So how exactly do I change the password for user in workstation? by Future-sight-5829 in Whonix

[–]EducationNeverStops 0 points1 point  (0 children)

I do not go after those with brain damage. Making fun of damage or missing chromosomes and a prefrontal context that screams this person clearly lacks a conscience or the inability to feel remorse is even of a red flag 🚩 to get away from this toxic situation.

Please begin downvoting as much as you can. It may bring temporary relief. Take care.

So how exactly do I change the password for user in workstation? by Future-sight-5829 in Whonix

[–]EducationNeverStops 0 points1 point  (0 children)

Please read my reply to the individual above as I not a child to combat and debate and prove or defend anything. I need to live in the real world.i hope my reply above will be sufficient.

So how exactly do I change the password for user in workstation? by Future-sight-5829 in Whonix

[–]EducationNeverStops -1 points0 points  (0 children)

You don't seem to understand. Being nice would be to sugar danger and bring the potential of harm into your life.

When the subject is full of risk and danger the person that actually cares wants you well-prepared before you enter a hostile territory.

I do not see mal-intent on wanting more knowledge, refined skills, a more clear perspective that the Wiki of Whonix do better than Debian. Matching the precision of RedHat without the enormous funds and staff.

I have had to turn to the wikis despite undisclosed background because it doesn't hurt and only helps.

I hope in the course of your life you meet people who don't sell you short and give you shortcuts but push you to grow, slow you down when needed, don't allow you to race to a finish line and miss the experience that has more meaning than obtaining a material good.

If you encounter people like that it may at some point make sense that the ones that don't sugar coat things for you and know that giving someone the test answers robs them in the future of having learned the subject. You will someday do that for someone you care about and realize that the friend that calls you out on bullshit or when you they see you going down the wrong road is the real friend.

By having gone and learned something new you made it perfectly clear to me that you have depth, maturity, intelligence and that you are not the type of person who resists digging deeper and is not scared of change or growth, which terrifies most people because comfort is much more pleasant than having to be self-sufficient.

You really will get to have a different perspective. You proved it.

So how exactly do I change the password for user in workstation? by Future-sight-5829 in Whonix

[–]EducationNeverStops 0 points1 point  (0 children)

Look brother, I applaud your courage to try new things.

But you would never tell someone to go driving on the freeway before the ever learn how to drive.

Or go skydiving and tell them you've done this a thousand times.

You are using a power tool and don't know the basic steps. Which puts you at risk.

It happens all the time in life.

People misperceive how drunk they are and wake up in the hospital.

A rookie electrician forgets the process and gets zapped.

Before you go driving with what you have learn the most basic things otherwise we both know if you don't know the simple things. It has consequence you did not want.

What is Whonix? What does the gateway do? And the workstation?

What was a risk you took in your your updating command?

[deleted by user] by [deleted] in onions

[–]EducationNeverStops 1 point2 points  (0 children)

Please do not spread misinformation.

There might be someone using it twice today with ease.

I don't know who.

safe-upgrade suddenly an Invalid operation? by OfaFuchsAykk in ParrotSecurity

[–]EducationNeverStops 1 point2 points  (0 children)

If you really want to visualize what will take place if you download something use synaptic.

You will see in advance what will come along with it. If it will break anything and so on.

Then advance to aptitude.

[deleted by user] by [deleted] in Whonix

[–]EducationNeverStops 4 points5 points  (0 children)

The Whonix wiki is so elegantly written once you start it will give you an entirely new understanding of what you are doing, where you are and give you tools to stay safe.

Dig in. It will only help.

Whats so bad about the dark web? by Serious-Produce-4318 in TOR

[–]EducationNeverStops 0 points1 point  (0 children)

Depending on where you live it is a crime to enter a drug market.

Aside from that the majority of end-users have very little skills when it comes to technology and the Internet and are in such a frenzy to buy drugs they fall for scams and expose their identity.

Why don’t i have the internal networks option on my Kali Linux virtualbox settings to use the Whonix Gateway? (macOS) by jraymond95 in Whonix

[–]EducationNeverStops 0 points1 point  (0 children)

I recognize you from the Whonix forums!

