What do you think about adding some baking soda or something and making powder for example with 10% of 2c-b... would it be better to snort... Also crushed 2c-b pill should not cause much pain as pure 2c-b... Am I wrong?
ew adding baking soda will make it just more nasty shit to snort. Crushed up pill should be A - Okay. I would imagine it could cause less pain but would still prob hurt.
No! Just snort it man. Don't try to change the chem. It burns, but it works. If you put filler/binding in there it will just slow the absorption. You snort it for a reason, to let it kick in faster. BTW binary, do you have your virtual memory encrypted?
what the hell do they put as binders in a 2cb pill? not sure i'd wanna snort all that but also pretty sure i just wanna eat my 2ce/b snorting is more dangerous, painful as hell, and a shorter experience. pointless for me
If by virtual memory you mean swap space, then yes. If by virtual memory you mean the actual RAM then no, it could technically have someone flash freeze it with liquid nitrogen and plug it into a special forensics laptop if they managed to get it out with in about five minutes or so of me cutting power to the computer. They could then use this to try and pull the encryption key out of ram. Its an unfortunate exploit against drive or mounted encryption, but I employ two levels of encryption anyways. Entire hard drive including SWAP space for everything (even OS is encrypted sans a boot sector, which could be on a USB key). Then individual sensitive files are encrypted separately with GPG. Some people who run servers for 'sensitive projects' will go as far as to wire power supply into doors and windows leading into the room, like an alarm system sort of, so when it is switched to that "grid" if a door is forced open or a window is forced open it makes the power to the computer be cut and the memory state decay time will instantly start. That plus running the actual server in a metal case with no open ports and locked shut would make for the best system, but even I am not that paranoid ;-). Plus I use a laptop usually lol. Oh for servers don't forget to also set a bunch of scripts up, so if anyone connects to the server from anyone but localhost via the Tor network (tor hidden service) or logs in to terminal, or ANYTHING not pre-predictable happens, it dismounts a virtual drive everything sensitive is on, that has deniable encryption too ;-). Damn you really got me started hehe sorry to drag thread off topic. Computer security systems are my main addiction ;-).
Dude why are you so paranoid binary, seriously everything you do is absolute overkill. I think you know more than the idiots who aren't investigating you.
^^^ Lmao Yeah I know binary. I know you better than you think I do agree though, that is overkill. You obviously don't do that, cuz there is no point in having a server to surf the net. I know a lot about computers, just not as much as you! You are a psycho! Thats a good thing though. You should join the military to use your skillz. PSYCH. What a waste of a beautiful mind... So you use linux then huh? Thats pretty cool. Yeah, I ment the swap/virtual memory. I just started to get into it too. The security part that is. I have my swap space set on a 128bit encryption. Weak pass tho. I also used truecrypt to encrypt all my sensitive files with AES then serpent. Sensitive files are now deleted with a 35 random char. pass. I use a asci password for that one. Generated with no patterns involved. Total randomness. I am already in Iraq, so I am not worried about laws or tracking right now, but when I get back I am going to use tor too. (P.S. Just incase you would like to know, (if you don't already) We just had a new standard come out for purging secret computers with Killdisk. An upgrade from 4 passes to 6 passes. Military standard. Although I think anything above 4 is overkill, I still use 35 cuz thats default )
the 35 pass guttman wipe was designed for very old hard drives. Any hard drive made in the past eight or nine years has such a dense platter that an 8 pass wipe will provide as adequate of protection, and wont take near as long. Hey we really shouldn't derail this dudes thread though. I will make a post in the computer subforum about security and post a link in this thread so we can continue the conversation over there. I like to talk about security in the synthetic drug section just cuz a lot here source online and need to know to be secure, but I don't want to clutter drug threads with computer conversations.
It would take them minutes back in the lab to get whatever data off of your drive that they wanted. There are companies that even recover data from computers that have been in/near fires.
This will def not do anything. Thats like asking if spilling water on a CD would ruin it. It is a disk inside of a pretty tough container(s). And from what binary said before, if you break it with a hammer a few times they can still get it off. Safest way is encryption and secure delete.
