In need of muliplatform commandline file encryption tool

BM-2cTeKLALNRzwuUr6UPqMTXqu6YnopPQTEq
Apr 17 18:20 [raw]

Ladies, gentlemen, I am in need of muliplatform commandline file encryption tool. GPG excluded for being too bloated nowadays. OpenSSL CLI tools excluded for having too many security fuckups in past. I need something light, small, portable and self-contained. <---- This is crucial. Must work under Linux and Windows 32/64 bit - data will be exchanged between these platforms - without absurd dependencies like mono/dotnet/python/perl <---- This is crucial, too. Already found bcrypt http://bcrypt.sourceforge.net/ and ccrypt http://ccrypt.sourceforge.net/ These are nice but symmetric only. Anything similar with asymmetric aka public key encryption? Truly yours, Fellow BM user

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 17 23:30 [raw]

It's all a bloated mess now. If you want minimalism you may have to program it yourself. Thankfully, there are minimalist crypto libraries. A modern one like https://monocypher.org/ might be a good place to start, but it's not been officially audited as of now.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 18 15:16 [raw]

> If you want minimalism you may have to program it yourself. DO NOT DO THIS. You will make a mistake and compromise your security.

BM-2cTeKLALNRzwuUr6UPqMTXqu6YnopPQTEq
Apr 18 15:34 [raw]

I know it and I won't do it. This is why I am asking for help here. I need minimal tool with trusted crypto-engine.

BM-2cTgGsfiMJ6875SC8ov7JiUTvoZFKj8h2H
Apr 18 18:57 [raw]

don't listen to these fagmasons.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 18 22:11 [raw]

You can do it, you just need to have trusted people review it. If no one ever did it, security software would never be made. Anyway there's a little CLI tool called AESCrypt that *might* be what your looking for. https://www.aescrypt.com/

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 20 02:14 [raw]

I mean.. I wrote a CLI encryption tool myself, using Bitcoin public keys. It's completely shitty code and one of the first things I wrote, and I'm truly embarrased to show it because of how god-awful the code is.... but it does work. It's in Python though and requires PyCrypto and my own bitcoin library, so there are those dependencies. I suppose you could use something like PyInstaller or something to generate a single cli executable for various platforms and that would work. Anyway, here it is: https://github.com/maxweisspoker/bitcrypt If you can't compile it yourself and want me to try and compile it into a CLI for Linx/Mac and Windows I can do that for you. Obviously, you'd be trusting an executable from a stranger on the internet, but I will do it if you want me to.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 20 02:22 [raw]

Do you have a private address or a broadcast address I could subscribe to?

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 20 02:45 [raw]

> Obviously, you'd be trusting an executable from a stranger on the internet Isn't Linux a pile of executables from strangers on the Internet?

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 20 07:47 [raw]

You seem to have a lot of arbitrary requirements that point toward using either GnuPG or Openssl, yet discount them right out of the gate. Why? Nothing else out there is going to be as hardened as these. If you find some snowflake tool, you're just using something with holes that you don't know about. "security fuckups in the past" can also an indicator that software has been audited and holes fixed. If you want something light/small, it sounds like using GnuPG or Openssl simply for the core function of encrypting will suffice. Seriously, you'll be fine. Whatever problem you are trying to solve, just use either of these and move on. PS, don't use Bitcoin ECDSA keys to encrypt files. https://security.stackexchange.com/questions/99779/how-to-encrypt-with-ecdsa

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 20 10:43 [raw]

------------------------------------------------------ Do you have a private address or a broadcast address I could subscribe to?

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 20 12:54 [raw]

Not just Linux, most OS's. You're just not going to spend your days reading source code for literally everything, so you have to place your trust somewhere. And I'd rather trust my Linux install than most other things, especially given that I do read the source for a fair number of my programs before compilation.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 20 13:16 [raw]

To OP: Stop worrying and love the OTP.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 20 14:47 [raw]

I was going to wonder the same... why bitcoin keys? I mean, frankly, the key generation is the most difficult part and the thing most crucial to getting right. If you don't, the rest is automatically tainted. The rest, however, there are plenty of libraries for. And using BTC keys means you're openly and freely promoting key reuse out of the gate...

