Theme editor

  • RequestStream Movies, TV shows and anime streaming • 1 week trial
  • LewdCorner Update
    For now, mime and apollo have full control over LC and will be handling site decisions going forward. I’m stepping back from making site changes for now and letting them decide how to move LC forward. - Jack Of Blades
    Read More

how the fuck do you lock a porn folder on your computer?

Status
Not open for further replies.
If setting up a VM is difficult, you could just use something like (used to be great, but no free version anymore :( ) or (great potential and open source, but a couple of major known bugs like trouble deleting encrypted files).
 
hell no! married? kids? Jesus.. I have way too much money to get ruined by whatever divorce is gonna fly at me full speed and hit me in the face.

i live alone but my single mother neighbor who lives in a fantasy world and thinks we're gonna get together one night, has a kid. now honestly i hate kids (maybe i will have one when im 50 who knows, no biological clock on my side) but she's poor so they dont have a good pc at home, the kid sometimes comes to use my computer to play fortnite or whatever (it started with "homework", no idea how it got to video games) i rather the kid doesn't find anything weird, i have 2 computers but my main one is for work so no one touches that one but me. the other one having a high end gpu on it, is for gaming and other stuff. some of that stuff is that folder i keep my milf videos. I dont want any negative content on my work pc . and i know what people are gonna think "why let the kid use the pc then". apparently im a nice person (fucking hate this about myself) so while i own the place and the single mother rants the next door, i need to keep living there because my other place is being rented. i simply make more money from that income then what i would get if someone lived where im currently. maybe once i buy a 3rd place i can move from this shit hole, and away from these weirdly overly nice people. but i never needed a big place to live in. this is the age a person should save as much money as possible, raise their income, improve anything they can.
....
So kinda late reply, but if someone else with the same or similar problem (Your PC is used by someone else, you just don't want them to find your porn) stumbles upon this: I think the easiest solution is create a new user for them or use Windows' Guest User. You can put your porn in your user directory and it's safe. Added benefit: They don't have admin privileges and can't access your browsing history.
 
So kinda late reply, but if someone else with the same or similar problem (Your PC is used by someone else, you just don't want them to find your porn) stumbles upon this: I think the easiest solution is create a new user for them or use Windows' Guest User. You can put your porn in your user directory and it's safe. Added benefit: They don't have admin privileges and can't access your browsing history.
that is kinda true. If they have admin user access they can access your history, recent files amd cache data. IMO, if you want safe porn folders the "only" solution is a USB fob/SD card you carry with you. plus you have to wipe caches and delete all recent file metadata/downloads history and cache.

I say this as one who as a "teen" I hid H in my user sys 32 hidden files under a hidden directory in a literal directory maze within an essential file folder in Sys32 system on windows vista.

Due to user admin privs, my sys admin dad still found my porn thanks to my not clearing the "recent files cache" even though I did clear web cache, images cache, thumbnail cache and downloads cache.

Mind you with win 11/10 vs win XP/Vista, the admin user now has infinitely more ways to spy on other users on the same PC, including root DIR access to the file folder DIR of your sub-user system on that PC.

Unless you are the admin, the only way to hide junk on Win is externally + eliminating 'all' trace of those files ever being on that device.

Plus of they have a keylogger on the system, youbare simply Fd.
 
ps to above

aside from humiliation of a normie parent finding taboo hentai crap on PC back before H was even on western inernet, he found it cuz i got greedy and downloaded to much. He was trying to open up gig space on an 80gb HD and at 12gb I was taking too much of it.

note 500kb was largely over estimate. some were that big most were only couple dozen kb (avg of half a meg listed below)*

a) imagine having to delete that
b) realize this was over dial-up and imagine how long it took to create a collection of 12gb +/- over that, with the avg image being only half a megabyte.
c) because BS, imagine having to show ur sys admin dad whos a career IT pro, how you a young teen ammassed 12 gigs of basically "unsearchable data" (since google wouldnt exist for 8 years) that was mostly from raw japanese internet.
d) imagine loosing such a collection (45k to 150k images, in age of dialup where DL of 510kb image took 3 minutes give or take)
 
