> You know, it really appears that the Fed was very much on the side of Obama,
> and later it was very much against Trump. Almost as if it was trying to
> SABOTAGE the economic recovery.
The Fed doesn't like parties (say the Republican Tea Party)
and people (Ron Paul, Cryptos) that might go aga
Joe Biden the Treasoner... Calls for Jihad against the USA,
Releases Campaign Plan to Convert the USA to Islam,
Impose Sharia Law, Raise a New Caliphate...
https://www.youtube.com/watch?v=iOhjQ9qoVJw Joe Biden Openly Calls For
Violent Jihad Against the USA
https://www.youtube.com/watch?v=RCkqSZp6n
Only three weeks left, with much Lefty Media Bias of
the Democrats fraud already irrevocably totalled and
accrued down the mail-in ballots...
Will Americans Wake Up to the Media Bias and Censorship in time... ?
https://www.youtube.com/watch?v=65TGgFSIDYk Democrat Hitler on Censorship
https://mobile.twitter.com/YAAS_America/status/1311721047377543168
Venezualan notes Tometi association
Biden the Creepy Pedo, Sealed Congressional Abuse Payouts [in one vid
below]... ?!
https://old.reddit.com/r/conspiracy/comments/inw7sc/joe_biden_was_caught_on_video_inappropriately/
https://www.youtube.com/watch?v=dj-pIZIyuOA Joe Biden Pedo Hands on the move #1
https://www.youtube.com/watch?v=KQ-
On 10/12/20, Zenaan Harkness wrote:
[unclear stuff that looks like part of an ongoing military psyop]
> Let no man come between you and God.
[more unclear stuff that looks like part of an ongoing military psyop]
Zenaan, you don't understand God. Anonymity networks are God. Do you
understand? A
Your words are _vaguely_ similar to the tor source code. If we copied the
tor source code, maybe we could make iqnets! Whaddaya think?
On Mon, Oct 12, 2020, 8:05 PM Zenaan Harkness wrote:
> On Mon, Oct 12, 2020 at 02:45:33PM -0300, Punk-BatSoup-Stasi 2.0 wrote:
> > On Mon, 12 Oct 2020 21:50:21
Nah, you posted political stuff. Try naclbox.
On Mon, Oct 12, 2020, 8:08 PM Zenaan Harkness wrote:
> Would love to, but I have a 1/2 to 1 day court hearing on Thursday re "my
> right to be dang well heard, on my own dang defence" since not getting to
> put my defence to the court is ridiculousl
Zenaan. Did you try naclbox?
On Mon, Oct 12, 2020, 7:30 PM Zenaan Harkness wrote:
> Andrew Anglin, just as David Duke, is a trooper - in the constructive,
> persistent, creative, mission focussed and mission critical sense of
> that word.
>
> Word deconstruction of the day: Anglin - the Angel W
Would love to, but I have a 1/2 to 1 day court hearing on Thursday re "my right
to be dang well heard, on my own dang defence" since not getting to put my
defence to the court is ridiculously unfair!
Stress level is "not low" till after then, at least..
On Mon, Oct 12, 2020 at 01:47:44PM -0400
On Mon, Oct 12, 2020 at 02:45:33PM -0300, Punk-BatSoup-Stasi 2.0 wrote:
> On Mon, 12 Oct 2020 21:50:21 +1100
> Zenaan Harkness wrote:
>
> >Liberal lunatic
>
> just as lunatic as the trumpofascists, white trash supremacists,
> rethuglicans, and the rest of right wingers. You know, the
On Mon, Oct 12, 2020, 6:57 PM grarpamp wrote:
> > usbs have microchips that accept code updates
>
> USB "converters" should be considered suspect.
>
> Plugging BadUSB's, BadHDD, CPU's, Flash, or any
> other chipped / smart device or port with firmware, microcode,
> chips etc between systems has p
On Mon, Oct 12, 2020, 6:46 PM Stefan Claas wrote:
> Stefan Claas wrote:
>
> > Karl wrote:
> >
> > > I embarrassingly haven't sustained much understanding of golang ... I
> > > wanted to convert my box keys to signify-nacl keys but it seems the
> > > formats are different; my own signature doesn't
Andrew Anglin, just as David Duke, is a trooper - in the constructive,
persistent, creative, mission focussed and mission critical sense of that word.
