HP. Hoodedcobra666 said:The Yehubor is trying to head us into 1984. Larissa wrote that they are passing laws to spy on all phonecalls now supposedly to control "Coronavirus". North European Countries are debating FORCED Vaccination for the CoVid.
All they do smacks Communism.
FancyMancy said:Ravenheart666 said:Change the VPN location.
No problem. I think it is to do with the stupid GDPR and other nonsense "rules" and "laws". On whatever American news sites, it says sometimes that I can't view them bcs reas0nz, so I change the VPN location to America or Canada and it works usually.Ravenheart666 said:FancyMancy said:Ravenheart666 said:Change the VPN location.
Now it worked , thanks!
Bump?FancyMancy said:There are some links on here which go to Mega, which has end-to-end encryption. What does this mean for those accounts which have anti-Yehubor documents and videos on them? Are there are decent alternatives? What would/could/should be done?
Pirate11 said:Fortunately, they cannot change open source software. Even if they succeed in this, we still have Linux, FreeBSD and others. We still have GnuPG for encrypting e-mails, matrix for encrypted messages on servers hosted by ourselves, LUKS for encrypting our data, TOR for (self) hosting our websites and communicating.
If people use Whatsapp for communicating in the hope they are not being spied upon, they kindof deserve their messages to be read by (((the government))).
I never used it, but a quick research shows that it is open source, which is goodloki88 said:veracrypt is good for hardware encryption
Pirate11 said:I never used it, but a quick research shows that it is open source, which is goodloki88 said:veracrypt is good for hardware encryption
Well technically, they could "hack" the password by bruteforcing it, if it is worth it, because it can be expansive. Here's how it works:loki88 said:apparently the fbi can't hack it. I lost my password for one of my computers that had it on it and the computer is as good as scrap now.
Pirate11 said:Well technically, they could "hack" the password by bruteforcing it, if it is worth it, because it can be expansive. Here's how it works:loki88 said:apparently the fbi can't hack it. I lost my password for one of my computers that had it on it and the computer is as good as scrap now.
Now, if you have a short and basic password, it can take from some minutes to a few hours to them to get your stuff unencrypted. If you have a strong, long ass password with special characters, it can take virtually forever, hence, they'll never find decrypt your stuff.
- They make a copy of your encrypted hard drive (a bit to bit copy, like the dd program you have on Linux, MacOS FreeBSD and every UNIX system). This is called an image.
- They distribute copies of the image they took to their datacenters. Their machines are very powerful.
- With every machine, they brute-force your password working on your hard drive's image.
- After a while, they both have your key and your files.
It is a really expansive process, so they just give up if they have no reason to think you have nothing of extreme interest. Instead (at least where I live) they just keep your stuff. Yes, they basically steal your equipment if you are not nice enough to provide them the key lol
loki88 said:Pirate11 said:Well technically, they could "hack" the password by bruteforcing it, if it is worth it, because it can be expansive. Here's how it works:loki88 said:apparently the fbi can't hack it. I lost my password for one of my computers that had it on it and the computer is as good as scrap now.
Now, if you have a short and basic password, it can take from some minutes to a few hours to them to get your stuff unencrypted. If you have a strong, long ass password with special characters, it can take virtually forever, hence, they'll never find decrypt your stuff.
- They make a copy of your encrypted hard drive (a bit to bit copy, like the dd program you have on Linux, MacOS FreeBSD and every UNIX system). This is called an image.
- They distribute copies of the image they took to their datacenters. Their machines are very powerful.
- With every machine, they brute-force your password working on your hard drive's image.
- After a while, they both have your key and your files.
It is a really expansive process, so they just give up if they have no reason to think you have nothing of extreme interest. Instead (at least where I live) they just keep your stuff. Yes, they basically steal your equipment if you are not nice enough to provide them the key lol
This happened to someone I know. See here:
https://www.bitchute.com/video/kMTo9KxU7iVS/GB Whatsapp
Well technically, they could "hack" the password by bruteforcing it, if it is worth it, because it can be expansive. Here's how it works:
Now, if you have a short and basic password, it can take from some minutes to a few hours to them to get your stuff unencrypted. If you have a strong, long ass password with special characters, it can take virtually forever, hence, they'll never find decrypt your stuff.
