Thanks for the video. Another way to go would be to have Whonix, on top of Virtualbox, on top of another Linux OS (say, Parrot or Kali) - all on one USB drive.
I swear to god, if Kenny keeps releasing these cool guides, I might start suspecting that all of this is part of the "baby's first honey pot" operation.
This kind of content is why Kenny has so many devoted followers. The concept that so many want to use a more sophisticated OS but aren't as knowledgeable on how to do it, makes these videos a true diamond in the rough. Even I working in the IT field as a Security Consultant never realized that you could get around keyboard loggers by using an on-screen keyboard. 🤦♂🤦♂🤦♂🤦♂
Honestly, just having tails around as a secure liveusb for using a sus computer is a perfectly valid usecase. Although I suppose "Don't stick your equipment into a port you don't trust" is valid advice for the electronics world as well.
@@MentalOutlaw not a bad idea; though if the system itself got compromised in any way, the script could probably be removed or tampered with, as opposed to the Tails concept of “Oh, the entire operating system and storage drive and RAM and driver support is now suddenly gone; guess I’ll die”
@@therealdia Another way you can do it if you're concerned about that is to have everything only run in RAM, and remove the battery. Thus the laptop can only be used by power cord and have that be the deadman's switch.
I like being able to have opinions and not have to worry about a shoulder tap. Rocco's Baselisk applies here: what if voicing disagreement with disney movies "female empowerment" becomes considered a hate crime?
I mean, it's very useful if you hold an unpopular political opinion and don't want it coming out on tour background checks. People have gone unemployed for decades after being caught supporting unions, for example
Relax @rpeetz. Three letter agencies gave us an anonymous network overlay we can fully trust without question. Sure DARPA made a flesh eating robot, but that's not three letters like NRL.
If you're in an environment where you think a hardware keylogger could be at play, even an onscreen keyboard isn't safe in my opinion. If someone will go out of their way for HW keylogging, I'd assume they're capturing mouse input as well. And with some basic maths (screen resolution, etc), someone could find what keys u click on the on screen keyboard based off your mouse clicks.
"I'm not the owner of Silk Road" "Sir, you have a USB stick on a string attached on your wrist to function as a deadman's switch and you've staring at a white screen because you removed the polarization." Ross was cooked with or without them getting that laptop. His opsec was flawed from day 1.
True, but they would have less evidence against him. They would have to use much more circumstantial evidence instead of obvious evidence like him logged in
gee, that sounds interesting, i wonder if i can buy orphan sources online IM JUST JOKING MR. FBI, JUST A FUNNY LITTLE JOKE, I'M DEFINITELY NOT INTENDING TO BUY ORPHAN SOURCES
This is North korea latest ICBM, if you plan on buying it i suggest traveling to North Korea. I suggest researching the Hwasong-18 The Hwasong-18 (Korean: 《화성포-18》형; Hanja: 火星砲 18型; lit. Mars Artillery Type 18) is a North Korean three-stage solid-fuelled intercontinental ballistic missile (ICBM). It is the first solid-fuelled ICBM developed by North Korea, and was first unveiled at the 8 February 2023 parade commemorating the 75th anniversary of the founding of the Korean People's Army.[5] Its maiden flight occurred on 13 April 2023.[6][7] North Korean leader Kim Jong Un first alluded to the development of a solid-fuel ICBM in January 2021 when it was included as part of a five-year arms development plan.[8][9] A static ground test of a large solid-propellant rocket motor was conducted on 15 December 2022 which produced a thrust of 140 metric tons of force.[10] Four 9-axle mobile launchers carrying what appeared to be solid-fuel ICBM models were showcased on the 8 February 2023 parade marking the 75th anniversary of the Korean People's Army. They were carried in canisters to fire the missiles by cold launch to eject them before first-stage ignition to protect the launcher from damage by the exhaust plume. These models were not named in the parade, but they were clearly of a different design than the previous large Pukguksong-5 solid-fueled SLBM.[3][11] The Hwasong-18 conducted its first flight test on 13 April 2023. The first stage followed a standard trajectory optimized for reaching maximum range, but the second and third stages pulled up into a highly-lofted trajectory; this unusual flight path caused Japan to issue a missile alarm, as during the first stage burn it appeared that the missile could overfly the country. The use of solid fuel makes an ICBM launch more difficult to preempt than previous liquid-fueled missiles, as it does not require hours of fueling and is easier to conceal since it does not require as many accompanying support vehicles.[12][13] A second flight test was conducted on 23 July 2023. North Korean media reported that the missile flew to a range of 1,001.2 km at a maximum altitude of 6,648.4 km for 4,491 seconds (74.85 minutes), giving it the longest flight time and highest apogee of any North Korean ICBM flight to date. Based on these metrics, the Hwasong-18 demonstrated its potential to travel 15,000 km on an operational trajectory, enough to reach anywhere in the continental United States.[4]
as evident in place like NY, LA, San Francisco, Chicago and so on, seems like these are the only places where outlaws are guaranteed rights these days😞. unless you're in the UK, it's a criminal's heaven over there 😄🤗.
