Skip to content
IQfy
Know more.
Posted on by Anon
i want to take some documents but im afraid i'll be caught as soon as i stick in a usb and copy the files or i email them to my personal address. Whats the most safest way of transferring these without being found out?
Thalidomide Vintage Ad Shirt $22.14 | Ape Out Shirt $21.68 |
Thalidomide Vintage Ad Shirt $22.14
- Anonymous
3 days ago
Reply
upload to mega
- Anonymous
3 days ago
Reply
Removing the hard drive from your workstation and plugging it in another computer.
- Anonymous
3 days ago
Reply
Unless the laptop has a tamper evident seal, this is indeed a foolproof solution.
- Anonymous
3 days ago
Reply
Encrypted hard drive can make it tricky too. Even if you do have the password.
- Anonymous
3 days ago
Reply
As an IT guy : I never check the state of tamper seal. I just assume another colleague had to open it at some point.
- Anonymous
3 days ago
Reply
This, no one ever checks. Or if they notice, they will assume it was opened by IT. Few normies would ever consider doing such a thing.
- Anonymous
3 days ago
I would encode all the information as barcodes, and use a cell phone to decode them, and in inobivious way would be man-in-the-middle wifi. There are at least 4 more ways that cannot be more openly discussed...
- Anonymous
3 days ago
> This, no one ever checks
I wouldn't want to rely on this assumption if I was leaking docs in/from some totalitarian sh*thole or if for any other reason I wouldn't like being caught. Ask yourself why they put seals on the devices in the first place. If they don't do it on a regular basis, once they suspect a leakage they WILL check seals!
- Anonymous
3 days ago
Reply
THIS is actually the safest or rather only safe way if anyhow possible. Why? Because Windows OS stores traces of whatever you do in it's registry and you would have to remove all these traces after you are done copying files. Nothing a layman should even consider. And this is just the caveat without the additional possibility of some monitoring software running in the background.
If the hom*osexual would answer literally any questions [...]
, and if unencrypted, a linux bootstick was absolutely going to be my suggestion too
Did this throughout college.> a linux bootstick
If I had say in IT security of some company I would only hand out laptops with a BIOS that doesn't allow to boot from devices other than the internal pre-installed drive, doesn't allow any changes to the BIOS itself. And of course I would seal the laptops and prohibit tampering with the internals. This is easy to accomplish. Depending on the required security level I would also install monitoring software that hides from the user.- Anonymous
3 days ago
Reply
If the physical device is at my home, I'd just MitM attack myself if it got so dire.
- Anonymous
3 days ago
Reply
> MitM attack myself
If you know how to tap the company's VPN. Do you?
And you need a convincing pretext for even the need to send the documents via this connection.
If, for example, documents get leaked I would suspect anyone who moved them around or just touched them unnecessarily. This is what monitoring software is intended for. Even trickier: imagine every employee getting identifiable unique documents that only seem identical to a human reader. This is what I would check first as a leaker. Always make sure they didn't set up any traps. And always behave plausible.
- Anonymous
3 days ago
Reply
>BIOS that doesn't allow to boot from devices other than the internal pre-installed drive, doesn't allow any changes to the BIOS itself.
Many companies do this or some version of it.- Anonymous
3 days ago
Reply
this, how can you circumvent it?
- Anonymous
3 days ago
It would pretty much eliminate that vector if the drive is encrypted.
You'd be back to software options, which this thread is full of.
- Anonymous
3 days ago
Reply
this is only half of the equation because if there is a DLP solution installed on the OS it'll hold that information until it's reconnected to the network and forward off logs to the DLP server saying that a USB was inserted into it at some point (the second computer). you really want to clone the hard drive to a PC that is disconnected from the internet (not the local network) and use a USB drive or locally transfer the file.
- Anonymous
3 days ago
Reply
>Asks for tech help
>Gives no technical information about laptop
Is the drive encrypted?
What OS?
Do you know if it's running any nanny/monitoring software?
