â„–24324[Quote]
I dont know where the glowie backdoors can be on my computer, however, i know that, for example, as long as my computer is not connected to any network, wifi, bluetooth, ethernet, etc.. there is no way the glowies can know what im doing on my computer at the moment, simply because there is no way that data can not be sent.
So, because i actually need le heccin worldwide web to do some stuff, i disabled all entering and exiting connections for all programs EXCEPT the ones i choose (my open source web browser).
Using Wireshark, i see that the only connections my computer makes are local ones, but i did not study it for a long time.
As a result, although theres still backdoors in my computer, unless wireshark, my computer's firewall and the open source web browser have a backdoor im not seeing, what i do and what there is on my computer (not including the sites i visit being associated to my ip), are untraceable.
Right?
â„–24333[Quote]
use a pentium 4 pc with free linux or something
â„–24338[Quote]
produce more of it
â„–24343[Quote]
are freetards really this hopeless
â„–24344[Quote]
>>24324Unless (you) as an individual are being targeted by 3 letter agencies, your setup sounds very safe, assuming you are running troonix.
Though if you are especially
schizophrenic concerned, you could split your activities onto two computers, an "online" one for web browsing/internet stuff, and an "offline" one inside a Faraday cage for everything else.
â„–24345[Quote]
>>24324even though glowniggers literally invented the internet in the military and they have been able to bypass wireshark this entire time
â„–24347[Quote]
>>24344dude the troonix is always touting how they have MILLIONs of lines of code in they kernel like its a good thing you have to be puffing something if you dont expect multiple governemnets had introduced subtle backdoors in there
â„–24357[Quote]
>>24346even doe this only works if there's a federal agent right next to my computer, unrealistic.
â„–24365[Quote]
>>24346An encrypted drive should prevent this attack
â„–24457[Quote]
>>24347imagine using any os besides basic, rutarded
â„–25405[Quote]
Think of the bigger picture. Sure, CIA niggers can come inside you. But what about crypto miners or or torrents? You can both harm or help CIA niggers.
Someone might use your PC as residential proxy, (which is le good thing), which is why CIA will not arrest you based on address.
So, other ways, it actually benefits more to leave backdoors to be abused.
â„–25776[Quote]
If you want to have control over your machine, get an FPGA. Design your own ISA. Implement it on FPGA. Write your own compiler for that ISA. Make your own OS. Make your own software.
It's that easy.
â„–27769[Quote]
Just get rid of all your devices. Glowniggers will always be watching your activity unless you just don't use the technology. There is no true privacy in computing.
â„–27774[Quote]
>>27769you can't escape glowniggers no matter what, the walls have ears by means of electricity