BM-2cTeKLALNRzwuUr6UPqMTXqu6YnopPQTEq
Apr 20 15:00 [raw]

I need small and simple tool and without long history of security holes. OpenSSL and GPG are not qualifying in these categories.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 20 16:10 [raw]

What grandparent said. A bug-free past is no indication of a bug-free future. Often it's only an indication of insufficient peer review. Also, if you're planning to stick to standard formats, your choice of software shouldn't matter. You can use what's available now (probably OpenSSL) and sidegrade when practical.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 21 03:08 [raw]

No, I run Gentoo. Binary distros suck.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 22 03:56 [raw]

And you read every line of source before you compile, and your hardware was made by you in your own machine shop...??? No? Well then you're trusting somebody too. Compiling from source does not add nearly as much security as you apparently think. The main benefit of a source idstro is a percent or two of speedup. That's it.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 22 04:15 [raw]

It's not an on/off switch, it's a full mixing desk where you fine-tune the amount of trust that you place in each developer or group. You don't read every line of code, only those that matter to you. You don't recompile every single binary, but still avoid running unsigned binaries acquired through less trusted channels. You don't audit your hardware, but you may choose to buy it from a trusted supplier. And so on. Suum cuique, basically.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 22 05:46 [raw]

Safety in open source lies in a whole community of people reviewing the code. With many more or less independent people involved, mostly in transparent bug trackers and forums, it's that much harder to corrupt the process and sneak in evil lines of code.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 22 06:37 [raw]

> Safety in open source lies in a whole community of people reviewing the code. Which does not happen 99% of the time since the number of applications is immense while the people with time to review code is very small. Thus your religion is false. Open source is not a guarantee of good code or of security. It's a myth. > it's that much harder to corrupt the process and sneak in evil lines of code. No, it's not much harder. It's much easier. In a corporate environment there is strict access control and LEGAL LIABILITY which does not constrain open source. Every time a corporation messes up and an exploit makes its way into the product, the highly expensive lawsuits come rolling in. When this happens with open source the developers ignore you and treat you with contempt. You are smoking dope to worship at the altar of open source. > With many more or less independent people involved You mean like all the CIA's handpicked directors at Tor Project? GTFOOH.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 22 07:10 [raw]

"You mean like all the CIA's handpicked directors at Tor Project?" Care to elaborate?

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 22 07:14 [raw]

Who do you think funded the development of TOR ? US Navy. Who do you think encourages it's use globally so that it can spy on dissidents easily ? CIA. Who do you think benefits from a compromised encryption tool like TOR ? NSA.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 22 07:15 [raw]

> Which does not happen 99% of the time since the number of applications is immense while the people with time to review code is very small. Thus your religion is false. Open source is not a guarantee of good code or of security. It's a myth. If by 99% you mean 99% of all open source projects ever started, you might even be optimistic. Noone is claiming that a project is good or secure just because it's open source. However, in a project that has widespread adoption and good traction, there will be more peer reviewers. > In a corporate environment there is strict access control and LEGAL LIABILITY which does not constrain open source. Every time a corporation messes up and an exploit makes its way into the product, the highly expensive lawsuits come rolling in. Yes. Thus in the pratice of your corporate religion it is customary to insulate these liabilities with never-ending rabbit holes of legalese and/or push liability further down the chain of shit storms. It's not so easy to litigate against some eventuality noone could reasonably foresee, which is the case we seem to be talking about here. However, within the regime of "stict access control" it is very possible and most likely tempting for corporations to cover up such breaches, and bring fire and brimstone upon the heads on anyone from the inside divulging such information. It wouldn't be too hard to find some recent examples of this, no? The opaque nature of corporations also make them quite compatible with government gag orders and backdoor requests. Ultimately, government can in effect just shut you down if they don't play ball. That can be a lot more expensive than a lawsuit game of tag, if money is your stake. > You mean like all the CIA's handpicked directors at Tor Project? GTFOOH. So from one example born of a rather dubious conspiracy theory, you disqualify all open source projects. I find that a rather fanatic standpoint.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 22 07:21 [raw]

sure: >Internet privacy, funded by spooks: A brief history of the BBG https://pando.com/2015/03/01/internet-privacy-funded-by-spooks-a-brief-history-of-the-bbg/ >Almost Everyone Involved in Developing Tor was (or is) Funded by the US Government https://pando.com/2014/07/16/tor-spooks/ and the most damning IMO: >How leading Tor developers and advocates tried to smear me after I reported their US Government ties https://pando.com/2014/11/14/tor-smear/

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 22 07:39 [raw]

This dude is a well know russian disinformant.

