User Panel
Quoted:
Quoted:
Quoted:
Start rolling your own guys. We need the 80% lower of the encryption world. Rolling your own crypto is a terrible idea. For who Let me rephrase.... Poorly implemented cryptography is just as bad as no cryptography at all. This is why most crypto algorithms are open source, and why most of us strongly prefer open source implementations of said algorithms. |
|
I'm using AxCrypt. Let's hope nothing untoward is happening with it.
|
|
Quoted:
Because you want police crippled in their ability to see child porn and money laundering and neonazi membership files? Destruction of evidence laws are older than the 2a Just makes people feel tingly in their pants to think the government can't get into their encrypted anarchist cookbook or credit card numbers hint: the software would be shut down if they don't have a workaround View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
All the fine upstanding citizens who need unbreakable encryption to hide their non-criminal files, right... Don't be fooled.. information is the new weapon. Having equal access to secure encryption is the modern equivalent to the 2A. Because you want police crippled in their ability to see child porn and money laundering and neonazi membership files? Destruction of evidence laws are older than the 2a Just makes people feel tingly in their pants to think the government can't get into their encrypted anarchist cookbook or credit card numbers hint: the software would be shut down if they don't have a workaround membership in an organization is a crime now? evidence isn't being destroyed either... I also don't have to tell them things I know that I have stored in my head |
|
Quoted:
What the fuck is going on.... https://news.ycombinator.com/item?id=7812133 The version on SF is a NEW version and is signed using NEW signing keys. IE the original developers did not sign this release. Here is the changelog for todays code from 7.1: Definitely looks like it was forked from pre-release code and then modified to add in all the insecure version warnings: https://github.com/warewolf/truecrypt/compare/master...7.2 Here is the ycombinator link: https://news.ycombinator.com/item?id=7812133 What. The. Fuck. View Quote Sounds like somebody might have got disappeared... |
|
Quoted:
Sounds like somebody might have got disappeared... View Quote View All Quotes View All Quotes Quoted:
Quoted:
What the fuck is going on.... The version on SF is a NEW version and is signed using NEW signing keys. IE the original developers did not sign this release. Here is the changelog for todays code from 7.1: Definitely looks like it was forked from pre-release code and then modified to add in all the insecure version warnings: https://github.com/warewolf/truecrypt/compare/master...7.2 Here is the ycombinator link: https://news.ycombinator.com/item?id=7812133 What. The. Fuck. Sounds like somebody might have got disappeared... My mistake: keyfile was renamed in the source repository, but is the SAME key. Whoever released this today had access to the private key of the developers who did all of the previous versions. That's slightly better, but still doesn't mean a whole lot.... |
|
Quoted:
It has nothing to do with "all private information." Police can obtain a search warrant to obtain private information, if a software product would impede prosecution and evidence gathering, it would be shut down and rightfully so. This also protects a civilian who forgot their password from being indefinitely inprisoned due to contempt of court, since they could not prove they actually forgot the password and were not withholding it. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Modern Stalinists get all tingly in their manginas thinking about the State having access to all private information. It has nothing to do with "all private information." Police can obtain a search warrant to obtain private information, if a software product would impede prosecution and evidence gathering, it would be shut down and rightfully so. This also protects a civilian who forgot their password from being indefinitely inprisoned due to contempt of court, since they could not prove they actually forgot the password and were not withholding it. Holy crap, WTF am I reading? |
|
Quoted:
What the fuck is going on.... https://news.ycombinator.com/item?id=7812133 The version on SF is a NEW version and is signed using NEW signing keys. IE the original developers did not sign this release. edit: keyfile was renamed in the source repository, but is the SAME key. Whoever released this today had access to the private key of the developers who did all of the previous versions. Here is the changelog for todays code from 7.1: Definitely looks like it was forked from pre-release code and then modified to add in all the insecure version warnings: https://github.com/warewolf/truecrypt/compare/master...7.2 Here is the ycombinator link: https://news.ycombinator.com/item?id=7812133 What. The. Fuck. View Quote Read through that thread on HN, the new version was signed with their usual key. This looks just like a lavabit kind of deal where they said fuck it rather than put a back door in their code, and they're not allowed to say so. If that's the case, then itshappening.gif. |
