Join 54,000+ Looksmaxxing Members!

Register a FREE account today to become a member. Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox.

  • DISCLAIMER: DO NOT ATTEMPT TREATMENT WITHOUT LICENCED MEDICAL CONSULTATION AND SUPERVISION

    This is a public discussion forum. The owners, staff, and users of this website ARE NOT engaged in rendering professional services to the individual reader. DO NOT use the content of this website as an alternative to personal examination and advice from licenced healthcare providers. DO NOT begin, delay, or discontinue treatments and/or exercises without licenced medical supervision. Learn more

guide to digital privacy

slopslinger

the real Oblomov
Reputable ★★★
Established ★★
Joined
Jan 22, 2025
Messages
6,868
Time Online
27d 38m
Reputation
24,087
Location
nevsky prospect
Guild
.
0. the premise:
they are watching. not you or anyone else specifically, not even actively, you may not not have an agent assigned to you. still the system watches, it is a creature with a vast sensory apparatus, passively collecting every keystroke, every packet transfer, every bluetooth connection, in hopes that it might one day become useful. your phone isn't yours, your laptop has a second processor that answers directly to three letter agencies (yes really). your router sells you out before you even connect.

this isnt even paranoia, it’s all by design.
..
.
...
.
1. exhibit a: hardware betrayal:
- Intel ME / AMD PSP: hidden coprocessors functioning as backdoors with full system access and telemetry, yes even when you're computer is shut down.
- TPM, boot guard: cryptographically handcuffs your firmware. if your pc doesn't support coreboot/libreboot, it's not really yours.
- baseband processors (phones): A second OS running wide open into exploits.

solution:
- pre 2008 laptops (thinkpads, last libreboot-compatible laptops.)
- pre 2012 desktop CPU (no Intel ME / AMD PSP)
- alternatively coreboot still works on modern hardware albeit with some microcode blobs
- purism / librem / system76 / RISCV: the only "clean" modern hardware available new, but if you can't source them in person / brick and mortar stores, you can't know beyond all doubt they haven't been tampered with.
- grapheneOS pixel: least worst phone option.

B. the procurement protocol
- cash only. no receipts. no warranties.
- buy used hardware from flea markets, craigslist, etc. if you absolutely can't source the necessary hardware locally use your goody two shoes friends as a proxy to buy online, though there is always the risk of supply chain interdiction by agencies. (yes ts really happens, it's extremely targeted and unlikely they waste resources on you but nonetheless has been confirmed, filmed / documented. I've seen the evidence, they told on themselves.)

C. disassembly and testing
- inspect for tampering:
- check screws and seams. look for:
- scratches (signs of disassembly).
- mismatched screws (original vs. replaced).
- glue residue (tamper-evident seals broken).
- inspect ports and internals:
- usb/thunderbolt ports. check for tiny implants (see: NSA’s cottonmouth).
- motherboard: look up pictures / diagrams of your model and look for anomalies, reflowed solder, etc.

D. firmware and bootloader checks
- verify firmware hash, checksums, compare against known good versions (libreboot, coreboot).
- use a hardware flash programmer (CH341A) to dump and inspect.
.
..
.
...
2. the network layer:
A. ISP Tracking
- they log everything: DNS queries, IP addresses, timestamps, traffic patterns.
- solution:
- coffee shop wifi
- VPN (mullvad) or tor connected via bridges, always.
- openWRT router, with MAC randomization, unbound DNS-over-TLS.

B. wifi and bluetooth leaks:
- your phone screams volumes past networks it’s connected to, and tracks your movement via cell and MAC.
-solution:
-randomize MAC address (openWRT, linux, grapheneOS).
- power off and faraday cage your phone when not in use.

C. the cloud: a backdoor by design
- icloud, google drive scan your files before encryption.
- solution:
- avoid, use physical storage whenever possible.
- nextcloud (self-hosted)
- cryptomator: client-side encryption for cloud storage.

