<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>Outpost 6</title>
  <link href="/atom.xml" rel="self" />
  <link href="/" />
  <updated>2026-03-05T05:22:45-05:00</updated>
  <author><name>Outpost6.com</name></author>
  <id>/</id>
  <entry>
    <title>Proving File Existence, Ownership, and Integrity: A Step-by-Step Guide</title>
    <link href="/?post=2025-10-08b" />
    <id>tag:,2025-10-08:2025-10-08b</id>
    <updated>2025-10-08T00:00:00-04:00</updated>
    <content type="html">&lt;p&gt;This guide outlines a reliable method to prove a file's existence, ownership, and integrity at a specific time using emails, SHA-256 hashing, and OpenPGP digital signatures. Follow these steps to create an indisputable record. Step 1: Email Files to Establish Timestamp Send the file to two independent email addresses (e.g., emailaddress1@gmail.com and emailaddress2@outlook.com) in a single email. Email providers timestamp the receipt, which cannot be altered by users. Forwarding the email to a requesting party reveals the original timestamp in the email header and metadata, proving the file existed at that time. Using two services ensures redundancy, as it’s highly unlikely both would have incorrect timestamps simultaneously. Step 2: Generate SHA-256 Hash to Prove File Integrity Use software like RapidCRCUnicodePortable.exe or the Windows command line (certutil -hashfile &amp;quot;filename.ext&amp;quot; SHA256) to create a SHA-256 hash of the file. This generates a unique 256-bit “fingerprint.” Even a one-byte change produces a different hash, proving the file hasn’t been tampered with. Verify the hash at &lt;a href=&quot;https://emn178.github.io/online-tools/sha256_checksum.html&quot;&gt;https://emn178.github.io/online-tools/sha256_checksum.html&lt;/a&gt;. Store the original file on a USB drive for additional verification if needed. Example: For a file named letter.jpg: Run: certutil -hashfile letter.jpg SHA256 Save the output as letter.jpg.sha256. Step 3: Sign Files with OpenPGP to Prove&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;/?post=2025-10-08b&quot;&gt;Read full article&lt;/a&gt;&lt;/p&gt;</content>
  </entry>
  <entry>
    <title>Email Is the Oldest Surveillance Tool on the Internet</title>
    <link href="/?post=2025-10-08" />
    <id>tag:,2025-10-08:2025-10-08</id>
    <updated>2025-10-08T00:00:00-04:00</updated>
    <content type="html">&lt;p&gt;Every time you sign up for a new account, buy something online, or download an app, the first thing they ask for isn’t your name — it’s your email address. That address is your passport through the digital world, but it’s also a tracking beacon. It’s static, permanent, and predictable. Once tied to you, it becomes the foundation for a profile that corporations, data brokers, and governments can build upon indefinitely. You can change your password, even your physical address. But you probably never change your email. That’s why it’s so valuable to the data brokers. How They Collect Data Most people assume tracking happens through cookies or phone apps. In reality, the email address is more powerful than either. It’s not confined to a browser. It’s the one field every company demands. Even when companies claim to “anonymize” or “hash” your address, that hash still acts as a fingerprint. Once it’s matched in a few databases — say, from a retailer, a streaming service, and a bank — you’re mapped. That map doesn’t disappear. They know what you buy, what time you’re awake, how often you move, and what political newsletters you read. Breaking the Link There’s a simple&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;/?post=2025-10-08&quot;&gt;Read full article&lt;/a&gt;&lt;/p&gt;</content>
  </entry>
  <entry>
    <title>Babies Died. Operation Babylift</title>
    <link href="/?post=2025-10-07" />
    <id>tag:,2025-10-07:2025-10-07</id>
    <updated>2025-10-07T00:00:00-04:00</updated>
    <content type="html">&lt;p&gt;Learning about a thing that happened at the end of the Vietnam War. It had to do with babies that were being taken out of the country for adoption? Video that I stumbled upon: ChatGPT provided a bit more info: 1975 Tân Sơn Nhứt C-5 Crash (First Babylift Flight) Date: April 4, 1975 A USAF Lockheed C-5A Galaxy (68-0218) crashed shortly after takeoff from Tan Son Nhut Air Base, Saigon. The flight was the first leg of Operation Babylift, intended to evacuate hundreds of South Vietnamese orphans as North Vietnamese forces advanced toward the city. Mission context: The aircraft carried more than 300 people — including U.S. military and embassy personnel, flight nurses, and orphans from local institutions being airlifted to Clark Air Base (Philippines). Cause of crash: A failure in the rear cargo door locks caused explosive decompression about 12 minutes after takeoff. The failure severed flight control cables, leaving the crew only limited control via engine thrust and a few remaining cables. Crash sequence: The pilots attempted to return to Tan Son Nhut for an emergency landing. They descended too rapidly, struck the ground in a rice field about 12 miles from the base, slid several hundred yards,&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;/?post=2025-10-07&quot;&gt;Read full article&lt;/a&gt;&lt;/p&gt;</content>