- They make a copy of your encrypted hard drive (a bit to bit copy, like the dd program you have on Linux, MacOS FreeBSD and every UNIX system). This is called an image.
- They distribute copies of the image they took to their datacenters. Their machines are very powerful.
- With every machine, they brute-force your password working on your hard drive's image.
- After a while, they both have your key and your files. android app
It is a really expansive process, so they just give up if they have no reason to think you have nothing of extreme interest. Instead (at least where I live) they just keep your stuff. Yes, they basically steal your equipment if you are not nice enough to provide them the key lol
Yes you are right I've experienced the same.Well technically, they could "hack" the password by bruteforcing it, if it is worth it, because it can be expansive. Here's how it works:
Now, if you have a short and basic password, it can take from some minutes to a few hours to them to get your stuff unencrypted. If you have a strong, long ass password with special characters, it can take virtually forever, hence, they'll never find decrypt your stuff.
- They make a copy of your encrypted hard drive (a bit to bit copy, like the dd program you have on Linux, MacOS FreeBSD and every UNIX system). This is called an image.
- They distribute copies of the image they took to their datacenters. Their machines are very powerful.
- With every machine, they brute-force your password working on your hard drive's image.
- After a while, they both have your key and your files. android apk
It is a really expansive process, so they just give up if they have no reason to think you have nothing of extreme interest. Instead (at least where I live) they just keep your stuff. Yes, they basically steal your equipment if you are not nice enough to provide them the key lol
Yes exactly right I have also heard about it from someone!Well technically, they could "hack" the password by bruteforcing it, if it is worth it, because it can be expansive. Here's how it works:
Now, if you have a short and basic password, it can take from some minutes to a few hours to them to get your stuff unencrypted. If you have a strong, long ass password with special characters, it can take virtually forever, hence, they'll never find decrypt your stuff.
- They make a copy of your encrypted hard drive (a bit to bit copy, like the dd program you have on Linux, MacOS FreeBSD and every UNIX system). This is called an image.
- They distribute copies of the image they took to their datacenters. Their machines are very powerful.
- With every machine, they brute-force your password working on your hard drive's image.
- After a while, they both have your key and your apk files.
It is a really expansive process, so they just give up if they have no reason to think you have nothing of extreme interest. Instead (at least where I live) they just keep your stuff. Yes, they basically steal your equipment if you are not nice enough to provide them the key lol
Yes exactly I think of it like this tooIts not really possible to ban end to end encryption of wasap plus. In doing so it will open them up to attack. Encryption is math, you can't create a back door for 1 party without creating a back door for all parties. It would also violate the 1st and 4th amendments. Its a unenforceable law, the Yehuborim are just desperate and its a good sign. The Yehuborim always pass a bunch of laws to protect themselves before getting exiled. The current members in office are close to death so they will pass any law and let the other generations deal with it. If anything is going to usher in the age of Aquarius its going to be all these attempts at censorship and control. People are already building alternative platforms for everything.
Absolutely agree with you—this is definitely the time for people to wake up and stick together. The truth is becoming harder to hide, and more of us are questioning the systems in place. Also, random thought but relevant to my day: what is my face shape upload photoEnd-to-end Encryption has been existing for a while and although many platforms such as WhatsApp [which is Facebook aka Meta owned] actually is spied , don't act fucking surprised , many of us knew or thought about it , the whole point is that in this Aquarius Age the enemy won't succeed with enslaving the entire world with their dirty tricks anymore as this is the time where WE should stick together , to say at leastwhat is my face shape upload photo

I don't understand what you mean with the end of the photo upload?Absolutely agree with you—this is definitely the time for people to wake up and stick together. The truth is becoming harder to hide, and more of us are questioning the systems in place. Also, random thought but relevant to my day: what is my face shape upload photo![]()