-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512


GT500Shlby:
> Recently I went looking for as high as humanly possible anonymity
> but quickly deployed.
> 
> For a purely hypothetical example, say I have evidence on a
> prominent person. Think got mistress prego, mistress no want
> abortion, mistress gets bookend to skull, murder cover-up gone
> awry. So obviously me having said info, puts me in severe risk of
> being killed myself. Like full on conspiracy theory novel/adventure
> story. The idea is to be as realistic to the cyber security
> preparations as possible.
> 
> So I pick out an older laptop from recycle, flash the bios and
> remove any serial numbers and assets tags, pop in a newer SSD from
> a different recycled system (0 purchae records), reflash its
> firmware to remove serial number. Source an external wireless
> adapter with changeable MAC address and again, make sure no digital
> serial number. Now I need an OS. TAILS is a good option, but I saw
> Qubes used a while back and thought of it.
> 
> The idea is to go to a public place with lots of stores/cafes that
> have free wifi, but sitting outside those establishments in a
> non-cctv area but jacking their wifi, probably using a sharklasers
> email to get registered then using a vpn with bitcoin and another
> sharklasers email and then using tor above that to then create a
> throwaway reddit account to browse on r/gonewild err I mean drop
> the docs on the bad dude. However, my concern is, I'm having
> trouble finding the latest release date. the listed release
> schedule makes it look like the current stable release is over a
> year old. What is the TL;DR of the state of development of Qubes?
> 
>> From other privacy focused people, are their any holes in my
>> privacy scheme?
> 


Your model is actually a high risk environment, involving actions of
physical harm or death of you or your close ones.
In this case you would need to employ much measures and
countermeasures, not necessarily related to the digital behavior, more
than the OS like Tails or Qubes, to stay safe. Your behavior patterns
changes, your physical movement and monitoring of your life emissions,
the way you obtained the compro, from whom, how, when, where and so
on. Your contacts can be compromised already. Beware of your writing
stylistics, typos, and other similar leakages of your identity. In
case you have written something publicly under your real identity, you
should count that if you don't use deception, it can be one of the
identifiers narrowing options from adversary in pursuit of finding you.

Know your adversary and its level of determination, resources and time
available to find out key indicators leading to you. The higher it is,
the higher security measures and deception layers need to be employed
by you.

In this case you will for sure need certain level of well pre-prepared
deception layers to make sure that if your contingency plans fail, you
have a well working backup plan, spreading options on more ways
adversary needs to follow on each layer, to give you time and a
especially clear warning, that there is somehow successful adversarial
activity, without leaking this intelligence to the adversary.

You will basically need to do the job done and destroy all traces from
you, and remain exposed shortest time possible, and leak as little as
possible emissions about your activity and at the same time not break
too significantly your daily routine. All preparation activities are
deviations from your routine, and can rise suspicion even after the
job done.
Once done, there should be more less zero possibility to get any
intelligence about your sensitive activity by any means, even backwards.

Coming to the OS, in this case Tails will do the job. It is amnesic
and the only hot potato is the SD card, if your activity isn't leaked
already, which is still possible.
If you were for example searching for the Tails through an insecure
OS, downloaded TBB through a non-anonymous channel, or even through
your IP address, and so on, you can already be on a watch list.
Estimate how many people in your area use Tor or Tails and you will
see it is not much. It can be see you are using Tor or Tails, as it
has very unique behavior.

All that, provided you know what you are doing, you are able to get
Tails securely, can reliably obtain their signing pgp keys, confirm
the downloaded file with it, its hash, can run it securely, in this
case remotely (see external wifi card, with cantenna for example, to
get wifi connection from few kilometers away) and having clear OpSec,
and be sure you are not compromised already, from the very beginning,
you could be quite safe.


-----BEGIN PGP SIGNATURE-----
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=Ob3v
-----END PGP SIGNATURE-----

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b0bcdd6e-a40f-8ca1-b158-598ef436c5ba%40cock.li.

Attachment: 0xC1F4E83AF470A4ED.asc
Description: application/pgp-keys

Reply via email to