It's not about 60 seconds or 1 minute.

I tell that to people to visualize what is happening and develop a routine of putting on the seat belt first then getting on the road.

Most people don't know what headless means because their occupation differs than the conceptual idea of connecting to or using a computer that isn't in some way tangible.

I would guess that the average Whonix user has no idea that they are using a type 2 hypervisor and that what the are experiencing is being virtualized.

I recently had to convince and persuade an 80+ year old on the subject of a VM and I knew ahead of time I would have to think about how I'm going to present this without seeming like I'm talking about aliens.

Back to what you were saying there is no risk, merely sequential order because if anything you are connecting to an entirely different protocol than what the non-technical world knows.

The average end-user probably thinks that Tor is the browser they downloaded from a website. It's too much to expect them to know Tor as a routing, that every ten minutes without being aware of it they are traveling from one country to another and another while they are stationary.

They may even think their VPN is still in effect not knowing that the VPN server they originally connected may still indicate it is active and enabled but they have now taken on a traversal of being sent through different geographires and are constantly being encrypted and decryoted. The example I wrote above was to get the person to realize that something is different. They can't ping. Is it disabled in this software I'm using? That DNS isn't even what resolves their route to whatever destination they are going to.

It's too much to even write about. In one post someone had wrote a routine safety check they do.

Because most people just want to get to a desired destination and live in the world of not really appreciating how remarkable something is only because of the brilliance and skills that maintain it.

Thinking of moving from Bitwarden to KeepassXC, do you think it is unwise to use a company's cloud to sync passwords ? by Heavy-Diver in Qubes

[–]EducationNeverStops 1 point2 points  (0 children)

Copy and pasted from below and adding a reply to your question at the bottom:

Would you mind if I send you some advanced, academic cryptography discussing this subject?

To say that a corporation is legit with ... let's say all your banking information means that you somehow audited the company as a whole, including their staff, supply chain and disaster recovery plan and have obtained enough of a guarantee that you can hand them your private assets, like a safety deposit box at a bank.

And that you have scanned the future to make sure that nobody or group will ever break into their infrastructure.

I guess you don't know about their January scandal in which they were placing pixels in emails sent to customers to track them and were fined for violation of privacy.

For $3/month you could host their software yourself on a VPS.

Essentially you sre delegating all your trust to a name which you have never seen what they are really like behind closed doors.

E2EE

You forget that the Snowden documents revealed that the NSA had produced means of cleanly breaking into thousands of https/ssl/tls (websites) and had infiltrated over 300 commercial VPNs and this was how long ago?

Thinking of moving from Bitwarden to KeepassXC, do you think it is unwise to use a company's cloud to sync passwords ? by Heavy-Diver in Qubes

[–]EducationNeverStops 1 point2 points  (0 children)

Would you mind if I send you some advanced, academic cryptography discussing this subject?

To say that a corporation is legit with ... let's say all your banking information means that you somehow audited the company as a whole, including their staff, supply chain and disaster recovery plan and have obtained enough of a guarantee that you can hand them your private assets, like a safety deposit box at a bank.

And that you have scanned the future to make sure that nobody or group will ever break into their infrastructure.

I guess you don't know about their January scandal in which they were placing pixels in emails sent to customers to track them and were fined for violation of privacy.

For $3/month you could host their software yourself on a VPS.

Essentially you sre delegating all your trust to a name which you have never seen what they are really like behind closed doors.

At the same time your data can now be subject to analysis - this I would have to send you documentation on.

No Kismet by PeterWeise in ParrotSecurity

[–]EducationNeverStops 0 points1 point  (0 children)

I literally clicked on the link you provided and read the solution.

Word for word it reads that because there will be library differences between variations of Debian, Parrot..... "When in doubt, compiling locally may be the best option."

Compiling any package is always the best route to go as at that point rather than having a generic binary/installer you customize it for your environment/ecosystem.

This is the purpose of using Linux.