Word deconstruction of the day: Anglin - the Angel Within.
Anglin is often vehement, often (oh horror of horrors) guilty of 'shock comedy'
in it
Andrew Anglin, just as David Duke, is a trooper - in the constructive,
persistent, creative, mission focussed and mission critical sense of
that word.
Word deconstruction of the day: Anglin - the Angel Within.
Anglin is often vehement, often (oh horror of horrors) guilty of
'shock comedy' in its
> usbs have microchips that accept code updates
USB "converters" should be considered suspect.
Plugging BadUSB's, BadHDD, CPU's, Flash, or any
other chipped / smart device or port with firmware, microcode,
chips etc between systems has potential to infect / attack them.
Assuming some random magi
On 10/12/20, John Young wrote:
> the magicial, bewitching
> lodestone "national security," the abiding weapon of nations governed
> as royalty, heirarchical, the few overlording the many with force,
> elections, education, faith and trivializing deriviatives of
> entertainment, media, chat, partie
Stefan Claas wrote:
> Karl wrote:
>
> > I embarrassingly haven't sustained much understanding of golang ... I
> > wanted to convert my box keys to signify-nacl keys but it seems the
> > formats are different; my own signature doesn't verify when I just
> > copy the bytes.
>
> NaCl sign secret
```
tor]$ grep -r 'main(' src/app
src/app/config/or_options_st.h: int LogMessageDomains; /**< Boolean:
Should we log the domain(s) in which
src/app/main/main.c:/* Main entry point for the Tor process. Called
from tor_main(), and by
src/app/main/main.c:tor_run_main(const tor_main_configuration_t *
Karl wrote:
> I embarrassingly haven't sustained much understanding of golang ... I
> wanted to convert my box keys to signify-nacl keys but it seems the
> formats are different; my own signature doesn't verify when I just
> copy the bytes.
NaCl sign secret keys are 64 bytes, while NaCl box secr
On 10/12/20, grarpamp wrote:
>>> It looks like your OpenSSL headers don't match what Tor expects during
>>> `configure`.
>
> Giving the type errors during cc .o.
I don't understand you here. What do you mean?
>
>>> You can try building and linking against your own SSL, ala:
>>> ./Configure --pr
I embarrassingly haven't sustained much understanding of golang ... I
wanted to convert my box keys to signify-nacl keys but it seems the
formats are different; my own signature doesn't verify when I just
copy the bytes.
Do you know if there is a way to use cargo from an offline system?
This would
>> It looks like your OpenSSL headers don't match what Tor expects during
>> `configure`.
Giving the type errors during cc .o.
>> You can try building and linking against your own SSL, ala:
>> ./Configure --prefix=/usr no-idea no-rc5 no-mdc2 zlib-dynamic threads shared
> I found a workaround is
Stefan Claas wrote:
> Karl wrote:
>
> > Also attached to resolve pasting corruption. Document includes only
> > through the armor.
> > As it says inside the document, signature is calculated with tail -n
> > +4 | head -n -8 | sha512sum .
> >
> > -BEGIN NaCl SIGNED MESSAGE-
> >
Karl wrote:
> Also attached to resolve pasting corruption. Document includes only
> through the armor.
> As it says inside the document, signature is calculated with tail -n
> +4 | head -n -8 | sha512sum .
>
> -BEGIN NaCl SIGNED MESSAGE-
>Has
Also attached to resolve pasting corruption. Document includes only
through the armor.
As it says inside the document, signature is calculated with tail -n
+4 | head -n -8 | sha512sum .
-BEGIN NaCl SIGNED MESSAGE-
Hash: tail -n +4 | head -n -8 |
Karl wrote:
> I'm going to wordwrap this whole message, pipe it to sha512sum, and encrypt
> the
> hash to your key. I'll paste it in to a terminal and end it by hitting ctrl-D
> on a blank line, then add a new blank line and the cyphertext at the bottom.
