Guys, im from /pol/ just here to share my findings on a throw away acct.
https://ghostbin.com/paste/ed6zq
Summaries, archivals, etc
Draw your connections, and goodluck. Ill be lurking back n forth
For what it's worth, both Donald Trump's CIA director and President Obama's CIA director have stated that Wikileaks is actively working against American interests. Make of that what you will, but at the very least we can say that the opinion is bipartisan, which is saying a hell of a lot these days.
"We designed Haven as a tool for investigative journalists, human rights defenders, and people at risk," Snowden says in a video introducing the app. "Haven makes it harder to silence citizens — raids, searches, arrests — without getting caught in the act."
Since the app is currently in open beta, you can test it out for yourself right here; beware that some things might not work perfectly (or at all). And if you wanna hear more about Haven from Snowden himself, check out this video:
Best analysis of the regime change planned for Syria, using WikiLeaks documents, is from the book "The WikiLeaks Files", which contains a pretty good analysis of several geopolitical issues using the cables, with an introduction by Assange that is worth reading to understand why this is so important. No mainstream media clickbait, or pro-war propaganda laundered through think tanks or allied governments, but analysis using diplomatic cables, the closest thing to scientific journalism you will get nowadays.
You can find an extract of the Syria section here:
Edit: It looks like this was for staff: https://twitter.com/#!/jamesrbuk/status/68702854789070848 That being said, the (nearly?) member of staff in question works also for the Guardian; only a slight conflict of interest.
Headline is misleading. It seems to imply that there is an anti-leaking policy within Wikileaks, for Wikileaks staff. This is not the case. This is no doubt in response to The Guardian (and the NYTimes) where agreements were broken. There was a coalition of larger and smaller publicists across many countries, but of course the big boys wanted all the glory.
It should be considered how Assange and the other Wikileak's staff are literally risking their lives for journalism, yet the advertising revenue goes elsewhere. Why shouldn't the organisation seek to protect it's assets it shares between organisations, from one unscrupulous partner trying to undermine the rest? Likewise, why is it okay for mainstream publicists to make a tidy profit from leaks, yet Wikileaks cannot even contemplate such an income? If you believe Wikileaks should release for free all information, then you should hold all publicists to the same standard. Otherwise, one is just picking and choosing how one applies morality, and thus this is yet more demonising Assange and Wikileaks bullshit. Remember, The Guardian has offered absolutely no financial aid from all that sky rocketing international internet traffic.
Came up in a conversation the other day - his torrent is still up and it needs seeders: https://thepiratebay.org/description.php?id=8014584
The kind of greed that prevents people from learning, the kind of greed that kills off the path to brilliance is the same kind of greed that killed a brilliant man. He is the Prometheus of our time - stealing fire from the gods to keep us warm.
Aaron Swartz is a legend I will never forget. I wish I could have been there to talk him out of suicide.
>Sony is a member of the MPAA and a strong lobbyist on issues around internet policy, piracy, trade agreements and copyright issues. The emails show the back and forth on lobbying and political efforts, not only with the MPAA but with politicians directly. In November 2013 WikiLeaks published a secret draft of the Trans-Pacific Partnership (TPP) IP Chapter. The Sony Archives show SPE's internal reactions, including discussing the impact with Michael Froman, the US Trade Representative. It also references the case against Megaupload and the extradition of its founder Kim DotCom from New Zealand as part of SPE's war on piracy.
I really really recommend reading Manufacturing Consent to anyone who hasn't. Its as relevant today as when it was written. One of its focuses is on New York Times: https://www.amazon.com/Manufacturing-Consent-Political-Economy-Media/dp/0375714499 or however the heck you read books. I don't think Noam would give a crap if you pirate it.
>Note re #PanamaPapers: #WikiLeaks does not have a 'tip line' so the comment is odd. We take submissions here 24h/day https://wikileaks.org/#submit
Rallies are currently scheduled at Leavenworth prison for Saturday, the 4th of June, at 11:30am. Any Kansas/Missouri folk, please join us on facebook for more info.
