, acknowledging that there are files of interest on your electronic devices supersedes your Fifth Amendment rights in the United States under the "foregone conclusion" principle; you would be legally compelled to decrypt your encrypted storage.

Classic Bullshit

On destroying your hard drive/SSD:

  • Microwaves
  • Thermite
  • Power drills

This is all bullshit. At best it's destroying evidence. At worst (power drills) you keep 1% of your data away from forensics experts, and you won't have time for any of it in a raid. Most power drills aren't strong enough anyway to cut through a hard drive and into the platter without first removing the case.

See Also