Is it a WFH VPN connection or are you physically in the office when using it? Anonymous translate the files into binary then transcript them by hand into a text file on your personal and recompile them
IT won't know what you're doing, anyone else will assume it's tech guru magic- Anonymous
3 days ago
Reply
This, but use a phone camera with an OCR app to copy the text instead.
- Anonymous
3 days ago
Reply
That's how I would get content out of RDP sessions from clients with "secure access protocols". Shell encode to base64, use OCR screen reader to extract text, decode in npp. Wew lad so hard
- Anonymous
3 days ago
Reply
scp
- Anonymous
3 days ago
Reply
depends on what you have available to use and what data do you want to get out
https://github.com/alisinabh/paperify or similar projects, there are many look at which allow for best data density
encrypt > qrcode > print it > take itencrypt > upload to some free file hoster
- Anonymous
3 days ago
Reply
Exploit the analog hole.
If you can't figure that one out you're too dumb to not get caught. - Anonymous
3 days ago
Reply
Bros why did she do it
- Anonymous
3 days ago
Reply
Because body dysphoria, social pressure and anxiety destroys people.
- Anonymous
3 days ago
Reply
>millionaire
>dysphoria, social pressure and anxiety
kek what a b***hass- Anonymous
3 days ago
Reply
I'd much sooner indict the doctor(s) who did the work and didn't send her to a therapist first.
- Anonymous
3 days ago
Therapist don't make money flow through the pharmaceutic industry.
- Anonymous
3 days ago
An unfortunate truth.
Hopefully her bogging stands as a warning to other women.
- Anonymous
3 days ago
Reply
> mogging on people who make you suffer
Weak. You're still horrified of her doings.
- Anonymous
3 days ago
Reply
Because body dysphoria, social pressure and anxiety destroys people.
>millionaire
>dysphoria, social pressure and anxiety
kek what a b***hassI'd much sooner indict the doctor(s) who did the work and didn't send her to a therapist first.
Therapist don't make money flow through the pharmaceutic industry.
An unfortunate truth.
Hopefully her bogging stands as a warning to other women.As always I'm the one not understanding the meme. Who is she and what did she do?
- Anonymous
3 days ago
Reply
Look up Erin Moriarty from the boys.
Went from a soft faced girl next door cutie to a bog - Anonymous
3 days ago
Reply
I mean I'm into monster girls too, but i draw the line at Wendigos.
- Anonymous
3 days ago
Reply
>when she takes off her makeup
- Anonymous
3 days ago
Reply
Smb over a vpn
- Anonymous
3 days ago
Reply
Use python shell (not a script), read the file into memory, aes encrypt it with symmetric password, base64 encode it, print it to console, copy the text from the console and then use something like steam client or Rdp or ssh to copy+paste the text into a note pad on a remote machine you own at home or are renting in aws
- Anonymous
3 days ago
Reply
Actually pretty clever, tbh. Over the top IMHO, but still clever.
- Anonymous
3 days ago
Reply
>write a program that turns data to audio
>play audio file on laptop speakers, record it to your own computer
>convert audio back to data
wa la- Anonymous
3 days ago
Reply
Who remembers how long it took to load just 1KB this way on an Amstrad?
- Anonymous
3 days ago
Reply
Is that computer always on or do you turn it on when you begin to work? If it's off and the drive is not encrypted, you could boot it on some usb stick with Linux on it, this way any software installed in its OS to watch what you are doing will not be running, for the computer will be running your Linux usb stick instead.
- Anonymous
3 days ago
Reply
If the hom*osexual would answer literally any questions
>Asks for tech help
>Gives no technical information about laptop
Is the drive encrypted?
What OS?
Do you know if it's running any nanny/monitoring software?
Is it a WFH VPN connection or are you physically in the office when using it?, and if unencrypted, a linux bootstick was absolutely going to be my suggestion too
Did this throughout college.
- Anonymous
3 days ago
Reply
take photos
- Anonymous
3 days ago
Reply
>he bought?
