/psg/ - Privacy & Security General

"Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say."
--Edward Snowden

>Recommended operating systems
General purpose: Fedora, K/L/Xubuntu, Arch Linux
Privacy focused: Whonix, Tails, Qubes OS

>Recommended mobile operating systems
Android based: GrapheneOS, CalyxOS, LineageOS/DivestOS
Linux based: PureOS, postmarketOS

>Recommended browsers
Chromium based: Brave, Bromite, ungoogled-chromium
Firefox based: Firefox (w/user.js), IceCat, LibreWolf, Mull, Tor Browser
ffprofile.com
pastebin.com/dc53qN57

>Browser tests
browserleaks.com
privacytests.org
ipleak.net
d3ward.github.io/toolz/adblock.html

>Advanced content blocking
github.com/gorhill/uBlock/wiki/Blocking-mode:-medium-mode

>Recommended search engines
Brave Search, DuckDuckGo, SearX, Startpage

>Privacy oriented DNS
nextdns.io
quad9.net
adguard.com/en/adguard-dns/overview.html

>Privacy oriented email
Disroot, ProtonMail, Tutanota, mailbox.org, StartMail
Cock.li, RiseUp (invite only)

>Recommended instant messengers
Signal, Briar

>YouTube front end
redirect.invidious.io
newpipe.net
freetubeapp.io
github.com/TeamPiped/Piped

>Proprietary firmware replacement
coreboot.org
libreboot.org

>Resources
privacytools.io
ssd.eff.org
haveibeenpwned.com
stallman.org/facebook.html
madaidans-insecurities.github.io
sizeof.cat/links
ryf.fsf.org/products
techlore.tech

>Advanced Linux resources
madaidans-insecurities.github.io/guides/linux-hardening.html
eldritchdata.neocities.org
vez.mrsk.me/linux-hardening.html

Attached: 1645295708124.png (1200x600, 1.29M)

Other urls found in this thread:

bleepingcomputer.com/news/apple/apple-s-new-lockdown-mode-defends-against-government-spyware/
youtu.be/KrksBdWcZgQ
youtu.be/_eSAF_qT_FY
github.com/K0K0SHA/project_WPA3-PSK_hack
mcafee.com/blogs/enterprise/cloud-security/what-is-a-salt-and-how-does-it-make-password-hashing-more-secure/
twitter.com/NSFWRedditVideo

So let me get it straight. Websites don't actually store your password but a hash that's the result of running said password through a hashing algo, right? So when a data breach happens malicious hackers just run a bruteforce algo with all combinations hashing each one until they get the one that generates a hash that matches, correct?

some websites do. even facebook got popped a while back and was storing passwords in plaintext for like 300 million users of some legacy server.

kek thanks for reposting my doubt man, srry for killing the last thread.

Why the fuck would they store it in play text instead of hashing it? It takes nearly nothing to implement.

bleepingcomputer.com/news/apple/apple-s-new-lockdown-mode-defends-against-government-spyware/

youtu.be/KrksBdWcZgQ
youtu.be/_eSAF_qT_FY

How hard is it to host your own bitwarden and firefox sync if you're a brainlet? I've been thinking about trying out docker for this but I really don't have any experience with networking and linux, save for setting up a Pi NAS (just followed tutorials)

imagine trusting facebook in 2022

Just keep following tutorials, lots of self hosted resources exist.

Attached: 1656533381997.png (650x650, 43.05K)

privacy is a fucking joke. if the government wants to plant kiddy porn on your pc's, they can. there are backdoors built in on all motherboards and cpu's. no, they can't be removed. the five eyes see all.

funny how no one feels like writing anything, anymore. letting the thread die so you can erase this uncomfortable little nugget of truth, are you..?

>just don't mitigate any problems because the worst can happen
ok retard

you stupid fucking cunt, there's nothing you can fucking do when your system is cmpromised at the fucking HARDWARE LEVEL!! YOU FUCKING GOT THAT??? NO STUPID FUCKING LITTLE HOMEMADE PROGRAM WILL SAVE YOU!!

>you stupid fucking cunt
>there's nothing you can fucking do
>your system is cmpromised
>the fucking HARDWARE LEVEL
>YOU FUCKING GOT THAT
>NO STUPID FUCKING LITTLE HOMEMADE PROGRAM WILL SAVE YOU
Cool story faggot, but my primary devices have CPUs without the IME or similar niggotry, and your entire premise implies that people with IME'd CPUs can't do anything to achieve better privacy, which is fundamentally retarded. Anyone can observe activity on their network and ascertain if something is awry, and they can also utilize things like LibreBoot.

Hello all especially my friend Beaver.
I want to share summaries of what I've done with WLAN hacking, but I am dumb as fuck so I am having a hard time sharing my shit. I am bad at every social media for coders.

>Tried to make a WordPress
>can't figure out API
>Went to PasteBin
>Don't want to use it
>Run etherpad like Bober suggested
>NodeJS version not new enough
Reeeee it is so hard to collaborate.

>Finally make a GitHub repo
github.com/K0K0SHA/project_WPA3-PSK_hack

>There is barely anything there except a readme
I apologize for the lack of information in the GitHub right now. I do have a fair bit of knowledge from my experiments. Knowledge that far exceeds what I can post in one thread. I need to find a way to organize it all. For this thread, I tried to record what I learned over the years about WLAN cracking into the readme.txt file

Attached: wqwd41do8yj21.jpg (960x960, 160.7K)

You don't need to get fancy with git (and especially github).
Just use a pastebin style service or something.

Passwords are usually stored as hash. The hash function is one-way so you can't just take the hash and get a working password - you can't use the hash value and work backwards. So you try different inputs, use the function in the normal forward way and compare the output hash with the one from the database.

First, the hacker can try a wordlist of commonly used passwords. This is very low effort and still yields good results. Next, he can start with passwords of a low length and with no special characters. Then, depending on how much energy he wants to spend on the cracking, he can slowly increase the length and/or include special characters and use longer lists. It's a bit of a black magic to decide when you should start adding special characters instead of increasing length, what type of words of a dictionary to use, etc. It will depend on the type of users of the website as well.

Many websites now use salts to create the hash of the password. If the same salt is used for everyone on the website, then there is one salt per database. This could be the case if the salt is embedded into the code of the hashing function which is not part of the database the hacker has access to. Pre-computed hashes are useless until the salt is found. Users with a weak password will help the hacker find the salt. He can use the common passwords with different salts and would find a match for the weak passwords. Now he also knows the salt for the rest of the users.

Websites can also use different salts per user, though. They are saved next to the hash, so the hacker knows the salt for the user. But since it is different for each user, the hacker needs to run through the wordlists and do the bruteforcing for each individual user again, the hash for the same passwords will be different with this new salt. This makes the cracking much less efficient.

mcafee.com/blogs/enterprise/cloud-security/what-is-a-salt-and-how-does-it-make-password-hashing-more-secure/

DNS over TLS, Yes or No?

You can easily set DNS over HTTPS in Firefox and Chromium

But I have other devices in my WiFi so wouldn't it be a good idea to enable it inside my router?