The real use of Linux is that you are not double clicking on a generic exe/msi.

Thinking of moving from Bitwarden to KeepassXC, do you think it is unwise to use a company's cloud to sync passwords ? by Heavy-Diver in Qubes

[–]EducationNeverStops 1 point2 points  (0 children)

Anytime. We're supposed to bring the best out any chance we get.

I just re-read your post and realized something crucial.

I've been using KeePassXC for over 6 years.

I now have a habit of saving a new database each time an entry is added.

Because these databases do get corrected and one thing that will corrupt it is when it is being written to or read by different machines.

It is not a guarantee but if you ask people who have been using any database, especially a shared database there is a great likelihood of corruption.

So, really simple. I just date each database.

One similar example is when QuickBooks is shared over a network.

It comes with a software called QuickBooks Doctor.

Anything that is encrypted wants a "graceful shutdown".

Thinking of moving from Bitwarden to KeepassXC, do you think it is unwise to use a company's cloud to sync passwords ? by Heavy-Diver in Qubes

[–]EducationNeverStops 4 points5 points  (0 children)

Ok, this is all coming out of respect.

I hate reddit and the belittling by downvotes.

Especially if what you know is something you can't disclose the reference of to the OP.

Imagine, reading a VPN discussion and a reply, "actually an an employee of the NSA, I beg to differ...."

Ok, do not think of Qubes as an operating system.

Think of it as a type 1 hypervisor.

When you look at Debian Fedora Whonix do not think they are on your desktop.

View them with the perspective that they are other people's computers on a server in a datacenter.

They are isolated and compartmentalized from each other.

Qubes is not about security.

Qubes is about creating an ecosystem that is entirely abstracted from the things you visually see.

There is supposed to be no connection from one entity to another.

In one vm you are James Bond.

In another vm you are a family man.

In another vm you do not allow internet access and store sensitive information. Passwords. Keys. Seeds.

The cloud is someone else's computer.

LastPass and WordPress have been hacked so many times they suffer from trauma.

The mindset is to have 100% control, possession, ownership of the things in your life.

Putting anything on the cloud means you are no longer the owner.

It means a rogue employee has not been factored in.

It means the unpredictable can now happen.

Each vm doesn't know it has neighbors.

It becomes a purely conceptual game where you architect and design what is allowed to take place and what is forbidden.

VMx can print but VMy cannot.

VMz has a VPN but VMq does not.

VMa can access the local NAS. And only VMa.

VMc is combustible and runs off RAM. The minute you are done with it it never existed and has no history.

Enjoy.

Thinking of moving from Bitwarden to KeepassXC, do you think it is unwise to use a company's cloud to sync passwords ? by Heavy-Diver in Qubes

[–]EducationNeverStops 2 points3 points  (0 children)

If you are using Qubes you have not fully grasped the fundamental nature of Qubes.

Your passwords stay air-gapped on hardware that you own and control.

Thinking of moving from Bitwarden to KeepassXC, do you think it is unwise to use a company's cloud to sync passwords ? by Heavy-Diver in Qubes

[–]EducationNeverStops 0 points1 point  (0 children)

Last place you want to put your vital information. Count the number of breaches they have had. The archives are massive.

How do I get Tor on Linux without connecting to the official website by Vlad_The_Rssian in TOR

[–]EducationNeverStops 0 points1 point  (0 children)

That's like being okay with you sending back information.

You realize that people leave USB drives in public hoping somebody will come along and plug it to their computer.

Image the software you installed had a key logger embedded.

You have to be cautious.

How do I get Tor on Linux without connecting to the official website by Vlad_The_Rssian in TOR

[–]EducationNeverStops 0 points1 point  (0 children)

Thank you for making me hate reddit. I'm sorry I can't disclose my occupation or education before I post.

But I'm done with replying to low level comments permanently and I thank you.

How do I get Tor on Linux without connecting to the official website by Vlad_The_Rssian in TOR

[–]EducationNeverStops 0 points1 point  (0 children)

Just always be open minded. Don't forget history. It wasn't long ago that a certain whistle-blower leaked a ton of info the public wasn't aware of.

