Guild icon
The American Iron Front Collaboration Discord
CALL TO ACTION / security
Avatar
Black Magic 6/30/2022 7:07 AM
Since I work in Security professionally, as a high end armed guard, I will make the first post here. Hello, welcome.
👋 4
Avatar
Are we using this for personal security including online safety? It so this is a nice place to start https://www.instagram.com/p/CfaCwsCueQT/?igshid=YmMyMTA2M2Y=. Also I’m terrible at internet soooo if that’s poor form just let me know
Data brokers collect detailed information about who we are based on our things like our online activity, real world purchases and public records. Together, it’s enough to figure out your political leanings and health status, even if you’re pregnant. Friday’s news that the Supreme Court had overturned Roe v. Wade, and abortion could become illega...
Likes
26062
Avatar
Skullmaggot 6/30/2022 12:26 PM
@Sinned Hello, currently the nucleus that’s forming is discussing information security in a private channel. We’ll be having a meeting soon and hopefully be able to put some guidelines in place. Infosec is a major priority.
Avatar
Black Magic 6/30/2022 3:41 PM
Infosec is important
Avatar
Skullmaggot 6/30/2022 4:16 PM
@Black Magic Hey, just letting you know that I’m aware of you and that you want defense in Florida. After we understand our direction in the next meeting, we might then be able to send some love your way.
Avatar
Black Magic 6/30/2022 7:40 PM
I'm also down to learn about info sec and more best practices.
Avatar
Skullmaggot 6/30/2022 7:47 PM
@Black Magic Noted.
Avatar
VDV Swim Squad Coach 7/8/2022 2:31 AM
Hey all, I am currently making a little guide on how to go about protecting yourself online, might put it here in a bit when I have fleshed out some of the first stages. would love some feedback
👍 1
Avatar
VDV Swim Squad Coach 7/8/2022 3:00 AM
So you want to protect yourself So, you want to protect yourself online? A good idea, but quite the time sink if you don't go into this with a plan. The purpose of this guide is not to tell you how to protect yourself, but how to start the process. The actions that should be taken will vary on an individual basis, but the idea behind them are all the same. Useful Resources:A brilliant collection of guides on protecting yourself from surveillance (especially by government agencies) and keeping your data away from the prying eyes of feds. A map showing what surveillance technologies are known to be used by local, state and federal agencies across the united states. Great resource to give you an idea of what kind of snooping your local cops might be doing. Access my info is a project designed to help people submit data access requests, formal letters to companies and organizations that request (and in some jurisdictions, force) said organizations to show you what data they have collected on you. A collection of stories of how different people and groups from around the world have protected themselves from digital threats of all different varieties. A great resources to get an idea of what kind of actions will be useful against specific types of threats. A tool to help you plan out a series of steps that you cant take to improve your security and privacy posture online.
Tips, Tools and How-tos for Safer Online Communications
Documenting Police Tech in Our Communities with Open Source Research
Answer a few simple questions to get personalized recommendations of free and open-source software. It's confidential -- no personal information is stored, and we won't access any of your online accounts.
Access My Info is Access My Info is a project designed to understand what can be learned about company data practices by filing data access requests (DARs), seeking access to the requester’s personal information held by a company.
3:01 AM
Step 1: Build a threat model Before you do anything with the goal of protecting your privacy and security, stop. To do this properly, you should first create a threat model. That is, work out who you are trying to keep yourself safe from, and what they would like to do. Now, this sounds a bit odd at first, so here we will outline the construction of an example threat model. It is important to not that you don't need to write your threat model out as is done here, but it is important that you think it through. For this example, we will think about a politically active, well networked social media user in San Francisco. Firstly, they will identify what the threats against them are: 1. Law Enforcement: While this hypothetical person is largely a law abiding citizen, they do regularly attend protests, which makes them a target for police surveillance. Having seen what has happened to other protest movements across the country, where law enforcement quickly declared otherwise peaceful demonstrations as unlawful and started gassing and arresting demonstrators, our hypothetical person would like to ensure that baring getting detained while at a demonstration, they wont be an easy target for later prosecution. 2. Fascist: Attending protests sometimes entails counter-protesting fascists, and while there is nothing wrong with that, it does mean that they run the risk of becoming a target for these groups. As such, they wish to keep their identity hidden from the fascist they oppose. With the threats Identified, now this hypothetical activist must identify what specific information they need to protect.