This infomation has been released: https://wikileaks.org/cia-emails/
Documents leaked include
Doc ID 121016 https://wikileaks.org/akp-emails/fileid/63441/25635
"3. plan: Akp yüzde 30'u aşamazsa geriye tek çözüm kalıyor onlara göre, oylara hile karıştırıp oylarını yüzde 30'un üstüne sahtekarlıkla çekecek akp. Bunu da seçimin en üst merkezine oyları sayan yüksek seçim kurulu sanırım işte oraya memurluktan atma vs. gibi baskılar ile akp yine seçimde yüzde 30'u geçemese bile yüzde 30'u geçecek,şantajla baskı ile, bunu uygulamayan seçim memurlarını değiştirecek,görevden alacak,hatta bir suikast ile öldürecek."
3rd plan for the 2015 election, if we(AKP) aren't going to get at least 30% of the votes lets resort to shady tactics. Whats even worse is the last part says for their officials who fail to achieve this, lets blackmail them, fire them, or even conspire to kill them.
Am I accurate? Can this be real?
They never ever pay 200.000$ per year for server-leasing. And they are not in 40 countries. Julian is cheating by geolocating each mirror-server. But he's not paying a dime for any of them, because they are being run by volunteers who did nothing but setup another VirtualHost. The only infrastructure they have left is a server in Sweden (PRQ), OVH (FR) and afaik two 1U serversat Bahnhof, also in Sweden. I am not even sure if the server at PRQ is still running. Last time I checked it only ran their no longer advertised IRCd and you could only connect via its IP address.
edit: typo-fix.
I'm very interested actually. I've just been cracking the same Shillary joke for more than a year. There already was an investigation in Trump/Russia ties. The fbi said there was no clear link. Now I'm supposed to believe they knew all along there was a link, and they lied when they said there wasn't one? https://www.nytimes.com/2016/11/01/us/politics/fbi-russia-election-donald-trump.html?_r=0
The error comes from focusing on the wrong filters. The "liberal media" is a thing (in two ways, really, but let's focus on the one people generally refer to) when you look at rhetoric. This can be determined through linguistic data analysis, which Seth Stephens-Davidowitz did in his book Everybody Lies. One of the interesting things he shows there is that the rhetorical bias varies not by ownership, for instance, but mostly through the dominant political leaning of the area in which the paper (which was the focus of the study) is sold. That is, a news outlet's rhetorical bias depends on its audience, not its owners.
This analysis is useful, but there is a glaring problem with it: In focusing on rhetoric, it ignores actual policy advocacy and, importantly, publication bias. And that's where the owners have influence. As long as the policy advocated agrees with the owners (and the media's inherent structural biases, re: the Herman-Chomsky Propaganda Model), how it is presented (the rhetoric) only matters to the extent that it influences revenue. And anything that is counter to these interests, will be ignored.
So, yes, there is a "liberal media" (and they're actually fairly dominant). Problem is, they are liberal in rhetoric only (and sometimes in actual policy, depending on what you mean by 'liberal'). What the media doesn't tell you is usually much more important than what it does.
Awesome, thank you! Here is the link to the website : https://www.ethereum.org/
I do get confused on some aspects, as I'm more casually learning and less invested or tech savvy. In the interview, he seemed to suggest Ethereum is suited for 'low use' applications, like Word or PDF storage, and less suitable for something like Dota 2. Is that what you see as the potential for the tech at the moment?
Also (as I haven't used it), can you, for example, open Tor on Ethereum to browse anonymously via network or can you not connect to out of network data from within Ethereum?
I could imagine a 'reddit' built for Ethereum that would just be fucking amazing, but wanted to know your thoughts :)
yeah, it definitely appears to be a money grab. Web Of Trust shows the site as incredibly untrustworthy, with users citing privacy concerns "suspcious" and "misleading claims or unethical"
a few comments on the site:
>This site is possibly pretending to be the BBC, is stealing content from other sites and uses trackers and cookies. It also does not use SSL encryption and has a very weak privacy policy.
` > Clickbait site hosts fake or cliff hanger news stories to get revenue.
They collected pledges, not donations. i.e. people didn't actually give the money, they just made a promise to give it should WikiLeaks release the document.
However WikiLeaks did do the service of making the agreement searchable: https://wikileaks.org/tpp-final/
I rarely comment to outside new sources, but this article pissed me off to the point where I just HAD to. Unless Carr has edited it, he completely left out that it was Wired/Poulson/Lamo that outed Bradley Manning, and insinuated it was Julian Assange/WL that outed him. He also got into strawman arguments with some of the commentors - which didn't do him any good.
redditors need to get more involved with other news sites, especially since we are supporters of and contributors to an aggregator site, and hopefully willing to back up what we say with linked proof. Our style of commenting to counterbalance bullshit such as Carr wrote could have an astonishing effect.