- Anonymous
3 days ago
Reply
Bluetooth File Transfer
nobody expects it, nobody even knows it is there
>In Bluetooth & other devices settings, select Send or receive files via Bluetooth. In Bluetooth File Transfer, select Send files > choose the device you want to share to > Next. Select Browse > the file or files to share > Open > Next (which sends it) > Finish.
- Anonymous
3 days ago
Reply
Some companies block bluetooth file transfer. Mine does.
https://lulz.org/cdn/77485442105a551f9ed7eb7523aa0cf7.jpg
i want to take some documents but im afraid i'll be caught as soon as i stick in a usb and copy the files or i email them to my personal address. Whats the most safest way of transferring these without being found out?
OP, what I do is to log on to the web version of Telegram and send the file to myself via the web version. Don't know if this is 100% foolproof, but I work for a financial institution which is pretty locked up and this is the only way I've been doing for years without being caught.
- Anonymous
3 days ago
Reply
does anyone ITT know a thing about forensics? kek
>log on to the web version of Telegram and send the file to myself via the web version
you need to trust your browser for that. and, you know, corporations install their own certificates in your browser for reasons...
- Anonymous
3 days ago
Reply
How much data are we talking about?
30 bytes or 30 Terabytes? - Anonymous
3 days ago
Reply
if you don't want to be discovered,
it means you are doing something illegal.MODS
- Anonymous
3 days ago
Reply
It may be illegal in North Korea but not in the US. We need to support dissidents in the sh*tholes of the world, they risk their lives if they leak info.
- Anonymous
3 days ago
Reply
moronic moralgay
- Anonymous
3 days ago
Reply
If you don't want them seeing you send that file from the work machine (mail,browser,p2p..), why would you do the obfuscation part on that machine, too? The QR code, the printing, and all other conversions leave more traces than surfing to wetransfer, no?
- Anonymous
3 days ago
Reply
look up "data exfiltration" and make sure to use the most creative method that uses the least number of programs and sends the least data through the network.
- Anonymous
3 days ago
Reply
You could use a temp mail I guess, still kind of silly though imo
- Anonymous
3 days ago
Reply
Depends on how it's secured.
Either way, look it up. Maybe they have a file share. Maybe Nextcloud. My company has internal S3 with buckets up to 50TB, for free (not billed rn). - Anonymous
3 days ago
Reply
My employer locks down our work machines pretty tight but for some reason ssh is completely unrestricted so I just SFTP whatever i want onto my personal machine.
- Anonymous
3 days ago
Reply
I love tech companies
They always, without fail, miss or frick up something. Always.
- Anonymous
3 days ago
Reply
Kek, they not a tech company. Just IT dept. full of compliancegays.
- Anonymous
3 days ago
Reply
>help me steal from my workplace
>help me do this potentially very illegal thing
HOLY FED POST- Anonymous
3 days ago
Reply
Fine with me
They often hire people actually skilled and knowledgeable
Hope they get my resume too- Anonymous
3 days ago
Reply
>>help me do this potentially very illegal thing
Not a problem for me. Why, are you a puss*?why do you keep replying? why are you bumping your own thread, makes no sense. are you desperate. this post doesn't bump, i put sage in the options field. the only person who would bump this is hom*osexual OP, desperate incel loser who is going to steal documents from his workplace. sage and hide
- Anonymous
3 days ago
Reply
Do you feel better now that you got that out, big boy?
Sorry about your parental neglect.
- Anonymous
3 days ago
Reply
>>help me do this potentially very illegal thing
Not a problem for me. Why, are you a puss*?
- Anonymous
3 days ago
Reply
In large companies, lots of regular ways are closed off for security reasons.
I used to backup my files to a USB Drive, but they started demanding encrypting the drive and that only worked well in Windows.
So, I set up a fileserver in my home network and just rsync'd my directories to the spare drive using my pre-approved WSL instance. It was fast due to it being in the home network, and I never got any notice or exception.