3:01 AM
1. Face: Both threats previously identified would love to be able to get clear images of out hypothetical’s face to later use in Identification 2. Phone: While a phone is of no use to fascists, law enforcement can use data collected from phones to Identify who may have been present at a specific protest, and then target them for follow up investigation and prosecution. 3. Attendance: Given that this person is well networked on social media, their accounts may be encountered by LE or fascists at any given point, as such, it is important that they do not post specifics about when and where they protested, as that could aid in linking their real identity to their activist activities. Now that the information and threats have been identifies, they must now look and see what methods each threat has available to find each piece of information.
3:01 AM
  • Face:
    • Law Enforcement:
    • From the EFF Atlas of Surveillance, we know that LE agencies in SF use facial recognition technology, have body worn cameras and a registry of private cameras throughout the city.
    • Fascists:
      • Any videos or photos taken at a protest are liable to spread to social media and from there, be found by fascists.
  • Phone:
    • Law Enforcement:
    • From the EFF Atlas of Surveillance, we know that SF police are in possession of Cell-site Simulators (A.K.A ‘Stingrays’). This means that given enough time (likely a couple of hours) the police can start capturing the unique identifiers of every phone that is actively connection to a cellular network at a protest.
    • Fascists:
      • As far as we know, they posses no capability to identify phones present in an area.
  • Attendance:
    • Law Enforcement:
    • Excluding the previously mentioned measures, LE can use social media posts to identify who was at a protest, and more importantly, where they were when.
    • Fascists:
      • Social media posts can Identify attendance, location and time if not properly sanitized prior to posting. As previously mentioned, the fascists have social media to.
    With the threat model now established, our hypothetical activist can now start the consider what actions they may take to improve their digital security and privacy.
(edited)
👍 1
3:03 AM
HTML version should be a bit less awfull to read 🙂
Avatar
Great stuff man, thank you so much
Avatar
Doctor Eval 7/8/2022 8:28 AM
Our threat model should be a living document that is continuously updated and changed to meet a changing threat environment. There needs to be some kind of individual or working group that is responsible for maintaining the threat model
💯 4
Avatar
Too easy
Dr_Diskette pinned a message to this channel. 7/8/2022 10:41 AM
Dr_Diskette pinned a message to this channel. 7/8/2022 10:42 AM
Dr_Diskette pinned a message to this channel. 7/8/2022 10:42 AM
Dr_Diskette pinned a message to this channel. 7/8/2022 10:43 AM
Avatar
Skullmaggot 7/8/2022 1:41 PM
@Doctor Eval @Nomad is doing opsec on the admin team, if you haven't met. (edited)
👍 2
Avatar
Doctor Eval 7/8/2022 2:22 PM
howdy
Avatar
WojtektheBear 7/12/2022 7:03 PM
today i learned of something worse than a geofence warrant (a warrant that identifies all phones in a specific area during a specific timeframe): a keyword warrant. what's a keyword warrant? one where police ask google to provide info on anyone who searched for a specific keyword
Likes
8191
Retweets
1912
Avatar
@Skullmaggot If you need more help on the Security / OpSec side, I can assist as well. I have some background with Security (IT). Not sure if you need any more help or not, but let me know. If you have some specific needs or wish to dig into my background / experience a bit more, just send me a message.
Avatar
I've seen a person I know at court have his IP and location tracked, and presented at court for his arrest and trial, and was convicted after.
11:33 PM
They also showed his messages, Google, and GPS hour by hour
11:34 PM
Mind you that he killed someone so he deserves to be behind bars, but this information is readily within the reach of authorities.
Avatar
WojtektheBear 7/13/2022 2:32 AM
Hahahah I want to throw all my electronics into the sea
💯 4
Avatar
Avatar
Snaggy
Mind you that he killed someone so he deserves to be behind bars, but this information is readily within the reach of authorities.
