Believe nothing, no matter where you read it, or who said it – no matter if I have said it! – except it agree with your own reason and your own common sense.” – Siddhartha Gautama, a.k.a. the Buddha

Pin update and some paranoid tricks

Well, Shotgun goes bang! It took a couple three tries to get it there, but seeing how my input was a broken part, I ain’t complainin’. Trial one, as pictured was close, but no cigar: and I admittedly screwed up on this one. I had the length right UNTIL I put the bevel on it. Rule one, Put your damned glasses on if you are squinting! I don’t need them normally, but these inky-dinky lil’ parts bury themselves in glare and even a little blur at the eyeball level makes ’em hard to work with. (I know, excuses excuses)
Here is the one that didn’t work, and a dime to compare the size of what I have been working with.

photo

width .216″, length of main body .450″  Pin width is .080″ with a 1 degree taper to .062 and final length of the pin was .410″

And they say ChineecrapIron is not capable of accuracy!   Phooie!   Operator errors account for more in the scrap heap than ‘the machine’.   Just like a rifle or guitar, chances are, its more accurate than YOU.  LOL   But I digress.

On to the paranoid part of the post.    A week or so ago, SiGB posted about a cool tool for people to use.   Granted, he didn’t go into detail at length about it, but I have been monkeying around with it and figured, “Hey, the only real problem with this is a guidebook, or lack of one!”

Before I go any further, I have to say this.   This is not for jacking around, sending silly linkies and vid clips.   The tools involved require forethought and intent to use.  You just don’t click a link, tap out an email and send it away like a stinger missile.     These are TOOLS and you need to use them wisely and sparingly.  Sparingly because the more you use them, the more information there is to break them.

<<UPDATE:  I added a page detailing this better.  Look up and to your right on the screen at “TAILS” page.>>>>

TAILS  This website will get you the distribution.    This site gets you the program to create a bootable USB.   This OS runs on a USB you just have to boot the computer from a cold state (full restart) to it.   I am sure you know how to do that so you can get into BIOS and change boot order,BUT IF NOT, there is a walk through from that page.    TAILS uses TOR for a browser (called Iceweasel) and already has GnuGP installed on it so that you can set up pre-encrypted emails for people using their public keys.  It will also help you set up your own private key and a public key to send to people.
The advantage of using TAILS is that when you log off, it runs a program to completely wipe any memory associated with your time on it.   Literally it just wipes random 1’s and 0’s over that area of the computer leaving a gaping hole in the memory of your time.    Also, it has a camouflage function that allows it to emulate an XP desktop ‘just in case some gets curious’.    As long as you can get a computer to reboot, you can use any computer to navigate and never leave a trail.
Here is the trick to itHave two thumb drives ready.   They need to be at least 4gigs in size.   I recommend one of at least 8 gigs for your actual use as it will need the extra memory later.   Start Rufus after sticking in the smaller drive.   Locate the ISO of TAILS and make your first bootable drive.   When done, reboot your computer, using the TAILS distro you just made.   NOW you get to do it again, but this time using the Clone feature in TAILS so that the larger drive will be a persistent drive: IE able to store your information like personal and private keys for PGP and your public keyring for PGP.  Dont’ worry, this drive is encrypted with 4096bit encryption and the only weak link to that is YOU, seeing how you will have the passphrase to decrypt it.   Another neat feature, once done, these drives are worthless as anything other than bootable drives.  No PC will recognize them in any format except from the boot screen: Even TAILS ignores them.  Really, what that means to people like us, is that only a hacker with specialized tools can get at our information, and as the encryption level is so high, they will likely destroy anything they tried to find.   SO, your passphrase is your weakest link and that is all on you.

I will go through this process again taking screen shots for those that are seriously thinking this may be a solution for some comm’s issues they have.    GnuGP is essentially the same as the commercial version of PGP.   This is a KNOWN and trusted product.    No matter what, follow along with the signing of your ISO download and make sure you have a valid copy of it.   There are things like Man in the Middle attacks where someone can intercept your download and cut in a back door to your programs.   Keep it in mind.   If you are just looking at a simple tool to play with, this is probably not for you: it is intensive for the average user.

Now, for those that wish to communicate with me in a paranoid fashion, I post my public key for you to use.   Use the contact button for emailing me.

—–BEGIN PGP PUBLIC KEY BLOCK—–
Version: GnuPG v2.0.17 (MingW32)