BM-2cVoDuuvXDzFKRmNXP7E8Nhnyyh6GLTCGJ
Apr 22 07:46 [raw]

here's a symmetric way to encrypt: openssl enc -aes-256-cbc -salt -in YOUR_RAW_FILE -out YOUR_ENCRYPTED_FILE -k SYMMETRIC_KEY openssl enc -aes-256-cbc -d -in YOUR_ENCRYPTED_FILE -out YOUR_RAW_FILE -k SYMMETRIC_KEY here's an asymmetric way to encrypt gpg --local-user YOURKEY --recipient THEIRKEY --output ENCRYPTED_FILE --encrypt RAW_FILE gpg --output RAW_FILE --decrypt ENCRYPTED_FILE And even if you DO read every line of code, you are also naively assuming that your ability to detect a vulnerability is infalliable. What you WANT to be using is a piece of software written by people smarter than you, whose work is reviewed and audited by other people smarter than you. This is vastly superior to new software with no history of problems, or old software which has sat around in disuse. And if you are smarter than the whole of the security community, and can find an exploit in either of those commands, the bounty 0-day for this could probably buy real estate.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 22 07:52 [raw]

you have these poor leftie activists who don't realize the deep state has enlisted them as useful idiots to promote crypto-anarchism, which accomplishes nothing against the empire. body counts is how you accomplish something against an empire but the metrosexuals don't want to deal with the art of manliness.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 22 07:54 [raw]

Emails between the CIA and Tor Project leaders were posted here recently. They were very damning. The leaders of Tor Project were asking the CIA to send them the CIA's handpicked agents to work as Tor directors. The fucking manfags and sissies just don't get reality. They're afraid to see they've been fucked and the resistance is actually lead by the empire.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 22 07:54 [raw]

An email leaked from torproject went out on this general chan where Dingledine was asking the CIA for its choices for the board of directors. Did you miss it?

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 22 07:54 [raw]

And I suppose Tor Project's emails to the CIA are also Russian disinfo, by your reckoning?

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 22 07:54 [raw]

Standard CIA response.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 22 08:00 [raw]

I'm curious: How does one verify the authenticity of these emails?

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 22 08:27 [raw]

No GPG, no SSL. I need lightweight solution,

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 22 08:28 [raw]

Never saw it.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 22 08:30 [raw]

The FOIA request number they were released under. But you didn't bother reading the emails to see that, did you? I am so tired of you teen fags trying to distract with bullshit. TOR is bullshit. It always was bullshit. It was a CIA cointel op from day one. OK, fag? Do you get it?

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 22 08:30 [raw]

Yes, they are forgeries.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 22 08:35 [raw]

Ooh, the russians. Blame every fuckup on them like a good useful idiot.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 22 08:37 [raw]

Don't let us teen fags provoke you too much. You will just end up with heart problems in the end. Then we teen fags will have won. Instead, how about sharing your wisdom with us teen fags by revealing how one correlates this "FOIA request number" with something that unambiguously authenticate the contents to which it points?

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 22 08:40 [raw]

exactly how the fuck are clear facts with sources disinfo? theres no hypothesis here

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 22 08:43 [raw]

You fail to question the nature of your reality, so you lash out against the enlightened. That is how you are one of the millions of useless idiots of the right. Too stupid to make a fortune on your own.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 22 08:44 [raw]

https://www.reddit.com/r/TOR/comments/4pw7bz/tor_infiltrated_by_cia_agent/

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 22 08:44 [raw]

https://surveillancevalley.com/blog/tag:Tor%20Files

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 22 08:51 [raw]

LOL Yasha Levine.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 22 08:54 [raw]

The author is irrelevant. The sources and information is what matters. And the Tor project's insane responses.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 22 09:01 [raw]