I can vouch for this. In the 2020 protests, specifically the riots afterwards, when the Milwaukee police fired teargas and OC into the crouds around district 5 office, someone took off in a car, hit both a protestor and a cop, injuring the cops ankle. They were at this dudes house within 15mins to get him. All they did was track his phone to see where he was going, after running his plate.
Avatar
That's why I always recommend people to leave their devices in their cars or homes turned off, or completely off if they decide to black bloc or do something substantive. They will use anything and everything to get you, they have the resources. Motorcycles are great forms of transport during protests, and please don't forget about ahem, "protecting" your plates and parking in ahem, "safe" areas, ahem "people" will try to ahem, "steal" them. Oh, I had a cough there (edited)
Avatar
Covid 🤨
PES4_SuitMask 2
Avatar
Avatar
Snaggy
That's why I always recommend people to leave their devices in their cars or homes turned off, or completely off if they decide to black bloc or do something substantive. They will use anything and everything to get you, they have the resources. Motorcycles are great forms of transport during protests, and please don't forget about ahem, "protecting" your plates and parking in ahem, "safe" areas, ahem "people" will try to ahem, "steal" them. Oh, I had a cough there (edited)
Burner phone if you truly need one, but dont keep it because they can do broad sweeps to track any devices in the area. Thats how they got those Jan 6 morons (edited)
Avatar
Avatar
Nomad
Burner phone if you truly need one, but dont keep it because they can do broad sweeps to track any devices in the area. Thats how they got those Jan 6 morons (edited)
This exactly. Also, removing the sim does not prevent the phone from contacting cell towers for hand shakes.
💯 2
9:55 AM
Best practice is to make a faraday cage, don't turn on the device or enter sim till you're at the location. Remove sim and turn off before you leave, then place in faraday cage.
👍 1
Avatar
Burner phone should be rudimentary asf too
10:02 AM
Hard to track you if you're on a Nokia lmao
10:02 AM
Or smash the phone after you're done (edited)
Avatar
Anything that connects to a network can be tracked since it has identification for authorization.
💯 2
Avatar
Not disagreeing, just saying your burner phone should be cheap as it'll be easier for you, and there was a paper I read that rudimentary phones are harder to pinpoint due to no gps or anything, but this is off of memory
Avatar
Does anyone know how police can obtain voice recordings of phone calls? Or is that just part of the network tracking/identification liability of mobile devices
Avatar
Avatar
Ozzy7
Does anyone know how police can obtain voice recordings of phone calls? Or is that just part of the network tracking/identification liability of mobile devices
Voice calls are not recorded by providers since the data requirements are redonk
10:25 AM
But that does not mean your phone calls cannot be recorded when requested by authorities
10:25 AM
And then there is the NSA...
10:26 AM
I'd assume you're always being listened to unless on a secure encrypted connection
👆 1
10:26 AM
Voip over a tunneled connection, such as a VPN would probably be better.
10:27 AM
Even so, the phone itself could record
Avatar
Fuck all that shit, I use a pigeon
☝️ 1
Avatar
Avatar
Snaggy
Fuck all that shit, I use a pigeon
And go naked, no one wants to fight a naked man
Avatar
I have a gif of that, but I shall not post it.
Avatar
I have one kinda relevant. But its frank reynolds crawling out of a couch. I also will not post it
Avatar
Avatar
Nomad
And go naked, no one wants to fight a naked man
Naked with a ski mask*
😆 2
10:35 AM
Don't wanna get caught is all I'm saying
Avatar
Wont get caught with enough grease or oil....
☝️ 2
Avatar
Weirdly enough, how safe is it to grow your hair out and then after a bloc or violent protest or so is it to shave it out to avoid getting caught
Avatar
Avatar
Nomad
Wont get caught with enough grease or oil....
And rollerblades
Avatar
Avatar
Snaggy
And rollerblades
NordicThor_ 7/13/2022 10:37 AM
“Heeeeey fuck fascism, maaaan”
🤣 1
Avatar
So far we have a ski mask, naked lubed up, with rollerblades
10:37 AM
Sounds like a plan is all I'm saying
Avatar
Security is kinda kinky ngl
Avatar
Avatar
Snaggy
So far we have a ski mask, naked lubed up, with rollerblades
RaiseRuntimeError 7/13/2022 1:59 PM
So where are we keeping the burner phone!?! 😯
Avatar
Avatar
RaiseRuntimeError
So where are we keeping the burner phone!?! 😯
Why do you think we have lube?
