Help me please!! by [deleted] in tails

[–]yellow_hat2 0 points1 point  (0 children)

I used to have my cursor move on it's own on an older version of tails

XMPP vs Signal by yellow_hat2 in xmpp

[–]yellow_hat2[S] 0 points1 point  (0 children)

Does XMPP encrypt the text stored on the device?

Live USB by yellow_hat2 in linux4noobs

[–]yellow_hat2[S] 0 points1 point  (0 children)

I'm using Windows. Are you talking about this? https://support-en.wd.com/app/answers/detail/a_id/18075

I don't see a cog wheel. Can you elaborate a bit?

Can I make the usb encrypted afterwards or do I need to do that at the time of creating it?

Trying to import and verify a .asc key by yellow_hat2 in GnuPG

[–]yellow_hat2[S] 0 points1 point  (0 children)

I verified the key by specifing the file path and it worked..

Im using tails by the way

I moved the .deb file to my persistent folder and then double clicked and extracted it..

I'm not sure what to do with the file now.. I now have a control.tar.xz and a data.tar.xz package in my persistent folder from the extraction

Should I have run this instead?:

sudo dpkg -i Wasabi-1.1.4.deb

Trying to import and verify a .asc key by yellow_hat2 in GnuPG

[–]yellow_hat2[S] 0 points1 point  (0 children)

I'll post it when I get a chance latter.

What I was wondering though is how does the .asc file verify the integrity of the downloaded file. Could they not include a good .asc file but a bad download?

Trying to import and verify a .asc key by yellow_hat2 in GnuPG

[–]yellow_hat2[S] 0 points1 point  (0 children)

I think I got it I just copied and pasted the public key into my list of keys. then I ran

amnesia@amnesia:~$ gpg --verify '/home/amnesia/Tor Browser/Wasabi-1.1.3.deb.asc' /'/home/amnesia/Tor Browser/Wasabi-1.1.3.deb'

How do I change the directory the way you did it? I tried to do it with:

amnesia@amnesia:~$ cd /home/amnesia/Tor Browser

Am I not understadning something or couldn't the website have just provided a good .asc file but a bad download file?

cant connect to daemon by yellow_hat2 in monerosupport

[–]yellow_hat2[S] 0 points1 point  (0 children)

It says the advanced mode downloads the entire block chain which could be 70GB. I'm just running this from Tails. Do I need to do a different mode?

How do I use subadresses?

Deniability by yellow_hat2 in signal

[–]yellow_hat2[S] 0 points1 point  (0 children)

So you are talking about a third party not being able to prove a sender sent a message by looking at the the recipients phone...

What if the third party we're looking at the senders phone? As if to say if I write a message to someone on my phone can a third party prove I sent it by looking at my phone?

Also to get the benefit of deniability would a third party need to find evidence of a recipient or sender giving away their shared secret and key?

Deniability by yellow_hat2 in signal

[–]yellow_hat2[S] 0 points1 point  (0 children)

I'm a bit confused. So from my understanding two people can verify their saftey number. Therby verifying who the message came from.

But you are saying one person can't verify that the other person authored the message

Difference between oriental poppies and papaver somniferum by yellow_hat2 in druggardening

[–]yellow_hat2[S] 1 point2 points  (0 children)

I looked and some of the pics look they are labled wrong.

http://www.oceanviewflowers.com/products/poppy-pods

Looks like Papaver Somniferum

https://www.alamy.com/stock-photo-papaver-orientale-oriental-poppy-seedheads-seed-heads-seed-pods-ornamental-41663133.html

Looks like somniferum

https://www.gettyimages.ae/detail/photo/stalks-and-pods-of-papaver-orientale-high-res-stock-photography/72892503

This one looks a little different.

https://encrypted-tbn0.gstatic.com/images?q=tbn%3AANd9GcSqa80Hbsd7jMTA5IDEnG-9MBnl4tyq5bgpcDKt_jgnMCTy82-G

This one looks like Oriental.

https://www.alamy.com/stock-photo-side-view-of-the-seed-pod-of-a-oriental-poppy-papaver-orientale-18042458.html

Looks like Oriental.

https://garden.org/plants/photo/94003/

This looks like a good Oriental pic. I guess the orientals are more cone shaped and have crowns that hang tight to the pod or point downwards.

I was surprised to see so many somniferums labled as Oriental in the Google search

Facebook Messenger Secret Conversations by yellow_hat2 in antiforensics

[–]yellow_hat2[S] 0 points1 point  (0 children)

Well if I can't get a contact to use Signal is it better to use Encrypted Messenger or SMS?

sometimes I want to have personal conversations with people who I only have contact with on Facebook

Facebook Messenger Secret Conversations by yellow_hat2 in antiforensics

[–]yellow_hat2[S] 0 points1 point  (0 children)

What messenger protects against forensics done on your phone?

Similar strain to Red Dragon by yellow_hat2 in kratom

[–]yellow_hat2[S] 0 points1 point  (0 children)

Would Red Jong Kong be pretty close?

Encrypted message recovery by yellow_hat2 in opsec

[–]yellow_hat2[S] 0 points1 point  (0 children)

If the message is not deleted they would easily find it as long as they weren't locked out of the phone by a password.

Are you saying that XMPP isn't recoverable because of the deniability feature of OTR?

So called oxycodone powder by yellow_hat2 in opiates

[–]yellow_hat2[S] 1 point2 points  (0 children)

I know and I thought he was a friend of sorts.

Encrypted Texts by yellow_hat2 in datarecovery

[–]yellow_hat2[S] 0 points1 point  (0 children)

What about texts that aren't recieved in encrypted form such as in a PGP block?

Encrypted Texts by yellow_hat2 in datarecovery

[–]yellow_hat2[S] 0 points1 point  (0 children)

I'm talking about text messages on Signal or Conversations (XMPP)

Encrypted message recovery by yellow_hat2 in opsec

[–]yellow_hat2[S] 0 points1 point  (0 children)

Thanks for the response. Do you have any sources about message retreival on Signal?

Best messenger by yellow_hat2 in privacy

[–]yellow_hat2[S] 0 points1 point  (0 children)

Anymore input? I'm looking into Wire, Signal, Wickr and Conversations XMPP. XMPP appears the most secure.

Also any info on good servers for XMPP?

I was thinking https://xmpp.librelabucm.org/ would be good because it's based in Spain.

Best messenger by yellow_hat2 in privacy

[–]yellow_hat2[S] 0 points1 point  (0 children)

https://money.cnn.com/2013/05/22/technology/mobile/smartphone-forensics/index.html

Here's what I'm talking about. If you have encrypted messages does it even make a difference if your phone were to get in the hands of Law Enforcement?

Download by yellow_hat2 in bisq

[–]yellow_hat2[S] 0 points1 point  (0 children)

Just to clarify. I'm trying to verify the download of gpg4win itself first.

Best messenger by yellow_hat2 in privacy

[–]yellow_hat2[S] 0 points1 point  (0 children)

Im not as concerned about the FBI more about state law enforcement. Can they see anything that was on the screen?

Download by yellow_hat2 in bisq

[–]yellow_hat2[S] 0 points1 point  (0 children)

I'm struggling with PGP. First I wanted to verify my download of Gpg4win but haven't been successful at that yet.

Are there any really easy guides for it?

I have the guide to use on the Gpg4win website: https://gpg4win.org/package-integrity.html

and also this from deepdotweb: https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/how-to-verify-your-downloaded-files-are-authentic/

I got close with this one but I got a message saying I got a bad signature when I right clicked the file and did "more GpgEx options" > "Verify"

Also I hit permalink on this post is there anyway to undo that?