From link one: > I was able to obtain in 2015 via FOIA roughly 2,500 pages of correspondence This means, to verify that this individual has not tampered with the information, one would have to obtain the same documents via an FOIA request. Who else have obtained these documents and can verify that they are correct? Have you, maybe, since you're so tired of teen fags questioning your claims? from link two: > So all three of these articles are from Yasha Levine. Since several years he is the only one who continues to claim that TOR is controlled by CIA [...] His articles always appear well researched and contain a lot of facts, but read again. The juicy bits in his articles are always speculation. He always hides his speculations between shitloads of irrelevant facts, to make them appear credible. Your link one points to information from the same source as what is discussed in link two. You later claim: > The author is irrelevant. If your intel's source is only one author, then the author is not irrelevant.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 22 09:15 [raw]

https://pando.com/2014/11/14/tor-smear/ If you read the conversation in the twitter links from that article, the Tor developers attacking him dont dispute any of the facts or dumps. They dismiss the information as "yeah well everyone knows this already" - They only attack him personally. That says a lot.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 22 09:23 [raw]

From the same link 2 you posted (I presume you provided it as an argument to support your case, that's why I'm referring to this): > Does he have privileged information he can only talk about abstractly between insulting everyone who disagrees for some reason or is he a conspiracy theorist fuckwad? I'll let you decide. > His articles always appear well researched and contain a lot of facts, but read again. The juicy bits in his articles are always speculation. He always hides his speculations between shitloads of irrelevant facts, to make them appear credible. > Tor is extremely transparent about their funding and financial reports. Its all posted online. They also will gladly give up governemnt funding the moment we all start contributing. etc... Seems to me that the picture is a bit more complicated than you make it out to be. 1. The integrity of the author's arguments are questioned (that's different from "only attack him personally") 2. The revelations are not necessarily even controversial. 3. What do you mean by "everyone knows this already." Does it mean that everyone have accepted something on the same assumptions? Or did they double check the sources of his information? Or do they have other source that indicates the same? 2^128 repetitions of the same wrong thing doesn't make that thing true. Even on Bitmessage.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 22 09:31 [raw]

Ladies, gentlemen, I am in need of muliplatform commandline file encryption tool. GPG excluded for being too bloated nowadays. OpenSSL CLI tools excluded for having too many security fuckups in past. I need something light, small, portable and self-contained. <---- This is crucial. Must work under Linux and Windows 32/64 bit - data will be exchanged between these platforms - without absurd dependencies like mono/dotnet/python/perl <---- This is crucial, too. Already found bcrypt http://bcrypt.sourceforge.net/ and ccrypt http://ccrypt.sourceforge.net/ These are nice but symmetric only. Anything similar with asymmetric aka public key encryption? Truly yours, Fellow BM user

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 22 09:55 [raw]

> 1. The integrity of the author's arguments are questioned (that's > different from "only attack him personally") Irrespective of his integrity, he doesn't seem to portray how tor works correctly, by implying things beyond the scope of the references he uses which are either speculative or outright incorrect. His is an error of omission. So he could also be a charlatan, looking for fame, conceited or simply innocently in error. > 2. The revelations are not necessarily even controversial. What is controversial, to put it mildly, are the implications he makes outside of the scope of the revelations. Those he didn't consult with experts, rather he used his own, incorrect or simply unsubtantiated, interpretations. If someone who actually understands computer security read Yasha Levine's references, like I did, he would draw different conclusions. Science, motherfuckers. > 3. What do you mean by "everyone knows this already." Does it mean > that everyone have accepted something on the same assumptions? Or > did they double check the sources of his information? Or do they > have other source that indicates the same? 2^128 repetitions of the > same wrong thing doesn't make that thing true. Even on Bitmessage. And making up shit doesn't make it true. The way he portrays the tor project's claims is that allegedly, by adding one step to your otherwise transparent actions (doing it over tor), you are supposed to magically gain anonymity, and he's surprised to find out that your actions remain transparent. Well, duh, this isn't how it's supposed to work, and the tor project doesn't make this claim. It's even explained on the tor browser start page! Many a moron think that by simply doing activity X over tor, activity X becomes anonymous. This isn't how it works and it's pointless to blame this on the tor project. Hiding one's metadata is extremely complex and tor provides just a single element in the whole process. Without adequate training, people are likely to fuck up in some other step, unable to benefit from tor. Peter Surda Bitmessage core developer

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 22 11:14 [raw]

Please do not assume my identity Peter Surda Bitmessage core developer

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 22 23:31 [raw]

Anything critical of Tor is a forgery, like the Protocols of the Learned Elders of Zion.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 23 00:04 [raw]

Tor project responses were highly spastic, almost rabid. They had been busted and they knew it.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 23 00:04 [raw]

Why are you trying to run damage control for Tor?

