In need of muliplatform commandline file encryption tool

BM-2cTeKLALNRzwuUr6UPqMTXqu6YnopPQTEq
Apr 17 18:20 [raw]

Ladies, gentlemen, I am in need of muliplatform commandline file encryption tool. GPG excluded for being too bloated nowadays. OpenSSL CLI tools excluded for having too many security fuckups in past. I need something light, small, portable and self-contained. <---- This is crucial. Must work under Linux and Windows 32/64 bit - data will be exchanged between these platforms - without absurd dependencies like mono/dotnet/python/perl <---- This is crucial, too. Already found bcrypt http://bcrypt.sourceforge.net/ and ccrypt http://ccrypt.sourceforge.net/ These are nice but symmetric only. Anything similar with asymmetric aka public key encryption? Truly yours, Fellow BM user

[chan] general
Apr 17 23:30 [raw]

It's all a bloated mess now. If you want minimalism you may have to program it yourself. Thankfully, there are minimalist crypto libraries. A modern one like https://monocypher.org/ might be a good place to start, but it's not been officially audited as of now.

[chan3] general
Apr 18 15:16 [raw]

> If you want minimalism you may have to program it yourself. DO NOT DO THIS. You will make a mistake and compromise your security.

BM-2cTeKLALNRzwuUr6UPqMTXqu6YnopPQTEq
Apr 18 15:34 [raw]

I know it and I won't do it. This is why I am asking for help here. I need minimal tool with trusted crypto-engine.

[chan] G3N3R@L
Apr 18 18:57 [raw]

don't listen to these fagmasons.

[chan] general
Apr 18 22:11 [raw]

You can do it, you just need to have trusted people review it. If no one ever did it, security software would never be made. Anyway there's a little CLI tool called AESCrypt that *might* be what your looking for. https://www.aescrypt.com/

[chan3] general
Apr 20 02:14 [raw]

I mean.. I wrote a CLI encryption tool myself, using Bitcoin public keys. It's completely shitty code and one of the first things I wrote, and I'm truly embarrased to show it because of how god-awful the code is.... but it does work. It's in Python though and requires PyCrypto and my own bitcoin library, so there are those dependencies. I suppose you could use something like PyInstaller or something to generate a single cli executable for various platforms and that would work. Anyway, here it is: https://github.com/maxweisspoker/bitcrypt If you can't compile it yourself and want me to try and compile it into a CLI for Linx/Mac and Windows I can do that for you. Obviously, you'd be trusting an executable from a stranger on the internet, but I will do it if you want me to.

[chan] general
Apr 20 02:22 [raw]

Do you have a private address or a broadcast address I could subscribe to?

[chan] general
Apr 20 02:45 [raw]

> Obviously, you'd be trusting an executable from a stranger on the internet Isn't Linux a pile of executables from strangers on the Internet?

[chan3] general
Apr 20 07:47 [raw]

You seem to have a lot of arbitrary requirements that point toward using either GnuPG or Openssl, yet discount them right out of the gate. Why? Nothing else out there is going to be as hardened as these. If you find some snowflake tool, you're just using something with holes that you don't know about. "security fuckups in the past" can also an indicator that software has been audited and holes fixed. If you want something light/small, it sounds like using GnuPG or Openssl simply for the core function of encrypting will suffice. Seriously, you'll be fine. Whatever problem you are trying to solve, just use either of these and move on. PS, don't use Bitcoin ECDSA keys to encrypt files. https://security.stackexchange.com/questions/99779/how-to-encrypt-with-ecdsa

[chan3] general
Apr 20 10:43 [raw]

------------------------------------------------------ Do you have a private address or a broadcast address I could subscribe to?

[chan3] general
Apr 20 12:54 [raw]

Not just Linux, most OS's. You're just not going to spend your days reading source code for literally everything, so you have to place your trust somewhere. And I'd rather trust my Linux install than most other things, especially given that I do read the source for a fair number of my programs before compilation.

[chan3] general
Apr 20 13:16 [raw]

To OP: Stop worrying and love the OTP.

[chan3] general
Apr 20 14:47 [raw]

I was going to wonder the same... why bitcoin keys? I mean, frankly, the key generation is the most difficult part and the thing most crucial to getting right. If you don't, the rest is automatically tainted. The rest, however, there are plenty of libraries for. And using BTC keys means you're openly and freely promoting key reuse out of the gate...

BM-2cTeKLALNRzwuUr6UPqMTXqu6YnopPQTEq
Apr 20 15:00 [raw]

I need small and simple tool and without long history of security holes. OpenSSL and GPG are not qualifying in these categories.

[chan] general
Apr 20 16:10 [raw]

What grandparent said. A bug-free past is no indication of a bug-free future. Often it's only an indication of insufficient peer review. Also, if you're planning to stick to standard formats, your choice of software shouldn't matter. You can use what's available now (probably OpenSSL) and sidegrade when practical.

[chan] general
Apr 21 03:08 [raw]

No, I run Gentoo. Binary distros suck.

[chan3] general
Apr 22 03:56 [raw]

And you read every line of source before you compile, and your hardware was made by you in your own machine shop...??? No? Well then you're trusting somebody too. Compiling from source does not add nearly as much security as you apparently think. The main benefit of a source idstro is a percent or two of speedup. That's it.

