Privacy Guide Thread

Joined
May 26, 2023
Messages
8
Reaction score
-14
Protect your data from glowfriends!
1685115857309.png


This thread will include all kinds of services and guides to protect your privacy against dajjal zionist cia nigger psyop.



Before I begin, Make sure that all of the advises included here are just recommendations, if you don't care about your data being stolen from glowies then you can freely ignore this thread. It is only recommended for those who want actual privacy.



I do not recommend using winglows because it steals your data by using Telemetry, Ads, Trackers, Location Services and all other shits they say in their privacy policy so they can improve their Cia backdoor spyware "services" for whatever reason. Note that all of the anti-spyware apps you see online are just fed honeypot. Nothing can generally stop winglows spyware unless you switch to linux or anything that is free and open source.
Recommended Operating Systems (GNU/Linux Distribution): Xubuntu, Kubuntu, Linux Mint, Debian, EndeavourOS and any distros that suits you. Linux is FOSS. (except ubuntu since it uses amazon telemetry)

100% FOSS GNU/Linux Distributions: Trisquel (I use trisquel and mint), Parabola Linux, PureOS, Hyperbola Linux.

Systemd-free Distros (systemd leaks your DNS queries which can be bad for your privacy sometimes and most distros use it): Devuan, MXLinux, Artix Linux, Slackware, Void Linux, Gentoo, Puppy Linux.

THE HOLIEST OPERATING SYSTEM: TEMPLEOS (100% RECOMMENDED)


Note: I do not recommend you to switch to linux immediately since it is very complicated and confusing for newbies that used winglows all the time. I suggest looking at tutorials and guides. This way you can get familiar with linux's package managers, distributions, customizations, configuration, desktop environment. As for 100% free gnu/linux distros, most distros use proprietary firmware's like intel for example because it is closed-source and it is basically fucking CIA backdoor. It allows remote control so they can control your pc as long as your pc has electricity. 100% free gnu/llinux distros disables it by default, and you will not be able to connect to the network but that's not a problem, you can buy an external wifi adapter which is extremely cheap for your laptop or desktop just plug the wifi adapter usb and your good to go.


Just a reminder that anything that is free and open-source is what is important for your privacy. Use FOSS Apps only if you want real privacy. Don't worry about compatibility, You can search for FOSS alternatives and they will give you the best Apps. (example Adobe photoshop is proprietary, Replace that with GIMP which is 100% FOSS and much better than photoshit)


Recommended VPN/Network Services: Mullvad VPN, Tor (Most tor nodes are CIA honeypot but it's powerful), Browsec VPN, Libreswan, Proton VPN.


Recommended Firewall/File managers: Safing Portmaster, Bleachbit, Ranger.


Recommended Office Productivity: Libreoffice.


Recommended Image/Video/Audio editing: GIMP. Kdenlive, Audacity, Inkscape.


Recommended Video/Music Player: VLC.


Recommended chatting/message client platforms: Element, Signal Messenger, Telegram, Session, Pidgin.


Recommended E-Mail services: Self-hosted email (costs money). If you are a broke nigga then use tutanota. Protonmail is basically CIA but in switzerland.


Recommended Web Browsers: GNU Icecat, Librewolf, Firefox with anti-telemetry user configuration (firefox enables telemetry by default in the user config)


Recommended BIOS: Libreboot


Recommended Social Media/RSS Readers: Odysee, Peertube, Dispora*, Some random Forum whose UI is not updated since 1999, QuiteRSS, RavenRSS.


Recommended torrent clients: Qbitorrent


Recommended search engines: Duckduckgo, Swisscows, Searx (the best one so far), Yandex.





In this list I'm gonna put all the sources on where I got these information from. And random suggested websites to learn more about privacy.