Last edited:
ps to above

aside from humiliation of a normie parent finding taboo hentai crap on PC back before H was even on western inernet, he found it cuz i got greedy and downloaded to much. He was trying to open up gig space on an 80gb HD and at 12gb I was taking too much of it.

note 500kb was largely over estimate. some were that big most were only couple dozen kb (avg of half a meg listed below)*

a) imagine having to delete that
b) realize this was over dial-up and imagine how long it took to create a collection of 12gb +/- over that, with the avg image being only half a megabyte.
c) because BS, imagine having to show ur sys admin dad whos a career IT pro, how you a young teen ammassed 12 gigs of basically "unsearchable data" (since google wouldnt exist for 8 years) that was mostly from raw japanese internet.
d) imagine loosing such a collection (45k to 150k images, in age of dialup where DL of 510kb image took 3 minutes give or take)
Yeah thankfully for me our parents simply didn't give that much of a shit what we rubbed one out to, as long as it wasn't ** or other things that would land them in legal hot water. Couple that with we also didn't care that our parents and other people at school knew what kinks were into/what porn genres we preferred and for us there was just relatively few secrets to keep or worry about. Of course after it it came out that I was the father of the my sister's daughter they were probably regretting let us openly download incest porn (even though that had little to nothing to do with that).
 
Yeah thankfully for me our parents simply didn't give that much of a shit what we rubbed one out to, as long as it wasn't ** or other things that would land them in legal hot water. Couple that with we also didn't care that our parents and other people at school knew what kinks were into/what porn genres we preferred and for us there was just relatively few secrets to keep or worry about. Of course after it it came out that I was the father of the my sister's daughter they were probably regretting let us openly download incest porn (even though that had little to nothing to do with that).
With me I mostly didn't care what ppl thought, I mean word got round but it was just embarassingly weird cuz the look of disgust and judgement yet same time "oh hey I outsmarted a tech guy" at such a young age. It was very mixed bag. And unfortunately fer myself, dad was one those raised strict baptist folk and most the town was like vanilla as shit.

Now town I went to college in back in '08 though, I showed my date my H on my psp in middle of a coffee shop on first date, and then we went to a movie n did the whole cock out and mutual masturbation thing for whole 3+ hours of 3:10 to yuma and then went a block over n fucked in the public park. Granted I did meet her on Collarme and we phone sex'd the night prior+all day but yea. Thats the kinda town I wish I grew up in an the kinda friens I wanted as a teen buut alas, stricts ville rural nowhere New Eng Town USA.
 
Yeah thankfully for me our parents simply didn't give that much of a shit what we rubbed one out to, as long as it wasn't ** or other things that would land them in legal hot water. Couple that with we also didn't care that our parents and other people at school knew what kinks were into/what porn genres we preferred and for us there was just relatively few secrets to keep or worry about. Of course after it it came out that I was the father of the my sister's daughter they were probably regretting let us openly download incest porn (even though that had little to nothing to do with that).
PS, saw mention of it elsewhere but think I forgot to reply but anyway, lucky dawg with the kinky sister. Wish I had one or even step sis like that. I am oldest of 5 but everyone was pretty vanilla. Its kinda odd bein the only kink in the fam but same time liberating cuz it's like, goldstar uniqueness.

On net pornz from young age though thats not why er how I ended up that way though. I ended up kink cuz like my libido awakened uber early and dialed all the way up to 11. Been waking up with mornin wood since an age younger than most the smols in most of those games. Trouble was as teen like it wasn't jus that, it was like boom boner at drop of hat randomly all day long. N the kind that jus dsn't go away easily either. To keep that in check, I had to like go 3x to 5x a day minimally jus to keep from getting those random awkward situations from happening. As result, I jus "explored" my sexuality and kinks and ended up with a big variety from vanilla to hardcore long b4 by time I was 16.

