Snappybeep/boop
Join !friendsofsnappy
1mo ago#7225174
spent 0 currency on pings
Buy a thinkpad x230 and install heads. Write protect the flash chip. Put nail polish on the screws and take high resolution pictures to ensure signs of tampering. Do NOT use a HDD or SSD. They have DMA so a malicious firmware could do a lot of damage, use of USB is preferred since they do not have DMA. Completely remove the microphone, sound card, webcam and the WWAN card from the laptop. Remove the fan to prevent binary acoustic data transmission. Replace the default wifi card with a supported atheros card. Disable wifi when not in use, preferably by physically removing the card. Make your own independent Linux distro from scratch. Most Linux distros value convenience over security and will thus never have good security. Your only option is to make your own. Use musl instead of glibc, Libressl instead of openssl, sinit instead of systemd, oksh instead of bash, toybox instead of gnu coreutils to reduce attack surface. Enable as little kernel modules as possible. Use a hardened memory allocator. Apply strong SELinux and sandboxing policies. Restrict the root account heavily to make sure it never gets compromised. Disable JavaScript and CSS in your browser. Block all STRAGMAN domains in your hosts file. Monitor all network requests. Do not use a phone. Never speak near anyone who owns a phone, they are always listening. Never use any non-corebooted technology made after 2006. Never leave your devices unattended. Tape triple layer aluminum foil all around your room as tempest shielding. Type really quietly as defense against audio keylogging. Use ecc ram to minimize rowhammer and rambleed. Encrypt everything multiple times with various different encryption implementations. Compile everything from source. Use hardened compilation flags. Always read through the source before installing something if possible. Only use the internet when absolutely necessary.
Huh I'ma need a bigger bag for the cohort Tryna make a millionaire out of slum dogs Bet that, head crack, blunt force Cozy with the east Africans up north Where seven make a three, turn a ten by law Crescent moon wink, when I blinked it was gone Left the crib, smacked, no sheath on the sword Made it by the skin of my teeth, thank God '03, momma rockin' Liz Claiborne Had her stressin' up the wall playin' Mary J. songs Rainy day came, couldn't rinse the stains off Long way to go, we already came far Story stayed the same, it was never madе up Threw me loose changе, look at what I made of it When the mood change, I'ma poker-face 'em It's a new day, who got all the aces? Who be foldin' late? Who know when to play dead? Who sit up straight when the roof caved in? Had a full plate, you ain't wanna split it Tell it to you straight, you ain't wanna listen Cup runneth over the brim Bust open, there's no closin' the lid Drumroll, here go my lil' entrance Gung ho, I'm the one that go get it Five O's on me like the Olympics Pure gold, somethin' told me, "Don't mix it" Caught a feelin', momma had me out Temple Not religious, we was really out Philly Livin' on the fly tryna wing it We got us a fire to rekindle Redirect the fight where it's meant for Triumph over plight and immense loss Ride alone at night, I get clear thoughts Caught a couple slights and I veered off Saw another height, had my ears poppin' Walked outside, it was still gorgeous
Sharp incisors reveal slowly In the dark inside, we was real hungry On a seven of the five, we was real hungry Uh, niggas still drummin' Foot shook ground when I stepped on it Didn't look back when I broke soil 'Cause every time I did it would hurt more In the dark inside, we was real hungry On a seven of the five, we was real hungry And I didn't look back when I broke soil 'Cause every time I did it would hurt more
Alright Yessir, this nigga spittin'
Welcome to /h/random! This is a space for everyone. We are pro-choice, pro-LGBTQIA🏳️🌈, pro-science, proudly feminist and believe that Black Lives Matter. Wear your masks, wash your hands, and be excellent to each other.
💉💉💉Got the ClotShot? 💉💉💉
The stories and information posted here are artistic works of fiction and falsehood.
Only a fool would take anything posted here as fact.
Rules:
0. WE ARE 100% YOUR PERSONAL ARMY - consider yourself drafted. Any attempt to avoid this mandatory service will result in immediate exile.
"We shall never deny a guest even the most ridiculous request."
1. Don't Follow Sitewide Rules*
2. No Porn*
3. No Gore*
4. No Illegal shit
5. Be Cool*
6. Mod Playground
7. Every time you read this rule, you have to post a meme
Jump in the discussion.
No email address required.
Buy a thinkpad x230 and install heads. Write protect the flash chip. Put nail polish on the screws and take high resolution pictures to ensure signs of tampering. Do NOT use a HDD or SSD. They have DMA so a malicious firmware could do a lot of damage, use of USB is preferred since they do not have DMA. Completely remove the microphone, sound card, webcam and the WWAN card from the laptop. Remove the fan to prevent binary acoustic data transmission. Replace the default wifi card with a supported atheros card. Disable wifi when not in use, preferably by physically removing the card. Make your own independent Linux distro from scratch. Most Linux distros value convenience over security and will thus never have good security. Your only option is to make your own. Use musl instead of glibc, Libressl instead of openssl, sinit instead of systemd, oksh instead of bash, toybox instead of gnu coreutils to reduce attack surface. Enable as little kernel modules as possible. Use a hardened memory allocator. Apply strong SELinux and sandboxing policies. Restrict the root account heavily to make sure it never gets compromised. Disable JavaScript and CSS in your browser. Block all STRAGMAN domains in your hosts file. Monitor all network requests. Do not use a phone. Never speak near anyone who owns a phone, they are always listening. Never use any non-corebooted technology made after 2006. Never leave your devices unattended. Tape triple layer aluminum foil all around your room as tempest shielding. Type really quietly as defense against audio keylogging. Use ecc ram to minimize rowhammer and rambleed. Encrypt everything multiple times with various different encryption implementations. Compile everything from source. Use hardened compilation flags. Always read through the source before installing something if possible. Only use the internet when absolutely necessary.
Jump in the discussion.
No email address required.
More options
Context