I love the pun of using a BOOTstrap to physically connect to your BOOT-device. One thing about the background-image tho: Change it to a meme or general image that mocks hackers, like the Nicolas-Cage "You don't say" meme with a line like "Oh look, a sniffer on the wrong end!", or the Willy-Wonka "tell me more" meme with a line like "Oh you think you can incriminate me? My life must be so much more impressive than yours." or even just the classical trollface, you don't even need a line for that.
This is one of my new favorite channels... so much information, examples, and higher-level thinking to help on our own digital journeys. Its kind of sad people have to use tools like these to even browse anonymously without being tracked, recorded, data-farmed etc.
@@muhammadscott571 Still a normie, but hoping to score a job that doesn't pay shite to process a metric ass ton of paperwork only for the executives to blow it on a mid-tier cruise to Alaska.
I genuinely appreciate your work. Not just for another persons knowledge and incite but you are helping bring more good people on board with the work needed for our future as a species. We need more of the people you inspire my friend. Support earned , you give away free work in a time when you cannot pay someone to do their job. Even if you glow in the dark, thank you anyways.
On weekends, I use TAILS to defend against spies who attempt to scan the platters of my hard-disks using S.Q.U.I.D. (Super Conducting Quantum Interference Detectors). Then, when I'm done with the disks, I grind em' up into powder, melt that powder down into liquid, then I dissolve em' in a strong acid bath and dispose of the remains in an undisclosed location... During the week at work though, I use a mixture of Windows 10, Windows 11, Mac OS-X, and iPhone IOS... The good thing is, I always look forward to and appreciate every weekend! :P GNU's not UNIX, but UNIX is a BEAST... EOF
lifehack: print an image onto an A4 paper put a flashlight behind it put a mirror in front of it boom you got a blurry slanted 30% reflectance wallpaper projected onto your screen.
01:45 Capture cards and other visual/optical means aren't the only concern there, would probably be relatively trivial to figure out what was typed by analyzing mouse movement as well. At the very least you might wanna switch to a rarer keyboard layout for the virtual keyboard (DVORAK is probably a bit too common variant I would guess, I'm not sure how many other options there are that don't have most of the alphabet still in the same places though, so I'm not sure what would really be the best option)
Please always remain on the side of the people and keep making videos like this. The more detailed step by step the better. Why? Because many who are not tech savy deserve to have their privacy protected as well in this cat and mouse game governments have launched against people to gain more control over literally everyone. There are multiple reasons why user data is valuable to them but it should be our right to be able to say NO and not participate. This is also why Open Source should get even more cred as they contribute to preventing governments spying/collecting data. Privacy is literally a human right so PLEASE take this seriously and keep helping people with videos like this... and thanks for all you have done so far! #gospel+hackingthealgorithm
Depending on the laptop model, it might be possible to modify/damage the latch holding the battery in place, which could serve as a sorta boobytrap to power off the laptop in case it's grabbed by someone that's not aware of the modification. Or if you don't care about going fully untethered , you could even take off the battery altogether and run just on the powerbrick (though some batteries don't have a separate lid, so it might be trickier to make this technique not obvious in some cases)
How would that work for a 2-in-1 (either 360 degree hinge or detachable), since those are moved in weirder ways? I'm too clumsy to even consider attempting that, or maybe I'm a coward.
There is also the nim programming language. It uses automatic garbage collection and is memory safe and type safe. It transpiles to c, c++ and JavaScript so that you can use the dependencies you already like.
I can tell by the comments your videos are starting to attract more and more normies (its me im the normie). Have your ever thought about making a Qubes/Whonix/TailsOS for dummies video where you setup an OS for maximum privacy step by step? Also nother banger video kenny!
So many step to take for people could just respect privacy and ask for informed consent. I appreciate the vid and hope people use the knowledge responsibly. Either way Ill make some tweaks to my tails instance even if I dont daily drive it.
the polarized glasses thing is something I've actually considered quite heavily because I wear prescription glasses anyways so I have to have a pair of glasses on
I like the Pidgin chat program. It brought me diversity, compared to my other chat programme, the proprietary one. I started using Pidgin on my Raspberry 2, with the ARM v7a ISA (the ARM A53, at the times of the "Binary Fork") and before Raspian OS. The chat program does what it advertises. Let's upvote the Granddaddy of Telnet, Mental Zoutlaw.. Btw. That shirt is woke bro. Lovely.
I love that you're gaining popularity but I hate what that entails, if you ever make a secondary please make them less enticing so that it doesn't attract attention as much. Love the content!