|
Quoted:
Quoted:
Quoted:
Modern Stalinists get all tingly in their manginas thinking about the State having access to all private information. It has nothing to do with "all private information." Police can obtain a search warrant to obtain private information, if a software product would impede prosecution and evidence gathering, it would be shut down and rightfully so. This also protects a civilian who forgot their password from being indefinitely inprisoned due to contempt of court, since they could not prove they actually forgot the password and were not withholding it. Holy crap, WTF am I reading? There are these creatures that live underneath bridges (or children's beds). Sometimes they get bored and post here. |
|
Quoted:
Quoted:
Quoted:
Modern Stalinists get all tingly in their manginas thinking about the State having access to all private information. It has nothing to do with "all private information." Police can obtain a search warrant to obtain private information, if a software product would impede prosecution and evidence gathering, it would be shut down and rightfully so. This also protects a civilian who forgot their password from being indefinitely inprisoned due to contempt of court, since they could not prove they actually forgot the password and were not withholding it. Holy crap, WTF am I reading? The drivel of a bootlicker |
|
|
Quoted:
The dumbest fucking post in GD ante has just been upped. View Quote View All Quotes View All Quotes Quoted:
Quoted:
All the fine upstanding citizens who need unbreakable encryption to hide their non-criminal files, right... The dumbest fucking post in GD ante has just been upped. Keep reading. That post was a game of just the tip. |
|
Quoted:
What the fuck is going on.... https://news.ycombinator.com/item?id=7812133 The version on SF is a NEW version and is signed using NEW signing keys. IE the original developers did not sign this release. edit: keyfile was renamed in the source repository, but is the SAME key. Whoever released this today had access to the private key of the developers who did all of the previous versions. Here is the changelog for todays code from 7.1: Definitely looks like it was forked from pre-release code and then modified to add in all the insecure version warnings: https://github.com/warewolf/truecrypt/compare/master...7.2 Here is the ycombinator link: https://news.ycombinator.com/item?id=7812133 What. The. Fuck. View Quote Hmmm... |
|
lol. This discussion is going to be hilarious. I can't wait to read all the knowledgeable and well reasoned opinions that will be posted.
|
|
|
http://www.theregister.co.uk/2014/05/28/truecrypt_hack/
We ran the executable in a virtual machine so that you don't have to, and on Windows 8.1 it was blocked by the SmartScreen feature, suggesting it may contain malware. Launching it on an older system immediately displayed the "warning message" before installation proceeded and the executables contained links to the same text. A list of changes between the source code of version 7.2 and the previous release, 7.1a, can be found here; there is at this stage nothing concrete to suggest the 7.2 binaries were built from the 7.2 source code download from Sourceforge. Certainly judging by the source, the software pops up a warning to not rely on the software, and then refuses to encrypt data – encouraging users to migrate to alternative disk and file encryption utilities. The binaries are cryptographically signed by the TrueCrypt developers, but it's believed the keys were switched in the past few hours. Also on Wednesday, a Wikipedia user going under the handle "Truecrypt-end" tried repeatedly to update the TrueCrypt page with similar text, but these changes were swiftly reverted by moderators. The motivation for the abrupt U-turn is unclear. On Wednesday afternoon, Kenn White of the crowd-funded TrueCrypt code-auditing project tweeted that he had no explanation for the defacement. Early rounds of the audit have found some vulnerabilities in TrueCrypt, but nothing serious. |
|
Quoted:
Rolling your own crypto is a terrible idea. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Start rolling your own guys. We need the 80% lower of the encryption world. Rolling your own crypto is a terrible idea. But I have a super secret-squirrel .bat file that does ROT13. I'm bulletproof! |
|
Quoted:
The free state of Wyoming is ashamed of you. You have a right to privacy. Encryption is the 2nd-Amendment of data. View Quote View All Quotes View All Quotes Quoted:
Quoted:
All the fine upstanding citizens who need unbreakable encryption to hide their non-criminal files, right... The free state of Wyoming is ashamed of you. You have a right to privacy. Encryption is the 2nd-Amendment of data. Read the bill of rights again. In the 4th amendment, we are free from Unreasonable searches and seizures, not to have data that can never be searched under any circumstance. It has nothing to do with the second amendment |
|
Quoted:
Read the bill of rights again. In the 4th amendment, we are free from Unreasonable searches and seizures, not to have data that can never be searched under any circumstance. It has nothing to do with the second amendment View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
All the fine upstanding citizens who need unbreakable encryption to hide their non-criminal files, right... The free state of Wyoming is ashamed of you. You have a right to privacy. Encryption is the 2nd-Amendment of data. Read the bill of rights again. In the 4th amendment, we are free from Unreasonable searches and seizures, not to have data that can never be searched under any circumstance. It has nothing to do with the second amendment The 2A is the enforcement side of the 4A (and 1A). |
|
Quoted:
Read the bill of rights again. In the 4th amendment, we are free from Unreasonable searches and seizures, not to have data that can never be searched under any circumstance. It has nothing to do with the second amendment View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
All the fine upstanding citizens who need unbreakable encryption to hide their non-criminal files, right... The free state of Wyoming is ashamed of you. You have a right to privacy. Encryption is the 2nd-Amendment of data. Read the bill of rights again. In the 4th amendment, we are free from Unreasonable searches and seizures, not to have data that can never be searched under any circumstance. It has nothing to do with the second amendment Zomg. I can't stop masturbating. |
|
Quoted: Quoted: Quoted: Quoted: All the fine upstanding citizens who need unbreakable encryption to hide their non-criminal files, right... The free state of Wyoming is ashamed of you. You have a right to privacy. Encryption is the 2nd-Amendment of data. Read the bill of rights again. In the 4th amendment, we are free from Unreasonable searches and seizures, not to have data that can never be searched under any circumstance. It has nothing to do with the second amendment Zomg. I can't stop masturbating. I heard they let Dave_A back on the site - but, I didn't believe it until now.
|
|
Quoted:
I heard they let Dave_A back on the site - but, I didn't believe it until now. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
Quoted:
Quoted:
All the fine upstanding citizens who need unbreakable encryption to hide their non-criminal files, right... The free state of Wyoming is ashamed of you. You have a right to privacy. Encryption is the 2nd-Amendment of data. Read the bill of rights again. In the 4th amendment, we are free from Unreasonable searches and seizures, not to have data that can never be searched under any circumstance. It has nothing to do with the second amendment Zomg. I can't stop masturbating. I heard they let Dave_A back on the site - but, I didn't believe it until now. that ain't him |
|
|
Quoted:
Read the bill of rights again. In the 4th amendment, we are free from Unreasonable searches and seizures, not to have data that can never be searched under any circumstance. It has nothing to do with the second amendment View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
All the fine upstanding citizens who need unbreakable encryption to hide their non-criminal files, right... The free state of Wyoming is ashamed of you. You have a right to privacy. Encryption is the 2nd-Amendment of data. Read the bill of rights again. In the 4th amendment, we are free from Unreasonable searches and seizures, not to have data that can never be searched under any circumstance. It has nothing to do with the second amendment A so cracking your skull to get a peak inside is all good with a court order. |
|
|
Quoted:
I was referring to werepossum... you sure about that? View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
--SNIP-- I heard they let Dave_A back on the site - but, I didn't believe it until now. that ain't him yup - he's here under his own name back to truecrypt though.... so this is going one of two ways hoax/hack had to give up the goods and this is the emergency "gtfo" post? |
|
|
Quoted:
yup - he's here under his own name back to truecrypt though.... so this is going one of two ways hoax/hack had to give up the goods and this is the emergency "gtfo" post? View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
Quoted:
--SNIP-- I heard they let Dave_A back on the site - but, I didn't believe it until now. that ain't him yup - he's here under his own name back to truecrypt though.... so this is going one of two ways hoax/hack had to give up the goods and this is the emergency "gtfo" post? I thought it might be an emergency post too, but they removed all prior versions of the software from SourceForge and left only a suspicious EXE file. That points more to a malicious attacker. |
|
Quoted:
Read the bill of rights again. In the 4th amendment, we are free from Unreasonable searches and seizures, not to have data that can never be searched under any circumstance. It has nothing to do with the second amendment View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