The original Hidden Wiki (Only accessible by tor: http://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion/wiki/index.php/Main_Page)
Mental Outlaw (on YT)
Luke Smith (basically a hypocrite but generally gives the best advice)
itsfoss.com
Some random Technology Forum/Imageboard
pdfdrive.com
eff.org
Z-library (for books and education)

End.


Proprietary software tends to have malicious features. The point is with a proprietary program, when the users dont have the source code, we can never tell. So you must consider every proprietary program as potential malware.-Richard Stallman

If you have any questions or suggestions feel free to reply. Have a nice day.
 

chuj

a regular degenerate; lowest of the low
Joined
Jul 8, 2020
Messages
4,821
Reaction score
15,091
op is hiding child porn on his computer there is no other explanation for this autism
 

Quence

Gay man
Joined
May 13, 2020
Messages
6,786
Reaction score
-42,334
Millions of PC motherboards were sold with a firmware backdoor



Hiding malicious programs in a computer’s UEFI firmware, the deep-seated code that tells a PC how to load its operating system, has become an insidious trick in the toolkit of stealthy hackers. But when a motherboard manufacturer installs its own hidden backdoor in the firmware of millions of computers—and doesn’t even put a proper lock on that hidden back entrance—they’re practically doing hackers’ work for them.

Researchers at firmware-focused cybersecurity company Eclypsium revealed today that they’ve discovered a hidden mechanism in the firmware of motherboards sold by the Taiwanese manufacturer Gigabyte, whose components are commonly used in gaming PCs and other high-performance computers. Whenever a computer with the affected Gigabyte motherboard restarts, Eclypsium found, code within the motherboard’s firmware invisibly initiates an updater program that runs on the computer and in turn downloads and executes another piece of software.

While Eclypsium says the hidden code is meant to be an innocuous tool to keep the motherboard’s firmware updated, researchers found that it’s implemented insecurely, potentially allowing the mechanism to be hijacked and used to install malware instead of Gigabyte’s intended program. And because the updater program is triggered from the computer’s firmware, outside its operating system, it’s tough for users to remove or even discover.

“If you have one of these machines, you have to worry about the fact that it’s basically grabbing something from the Internet and running it without you being involved, and hasn’t done any of this securely,” says John Loucaides, who leads strategy and research at Eclypsium. “The concept of going underneath the end user and taking over their machine doesn’t sit well with most people.”

In its blog post about the research, Eclypsium lists 271 models of Gigabyte motherboards that researchers say are affected. Loucaides adds that users who want to see which motherboard their computer uses can check by going to “Start” in Windows and then “System Information.”

Eclypsium says it found Gigabyte’s hidden firmware mechanism while scouring customers’ computers for firmware-based malicious code, an increasingly common tool employed by sophisticated hackers. In 2018, for instance, hackers working on behalf of Russia’s GRU military intelligence agency were discovered silently installing the firmware-based anti-theft software LoJack on victims’ machines as a spying tactic. Chinese state-sponsored hackers were spotted two years later repurposing a firmware-based spyware tool created by the hacker-for-hire firm Hacking Team to target the computers of diplomats and NGO staff in Africa, Asia, and Europe. Eclypsium’s researchers were surprised to see their automated detection scans flag Gigabyte’s updater mechanism for carrying out some of the same shady behavior as those state-sponsored hacking tools—hiding in firmware and silently installing a program that downloads code from the Internet.

Gigabyte’s updater alone might have raised concerns for users who don’t trust Gigabyte to silently install code on their machine with a nearly invisible tool—or who worry that Gigabyte’s mechanism could be exploited by hackers who compromise the motherboard manufacturer to exploit its hidden access in a software supply chain attack. But Eclypsium also found that the update mechanism was implemented with glaring vulnerabilities that could allow it to be hijacked: It downloads code to the user’s machine without properly authenticating it, sometimes even over an unprotected HTTP connection, rather than HTTPS. This would allow the installation source to be spoofed by a man-in-the-middle attack carried out by anyone who can intercept the user’s Internet connection, such as a rogue Wi-Fi network.