I love you. This video is so awesome that I really can't come up with anything else to say. I missed it watching more of your videos when you switched to one video a week But hot damn does this video justify your new policy of posting less content but higher quality videos. Anyone reading this: think of the children. download this masterpiece and encrypt it into your archives, for when the long arm of alphabet boyz comes to scrape this source of invaluable knowledge from the internet, it will be protected and passed down for the generations yet to come Bravo, Kenny 👏 👏 👏
Regarding the deadman switch, if you remove the USB or turn off the computer, the system will still be loaded in ram. Could a computer forensics recover the data from the RAM?
VLC is also unsafe. All files can be a malware. Videos , audios , texte , excel , pdf. anything. Media software(VLC, totem) , or production software (word, excel ) are full of vulnerabilities. When they open a file , they'l start reading byte by byte using a library to read binary files. Often this is where the vulnerability hide. The hacker will make a specially crafted video file that will use the software vulnerability. VLC have an extensive network connection feature. A hack can use those features to call home. This is why all untrusted files should be open into an isolated air gap system. Beleive it or not , but some audio files can emit inaudible sound that contain a code that can be read by back doored smartphones or Google nest. Some malware can be transmitted by light bulb flickering.
Very informative and well explained, thank you. Do you have any recommendations on secure smartphones? I've looked up stuff like the Pinephone but waiting lists are long and prices quite high.
Facebook actually went out of their way and paid big bank to a cybersecurity company for them to develop a zero-day for the video player that he was using. The exploit, as far as I know, only sent back the home IP of the guy, but it didn't actually have any RCE capability.
The USB stick trick is genius, but the OS doesn't actually run from the thumb drive, but rather it's contents get loaded into memory, so wouldn't you need a software that automatically wipes RAM upon detecting the ejection?
If TailsOS used any persistent storage on your USB it would be less secure, which is why it runs only on RAM by design, since the USB storage could be up for local forensics and anything that could be found on it can be used against you by said adversary since the kind of flash memory on USB sticks are non volatile. The idea is that ram is volatile storage so it doesn't need to be wiped, powering down the machine means the contents of the ram is destroyed quickly by design because electricity is needed to hold the state of its data at all times. The contents of the RAM are lost in seconds after shutdown. When the USB is removed, this triggers immediate shutdown.
@@ChildrenOfDesire Yes I'm aware of all of that, but your last line is what my comment is about. The video kenny showed didn't look like it just shuts down, but even if it did, there must be some kind of software detecting the ejected stick and issuing a shutdown command. If you didn't set that up beforehand, Tails would just keep running without the USB, giving the glowies access to RAM as long as they keep the power going.
have some script running that tries detecting your face and if it doesn't detect it for more than 12 seconds, it encrypts the usb and wipes your memory, also use polarised goggles or eye contacts because they might be able to still see through you glasses a bit if they go behind you
I made a tails stick just out of curiosity and it's pretty cool. It literally wipes everything outside of the persistent storage folder each restart. I use this exclusively now to explore the dark web. Plus it's nice and beginner friendly unlike whonix or qubes. Just flash a USB, plug it in, choose it as the boot device and bam. I just run it on my old as fuck laptop that I'd otherwise toss. Webcam doesn't work anymore either so no worries about that. Not gonna use it on the shiny new framework laptop I'm prob gonna get soon tho. Also don't mind me Mr. FBI agent! Just browsing for curiosity! Note: I think VLC is now default on tails now, I'll have to check tho. I haven't used the video player yet but I think I remember seeing the icon.
one of those little glinet openwrt travel routers would be good too. they have an option to route all traffic through tor. just make sure you cant ssh or connect to the router from tails, though. using network isolation would be good too, although that might be default option if routing clients through tor im not sure
Hey, I found trying to installing a monero node on the persistent volume so difficult that I gave up. Any chance you could cover that please? I'm comfortable with linux but persistency volume with Tails plus the node install drove me nuts. Edit, I was also fearful of having my wallet on a single nvme. Any suggestions for a mirrored enclosure so if one drive fails my wallet is still safe?
...just sayin my cousin works for AT&T and him along with 4 other friends in the facility have been scrambling to shit over 90% of all comms being gathered, 1/3 of it being straight up random bitstream replacing the captured info, and the other 2/3 being "encrypted" with a key that's not stored anywhere, just a random word changed twice daily and they basically come up with them either with the online random word or with a quippy one they made up for kicks they can't do 100% because there's a general inspection of data every so often and you can't show them stuff that ain't readable.
@@qlippoth13 dude, in either case 90% of the data is broken and unusable by any SIGINT bozo it's like multiplying every byte on your hard drive where each individual byte is multiplied by a heat sensor input on the pc, completely chaotic random shit
I used this method on my mac, and right after I got a gray padlock on my screen requiring a password I never set. Supposedly a firmware thing and now I have to take it to the Apple Store customer service states 😢
10:33 Do Yubico security keys use one-time pads? To my knowledge they only offer one-time passwords, which use the same acronym. While one-time pads are so basic that nothing can get through them, they're also incredibly inconvenient because you need tons of randomness and storage, so I wouldn't expect many projects to be built solely around them.
