all 18 comments

[–]send_nasty_stuffNational Socialist 10 insightful - 1 fun10 insightful - 0 fun11 insightful - 1 fun -  (0 children)

I've never seen one. I've seen tech oriented ones but not a full IRL plus tech guide.

I try not to write anything online that would narrow in on my location or profession. General age, general background and hobbies I will touch on occasionally. When I'm talking IRL with fashy friends we put the phones in another room or we speak outside with phones inside. I don't do any of those 'ring' doorbells or networked camera systems. I don't let my city 'manage' my thermostat. Many of my friends have 'degoogled' themselves and I've taken myself off most social media sites that have my real identity. Facebook for example I canceled last year and I never used it for my dissident discussions. Even on more private services like riot/element I'm still pretty tactful about how I talk about things. I don't use services that require my phone number like telgram. I don't use discord because of what they did to the Charlottesville organizers.

I'm very careful about how I phrase things in my normie life and dissident life. That's one advantage of being raised as a liberal. You're over socialized. You're groomed to not offend anybody in order to fit in corporate america or very sensitive social circles. That has made it easy for me to redpill normies and couch my language in phrases with plausible deniability.

I'm very slow to trust people and I don't let them know I'm studying them and testing them for future redpills. Most of my fash friends I knew before they took the pill. I don't just meet people online and welcome them into my IRL inner circle. That's where a lot of people go wrong. They trust their 'gut' too much instead of truly vetting people. I'd suggest creating concentric circles of friends. Jews do this quite well. They are brutally honest in their family circles.

Zero tech unplanned walks in the wilderness are spiritually, physically and emotionally good for us and good for political organizing. There is no safer way to communicate. Start a 'hiking' club today!

edit. 1 ...and don't trust women. Wives are a little different especially after they have kids but in general you need to be tactful with wives as well.

[–]MarkimusNational Socialist 6 insightful - 1 fun6 insightful - 0 fun7 insightful - 1 fun -  (9 children)

Don't post any personal information online, there you go

[–]Girondin 6 insightful - 1 fun6 insightful - 0 fun7 insightful - 1 fun -  (2 children)

Not just that but also don't post things that lead you to get indentfied, like saying too much about neuroscience, fruitflies or about the midwest that give doxxers a narrowier pool of people you could be.

see the story of Dr Cavemen, a alt-right neuroscientist who was driven to suicde after he got doxxed and every one of his IRL friends backstabbed him Dr Caveman was doxxed by antifa, here is the document on how they did it,

[–]Ponderer 3 insightful - 1 fun3 insightful - 0 fun4 insightful - 1 fun -  (0 children)

Thanks for sharing that story. It really goes to show why everyone should have at least one based IRL friend to help them through hard times.

[–]Fitter_HappierWhite Nationalist 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

neuroscience, fruitflies or about the midwest

Or if you do make sure to post general knowledge on a wide range of subjects. I don't have any problem letting the Jews know we're not toothless rednecks who know nothing of science, history, math, politics, biology, etc.

[–]quickthrowaway[S] 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (5 children)

With the new Apple thing, and them starting to slowly invade privacy through the excuse of c porn, I've gotten a bit paranoid.

I mean, are we safe using Apple notes, or Google Chrome, or Youtube comments? Will our search histories and comment histories soon be used against us?

Is there anything we can do to be a bit safer, just in case these companies turn on us?

Or, perhaps you make a comment somewhere and someone takes it upon themselves to hack your computer? I honestly don't know how easy or impossible this is to do.

Again, maybe I'm being paranoid, but I don't think it's that crazy to want to find out more info.

[–]Fitter_HappierWhite Nationalist 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (1 child)

Will our search histories and comment histories soon be used against us?

Yes. There is a dossier on everyone in the US, I firmly believe. They have computers mining every character sent across the internet to build a profile on everyone. I firmly believe this. We should do the same.

[–][deleted] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (2 children)

I used to be where you are right now, now I'm more chill even though I still use only free and open source software.

But you gotta realize most of doxing doesn't come from corporate side (with several exceptions, Discord for example). It's mostly what you post yourself, and sometimes the metadata (shouldn't concern you much if you just Twitterpost, this is more of a concern if you run website).

VPN and Tor stuff you mention is pure autism, it only makes sense if you're Assange or Snowden lol

[–]quickthrowaway[S] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (1 child)

What happened with discord? I tried a quick search online and couldn't find anything.

[–][deleted] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

Search for "Unicorn Riot Discord". There is no way in hell they scraped all the data by themselves (it includes voice chats too), and Discord didn't acknowledge any hack or anything.

[–]thefirststoneThat's my purse! I don't know you! 4 insightful - 1 fun4 insightful - 0 fun5 insightful - 1 fun -  (5 children)

  • Don't trust anyone with private details. This used to be standard practice, but the advertising-government complex benefits from forthcoming comsumers.

  • Don't use the same name at different places. When one gets leaked, it doesn't need taint the rest.

  • Don't use closed services at all, especially those known for ideological leaks, like Discord. You can't trust them, and they hate you. Just don't use it.

[–]quickthrowaway[S] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (4 children)

•Don't you kind of have to trust certain places with private details? You at least have to give most websites an email address, although I suppose you could use a surrogate one. If you give an alternate email address, can you still be tracked using IP address or other means? I honestly don't know much about this stuff.

•That's a good idea not to use the same usernames across different places.

•What is a closed service?

[–]thefirststoneThat's my purse! I don't know you! 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (3 children)

Use free email addresses, access them the same way you access the site -- like vpn or tor or public hotspot -- so you don't get them any extra info on you.

By closed service, I mean something running closed-source code nobody can audit and nobody can run themselves. There's no point when distributed and self-hosted services exist, or in the case of chat pre-date all this Slack and Discord shit. Don't put your thoughts and friends in hostile hands.

[–]quickthrowaway[S] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (2 children)

Is it better to use a VPN or Tor? And, will they fully protect your information?

I often read stuff online that is like "there is no way to stay safe on the internet". It almost seems like a psyop to me, which is why I thought I'd be better asking in these circles.

[–]thefirststoneThat's my purse! I don't know you! 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

It depends. With VPNs, you trust providers not to collect all your connection meta data, attached to your payment method. There's no way to prove they or their data centers don't do that.

With Tor, every exit node is untrustworthy, but you don't tend to use the same ones in the same sites over time. Encrypted connections, which is almost all of them, are mostly good enough to keep exit nodes from tampering or listening in. But more sites block Tor than VPNs, so it can be more difficult to use.

Neither protects you from state agencies, or anybody who can MITM encrypted connections by compromised certificate authority certificates. Both can protect from your ISP snooping.

"Safe" depends on your threat model. Mostly, volunteering information is where people get in trouble.

[–]Girondin 2 insightful - 1 fun2 insightful - 0 fun3 insightful - 1 fun -  (0 children)

You can use both VPN over Tor. You connect your PC to a VPN and then you use the tor browser.

[–]Ponderer 3 insightful - 1 fun3 insightful - 0 fun4 insightful - 1 fun -  (0 children)

I'm going to collate the information in this thread, along with stuff I already know, and write one.

[–]Nombre27 3 insightful - 1 fun3 insightful - 0 fun4 insightful - 1 fun -  (0 children)

Thuletide has put some stuff together, although I can't comment on its validity

https://thuletide.wordpress.com/2020/06/07/opsec-infosec-101/