☝️ 4
Avatar
In response to recent questions from Sen. Ed Markey, Amazon stated that it has provided police with user footage 11 times this year alone.
Avatar
Thanks to @Marusya , this looks like it was made in 2022 and not 1992! Here are some guidelines for all members to follow to best ensure @everyone stays private, safe, and secure. Attached: AIF OPSEC Powerpoint.
👍 17
Avatar
mountaininf 7/13/2022 7:10 PM
Thanks for the post. Loose lips sink ships and all
⛴️ 4
☝️ 4
Avatar
MrsKawasaki 7/13/2022 7:17 PM
Good advice 👍
Nomad pinned a message to this channel. 7/13/2022 7:39 PM
Avatar
YourFriendlyNeighborhoodHacker 7/13/2022 7:51 PM
Oooh, my kind of channel
Avatar
Avatar
Nomad
Thanks to @Marusya , this looks like it was made in 2022 and not 1992! Here are some guidelines for all members to follow to best ensure @everyone stays private, safe, and secure. Attached: AIF OPSEC Powerpoint.
YourFriendlyNeighborhoodHacker 7/13/2022 7:53 PM
(This is completely in jest, @Nomad ) "Step one, don't download strange pptx files from strangers on the internet...." :D.
7:53 PM
But this looks like a really nice resource, actually!
7:56 PM
I was having fun spoofing opsec posters into infosec jokes a few months ago
👍 5
Avatar
Avatar
YourFriendlyNeighborhoodHacker
(This is completely in jest, @Nomad ) "Step one, don't download strange pptx files from strangers on the internet...." :D.
Accurate though
Avatar
Avatar
VDV Swim Squad Coach
HTML version should be a bit less awfull to read 🙂
thechromatograph3r 7/13/2022 10:25 PM
Bruh. This is awesome.
Avatar
Avatar
Nomad
Click to see attachment 🖼️
thechromatograph3r 7/13/2022 10:27 PM
Remember: whatever you're planning to do, shut the fuck up. That also keeps the rest of us from being pegged as accomplices.
Avatar
3 can keep a secret if 2 dont know about it
🤣 4
Avatar
Avatar
thechromatograph3r
Remember: whatever you're planning to do, shut the fuck up. That also keeps the rest of us from being pegged as accomplices.
Fight club rules modified to.. 1. Shut the fuck up. 2. See rule 1 3. Shut the fuck up some more.
Avatar
Avatar
Nomad
Click to see attachment 🖼️
I think it’s about time I tell you all something personal that happened to me a few months ago. I’ll post the whole story in #general-chat
surprised_pikachu 1
Avatar
Doctor Eval 7/15/2022 9:15 AM
Remember, every day is shut the fuck up Friday
Avatar
Avatar
Nomad
Thanks to @Marusya , this looks like it was made in 2022 and not 1992! Here are some guidelines for all members to follow to best ensure @everyone stays private, safe, and secure. Attached: AIF OPSEC Powerpoint.
Skullmaggot 7/16/2022 5:04 PM
Don't suppose you can convert it to a pdf? The font's a little wonky when I open it as a powerpoint on my computer--different font I guess. I want to be able to directly share this with people who aren't yet aware that it's here. (edited)
Avatar
Sure can
Avatar
BrutusBrutus 7/19/2022 2:58 AM
Also, always assume there’s at least a couple of them in any reasonably sized group
Avatar
Quick security tip: be sure to turn off location data on your camera app. This will prevent location metrics from being stored in your picture file.
❤️ 3
1:19 PM
Avatar
Avatar
birb
Click to see attachment 🖼️
AmateurContendr 7/22/2022 2:09 PM
Thanks so much for that. I've been trying to beef up my security and I didn't realize how horrific my location settings in general were.