My new shirt is available now at based.win/product/tor100-cotton-tie-dye-t-shirt/
Do you ship to europe?
Thanks for the video. Another way to go would be to have Whonix, on top of Virtualbox, on top of another Linux OS (say, Parrot or Kali) - all on one USB drive.
Imma wear it to work
Do you ship to El Salvador?
Sick TOR shirt, bro
Imagine going into the library and seeing a dude on his laptop, hardwired into the wall staring at a white screen while tied to a USB stick
Based
Thats what I was thinking, blows your cover just a bit
so based lmfao
its just an average e-book enthusiast.
With funny glasses on too
You don't need privacy until you do. When truth becomes illegal, honest men become outlaws.
@@ShadowRequiems id go to that web but it's good to know that I can shake off survilence
Cringe
we know what you're doing on the dark web, old man.
Honest men, who definitely don't diddle kids
yeah im definitely on a list after watching this
me with a 96% chance to get raided by the fbi:
buys tor shirt:
He said increase by 4%, not 4 percentage points, so that still leaves you 0.16% wiggle-room. 🤓
@@lightyagami1752actually 🤓☝️
@user-ji6lz1vh8g...and I will become the GEEK of the New World!!
I swear to god, if Kenny keeps releasing these cool guides, I might start suspecting that all of this is part of the "baby's first honey pot" operation.
lmfao imagine thinking this is my first honey pot 😂
/\
/_\ illuminate
@@MentalOutlawrookies. Im in my 100th pot
im winnie the pooh with all my honeypots tbh 💯
What's a honey pot?
This kind of content is why Kenny has so many devoted followers. The concept that so many want to use a more sophisticated OS but aren't as knowledgeable on how to do it, makes these videos a true diamond in the rough. Even I working in the IT field as a Security Consultant never realized that you could get around keyboard loggers by using an on-screen keyboard. 🤦♂🤦♂🤦♂🤦♂
He probably means hardware keylogger
Both.
Either is was a genuine protip from trail and error or I think that was a genius kid moment.
Honestly, just having tails around as a secure liveusb for using a sus computer is a perfectly valid usecase. Although I suppose "Don't stick your equipment into a port you don't trust" is valid advice for the electronics world as well.
and women, had too sorry.
@@cjthebeesknees Since he mentioned electronics separately, this was implied 🤓
Noo the joke hast been explained........
I've learned so much and I still keep learning a lot from you, Kenny. Please don't stop educating the masses.
This video cured my depression and allowed me to stay away from the 3 letter alphabet gang, thank you MentalOutlaw.
anytime
3 letter alphabet gang?
@@kabirghai8709 FBI, CIA, NSA, GRU, FSB etc
@@kabirghai8709 fbi, cia, yk the ones
Bro I think NLF@@kabirghai8709
Hey FBI, this is for purely educational purposes, I'm not actually gonna do criminal activity lol
Ladies and Gentlemen, we got him 🎶🎶
Helped me 👍🏻
Yeah i just love technology😂
Education? Son, why do you hate Murica? 😂
waifu pfp and is a dark net enjoyer? Definetly a evil hacker doing evil hackerness things .. 😂
Very creative deadman switch. It’s impressive.
Thanks, I'm gonna see if I can adapt it to QubesOS. I probably just need to make a script that locks the PC if a USB device get's removed.
@@MentalOutlaw Teach us how to do it Kenny!!! Dead man switches is a must nowadays.
@@MentalOutlaw not a bad idea; though if the system itself got compromised in any way, the script could probably be removed or tampered with, as opposed to the Tails concept of “Oh, the entire operating system and storage drive and RAM and driver support is now suddenly gone; guess I’ll die”
@@MentalOutlawBuskill has an Qubes "implentation"
@@therealdia Another way you can do it if you're concerned about that is to have everything only run in RAM, and remove the battery. Thus the laptop can only be used by power cord and have that be the deadman's switch.
"I love extreme online privacy and security measures, BUT I WOULD NEVER EVER DO SOMETHING ILLEGAL, I SWEAR!!!"
i mean, it's kind of useful to know if something like torrenting becomes extremely illegal or something.
I like being able to have opinions and not have to worry about a shoulder tap. Rocco's Baselisk applies here: what if voicing disagreement with disney movies "female empowerment" becomes considered a hate crime?
I mean, it's very useful if you hold an unpopular political opinion and don't want it coming out on tour background checks. People have gone unemployed for decades after being caught supporting unions, for example
Can't wait until protecting your data and online privacy is itself illegal
For your use,perhaps. Curious you would post this.?
Owning a tor shirt seems like bad opsec 😂
Nah, we could use the same excuse clueless Gen Z teen girls use when wearing Slayer tees.
"I just like the design."