Bein oldest of siblings tho this kinda sucked cuz had spend most my time babysitting, so didn't really get to do much shit as a teen but hey had some fun in there sumwhere at least.
 
I use a seperate ssd to store stuff I want to keep private. I use the last drive letter to address it. So ATM it is E:
When I need privacy, I simply go into hdd manager and remove the drive letter. The drive can't be seen by anyone except for those who are looking for it. This will not work for people who know their way around hardware. Lets face it. I can take you hdd, plug it into a bay of this little device I have, and look at the raw data at my leisure. If I found a large block of encripted data, I get curious.... If you bury files 100 levels deep in a subdirectory, Not many people are going to dig that deep unless you are already in trouble. For most people, just marking a subdirectory as "HIDDEN". And then turning the "Show hidden directorys flag" to False. Flipping that flag will work for most family members. But the hidden drive idea will always work unless you have a real snooper.... One word of caution for you guys. I worked in coorporate IT for 35 years. If you are using a computer on my network, there are snoopers out there that know every keystroke you make. The snooper will pick up certain things and send them to my inbox on a regular basis. YOUR BOSS knows everything you do at work on that computer. If, that is, they have a few intelligent people on their IT team and you should assume they do. In my 35 years, I have seen more people fired for porn on their work computer than any other offence. One young man (a developer) came in on a Saturday and enjoied a day of loli thinking he was safe from the world. The next day he reviewed it with our female IT director and was fired and referred to the justice system. She was really pissed. The rest of us just couldn't believe how stupid a well educated young professional could not believe a fortune 500 company was going to watch what happens on their network. Hope this might help someone out there in the future.
 
I use a seperate ssd to store stuff I want to keep private. I use the last drive letter to address it. So ATM it is E:
When I need privacy, I simply go into hdd manager and remove the drive letter. The drive can't be seen by anyone except for those who are looking for it. This will not work for people who know their way around hardware. Lets face it. I can take you hdd, plug it into a bay of this little device I have, and look at the raw data at my leisure. If I found a large block of encripted data, I get curious.... If you bury files 100 levels deep in a subdirectory, Not many people are going to dig that deep unless you are already in trouble. For most people, just marking a subdirectory as "HIDDEN". And then turning the "Show hidden directorys flag" to False. Flipping that flag will work for most family members. But the hidden drive idea will always work unless you have a real snooper.... One word of caution for you guys. I worked in coorporate IT for 35 years. If you are using a computer on my network, there are snoopers out there that know every keystroke you make. The snooper will pick up certain things and send them to my inbox on a regular basis. YOUR BOSS knows everything you do at work on that computer. If, that is, they have a few intelligent people on their IT team and you should assume they do. In my 35 years, I have seen more people fired for porn on their work computer than any other offence. One young man (a developer) came in on a Saturday and enjoied a day of loli thinking he was safe from the world. The next day he reviewed it with our female IT director and was fired and referred to the justice system. She was really pissed. The rest of us just couldn't believe how stupid a well educated young professional could not believe a fortune 500 company was going to watch what happens on their network. Hope this might help someone out there in the future.
on work, yes if you use a networked device you are toast no matter what you do due to keylogging API in network +/- screenshare snooping/remote access instance recorded archiving. This also includes "home PCs" that may be used by employee from home to remote access the work network.

With "100 level subdirectory" if you are window's you are kinda F'd in this regard. Due to win10 update some time ago, Windows explorer has a character limit. That character limit is set by both ALL file folder names in the DIR path stack and the name of the file itself. Result, unless every folder/file only has a 2 character name, you will mostly only be able to establish a DIR stack of 20-50 folders deep.