👍 3
Avatar
thechromatograph3r 8/14/2022 10:15 AM
‼️ @CBSNews has obtained DHS/FBI bulletin warning of "an increase in violent threats posted on social media against federal officials and facilities, including a threat to place a so-called dirty bomb in front of FBI HQ and issuing general calls for 'civil war"(h/t @NicoleSganga)
Likes
891
Retweets
496
10:17 AM
This includes threats that are "specific in identifying proposed targets, tactics, or weaponry," including law enforcement, judges, and government officials. Also notes attempted breach of FBI building in Ohio on Thursday.
Likes
156
Avatar
YoshiToranaga 8/27/2022 11:14 AM
Can anyone explain location data from photos you post/send a) how do you scrub that? b) how would you check afterwards to make sure it’s scrubbed?
Avatar
JohnBrosGhost 8/27/2022 11:36 AM
Where are you posting/sending? Discord and Reddit automatically scrub EXIF data.
Avatar
Avatar
JohnBrosGhost
Where are you posting/sending? Discord and Reddit automatically scrub EXIF data.
YoshiToranaga 8/27/2022 1:09 PM
I imagine Signal does as well? Anyway to do it from a native mms? I imagine snap and insta it’s jammed up
Avatar
BR9TTG9M9RS9N 9/9/2022 10:56 PM
taking a screenshot of a picture removes any location data
Avatar
LessthanLoneWolf 9/29/2022 3:29 AM
Found an interesting article about developing a cyber-vetting plan https://www.dhra.mil/Portals/52/Documents/perserec/pp11-02.pdf
Avatar
JeganCustom 11/20/2022 9:17 AM
Hey guys, whats a good budget VPN I can use to finalize my personal OPSEC preparations?
Avatar
Avatar
JeganCustom
Hey guys, whats a good budget VPN I can use to finalize my personal OPSEC preparations?
When in doubt, it's better to pay for non-14 eyes VPN providers like Mullvad or Proton
😎 1
Avatar
Bought proton VPN, thanks!
Avatar
Avatar
JeganCustom
Bought proton VPN, thanks!
My old layman ass trusts Proton. Largely on the recommendations of @Arrhythmix and others I trust in the computer field.
😎 2
Avatar
Proton I like a lot, but in regards to Mullvad, which I personally use, they're honestly a great choice as well
5:56 PM
Proton is certainly a great all-in-one service though if you don't like google
Avatar
Yea esp with the Sale going on rn it's worth it tbh. Speeds and privacy are great. (edited)
Avatar
What's a good protocol for AIF members to remain anonymous to each other, but communicate securely?
7:30 PM
A) express mutual interest here, B) one party shares secure email address, the other contacts this from a secure email address, C) Signal??(not anonymous: mobile number exposed)
Avatar
AIF Cuirassier regiment 12/1/2022 7:36 PM
I feel pretty safe, I don't have twitter or instagram, almost everything I've done has been behind some rsndom name I thought was funny or a character from a movie/game
Avatar
Avatar
1uc2
What's a good protocol for AIF members to remain anonymous to each other, but communicate securely?
Protonmail, Signal app using google voice phone number to set up.
7:45 PM
Signal allows group messaging. And can auto delete messages after a chosen length of time or when told to instantly. Set up a schedule to check in, if anyone misses the check in nuke the message history. It can only be read through the end user devices so that's the weak link, if someone gets compromised you assume their device has and nuke the history.
7:46 PM
But @Arrhythmix knows way more than I do.
7:46 PM
Maybe we can get J to chime in.
Avatar
Signal is the meta in terms of security and privacy. But Session I'd getting traction and Briar is good for decentralized local communication within bluetooth or WiFi for direct P2P without an internet connection
8:01 PM
But self hosted Nextcloud Talk with encryption has been a pretty great experience in terms of use at my startup company, but does require a lot of work and aetup
Avatar
Session is somewhat like signal, allowing encrypted messaging without a phone number
8:08 PM
It's routed through tor, so messaging is slow and sometimes inconsistent, but definitely useable
8:13 PM
Correction, it's routed through their "onion routing service", not explicitly saying tor
Avatar
Nextcloud Talk.. hmm. (edited)
Avatar
Here is a messenger comparison from the FBI, showing what data they can see
👀 2
8:28 PM
Original image is from January 2021, things may have changed but I can't confirm what has or hasn't (edited)
👀 2
8:28 PM
Avatar
Is GV really the best virtual mobile phone number to use with Signal, or is there a good secure SIP provider that can work with Signal?
