Avatar
fartkart
2a25065a77eb9d42738e29f0ecb6c120ec1007aa3b8ccdea88bb408de419a636
Proud male feminist

mukbang videos will save leafy, he could collab with cado

nostr:note1mutd0eqarw2wgsf7jnx5785zsf92pac3g8km0ka4g9u5ytk45jqsg507tq

That's more like a millennial #corrected

Can't wait for roblox tubers

nostr:note1ext4epypgglwkl8egukv27xwanqqn3hxukpfh3kqjvlv3phpjx9qxscx7l

Replying to Avatar

Buy a thinkpad x230 and install heads. Write protect the flash chip. Put nail polish on the screws and take high resolution pictures to ensure signs of tampering. Do NOT use a HDD or SSD. They have DMA so a malicious firmware could do a lot of damage, use of USB is preferred since they do not have DMA. Completely remove the microphone, sound card, webcam and the WWAN card from the laptop. Remove the fan to prevent binary acoustic data transmission. Replace the default wifi card with a supported atheros card. Disable wifi when not in use, preferably by physically removing the card. Make your own independent Linux distro from scratch. Most Linux distros value convenience over security and will thus never have good security. Your only option is to make your own. Use musl instead of glibc, Libressl instead of openssl, sinit instead of systemd, oksh instead of bash, toybox instead of gnu coreutils to reduce attack surface. Enable as little kernel modules as possible. Use a hardened memory allocator. Apply strong SELinux and sandboxing policies. Restrict the root account heavily to make sure it never gets compromised. Disable JavaScript and CSS in your browser. Block all FAGMAN domains in your hosts file. Monitor all network requests. Do not use a phone. Never speak near anyone who owns a phone, they are always listening. Never use any non-corebooted technology made after 2006. Never leave your devices unattended. Tape triple layer aluminum foil all around your room as tempest shielding. Type really quietly as defense against audio keylogging. Use ecc ram to minimize rowhammer and rambleed. Encrypt everything multiple times with various different encryption implementations. Compile everything from source. Use hardened compilation flags. Always read through the source before installing something if possible. Only use the internet when absolutely necessary.

Husky_1691258695112_9R4R608ZEE.…

?name=Husky_1691258695112_9R4R608ZEE.png

Just send pigeons at this point

Daddy elon, we are still waiting for our catbot dream girlfriends

nostr:note13l3u9jygf897t9cms8vsxjge8999gqqeqsjsfnwls9ez4jyej25ssnzcpw

I'm manifesting trauma ✨