Relax @rpeetz. Three letter agencies gave us an anonymous network overlay we can fully trust without question. Sure DARPA made a flesh eating robot, but that's not three letters like NRL.
If you're in an environment where you think a hardware keylogger could be at play, even an onscreen keyboard isn't safe in my opinion. If someone will go out of their way for HW keylogging, I'd assume they're capturing mouse input as well. And with some basic maths (screen resolution, etc), someone could find what keys u click on the on screen keyboard based off your mouse clicks.
wouldn't letterboxing help in that case?
Why does on-screen keyboards use mouse clicks???
Scrambled On-Screen Keyboard?
@@klwthe3rd because its on the screen. You move your mouse to click on the letters. This is useful if your computer's keyboard is broken.
What if you have a touchscreen?? No mouse.@@heroslippy6666
I installed TailsOS to prove what a hardcore based Hackermans i am, but my mom found out and confiscated my equipment and grounded me for a month.
The polarization glasses are the move 😂
Dumb or not so dumb question can u not just buy a stick on polarizer for your screen instead of trying to not destroy pixels
Or just a crappy old TN panel with garbage viewing angles. Although you can't do that on a laptop/handheld.
It's interesting to see Jayson Tatum have such intricate knowledge on something like this.
does anyone know what t-shirt size Jayson Tatum wears?
Lol ! I thought he looked similar 🤣
"I'm not the owner of Silk Road"
"Sir, you have a USB stick on a string attached on your wrist to function as a deadman's switch and you've staring at a white screen because you removed the polarization."
Ross was cooked with or without them getting that laptop. His opsec was flawed from day 1.
True, but they would have less evidence against him. They would have to use much more circumstantial evidence instead of obvious evidence like him logged in
I can't use my own wifu wallpaper? I have to rethink all of this.
now i can buy a nuclear bomb without the letters of the alphabet knowing
go to the chineese
gee, that sounds interesting, i wonder if i can buy orphan sources online
IM JUST JOKING MR. FBI, JUST A FUNNY LITTLE JOKE, I'M DEFINITELY NOT INTENDING TO BUY ORPHAN SOURCES
Why would you want a bomb you psyco. Better get a nuclear reactor or a MiG 😂👌
This is North korea latest ICBM, if you plan on buying it i suggest traveling to North Korea. I suggest researching the Hwasong-18
The Hwasong-18 (Korean: 《화성포-18》형; Hanja: 火星砲 18型; lit. Mars Artillery Type 18) is a North Korean three-stage solid-fuelled intercontinental ballistic missile (ICBM). It is the first solid-fuelled ICBM developed by North Korea, and was first unveiled at the 8 February 2023 parade commemorating the 75th anniversary of the founding of the Korean People's Army.[5] Its maiden flight occurred on 13 April 2023.[6][7]
North Korean leader Kim Jong Un first alluded to the development of a solid-fuel ICBM in January 2021 when it was included as part of a five-year arms development plan.[8][9] A static ground test of a large solid-propellant rocket motor was conducted on 15 December 2022 which produced a thrust of 140 metric tons of force.[10] Four 9-axle mobile launchers carrying what appeared to be solid-fuel ICBM models were showcased on the 8 February 2023 parade marking the 75th anniversary of the Korean People's Army. They were carried in canisters to fire the missiles by cold launch to eject them before first-stage ignition to protect the launcher from damage by the exhaust plume. These models were not named in the parade, but they were clearly of a different design than the previous large Pukguksong-5 solid-fueled SLBM.[3][11]
The Hwasong-18 conducted its first flight test on 13 April 2023. The first stage followed a standard trajectory optimized for reaching maximum range, but the second and third stages pulled up into a highly-lofted trajectory; this unusual flight path caused Japan to issue a missile alarm, as during the first stage burn it appeared that the missile could overfly the country. The use of solid fuel makes an ICBM launch more difficult to preempt than previous liquid-fueled missiles, as it does not require hours of fueling and is easier to conceal since it does not require as many accompanying support vehicles.[12][13] A second flight test was conducted on 23 July 2023. North Korean media reported that the missile flew to a range of 1,001.2 km at a maximum altitude of 6,648.4 km for 4,491 seconds (74.85 minutes), giving it the longest flight time and highest apogee of any North Korean ICBM flight to date. Based on these metrics, the Hwasong-18 demonstrated its potential to travel 15,000 km on an operational trajectory, enough to reach anywhere in the continental United States.[4]
All it takes it a little merit circa David Hahn. In b4 Nuclear boyscout merit badges t-shirt.
Based tor shirt
Some youtubers are health coaches or life coaches, but MO is a darkweb coach.
But, Mr. Outlaw, only criminals need rights.
as evident in place like NY, LA, San Francisco, Chicago and so on, seems like these are the only places where outlaws are guaranteed rights these days😞. unless you're in the UK, it's a criminal's heaven over there 😄🤗.