Although, I think Assange's assertion that the ISIS "grey zone" strategy "...is working splendidly..." is a bit over stated, it's important to understand the mechanisms that make such a strategy viable. Hysterical and bigoted reactions are predictable, no doubt. And it's of little surprise to hear Conservative leaders in the US and France call for intolerance regarding Syrian refugees and Muslims. What's more surprising, and a cause for concern, is the part the news media plays, specifically in the US, to enable fear mongering and bigotry.
Thought I should add this to the comments and not the post because it's already big enough.
These two emails from the database contain PDF file links to the script revisions that where ran by the NFL in October last year.
https://wikileaks.org/sony/emails/emailid/115190 (contains revised script)
https://wikileaks.org/sony/emails/emailid/99377 (contains the notes only)
Gotta love how they changed "A True Story" to "Based on a True Story"
You mean, by posting this link to Reddit, I could be charged with a crime?
How would that work? I'm in America.
Australia bans reporting of multi-nation corruption case involving Malaysia, Indonesia and Vietnam
The case concerns allegations of multi-million dollar inducements made by agents of the RBA subsidiaries Securency and Note Printing Australia in order to secure contracts for the supply of Australian-style polymer bank notes to the governments of Malaysia, Indonesia, Vietnam and other countries.
http://www.makeuseof.com/tag/4-ways-to-hide-secret-messages-in-pictures/
Ubisoft uses the one program all the time for its weekly dlc. If you run it through the software and it asks for a password, there's something hidden. I'm on mobile so I'm out of the loop for now.
Twitter didn't do anything wrong - in fact they are the good guys in this story.
http://techcrunch.com/2011/01/07/twitter-informs-users-of-doj-wikileaks-court-order-didnt-have-to/
I think you're referring to Wordfence. https://www.wordfence.com/blog/2016/12/russia-malware-ip-hack/
The correct answer is "what proof do you have it was Russia" though, don't let the trolls put the burden on you.
Then there's things like William Binney (former NSA director) writing an open letter saying it wasn't Russia.
Why the hell are you recommending gab over other alternatives? You're just preying on this situation as an opportunity to plug people into a service with an alt-right userbase instead of a left-leaning service.
Gab does not at all address the root of the problem.
Gab is another proprietary service run by a corporation that will put their interests before the users simply because decision-making power is concentrated in this corporation.
It's closed-source; you don't know what the platform actually does, and you don't know who has control over their centralized servers, or what they will do with them.
<strong>Use Mastodon.</strong> It's free, open-source, and allows decentralized servers to federate.
Still up to now, My ISP appears to be blocking Wikileaks.org? Using Tor I am able to access with no issues. This is effecting a number of users, but we're not sure who/where.
Comcast Here - Blocked 502 still as of 12:38 EST
Download Tor and browse anonymously: https://www.torproject.org/
EDIT: Ironically enough Twitter is down, however, is working 100% in Tor as well
i thought this was important enough to share with my friends on facebook, now, 5 minutes after i posted it, my account is suspiciously unavailable...... here's what it says: https://www.facebook.com/sorry.php?msg=account
Senatorial candidate Obama in 2003 branded the Patriot Act “shoddy and dangerous” and pledged to dump it.
Elected Obama with little fanfare and comment routinely let stand most of the still noxious provisions in the Act.
https://www.huffpost.com/entry/did-obama-break-his-campa_b_288112
The original blog post: https://anonyyc.wordpress.com/2015/09/27/55-wikileaks-reveals-cbc-and-canada-post-may-be-sold-under-tpp-agreement/
The relevant document on Wikileaks: https://wikileaks.org/tpp-soe-minister/
Then just follow the links they give to other sources or try looking it up elsewhere
Here's the email that the article quotes: https://wikileaks.org/sony/emails/emailid/117082
It is from Richard Stengel, the Dept of State's Under Secretary of State for Public Diplomacy and Public Affairs, to Michael Lynton, chairman and CEO of Sony Entertainment Inc.