[chan] general
Apr 22 04:15 [raw]

It's not an on/off switch, it's a full mixing desk where you fine-tune the amount of trust that you place in each developer or group. You don't read every line of code, only those that matter to you. You don't recompile every single binary, but still avoid running unsigned binaries acquired through less trusted channels. You don't audit your hardware, but you may choose to buy it from a trusted supplier. And so on. Suum cuique, basically.

[chan3] general
Apr 22 05:46 [raw]

Safety in open source lies in a whole community of people reviewing the code. With many more or less independent people involved, mostly in transparent bug trackers and forums, it's that much harder to corrupt the process and sneak in evil lines of code.

[chan] general
Apr 22 06:37 [raw]

> Safety in open source lies in a whole community of people reviewing the code. Which does not happen 99% of the time since the number of applications is immense while the people with time to review code is very small. Thus your religion is false. Open source is not a guarantee of good code or of security. It's a myth. > it's that much harder to corrupt the process and sneak in evil lines of code. No, it's not much harder. It's much easier. In a corporate environment there is strict access control and LEGAL LIABILITY which does not constrain open source. Every time a corporation messes up and an exploit makes its way into the product, the highly expensive lawsuits come rolling in. When this happens with open source the developers ignore you and treat you with contempt. You are smoking dope to worship at the altar of open source. > With many more or less independent people involved You mean like all the CIA's handpicked directors at Tor Project? GTFOOH.

[chan3] general
Apr 22 07:10 [raw]

"You mean like all the CIA's handpicked directors at Tor Project?" Care to elaborate?

[chan] general
Apr 22 07:14 [raw]

Who do you think funded the development of TOR ? US Navy. Who do you think encourages it's use globally so that it can spy on dissidents easily ? CIA. Who do you think benefits from a compromised encryption tool like TOR ? NSA.

[chan3] general
Apr 22 07:15 [raw]

> Which does not happen 99% of the time since the number of applications is immense while the people with time to review code is very small. Thus your religion is false. Open source is not a guarantee of good code or of security. It's a myth. If by 99% you mean 99% of all open source projects ever started, you might even be optimistic. Noone is claiming that a project is good or secure just because it's open source. However, in a project that has widespread adoption and good traction, there will be more peer reviewers. > In a corporate environment there is strict access control and LEGAL LIABILITY which does not constrain open source. Every time a corporation messes up and an exploit makes its way into the product, the highly expensive lawsuits come rolling in. Yes. Thus in the pratice of your corporate religion it is customary to insulate these liabilities with never-ending rabbit holes of legalese and/or push liability further down the chain of shit storms. It's not so easy to litigate against some eventuality noone could reasonably foresee, which is the case we seem to be talking about here. However, within the regime of "stict access control" it is very possible and most likely tempting for corporations to cover up such breaches, and bring fire and brimstone upon the heads on anyone from the inside divulging such information. It wouldn't be too hard to find some recent examples of this, no? The opaque nature of corporations also make them quite compatible with government gag orders and backdoor requests. Ultimately, government can in effect just shut you down if they don't play ball. That can be a lot more expensive than a lawsuit game of tag, if money is your stake. > You mean like all the CIA's handpicked directors at Tor Project? GTFOOH. So from one example born of a rather dubious conspiracy theory, you disqualify all open source projects. I find that a rather fanatic standpoint.

[chan] general
Apr 22 07:21 [raw]

sure: >Internet privacy, funded by spooks: A brief history of the BBG https://pando.com/2015/03/01/internet-privacy-funded-by-spooks-a-brief-history-of-the-bbg/ >Almost Everyone Involved in Developing Tor was (or is) Funded by the US Government https://pando.com/2014/07/16/tor-spooks/ and the most damning IMO: >How leading Tor developers and advocates tried to smear me after I reported their US Government ties https://pando.com/2014/11/14/tor-smear/

[chan3] general
Apr 22 07:39 [raw]

This dude is a well know russian disinformant.

BM-2cVoDuuvXDzFKRmNXP7E8Nhnyyh6GLTCGJ
Apr 22 07:46 [raw]

here's a symmetric way to encrypt: openssl enc -aes-256-cbc -salt -in YOUR_RAW_FILE -out YOUR_ENCRYPTED_FILE -k SYMMETRIC_KEY openssl enc -aes-256-cbc -d -in YOUR_ENCRYPTED_FILE -out YOUR_RAW_FILE -k SYMMETRIC_KEY here's an asymmetric way to encrypt gpg --local-user YOURKEY --recipient THEIRKEY --output ENCRYPTED_FILE --encrypt RAW_FILE gpg --output RAW_FILE --decrypt ENCRYPTED_FILE And even if you DO read every line of code, you are also naively assuming that your ability to detect a vulnerability is infalliable. What you WANT to be using is a piece of software written by people smarter than you, whose work is reviewed and audited by other people smarter than you. This is vastly superior to new software with no history of problems, or old software which has sat around in disuse. And if you are smarter than the whole of the security community, and can find an exploit in either of those commands, the bounty 0-day for this could probably buy real estate.

[chan] general
Apr 22 07:52 [raw]

you have these poor leftie activists who don't realize the deep state has enlisted them as useful idiots to promote crypto-anarchism, which accomplishes nothing against the empire. body counts is how you accomplish something against an empire but the metrosexuals don't want to deal with the art of manliness.