> Would you be interested in verifying t
On 10/12/20, Stefan Claas wrote:
>> Why do you not use naclbox to communicate all the time? Couldn't it
>> even be used for the cypherpunks mailing list, if the mailing list had
>> a shared receiving private key, to verify that each person is saying
>> what they intend?
>
> Well, I often receive
Karl wrote:
> On 10/12/20, Stefan Claas wrote:
> > Stefan Claas wrote:
> >> | Stefan, I got:
> >> |
> >> AgAAAHYwSO+xQIT5meBNroABRxnwz1nF8Apub/z5OiqCftZUpGTBbcejwe6XQF4lpAnhW9YG
> >> | NAl9/zdLkj8FOG2NQmhbx82HXJv1Ju2c1w==
> >> | from you. Is this the same encrypted message as the one you se
Hey zen, try to set up naclbox (`go get github.com/rovaughn/box` if
you have golang installed) and send me something to
c72e81da09e333bc8804205bcfcf3bd8821cad61ad862d57114339e5ee00a664 .
I'm yearning to tell you all about my family's secret demonrat
rituals.
On 10/12/20, Zenaan Harkness wrote:
>
On 10/12/20, Stefan Claas wrote:
> Stefan Claas wrote:
>> | Stefan, I got:
>> |
>> AgAAAHYwSO+xQIT5meBNroABRxnwz1nF8Apub/z5OiqCftZUpGTBbcejwe6XQF4lpAnhW9YG
>> | NAl9/zdLkj8FOG2NQmhbx82HXJv1Ju2c1w==
>> | from you. Is this the same encrypted message as the one you sent? I'm
>> expecting that i
hey thanks for your response,
On 10/12/20, coderman wrote:
> Hello Karl!
>
> It looks like your OpenSSL headers don't match what Tor expects during
> `configure`.
>
> You can try updating your openssl-devel libraries, (sometimes called libssl,
> libcrypto, ssl-dev, etc. Check accordingly for your
Stefan Claas wrote:
> Karl wrote:
>
> Hi Karl,
>
> > AgAAAHYwNwAAACYoBMBoexWybVHaD6gSUYQvDho9F4ptZ5/fwtJrejNmwpXToWN2YtBqg3v6886R
> > QsxcjqLBKxZ1ZhsWlHZ+bZ2/DL7v+1IdT9m1xMl18QCigsZEbLovKiYMpddxBnqGgF4MeTX6
> > ptxfE8duAZQ3+wc+ij+Z1TmZScTHd9bxcGlkn0aj2nfuaFDFRP/fm3I50iL6QwXpNyMKD8Oj2+5k
>
Karl wrote:
Hi Karl,
> AgAAAHYwNwAAACYoBMBoexWybVHaD6gSUYQvDho9F4ptZ5/fwtJrejNmwpXToWN2YtBqg3v6886R
> QsxcjqLBKxZ1ZhsWlHZ+bZ2/DL7v+1IdT9m1xMl18QCigsZEbLovKiYMpddxBnqGgF4MeTX6
> ptxfE8duAZQ3+wc+ij+Z1TmZScTHd9bxcGlkn0aj2nfuaFDFRP/fm3I50iL6QwXpNyMKD8Oj2+5k
> RIfQpn2OxScgn6wauUL1TQAAADacCd0xdLnt
I've slightly changed a part of the message that didn't hold too much meaning.
```
$ export PATH=$HOME/go/bin:"$PATH"
$ box add-peer -name stefan-test -key
688fc978029e4bd309eaebea1e139ee6c461e08e19b714264dd91fbb62f5ca7c
$ base64 -d | box open -from stefan-test
AgAAAHYwSO+xQIT5meBNroABRxnwz1nF
Calming down partially,
On 10/12/20, Stefan Claas wrote:
>> > Another approach I am currently playing with is to play with NFC tags
>> > and
>> > a reader/writer device, which can be used offline as well.