However I didn't find this quote from that article anywhere in the archive: ""Who are folks I can or should see in NY re anti-Russian messaging — and also anti-ISIL messaging?" he asks Lynton in another email.
To be fair (although I too doubt the bona fides of the WSJ), the T&Cs also point submitters to Tor: "Despite efforts to minimize the information collected, we cannot ensure complete anonymity. For additional security, you can use certain online tools, such as The Tor Project (https://www.torproject.org), to submit any documents or information. When used correctly, these services and software can block the recipient of information from knowing the source of that information."
"Spokesman Kristinn Hrafnsson in WikiLeaks announced a new major release in a short time Saturday when he attended the investigative conference for Norwegian journalists in Tønsberg."
Try TAILS - it's brilliant.
https://tails.boum.org/about/index.en.html
Here's all the relevant info
It's essentially a full working operating system that you can install on a USB stick, that will preserve your privacy and anonymity, giving you the ability to use the internet 'anonymously' and circumvent censorship. You can use it on any computer, and it will leave no trace unless you ask it to explicitly.
It comes with built-in applications pre-configured with security in mind: web browser, instant message client, email client, office suite, and an image and sound editor (and more).
Additionally, Tails relies on the Tor anonymity network to protect your privacy online, and even if an application tries to connect to the Internet directly, the connection is automatically blocked for security.
What makes TAILS better than simply using Tor by itself is that it is configured with special care to not use the computer's hard-disks.
The only storage space used by Tails is in RAM, which is automatically erased when the computer shuts down. So you won't leave any trace on the computer either of the Tails system itself or what you used it for. If you want to save specific documents you have created, or downloaded, you can save to a USB stick or external hard-disk and take them away for future use.
Tails doesn't alter or depend on the computer's native operating system at all - it means you can use it on a friend's computer, or a work computer, or the local library. After shutting down Tails, the computer will start again with it's usual operating system, as if nothing had happened at all.
There is a really good guide on the website on how to set up your USB stick - it's very easy.
I was reading/searching through some of these emails, and apparently a lot of the work they do involves this piece of software they use referred to as the Remote Control System (or RCS). It has different versions/names and everything (da Vinci, Galileo). Here's some info I found on their latest one, version 10. New versions are usually announced from support at hackingteam dot com, so you can search emails from there for RCS or whatever.
This was one of the msgs that led me there (an email from their "key account manager").
Does anybody have a link to the court documents? Tried googling around but couldn't find it.
There's a few key details I'd like to look into :)
edit: found a good write up here https://steemit.com/pizzagate/@mes/video-notes-pizzagate-part-15-kurt-eichenwald-and-justin-berry-censorship-cnnleaks-more
What the fuck did Twitter do wrong?
They made that shit public and gave all the people who are being subpoenaed (?) the opportunity to fight back.
>The court issuing the subpoena said it had "reasonable grounds" to believe Twitter held information "relevant and material to an ongoing criminal investigation".
>It ordered Twitter not to notify the targets of the subpoena – an order the company successfully challenged.
Please inform yourself before you're writing misinformed posts.
Sincerely,
me
https://player.fm/series/1264258/173318227
(this exchange happens at 3:41)
>BRAZILE: ....when Seth died, it really changed my life.
>POLITICO: Did you work with Seth a lot?
>BRAZILE: Seth belonged to my department...I, I, I was a former vice chair for civic engagement and voter protection...and I had three staff people, and Seth was a member of my team. Uh, he was a great member of my team.
>He developed a lot of the technology that we began to use to help citizens register to vote, and those citizens that were registered to find their polling place, so...so it really came as...came as a complete shock.
>"Seth was a patriot. He wanted to participate in electoral democracy...he had, um, uh...he had applied to even go up to Brooklyn to work on the Clinton campaign once the nomination was over, uh...he was in (?) to transition, and he was murdered in the midst of that."
At this point, the interviewer changed the subject back to her preparations to chair the DNC.
Try Tutanota. They encrypt everything. Only you can read it. When the German govt demanded that they turn over emails, they could only give the encrypted files. That's what I would go with today if I were trying to be a ghost.
The real issue is the VPN. I'm not sure what to do there today. I'd have to do a lot of research. If anybody has ideas, let me know.