In other cases, the updater installed by the mechanism in Gigabyte’s firmware is configured to be downloaded from a local network-attached storage device (NAS), a feature that appears to be designed for business networks to administer updates without all of their machines reaching out to the Internet. But Eclypsium warns that in those cases, a malicious actor on the same network could spoof the location of the NAS to invisibly install their own malware instead.

Even if Gigabyte does push out a fix for its firmware issue—after all, the problem stems from a Gigabyte tool intended to automate firmware updates—Eclypsium’s Loucaides points out that firmware updates often silently abort on users’ machines, in many cases due to their complexity and the difficulty of matching firmware and hardware. “I still think this will end up being a fairly pervasive problem on Gigabyte boards for years to come,” Loucaides says.
More...
https://arstechnica.com/security/20...herboards-were-sold-with-a-firmware-backdoor/
 

Illuminati 2.0

ED Archiver
Joined
Aug 18, 2021
Messages
6,910
Reaction score
7,843
I gave an indian guy who worked for mcafee remote access to my computer once and he tried to convince me to pay 119.00 to get a years worth of coverage after telling me that trojans can get into your pc just by visiting certain websites



Knew it was legit however and at the end he told me to boot him out of my computer
 

Lovecraft

14 cats in a trenchcoat
Joined
Aug 1, 2021
Messages
5,946
Reaction score
5,679
It was a legitimate company with the Mcafee logo so you would know it would be safe like with Microsoft, Apple, or Dell

A smaller call center or company however would be an obvious scam
....................................................................
That doesn't fucking change anything.

If the fucking Pope dropped through my ceiling in an orbital drop pod and emerged in golden armour amidst a choir of angels whilst a booming voice from the sky said "ALLOW THIS INDIAN GENT TO REMOTELY ACCESS YOUR COMPUTER!"
I still would say fuck the fuck off.
 

Illuminati 2.0

ED Archiver
Joined
Aug 18, 2021
Messages
6,910
Reaction score
7,843
....................................................................
That doesn't fucking change anything.

If the fucking Pope dropped through my ceiling in an orbital drop pod and emerged in golden armour amidst a choir of angels whilst a booming voice from the sky said "ALLOW THIS INDIAN GENT TO REMOTELY ACCESS YOUR COMPUTER!"
I still would say fuck the fuck off.
You realize that if people called up Dell or Macfee tech support and were scammed every time they called in, those companies would no longer be in business?

And I actually talked to a white woman who put me on hold to tech support before talking with the gentlemen.

1685772982985.png
 

Lovecraft

14 cats in a trenchcoat
Joined
Aug 1, 2021
Messages
5,946
Reaction score
5,679
You realize that if people called up Dell or Macfee tech support and were scammed every time they called in, those companies would no longer be in business?

And I actually talked to a white woman who put me on hold to tech support before talking with the gentlemen.

View attachment 76764
You literally use McAfee for anything, your opinion is irrelevant.
 

Lovecraft

14 cats in a trenchcoat
Joined
Aug 1, 2021
Messages
5,946
Reaction score
5,679
I never bought McAfee if you had bothered to read.
You invited an Indian allegedly working for McAfee to remote into your computer.
That qualifies as you using McAfee services if not their software, if he even worked for anyone remotely connected. Based on your posting history chances are that you found a support number written in a dingy bar toilet stall and called ig.
"For good PC support call 867-5309 and ask for Mahut"
 

Illuminati 2.0

ED Archiver
Joined
Aug 18, 2021
Messages
6,910
Reaction score
7,843
You invited an Indian allegedly working for McAfee to remote into your computer.
That qualifies as you using McAfee services if not their software, if he even worked for anyone remotely connected. Based on your posting history chances are that you found a support number written in a dingy bar toilet stall and called ig.
"For good PC support call 867-5309 and ask for Mahut"
Their tech support number was on their website.
 
Top Bottom