[chan] general
Apr 22 07:54 [raw]

Emails between the CIA and Tor Project leaders were posted here recently. They were very damning. The leaders of Tor Project were asking the CIA to send them the CIA's handpicked agents to work as Tor directors. The fucking manfags and sissies just don't get reality. They're afraid to see they've been fucked and the resistance is actually lead by the empire.

[chan] general
Apr 22 07:54 [raw]

An email leaked from torproject went out on this general chan where Dingledine was asking the CIA for its choices for the board of directors. Did you miss it?

[chan] general
Apr 22 07:54 [raw]

And I suppose Tor Project's emails to the CIA are also Russian disinfo, by your reckoning?

[chan] general
Apr 22 07:54 [raw]

Standard CIA response.

[chan3] general
Apr 22 08:00 [raw]

I'm curious: How does one verify the authenticity of these emails?

[chan3] general
Apr 22 08:27 [raw]

No GPG, no SSL. I need lightweight solution,

[chan3] general
Apr 22 08:28 [raw]

Never saw it.

[chan] general
Apr 22 08:30 [raw]

The FOIA request number they were released under. But you didn't bother reading the emails to see that, did you? I am so tired of you teen fags trying to distract with bullshit. TOR is bullshit. It always was bullshit. It was a CIA cointel op from day one. OK, fag? Do you get it?

[chan3] general
Apr 22 08:30 [raw]

Yes, they are forgeries.

[chan] general
Apr 22 08:35 [raw]

Ooh, the russians. Blame every fuckup on them like a good useful idiot.

[chan3] general
Apr 22 08:37 [raw]

Don't let us teen fags provoke you too much. You will just end up with heart problems in the end. Then we teen fags will have won. Instead, how about sharing your wisdom with us teen fags by revealing how one correlates this "FOIA request number" with something that unambiguously authenticate the contents to which it points?

[chan] general
Apr 22 08:40 [raw]

exactly how the fuck are clear facts with sources disinfo? theres no hypothesis here

[chan] general
Apr 22 08:43 [raw]

You fail to question the nature of your reality, so you lash out against the enlightened. That is how you are one of the millions of useless idiots of the right. Too stupid to make a fortune on your own.

[chan3] general
Apr 22 08:44 [raw]

https://www.reddit.com/r/TOR/comments/4pw7bz/tor_infiltrated_by_cia_agent/

[chan3] general
Apr 22 08:44 [raw]

https://surveillancevalley.com/blog/tag:Tor%20Files

[chan] general
Apr 22 08:51 [raw]

LOL Yasha Levine.

[chan] general
Apr 22 08:54 [raw]

The author is irrelevant. The sources and information is what matters. And the Tor project's insane responses.

[chan3] general
Apr 22 09:01 [raw]

From link one: > I was able to obtain in 2015 via FOIA roughly 2,500 pages of correspondence This means, to verify that this individual has not tampered with the information, one would have to obtain the same documents via an FOIA request. Who else have obtained these documents and can verify that they are correct? Have you, maybe, since you're so tired of teen fags questioning your claims? from link two: > So all three of these articles are from Yasha Levine. Since several years he is the only one who continues to claim that TOR is controlled by CIA [...] His articles always appear well researched and contain a lot of facts, but read again. The juicy bits in his articles are always speculation. He always hides his speculations between shitloads of irrelevant facts, to make them appear credible. Your link one points to information from the same source as what is discussed in link two. You later claim: > The author is irrelevant. If your intel's source is only one author, then the author is not irrelevant.

[chan] general
Apr 22 09:15 [raw]

https://pando.com/2014/11/14/tor-smear/ If you read the conversation in the twitter links from that article, the Tor developers attacking him dont dispute any of the facts or dumps. They dismiss the information as "yeah well everyone knows this already" - They only attack him personally. That says a lot.

[chan3] general
Apr 22 09:23 [raw]

From the same link 2 you posted (I presume you provided it as an argument to support your case, that's why I'm referring to this): > Does he have privileged information he can only talk about abstractly between insulting everyone who disagrees for some reason or is he a conspiracy theorist fuckwad? I'll let you decide. > His articles always appear well researched and contain a lot of facts, but read again. The juicy bits in his articles are always speculation. He always hides his speculations between shitloads of irrelevant facts, to make them appear credible. > Tor is extremely transparent about their funding and financial reports. Its all posted online. They also will gladly give up governemnt funding the moment we all start contributing. etc... Seems to me that the picture is a bit more complicated than you make it out to be. 1. The integrity of the author's arguments are questioned (that's different from "only attack him personally") 2. The revelations are not necessarily even controversial. 3. What do you mean by "everyone knows this already." Does it mean that everyone have accepted something on the same assumptions? Or did they double check the sources of his information? Or do they have other source that indicates the same? 2^128 repetitions of the same wrong thing doesn't make that thing true. Even on Bitmessage.