His name is Mr Jayson Tatum actually
hes being racist i think@lw4311
You’re awesome man, best channel on YT in my opinion
The buster Hernandez hack is very fascinating. Would be helpful if a link to an article explaining it was added to the description
description updated with link to court records
@@MentalOutlawI don't see it.
@@Communist-Dogeits the how a tailos user was de anonymized link in the desc
@@cyprus1005 Ohh, I see it. I'm blind. Thanks!
@@Communist-Doge dont sweat it happens to the best of us
I love the pun of using a BOOTstrap to physically connect to your BOOT-device.
One thing about the background-image tho: Change it to a meme or general image that mocks hackers, like the Nicolas-Cage "You don't say" meme with a line like "Oh look, a sniffer on the wrong end!", or the Willy-Wonka "tell me more" meme with a line like "Oh you think you can incriminate me? My life must be so much more impressive than yours." or even just the classical trollface, you don't even need a line for that.
This is one of my new favorite channels... so much information, examples, and higher-level thinking to help on our own digital journeys. Its kind of sad people have to use tools like these to even browse anonymously without being tracked, recorded, data-farmed etc.
I like ur zappa pfp
I never considered hardware based keyloggers. Thank you, Kenny.
This stuff helps a normie like me become computer literate. Helps me to improve my opsec.
Yeah me too
Welcome to the club
@@muhammadscott571 Still a normie, but hoping to score a job that doesn't pay shite to process a metric ass ton of paperwork only for the executives to blow it on a mid-tier cruise to Alaska.
I genuinely appreciate your work.
Not just for another persons knowledge and incite but you are helping bring more good people on board with the work needed for our future as a species. We need more of the people you inspire my friend.
Support earned , you give away free work in a time when you cannot pay someone to do their job.
Even if you glow in the dark, thank you anyways.
I love it when you make actual Linux videos instead of just tech news about Elon Musk or whatever
Thanks, digital privacy is very important
On weekends, I use TAILS to defend against spies who attempt to scan the platters of my hard-disks using S.Q.U.I.D. (Super Conducting Quantum Interference Detectors). Then, when I'm done with the disks, I grind em' up into powder, melt that powder down into liquid, then I dissolve em' in a strong acid bath and dispose of the remains in an undisclosed location...
During the week at work though, I use a mixture of Windows 10, Windows 11, Mac OS-X, and iPhone IOS... The good thing is, I always look forward to and appreciate every weekend!
:P
GNU's not UNIX, but UNIX is a BEAST...
EOF
This is the most common sensical reasonable advice to totally legal activities I've seem posted on a clearn... I mean, UA-cam! Great video
7:46
What will I do without my Hatsune Miku wallpaper?!? 😭
lifehack:
print an image onto an A4 paper
put a flashlight behind it
put a mirror in front of it
boom you got a blurry slanted 30% reflectance wallpaper projected onto your screen.
This video was so useful that I'm sure I've been added to a watchlist somewhere.
01:45 Capture cards and other visual/optical means aren't the only concern there, would probably be relatively trivial to figure out what was typed by analyzing mouse movement as well. At the very least you might wanna switch to a rarer keyboard layout for the virtual keyboard (DVORAK is probably a bit too common variant I would guess, I'm not sure how many other options there are that don't have most of the alphabet still in the same places though, so I'm not sure what would really be the best option)
I guess the safest would be a random layout every time you open the OSK
They will never get me after this awesome guide by the most awesome UA-camr ever
Please always remain on the side of the people and keep making videos like this. The more detailed step by step the better. Why? Because many who are not tech savy deserve to have their privacy protected as well in this cat and mouse game governments have launched against people to gain more control over literally everyone. There are multiple reasons why user data is valuable to them but it should be our right to be able to say NO and not participate. This is also why Open Source should get even more cred as they contribute to preventing governments spying/collecting data. Privacy is literally a human right so PLEASE take this seriously and keep helping people with videos like this... and thanks for all you have done so far! #gospel+hackingthealgorithm
Depending on the laptop model, it might be possible to modify/damage the latch holding the battery in place, which could serve as a sorta boobytrap to power off the laptop in case it's grabbed by someone that's not aware of the modification. Or if you don't care about going fully untethered , you could even take off the battery altogether and run just on the powerbrick (though some batteries don't have a separate lid, so it might be trickier to make this technique not obvious in some cases)
How would that work for a 2-in-1 (either 360 degree hinge or detachable), since those are moved in weirder ways? I'm too clumsy to even consider attempting that, or maybe I'm a coward.
Great idea mate
There is also the nim programming language. It uses automatic garbage collection and is memory safe and type safe. It transpiles to c, c++ and JavaScript so that you can use the dependencies you already like.
I would love to sit in the library engaging with a white screen and looking like a crazy person 🤣
thanks for this banger! staying tuned for the next episode of FOSS cooking 🥶🥶
To sum it up, Tails first and foremost is still meant mostly for those in countries with heavy Internet restrictions.
