does anyone else overdo privacy and security?
View Single Post
Feb25-12, 02:16 PM
I'm typing this message from a non-networked OpenBSD computer inside of a Faraday cage on the bottom of the Mariana Trench. A specially trained team of elite dolphins uses the IP Over Dolphin (IPOD) protocol to take it to a trusted team on land, who then post it to this message board through seven proxies after bouncing it off a ping wall to avoid being traced by people using a GUI in Visual Basic. After that, I shut down the computer and move into my panic room until the dolphins return with any replies doubly encrypted.
But how do you know you can trust the dolphins not to reveal your location? They could be double agents. Anything that cute can't be trusted!