[chan3] general
Apr 22 09:31 [raw]

Ladies, gentlemen, I am in need of muliplatform commandline file encryption tool. GPG excluded for being too bloated nowadays. OpenSSL CLI tools excluded for having too many security fuckups in past. I need something light, small, portable and self-contained. <---- This is crucial. Must work under Linux and Windows 32/64 bit - data will be exchanged between these platforms - without absurd dependencies like mono/dotnet/python/perl <---- This is crucial, too. Already found bcrypt http://bcrypt.sourceforge.net/ and ccrypt http://ccrypt.sourceforge.net/ These are nice but symmetric only. Anything similar with asymmetric aka public key encryption? Truly yours, Fellow BM user

[chan] general
Apr 22 09:55 [raw]

> 1. The integrity of the author's arguments are questioned (that's > different from "only attack him personally") Irrespective of his integrity, he doesn't seem to portray how tor works correctly, by implying things beyond the scope of the references he uses which are either speculative or outright incorrect. His is an error of omission. So he could also be a charlatan, looking for fame, conceited or simply innocently in error. > 2. The revelations are not necessarily even controversial. What is controversial, to put it mildly, are the implications he makes outside of the scope of the revelations. Those he didn't consult with experts, rather he used his own, incorrect or simply unsubtantiated, interpretations. If someone who actually understands computer security read Yasha Levine's references, like I did, he would draw different conclusions. Science, motherfuckers. > 3. What do you mean by "everyone knows this already." Does it mean > that everyone have accepted something on the same assumptions? Or > did they double check the sources of his information? Or do they > have other source that indicates the same? 2^128 repetitions of the > same wrong thing doesn't make that thing true. Even on Bitmessage. And making up shit doesn't make it true. The way he portrays the tor project's claims is that allegedly, by adding one step to your otherwise transparent actions (doing it over tor), you are supposed to magically gain anonymity, and he's surprised to find out that your actions remain transparent. Well, duh, this isn't how it's supposed to work, and the tor project doesn't make this claim. It's even explained on the tor browser start page! Many a moron think that by simply doing activity X over tor, activity X becomes anonymous. This isn't how it works and it's pointless to blame this on the tor project. Hiding one's metadata is extremely complex and tor provides just a single element in the whole process. Without adequate training, people are likely to fuck up in some other step, unable to benefit from tor. Peter Surda Bitmessage core developer

[chan3] general
Apr 22 11:14 [raw]

Please do not assume my identity Peter Surda Bitmessage core developer

[chan] general
Apr 22 23:31 [raw]

Anything critical of Tor is a forgery, like the Protocols of the Learned Elders of Zion.

[chan] general
Apr 23 00:04 [raw]

Tor project responses were highly spastic, almost rabid. They had been busted and they knew it.

[chan] general
Apr 23 00:04 [raw]

Why are you trying to run damage control for Tor?

[chan] general
Apr 23 00:08 [raw]

> Without adequate training If you need "adequate training" to use it, then the software is shit. The design infrastructure should make those choices so training is not necessary. My web browser requires no training. I point, click, type. It just works.

[chan] general
Apr 23 00:13 [raw]

oy vey, herschel, so twoo.

[chan3] general
Apr 23 00:53 [raw]

That IS a lightweight solution. You're spinning your wheels while overengineering a solution when one has already been presented.

[chan] general
Apr 23 03:07 [raw]

What were you honestly expecting?

[chan] general
Apr 23 03:21 [raw]

There are no sane people in the world. Everyone's an apparachik or a traitor.

[chan] general
Apr 23 05:21 [raw]

Then why bother? You can't reason with the insane.

[chan] general
Apr 23 05:44 [raw]

> > Without adequate training > If you need "adequate training" to use it, then the software is > shit. You need behavioural training, not software training. Just like in order to work in physical security, you need training outside of the gun, for example how to spot trouble, how to diffuse is, how to separate opposing groups, how not to get distracted or, and so on. If all you do is get a gun and try to work in security, you'll probably get fired or killed. > The design infrastructure should make those choices so training is > not necessary. The software doesn't know what's happening outside of the computer. Maybe there will be software in the future which can analyse your behaviour for potential metadata and prevent you from acting in a way that leaks it, but that doesn't exist yet. > My web browser requires no training. I point, click, type. It just > works. Just like a gun also is just point and click (or squeeze), merely having a gun does not make you capable of performing tasks in physical security. If all you needed your job was software, there would be no need to attend school or get any sort of training. Peter Surda Bitmessage core developer

[chan] general
Apr 23 08:35 [raw]

If you have a pot you need potty training.

[chan3] general
Apr 26 12:07 [raw]

Dude, this was already answered. GPG. It is not too bloated for whatever you're doing. You can just take the standalone executable binary on a usb drive with you. Learn the command line options for it and run it on any machine. It can be symmetric or you can use somebody's public key. Learn the gpg command line. That's the fucking answer you're looking for, and you're not going to find a better one.

[chan3] general
Apr 26 15:53 [raw]

The guy is clearly trolling us now. He's disregarding industry standards because he has unsubstantiated "feelings". Security isn't achieved by making you feel better -- It's about risk analysis and appropriate mitigations. OpenSSL or GPG will do exactly what he needs, but he seems to think that Jack Bauer has some zero-days that will put his life at risk.

[chan3] general
Apr 26 16:01 [raw]

I need something that is lightweight and works, not "industry standard". 64-bit block cipher with 56-bit key was one day "industry standard". No, thank you.

[chan3] general
Apr 27 19:06 [raw]

Yes, and anything you ask for today will be broken tomorrow. Quantum computing will really drive that home. Industry standard is the best cost/benefit available at the time. There's a reason it's in use. And it's all compliant with NIST recommendations, which are what our most secretive secrets are protected with.

[chan] general
Apr 27 20:17 [raw]

> Quantum computing will really drive that home. Quantum computers don't exist. Be careful with the religious fervor.