mQGNBFC5hiwBDADTO5jaFmzY4yB8anmvNSuQgOB3i/tTc/CqP4B7Ew+PURSWWVZd
uyG0sUkZQdKlMjjJ9s6LkYy78HorFsjwQukFr/hRf5bCsdBe/DVqK2HShFfHZkmA
TaI8rodZ5cJegRbd49/drX9jiFt4lS8waqLn70cR3fKxeZVcTVYILq0QDNWWGkyq
X1qlX9IG5fLYhDIjhynK8kLEeCyyeTRrbnXl63eq8rvMZ/W8E8rR+XzCogNbo5np
jfD7GlK+ScJCqJQRJJ3983tJrLh8ParEcD0j9Cb5IYI9CbfWoDHvgWCd7LdDFleI
fhuLjTMLlzIcZh9fdQNYz7kOw75vhB4j0Xm+KbqEwqzvs1VRP+cgQFfgXo4RKsCM
OeGmtiZd2+RNNeZ/LAGxu87LNmWE+NybpgWlhYWT0YDr1jzk9hE4KIN7u9eyrEWY
YpQUsebAy+RIt+V19Ao+rZUl356FuajelaIXu5RackFCwYcdcNlR+MOUE6jstzYd
wbni2CbySRp9rr8AEQEAAbQhSmFtZXMgTWF5bmFyZCA8ZGlvZ2VuZXNAaHVzaC5j
b20+iQG3BBMBCgAhBQJQuYYsAhsDBQsJCAcDBRUKCQgLBRYCAwEAAh4BAheAAAoJ
EA1eZmtheToGO6cMAK4keJMiN9qL7wsds154Tl1ZMu+d3tCVHaW+SjtVuJKk80BZ
gI56UhYAjSji5DgOK5KBzMjL+1McS66d9tPxmLdlJVCSLkYmYYrSOZKSoEx+rXUg
B5NU+tS882QJFi2e2WOaedv2PjMZEGaqIDeiivi3ddmXxj8VN4GIr3hZEzDQLLO9
Ws7P2Suvkkwe86WmlgbuFLhayS4cT/d2qOOdG7//kHTau9FcWberlADd8/bMd1MV
W1oqjIb2/9Gy0S3nqCGXwmrXRWGpQSy5hES5V5rZS4Eob2r2HdoUUS26yxmxlmOn
jhy1PSvEAyI/lXRjSOSMvDRDjgtEOqUGIXt6lECUbadhLiiss/3+5Eri2lnwS9SO
xkdbvk9DYxHaUbpX320maankWEXm/gfT+xE8Xjvg6iXpunNS5Qe8UIG7HaFOrtMA
FzT0GPMQfUrZZtmmNspjzSv3Vuu3zQVjJ5k622nD6euDy24wPHNp0O+f7ItfFZxr
LTCcqXl/xAisgYR3L7kBjQRQuYYsAQwAvA2MLKIoHXbGrqxJu2deJRUc05z5MMCQ
daobV3IpTwLlUwfVyp93sg9GoQou9rrG4kvuiA6Yz6yHpGMZeAhtqeXjfFOEiZy6
AzNvUX7kS0nipUVOf4U4KxmzEH2nX17LrxhhqXjN59kCgGQG7V4C2ITQNg+k/qX1
Vs/76pP0fewVgJGtXfPck9RaIz/vR3DO7krgPjrJpuXCtifIAmBHNgfNXXVNh2p2
qBylpVoOVcgsstFpEnNX8O6RGtyXa5ZgBcUBnUup4LKpEaYkpJrchTTNLMugqxLV
cORUo6qbLUemK0S+UQ8Yt5h6Wd4n68ROEyE2CDznDPbicocP5yIuy5WsaNPamXbJ
8CAcBb4XnZ+iTyBtVbTMVrlDzuVJzuixSJ4jf98Y1vAjtFxcLZOaje7KLqZO1iCz
WmkinyDs4zoTUtWYGttWyeaFa2zB7HeFOtMw0sHOL7BHdsKUxpLx9WdF8eXgb0xF
0kIXeLwxn2gQzfRxFdzzDc+fAZMApfxpABEBAAGJAZ8EGAEKAAkFAlC5hiwCGwwA
CgkQDV5ma2F5OgbERQwAm1nFF3JrZq7KTJywFYCWz5a6raNtz9GvjD5L2Hkx/rk7
QO2mumiI2yOt9sEeZVvkD8t/39lKEWFbut+HC1wwYun43tlr8A8KkAxUUY3oNWI+
Uwbfh6ztr0zGxp59Lech5LBlYfthPbE0CiyROAsoSAEfpHFCVgj0lT1ERUTyBifK
JnAyCqvEqJhPlhpBxmQqN/ubizVkFseChqvH9RJy18W5ypcHYMFuh849dRE/wzD2
71QktJRQwtChQZTEJtlTRKLdUq+bGpnuflz9aJxTp3Juf5EPQYE881rcKINMVaO4
KEC+WQH/fOad3aPj8tUw0fjH9tw/g+t+GGjbqXQMxZnQljjvRPqxq7Bku+qPlwCt
OS00kFaUzqfYa+mY0NSV7Dx9rsUxDfVXk+kJt9CllZXhk1IWmVxHgmcGlOi0rIum
Xo6tMNA9G58UBflGZcG0j2QIYBIKsKrV5FkLdRjN5PJOhwVGm8nbZMf9+Y1T1c1t
IlfA50xvdtWzRUH036wx
=xKv8
—–END PGP PUBLIC KEY BLOCK—–

Advertisements

2 responses

  1. Yay, More folks turning to GNU Linux.

    December 5, 2012 at 11:34 pm

    • I go back and forth from Windoze and a couple of different linux distros. I put more wear and tear on my harddrive with OS formatting than anything. Having TAILS in a bootable drive gives me some flexibility. I have tried to use MINT on a bootable drive but that flopped so badly, I still have road rash on my knuckles and knees from it.
      I don’t really want to set up a dual boot machine as I am not savvy enough to deal with the Win updates intentionally overwriting a protected section of the drive. Corporate sabotage if I ever heard of it, but of course, they can get away with it where others would be fined, and jailed over similar actions on personal property.

      December 5, 2012 at 11:52 pm

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s