Internet Archivist wrote:The Mrz: Thanks for these massive updates to your 1-stop library for a safe JB P0rn Zone. Previously I read your multi-part series in Lookism, so I will save this for the next time I am laid up in bed for a few days following a domestic mishap (knowing me, most likely falling down a flight of stairs which has happened several times). What I do not understand is that with all your computer & internet security knowledge, why are you not downloading the massive amounts of eye-popping Eurasian CP produced in Ukraine and Russia in the comfort of your home in U.S.A.? Do you not have sufficient self-confidence in your expertise to stay 2-steps ahead of the law? You told us yourself in Lookism that Law Enforcement are Low IQ Morons in U.S.A. So what is the problem? If I had your knowledge, I would watch all the Islamic State and Mexican drug gang beheading videos from LiveLeak. These are illegal in my country, and a man was criminally prosecuted in Canada for uploading a video of Jun Lin (sweet-looking Chinese university student) who was homosexually assaulted and beheaded by the sexy bisexual transvestite prostitute Luka Magnotta. If you have any fears, we should be aware of them, too.
Lol why would I incriminate myself by having looked at underage porn in USA when I've been in countries without laws against it and the USA hasn't extrajurisdictional laws against traveling to countries without laws against looking at underage porn and looking at it? I feel quite certain of my abilities to illegally look at JB porn, however one thing I keep in mind is that I've been saying a lot of shit on the Internet for quite some years now and I've leaked quite a lot of personal information of myself, which makes me weak to biographical intersection attacks actually, though this doesn't concern me too much because I'm trying to actually not break the law or have any evidence that incriminates me until I can flee to Uruguay, though I do kind of have some regret in this area in that this is turning out to be difficult to do.
Additionally, there have been rare attacks that could have come close to compromising me even during my peak operational security, namely RELAY_EARLY was kind of too close for comfort in that it would have reduced my anonymity to that of open WiFi with a spoofed MAC address from a static location, which is really a close call at the best and at worst if there is historic WiFi geopositioning signals intelligence available it could even be enough to raid a person (not me though seeing as I never break the law in USA). So yeah even with stellar security every several years you can have a close call, though really if you put some effort into it you could protect even from attacks like that with more of a safety margin, maybe I will discuss WiFi and layering counter SIGINT as an additional chapter. I also want to cover some strategy, like there are strategic choices you can make when downloading sensitive media that can make a massive difference, like some people never save anything and constantly redownload or reload their ISIS propaganda, but this is actually not suggested imho I think it is better to stockpile and minimize sessions to as few as possible, because every new session is a new exposure to vulnerability in case the content provider has been compromised and is now a poisoned wateringhole, or in case of attacks that last for some period of time before being neutralized in general, it's better to access from a local stockpile than to keep going back to the wateringhole essentially. And other strategic considerations like this as well, I will cover those in the next chapter
1. Layering counter SIGINT
2. Strategy and tactics
3. I will also cover some other techniques such as air gaps
4. Maybe a small section on law bypasses (as I did by traveling to foreign country)
there are other things I could cover as well such as steganography and such but a lot of that is kind of trivia in that you haven't much use for steganography actually, and it is actually pretty impossible to do to any significant extent, hiding randomness in non-randomness is quite detectable, it only really works to hide randomness by overwriting randomness that is naturally present already, or else simple statistical analysis can detect the presence of it.