Here it is. You should be able to copy and paste this into an excel file (I tested it on Windows). https://ghostbin.com/paste/co8gb
Don't thank me thank /u/ayearago, they did the actual work I just remembered stuff.
https://ghostbin.com/paste/aeygy
Not sure how relevant this is. But this seems to be the procedure to request payment history.
We just need the FBI to do so for the domain toddandclare.com
I don't know what evidence they need for it not be circumstantial. I don't think any judge would grant the request with what we have so far.
Isn't there some right to know your accuser in the court of law? What about that method. We know they filed charges. We need to know who did so and if so on the behalf of.
There's a few interesting things in there if you look hard enough.
Check out /u/rebelliousskoundrel's steemit post: https://steemit.com/macronleaks/@rebelskum/macronleaks-uncensored-the-cia-takeover-of-smart-card-company-gemplus-gemalto Definitely provides some insights into events from 15 years ago that may still be relevant today.
It seemed a bit sensationalist to me at first but I went through and fact checked the first half... Ziad Takieddine vs Alex Mandl stuff is certainly worth keeping in mind. (Haven't gotten to the Rothschild part yet.)
Site just launched 11 hrs ago, announcement post is here https://steemit.com/steemleak/@steemleak/steemleak-steemleak-com-launched
If you're on steemit , and want to support wikileaks you can now do it without spending a cent of your own money. Vote on @steemleak stories and receive a reward for curating popular content ..
Slimiest media org comment: https://twitter.com/wikileaks/status/31850848468336640
Also: It should be noted, that as far as we know, neither we, nor the Guardian have any inside knowledge as to who the sources are.
Be sure and leave some reviews for the Todd and Clare "book" on Amazon. (People are starting to leave funny ones).
I never read the book,but here is a synopsis from the Amazon page:
In Our Revolution, Sanders shares his personal experiences from the campaign trail, recounting the details of his historic primary fight and the people who made it possible. And for the millions looking to continue the political revolution, he outlines a progressive economic, environmental, racial, and social justice agenda that will create jobs, raise wages, protect the environment, and provide health care for all―and ultimately transform our country and our world for the better. For him, the political revolution has just started. The campaign may be over, but the struggle goes on.
They also print his filibuster from 2010 in book form, which was all about corporate greed and the decline of the middle class.
I guess it depends on your definitions for words? I think he spent a lot of time addressing the systemic issues of which corruption is one. In the primary race, he tried to be tactful about invoking corruption in relation to the party and,uh, other candidates.
It's complicated?
I use relay for Reddit. I highly recommended the mobile client. I believe that the Reddit enhancement Suite extension on desktop has it too.
Shameless pushing Clinton in MAY! [(https://wikileaks.org/dnc-emails/emailid/10591)
How they would try to time dnc committee announcements to favor Hillary, and keep Sanders from commenting first.
The following really says it all, about the New York Times - as spoken by a journalist of theirs, in 1883:
https://en.wikiquote.org/wiki/John_Swinton
> There is no such a thing in America as an independent press, unless it is out in country towns. You are all slaves. You know it, and I know it. There is not one of you who dares to express an honest opinion. If you expressed it, you would know beforehand that it would never appear in print. I am paid $150 for keeping honest opinions out of the paper I am connected with. Others of you are paid similar salaries for doing similar things. If I should allow honest opinions to be printed in one issue of my paper, I would be like Othello before twenty-four hours: my occupation would be gone. The man who would be so foolish as to write honest opinions would be out on the street hunting for another job. The business of a New York journalist is to distort the truth, to lie outright, to pervert, to villify, to fawn at the feet of Mammon, and to sell his country and his race for his daily bread, or for what is about the same — his salary. You know this, and I know it; and what foolery to be toasting an "Independent Press"! We are the tools and vassals of rich men behind the scenes. We are jumping-jacks. They pull the string and we dance. Our time, our talents, our lives, our possibilities, are all the property of other men. We are intellectual prostitutes.
Id like to see J. J. Watt take Tim Kaine down like this And whatever WikiLeaks has for him. ;-)
Yes! That was the one. Haven't seen it in so long. Thanks!
I wish I knew the first thing about hacking (all I really know is how to copy and paste code). The mouse nefarious thing I did was run a Linux kernel on aboot disk on a computer, way back in high school, to get the admin password. I could have used it, theoretically, to change grades and get tests, but I only ever really used it for getting admin access in order to help classmates and teachers fix computer problems in class so we didn't have to wait for IT to never get there. Also to harmlessly fuck with people once in a while. Don't know what color hat that is...