Avatar
Avatar
1uc2
What's a good protocol for AIF members to remain anonymous to each other, but communicate securely?
Skullmaggot 12/2/2022 2:15 AM
Element's good too, no phone number (edited)
Avatar
Completely forgot about element, good ui and the matrix protocol is honestly pretty good as well
Avatar
Avatar
1uc2
A) express mutual interest here, B) one party shares secure email address, the other contacts this from a secure email address, C) Signal??(not anonymous: mobile number exposed)
rathernot123 12/3/2022 1:58 AM
Signal you can spoof numbers
😮 1
Avatar
^ you can just use a google voice number or burner phone if you're super paranoid.
Avatar
Avatar
1uc2
A) express mutual interest here, B) one party shares secure email address, the other contacts this from a secure email address, C) Signal??(not anonymous: mobile number exposed)
Just gonna point out that at some point you'll be meeting closer by folks in person and sharing operational info as necessary to get stuff done. So although all these security measures are very important, the ultimate security measure is properly vetting folks before you bring them into the more secure chat.
💯 2
👍 1
8:00 PM
And I'm not at all an expert on vetting, just wanted to pop in and remind everyone how important it is 😊
Avatar
Avatar
OkraMonk
And I'm not at all an expert on vetting, just wanted to pop in and remind everyone how important it is 😊
I can and have taught classes on vetting people. Most don't like the time it takes... but it's pretty damn critical to take that time. In short, 3 in person meetings over at least a month, with increasing levels off non in person communication between. With specific warning signs you want to look for through the whole thing. Particularly their eagerness to continue and expand contact with the group. It should progress like you might expect a friendship to progress. But if they come on like a guy trying to get in a gal's pants... that's a big red flag. They might not be fash or fed, but they will be prone to taking unnecessary risks. There are more... but that's probably the biggest one. (edited)
8:14 PM
Another one is someone ghosting after a meeting or two spaced a week or two apart... it shows they have a lack of commitment.
Avatar
Any recommendations on E2EE collab software?
Avatar
Avatar
Envy
Any recommendations on E2EE collab software?
Cryptpad is pretty good so far
Avatar
floppunism [BOI, ID] 12/13/2022 4:02 AM
do you guys have any resources on fingerprint minimization? i had to give up my fingerprints to get my EMT license
Avatar
wear gloves in protests
Avatar
Avatar
floppunism [BOI, ID]
do you guys have any resources on fingerprint minimization? i had to give up my fingerprints to get my EMT license
Nitrile gloves are thin and decently strong, the black ones are my favourite
Avatar
For industrial use they sell double layer nitrile gloves, although since they're basically twice as thick they're harder to get on
4:22 AM
https://www.amazon.com/HDX-Black-Disposable-Nitrile-Gloves/dp/B09C6PQBV9 I can't guarantee how well these types of gloves hold up since I'm allergic to nitrile, but these are an example of what they look like
HDX heavy duty Pop-N-Go nitrile gloves are one of a kind. This 6 mil thick dual layer glove has an orange interior that easily exposes tears in the glove. Gloves dispense one-at-a- time, cuff first, in a convenient clean package that can be resealed and stored on the jobsite or, in a vehicle glov...
Avatar
Avatar
horhay
Nitrile gloves are thin and decently strong, the black ones are my favourite
Though the worst color for first aid/trauma response. You want blue for that... you can't easily see blood on black ones.
Avatar
Avatar
Spinner
Though the worst color for first aid/trauma response. You want blue for that... you can't easily see blood on black ones.
Yeah I guess it depends on application, I’m sure floppa knows being an EMT. I feel cool with my black ones
Avatar
Avatar
horhay
Yeah I guess it depends on application, I’m sure floppa knows being an EMT. I feel cool with my black ones
shrug I've used both out of necessity in both combat and civilian first aid situations. I swear by blue, I teach to use blue, and everyone I know and have learned from has done the same.
