Please use common sense here... If you've never heard of them or all of a sudden an "old" vendor comes back out of nowhere with only DD, theres a big chance that they are a scammer. So please dont fall for this dumb shit. Im suprised people actually are...
NO! I know of someone that used Signal and the FBI back-hacked it to intercept all of his messages and subsequently arrested him for his naughty words that he though were private and encrypted.
Don't trust anything that requires a phone number (including Telegram)
I gotta agree with you on that. Sadly people think two factor authentication via a tracking device is secure and will quote whatever Google and wikki tell them to justify it. Try telling them that the blockchain as they call it is not freedom or security and their data is at the mercy of whomever controls it without hearing them preach a sermon on 'decentralised ' as if freedom and security somehow are synonymous with it.
there is no safe way to run wickr. please read through this documentation and start using either signal or xmpp/jabber with off the record inside of a whonix virtual machine.
https://www.whonix.org/wiki/Documentation
https://www.qubes-os.org/
The whonix documentation ought to be part of the darknet bible as well. It is a fantastic crash course in infosec overall and everyone can benefit from starting to use Qubes with Whonix. Tails should really only be used if not storing stuff to disk is absolutely necessary because Qubes comes with full disk encryption by default. With the recent javascript mess people should really seriously consider starting to use Qubes with Whonix.
You can run the sys vm and net vm in PV mode instead of the PVH virtualization mode so that you do not have to have special hardware to run Qubes.
If the vendor can verify they are them I would say it's fine. But if alpraking messages you on wickr and you don't check they are who they say they are with a encrypred message first your just dumb.
It's just a end-to-end encrypted messaging app. However, reports of LE cooperation have surfaced. I used to use Wire instead, but then heard thats not secure either. Now I use Signal. Required phone number however...picked up a clean burner. Or like /u/DeppFocus said, just use Jabber/XMPP
Do you know what you are talking about?
Open source you say? Well then go ahead and build the client kiddo, shouldn't be a problem if it's open source :)
Here you go: https://torhoo.cc/go.php?u=YUhSMGNITTZMeTluYVhSb2RXSXVZMjl0TDFkcFkydHlTVzVqTDNkcFkydHlMV055ZVhCMGJ5MWo=#
Oh wait... you can't... because bloody wickr just released the the source of the crypto part... not the actual client.
Which is the reason nobody can compile the client and why there is no version for any Linux distribution besides shitty Ubuntu 16.04 which on top is outdated (current version 18.04 LTS).
And I bet you have never looked at a single line of the source anyway.
As long as wickr can't or don't even want to prove it is free of backdoors you should certainly assume it IS backdoored.
The app is free anyway, why keep the source a secret?
I don't even want to start talking about what US based company means...
Long story short:
We don't need to come up with any proof that there is a backdoor in it.
The company that cares sooooooo much about your privacy should prove that there isn't any backdoor in it.
Always a pleasure.
sorry if that came a little harsh but sheeps read comments like yours and think "oh if its open source then somebody would have found a backdoor already."
If you ask me the whole company acts shady as fuck releasing the crypto source and making it look like (at least for unaware folks) they released the whole source.
So closed source and us based... what else to say? why the fuck would anybody trust them?
You should read through this documentation and start using either Signal or xmpp inside of a whonix virtual machine. srsly people you are in the middle of a cyberwar right now and there are operations going on to push users towards certain unsafe tools. please do not get thrown in prison over wanting pretty graphics and play toys with wickr.
https://www.whonix.org/wiki/Documentation
https://www.qubes-os.org/
The whonix documentation ought to be part of the darknet bible as well. It is a fantastic crash course in infosec overall and everyone can benefit from starting to use Qubes with Whonix. Tails should really only be used if not storing stuff to disk is absolutely necessary because Qubes comes with full disk encryption by default. With the recent javascript mess people should really seriously consider starting to use Qubes with Whonix.
You can run the sys vm and net vm in PV mode instead of the PVH virtualization mode so that you do not have to have special hardware to run Qubes.
I've gotta be honest here friend, even though I'm still in my 20s I've been using dark web markets for so long and one time an old favorite vendor of mine suddenly returned and I almost got scammed before I realized the scam haha. You live and you learn right? I'm doing my best on my comments & posts as today is literally my first day on dread after discovering it on Olympus Market
Don't lynch me for posting in the wrong thread, i'm super new to dread.
But i use wickr me on an encrypted old smartphone with everything disabled. Only will connect thru wifi, sim card is out, and i'm running ipvanish thru HK.
I use this line for personal local sales. Is this an okay way to go about things? (pointing toward the wickr pros)
Edit: it is android but all google services are deactivated. i have a private app marketplace installed to get updates
you should switch to either signal or xmpp/jabber. They are safer than using wickr. If you did not root the phone and remove google services they are not really disabled. If it is an old smartphone you are in serious danger of being hacked by something as simple as a stagefright bug. You are in serious danger.
Do not use a VPN either, you should just be using Whonix with a bridge if you need to.
I would read through some of this info.
https://www.whonix.org/wiki/Documentation
https://www.qubes-os.org/
The whonix documentation ought to be part of the darknet bible as well. It is a fantastic crash course in infosec overall and everyone can benefit from starting to use Qubes with Whonix. Tails should really only be used if not storing stuff to disk is absolutely necessary because Qubes comes with full disk encryption by default. With the recent javascript mess people should really seriously consider starting to use Qubes with Whonix.
You can run the sys vm and net vm in PV mode instead of the PVH virtualization mode so that you do not have to have special hardware to run Qubes.
Thanks i'll look into all of this. I used to use signal a long time ago but after invostigating their policies they hold logs for 3 days before purging. And they will comply with any LE intervention. They may have changed since then, I'll look into it. Thanks again for youre time. been a question 7 months in the making lol
Threema is also end to end encrypted and doesnt require a phone number. Never had any issues with it whatsoever and if you always keep a Pin code to open the app you should have zero issues. IT also has a fail safe and will wipe all data if the code is failed a certain number of times.
Hi. New to dread - hope this contribution is useful:
The benignly named site search.org is a resource for LE needing to contact an internet business. There are 3,500 businesses listed and I think its safe to assume if a business is on the list they have cooperated with LE at least ONCE.
Of those 3,500 about 20 have extra special forms and help - wickr is one of those 20...
This is a noobass question but can I run qubes from a usb like tails and then boot back to my regular os when I remove the usb essentially leaving the regular is intact? For the most part at least
thanks all!!!
>wickr
pick one
Use Jabber over Tor / I2P and with ⚠️OTR⚠️ or ⚠️OMEMO⚠️.
Pidgin IM (Jabber client) with OTR is installed & enabled in Tails by default.
Don't trust anything that requires a phone number (including Telegram)
https://www.whonix.org/wiki/Documentation
https://www.qubes-os.org/
The whonix documentation ought to be part of the darknet bible as well. It is a fantastic crash course in infosec overall and everyone can benefit from starting to use Qubes with Whonix. Tails should really only be used if not storing stuff to disk is absolutely necessary because Qubes comes with full disk encryption by default. With the recent javascript mess people should really seriously consider starting to use Qubes with Whonix.
You can run the sys vm and net vm in PV mode instead of the PVH virtualization mode so that you do not have to have special hardware to run Qubes.