D. ethernet backdoors. you thought wired connections were immutable? think again.

- nation-states and manufacturers implant hardware backdoors (ex; modified NICs, malicious PHY chips) and firmware exploits (Intel AMT, realtek debug modes) to intercept traffic. enterprise switches silently mirror data, while "smart" ethernet cables hide packet-sniffing microcontrollers.

detection:
- inspect NICs for extra chips/resoldering.
- dump firmware (CH341A programmer) and compare hashes.
- monitor for rogue packets (wireshark) or RF leaks (SDR).

solution:
- use open-firmware NICs (Intel 82574L).
- airgap critical machines or use fiber optics (no electrical leaks).
- encrypt traffic (MACsec, IPsec) and segment networks (VLANs).
- use shielded (STP/FTP) ethernet cables to block RF emissions. (metallic foil / braid around the wores)

E. compartmentalization:
1. airgap your most critical machine (since this will be the base of your opsec chain that you use to guarantee the legitimately of everything else) -no internet, bluetooth, ever.
...
.
.
....
3. the software dillemma :
A. telemetry is in everything
- windows 10/11, macOS, even some linux distros (ubuntu) phone home.
- solution:
- qubes OS: security through compartmentalization.
- fedora linux, minimal, no bloat.
- tailsOS: runs completely off system RAM, no persistent data stored unless set up. all network traffic routed via tor exclusively.

B. browser fingerprinting
- your fonts, screen resolution, browser, OS, GPU, etc. make you unique and identifiable
- solution:
- tor browser/firefox: resists fingerprinting (use about:config / noscript extension to kill javascript)

C. mobile apps: the worst offenders
- facebook SDK is embedded in most apps, tracking you even if you don’t use fb.
- solution:
- grapheneOS, suckless android. security through compartmentalization
- f-droid app store: open source apps only.
..
.
....
..
4. the human factor:
A. social media = surveillance opt-in
- even if you don’t post, your friends tag you. algorithms infer your habits.
- solution:
- compartmentalization, never log into anything on critical devices
- burner accounts over tor with temp emails, no personal ties.

B. smart devices
- alexa, nest, ring, smart tvs. all listen, all leak.
- solution:
- dumb appliances only. (craigslist especially useful for sourcing)

C. behavioral tracking
- unusual VPN usage? odd hours? flagged.
- solution:
- blend in. routine noise (schedule random activity in torrent client).
...
.
...
.


das eet! hit my character and time limits, hope this was informative 😃


SOURCES:
Intel ME / AMD PSP - hidden coprocessors:


Intel ME: The most dangerous code in the world

Vulnerabilities in Intel ME allow remote access

Intel AMT “Silent Bob” exploit


NSA supply chain interdiction / hardware tampering:

NSA intercepting hardware shipments (snowden documents)

NSA hardware interdiction photo evidence:

cisco confirms interception of shipments

bloomberg report on potential hardware implants


cloud surveillance and file scanning:

icloud encryption keys controlled by apple

google scans user files for policy violations

microsoft admits scanning private OneDrive files


ethernet / network Implants:

NSA’s COTTONMOUTH USB and ethernet implant
https://www.spiegel.de/media/media-35661.pdf (NSA ANT catalog PDF)

hardware implant proof of concept


mobile and app tracking:

facebook SDK tracking users in other apps

android apps sharing data with facebook even if you don’t have a fb account
 

Attachments

  • anon-works-for-intel-v0-ya97jdlmjrmc1.jpeg
    anon-works-for-intel-v0-ya97jdlmjrmc1.jpeg
    117.9 KB · Views: 8
  • 8fgrb.jpg
    8fgrb.jpg
    108.6 KB · Views: 6
  • signal-2025-06-01-13-44-39-758.jpg
    signal-2025-06-01-13-44-39-758.jpg
    228.1 KB · Views: 8
  • signal-2025-06-01-13-10-21-704.png
    signal-2025-06-01-13-10-21-704.png
    1.2 MB · Views: 10
Last edited:
Register to hide this ad
Too late, Palantir got my ass already. They're gonna send me to a concentration camp soon
 

Users who are viewing this thread

Back
Top