  </entry>
  <entry>
    <title>YT-DLP Common Commands</title>
    <link href="/?post=2025-10-06b" />
    <id>tag:,2025-10-06:2025-10-06b</id>
    <updated>2025-10-06T00:00:00-04:00</updated>
    <content type="html">&lt;p&gt;In some cases, downloading YouTube videos is a legal thing to do. I just had a situation where I'd lost the original file to one of my uploaded videos. I wanted to make sure I had a copy, so I used YT-DLP to get the video. For work I am also asked to get content from videos, and it's always like pulling teeth to try and get the original video from the client. Either that, or it's so big, it just wouldn't be practical to use anything to upload/download it in a reasonable amount of time. I often ask the client if I can just download the video off YouTube if they're fine with it to save time and money. They always say yes. For those moments, I use YT-DLP, which installs on my windows 11 machine and runs from the command line. Install YT-DLP along with FFMPEG.exe in my videos folder. Next I hit WIN+R and in the run box, I type CMD and hit enter to get the command prompt window. On the command line, I change directories to the Videos directory by typing: cd Videos Now I am in the Videos folder. Here are the commands that&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;/?post=2025-10-06b&quot;&gt;Read full article&lt;/a&gt;&lt;/p&gt;</content>
  </entry>
  <entry>
    <title>How To Organize Files On Your Computer</title>
    <link href="/?post=2025-10-06" />
    <id>tag:,2025-10-06:2025-10-06</id>
    <updated>2025-10-06T00:00:00-04:00</updated>
    <content type="html">&lt;p&gt;...or any other storage device. I used to be a total mess when it came to saving files on my devices. Like, I'd drop everything into the Downloads folder and go hunting from there. If I saved a copy of a file, I would soon forget where I'd put it and either save another copy or consider it just lost. It was a horrible system, and I never found anything in a reasonable amount of time. One day I just got sick of it. I have eight porable hard drives (SSD and platter) and about a million USB drives. I am always needing more space because I never organized anything, and the amount of duplicate files across the storage was through the roof. Moving Existing Files into a Folder Structure I have a reasonably fast 4TB NVME drive and enclosure that I used as the master drive. This is plugged into a 4-port USB hub that is plugged into the USB-C port of my computer. The drive is empty and EXFat formatted (not sure if that makes any difference). I set up my folders with numbering. Below is an example of how I formatted the folders on the drive: [0001]&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;/?post=2025-10-06&quot;&gt;Read full article&lt;/a&gt;&lt;/p&gt;</content>
  </entry>
  <entry>
    <title>I am a Ghost... Not really.</title>
    <link href="/?post=2025-10-05b" />
    <id>tag:,2025-10-05:2025-10-05b</id>
    <updated>2025-10-05T00:00:00-04:00</updated>
    <content type="html">&lt;p&gt;I'm just an average guy that lives in the US. Not some secret spy, and I don't work in some three letter agency out of Langly. I am very well aware that I am not anonymous. I have rewards accounts and I've haven't been too concerned with what &amp;quot;they&amp;quot; know or not. But privacy and security are the kinds of things that once your interest is sparked, and you begin to learn, a balance has to be struck between being known and safeguarding what you don't want data brokers to know. I figure that if the US Government wanted to know about me, they'd have everything they need to find me through my regular and usual habits. Obviously, I'm not changing any of that since I don't have any reason to. I'm not switching jobs, and if I did, it's not something that could easily be hidden because taxes are a thing. So I've decided that I am more concerned about the average person who might want to look me up. A curious aquaintence. A manager. Perhaps a stalker girl I met at a bar a week or two ago. I don't need to evade men in black suits, and&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;/?post=2025-10-05b&quot;&gt;Read full article&lt;/a&gt;&lt;/p&gt;</content>
  </entry>
  <entry>
    <title>Bitcoin Knots: A Better Alternative to Bitcoin Core Nodes</title>
    <link href="/?post=2025-10-05" />
    <id>tag:,2025-10-05:2025-10-05</id>
    <updated>2025-10-05T00:00:00-04:00</updated>
    <content type="html">&lt;p&gt;Introduction: Privacy, Wealth, and Peace of Mind Modern finance offers little in the way of discretion. Credit card companies record purchases, banks track balances, and mobile payment apps log every transfer between friends. Each interaction leaves a trail that can be analyzed, sold, or shared. For those who value independence, this lack of privacy is no small matter. At the same time, many people are rethinking how they store and preserve wealth. Traditional investments in stocks, bonds, and real estate remain important, but alternative assets are increasingly seen as safeguards against inflation, geopolitical stress, and systemic risk. Bitcoin has entered this conversation as digital money that is scarce, portable, and verifiable by anyone with the right tools. For newcomers, Bitcoin often begins as a speculative investment. A colleague mentions it, or a headline sparks curiosity. Accounts are opened at large exchanges, balances checked on a smartphone, and the asset is treated like a volatile stock. Yet the true strength of Bitcoin lies not in speculation but in sovereignty. Unlike other investments, it can be verified directly by the individual. That verification happens through running a Bitcoin node. A node is software that connects to the Bitcoin network and checks every&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;/?post=2025-10-05&quot;&gt;Read full article&lt;/a&gt;&lt;/p&gt;</content>
