Radio Contra Episode 85: Protonmail Targeted by FBI? and Operation Cuba Libre Lessons Learned
Episode 85: Is Protonmail compromised? Dr. Sebastian Gorka disclosed a request by the FBI wanting information on 200k accounts, coming on the heels of their disclosure of the IP logs of a French activist. In the second half I dive into the lessons learned for operating an HF station and countering the efforts of jamming by a nation state from the results of Operation Cuba Libre conducted by the Radio Recon Group.
Jack Lawson’s Civil Defense Manual
Brushbeater Forum
Music: How Heavy This Axe by The Sword
Get off your ass and come train! Brushbeater Training Calendar
Support the podcast: Brushbeater Amazon Affiliate Page
Fresh Rebellious Content Daily: American Partisan
Affiliates:
Palmetto State Armory
GunMag Warehouse
Get your medical gear squared away: MyMedic.com
Outdoor Gear: Moosejaw Outdoors
Storable Food: ReadyWise
Share This Story, Choose Your Platform!
4 Comments
Comments are closed.
On protonmail, it is PGP encryption. Up to version 5 there was no backdoor. But the gov’t forced the PGP creator to put a back door in the PGP program. The source code use to be floating around. But be aware of the obvious, that no back door version will get you looked at!
Gorkas claim has nothing anywhere to backup his claims. This is behavior is Like Hal Turner. They both get patrots chasing tails and foaming at the mouth, but offer no data to back up claims. Time is short, dont let people like the above steal it.
use VPN if email needs security.
Proton PGP CRIPPO can not be trusted because proton has a users secret keyring. If you use GPG4USB you can gen a 4096 key local, use it to cript to another proton user who has also got proton key self generated.
Crypt your message as ascii armour, copy then paste into proton email. use non relevant subject line and manually crip any attachments. Proton does not crypt subject, headers, attachments. Tutanota crypts it all. Tutanota also has a history of giving ip and headers to german govt as well.
By keeping mails and users on same server, you dont splatter metadata all over DARPAs internet. Any number of simple crypt apps and some can output ascii.
paranoiaworks(dot)mobi
aescrypt(dot)com
gpg4usb(dot)org
One time pads exchanged, in meat space crypted and paste in email. Jeffrey prather has a great spreadsheet for OTP on his website.
FUCK JOE BIDEN.
Gorka was tipped off to something. I’d say he has quite a bit of credibility. Subject lines are literally meaningless also.
Suggesting using an OTP that’s published on the web is most unwise as well. Especially from the source mentioned.