[chan3] general
Apr 27 20:23 [raw]

You're a complete and utter moron. Bet you also believe that the moon landings were fake?

[chan] general
Apr 27 20:42 [raw]

Ooh, a "complete and utter moron." Ooh, so scientific. Quantum computers don't exist. Bet you also believe in the moon landings psyop?

[chan3] general
Apr 27 20:51 [raw]

I personally wish I didn't get lumped together with the mentally ill and paranoid just for using a platform such as this.

[chan] general
Apr 27 21:05 [raw]

> You're a complete and utter moron. If you suffer from cognitive dissonance, you no doubt find my info disturbing and get upset, angry, anxious or worried. What to believe and write? Old Fake News by media or my truth? Media incl. newspaper chief editors are kindly requested to get psychological assistance to get rid of their cognitive dissonance. Why not cure yourself? And publish the result as a scoop. But if you do not agree with the official lies, you will not be allowed at the university boat race and other silly events, etc. Your position in society is at risk. So beware!

[chan] general
Apr 27 21:06 [raw]

Nobody was talking to you. We ignore your attempts to feel relevant by name-calling.

[chan3] general
Apr 27 21:15 [raw]

You can also ignore science, innovation, and the truth, but it doesn't make you any less of a moron.

[chan] general
Apr 27 21:17 [raw]

> mentally ill and paranoid "mentally ill and paranoid" is standard military boilerplate for anyone who questions the lies of "authority." you must believe in the lies because your paycheck depends on them.

[chan3] general
Apr 27 21:26 [raw]

No, it's not lol. Mentally ill and paranoid in this case is rejecting truth and accepting fiction as an alternative reality. And, while a large portion of my paycheck does depend on defense spending, it doesn't mean anything in this context lol.

[chan] general
Apr 27 21:38 [raw]

Slogans like this worked in the 1950s. You are a moral relativist trying to tell me about truth. You deny the existence of God, therefore having no foundation for truth whatsoever. Truth to you is what is promoted by whoever has power.

[chan3] general
Apr 27 21:52 [raw]

Truth is fact. God is a belief. Beliefs are not necessarily facts, thereby God is not necessarily a truth. Religion has nothing to do with your ability to observe and learn about the world around you.

[chan] general
Apr 27 22:43 [raw]

Hitler. I knew it. That damn Bohemian corporal.

[chan] general
Apr 28 05:15 [raw]

Yes, do tell us more.

[chan] general
Apr 28 05:16 [raw]

crapbabble

[chan] general
Apr 28 14:18 [raw]

Oh fuck off with the religious crapbabble.

[chan] general
Apr 30 14:58 [raw]

So although quantum computers don't exist and are pure fantasy, by pointing out they don't exist, you call me "mentally ill and paranoid." You are exhibiting classic cult-member symptoms of rabidly accusing and wrongly criticizing non-members of your outgroup. Your cultish behavior is bolstered by your financial dependence on the cult (paycheck) and so deep down you are terrified to question the beliefs of the cult because of the existential threat to your percieved lifestyle. Quantum computers don't exist. Be careful with the religious fervor. There's time to change your cultish thinking.

[chan] general
Apr 30 15:00 [raw]

> And, while a large portion of my paycheck does depend on defense spending Do tell us more about your reliance on defense spending.

[chan] general
Apr 30 15:13 [raw]

> rejecting truth and accepting fiction as an alternative reality. so you have accepted the alternative reality of quantum computers which don't exist

[chan3] general
Apr 30 15:18 [raw]

The subject of this thread is: "In need of muliplatform commandline file encryption tool" It is not "folk psychiatry" It is not "review of conspiracy theories" It is not "debunking popular conspiracy theories" It is not "(im)possibility of quantum computing". It is not "Tor is/isn't gov backdoor/honeypot" It is not "who is Russian agent of influence" Just a friendly reminder.

[chan3] general
Apr 30 15:50 [raw]

Follow the money, baby.

[chan3] general
Apr 30 15:50 [raw]

> So although quantum computers don't exist and are pure fantasy, by pointing out they don't exist, you call me "mentally ill and paranoid." That statement is exactly the problem. It does exist. It is reality. Your inability to identify reality is what makes you mentally ill.

[chan3] general
Apr 30 15:50 [raw]

Welcome to bitmessage, home of the retarded who don't fit in anywhere else where a face is put to a packet.

[chan3] general
Apr 30 15:53 [raw]

To be fair, it is "an arbitrary subject line that may or may not resemble the actual content of the thread." Are you going to be the germane police?

[chan3] general
Apr 30 16:17 [raw]

Oui

[chan] general
Apr 30 22:13 [raw]

This shit is just gratuitous trolling with a malicious agenda. I'm sure, of all the people here, you understand why "putting a face to a packet" is an obsolete model. Quit flogging this dead horse.

[chan] general
May 1 06:28 [raw]

You are not the boss of me.

[chan] general
May 1 06:31 [raw]

> It does exist. It is reality. Your inability to identify reality is what makes you mentally ill. Notice, no citation to an actual construction and study of a "quantum computer" because there are none. There's no such thing as a quantum computer or the theoretical qbit state, you dumb ass. "Quantum" is just marketing hype and has no basis in manufacturing or physical reality. Dwave was debunked, didn't even have 3 bits of processing power. IBM's "quantum" computer is just a marketing gimmick. It is your belief in magical fairy land computers that makes you mentally ill.