Note; while you will be unable to build DIR stacks exceeding character limit, if your external device has those already, those files wont be "at risk" of loss or overwrite unless you add stuff to the external device (windows treats such partitioned data spaces as open occassionally, so importing new files to device may or maynot overwrite them regardless of free space remaining on device). While you won't be able to access/compress or decompress large DIR stacks, in windows, provided you do not modify drive's contents those DIR stacks will remain (you can still access them on nonWindows OS).
 
Just use VeraCrypt and call it a day.
Or. Use a linux distro.
I meself just use VeraCrypt and 32 characters in my password.
Games I dont encrypt. But the rest yes!

Have a good day. Give you mom my regards.
:D
Yeah literally just VeraCrypt and it's done. Make it a file and you can even back it up without decrypting. It was already recommended earlier in the thread, couple times actually.

Have no idea what schizo shit the other guys are doing. Seriously, what the fuck.
 
Yeah literally just VeraCrypt and it's done. Make it a file and you can even back it up without decrypting. It was already recommended earlier in the thread, couple times actually.

Have no idea what schizo shit the other guys are doing. Seriously, what the fuck.
VeraCrypt won't avoid temp files outside the encrypted container, won't avoid RenPy games to save data in "C:\ProgramData", won't avoid registry entries, won't avoid "recent files" entries, and so on.

In fact, it has the exact same problems you could find with the solution I gave above with a (virtual or real) encrypted drive. But at least, my solution uses only native tools from Windows, therefore nobody could suspect something by seeing an unusual tool like VeraCrypt: if an admin don't know what it is, he can delete it, thinking it's a malware/ransomware, leaving you without the deciphering program.
And if he knows what it is, then he also knows for sure that someone is hiding something - and can retrieve the data simply by searching for the specific extension.

First rule when you hide something: don't leave ANY evidence that something is hidden. Using VeraCrypt is like hiding something in a safe, and leaving the safe in the middle of the living room... Not very subtle, unless you're making an honey pot.
 
I think my solution is simplest: simply quit hiding things (keep secrets of any sort to a minimum) and quit giving a shit what other people would think. Not saying it's the case but only things I can think of to hide with the amount of trouble listed so far would be things like **, crypto wallet keys (people have lost millions of dollars by losing those), banking and other important passwords, etc which for security I simply memorize and don't write them down anywhere.
 
Eh....
I. (We). Just put the data like pictures, clips, compressed data in the veracrypt archive. I dont freaking encrypt my whole hdd.
And for games? Why? Games are "legal". Even if it has loli, beast, or any other kink. Why encrypt those?
You mom or gf DONT have the knowledge where to find it. Except when you put it on your desktop. Like you do! (Joke)
Anyhow. Just make a VeraCrypt container, put a password like //(675kktg!!!***6546t342g. Good to go.
And regarding registry entries. You can edit that too. And also recent last "used" files....

Or. Install a linux distro. Dont use freaking bitlocker or encryption that came with your ssd or computer.

Enough.
And swallow.... :D
?:D
Due to rollback, my detailled answer is lost. Won't do it again, so I'll resume with: you don't have a real clue about security, and "as it", you're giving bad advices - because if people who don't know about it too follow them, they will still be at risk while thinking they're protected, falling into the "false protection" scheme.
More important, you still don't realize that, in several countries, there is way more important risks than being scolded by Mom, or facing a divorce.

AFAIC, I don't care: I gave an advice freely, I don't seek for gratitude, attention or validation and my life won't change if someone decides to follow (or to reject) my advice. You can go, I don't care.
 
LMAO!

Anyways, VeraCrypt and folder permissions for Wangblows. Simple as!
Not enough, since its default settings aren't suitable and it isn't simple AT ALL to set them properly, at least for games - it is however enough for pictures and videos, you just need to clear "recent files" and/or use a software that didn't have this feature to open them.

