User Panel
|
|
Quoted: SOOOOO many issues to cover here. No matter how secure you think your electronic communications are, they are never secure. It's stupid to trust them. You can trust long term relationships to a point, but only to a point. Unless you live with them daily, you never really know if they've been compromised. Even if you know and live with them, when the pressure is applied, are you SURE they won't squish on you? Really, the best scenario is to know what needs to be done, do it on your own, and hope that people are smart enough, intrepid enough, and conscientious enough to follow example. No women, no kids. View Quote I got a warning for expressing thoughts that are counter to part of your last paragraph. What do you do to a thug who’s in an armed .Gov group fucking with your family? |
|
|
Quoted: Biden already said rights arent absolute. View Quote View All Quotes View All Quotes Quoted: Quoted: Well it should be interesting to see if they ignore the 4th or do an end-around to use the info in court. Biden? Lol. That dipshit was probably thinking about lefts when he said it. |
|
(Top) men in the middle and/or from someone was flipped post 1/6 and/or someone forgot to log out?
|
|
There is a big difference between an encrypted communication between just Bob and Alice versus encrypted communications between Bob and some group of random people he found on Facebook. Bob is also screwed if Alice hands her phone over to the feds to cut a deal.
|
|
|
Quoted: There is a big difference between an encrypted communication between just Bob and Alice versus encrypted communications between Bob and some group of random people he found on Facebook. Bob is also screwed if Alice hands her phone over to the feds to cut a deal. View Quote Naw dude they were these clean cut bros we met at this rally that time. No way they were feds. |
|
Quoted: SOOOOO many issues to cover here. No matter how secure you think your electronic communications are, they are never secure. It's stupid to trust them. You can trust long term relationships to a point, but only to a point. Unless you live with them daily, you never really know if they've been compromised. Even if you know and live with them, when the pressure is applied, are you SURE they won't squish on you? Really, the best scenario is to know what needs to be done, do it on your own, and hope that people are smart enough, intrepid enough, and conscientious enough to follow example. No women, no kids. View Quote Yep, my told me several times "The only way to keep a secret is for you to be the only who knows it". |
|
People forget how the Clintons wanted to keep copies of All of your emails.
|
|
|
This all supposes it's not faked. Which I'm just as inclined to believe as anything else.
|
|
|
They had a phone that was a member of the group and unlocked.
|
|
FBI arrests Oath Keepers leader on charge involving Jan. 6 Capitol attack l WNT |
|
Quoted: Quoted: Informant. You get that many people in a secure communication, you can bet it isn't secure. https://i.imgur.com/AHtW4xy.png Hahaha I came here to post this They don't even have to have an informant beforehand. It's possible to keep a device from synchronizing the date/time and resetting it so messages never expire (30 day expiration is the minimum time), then persuade someone to enter a plea bargain in exchange for giving up all the message they have on their own phone. Quoted: Keystroke logger or someone gave it up. Will be interested to see how Signal responds to this. But good chance they have already gotten a STFU letter from DoJ. A logger (of the keyboard input) wouldn't work so well unless they mostly all had been mutually infected with the malware, right? |
|
|
For everyone who says they can't read Signal - remember back in November we had a limited internet outtage, Chrome went down, Twitter, Facebook, Whatsapp, Signal... everything went down except Telegram.