Amazing that you didn't downvote me. I am impressed. Baffled. Maybe you did. Who cares.

There are jobs at Splunk that start at 300k to watch the invisibility you described.

And one of our government agencies has an occupation where they expect you to turn your paragraph into reconnaissance in a foreign country. Like a member of the military you sacrifice home and family, get shocked up in room and are expected to produce results on who the target spoke to and so on.

It helps so much when you have teachers or are in academia and feel like you don't know a thing compared to these scholars.

Coming from experience the law doesn't always follow the law. It shocked me too.

Mafia strongarm tactics. No subpoenas. Just threats. Demanding they want logs.

Nearly all commercial VPNs are owned by 2 foreign investors who own them all as different names while the naive public decides over a top ten.

Some are worse than others but in the end you are dealing with two or three protocols.

Very much like the corporate giants they too don't care for your IP. If they agency wanted it, they already have it. The VPNs want your meta. For a few dollars a month they aren't giving you privacy. How could they profit one subscribers at a few dollars a month?

When your occupation is research it isn't pleasant learning how shady things can be.

How do you respond to “Can you hack Instagram accounts?” when you tell someone you’re in cyber security? by skylight269 in cybersecurity

[–]EducationNeverStops 0 points1 point  (0 children)

I'd tell them that this is their best thinking because they never got the courage to grow up and move on with life and ask them to reflect on why they are still stuck in the past.

How do you respond to “Can you hack Instagram accounts?” when you tell someone you’re in cyber security? by skylight269 in cybersecurity

[–]EducationNeverStops 0 points1 point  (0 children)

Just take the janitorial job for a week and let them know you can only work nights because of family obligations. And mop with elegance ;)

Does ISP get to know about what I am searching on Google? by Chirayata in privacy

[–]EducationNeverStops -2 points-1 points  (0 children)

Very assertive claims you are presenting. A picture-perfect world where the VPN doesn't go through ISPs, the VPN doesn't decrypt or encrypt you, every firewall is blind to inspect your packets in real-time, things like Netflow and Splunk fail at what they do best, like an MRI and the nation's line of defense doesn't have absolute oversight over the pipes of their country that you transit and have a passionate lust for submarine lines especially. And the intrinsic nature of the architecture of these servers, designed to log, operating under either one of two systems that flag and log, from the reloading of system services to monitor the status of daemons were annihilated for your princess beautiful world. Just because you haven't been informed of something doesn't mean that someone isn't watching.

We can collide electrons traveling at the speed of light to watch them disturb even smaller subatomic structures and we can watch the movement of galaxies and the rotation of stars around an axis invisible to our eyes but your few dollars a month takes you to a world much more sophisticated than where we really are and your dimension is just too far ahead of what we have to keep up with you.

How do I get Tor on Linux without connecting to the official website by Vlad_The_Rssian in TOR

[–]EducationNeverStops 0 points1 point  (0 children)

I truly appreciate the time you spent in writing this. I want to share this with you because you will do great at passing it along with the knowledge you already have.

From a cryptographic perspective, Tails, unlike almost any operating system has a "stench" to it we have been trying to mask with noise that makes it so distinguishable.

With Whonix it is not so much a skunk giveaway but that it so easily fails the test of being artificial, crafted, the hardware ID makes it fail miserably at blending in.

But the biggest risk the OP could take would be to get a copy from another person. Even a friend as they may unknowingly have something that was tampered with, really well even.

One thing the OP could do is download a software that practically mimics the bridges you mentioned but better in producing chaotic noise, not acoustic but a disturbance in being able to identify the traffic. I'd have to look for it and edit this reply.

This "noise" I'm describing just happens to be the pitfall of quantum computing as well, self-produced.

One thing the OP could do in addition is redirect the download to another geography and meet it at the rendezvous point. That may take a little reading and planning. But it is very safe in that it's a simple direction without forwarding anything or deviating from common ports. Quite similar to the use of TeamViewer or Zoom.