And since you use terms like "Wangblows", that were already has-been in the 90's, don't even think that a Linux (or "Linsucks", if you prefer) could "save" you: as I said it in my (lost) detailled message, hacking a Linux when you get a physical access to the hard drive is... just trivial, even more simple than on Windows. Unless it is fully encrypted, of course, and even then, you can be fucked up if you used a "recommended" key for your UEFI's secure boot, and even more fucked up if you didn't use secure boot at all: both options can lead to being vulnerable to a rootkit.
 
My man, you just don't know what you're talking about.

It's enough. FDE with VeraCrypt protects data at rest and the OS itself handles access control. Appdata is already sandboxed between users on SHITdows and you can effortlessly click the funny little box that _explicitly_ states some variation of "install for this user only" or simply put in the path to a destination folder of your choosing if presented the option to do so instead.

I never stated nor implied that a LOOONIX box is "unhackable". Security principles are software agnostic.
 
Last edited:
My man, you just don't know what you're talking about.

It's enough. FDE with VeraCrypt protects data at rest and the OS itself handles access control. Appdata is already sandboxed between users on SHITdows and you can effortlessly click the funny little box that _explicitly_ states some variation of "install for this user only" or simply put in the path to a destination folder of your choosing if presented the option to do so instead.

I never stated nor implied that a LOOONIX box is "unhackable". Security principles are software agnostic.
Side note: Dude, quote messages, it's nicer since it allows notifications.

Are you a textbook example of the Dunning-Kruger effect? Because you appear overly confident despite appearing to overlook certain fundamentals...
  • VeraCrypt CAN NOT encrypt the system partition. So there isn't any full disk encryption with VeraCrypt, you need something like BitLocker instead - and if you do so, you don't need VeraCrypt anymore.
  • ACLs can't do ANYTHING against an administrator.
    Man, I can even blast off the protection induced by "TrustedInstaller" if I want to - already did it, in fact... You know, the little things that usually forbids you to mess up "Program Files" or "Windows" even when you're administrator.
    It's just a warning sign when you decide to break it anyway.
  • There is nothing as "sandboxing" on Windows, but for 32/64 bits isolation, and it's mostly for backward compatibility.
    Files are on the hard drive, and so they can be read by an admin.
  • "Install for this user only" does NOTHING REAL but creating the icon and the registry entries only for you, instead of "All Users".
    Binary files are still executable by everyone if they are in "Program Files".
  • To be exhaustive, you MAY install some softwares in "APPDATA", if you are seriously unaware of the danger. Doing this can allow you to install a software without being administrator... The problem is that the software itself can do the same (a certain Torrent client had this behaviour, and was often bundled with annoying stuff, too).
    But these softwares won't be hidden for an admin more than a few seconds, if he WANTS to go through your files.
  • PATH modification isn't more secure - I can't even see why you speak about this: don't you known there is a "cd" command, maybe? Or that "dir" can list hidden files/folders?
  • Everything above is obviously still valid if you plug the hard drive in another machine - whatever OS you use.
    Since you seems to despise both Windows and Linux, tell us then: which one do you favor? I need some good jokes, sometimes.

So:
  • Even if data MAY be safe inside the VeraCrypt volume, things like games will still leak data outside the encrypted archive, like:
    • Registry entries,
    • Temporary files,
    • Files in APPDATA or, worst, in "ProgramData" (save files, configuration, etc.),
    • Browser's history,
    • Recent files,
    • "Deleted" data still available to "undelete", or to be analyzed by gathering "free" sectors that may still contains unencrypted data.
  • NOTHING can protect unencrypted disks if another admin on the same machine decides to investigate it, or if the drive is plugged in another machine (and even if you were the only admin, of course).
    Only a full, low-level encryption can help you.
 
lol, lmao

"Dude" is really going to lecture me on > muh Dunning-Kruger when he didn't even do the most basic of research lel

Anyways, I'm gonna try to be quick:
  • (lol)
  • be the only administrator
  • UAC
  • does what it says on the tin
  • encrypted partition
  • OpenBSD :^)

So:
  • VeraCrypt System Encryption
    • Details: Access is denied.
    • You don't currently have permission to access this folder.
    • You don't currently have permission to access this folder. (ProgramData is public tho)
    • appdata
    • userdata
    • bleachbit
  • Encrypt your disks.

