Posted on 07/18/2013 10:01:16 AM PDT by null and void
never say or do anything you would not do infront of a crowd of people, because you might already be
For example, I would gladly stand in front of a crowd and say Obama is a douche nozzle
Don’t use it. Or make it “old style” with no communications with any other computer other than sneakernet.
Get PGP or its open source version GPG. Us it ti encrypt files you want kept private and messages you don’t want read. Unless the government has succeeded in forcing the developers to add a special backdoor, the larger key lengths are currently unbreakable.
Only two things will work:
1) Pull the ethernet cable out
2) Shut off the WiFi card
If you’re on the network, they will be able to get you if they really want. Even encryption isn’t foolproof, as it has to exist somewhere and at some time unencrypted in order to be created and viewed.
From reading the article, the short answer appears to be: join the Amish.
No such thing as "unbreakable", just those where the cost of the resources to break it far outweighs the value of the information.
How about instead we just mount a campaign against such government intrusion and get elected to Congress people who will make such intrusions highly illegal (as they should be now according to the Constitution - secure in their “papers”, etc.) and punishable by long prison sentences.... and enforce it!!
Well let me restate it for the nit pickers: can't be broken by the fastest computers now in existence in less than the projected life of the universe
I don’t doubt it. You are one krazy a** kracka.
It has come to this.
Land of the free. Home of the brave.
“It currently takes two separate passwords for my laptop to even boot up. Then it takes a third to log in. My data is on an encrypted partition, so even if they took the drives out, they couldn’t read it.”
Sorry, you’re wrong. And nice shirt you’re wearing.
NSA & Gang
LOL!
If they want you, they will get you.
I’m not suggesting going into hiding. I would keep my online inflammatory rhetoric to a minimum. No sense in inviting scrutiny.
Are you a member of & do you post to FR?
You’re in a watched category
Do you put political commentary on Facebook (including editorial cartoons)?
You’re in a watched category
Do you work in a large office with plenty of creepy, aggressive libs?
Say the right thing and one of them is going to sic the dogs on you
Do you have a CCW permit?
The feds are after & will get those lists. And you will be first priority if/when the time comes.
For most of us, the time to tighten up all of this stuff was 10 years ago.
Very bad times are coming, and a lot of good people (including us) are going to get put into a meat grinder. And many won’t come through it.
I quit hoping this whole Orwellian process could be arrested (pun intended). Now my hope is that I last long enough to see some of the smug hypocritical liberals I know get a big helping of the crap pie they have worked so hard for. If I do, I plan to savor it.
An atavistic alternative is to somehow go back to a regular 56k etc modem phone line, put a fax machine between the phone line and your computer and all attempts to query info from your pc will be printed out by the fax machine as incoming messages and never reach your pc.
Bookmark
Putting aside the horrible trail of Internet traffic, once used, a computer can never really be “cleaned” of private data. At least not by a person who is not an EE or IT expert. Search guidlines of the DOJ (which other government agencies follow) has the printer and keyboard and all internal system buffers and devises searched for data residue, etc. How would you solve that problem?
So, as long as a person is not under investigation or attempting to conceal criminal conduct or evidence, the only sure way to maintain one’s privacy is complete destruction of the box and all of the components.
Maybe that makes sense. Just like a document retention policy (which every smart company has) one should have an electronic data retention policy. Every year or two, the whole setup, printer, monitor, keyboard and all goes to the chopping block for a session with the log splitter followed by a burial at sea or equivalent.
bookmarked
bookmark
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.