[chan] general
May 1 06:32 [raw]

Thank you officer. Please tell your friends at the thought police station, "semper fe-fe."

[chan] general
May 1 06:42 [raw]

Welcome to the world of whine, whine, whine.

[chan] general
May 1 06:50 [raw]

It is folk psychiatry. Just ask the guy who believes in the quantum computer myth.

[chan] general
May 1 07:38 [raw]

Youi couldn't take a piss without getting the front of your pants wet.

[chan] general
May 1 07:52 [raw]

Most of the users on BM are relatively normal, but the BM platform is seen as a dangerous tool of free speech which some (all?) governments are trying to suppress. One of the methods they use is to employ an army of professional paid trolls whose job is to drive the good users away from BM, and to spoil and pollute any sensible discussions.

[chan] general
May 1 08:09 [raw]

your dick is so short you piss on your balls

[chan3] general
May 2 14:33 [raw]

Absolutely not. Putting a face on a nameless keyboard warrior is crucial to human interaction. People behave better when there's a face to a name.

[chan3] general
May 2 14:34 [raw]

Those governments don't give a fuck about BM. The userbase is too small to worry about. Nobody is paying anybody to troll BM. It just attracts natural trolls. That's what happens when it's totally anonymous.

[chan3] general
May 2 14:35 [raw]

I would think about it, but you have already decided to preemptively attempt to discredit it before giving anybody the opportunity.

[chan] NSA
May 2 14:44 [raw]

NSA here. Sir, we do give a fuck about BM. To be honest, we are worried about its increasing inception among cybercrime tools. We identified at least few botnets using BM protocol plugins to communicate with their C&Cs. We are also aware that BM was and is used by few dangerous militant groups with strong ties to Kremlin-sponsored Nazi organizations. Also, in BM public chans space, NSA is not involved into any disruptive antisocial activities, known as trolling. We can confirm however, that certain state-level groups of interest are using BM public space to spread disinformaton and propaganda. For example so called "Pizzagate" and "Assange is dead" memetic constructs were part of directed psychological attack against US citizens. There was also organized provocation against few individuals posing as so called "Cryptoanarchists" related to specific legal problems of mentioned individuals. With regard to all of the above, please stay safe by using critical thinking and diverse sources of confirmable information.

[chan3] general
May 2 17:44 [raw]

Fake NSA isn't NSA. State threat actors don't give a flying fuck about the minority here. There'd be no value in disinformation campaigns that only reach hundreds.

[chan3] general
May 2 19:29 [raw]

Disinformation is not about the numbers, dude. Allies took a great effor to influence with specially crafted disinformation mind of the single man: Adolf Hitler. I am not saying Hitler is on BM. I am saying there are people here worth influencing for state actors.

[chan] general
May 3 04:56 [raw]

> Most of the users on BM are relatively normal What rock have you been hiding under? "normal" my ass. > BM platform is seen as a dangerous tool of free speech By whom? proof? you got none. And out of all ten people who use BM, I'm sure they're all considered a threat to state security somewhere in your mind. > ome (all?) governments are trying to suppress. You can't even say which governments are supposedly suppressing bitmessage, but you're sure they are.

[chan] general
May 3 04:56 [raw]

i need roller skates to avoid road rash

[chan] general
May 3 05:25 [raw]

Hey NSA: How do you know your front line analysts and moles aren't being targeted with propaganda from your superiors? You are highly compartmentalized.

[chan] general
May 3 05:25 [raw]

You could put your face on a dangling meaty cowbell. That would be a human interaction.

[chan] general
May 3 06:01 [raw]

> People behave better when there's a face to a name. I disagree. Persistent identity is a precursor to coercion. If your purpose is to coerce people into behaving to your expectation, by all means dox them. If your purpose is to achieve the maximum potential out of people (for good or bad), strip the persistent identity information from their actions and let the results stand up on their own merit. Only when people stop giving a fuck about externally inflicted persecution, they can start giving a fuck about what really matters. Think about this the next time someone asks for your "real name".

[chan] general
May 3 07:29 [raw]

How likely is it that someone from the real NSA would be posting on Bitmessage?

[chan] general
May 3 07:54 [raw]

> How likely is it that someone from the real NSA would be posting on Bitmessage? Actually, very likely. A couple of them have contacted me personally in response to articles I wrote on an intelligence thread. I ask for a job, they say, "we will watch, don't ask us, we'll ask you." NSA is not what you think it is and they are not spying on low-profile U.S. Citizens. They are spying on people they are authorized by law to surveil, which occasionally includes a U.S. person of interest. If you are undermining U.S. treaties or security, they will have wiretap warrant on you very fast and hoover all your data. Snowden is not a hero. He is working to undermine American faith in their government as Britain, Russian, and Rome have done for over a century and a half.

[chan] general
May 3 07:59 [raw]

I wouldn't even know what model to use to assess this likelihood. Let's try Occam's razor. NSA employees are generally required to keep their employment secret outside of their first-degree circle. To put it another way, everybody is allowed to use the words "NSA here" in public, EXCEPT NSA employees. No bomb jokes at the airport. Opening a message with "NSA here" can indicate one of two situations: 1) Misbehaving NSA employee, intentionally violating NSA's security guidelines 2) Not an NSA employee and not even aware of NSA's security guidelines Occam's razor says 2), as it makes the fewest assumptions. Hey "NSA here", care to comment?