If you download Telegram from iTunes or Google Play they can see what's in your messages. I've sent messages that were not politically correct and was told my attachment was blocked because the app was downloaded from Google Play. I removed it and reinstalled, to my Droid phone, directly from Telegram.org and those stoppages went away. If you got Signal from iTunes or Play, NSA is recording EVERY message you type and every word you speak. |
|
Quoted: I got a warning for expressing thoughts that are counter to part of your last paragraph. What do you do to a thug who’s in an armed .Gov group fucking with your family? View Quote View All Quotes View All Quotes Quoted: Quoted: SOOOOO many issues to cover here. No matter how secure you think your electronic communications are, they are never secure. It's stupid to trust them. You can trust long term relationships to a point, but only to a point. Unless you live with them daily, you never really know if they've been compromised. Even if you know and live with them, when the pressure is applied, are you SURE they won't squish on you? Really, the best scenario is to know what needs to be done, do it on your own, and hope that people are smart enough, intrepid enough, and conscientious enough to follow example. No women, no kids. I got a warning for expressing thoughts that are counter to part of your last paragraph. What do you do to a thug who’s in an armed .Gov group fucking with your family? I'm not sure what you're referring to, but if anyone was fucking with me or my family, theoritically of course, I would make them stop fucking with me or my family. And I would keep my mouth shut about how I did that. Forever. Theoreticaly, of course. Some people don't get that. Just never mention it. The second you do, someone has an angle on you. I hate a braggart. Don't be a braggart. Oh, you can brag about your car or house or prized pig. Just keep your secrets to yourself, and don't even hint at them. Be gray. Be the nice guy neighbor that helps people out, but doesn't get to know them. Be the guy that the news monkeys talk to your neighbors about, and they say "I don't know him well, but he always ran his snowblower to clear our driveways after the plows came through". Be the guy that no one can make an accurate sketch of, because they've never really had a good look at you. Don't be John Doe, be John Doe #2. The guy they never "found". Be the guy with the, what, Chargers hat? |
|
Quoted: They had a phone that was a member of the group and unlocked. View Quote Reading the indictment and doing a little side research these channels were not very secure. It also doesn't help some of them were posting their activities on public channels. It's interesting the indictment has a quote "it's not antifa it's us" The indictment is a mix of various social media posts, references videos they made, calls they made, and texts they made. |
|
|
|
Or the EULA you accept when using the Google and Apple stores to download Signal gave up the rights to any privacy like everything else on your phone.
|
|
I've seen worse posted on this site than what they said. I'm sure they were saying it figuratively, "This will be a civil war." Just tonight someone posted about watering the tree of liberty.
I think these indictments are a nothing sandwich and a bunch of cobbled comments to distract from the FACT that this was an FBI riot. |
|
|
Well, yeah. Duh. All they need is an informant in the Signal chat taking screen shots.
They didn’t use use some secret squirrel anti-encryption software; just good ol’ human psychology. This is why I operate as if everyone in my Signal groups is a fed. |
|
Well since I know all standard government computer systems are at least 10 years behind current technology standards, and the NSA wouldn’t tip their hand quite yet if they’d finally perfected quantum computing that could crack high level encryption, I’m gonna have to go with the obvious answer which is that someone handed them either all of the data or a method to access it.
|
|
|
Ray Epps is a big wig in OK, president of the Arizona state chapter in fact, he ordered the removal of the police barricades and signage before the crowds listening to Trump started towards the capitol.
It is interesting to me that as soon as people with power started asking the FBI pointed questions about. Epps this complaint dropped within 48 hours. It will probably be more interesting to find out who isn’t named, same as with the other conspiracy charges. Eps is still walking free. |
|
1. Lock your mobile device so others can’t access it if it is in their possession.
2. Lock your encrypted messenger app (Signal, Wickr, or Threema. Others are sub-par) so others can’t open it even if they gain access to your phone. 3. Set short message expiration (message self-destruct) so even if someone gets past 1 and 2 there’s nothing there except possibly the most recent messages The FBI has collected/confiscated more mobile devices related to Jan 6 than you can imagine and it’s a safe bet many did not have even the most basic security implemented. These recommendations are just basic steps for anyone to lawfully protect their privacy. |
|
You don't put a supercomputer to cracking civilian encryption for 6 months. You drag in someone who is in the circle of trust of your targets and hit his feet with a wrench (or show him the ironclad child porn charges you could drop on him) until he lets you into his phone.
|
|
|
Quoted: OathKeepers has a stranger in their house. Someone is a Fed CI and handed over the chats. View Quote Stranger hell They got Ray Epps in da house! https://www.washingtonexaminer.com/news/justice/doj-evades-questions-on-capitol-riot-informants-as-ray-epps-denies-working-with-fbi Video footage shows Epps, a former president of the Arizona Oath Keepers militia group, urging a crowd of Trump supporters on the evening of Jan. 5, 2021, to "go into the Capitol" the next day, provoking allegations from the crowd that he was working for the federal authorities, with chants of “Fed!” |
|
Quoted: Oathkeepers were probably well-stocked with folks who had FBI agents on their speed dials, right from the start. View Quote View All Quotes View All Quotes Quoted: Quoted: OathKeepers has a stranger in their house. Someone is a Fed CI and handed over the chats. Oathkeepers were probably well-stocked with folks who had FBI agents on their speed dials, right from the start. You would think so. |
|
encryption does not work when your group has dozens of informants in it.
|
|
Quoted: You would think so. View Quote "We're gonna start a national organization, made up of Military and LE veterans (and people who are neither), to Resist The Government!" Every Federal agent and their CIs on the Continent must have started salivating when they heard that. "My name's John Johnson, and I'd like to join and help Resist The Government....and I'm totally not a Snitch or Fed!" |
|
Didn’t the US pass a law requiring all encryption software contain a back door fort he fed.gov?