All the fine upstanding citizens who need unbreakable encryption to hide their non-criminal files, right... The free state of Wyoming is ashamed of you. You have a right to privacy. Encryption is the 2nd-Amendment of data. Read the bill of rights again. In the 4th amendment, we are free from Unreasonable searches and seizures, not to have data that can never be searched under any circumstance. It has nothing to do with the second amendment What do you think is reasonable? Is tapping your phone without a specific warrant reasonable? Is monitoring all of your internet traffic including secure SSL sessions to your email and bank reasonable? Is recording your movements using your mobile phone pings reasonable? Is being placed under a gag order while your customer data is being tossed reasonable? Is indefinite detention without trial reasonable? The point I'm trying to make is the house is on fire and you're still sitting on couch like a moron. |
|
Quoted:
Read the bill of rights again. In the 4th amendment, we are free from Unreasonable searches and seizures, not to have data that can never be searched under any circumstance. It has nothing to do with the second amendment View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
All the fine upstanding citizens who need unbreakable encryption to hide their non-criminal files, right... The free state of Wyoming is ashamed of you. You have a right to privacy. Encryption is the 2nd-Amendment of data. Read the bill of rights again. In the 4th amendment, we are free from Unreasonable searches and seizures, not to have data that can never be searched under any circumstance. It has nothing to do with the second amendment Perhaps you can show us where the government has the authority to outlaw encryption algorithms and their implementations... |
|
This will all be a moot point once they have their quantum computer.
|
|
Quoted:
This will all be a moot point once they have their quantum computer. View Quote Fortunately, any quantum computer useable for actually cracking encryption on a regular basis seems to be a long way off. And I think that we're going to see quantum cryptographical methods implemented in the real world around the same time quantum cracking of current encryption becomes viable. There's a large market for encryption out there, and if there's one we've learned from this Snowden mess, it's that the NSA isn't a magical agency with alien technology. They're on the same tech curve the rest of us are. |
|
There is no reason to even try these programs if your goal is to try to get past the NSA. Give it up.
Another tip: Computers aren't that secure. If someone has the time and resources, they can hack about anything. Our gov taught us that... |
|
Quoted:
Perhaps you can show us where the government has the authority to outlaw encryption algorithms and their implementations... View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
Quoted:
All the fine upstanding citizens who need unbreakable encryption to hide their non-criminal files, right... The free state of Wyoming is ashamed of you. You have a right to privacy. Encryption is the 2nd-Amendment of data. Read the bill of rights again. In the 4th amendment, we are free from Unreasonable searches and seizures, not to have data that can never be searched under any circumstance. It has nothing to do with the second amendment Perhaps you can show us where the government has the authority to outlaw encryption algorithms and their implementations... Math is dangerous, and therefore should be illegal. |
|
Quoted:
There is no reason to even try these programs if your goal is to try to get past the NSA. Give it up. Another tip: Computers aren't that secure. If someone has the time and resources, they can hack about anything. Our gov taught us that... View Quote Eh, the weak points are in implementation, not in the mathematical underpinnings. We should always strive to develop better and better software and hardware. If you believe you could be subject to rubber-hose cryptanalysis, then sure, nothing it going to be secure. Beyond that, there is no reason you couldn't save data in a way which is unrecoverable by the NSA or similar organizations. |
|
Quoted:
That's the mostly likely reason why the distribution of TrueCrypt would be stopped. View Quote View All Quotes View All Quotes Quoted:
Quoted:
But I was assured that TrueCrypt was the only way to have secure data on my thumb drive and buying an IronKey or the like wasn't enough. That's the mostly likely reason why the distribution of TrueCrypt would be stopped. Might be. Might also be the developer saying, "fuck it." |
|
Quoted:
Math is dangerous, and therefore should be illegal. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
Read the bill of rights again. In the 4th amendment, we are free from Unreasonable searches and seizures, not to have data that can never be searched under any circumstance. It has nothing to do with the second amendment Perhaps you can show us where the government has the authority to outlaw encryption algorithms and their implementations... Math is dangerous, and therefore should be illegal. They already have. Certain numbers are illegal to distribute. |
|