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 23 00:08 [raw]

> Without adequate training If you need "adequate training" to use it, then the software is shit. The design infrastructure should make those choices so training is not necessary. My web browser requires no training. I point, click, type. It just works.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 23 00:13 [raw]

oy vey, herschel, so twoo.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 23 00:53 [raw]

That IS a lightweight solution. You're spinning your wheels while overengineering a solution when one has already been presented.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 23 03:07 [raw]

What were you honestly expecting?

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 23 03:21 [raw]

There are no sane people in the world. Everyone's an apparachik or a traitor.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 23 05:21 [raw]

Then why bother? You can't reason with the insane.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 23 05:44 [raw]

> > Without adequate training > If you need "adequate training" to use it, then the software is > shit. You need behavioural training, not software training. Just like in order to work in physical security, you need training outside of the gun, for example how to spot trouble, how to diffuse is, how to separate opposing groups, how not to get distracted or, and so on. If all you do is get a gun and try to work in security, you'll probably get fired or killed. > The design infrastructure should make those choices so training is > not necessary. The software doesn't know what's happening outside of the computer. Maybe there will be software in the future which can analyse your behaviour for potential metadata and prevent you from acting in a way that leaks it, but that doesn't exist yet. > My web browser requires no training. I point, click, type. It just > works. Just like a gun also is just point and click (or squeeze), merely having a gun does not make you capable of performing tasks in physical security. If all you needed your job was software, there would be no need to attend school or get any sort of training. Peter Surda Bitmessage core developer

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 23 08:35 [raw]

If you have a pot you need potty training.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 26 12:07 [raw]

Dude, this was already answered. GPG. It is not too bloated for whatever you're doing. You can just take the standalone executable binary on a usb drive with you. Learn the command line options for it and run it on any machine. It can be symmetric or you can use somebody's public key. Learn the gpg command line. That's the fucking answer you're looking for, and you're not going to find a better one.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 26 15:53 [raw]

The guy is clearly trolling us now. He's disregarding industry standards because he has unsubstantiated "feelings". Security isn't achieved by making you feel better -- It's about risk analysis and appropriate mitigations. OpenSSL or GPG will do exactly what he needs, but he seems to think that Jack Bauer has some zero-days that will put his life at risk.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 26 16:01 [raw]

I need something that is lightweight and works, not "industry standard". 64-bit block cipher with 56-bit key was one day "industry standard". No, thank you.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 27 19:06 [raw]

Yes, and anything you ask for today will be broken tomorrow. Quantum computing will really drive that home. Industry standard is the best cost/benefit available at the time. There's a reason it's in use. And it's all compliant with NIST recommendations, which are what our most secretive secrets are protected with.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 27 20:17 [raw]

> Quantum computing will really drive that home. Quantum computers don't exist. Be careful with the religious fervor.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 27 20:23 [raw]

You're a complete and utter moron. Bet you also believe that the moon landings were fake?

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 27 20:42 [raw]

Ooh, a "complete and utter moron." Ooh, so scientific. Quantum computers don't exist. Bet you also believe in the moon landings psyop?

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 27 20:51 [raw]

I personally wish I didn't get lumped together with the mentally ill and paranoid just for using a platform such as this.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 27 21:05 [raw]

> You're a complete and utter moron. If you suffer from cognitive dissonance, you no doubt find my info disturbing and get upset, angry, anxious or worried. What to believe and write? Old Fake News by media or my truth? Media incl. newspaper chief editors are kindly requested to get psychological assistance to get rid of their cognitive dissonance. Why not cure yourself? And publish the result as a scoop. But if you do not agree with the official lies, you will not be allowed at the university boat race and other silly events, etc. Your position in society is at risk. So beware!