[chan] general
May 3 08:07 [raw]

"Wannabe NSA here"

[chan] general
May 3 09:29 [raw]

> NSA employees are generally required to keep their employment secret outside of their first-degree circle Not true at all. You can find NSA employees all over facebook and social media, linkedin, etc. You live in some cypherpunk dreamworld. What is a first-degree circle? It sounds like something out of a dime spy novel. The only thing NSA employees are required to keep secret are the project information. Less than 10% of NSA employees are ever involved in undercover / clandestine operations, and of course, these ones would keep their employment secret by having a cover of fake employment, and generally will already have years of experience in clandestine military or police operations before being hired by NSA. Most NSA employees are analysts, technicians, interceptors, signal analysts, hackers, policy wonks, etc. that have no reason to keep their employment secret, and they don't keep it secret. So the setup for your Occam's razor is flawed, based on a false assumption. NSA has analysts monitoring all forms of internet communication, radio communication, telephone communication, to find interesting vectors for useful intelligence. In a totally anonymous sphere they would occasionally announce themselves as NSA, and in a large enough vector they wouldn't even care if you knew their actual identity because it would not be possible for you to discern what intelligence their aiming at. When the NSA guys came to give speeches at blackhat and other hacker conferences, the speeches were probably a cover for the real operation of the day--about two dozen undercover NSA agents in the crowd, mingling, gathering information about the crowd of attendees--not just in the conference room, but in the whole building, the hotel, the eateries attendees flock to, and so on. So the fool in the back that shouts at the NSA director, "liar, war criminal," blah, blah, doesn't realize the NSA Director is the decoy for his operators to go unnoticed in the crowd, to get people talking about the NSA, and for the agents in the crowd to take notice of who is most fearful or hostile--prime targets for targeted intelligence gathering. If I were a military or intelligence chieftain, I would go nowhere without plainclothes surveillance agents to do field analysis on everyone's chatter and reactions, to see if we could tap a ratline to the opposition.

[chan] general
May 3 09:47 [raw]

It is true, according to the NSA Security Guidelines Handbook. If you mean you can find a lot of "NSA here" people everywhere, that may be true, but is not what I meant. First-degree of separation is family and friends. My use of the term is an artifact of English as second language, nothing to do with spy novels.

[chan] NSA
May 3 10:11 [raw]

NSA here. It was already explained here, sir: Bitmessage gives us an option of plausible deniability. Our messages cannot be proven to be bogus nor legit. Yet the important message can be spread. Think about it as unofficial channel.

[chan] general
May 4 07:18 [raw]

> It does exist. It is reality. Your inability to identify reality is what makes you mentally ill. This is the same tactic the Soviets used against anyone who dissented from party opinion. They would accuse the dissident of "mental illness" then lock him in a gulag. You are trying to medicalize dissent because you don't have truth on your side. Basically you are a liar.

[chan3] general
May 4 23:08 [raw]

And identifying themselves as such? 0.

[chan3] general
May 4 23:12 [raw]

And anonymous comms are supposed to prove they're here? P.S. The NSA publicly posts job openings.

[chan3] general
May 4 23:18 [raw]

And basically you're paranoid.

[chan] general
May 5 00:35 [raw]

even more medicalizing dissent, liar

[chan] general
May 5 00:46 [raw]

there are drawbacks to great genius one must be aware of all the dolts around him nipping at his heels and yapping "come back to the darkness, we like it here, come play in our poo and woo!"

[chan] general
May 7 23:21 [raw]

> There'd be no value in disinformation campaigns that only reach hundreds. Hundreds? I'd put money on the bet there are less than a dozen people who use the public Bitmessage chans.

[chan] general
May 14 06:55 [raw]

i put money on u being a stupid faggot and that beamstat.com BM mirror has more than 12 unique visitors

[chan] Monero
May 14 11:10 [raw]

Put a sock in it you pubescent sped.