Quoted: They already have. Certain numbers are illegal to distribute. View Quote View All Quotes View All Quotes Quoted: Quoted: Quoted: Quoted: Read the bill of rights again. In the 4th amendment, we are free from Unreasonable searches and seizures, not to have data that can never be searched under any circumstance. It has nothing to do with the second amendment Perhaps you can show us where the government has the authority to outlaw encryption algorithms and their implementations... Math is dangerous, and therefore should be illegal. They already have. Certain numbers are illegal to distribute. RIP 87??? NNNOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
|
Quoted:
Math is dangerous, and therefore should be illegal. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
Quoted:
Quoted:
All the fine upstanding citizens who need unbreakable encryption to hide their non-criminal files, right... The free state of Wyoming is ashamed of you. You have a right to privacy. Encryption is the 2nd-Amendment of data. Read the bill of rights again. In the 4th amendment, we are free from Unreasonable searches and seizures, not to have data that can never be searched under any circumstance. It has nothing to do with the second amendment Perhaps you can show us where the government has the authority to outlaw encryption algorithms and their implementations... Math is dangerous, and therefore should be illegal. This is just disingenuous Any digital information can be "numbers". Are saltpeter, metal pipes, and sulfur dangerous and illegal on their own? |
|
Quoted:
This is just disingenuous Any digital information can be "numbers". Are saltpeter, metal pipes, and sulfur dangerous and illegal on their own? View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
Quoted:
Read the bill of rights again. In the 4th amendment, we are free from Unreasonable searches and seizures, not to have data that can never be searched under any circumstance. It has nothing to do with the second amendment Perhaps you can show us where the government has the authority to outlaw encryption algorithms and their implementations... Math is dangerous, and therefore should be illegal. This is just disingenuous Any digital information can be "numbers". Are saltpeter, metal pipes, and sulfur dangerous and illegal on their own? Do you believe that mathematical algorithms should be illegal. |
|
Quoted:
This is just disingenuous Any digital information can be "numbers". View Quote View All Quotes View All Quotes Quoted:
Quoted:
Math is dangerous, and therefore should be illegal. This is just disingenuous Any digital information can be "numbers". I didn't say numbers. I said math. Those are not the same thing. Are saltpeter, metal pipes, and sulfur dangerous and illegal on their own?
No, nor should they be illegal together. "Precrime" has no place is nation of liberty. |
|
Quoted:
No, nor should they be illegal together. "Precrime" has no place is nation of liberty. View Quote View All Quotes View All Quotes Quoted:
Are saltpeter, metal pipes, and sulfur dangerous and illegal on their own?
No, nor should they be illegal together. "Precrime" has no place is nation of liberty. careful before you create joinder all the way in somalia |
|
Quoted: Because you want police crippled in their ability to see child porn and money laundering and neonazi membership files? Destruction of evidence laws are older than the 2a Just makes people feel tingly in their pants to think the government can't get into their encrypted anarchist cookbook or credit card numbers hint: the software would be shut down if they don't have a workaround View Quote View All Quotes View All Quotes Quoted: Quoted: Quoted: All the fine upstanding citizens who need unbreakable encryption to hide their non-criminal files, right... Don't be fooled.. information is the new weapon. Having equal access to secure encryption is the modern equivalent to the 2A. Because you want police crippled in their ability to see child porn and money laundering and neonazi membership files? Destruction of evidence laws are older than the 2a Just makes people feel tingly in their pants to think the government can't get into their encrypted anarchist cookbook or credit card numbers hint: the software would be shut down if they don't have a workaround Serious questions for you. Are American citizens considered innocent until proven guilty? Should American citizens have a right to privacy? Do they have a right to protect their personal/ important papers? Valuables? Family heirlooms? Would you consider a high-end safe copacetic for storing such things? Would you dictate to an American citizen what safe he or she is allowed to purchase to store aforementioned items? What would be the digital equivalent of a high-end safe? Would you dictate to an American citizen what software he or she is allowed to have to store the digital versions of their personal/ important papers? |
|
Quoted:
Because you want police crippled in their ability to see child porn and money laundering and neonazi membership files? Destruction of evidence laws are older than the 2a Just makes people feel tingly in their pants to think the government can't get into their encrypted anarchist cookbook or credit card numbers hint: the software would be shut down if they don't have a workaround View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