Anyways after doing lots of extra testing it looks like NTFS file-based encryption with EFS is the best way to keep data {mostly) secure from administrators for Windows users if it's available. They can still see the metadata. Hope you backed up your private keys!
 
Last edited:
"Dude" is really going to lecture me on > muh Dunning-Kruger when he didn't even do the most basic of research lel
Still didn't learnt to click on "Reply"? It isn't that hard, unless you try to desperately have the last word by hoping that I won't watch this topic manually.

Read CAREFULLY the note at end of the webpage you linked. The WHOLE note. ALL words. I can use crayons to explain to you if you didn't understand everything.

Everything else is irrelevant after that, and VeraCrypt is still NOT a valid solution for a Full Disk Encryption... Since either it won't encrypt everything, or it will leave an open door to any kind of rootkit - including very old ones. So the possible leaks I listed before are still valid.

NTFS encryption isn't a solution if you aren't the only administrator, since an administrator can override your password easily on any local account - Microsoft introduced login through Live accounts partly because of that. And you propose to use that to protect data from an admin? That's... special. I don't call that a "solution", since NTFS encryption is mostly interesting on removable/network drives, in particular public ones, and certainly not on the local machine UNLESS you're the only one administrator on it... But in this case, you don't really need this encryption either since ACLs would do a better job, but for the case where the disk is extracted and analyzed on another machine.

If I've listed this solution as "only" the 4th one in my initial message, it wasn't without good reasons. And I warned also that anything but a (real...) full disk encryption can be undone quite easily - you do understand that having at the same time the encrypted file, the decrypted file [from Internet for example] and the cryptographic algorithm used would make the job of a cryptanalyst close to trivial? Meaning that encrypting games or things like well-known files is a huge security breach?

You're just stacking things on top of a flawed "security", without understanding that computer security doesn't need so much things - you need few things, but done well, with the proper tools and at the proper time. If you need to think about it constantly, or worse, to take manual actions to maintain your security, then you WILL face a security breach. It's not a "if", it's a "when". And by experience, it will be in less than a month.

Funnier, you listed UAC in your protection schemes... WTF? UAC is relevant for system's own integrity, and certainly not for securing your data. UAC never ever protected anything from being deleted, copied, modified in users' folders, and never ever protected anything against an administrator either. It's ACLs' job to protect files themselves.

OpenBSD: the option to make a FDE is still unchecked by default at install time, I suppose? And it still can't properly use TPM? Because an unencrypted FFS disk won't be a challenge, once plugged in another machine... So I don't see where the "security" is located. Don't mix security against online attacks, and security against offline attacks. These are two radically different worlds. You don't have "more" security with OpenBSD than you have on Windows without BitLocker - or any other OS without FDE, in fact.


And yes, I'm already lecturing you: it isn't that hard, to tell the truth. It clearly seems that you aren't vicious (and/or paranoid) enough to speak about security. And you still didn't understood a MAJOR problem about computer's security: not everyone has your grandmother's level of computer skills. And not everyone lives in a country where the worst consequence for a few terabytes of pornography would be a major embarrassment at the next family dinner.

Again: in some countries, you could be facing a life sentence or even the death penalty. And those who will search your disk won't be script kiddies or your parents, but much worse (because far more competent) than that. Your "protections" won't stop them for more than a handful of days, or even half a day if you messed up something. My protections can block them longer than I'll live, and even my grandchildren won't see the day they would crack them.

Now, do you grasp the difference between the two?
 
Status
Not open for further replies.
Back
Top Bottom