4:41 AM
Black is fine if you are just using them to minimize being identified. But if you are expecting to play a medical role or think it's a possibility, please use blue.
💯 6
Avatar
235 million Twitter users' handles, email addresses and phone numbers leaked. If any of those contact methods have been used for any antifash action, we should consider it compromised now. https://www.thenationalnews.com/business/technology/2023/01/04/twitter-said-to-have-suffered-data-breach-as-hackers-expose-235-million-users-information/
Data dump contains users' names, e-mail addresses, screen names, number of followers and phone numbers
Avatar
AvoidOblivion 1/4/2023 10:14 AM
I deleted my Twitter account just after Musk purchased it. Hopefully my data was removed soon enough that it wasn’t in the leak. Although, part of me doubts that they actually delete your data.
Avatar
I'm pretty sure they do actually delete your data: there are very serious financial GDPR consequences for not doing that
10:49 AM
but who knows when this data was actually extracted
Avatar
LessthanLoneWolf 1/4/2023 5:46 PM
Glad I never used mine
Avatar
laughs as I used a throwaway account and never my phone number with twitter
5:52 PM
provided I didn't use it for shit
Avatar
floppunism [BOI, ID] 1/29/2023 2:49 AM
#8 is especially important. The only person you can trust when it comes to data security is yourself. Your friends may not intentionally share things, but you can never trust that they won’t unintentionally share something.
2:54 AM
And #16. I know it violates #14 talking about this, but there is another community I’ve been in for a few years and my privilege to even be involved in the community itself is set in a lie, which I almost blew a few times because I got cocky and complacent.
2:56 AM
And that’s where #8 is especially important too.
Avatar
AvoidOblivion 2/27/2023 1:11 PM
Does anyone have any secure alternatives for email that is not Gmail, and not Proton? I use them both already and would like something different. This will just be for spam, an email to be used when I would not like to use emails that could be connected to me or what I am doing.
Avatar
Black Magic 3/11/2023 10:06 PM
Burner phone, burner e-mail? I am fascinated by the topic, but haven't done enough due diligence.
Avatar
joe hill’s revenge 4/15/2023 4:55 PM
Can anyone discuss security at tomorrows general meeting? Date: Sunday 4/16 When: 9 AM PST/12 PM EST (noon) Where: Meeting Room voice chat channel Topics: mutual aid (I got a list of people who seem to have connections, and we can probably put together a network), marketing, networking (National Lawyers Guild?)
Avatar
Are these okay to share to other places?
Avatar
They're publicly posted on Mastodon so yes absolutely!
Avatar
Lucky Devil Tactical 5/2/2023 2:21 PM
Not sure if this is the right place to post, but everyone should be aware. A post by a sizeable right wing page on insta has called out “war” against several groups today. Included in the photo were stickers from CT JBGC, bay state JBGC, Shuten defensive, SRA, guerrilla tactical, and several others. It was brought to my attention by our friends over at yellow peril tactical, who were also mentioned in the post. Be safe out there.
2:22 PM
Avatar
joe hill’s revenge 5/2/2023 5:48 PM
I wish a motherfucker would (edited)
Avatar
Avatar
Lucky Devil Tactical
Click to see attachment 🖼️
Unu51, Syndicalizer of Anarchy 5/2/2023 5:55 PM
5:55 PM
Motherfuckers are going to scatter the second a shot is fired in their direction.
Avatar
Avatar
Lucky Devil Tactical
Click to see attachment 🖼️
fromdefilade 5/2/2023 9:15 PM
Tasker Network, the page that post is from, is an NYPD piggy.
9:15 PM
Avatar
Avatar
fromdefilade
Tasker Network, the page that post is from, is an NYPD piggy.
Of fucking course
9:24 PM
Cops try not to be neo nazis challenge (impossible)
Avatar
Avatar
Sedna
Cops try not to be neo nazis challenge (impossible)
Literally. I've got a job that let's me see the file directories of end-users. Straight up saw an LEO have a reimbursement report for "traveling expenses" to the Capitol Insurrection today. POS put his fascist bs on the taxpayer. ACAB, smh.