All the fine upstanding citizens who need unbreakable encryption to hide their non-criminal files, right... Don't be fooled.. information is the new weapon. Having equal access to secure encryption is the modern equivalent to the 2A. Because you want police crippled in their ability to see child porn and money laundering and neonazi membership files? Destruction of evidence laws are older than the 2a Just makes people feel tingly in their pants to think the government can't get into their encrypted anarchist cookbook or credit card numbers hint: the software would be shut down if they don't have a workaround Since when were either of those things illegal? The Anarchist Cookbook is so legal you can buy a copy on amazon.com. |
|
Quoted:
Speak to the truth brother. Math is too powerful its only for 40k per plate donors. For the common man there is common core. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
Quoted:
Quoted:
Perhaps you can show us where the government has the authority to outlaw encryption algorithms and their implementations... Math is dangerous, and therefore should be illegal. This is just disingenuous Any digital information can be "numbers". Are saltpeter, metal pipes, and sulfur dangerous and illegal on their own? Do you believe that mathematical algorithms should be illegal. Speak to the truth brother. Math is too powerful its only for 40k per plate donors. For the common man there is common core. FIFY |
|
Quoted:
Serious questions for you. Are American citizens considered innocent until proven guilty? Should American citizens have a right to privacy? Do they have a right to protect their personal/ important papers? Valuables? Family heirlooms? View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
Quoted:
All the fine upstanding citizens who need unbreakable encryption to hide their non-criminal files, right... Don't be fooled.. information is the new weapon. Having equal access to secure encryption is the modern equivalent to the 2A. Because you want police crippled in their ability to see child porn and money laundering and neonazi membership files? Destruction of evidence laws are older than the 2a Just makes people feel tingly in their pants to think the government can't get into their encrypted anarchist cookbook or credit card numbers hint: the software would be shut down if they don't have a workaround Serious questions for you. Are American citizens considered innocent until proven guilty? Should American citizens have a right to privacy? Do they have a right to protect their personal/ important papers? Valuables? Family heirlooms? Of course, unless a warrant from a judge gives the police the right to take such as evidence. Furthermore the federal case In re Boucher it was ruled that a defendant may be forced to produce the unencrypted contents of their files. Someone could conceivably remain in prison for life in Contempt of Court for failing to do so. |
|
Quoted:
Because you want police crippled in their ability to see child porn and money laundering and neonazi membership files? Destruction of evidence laws are older than the 2a Just makes people feel tingly in their pants to think the government can't get into their encrypted anarchist cookbook or credit card numbers hint: the software would be shut down if they don't have a workaround View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
All the fine upstanding citizens who need unbreakable encryption to hide their non-criminal files, right... Don't be fooled.. information is the new weapon. Having equal access to secure encryption is the modern equivalent to the 2A. Because you want police crippled in their ability to see child porn and money laundering and neonazi membership files? Destruction of evidence laws are older than the 2a Just makes people feel tingly in their pants to think the government can't get into their encrypted anarchist cookbook or credit card numbers hint: the software would be shut down if they don't have a workaround |
|
Sign up for the ARFCOM weekly newsletter and be entered to win a free ARFCOM membership. One new winner* is announced every week!
You will receive an email every Friday morning featuring the latest chatter from the hottest topics, breaking news surrounding legislation, as well as exclusive deals only available to ARFCOM email subscribers.
AR15.COM is the world's largest firearm community and is a gathering place for firearm enthusiasts of all types.
From hunters and military members, to competition shooters and general firearm enthusiasts, we welcome anyone who values and respects the way of the firearm.
Subscribe to our monthly Newsletter to receive firearm news, product discounts from your favorite Industry Partners, and more.
Copyright © 1996-2024 AR15.COM LLC. All Rights Reserved.
Any use of this content without express written consent is prohibited.
AR15.Com reserves the right to overwrite or replace any affiliate, commercial, or monetizable links, posted by users, with our own.