Like back in the 1990s. |
|
Quoted: "We're gonna start a national organization, made up of Military and LE veterans (and people who are neither), to Resist The Government!" Every Federal agent and their CIs on the Continent must have started salivating when they heard that. "My name's John Johnson, and I'd like to join and help Resist The Government....and I'm totally not a Snitch or Fed!" View Quote View All Quotes View All Quotes Quoted: Quoted: You would think so. "We're gonna start a national organization, made up of Military and LE veterans (and people who are neither), to Resist The Government!" Every Federal agent and their CIs on the Continent must have started salivating when they heard that. "My name's John Johnson, and I'd like to join and help Resist The Government....and I'm totally not a Snitch or Fed!" I mean, that is literally what the FBI does. |
|
Quoted: You don't put a supercomputer to cracking civilian encryption for 6 months. You drag in someone who is in the circle of trust of your targets and hit his feet with a wrench (or show him the ironclad child porn charges you could drop on him) until he lets you into his phone. View Quote I’m not trying to be obtuse…but don’t they just have to put his finger on the button, or put the phone up to his face and they’re in? |
|
|
Quoted: I’m not trying to be obtuse…but don’t they just have to put his finger on the button, or put the phone up to his face and they’re in? View Quote View All Quotes View All Quotes Quoted: Quoted: You don't put a supercomputer to cracking civilian encryption for 6 months. You drag in someone who is in the circle of trust of your targets and hit his feet with a wrench (or show him the ironclad child porn charges you could drop on him) until he lets you into his phone. I’m not trying to be obtuse…but don’t they just have to put his finger on the button, or put the phone up to his face and they’re in? No, they just need a finger print or a picture. |
|
|
|
|
Quoted: No, they just need a finger print or a picture. View Quote View All Quotes View All Quotes Quoted: Quoted: Quoted: You don't put a supercomputer to cracking civilian encryption for 6 months. You drag in someone who is in the circle of trust of your targets and hit his feet with a wrench (or show him the ironclad child porn charges you could drop on him) until he lets you into his phone. I’m not trying to be obtuse…but don’t they just have to put his finger on the button, or put the phone up to his face and they’re in? No, they just need a finger print or a picture. And that's why for both my wife and I, you need to know a certain design to unlock our phone. And after so many false designs, the phone factory resets. |
|
Quoted: And that's why for both my wife and I, you need to know a certain design to unlock our phone. And after so many false designs, the phone factory resets. View Quote View All Quotes View All Quotes Quoted: Quoted: Quoted: Quoted: You don't put a supercomputer to cracking civilian encryption for 6 months. You drag in someone who is in the circle of trust of your targets and hit his feet with a wrench (or show him the ironclad child porn charges you could drop on him) until he lets you into his phone. I’m not trying to be obtuse…but don’t they just have to put his finger on the button, or put the phone up to his face and they’re in? No, they just need a finger print or a picture. And that's why for both my wife and I, you need to know a certain design to unlock our phone. And after so many false designs, the phone factory resets. I don’t believe for a second the gov can’t get into any phone they REALLY want into. |
|
Sign up for the ARFCOM weekly newsletter and be entered to win a free ARFCOM membership. One new winner* is announced every week!
You will receive an email every Friday morning featuring the latest chatter from the hottest topics, breaking news surrounding legislation, as well as exclusive deals only available to ARFCOM email subscribers.
AR15.COM is the world's largest firearm community and is a gathering place for firearm enthusiasts of all types.
From hunters and military members, to competition shooters and general firearm enthusiasts, we welcome anyone who values and respects the way of the firearm.
Subscribe to our monthly Newsletter to receive firearm news, product discounts from your favorite Industry Partners, and more.
Copyright © 1996-2024 AR15.COM LLC. All Rights Reserved.
Any use of this content without express written consent is prohibited.
AR15.Com reserves the right to overwrite or replace any affiliate, commercial, or monetizable links, posted by users, with our own.