4
submitted 5 hours ago by hereforawhile@lemmy.ml to c/DeFlock@lemmy.ml

Info from Eyes on Flock and the university transparency portal.

Map of all the organizations Iowa University shares with.

[-] hereforawhile@lemmy.ml 2 points 1 day ago

That would certainly be a step in the right direction to discard immediately.

There is a way for HOAs to create safe lists that keeps you off a national search, but only for your neighborhood. You aren't excluded from search results outside your HOA installed flock cameras.

Flock cameras aren't speed cameras though, they are only made to capture license plates, generate vehicle attributes and fingerprint into a searchable database.

Even if there was a mechanism to exclude me from search results...the moment I pass a camera I am technically searched and cross reference against the bad guy database. There no way around the 4th Amendment unreasonable search violation for me.

12
1

There are more ways to utilize OTP then to 2FA accounts.

Using an offline otp manager like andOTP you can generate time based codes derived from any shared secret. This can provide a whole new level of security in a scenario where Alice and Bob want to self verify a communication channel.

4
submitted 1 day ago* (last edited 1 day ago) by hereforawhile@lemmy.ml to c/DeFlock@lemmy.ml
[-] hereforawhile@lemmy.ml 1 points 1 day ago

You make good points and I can't provide any documentation. But the documentation won't exist. It would be the closest guarded secret of all time. NSA only holds the upper hand if everyone thinks it's secure. If the secret was out that that they could crack it no one would use it and the advantage is lost.

1
1
submitted 2 days ago by hereforawhile@lemmy.ml to c/DeFlock@lemmy.ml
[-] hereforawhile@lemmy.ml 3 points 2 days ago

AES256 was broken the day it was released change my mind.

[-] hereforawhile@lemmy.ml 4 points 2 days ago

People dont realize that you may as well hand over your social security number when you pass out your phone number.

1
submitted 2 days ago* (last edited 2 days ago) by hereforawhile@lemmy.ml to c/SecureComs@lemmy.ml

Broad Guide to Bootstrapping your own Codebook

Using a few key formulas you can create a functional code book with enormous keys that no computer could possibly brute force.

First let me explain how many possible keys there are in this particular example.

In this example the word list contains 3000 words. Each subsequent column labeled k1-k9 contains another 3000 bits of unique information. Each number of key columns added exponentially increases the total key possibilities.

In this schema the "Key" to encrypt and decrypt is the unique state of each cell in relation to the word list.

3000!^10 represents the amount of possibilities.

That is 2^91312 possible keys which makes aes 2^256 look completely wimpy.

Important Functions To Master To Build your Code Book

  • randbetween()

-vlookup()

-ifs()

-concatenate()

All of these formulas can help automate the encode/decode process.

Ways to mitigate Frequency Analysis

-Layer the final ciphertext with other string encryption protocols.

-Increase the amount of key columns so that the encoding formula can pick a random column. This will allow the same word to be encoded multiple ways so that someone analyzing plaintext will hit a wall.

-Generate new keys. New keys can be generated by shuffling the key and wordlist columns. You can use sorting functions to randomize and shuffle the wordlist.

Ideal Operational Security

-Air gap the computers running the encoding/decoding processes

-Share the keyfiles offline

-Rotate keys often

-Destroying old keys

-Use already secured communication channels to add layers.

Final Notes

This is obviously not a convenient way to share a message. It requires dedicated hardware, and disciplined protection of the keyfiles to really be secure.

Regardless of what anyone tells you about the strength of modern encryption ciphers like AES256...do you really think a the most powerful nation in the world would release a unbreakable encryption protocol 15 days after 9/11? I don't think so pal

1
Torch (lemmy.ml)

This is torch. A termux hosted hidden chat service.

Find it here After saving run with chmod +x torch.sh > ./torch.sh

Included features -PTT (if your browser supports it) -Lockdown mode. Adds E2EE -OTP mode. Generate time based keys to enhance security. -Voice changer -Add time stamp -Pin message to spam -File Sharing -Per room file organization -Delete server logs from web -Delete chat logs from web -Generate and spam random packets -Filter out generated noise (keep generating packets in background) -Optional per room cloudflared tunnels.

Here is the directory that is formed on startup.

Example server side chat logs with encryption enabled.

11

Kinda like how mqtt works, except your own private relay? If not..why and where would I start in building this protocol?

[-] hereforawhile@lemmy.ml 4 points 3 days ago

New accounts on reddit are heavily restricted making it impossible to share things so I left. Found Lemmy by accident. Instantly way better community and low barrier to contribute has me hereforawhile.

[-] hereforawhile@lemmy.ml 7 points 3 days ago

My bad, from my point of view it shared the description when I shared the link but I guess not everyone sees that.

72
submitted 3 days ago by hereforawhile@lemmy.ml to c/privacy@lemmy.ml

This app has been under development for a few months now and is ready for use.

Should be available on Google play first. IOS in the works and released soon.

If your a developer who can contribute and make it even better that is welcomed it's still very early.

[-] hereforawhile@lemmy.ml 7 points 5 days ago

There is good traction on the federal lawsuit in Norfolk. Your absolutely right this is a bipartisan issue. It will set huge precident if IJ wins the case. At the very least, LEO needs warrants to use the system. Right now it's the wild west.

IJ posts updates of the case here. They have already tried to derail the lawsuit multiple times but they have been able to push through all the appeals thus far so it can actual go to a jury trial.

170
submitted 5 days ago by hereforawhile@lemmy.ml to c/privacy@lemmy.ml
[-] hereforawhile@lemmy.ml 54 points 6 days ago

Neat map that compiles how many weekly contributions are made around the US to the deflock map

https://alprwatch.org/flock/map

[-] hereforawhile@lemmy.ml 12 points 6 days ago

Thankyou that's really helpful 👍

[-] hereforawhile@lemmy.ml 11 points 6 days ago

Here is the server manager in termux.

98
submitted 6 days ago* (last edited 6 days ago) by hereforawhile@lemmy.ml to c/selfhosted@lemmy.world

Find chess here on limewire. Link expires in one week.

Building upon the principles of my chat application, this is another implementation to push the limits of what's possible inside the termux environment.

This script includes all the pieces needed to run a world wide accessable chess game from your pocket. While the implementation of chess isn't perfect by any means, it has been a great learning expirence to figure out all the little parts of what makes a interactive webserver tick.

For testing, I did implement cloudflared within the script just to see if I can host to the clearnet as well. It worked!

[-] hereforawhile@lemmy.ml 21 points 6 days ago

I don't like this.

view more: next ›

hereforawhile

joined 1 week ago
MODERATOR OF