Contractor Anon ID: 000000 April 29, 2020, 5:09 a.m. No.8960163   🗄️.is 🔗kun   >>0217 >>0234 >>0297

The most secure comms have little to do with notes passed using gaming platforms….that is amateurish.

 

The modern smartphone contains an SDR that can operate out-of-band.

 

The allocated frequencies are in very wide use and when received from space present as a incomprehensible roar of of noise.

 

But shift the SDR outside the usual frequencies and that weak smartphone signal of 600mw or less can be used for modest local comms or can reach the array of NRO Big Birds in geosynchronous orbit to deliver worldwide comms, audio, data.video.

 

This solves the communications problem but does not make the comms secure.

 

The security problem is due to the fact that with a smartphone you are dealing with a totally untrustworthy device. The powers that be went to great length to ensure comms for the ordinary people were compromised. Even an attempt to add weak encryption was shot down because "even though we can break it it will take so long that it will prevent looking at everything in real;-time" …thus our phone system is totally insecure.

 

But there is a simple was to carry out top-level secure comms using an ordinary smartphone. The phone itself is unsecured and the medium through which the data passes is also unsecured…so what to do?

 

more2com

Contractor Anon ID: 000000 April 29, 2020, 5:12 a.m. No.8960175   🗄️.is 🔗kun

You can pass secure data using an insecure device that is transmitting over an insecure medium…it is actually quite simple.

 

What is needed is a small, secure device that is well vetted for security.

This device will be air-gaped from the smartphone…the phone does not know of its existence. The simplest method would be to use the old one-time-pad method (it's long in the tooth but can come back into its own due to massive micro SD cards)

 

A one-time-pad requires a massive amount of truly random numbers to function, ones and zeros..like the flips of pennies. In the past such enormous tombs of numbers were very cumbersome but with a cheap micro SD card you can hold mountains of such random numbers.

 

The numbers are easily generated using random physical sources such as Brownian noise or radioactive decay….done correctly even the most intense scrutiny of the random data produced will find no crib to get into the system.

 

So to use this simplest of secure encryption systems over the unsafe smartphones and unsafe networks you generate true random numbers and fill two or more micro SD cards with an identical set of random numbers.

 

Place the encryption device on a key chain, in a pocket or purse and when you initiate a call pull out the device and place near the phone and press a button that will use DTMF tones to connect to an identical device at the remote location. (the system is set up to handle DTMF very well)

 

You would then use the small encryption device to enter txt messages…when done just hold near phone and play the tones to the distant user.

 

A small amount of data housekeeping chores ensues and is over in a fraction of a second, then the end user sees your original txt scrolling on his device. As the random numbers are used up by each short comm they are scrubbed in both micro SD cards and nothing can ever recover them. So even if one device falls into the wrong hands it's not possible to reconstruct prior comms.

 

All cryptographers have long known that the one-time-pad was totally secure. there is a mathematical proof detailing this security. The problems have been key-distribution and the incredible bulkiness of the system as the key is as long or longer than the data you wish to send…BUT the advent of cheap SD cards makes this all so much easier to deal with. One-Time-Pad or OTP cannot by technical means be broken, not now, not a billion years from now…no number of sophisticated quantum computers could EVER break it..it is NOT among the functions they can perform. They will decrypt public-key crypto (someday)

Anonymous ID: 000000 April 29, 2020, 5:14 a.m. No.8960187   🗄️.is 🔗kun

>>8960110

Works exactly the same. Electron count gives strength of bond between elements. Hydrogen, with 1 electron, sticks to most anything, Helium, with 2electrons, requires higher energy to inflate the cloud (ionization) such that it bonds with others. It's why its the first "noble Gas", it was easier to separate.

Anonymous ID: 000000 April 29, 2020, 5:16 a.m. No.8960194   🗄️.is 🔗kun

>>8960098

Well, anon, it's not like we're swimming in a sea of disinfo from both sides, or anything like that. I mean, puzzle games can be fun, but getting the skinny without coded language is most helpful, too, when it comes to doing things like taking care of the elderly or spending time #TogetherApart or whatever the fuck we're supposed to be doing, right now.

 

In short, you don't need to apologize for anything. Go to the grocery store, and take a look around you. Are you one of a few people not wearing a mask? You're god damned right. How are we going to fix that?

Contractor Anon ID: 000000 April 29, 2020, 5:32 a.m. No.8960257   🗄️.is 🔗kun   >>0307 >>0317

Now it is not necessary to rely on txt messages alone, if you use large SD cards you would have stores of randomness to handle an enormous amount of voice and video traffic as well.

 

One must take care though! Certain smartphones do not have just one mic, some are internal and very sensitive…mainly they pick up and store/forward voice. When you muffle the phone with your sleeve to speak privately to someone standing by the inner mic might catch the conversation.

 

Thus, if you are going to use voice on such a system then a small white noise device would be needed so you could inject the phone with a masking noise and thus removing any abilities of an internal mic…ditto with cams…drop the smartphone is a sack or place in pocket or purse if you are paranoid.

 

Video can also be transferred. It uses up a great deal more random data of course, But it you are using a pair of 512gb SD cards you can send a lot of video and images…albeit the transfer rate will be sluggish…short clips are your friend. Military systems can transfer video/audio in real time….what do you think they are gawking at in the situation room…its' possibly someones cellphone that has had a patch downloaded to function as a relay.

 

Now. The same setup could be made much easier to use by building it into a snap-on hard case for the various phones…this can work but care would have to be taken to not leak any clues to the insecure smartphone as no telling what is inside there.

 

Foe the ultimate paranoid I suggest going with a dongle that can go in your pocket\purse and send txt messages.

 

Now PLEASE be aware that this will ensure the total security of your comms but the telcos will still have your metadata!

 

I will post again and describe in detail three methods that can negate the use of metadata…the best you can do to mitigate the metadata is to follow strict rules and use burner phones. preferably purchased using a buyer that you don't know.

 

The safe way to gather together comms gear that cannot be tracked back to you would fill a small book…I intend to write that book. and others.

 

More later relating to communications tricks.

 

i.e. Like how to buy a cheap 20 dollar handie, take it to the middle of nowhere, put it on the right frequency and get access to some very interesting people.

 

For now, never have a burner phone with a battery installed ANYWHERE near you..feds love burner phones..lol

 

This is because idiots pull out a burner phone and use it while their real phone is in their pocket…..The morons Struck and page did this…now the two phones are linked together by close proximity…stupidity.

 

Use burners far from your real phone,far from your home, far from your gym, far from your associates, far from cameras. NEVER call anyone who is a known associate of you, you will need a trusted someone to carry the message to the recipient. Don't use a burner in the same place twice or a visitor may be waiting.

 

Use deception, use a burner in the midst of your enemies, or in their place of work/refuge….it will make them very paranoid.

 

Keep in mind that just listening to a receiver can be dangerous…

 

On the back of all radios you will find a sticker that says the device is part 15 compliant. What this means is the rf that the receiver transmits is below an acceptable level. The intermediary frequency that the radio transmits on is generally 10.7mhz up or down from the signal you are monitoring. so, someone could conceivably determine what frequencies your radios were tuned to..and this might be important so beware.

 

Radio stations used to park cars along the highways and could count the number of drivers tuned into their station as a good test of their popularity.

 

When it comes to computers, radio, electronics their are many tricks.