I can tell by the comments your videos are starting to attract more and more normies (its me im the normie). Have your ever thought about making a Qubes/Whonix/TailsOS for dummies video where you setup an OS for maximum privacy step by step? Also nother banger video kenny!
For TailsOS you just flash the system into the usb stick then you boot into it, that's it, you are done
So many step to take for people could just respect privacy and ask for informed consent.
I appreciate the vid and hope people use the knowledge responsibly. Either way Ill make some tweaks to my tails instance even if I dont daily drive it.
Dude that shirt is rad, I'll be buying another via Monero soon
This guy knows his stuff
the polarized glasses thing is something I've actually considered quite heavily because I wear prescription glasses anyways so I have to have a pair of glasses on
What about using flatpak for your apps? Flatpak does let you toggle permissions, incl. disabling internet access to the app in question.
another great video, another position climbed on watchlists
watching this channel for the first time and now I feel like I’m being watched by the feds
I use these guides for privacy but at the same time as a reference for writing "hackermen" stuff on fics.
See? I'm not using these guides for malicious intent. GET OFF MY BACK!
Lol
This man said I need a self distruct button. If the concept wasn't so cool, I would be more snarky.
feds monitoring me because i literally searched for this an hour ago
I like the Pidgin chat program. It brought me diversity, compared to my other chat programme, the proprietary one.
I started using Pidgin on my Raspberry 2, with the ARM v7a ISA (the ARM A53, at the times of the "Binary Fork") and before Raspian OS. The chat program does what it advertises.
Let's upvote the Granddaddy of Telnet, Mental Zoutlaw..
Btw.
That shirt is woke bro. Lovely.
I love that you're gaining popularity but I hate what that entails, if you ever make a secondary please make them less enticing so that it doesn't attract attention as much. Love the content!
The internet is lacking clear useful information like this, thx homie
I love you.
This video is so awesome that I really can't come up with anything else to say.
I missed it watching more of your videos when you switched to one video a week
But hot damn does this video justify your new policy of posting less content but higher quality videos.
Anyone reading this: think of the children. download this masterpiece and encrypt it into your archives, for when the long arm of alphabet boyz comes to scrape this source of invaluable knowledge from the internet, it will be protected and passed down for the generations yet to come
Bravo, Kenny 👏 👏 👏
Awesome content as always... Thanks again for "open sourcing" such important knowledge. I'm a fan, Kenny. Please keep up that good work.
As an average darkweb enjoyer i appreciate this video and i will enjoy applying what iv learned to keep visits to wikipedia more secure😃
Regarding the deadman switch, if you remove the USB or turn off the computer, the system will still be loaded in ram. Could a computer forensics recover the data from the RAM?
Now every federal investigator will know this
VLC is also unsafe. All files can be a malware. Videos , audios , texte , excel , pdf. anything.
Media software(VLC, totem) , or production software (word, excel ) are full of vulnerabilities. When they open a file , they'l start reading byte by byte using a library to read binary files.
Often this is where the vulnerability hide.
The hacker will make a specially crafted video file that will use the software vulnerability.
VLC have an extensive network connection feature. A hack can use those features to call home.
This is why all untrusted files should be open into an isolated air gap system.
Beleive it or not , but some audio files can emit inaudible sound that contain a code that can be read by back doored smartphones or Google nest. Some malware can be transmitted by light bulb flickering.
been waiting for this
I didn't imagine you rocking a snazzy beard from all the voice-over videos. Looks good on you.
This is what Network Chuck's supposed "three levels of dark web browsing" or what it was called should've been
It may be a good idea to use fishing line or something else that is not as easy to see for the USB cord.
I'd like to imagine myself installing Tails OS:
*Does everything in this video*
*Uses normie apps like spotify*
yeah that's a big problem with privacy things :-)
Buster Hernandez makes me think of the Buster character on Aurther, the kids cartoon/books.
Wouldn't your face basically have to be smashed against the screen to make polarized glasses work?
Any possibility of finding information that mainstream media doesn't like on darkweb?
Had just watched fireship's video regarding this
Highly recommend that video.
Thank you bro. Now I can order my methamphetamines safely.
Still no need for a script for Xylazine (my first attempt at dark darkweb humor)
honey mentaloutlaw uploaded another tails video !!
Very informative and well explained, thank you.
Do you have any recommendations on secure smartphones? I've looked up stuff like the Pinephone but waiting lists are long and prices quite high.
Facebook actually went out of their way and paid big bank to a cybersecurity company for them to develop a zero-day for the video player that he was using. The exploit, as far as I know, only sent back the home IP of the guy, but it didn't actually have any RCE capability.
The USB stick trick is genius, but the OS doesn't actually run from the thumb drive, but rather it's contents get loaded into memory, so wouldn't you need a software that automatically wipes RAM upon detecting the ejection?