  </entry>
  <entry>
    <title>My Raspberry Pi Now Runs Umbrel and Bitcoin Knots</title>
    <link href="/?post=2025-09-13" />
    <id>tag:,2025-09-13:2025-09-13</id>
    <updated>2025-09-13T00:00:00-04:00</updated>
    <content type="html">&lt;p&gt;My Raspberry Pi has been running since 10PM last night. I loaded Umbrel on the microSD card, and a have a 2TB Western Digital NVME for storage. I run Bitcoin Knots. It gives me a bit more control than running Bitcoin Core. So I've been downloading the blockchain for 18 hours. the dashboard says 19.41% synced. I'm guessing that it will be a total of four or five days in all to get the whole blockchain. Not a big deal other than getting over my impatience to start using the node. I haven't really kept up to speed on the whole Bitcoin Core vs. Bitcoin Knots debate that is going on right now. I just like being able to configure more with Knots than is available in Core (without having developer-level knowledge). On the other side, I use Sparrow Wallet on another Raspberry Pi to do all transactions on. That one is only plugged in when I need to use it. I have watch-only wallets in the blue wallet app. I don't transact from the phone. A lot of my BTC holdings have been purchased through KYC sources. Haven't really been that concerned about privacy since I'm not doing anything&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;/?post=2025-09-13&quot;&gt;Read full article&lt;/a&gt;&lt;/p&gt;</content>
  </entry>
  <entry>
    <title>OP_RETURN in Bitcoin Core 30: What You Need to Know</title>
    <link href="/?post=2025-09-13-a" />
    <id>tag:,2025-09-13:2025-09-13-a</id>
    <updated>2025-09-13T00:00:00-04:00</updated>
    <content type="html">&lt;p&gt;Bitcoin Core 30 introduces a change to how OP_RETURN transactions are handled, and it has sparked discussion in the community. This update is about increasing the amount of data that can be attached to a transaction using OP_RETURN. While the feature itself is not new, the size increase raises both opportunities and concerns. What Is OP_RETURN? OP_RETURN is a part of Bitcoin’s scripting system that lets users attach non-monetary data to a transaction. Because outputs with OP_RETURN are unspendable, they do not add weight to the UTXO set, which helps keep the system efficient. Developers and users have used OP_RETURN in the past for things like digital signatures, file timestamps, and proofs of ownership. The Change in Bitcoin Core 30 Up until now, OP_RETURN outputs were capped at 80 bytes. This was enough for small pieces of metadata but limited for other uses. Bitcoin Core 30 changes the default policy, raising the OP_RETURN size allowance to 100,000 bytes. To put that in perspective: 92 bytes is enough for a very tiny, almost unreadable image. Around 33,000 bytes can already hold a recognizable, high-quality image. At 100,000 bytes, it becomes possible to embed even larger images or short video clips. This&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;/?post=2025-09-13-a&quot;&gt;Read full article&lt;/a&gt;&lt;/p&gt;</content>
  </entry>
  <entry>
    <title>TOZO Crystal Pods: Eight Months of Daily Use</title>
    <link href="/?post=2025-07-20-a" />
    <id>tag:,2025-07-20:2025-07-20-a</id>
    <updated>2025-07-20T00:00:00-04:00</updated>
    <content type="html">&lt;p&gt;For the past eight months, I’ve been using the TOZO Hybrid Active Noise Cancelling Wireless Earbuds, known as the Crystal Pods, with their clear case design. I grabbed these for their Bluetooth 5.4, 10mm drivers, and the ability to tweak sound through the TOZO app. As someone who likes gear that’s practical and doesn’t cost an arm and a leg, these seemed like a solid pick. They’ve tagged along on my commutes, hikes, and amateur radio sessions. Here’s my no-nonsense take on how they’ve held up, what works, what doesn’t, and what you need to know if you’re considering them. First Look and Build The transparent case is what first caught my eye. It’s not just a cool look; you can see the tech inside, which appeals to my tinkerer side. The earbuds are small, glossy, and come with six ear tip sizes. The medium tips fit my ears well, staying secure whether I’m walking the dog or messing with my Raspberry Pi projects. The case is light and fits in my pocket, but it scratches easily if you toss it in a bag with other stuff. It’s not a big deal, but a pouch might help if you’re picky&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;/?post=2025-07-20-a&quot;&gt;Read full article&lt;/a&gt;&lt;/p&gt;</content>
  </entry>
</feed>
