General statistics
List of Youtube channels
Youtube commenter search
Distinguished comments
About
TommyJ
Mental Outlaw
comments
Comments by "TommyJ" (@ImperiumLibertas) on "Mental Outlaw" channel.
Previous
2
Next
...
All
@Chiberia one reason security is not seen as critical is because many security teams conflate being "safe and secure" with inefficient when in reality the more automated things are with less humans directly involved the more secure things are generally.
9
@WolframaticAlpha they're the same person...deep fake technology
9
I don't think he has to have actually had the classified information to sell. He'll be charged with conspiracy to sell state secrets. Conspiracy just means he took steps towards doing the deed.
8
Tails isn't super useful for anything except anonymous web browsing. Qubes is much more practical with a dead man switch.
7
@ErikUden who are you referring to as glowies? The second amendment is based
7
How was the anon phone even legal? People have a right to privacy and at the point the phones were aquired there was no evidence of a crime being committed. Does the fourth amendment not apply all of a sudden?
7
@luizcastro5246 needing to charge you gun is dumb and the concept is flawed. You want a better solution that already exists? A biometric safe with a handgun in it. Imagine that. This "bio gun" is already limited to a nightstand gun why carry all of that unnecessary weight and complexity into a gunfight when you can leave that behind with the safe?
6
I wonder if there's any existing service that would trade Monero for a pre-activated SIM and a new phone.
6
Yes since you're paying for a license to use the software not the software itself.
6
I don't like the NRA but ransomware is terrible and terroristic.
6
@JSON_bourne if you run cod on a spinning platter HDD you can enjoy 30 minute loading screens 😂
6
@UncleJemima woke is easily defined as a colloquial term for intersectionalism.
5
It would be better to have a set of standard packet sizes that incrementally increase in size. 1kb 10kb 1mb 10mb etc. All traffic would have to pad the packets to match one of the sizes whatever is closest to make it more difficult to track. Adding random data doesn't make it any safer since it is still a distinct size from other traffic. It's all about anonymization.
5
@durchfaII it's a meme bro. Your press F to pay respects to something that's dead.
5
@egg5474 Utah is generally an extremely pro privacy state. I doubt they'd give any of the deanonymized information away. Everything is already linked to our driver's license numbers. it's probably just a way to not have to carry a physical license around while driving or going to a bar since everything just scans the barcode anyway.
5
@bxdda I totally agree. Having a foreign adversary having a vice grip on one of the most popular information distribution platforms in existence is a national security threat. There's a reason they didn't want to sell tiltok to a US company and would rather shut down. I think people forget that tiltok is part of the CCP.
5
@MrSplosiondude procedural is the way
5
@WanderingPassports Can you explain further? What do you mean by "the output." I understand how ring signatures and decoy transactions increase anonymity but not quite sure what you mean. Is it similar to how Tornado Cash does it where each transaction is a one way receipt only being able to verify that the receipt exists and isn't redeemed?
5
It encrypts user files first along with files that are likely important. DB files, third party binaries, documents, etc. Then they go on to the rest of the system.
4
This is probably the best one so far in regards to ease of customisability.
4
Free as in freedom not free as in beer. If you're watching these videos you should understand the difference.
4
I believe Whatsapp would want the full context of the conversation. And since it's not a rolling key they'd have access to the whole conversation.
4
Your client encrypts the traffic with all three public keys (I'm not sure how the client gets all three keys). And the traffic is decrypted at each step using the nodes private key. The exit node has the original traffic but does not have enough information to know where the source of the traffic comes from.
4
@durchfaII I assumed you weren't aware because anyone who was aware should understand it's a meme and not act like a big Karen in the comments section
4
Memory safety is very obviously a security enhancement. If rust is the language we should use to get memory safety, that's TBD. I think in general the US Gov has ways to deanonymize people without using memory overflow bugs so I think it mostly helps protect against other foreign actors.
4
@TJXD they didn't need to crack the onion to get DPR. He had poor opsec.
4
These hackers have been targeting government surveillance portals in addition to the infrastructure itself. Why break into each part of a very complex system when the US Gov has created a portal that grants access to all of the data the threat actor could ever want.
4
This video has been disabled due to low social credit score
4
@SI0AX I believe it is a anti drunk driving bill if I remember correctly. Absolutely a 4th amendment violation. We will see what comes of it.
4
@UncleJemima intersectionalism isn't just feminism. But you're right that it can be used to refer to the attitude of the ruling elite of the liberal world order.
3
@Cookiekeks I disagree, it adds necessary functionality to make monero a smart currency which will be necessary for long term adoption. But it needs to be done in a way that does not compromise security.
3
@a_human_being_yes I use it when searching for sketchy topics without being put on a list. There was some chemical I wanted to look up the popular uses but didn't want to get flagged. It was something related to a popular TV show but if that went into Google I'd be bent.
3
This channel is my favorite. Tech, based politics, and tendies
2
@zekiz774 as edger said. You can modify code on your machine as long as you don't redistribute any proprietary or copyrighted content. Although I 100% believe google would send their massive teams of lawyers down the thoat of anyone who dare attempt this.
2
I'm not in favor of the regulation. If people cared enough they wouldn't buy iPhones. They like the iPhone enough that they are willing to buy a proprietary chargers. Apple is no longer the only super high quality smart phone on the market. I'm not in favor of the government trying to force markets. Now when the USB-C standard goes out of date we will be stuck with an outdated charger. Still, I'm not crying because apple is a terrible company
2
What do you mean? This is Luke's deep fake.
2
Matrix is even better. It is even more secure and doesn't require a phone #. You can host your own matrix server or proxy to others outside the country.
2
@AJ-po6up really domain names aren't the issue. He has plenty of those.
2
@seesoftware it certainly would be hell for Microsoft for a short time. But if they care about their users long term security they'd do it for sure.
2
Gigabased
2
❤️❤️❤️
2
@ryanthomasyee what is DNM?
2
@antonio32a gæ
2
The newer models are nice and quite powerful for what they are. Don't use the raspianOS. The problem with a raspberry pi is it's difficult to move. Don't want to do anything darknet related on your home network so public networks are preferred.
2
Here is the link base64 encoded. bWFnbmV0Oj94dD11cm46YnRpaDowNTk1MjczYWI2NzRlMDUxMzFhNzU3ZjY5ZjQ5NGE0Mjg1YjQyOWFhJmRuPUZhY2Vib29rJTIwTGVhayUyMCU1QjIlMjAwMTklNUQlNUI1MzNNMzYyMFJlY29yZHMlMjU1 Use https://www.base64decode.org/ to decode it
1
It can also be used to escape firewalls since the IP list isn't obvious. But still most enterprise firewalls block outbound traffic to residential ips.
1
Vim yes Htop yes Neofetch no
1
Fish isn't the best for bulking tho
1
@iaqh yeah it's going to be crazy when they side with Trump again in his third term
1
@mo-s- I agree
1
Previous
2
Next
...
All