🤢 2
Avatar
was it used in his courtcase?
10:10 PM
cause pretty sure even cops got yoinked for J6
Avatar
I looked them up in the public lawsuits posted by the FBI and couldn't find a match.
10:13 PM
They're from a small PD in a Southern town with less than 2k people. I wouldn't be surprised if they haven't been pulled for an interrogation yet.
Avatar
Avatar
Akrione
I looked them up in the public lawsuits posted by the FBI and couldn't find a match.
AvoidOblivion 5/4/2023 12:17 AM
Report them to the FBI. All insurrectionists deserve punishment.
💯 6
Avatar
Avatar
AvoidOblivion
Report them to the FBI. All insurrectionists deserve punishment.
That's what I was thinking. I've gotta be sure I don't leave any trace at work, and to report anonymously.
👍 5
Avatar
This video shows two things. 1: Fuck Cops 2: That investigators/interrogators are incredibly good at setting someone at ease and getting details that seem insignificant when being asked, but will put you away. Let's say you didn't do anything immoral, you were just at a protest or something, they can and will find charges to get you on, and use seemingly innocuous information you can easily give up not knowing the value of to prosecute you. Never talk to law enforcement. Not even when you think you are being helpful. They can even say that the are investigating something unrelated to you entirely to get you to cooperate and give information they need to prosecute you. https://youtu.be/o_UbEhAYl8Q
👆 1
👍 2
Avatar
koala_kabob 6/10/2023 10:45 AM
Just wanted to share this tool for scrubbing your post/comment history on most platforms. You can selectively delete personally identifying information, certain keywords, etc. https://redact.dev/
Mass delete your messages, posts and comments on Twitter, Reddit, Discord, Facebook, and more, all from one free app.
👍 3
Avatar
Frederick Piratin 7/10/2023 2:15 PM
Hey, not sure where to post this, but I was looking today on DuckDuckGo and noticed that there are two different AIF websites. There's "https://www.ironfrontusa.org/" and "https://www.ironfrontusa.com/". Not sure which of them is official, and if one of them is a fake.
Avatar
koala_kabob 7/10/2023 3:12 PM
.org is the real one
Avatar
╣Xan╠ 7/10/2023 3:13 PM
Why would someone make a fake AIF website?
Avatar
propaganda, misinfo
Avatar
koala_kabob 7/10/2023 3:31 PM
We should be flattered?
Avatar
ehh
3:53 PM
its cute, but could cause problems later on
3:53 PM
especially if they try to add stickers with the fake url
Avatar
Micah Thomas 7/17/2023 9:32 PM
the .com site is missing a SSL certificate, it causes browsers to flag it as insecure even if its legit. Pretty sure I mentioned it before, but I'm not sure if it was ever fixed. The hosting company I use does this automatically for me, I just check it once a year and forget about it.
Avatar
Micah Thomas 7/17/2023 9:52 PM
I can help with technical website stuff, and also the scrum team organization, secure chats and code repositories.
Avatar
str8 up demon 7/19/2023 2:16 AM
bridgify uses bluetooth meaning stingrays cant steal info
2:16 AM
its a bonus for anti police surveillance
Avatar
Extension for Visual Studio Code - AES encryption and decryption for current file contents in visual stuido code
10:57 PM
initial tests confirm the few reports that it can cause data corruption
11:00 PM
Extension for Visual Studio Code - Contains lots of encoding/decoding and encryption/decryption tools like base64、hash、urlencode、AES、RSA、Vigenere、Caesar、etc.,and additional provides some text manipulation functions
Avatar
str8 up demon 7/22/2023 5:04 PM
that all looks like gibberish lol (edited)
5:04 PM
looks perfect
Avatar
Not much more secure than encoding in that state but it seems to maintain integrity.
Avatar
Saw this video earlier, as an illustration how easy it is to dox people. Usually. (No need for audio, it's jus some song, but the point~) https://fxtwitter.com/detectclips/status/1702439538662998195
Exported 198 message(s)
Timezone: UTC-5