Sorry for the random rambling story.
... Anyway, yeah, is crazy what can get you on a list these days. Just looking up security will do it.
What do you mean by all leaked papers? There are various leaks, and a massive amount of documents. It's not like a book, you can't just pick them up for a read and expect to understand what it all means.
The leaks themselves are all here: https://wikileaks.org/-Leaks-.html
I would have a hard time believing it. if you read the outage report from AWS this is what it says: >Unfortunately, one of the inputs to the command was entered incorrectly and a larger set of servers was removed than intended.
From what i read, it looks like a low level tech was going through a runbook and entered something incorrectly. if you want to read their outage report, its here: https://aws.amazon.com/message/41926/
I was trying to research the claims made in this article regarding Israel, particularly:
>WikiLeaks cables reveal that these plans came from the Israeli government, and show that the U.S. government intended to work with Saudi Arabia, Turkey, Qatar and Egypt to encourage the breakdown of the Assad regime as a way of also weakening Iran and Hezbollah.
I couldn't find this claim substantiated in either the Assange interview or on what I assume is the source cable about which he's talking about.
The only link to Israel I can find is that the cable was sent to Israel, Tel Aviv (along with many other recipients).
Was anyone able to figure this out?
Some post, or have posted in Reddit.
They don't have but sort of need a 'community manager'. Julian Assange is essentially that person, while being the 'president' of wikileaks and presumably their most high level programmer.
The times I've seen them post to reddit it has been a bit chaotic. Sarah H. posted a few times, and got little response. Essentially they were trying to get some things done, and no one (or few) volunteered. Like 5 or less.
Then the Wikileaks lawyer was posting for a while, but started getting dragged into discussions he was uncomfortable with, and started to get put on the spot to represent Wikileaks on the fly, and he didn't really appreciate that.
It's better if Wikileaks recruits someone from Reddit to represent them on Reddit. Reddit is its own animal, and you need someone who can build cred in the community by participating in other discussions, etc., which helps in creating community relations. Also, wikileaks can better distance themselves from the daily discussions, etc. If Julian, for example, was active on Reddit, that would essentially take over as the mouth of wikileaks, where it could be pullupgirl or whomever and they are more clearly known as a redditor who also discusses with wikileaks.
Also, I think wikileaks is more likely to go to the https://steemit.com/ platform. Block chain news, where subscribers pay $0.01 per upvote, etc. Makes the system harder to game and is less centralized.
Wikileaks has likely profited form the crypto bubble (I think that's where 90% of their assets are tied up), and announced they'd be creating their own news team :)
https://coinmarketcap.com/currencies/decred/
Decred is BOOMING! I made a shit load of money off Ethereum, and by forcing those around me into it. Are you banging with some Decred? I'll have to look into it.
At first I was, admittedly, HIGHLY supportive of the audio leak, now I feel a bit different after trying to see it from Seymour Hersh's perspective. Hersh did not know he was being recorded, and judging from the email exchange - https://tinyurl.com/y8u877kf - knew that he should be worried about Butowsky's intentions. I'm beginning to think that this leak will end up taking away from Hersh's well-known narrative explanation when/if it still comes out.
I hope Arianna Huffington kicks his mercenary British eyebrows to the curb. Like other Brits, he hopes to get into CNN, Fox or some other crappy network.
It is huge, but I don't quite think its bigger than Clinton. Google Ideas is the US State Department like Here4Popcorn pointed out.
VPN is a great tool for anonymity.
Also, if you are using TOR, make sure you have everything up-to-date. There has been some security issues before about it being breached with malware in the past. Story here
O RLY?
When I was in the Army we used the term a lot. We would say "we are going to rape that Humvee for parts." It is actually a correct usage of the word. To "rape" just means to take something by force. late 14c., "seize prey, take by force," from Anglo-Fr. raper "to seize, abduct," a legal term, probably from L. rapere "seize, carry off by force, abduct" (see rapid). Latin rapere was used for "sexual violation," but only very rarely; the usual Latin word being stuprum, lit. "disgrace." Sense of "sexual violation or ravishing of a woman" first recorded in English as a noun, late 15c. (the noun sense of "taking anything -- including a woman -- away by force" is from c.1400). The verb in this sense is from 1570s. Related: Raped; raping. Uncertain connection to Low Ger. and Du. rapen in the same sense. Rapist is from 1883.