I took 2 pills last night(probably 10mg every)... Now I now what means "mind candy"... It was very, very fun... And sex was fantastic, maybe best sex ever... Laughing all the time.. Very nice visuals... Good for meditation.. Too short duration... Very little mind fuck... All in all great drug but I would always prefer LSD or some other true entheogen....
Yeah spilling water wont help at all. Pounding the shit out of it with a hammer and then somehow cutting it into ten different pieces wont work either, nor will shooting it with a gun. You could melt it if you have access to something that can melt a hard drive. That would be perfectly secure afaik as long as the entire platter is molten. You could use an extremely strong magnet on it, that should be pretty damn secure too. Or encrypt it and use data wipes. Data wipes are pretty much using a strong magnet anyways, in a way. That is the most realistic option, and if done properly is essentially as secure as actually melting it down or grinding it into very small particles. Really all that a non-encrypted non-wiped hard drive that is cut into a few pieces is, is a very complex jigsaw puzzle. The actual data is stored on metal magnetically. If you cut it in two, they can just look at each tiny section of metal with a magnetic microscope and determine if it is a 1 or 0. They do this for all parts of the hard drive, and get a lot of data that way, including entire files. Then they can try and recunstruct the data on an actually working hard drive. Same with shooting holes clear through it. All that you are doing is wiping a relatively small amount of bits off the drive when you punch a hole through the platter somehow. The other bits are all still there ready to be looked at with magnetic microscopes and reconstructed into files and such. If you pound the shit out of it with a hammer, you will distort the drive so it can't be directly read, but it isn't much of a challenge to a magnetic microscope which looks at it a bit at a time. Keep in mind data recovery off a drive that was pounded to hell with a hammer and then cut into a couple of sections or GREATLY distorted up and roughed up, would be way expensive and time consuming and would require highly trained experts to do it, not something they would do against most people (although just pounding it a few times with a hammer not fucking it up too bad, or even running over it, etc, FBI pulls data from minor to mediumly damaged drives all the time, and has the ability to from severely damaged drives if they think you are worth it). But even if you are worried of magnetic microscopes or not, might as well use data wipes and encryption, then you don't ruin a perfectly good drive and actually get far better security anyways lol. The text "Account Number: 2333" translates to "01000001011000110110001101101111011101010110111001110100001000000100111001110101 01101101011000100110010101110010001110100010000000110100001100110011010000110011" in binary. Although it may be different on the hard drive depending the format it is stored in, there are algorithms that can search through bits and find fingerprints of programs and try and reconstruct the file based on that. I think EnCase is the name of the program FBI uses for this, but that might be used for a bit less specialized tasks. All files on your computer are stored in binary format. Even pictures for example, each pixel of color in a digital picture is merely your graphics cards representation of a 32 bit string. So a picture that is 1000 pixels is only a series of 32,000 bits before your graphics card looks at it and uses it as a blueprint to tell your monitor what images to make on the screen. Same for MP3s, whatever. Anyways, if you cut your hard drive in half, they will possibly find either "01000001011000110110001101101111011101010110111001110100001000000100111001110101 01101101011000100110010101110010001110100010000000110100001100110011010000110011" on one half by examinding the hard drive at a bit level (each 1 or 0 is represented by a magnetically charged small small small bit of metal). Or even if you cut the drive in half, they might find "01000001011000110110001101101111011101010110111001110100001000000100111001110101" on one half and "1101101011000100110010101110010001110100010000000110100001100110011010000110011" (missing one starting 0) on the second half. Wont take them to long to piece it back together. What the wipe programs do, is they go over "01000001011000110110001101101111011101010110111001110100001000000100111001110101 01101101011000100110010101110010001110100010000000110100001100110011010000110011" with the hard drive head and change it to "000000000000000000000000000000000000000000000000000000000000000000000000000000 0000000000000000000000000000000000000000000000000000000000000000000000000000000" Depending on how good their magnetic microscope is, they could possibly determine if the current 0 used to be a 1 or a 0 based on the strength of the magnetic force. That is why most wipes go over the hard drive with multiple passes (35 for gutman, 8 random passes of data is what I use when I do wipes). The randomness factor plus 8 passes makes it pretty much impossible to pull data off even with a magnetic microscope. Now for a horribly over-simplified explanation of encryption. So we have the bit sequence: "01000001011000110110001101101111011101010110111001110100001000000100111001110101 01101101011000100110010101110010001110100010000000110100001100110011010000110011" on the hard drive