Tails for MacBook Users: Anonymity for the Survivalist, by Losttribe

Since the exposures of details regarding the NSA’s communication capture and domestic spying programs, many Patriots wish to keep their identities as anonymous as possible. Examples would be avoiding the tracking of us (who read online blogs, search for articles and information applicable in TEOTWAWKI, and make certain purchases that we feel are not the business of the powers that be) by those who wish to capture and store all of this detail for use against particular individuals and groups, whether it be in our current “big brother” era or future TEOTWAWKI. For many users, reducing your cyber footprint is …




Timeless World War 2 Lessons, by T.W.

After recently reading a number of books on intelligence, subterfuge, spying, and survival in World War 2, I have been led to compile a list of lessons that we can draw on today. Preparation is Key The best spy masters and espionage groups built up networks of contacts around strategic areas before the invasion or war. This allowed one to gain information without being seen as suspicious. If your spy doesn’t know the language thoroughly, errors in translation lead to disaster. A few weeks in language school is rarely enough, but that’s what many operatives received during World War 2 …




Letter Re: Does the Number of the Beast Have an Area Code?

Hugh, The worst part of ditching your tether is seeing how far gone the average person has become. I only write to point out something from the last paragraph. The author said, “The smart phone is a source of knowledge, and knowledge is power. Is it really empowering? Is it really making us more knowledgeable?” Knowledge is not the same as information. Your phone and the Internet, at large, have the power to put a mind-boggling amount of information in front of you. The average person who I encounter doesn’t know why you change the rotation on a ceiling fan …




Letter Re: Prepper Digital Security

Hugh, Just wanted to bring up a point about a couple of the letters to the editor. The article was meant as a primer as to steps that can be taken to digitally secure your data. There is no such thing as a 100% secure data system. It sounds good, but it is unrealistic. With that said, however, you can make it take such an inordinate amount of time to get to the data as to be “virtually” 100%. That is also the premise of DiD (Defense in Depth). You are employing a multi-layer shell of encryption and segmentation around …




Letter Re: Prepper Digital Security

Hi Mr. Latimer, As I read the post “Prepper Digital Security” and then, later, the “Letter Re: Prepper Digital Security”, I kept thinking back to an old XKCD comic strip simply titled “Security”. Both those articles have some great advice in them, but I caution you and your readers from thinking such measures will make you safe. As is often the case in the field of digital security, humans are the weakest link in our defense strategies; I encourage you to keep that in mind. Happy New Year – Z.S.




Letter Re: TruCrypt

Hugh, Of course people should do what they are comfortable with, but TrueCrypt is still safe to use. For those who want the “new and improved” version of what was once TrueCrypt, there is now “VeraCrypt“—and-its-better Users should note that even though it looks and acts like TrueCrypt, VeraCrypt can NOT decrypt files that were encrypted with TrueCrypt. Happy New Year. – V




Letter Re: Prepper Digital Security

Mr. Latimer, I read the article “Prepper Digital Security“, by A.B. and would like to offer a couple of comments. The article mentions the use of TrueCrypt. I was a serious user of this software package until June of this year after Microsoft ceased support of Windows XP. When that happened, the development of TrueCrypt was ended with very little explanation. I run Ubuntu Linux and used TrueCrypt. Now that development has stopped, I cannot get updates so am no longer protected if NSA finds another exploit. The website has the following to say: WARNING: Using TrueCrypt is not secure …




Prepper Digital Security, by A.B.

In this day and age of digital information, our communications and data are open to a world of invasive agencies. Some of these agencies may be your nosy neighbor out to see what you are up to or an activist group gathering unguarded data to send to agencies of various domestic and foreign governments. Many of us in the prepper community have taken some measures of security to safeguard our data. Some people avoid the digital world altogether to dodge this issue, though not all of us are willing to go to that level of abandonment of technology. There are …




Letter: OPSEC

Mr Rawles, I received an interesting letter today that profoundly reminded of OPSEC. The letter was notification of a class action suit against Oregon ARCO stations. They failed to disclose their prices when the station charged a 35 cent debit card transaction fee. While my visits to Oregon Arco stations “south of the river” are quite sporadic, the dates of time are what really got my attention– January of 2011-August of 2013. This seems to prove three things to me– our debit and card purchases are being tracked and cataloged, and perhaps Mr. Snowden is not the ogre he is …




Letter Re: Craigslist, PSYOPs and Other Ramblings.

Hugh, JR, and the rest of my fellow patriots: I would like to ask your readers who, like myself, have used Craigslist (and maybe similar sites) for years to do everything from buy and sell farm animals to random goods to meeting other people via the personal ads. Have you come to the point where you’re so frustrated with even using CL because of the onslaught of phony, obviously robotic in nature, responses you’ve received either from your own ads or others? Call me crazy, but perhaps it’s a direct result of our very own government’s attempts to not only …




Letter: Social Media

Hugh, When social media is discussed on this site, opsec always seems to take front seat. Entering details of your life and a network of your contacts into a database you don’t own is certainly cause for pause. I don’t have a social media account because I find them obnoxious. However, the letter regarding using social media for intel was spot on and, though Hugh stated that this was just one useful instance, I believe the writer of the letter indicated several, none of which could be effectively reproduced with the level of ham radio activity we have going on. …




Letter Re: Cybersecurity: A Systemvault Primer

Dear Editor, It’s nice that you published an article about system and data security. People need to be aware. Overconfidence in encrypted communications however is a disaster waiting to happen. The author wrote: “Another benefit of the way Linux deals with encryption is that any information that is read or written is directly transferred between RAM and the container: any piece of information that exists outside of the computer’s memory is always encrypted.” This is flawed logic as demonstrated by recent attacks on target and other retail giants. RAM scraping is actually pretty old news. I also heartily disagree with …




Pat’s Product Review: Signal Armor

These days, many people are concerned about their privacy, and I admit to being somewhat concerned myself. I recently took down my Facebook page – after it was hacked three times this year. So, if anyone sees a Facebook page with my name on it – it’s not my Facebook page – someone hacked my original page, and made one false Facebook page that looks similar to the real one, and the second one doesn’t even come close to being like my original. Additionally, I found that it was too time-consuming keeping up with everyone’s newest Facebook page posts. Also, …




Cybersecurity: A Systemvault Primer, by D.P.

Welcome to all the brave souls that didn’t scream and/or quickly scroll on when reading the title. I know a fair percentage of SurvivalBlog readers are concerned about OPSEC, but what about your electronic OPSEC? Is it as good as it should be? As good as it could be? I promise you won’t have to read the entire submission but you should take a look at the first few paragraphs to determine if its something you need to address. If you do, you can always try to find some trusted help in securing your systems. During the second half of …




Letter Re: Stronger Passwords for the Masses

Dear Editor, A long tome ago, I looked at diceware as Michael Z. Williamson mentioned (love that XKCD cartoon), and I don’t find it quite as robust as I would like for password generating (I have one diceware-ish password I use for convenience, but used a couple of foreign words and specific capitals as well). Creating a series of simple words that forces the attackers to use a brute force attack on it anyway, made me want to go out and find out a better way to find brute-force-resistant passwords. I found one (essentially, only one) really good password generator …