mirror of
https://0xacab.org/optout/into-the-crypt.git
synced 2025-03-04 12:19:37 -05:00
Header edit + live boot addition
This commit is contained in:
parent
9b68f3b9c1
commit
c22e2544ec
@ -17,7 +17,7 @@
|
||||
- [Browsing](#browsing)
|
||||
- [Browser Configuration](#browser-configuration)
|
||||
- [Search Engine](#search-engine)
|
||||
- [Live media alternatives](#live-media-alternatives)
|
||||
- [Live Boot](#live-boot)
|
||||
- [Physical Destruction](#physical-destruction)
|
||||
- [Cryptography](#cryptography)
|
||||
- [Randomness](#randomness)
|
||||
@ -175,7 +175,7 @@ DuckDuckGo (DDG) [^19] has long been used as an alternative to Google. It is wor
|
||||
Searx instances [^20] are decentralized search engines that can be stood up by anyone. Decentralization with Searx doesn't remove the issue of inherent trust that must be placed in the instances, but it ensures that you have control in where you place your trust. This also enables people to stand up their own instances and configure them with better protections. Decentralization is preferred, however some of the instances are likely ran by intelligence agencies.
|
||||
|
||||
|
||||
## Live booting
|
||||
## Live Boot
|
||||
Live media (USB or CD) can be booted from in a process called Live Boot. Data is prevented from being stored on the hard drive of your computer (so long as you do not attempt to decrypt your hard drive that is detected). Nothing lives in permenance from the live boot. This is a useful tool for the privacy conscious as there is little to no cleanup process of your actions. Some operating systems such as The Amnesiac Incognito Live System (TAILS)[^21] are forensicly conscious and wipe the data from the device's physical memory once the USB is removed or the system is shutdown. This is not always the case for live media. Be conscious of network activity living on in permenance. This is where the use of strong cryptography can come into play from Virtual Private Network (VPN) configurations to the use of TOR. Live booting reduces the effectiveness of the Cold Boot attacks. Cold boot is heavily reliant upon data that is temporarily stored in Random Access Memory (RAM).
|
||||
|
||||
Note:
|
||||
@ -184,6 +184,9 @@ Live media (USB or CD) can be booted from in a process called Live Boot. Data is
|
||||
Linux allows this via the "magic" SysRq combo SysRq+o. This is available by default on some OSs, but needs to be enabled manually on others.
|
||||
Parrot enables many SysRq commands by default. Among those allowed by Parrot include SysRq+o (immediate poweroff, with no shutdown cycle).
|
||||
|
||||
Systems can be started in non-persistent sessions with the use of the `grub-live` and `grub-live-default` are packages. `grub-live` boots to persistence by default, while `grub-live-default` starts directly to a non-persistent session.
|
||||
|
||||
Note: These packages are primarily available for Debian-based systems
|
||||
|
||||
## Physical Destruction
|
||||
Physical destruction of critical operation data is advised. Institutional authorities such as the National Security Agency (NSA) and Department of Defense (DoD) see no value in the wiping of critical data. If they believe data is at risk or a device under classification is to be removed from a closed area, all media drives must be completely degaussed. The lesson to be learned here is that if institutional authorities do not trust wiping and overwriting methods, be cautious in your operational threat model. If your life depends on the media being sanitized, save yourself the stress and physically destroy it. If your operation would have adverse consequences if you are caught, there is no room for sentiment.
|
||||
|
Loading…
x
Reference in New Issue
Block a user