>>
>> I don't know why you would ever consider an NFC radio secure, where
>> did you get thi
Stefan Claas wrote:
> Karl wrote:
>
> > Error: Command required
> > $ ~/go/bin/box new-identity
> > $ ~/go/bin/box list
> > NAME KIND PUBLIC KEY
> > self identity
> > c72e81da09e333bc8804205bcfcf3bd8821cad61ad862d57114339e5ee00a664
> > $ ~/go/bin/box add-peer -name stefan -key
> > cc5c5
Karl wrote:
> Error: Command required
> $ ~/go/bin/box new-identity
> $ ~/go/bin/box list
> NAME KIND PUBLIC KEY
> self identity
> c72e81da09e333bc8804205bcfcf3bd8821cad61ad862d57114339e5ee00a664
> $ ~/go/bin/box add-peer -name stefan -key
> cc5c5f846c661343745772156a7751a5eb34d3e83d84b7d
Karl wrote:
Hi Karl,
> > Another approach I am currently playing with is to play with NFC tags and
> > a reader/writer device, which can be used offline as well.
>
> I don't know why you would ever consider an NFC radio secure, where
> did you get this idea? I'm probably getting into a state of
On 10/12/20, Stefan Claas wrote:
>> In the next possible episode, we would either make a sourcefile to
>> send a message to the hacker by again copying from that same website,
>> or find a pre-existing tool that already does so, and then try sending
>> a message to see if we even interpreted their
Hello Karl!
It looks like your OpenSSL headers don't match what Tor expects during
`configure`.
You can try updating your openssl-devel libraries, (sometimes called libssl,
libcrypto, ssl-dev, etc. Check accordingly for your distro).
You can try building and linking against your own SSL, ala:
Karl wrote:
[...]
> In the next possible episode, we would either make a sourcefile to
> send a message to the hacker by again copying from that same website,
> or find a pre-existing tool that already does so, and then try sending
> a message to see if we even interpreted their signature at all
I'm actually reading this a few times to try to force all the
interconnected meaning into my messed up short term memory, and I
think John is saying he can help us if I can translate.
On 10/12/20, Karl wrote:
> On 10/12/20, Karl wrote:
>> Received this reply late.
>>
>> On 10/12/20, John Young
On 10/12/20, Karl wrote:
> Received this reply late.
>
> On 10/12/20, John Young wrote:
>> Use of any online or digital programs and/or devices for
>> comsec/infosec should be avoided unless completely enclosed and
>> transmitted with non-online or non-digital means. There are a number
>> of non-
Received this reply late.
On 10/12/20, John Young wrote:
> Use of any online or digital programs and/or devices for
> comsec/infosec should be avoided unless completely enclosed and
> transmitted with non-online or non-digital means. There are a number
> of non-onlne and non-digital means availab
So, every hacker [s/is slowly forgetting due to global gaslighting and
abuse/knows firmly/] that plaintext, unsigned communications are
pointless because all the political influences between you and the
person you're communicating with will alter your communications. In
order to connect we have to
Hey, Stefan =) Confused novel below.
On 10/12/20, Stefan Claas wrote:
>> The next step after getting a reasonable airgapped device, maybe a pi
>> zero, and ideally keeping it isolated, would be to install gnupg on
>> it. Maybe in a forthcoming email!
>
> GnuPG should be already installed with L
John Young wrote:
> Use of any online or digital programs and/or devices for
> comsec/infosec should be avoided unless completely enclosed and
> transmitted with non-online or non-digital means.
[...]
Thanks for your reply, much appreciated!
I think the problem nowadays is that when it come
Use of any online or digital programs and/or devices for
comsec/infosec should be avoided unless completely enclosed and
transmitted with non-online or non-digital means. There are a number
of non-onlne and non-digital means available, the first and most
reliable is your brain so long as it is
Something that most victims of [s/having your life fucked up by being
made a corporate mafia bully/accidental destruction of property/]
don't all know is that it is incredibly hard to actually erase
anything from an electronic device. So please if you tell your
friends let them know that [s/they n
DemonRATs, in the guise of Keith Olbermann, have a post election campaign to
deal with Trump supporters: round 'em up for that final solution ...
The moment, which seemed just a few short hours ago to be literally in-capable
of being escalated once again just escalated (note, this is NOT 'The
Karl wrote:
[...]
> After finding a good candidate airgapped device, you'll want to be
> careful with how you use it. Remember, whenever a new vulnerability
> is found, trojans cover the world taking advantage of it, and then try
> to find a way to hide inside the corners of all the systems the
52 matches
Mail list logo