Recent comments

hideyourlies wrote

I just like it's simplicity, the captchas can be a bit of a issue but it's never been down for me, always worked like a charm.

SIGAINT was a great mail provider on TOR but it went offline a few years back now and never resurfaced, I was thinking of actually setting my own TOR mail server up but never got round to doing it.

0

Rambler OP wrote

After some mediocre debate involving the creator of the software that powers this website and her lack of support of free speech I figured I'd ask the community here what they thought. After all, this is your community.

While the main topics of discussion here stem around technology, privacy, information sharing and anonymity networks I also don't believe in stifling speech so long as it's in the appropriate, user created forum.

I'm working on a bunch of wiki content as well, and I'll go into detail as to how you can block both a forum and it's content as well as specific members of your choosing from your view. This way, if you have a moral objection to the content of any forum(s) or member(s) you can erase them from your existence here and carry on as if they do not exist, because to you, they will not.

But hey, that's just my take on it. What's yours?

4

Rambler wrote

KeePassX.

Though it's a pain in the ass to use sometimes when you have a different password for every thing in the world, it just feels better than using something like Lastpass which is actually super convenient but I don't trust an in-browser password manager.

Bad thing is that it more or less makes it impossible for me to log into anything if I'm not using my normal devices, which is rare, but it is what it is I guess.

I learned my lesson years ago when some website database that had my information in it was leaked and I had several accounts hacked. You think Twitter is going to help you? Try regaining access to an account when the email address associated with it has also been compromised. It's a nightmare, and in the end, I gave up.

1

Rambler OP wrote

Good point. Not to mention they'll have first hand knowledge of who you're communicating with, the frequency of community, length of communication or hours of communication. They probably have GPS data knowing where you were when this communication took place.

Without even knowing what is said, you can build a somewhat thorough profile on someone based off of just that.

1

Rambler wrote

I believe there was a case where they complied with law enforcement to hand over user data, and although the contents of the emails were unreadable, the header info and subject was.

I'd say it's as safe or safer than most things, though it still requires javascript to use, which that alone has some people leery of it.

3

Rambler wrote (edited )

These are pretty wide spectrum weapons, right? From what I've read I'm not certain it's possible to narrow it in on an individual and they seem rather large. Not something one could hide, unless the images shown are for demonstration purposes. I'd imagine a box truck with a big dish on top facing an embassy would raise some suspicion and prompt response from some local officials...

1

Rambler wrote

The part that got me:

When he slipped through the back door of a strip mall, exited through the front door and ran down the sidewalk, it caught that, too.

How? How did they get that, too?

Are they able to narrow down SSID's of mobile devices on-the-fly to possible suspects so they can more easily follow them in a crowd, or if they go into a building and out a distant exit? It simpler facial recognition?

Each drone — including long-distance cameras, other sensors and software — costs the department about $35,000. But the overriding cost of the program lies in the many officers needed to operate the drones.

I'm curious what the "other sensors and software" is. Telephoto lenses and stabilizing gimbals on hobby, home made quadcopters / multi-rotors are nothing new. I was building these some years ago before "drone" was the accepted everyday terminology of a RC multi-rotor. Makes me wonder what they have access to...

3