Interesting, waiting for answers
@@Belomoh6Tails detects when the USB is disconnected so it starts the wiping process
If TailsOS used any persistent storage on your USB it would be less secure, which is why it runs only on RAM by design, since the USB storage could be up for local forensics and anything that could be found on it can be used against you by said adversary since the kind of flash memory on USB sticks are non volatile.
The idea is that ram is volatile storage so it doesn't need to be wiped, powering down the machine means the contents of the ram is destroyed quickly by design because electricity is needed to hold the state of its data at all times. The contents of the RAM are lost in seconds after shutdown. When the USB is removed, this triggers immediate shutdown.
@@ChildrenOfDesire Yes I'm aware of all of that, but your last line is what my comment is about. The video kenny showed didn't look like it just shuts down, but even if it did, there must be some kind of software detecting the ejected stick and issuing a shutdown command. If you didn't set that up beforehand, Tails would just keep running without the USB, giving the glowies access to RAM as long as they keep the power going.
@@Cookiekeks the software that detects the ejection of the usb and issue the command is built into tailsOS
have some script running that tries detecting your face and if it doesn't detect it for more than 12 seconds, it encrypts the usb and wipes your memory, also use polarised goggles or eye contacts because they might be able to still see through you glasses a bit if they go behind you
Love that fireship like intro
I made a tails stick just out of curiosity and it's pretty cool. It literally wipes everything outside of the persistent storage folder each restart. I use this exclusively now to explore the dark web. Plus it's nice and beginner friendly unlike whonix or qubes. Just flash a USB, plug it in, choose it as the boot device and bam. I just run it on my old as fuck laptop that I'd otherwise toss. Webcam doesn't work anymore either so no worries about that. Not gonna use it on the shiny new framework laptop I'm prob gonna get soon tho.
Also don't mind me Mr. FBI agent! Just browsing for curiosity!
Note: I think VLC is now default on tails now, I'll have to check tho. I haven't used the video player yet but I think I remember seeing the icon.
Please use a boom mic, there is way too much echo from your room with bare walls
3:59 This is so sick, literally just wiped everything down with one movement.
soyface
Very informative, much safe. 🧙♂️
Great video, fed. Now how do I remove systemd from TailsOS? It's still not paranoid enough
Thank you, Jason Tatum.
one of those little glinet openwrt travel routers would be good too. they have an option to route all traffic through tor. just make sure you cant ssh or connect to the router from tails, though. using network isolation would be good too, although that might be default option if routing clients through tor im not sure
Would love to see you talk about veilid! Great presentation at Defcon a few weeks ago
Love yer video. I just did a DarkNet (tails/whonix) and then you and NetChuck dropped em; the little channel squashed. :)
Bro is giving away his OP Sec
Hey, I found trying to installing a monero node on the persistent volume so difficult that I gave up. Any chance you could cover that please? I'm comfortable with linux but persistency volume with Tails plus the node install drove me nuts.
Edit, I was also fearful of having my wallet on a single nvme. Any suggestions for a mirrored enclosure so if one drive fails my wallet is still safe?
...just sayin
my cousin works for AT&T and him along with 4 other friends in the facility have been scrambling to shit over 90% of all comms being gathered, 1/3 of it being straight up random bitstream replacing the captured info, and the other 2/3 being "encrypted" with a key that's not stored anywhere, just a random word changed twice daily and they basically come up with them either with the online random word or with a quippy one they made up for kicks
they can't do 100% because there's a general inspection of data every so often and you can't show them stuff that ain't readable.
what r u talking about
Unionized employees sitting in a MTSO somewhere are not doing the same job as SIGINT core... just sayin
@@qlippoth13 dude, in either case 90% of the data is broken and unusable by any SIGINT bozo
it's like multiplying every byte on your hard drive where each individual byte is multiplied by a heat sensor input on the pc, completely chaotic random shit
@@jujuteuxOfficial storage is very inexpensive and the funding for SIGINT comes from mandatory tribute at gun point.
is Mr. Outlaw's flavor saver shaped like a T on accident?
🚨🚨🚨🚨🚨🚨
Banger vid
I used this method on my mac, and right after I got a gray padlock on my screen requiring a password I never set. Supposedly a firmware thing and now I have to take it to the Apple Store customer service states 😢
Would you recommend installing veracrypt and creating a hidden volume withing the persistent storage?
Mentaloutlaw's glowup hits different😅
10:33 Do Yubico security keys use one-time pads? To my knowledge they only offer one-time passwords, which use the same acronym. While one-time pads are so basic that nothing can get through them, they're also incredibly inconvenient because you need tons of randomness and storage, so I wouldn't expect many projects to be built solely around them.
They can store TOTP secrets. Only 32 of them for one key
Hello, I need help, how do I make a sparrow wallet software persistent in tails, for example, I tried but couldn't?