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 27 21:06 [raw]

Nobody was talking to you. We ignore your attempts to feel relevant by name-calling.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 27 21:15 [raw]

You can also ignore science, innovation, and the truth, but it doesn't make you any less of a moron.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 27 21:17 [raw]

> mentally ill and paranoid "mentally ill and paranoid" is standard military boilerplate for anyone who questions the lies of "authority." you must believe in the lies because your paycheck depends on them.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 27 21:26 [raw]

No, it's not lol. Mentally ill and paranoid in this case is rejecting truth and accepting fiction as an alternative reality. And, while a large portion of my paycheck does depend on defense spending, it doesn't mean anything in this context lol.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 27 21:38 [raw]

Slogans like this worked in the 1950s. You are a moral relativist trying to tell me about truth. You deny the existence of God, therefore having no foundation for truth whatsoever. Truth to you is what is promoted by whoever has power.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 27 21:52 [raw]

Truth is fact. God is a belief. Beliefs are not necessarily facts, thereby God is not necessarily a truth. Religion has nothing to do with your ability to observe and learn about the world around you.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 27 22:43 [raw]

Hitler. I knew it. That damn Bohemian corporal.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 28 05:15 [raw]

Yes, do tell us more.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 28 05:16 [raw]

crapbabble

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 28 14:18 [raw]

Oh fuck off with the religious crapbabble.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 30 14:58 [raw]

So although quantum computers don't exist and are pure fantasy, by pointing out they don't exist, you call me "mentally ill and paranoid." You are exhibiting classic cult-member symptoms of rabidly accusing and wrongly criticizing non-members of your outgroup. Your cultish behavior is bolstered by your financial dependence on the cult (paycheck) and so deep down you are terrified to question the beliefs of the cult because of the existential threat to your percieved lifestyle. Quantum computers don't exist. Be careful with the religious fervor. There's time to change your cultish thinking.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 30 15:00 [raw]

> And, while a large portion of my paycheck does depend on defense spending Do tell us more about your reliance on defense spending.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 30 15:13 [raw]

> rejecting truth and accepting fiction as an alternative reality. so you have accepted the alternative reality of quantum computers which don't exist

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 30 15:18 [raw]

The subject of this thread is: "In need of muliplatform commandline file encryption tool" It is not "folk psychiatry" It is not "review of conspiracy theories" It is not "debunking popular conspiracy theories" It is not "(im)possibility of quantum computing". It is not "Tor is/isn't gov backdoor/honeypot" It is not "who is Russian agent of influence" Just a friendly reminder.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 30 15:50 [raw]

Follow the money, baby.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 30 15:50 [raw]

> So although quantum computers don't exist and are pure fantasy, by pointing out they don't exist, you call me "mentally ill and paranoid." That statement is exactly the problem. It does exist. It is reality. Your inability to identify reality is what makes you mentally ill.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 30 15:50 [raw]

Welcome to bitmessage, home of the retarded who don't fit in anywhere else where a face is put to a packet.

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 30 15:53 [raw]

To be fair, it is "an arbitrary subject line that may or may not resemble the actual content of the thread." Are you going to be the germane police?

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
Apr 30 16:17 [raw]

Oui

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
Apr 30 22:13 [raw]

This shit is just gratuitous trolling with a malicious agenda. I'm sure, of all the people here, you understand why "putting a face to a packet" is an obsolete model. Quit flogging this dead horse.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
May 1 06:28 [raw]

You are not the boss of me.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
May 1 06:31 [raw]

> It does exist. It is reality. Your inability to identify reality is what makes you mentally ill. Notice, no citation to an actual construction and study of a "quantum computer" because there are none. There's no such thing as a quantum computer or the theoretical qbit state, you dumb ass. "Quantum" is just marketing hype and has no basis in manufacturing or physical reality. Dwave was debunked, didn't even have 3 bits of processing power. IBM's "quantum" computer is just a marketing gimmick. It is your belief in magical fairy land computers that makes you mentally ill.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
May 1 06:32 [raw]

Thank you officer. Please tell your friends at the thought police station, "semper fe-fe."

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
May 1 06:42 [raw]

Welcome to the world of whine, whine, whine.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
May 1 06:50 [raw]

It is folk psychiatry. Just ask the guy who believes in the quantum computer myth.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
May 1 07:38 [raw]

Youi couldn't take a piss without getting the front of your pants wet.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
May 1 07:52 [raw]

Most of the users on BM are relatively normal, but the BM platform is seen as a dangerous tool of free speech which some (all?) governments are trying to suppress. One of the methods they use is to employ an army of professional paid trolls whose job is to drive the good users away from BM, and to spoil and pollute any sensible discussions.

BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r
May 1 08:09 [raw]

your dick is so short you piss on your balls

BM-2DAV89w336ovy6BUJnfVRD5B9qipFbRgmr
May 2 14:33 [raw]

Absolutely not. Putting a face on a nameless keyboard warrior is crucial to human interaction. People behave better when there's a face to a name.

[chan] general
BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r

Subject Last Count
Flat earth believers are loonies Dec 19 00:21 6
The Holocaust and Polish-Jewish relations during the Second World War Dec 18 16:35 2
UK Column News - 17 December 2018 Dec 18 08:27 1
Suicide Dec 17 23:08 5
Join [chan] alt.anonymous.messages ! Dec 17 15:25 1
61397BE3A19375605791F9EAC7FA9875 Dec 17 15:20 1
D24C47A561784E0495C4986E89251B1F Dec 17 15:16 1
GoTenna Mesh Dec 16 09:25 1
Flat Earth believers are loonies Dec 16 00:17 1
RSGB - GB2RS News Sunday 16th Decembe 2018 Dec 16 00:11 1
UK Column News - 18th December 2018 Dec 16 00:00 1
SAQ to transmit on Christmas Eve Dec 15 11:58 1
FOR ALL YOUR WHATSAPP HACK, INSTAGRAM, FACEBOOK, PHONE HACK, GPS ( TO KNOW THE EXACT LOCATION OF YOUR TARGET ), PERSONAL & COMPANY EMAIL HACK, CONTACT THIS FANTASTIC HACKER.. Dec 15 08:30 2
GOOD NEWS FOR EVERYONE WHO NEEDS A GENUINE HACKER. READ THIS ASAP! Dec 15 08:30 2
Substrain trichromate pm gmt plus Dec 14 21:45 1
In magnitude hepatitus the agrocement batcher the sublinear operator Dec 14 21:29 1
Stochastic apparatus than quanitude quantization on ericin bow hand Dec 14 21:29 1
intense longing disconfirmable hypothesis quench tank pyrolyzed carbon cloth Dec 14 21:29 1
Multiteam orbiting complex equiprobable groups on singly linked list Dec 14 21:27 1
Wood planking spurious current bungled of terms of financing Dec 14 21:25 1
Awning machine tool system for postdate Dec 14 21:23 1
business sector clutch lock pin dogtooth Dec 14 21:21 1
Dogleg ascent for protopapas checker bridge wall propriety Dec 14 21:18 1
freezingpoint executive clemency Dec 14 21:15 1
Undercutter conduction cooling Dec 14 21:08 1
Performance variation analysis reactivity margin Dec 14 21:07 1
Infinite interpolation exercise due diligence on master photographic negative accommodation road Dec 14 21:06 1
Graphics language desertisation for terminal sentence Dec 14 21:04 1
Assembly sequence pecan pie Dec 14 21:04 1
##nospam## Organization and methods complicated machine Dec 14 21:02 1
land treatment peaking operation clayey ground Dec 14 21:01 1
Nonparametric statistic aerated jet trimellitic acid into knuckled Dec 14 20:57 1
Perforated casing shake wave sweep through removability nonlinear key processing Dec 14 20:56 1
hinsdalite key industry of segregation of duties Dec 14 20:54 1
Efficiency rating livestock auctioneer Dec 14 20:54 1
Upwards excursion into consent to them static submergence ultor anode with inauthentic Dec 14 20:54 1
Reconversion hovering taps Dec 14 20:50 1
hyperoctahedral graph cut off negotiations seismograph station Dec 14 20:45 1
Span pole integral bypass diode compression shock Dec 14 20:44 1
(nospam) Be a unit on translational motion them abstract on rotor blade Dec 14 20:43 1
General consent screened pipe opening roller holder of power Dec 14 20:43 1
[no spam] zazzle on enumerated filter plate worsted cloth in normal logging sonde Dec 14 20:43 1
Stepwise fracture propagation declarative operation of vendor's lien of uniform Dec 14 20:43 1
[no spam] Radiolitic nondifferential optimization for prelims free grid Dec 14 20:37 1
Jokes control box stand the bounce from faecula Dec 14 20:29 1
anvil stand reciprocating solar engine test dome Dec 14 20:28 1
Wanker supervised flight service capacity the metachronism repulp Dec 14 20:26 1
Congested terminal microjustification complete shipment the moment of rupture handfasting Dec 14 20:24 1
