Letter Re: Digital Security

The writer of Digital Security Part 1 had a lot of interesting and relevant things to say on the topic. One thing I would ask him and the rest of SurvivalBlog readers to take into account is that although Firefox is a very functional browser and one of the best, their leadership espouses some rather un-Christian principles, even to the point of expelling members of their leadership who made a stand for morality. I have switched to a Firefox emulator called Pale Moon, which functions just like Firefox but without the moral equivalence. –JT




Letter Re: Communications In Dark Times, by J.B.

Hugh, Independent communication is really important. First thing you observe when you go to an ARRL local meeting is the intelligent, charitable, genuine nature of the people involved. Second, the information that the Technician License test preparation material contains is laterally applicable to other prepping activities if you want a deeper understanding of what is around you and what you have to accomplish. An example is the information about direct current (DC) electricity used in radios and generated by solar power systems. Alternatively, learning about repeaters and their positions and coverage make you very aware of your surroundings. You also …




Letter Re: Digital Security

HJL, Where TrueCrypt left off, VeraCrypt has picked up the baton. (It has the exact same interface, same features with improvements made behind the scenes.) The TrueCrypt letter specifically said that there “May still be unresolved security issues…” They didn’t say it wasn’t secure. They were quite vague. They were in the middle of an audit and quit before the results came out. VeraCrypt takes the results of the audit and appeared to correct some of the very minor issues. I was impressed by how few they are (i.e., increasing some iterations from a few thousand to hundreds of thousands), …




Letter Re: Digital Security

Hello from Russia! This Friday, SurvivalBlog mentioned “Digital Security- Part 2, by Dakota”. As a computer specialist and a paranoiac, I must warn you about two things. Bitmessage is absolutely secure. (I mean that nobody can read an encrypted message or find the sender or recipient or fact of communication between them.) But the price of this fact is too high and is a security hole by itself: Bitmessage client sends your message to every other client. What does it mean? In reality, every client would receive all the traffic the system creates. If, say, every one of 100 users …




Digital Security- Part 2, by Dakota

Secure Email (continued) Public key encryption works like this: you have two keys– a public key and a private key. Your public key is just that; it’s something you share with the public. Think of it as more of a padlock though. When someone wants to send you an email, they lock it with this padlock. No one along the way can see what’s inside the email (not even your email provider). When you want to read the email you use your private key just like you would use a literal key to unlock, or rather decrypt, the message. Your …




Digital Security- Part 1, by Dakota

Before we begin, note that the title is a bit of a misnomer. Digital security is mostly nonexistent. When computers took off, security was never a concern, so they are inherently insecure. I will do my best to help you secure your computer as much as possible. The point isn’t to make your computer invulnerable to attack. That’s impossible. However, just like your survival retreat security, the goal is to make yourself such a hard target that hackers or the government move on to lower hanging fruit. Again, nothing in here will make you immune to the NSA. They have …




Letter Re: Comment on Communications by J. B.

Greetings, Morse code is still encouraged and is definitely a useful skill. He also mentions ARES. In addition, there is another group of emergency communication volunteers, RACES (Radio Amateur Civil Emergency Service), which is called into action in the case of a major emergency. If interested, I would encourage an Internet search for more information. By and large, his article is very useful. – S.S.




Letter Re: Communications in Dark Times

HJL, I want to point out one thing J.B. might have overlooked. Part 97 of the FCC’s rules governing Amateur Radio allow the government to suspend privileges in an emergency. While they can’t turn off the airwaves, there are things they can do: Monitor the airwaves. (It’s difficult to cover them all, but possible.) Jam signals in popular frequencies (if not all). Arrest violators. Turn off at least some if not all repeaters. (Our county’s repeaters are partially funded by our EOC. All employees of the EOC are amateur operators, and they can control all of our county’s repeaters.) Intimidate …




Communications In Dark Times, by J.B.

We all take our glorious electronic communicators for granted today. Got a problem? Search the web. Driving to work and realize you forgot to mail an important bill? Call home and ask your family to drop it off at the post office for you. Need directions? Just ask your phone. What if you suddenly lost the use of these wondrous conveniences? Who hasn’t experienced this at some point? Poor signal strength, cell towers under maintenance, power outages, and more can take your connectivity offline. The more we rely on these amazing conveniences daily, the more annoyed we are when they …




Letter Re: Google Almighty

HJL, Do I speak blasphemy? Do I speak heresy against the almighty, all-knowing, all-seeing Google? Yes, I do and proudly proclaim my disgust with Google and their we-know-better-than-you mindset. In fact, they have accumulated so enormously and stupendously much data that they have concluded they know everything, and since they know everything they can decide what you should know and what you should not know. That’s right. Google has decided to filter the search results it presents to you in the name of Internet quality, and I can’t argue that they do not have a right to do this, but …




“Internet” Without Infrastructure – Part 5, by R.H.

The Postmaster network Postmasters, of course, will be able to communicate through this network between themselves and share information. In this way, they will know the health of the network in various areas. They will be the first ones with the most knowledgeable about encryption and programs that are available. At first, many Postmasters may not know much about encryption or how to use the tools, but they can learn about it and even share copies of the software through the network. As soon as most Postmasters have mastered it, they can start providing encryption as a service across the …




Two Letters Re: “Internet” Without Infrastructure

HJL, Almost precisely this concept was described by the New York Times back in 2004, except instead of exchanging files on USB keys, they were exchanged via a small computer on a moped that connected to an access point in each village as the moped drove through. From a technical perspective, the solutions are nearly identical and the two could easily be combined, not to mention combining with amateur radio VHF and/or HF links for high-priority or long distance communications. – J.F. o o o Hugh, The “Internet” Without Infrastructure article by R. H. is very intriguing. It makes sense …




Notes for Friday – April 24, 2015

April 24th is the birthday of Carolyn Cole (born 1961), a well-known staff photographer for the Los Angeles Times. For a few years in the late 1960s, the Cole family lived next door to JWR’s parents’ house in Livermore, California. That little girl with whom he played hide-and-seek would grow up to earn a Pulitzer Prize, two World Press Photo awards, and be named Photojournalist Of The Year. Congrats and Happy Birthday, Carolyn! o o o SurvivalBlog would like to welcome Pika Energy as a new advertiser. They specialize in innovative off-grid power solutions and have U.S.-made hybrid wind and …




“Internet” Without Infrastructure – Part 4, by R.H.

Protocol Refinements There are many refinements that can be used to improve efficiency and reduce the number of files to be processed, when dealing with local communication. However, these must always remain discretionary, so that they can be dropped at any time if situations change, or they are found to be unworkable. For example, directories (or folders) can be used to separate messages into different destination areas, organized by State. This reduces anonymity somewhat, but it can help organize messages and keep traffic down within local areas. If you know for certain that the recipient is in California, create a …




“Internet” Without Infrastructure – Part 3, by R.H.

Basic Techniques and Definition of Terms (continued) Sending a message. Sending a message consists of creating a text file containing the message, naming the file as described above, and getting it into a Postmaster’s pouch or multiple Postmasters’ pouches. If you don’t have a way to create a file yourself, a Postmaster can help you. The smaller your message is the better chance it has of getting through. You don’t need to go crazy with this. A message that is only 20 characters in length is not really any better than a 1K file (1024 characters). When writing out large …