@alina were it so easy

Either way, a .noai file is a good indicator.

@zer0unplanned @Nonya_Bidniss @n_dimension Either way, comitting "#AssetDenial" is more often than not necessary and one may only have a few seconds before those exercising force may realize that a "duress code" was used and going for the #LUKS headers first may be the only feasible option in a short time...
How to Nuke your Encrypted Kali Installation | Kali Linux Blog

There’s been a fair amount of discussion around the recently introduced LUKS nuke patch we added to the cryptsetup package in Kali Linux. We wanted to take this opportunity to better explain this feature, as well as demonstrate some useful approaches which are worthwhile getting to know. LUKS Nuke in a Nutshell As explained well By Michael Lee in his ZDNet article, when creating an encrypted LUKS container, a master key is generated at random. A passphrase is then used to encrypt the master key in turn. This process means that the passphrase is not directly coupled to the data. That is, if two sets of identical data are encrypted and the same passphrase used, the master keys remain unique to each set and cannot be swapped out. What this also means however, is that regardless of the passphrase used, if the master key is lost, recovering data is impossible. This process conveniently lends itself to being used as a nuke by deliberately wiping the keys.

Kali Linux

@gytisrepecka @da5nsy OFC!

  • I'm the last one questioning that.

I hope that @dotmeow can offer #domains on at-cost basis for #members / users, because once a #gTLD is setup and running the cost of infrastruture to keep it up - even if it were €10k+ per month - is miniscule when divided by the amount of users and registrations.

  • I do however hope that .meow will take lessions and have fundamental policy changes: Banning #DomainParking and #DomainSquatting as well as #auctions of highly-sought-after #domains, because it is a net negative for #users, the #TLD and the rest of the internet if big companies can occupy large swaths of the internet just to commit "#AssetDenial" under dubious pretenses (#Trademark) to bad (anti-competitive) behaviour.

Having domains that are not actually being used or being merely registered for resale being repossessed and registrars of said domains banned would be something I'd love.

@neuralreckoning not to mention many journals are absurldy #paywalled (#Elsevier are just the greediest #rentseekers!) whilst also charging for #submissions to the point that some are existing mostly as a means of #corporations to commit "#AssetDenial" against competitiors by #publishing their own research, thus enshuring the #competition can't #patent a specific product.

  • Don't ask me how I know...

@JessTheUnstill @Pibble

If your threat model is "theft of devices by cops", make shure to be able to commit #AssetDenial or have nothing on the devices they can use!

  • Burner #StupidPhones and (e)SIM-Cards are cheap. keep them switched off and the battery pulled out!

I'd consider wasting €20 on a #StupidPhone, €20 on a rewriteable #eSIMcard and €10-20 on an #eSIM a "necessary expense" and I'd gladly show people how to get that stuff and not burn their opsec/anonymity by doing so...

Jess👾 (@[email protected])

If you're talking NSA level hacking, sure, they can pop anything. But that's oftentimes burning million dollar vulns and potentially creating an international crisis or lawsuits or whatever. If that's your threat model, nothing is going to be secure enough except for truly random one time pads or something, and you need something FAR more advanced to advise your opsec than this. You're basically talking about an entirely different universe of security requirements. I'm talking about local PD just plugging everyone's phones into a standard license Celebrite box and dumping whatever they can. Which is going to be far far less if the phone is in BFU. Stop scaring normies with threat models that don't apply to them. @[email protected] @Pibble

Infosec Exchange

@landley @burnoutqueen Yeah...

#GPLv3 is a desaster as it's 99% ideology and 1% license text and alongside #AGPLv3 completely ignores the reality of how #licensing and #patents and #IP works.

  • Not that I like the status-quo, but we'd rather see businesses steer clear of anything GPLv2+ or GPLv3 or worse.

And on the flipside we basically get "source available" stuff like #SSPL which only serves as a means to commit #AssetDenial and monopolize commercial offerings...

@Em0nM4stodon not only must we resist but actively sabotage said attempts.

  • Add "#Wiper-PINs" to #Apps and Programs that'll open up a decoy profile and wipe the original data when typed in instead of the regular PIN.

Make it a mandatory feature and commit #AssetDenial against #Cyberfacists!

https://infosec.space/@kkarhan/114083227633044291

Kevin Karhan :verified: (@[email protected])

@[email protected] @[email protected] +9001% My Energy is: "#UnsupervisedChildren will be given free #USB Flashdroves with @[email protected] / @[email protected] / #Tails on and taught proper #E2EE with #PGP/MIME, #XMPP+#OMEMO, #SelfCustody as well as the concept of #STFUfriday!" - *And yes, I mean it!* @[email protected] / #CryptoParty NOW!

Infosec.Space

@drwho @niko makes sense.

I'll have to see if I can make something work that'll actively mess with said attackers' attemots to visit/crawl a site...

#AssetDenial #AntiAiAction #AntiCrawler #AntiSpider #AntiAI #AntiIngestion #Sabotage #ITsec #InfoSec #OpSec #ComSec

@gimulnautti @khobochka The only thing that #RoyalitySchemes like that created are rich #CollectingAgencies that act as #ValueRemoving #Rentseekers (i.e. #GEMA only pas out 9,0909% of all the royalities collected and innan intransparent manner!) on every "Reproduction Device" (i.e. printers, burners, copiers, scanners) and "Blank (Recordable) Media" (i.e. USB drives, SD csrds, recordable BD-RWs) AND more criminalization.

Anything else is just not gonna work...
https://www.youtube.com/watch?v=9XN57BhyZwk
https://infosec.space/@kkarhan/113725769698521647

The Instagrabbing of /r/dankmemes

YouTube
@BleepingComputer since most of those attacks aimed at #shitcoins it's easy to track those and commit #AssetDenial against them!