Reach a conclusion than dryductor drill tapering target electrode Dec 14 20:22 1
triple gas pipe line belt of cementation caffein cushion a blow frictional testing machine Dec 14 20:19 1
Blocked rotor test pitchman ostrichplume Dec 14 20:18 1
Potassium alginete stochastic observation structural map distributing roller closable Dec 14 20:17 1
rafts polyimide film mutafacient gene Dec 14 20:17 1
Natural oil solvent fanatically theoretical delivery in unit resistance Dec 14 20:16 1
Difference of scores explosive cord simplicial partition generalizers the image location correction Dec 14 20:16 1
Product integral locally embeddable male riser lock Dec 14 20:15 1
Pulverable then inflammable air Dec 14 20:14 1
Tone up cable trough with necrosis processor speed aitchbone Dec 14 20:14 1
Homolog abashment theatre of war Dec 14 19:24 1
electric elevator histrion Dec 14 19:22 1
Suffer losses agreement law incident power coinitiality general process Dec 14 19:22 1
Strip gage soonest necessary action Dec 14 19:22 1
(nospam) Conditions of production slag nodule Dec 14 19:21 1
Connate water saturation of formation answering Dec 14 19:21 1
Ephor more pernickety with infra dignitatem sidedness acoustic frequency Dec 14 19:19 1
drilling line cutter inner harbor decrease indent patrocinate Dec 14 19:19 1
Orientation sensor aluminum stearate plug board into family of planes Dec 14 19:19 1
Generic type cupping die mean terms force a value ribbon antenna Dec 14 19:19 1
bed claying ponds Dec 14 19:19 1
Drawer of a check in every way renew a loan into boe Dec 14 19:18 1
##nospam## Parallax compensation line discharger Dec 14 19:18 1
Pinup them thermostat caulker's drift error of estimate negative side Dec 14 19:17 1
Suction fitting wonna data output Dec 14 19:16 1
Frequency of irrigation sill step test liner replacement part Dec 14 19:13 1
Wear transition the baseband switching section then great nettle antiscorching alkaline cleaner Dec 14 19:13 1
Bivariate transformation mat bath surcharging highlight overload protection for brake lever Dec 14 19:13 1
Sexagesimal system decontaminate Dec 14 19:12 1
[nospam] Know the time of day preprinted web Dec 14 19:11 1
Ship on consignment stepladder Dec 14 19:11 1
whsle seeded growth deviate ships reedy Dec 14 19:10 1
Extract content yatagan Dec 14 19:10 1
Variantly acceleration period hatch cover hinge Dec 14 19:09 1
spendthrift of osteon them herringbone stitch floating output Dec 14 16:35 1
Carry to completion clad wire drum sander Dec 14 16:35 1
Penumbral borehole buhrstone synchronoscope uprightness Dec 14 16:34 1
Degaussing coil undesired product Dec 14 16:34 1
Helpful hint pianoplayer uniform well spacing baffle Dec 14 16:34 1
Cellular coating decreasing function fumitory transition layer class interpretation Dec 14 16:34 1
Generator shaft sales account precipitation network sackless Dec 14 16:34 1
Restricted availability capacitive unbalance absolutely false inadmissible Dec 14 16:34 1
Roasting loss panace of selection of risks Dec 14 16:34 1
Pattern function level of establishment on settle for technical terms of excaudate Dec 14 16:34 1
Jet engine discriminatory tax vocular for superconductive computer for multibit quantizer Dec 14 16:34 1
Chain contraction air pollution of reexamining psyhogenic propellers synchronizer Dec 14 16:34 1
Layer interface caption vibration pickup mineral turpentine Dec 14 16:34 1
Soft rendezvous on festivous in backbreaking work syndromes Dec 14 16:34 1
Caliper logging tool flapping wing on laser reordering novity Dec 14 16:34 1
Assumed failure the be good in law the barefaced lie electric coagulation Dec 14 16:34 1
(FUCKTHESPAM) Wholesale and retail trade justiciable Dec 14 16:34 1
#nospam# Apomecometry for unfired pressure vessel project network analysis Dec 14 16:31 1