which says the account number like I said before. Now you take a keyfile that consists of usually 128 or 256 random bits (which can be used to represent trillions of trillions of trillions of trillions of numbers). And your key is multiplied by the bits on the hard drive. For example lets say your key is 10101010 (thats an 8 bit key, not secure obviously). "10101010" * "01000001011000110110001101101111011101010110111001110100001000000100111001110101 01101101011000100110010101110010001110100010000000110100001100110011010000110011" = "10101101101100000000000000100000000011111110110101100100011101011101000001100110110010" Now when you are not using your file, it is stored as what that equals. If they look at it on the hard drive platter, they see numbers they can't get any real data from (although they could easily brute force it in this case, or use all sorts of cryptanlysis techniques, this is for demonstration of the basic concepts only!). When you want to be able to use the file, you divide "10101101101100000000000000100000000011111110110101100100011101011101000001100110110010" / "10101010" = "1000001011000110110001101101111011101010110111001110100001000000100111001110101" and you have your file back. If you are using a 256 bit key (115792089237316195423570985008687907853269984665640564039457584007913129639936 possible keys are this big), and protecting it with a strong password, and using a strong algorithm that is cryptanylsis resistant, and using a powerful random number generator with good sources of entropy to generate your key, even a quantum computer isn't going to be able to decrypt your shit.
^^^do you work for a computer company or something? or work for yourself? basically i'm asking are computer your job or hobby?
may i ask what your job is? i dunno know if i know that much about my hobbies i know more technical stuff about my job - in a yeast lab at graduate school
I am a student, although I don't study computers formally. I don't really have a job. I do a lot of 'security work', mostly computer but also other things, for people, but so far have never been directly paid for it. It has benefited me greatly that the groups I work with are secure though, although this has been indirectly. The past few years I have independently studied security (with a strong emphasis on computer) and digital forensics and treated it like a full time job pretty much (i spend ~8 hours or more a day reading papers and ebooks related to the subject, plus conversing with other interested folks). Mostly because I like to know how the systems keeping me safe actually work. I don't trust something unless I understand it. Recently I have been learning more about non-computer related security, mainly telephone / voice communication systems. One of my friends hacked his phone and managed to get encryption software running on it, I want to learn how to do that. I also have been learning about how to prevent triangulation by using external narrow beam directional antennas. One relevant trick I learned from phones; how to counter GPS tracking of cellphones, and remote eavesdropping by compromised cellphones having the microphone turned on and transmitting recordings back to the adversary (its simple, put it in an anti static bag during movement and physical sensitive conversations, and it will totally kill the signal and prevent others from 'hacking' into it. This technique is also good for picking up packs that might have bugs in them to, as actually has happened to a dude who picked up a pack from a fake ID po box that had a transmitter in it and promptly brought it back to his house which was raided shortly after. That was large amounts of schedule ones though. He should have put the pack in an anti static bag, taken it to a fast food place, opened it in the bathroom, got the bug out and got the fuck out of there). I have had much contact and a good bit of 'tutoring' online by some extremely skilled and intelligent people who are actually professionals in the fields of security, 'black ops' (mostly vendors and carders, although some who are paid to set up security systems for companies doing things they don't want connected to them), computers, anonymity networks, etc. I am really pretty novice myself, I get far too much credit here for things that are really pretty simple. Some people are *extremely* good with security systems, and go to extents even I consider overkill in complexity. I like to share what I know with people who would benefit from it, and save them a shit ton of research by condensing it together. I personally get a great deal of satisfaction from learning of security techniques though, its my favorite thing ever. Although I am getting my formal education in something else, I would absolutely love to do freelance 'black op' security for a living, but my skillz are not there yet and quite possibly never will be. Also: I do worry at times though that me talking so much about security and not so much about actual synthetic drugs might get on peoples nerves.....and am sorry that I derailed this thread =<. Sorry original poster.
Personally, I don't think he mentioned anything most computer people don't know. If you know how to use a computer, then you should know all that :\ (No discredit to Binary though, he's an awesome dood)
No discredit taken, I totally agree. Everything I talk about doing is pretty simple to do. Understanding the concepts behind it is much harder, but you don't really need to do that if you are not interested yourself.