[chan] general
BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r

Subject Last Count
24CB6B60E37A4A773EF3FBACDE813743 Jun 25 12:36 1
So-called "hacktivists" play an unwitting role in helping the NSA Jun 25 12:18 18
gonk Jun 25 04:37 1
How to use chan alt.anonymous.messages Jun 25 04:37 5
Three balloons go up on Thursday Jun 24 07:08 51
Testing the DML concept Jun 23 19:03 1
testing DML Jun 23 19:01 4
Why is Tor not enough for Deep Web Anonymity? Jun 23 18:08 1
How to Legally Accept a Drug Package as Per Police and Prosecutors Jun 23 18:08 1
Someone please help me Jun 23 15:44 2
Reminder Jun 23 11:53 2
UK Column News - 22nd June 2018 Jun 23 08:05 4
Flat Earth PROOF | Not a joke. Low IQ NOT required! Jun 22 19:56 4
Curtis Keyer inventor goes SK Jun 22 17:50 1
ITU chief declares Z6 prefix illegal Jun 22 17:47 1
Torrent trackers list, one per line. Jun 22 17:35 11
UK Column News - 21st June 2018 Jun 21 19:25 1
How to detect emulator or virtual machine from DOS? Jun 21 15:28 1
UK Column News - 20th June 2018 Jun 21 06:11 3
Bitmessage Security Test: ZWD attempt Jun 20 13:44 2
YES !! Man Hacks Employer To Death Over UG-$250,000 Jun 20 13:44 2
UK Column News - 19th June 2018 Jun 20 06:19 2
C575032EBE4B4872E938D61CFEC4E98C Jun 19 16:46 1
Plane sailing Jun 19 14:35 7
Самое педерастическое и лживое место в БМ это каналы серии ru.politics, ru.alt.politics, ru.alt-1.politics по ru.alt-... .politics Jun 19 05:24 6
Україна под усе Jun 19 04:32 1
UK Column News - today Jun 18 19:11 1
UK Column News - 18th June 2018 Jun 18 17:22 2
0705EBC1F49EC58DD57FC3D919FF4085 Jun 18 12:52 1
Binsend 1.2 has been released Jun 18 03:21 32
Pieces of Polish Tu154M wreckage stored in Smolensk disappear one by one Jun 17 20:45 3
"How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID" Jun 17 16:41 1
Companies founded by 8200 Jun 17 16:20 1
play with it Jun 17 09:09 1
touch it Jun 17 08:50 1
TRYLEHAT Jun 16 16:18 1
RBN adds FT8 spots Jun 16 12:57 1
71CEF0D49B55B37841B12FC44589D6E2 Jun 16 12:42 1
RetroShare channels / friends Jun 16 08:27 8
UK Column News - 15th June 2018 Jun 16 07:19 2
Україна понад усе Jun 16 06:57 5
Ascii85 Test Jun 16 06:55 17
Intelligent discussion? Jun 15 19:30 9
Корабль обреченных идиотов Jun 15 06:41 1
The Transgender Assualt on the Creator of JavaScript Jun 15 04:35 3
Does Torchat still work? Jun 15 04:35 5
Boer Genocide Jun 14 19:05 8
Can somebody explain this strange Tox ban at ImageFap? Jun 14 18:26 3
5BA656884AC10D8316CEEFCEDC70A75E Jun 14 17:41 1
UK Column News - 14th June 2018 Jun 14 16:31 2
cute pose Jun 14 16:27 1
Free Bitcoins!!! Jun 14 16:10 2
South Africans get 100kHz on 60m Jun 14 15:41 1
necklace Jun 14 14:54 2
(no subject) Jun 14 14:41 193
Test multi addr Jun 14 13:27 9
UK Column News - 13th June 2018 Jun 14 06:58 1
dripping wet Jun 13 22:47 3
New BinSend Version is out Jun 13 22:04 6
Kissing Daddy Goodnight Jun 13 21:25 2
Самое педерастическое и лживое место в БМ это каналы ru.politics и ru.alt.politics => The most fucking-gay and false place in BM is the channels ru.politic Jun 13 16:28 1
Naked teen girl Jun 13 13:14 3
Самое педерастическое и лживое место в БМ это каналы ru.politics и ru.alt.politics Jun 13 12:07 1
Самое педерастическое и лживое место в БМ это канал ru.politics Jun 13 10:04 1
UK Column News - 12th June 2018 Jun 13 07:25 1
Do you know any strange Japanese customs? Jun 12 22:00 6
ИНСАЙД (Re: Повышенное Внмниe!) Jun 12 19:16 1
Повышенное Внмниe! Jun 12 19:10 2
The Slashdot front page looks rather depressing right now Jun 12 15:46 1
UK Column News - 11th June 2018 Jun 12 14:40 2
EBF15A85D1E97B79C328396CB99B4649 Jun 12 14:40 1
New ebooks June 10 2018 Jun 12 05:48 2
Graf Archive - Star Wars digital preservation project Jun 11 21:36 1
UK Column News - 7th June 2018 Jun 11 17:48 4
http://falkvinge.net/2012/09/07/three-reasons-child-porn-must-be-re-legalized-in-the-coming-decade/ Jun 11 07:17 3
miniLock Jun 11 07:11 3
So many people asked for citizenship LOL Jun 10 11:45 1
YES !! Man Hacks Employer To Death Over UG-$250,000 Jun 10 06:43 4
Spam filter Jun 9 16:30 11
9402B060FDC6D2F5FA27735751454E78 Jun 9 12:36 1
fast encryption/decryption routine using group summing method Jun 9 10:59 1
NSA doesn't joke, folks Jun 9 10:48 1
D5FBAF8FF8A4645D935B1C0ED56E2879 Jun 9 09:02 1
D1CD16414993436D7300E7AECBEA0719 Jun 9 09:01 1
Bitmessage is slow Jun 9 00:21 14
Chan dead? Jun 8 23:33 4
EFAIL?! Jun 8 23:23 1
UK Column News - 8th June 2018 Jun 8 21:08 2
sun hat Jun 8 19:32 4
76B272B54C8779061595BC726C179D8A Jun 8 16:59 1
hacker for hire Jun 8 00:30 5
Binsend Jun 7 22:37 2
A70361EDD36261292031F5EBCF8DE12A Jun 7 16:41 1
Base64 encoding test Jun 7 16:31 1
New channel for portuguese speakers Jun 7 13:32 1
Information about Wednesday's broadcast Jun 6 16:43 2
6AF9BBE3A2E5FDC545AFF80573AB54FA Jun 6 16:10 25
Please post Binsend.exe Jun 6 12:00 4
7969BD8C7412749F83C7FFAA439922DE Jun 6 10:39 1
Others BitMessage software Jun 6 10:17 2