Unrelated to the global censorship bla, but this one is pretty funny.
> Let's get Randy involved as Imageworks general manager. We need to show stability, and company resolve to support the imageworks. This move makes us more competitive and better able to serve our clients.
>Sent from my iPad
>>On Jan 21, 2014, at 10:17 PM, "XXX" <> wrote:
>>I think we also need to educate the reporters, on background, about any labor or morale issues.
>>I will step into this.
>>>On Jan 21, 2014, at 10:08 PM, "XXX" <> wrote:
>>>We can mention we are planning on Hotel T 2 and smurfs 3 as an animated features for '15. Reiterate cloudy 2 was a success. Also note doing working on up coming films for Columbia etc?
>>>Sent from my iPad
>>>>On Jan 21, 2014, at 9:52 PM, "XXX" <> wrote:
>>>>I don't like the last few lines of this article >>>>What can we do?
The "last few lines" which were cut off of the email:
Which is not false, but apparently the reporters need to be educated into sensibly omitting such irrelevant information.
Sure looks like it. From the Google Translate version:
>[Daniel Domscheit-Berg] once wrote about a dinner with Assange: "There were four slices of meat loaf, Julian ate three and left me just one." There are things between the lines, from which one reads something like bitterness.
I'd recommend Firefox. Privacytools has recommendations on what browsers to use and guides on how to make your browser more secure with about:config tweaks and privacy focused browser extensions.
https://twitter.com/riseupnet/status/800815181190217729
> riseup.net
> @riseupnet
> we have no plans on pulling the plug https://riseup.net/en/about-us/policy/government-faq
> 9:36 PM - 21 Nov 2016
> Will Riseup services last forever?
> While we are committed to doing everything in our power to protect the data of social movements and activists, short of extended incarceration, we would rather pull the plug than submit to repressive surveillance by any government. We would be really sad to see Riseup go, but if we are forced to, we would rather it go away than to betray your trust and compromise the activist community. With this in mind, you should be sure you are prepared in case something does happen, such as downloading and archive your email on your own computer!
What did the victim/victims say happened to them?
You know you didn't answer that question? Because there are none. At this point you're asking someone to prove that someone you can't identify (because there is none) wasn't caught up in some fantastical story.
[Moron]: Hey police, there's been a murder.
[Police]: What happened?
[Moron]: Someone is killing people over in this place over here.
[Police]: Oh my goodness we'll get on that. What did you see?
[Moron]: I saw nothing.
[Police]: .. ok. Who was murdered?
[Moron]: I don't know.
[Police]: What makes you believe someone was murdered? Did you hear gunshots or cries for help?
[Moron]: I read about it on the internet. I mean these super evil people are murdering people and advertising this for everyone to see but no one does anything about it. Makes sense, right? Can you go see if they have a basement, that will surely implicate them in something nefarious even though I still can't provide you with a victim or eyewitness accounts like you might have with all the other cases on your desk at the moment.
https://www.nytimes.com/interactive/2016/12/10/business/media/pizzagate.html
>The photo shows a walk-in refrigerator supposedly in the restaurant, described as part of a network of underground facilities. However, a reporter can confirm that there is no basement in Comet Ping Pong.
>Comet’s spokesperson said the photo was taken during a visit to a restaurant Mr. Alefantis was considering leasing. Comet uses a low-slung refrigerator at Buck’s Fishing & Camping, Mr. Alefantis’s other restaurant two doors down on the same block, to store produce, cheese and proofing dough.
These are great questions, and I bet you a lot of people don't understand why DIKM is to be trusted, even if they do trust it.
If I have a cryptographic function F
, and I have a secret key no one knows, call it SECRET_KEY
, and a email called EMAIL_CONTENTS
, and finally, we have a signed signature called SIGNATURE
.
F(EMAIL_CONTENTS, SECRET_KEY) = SIGNATURE
If the above equation holds true, we call that VERIFIED
.
Wikileaks has the EMAIL_CONTENTS
, and the SIGNATURE
. Because F
is a cryptographic hash, there must be *only one EMAIL_CONTENTS
which will map to SIGNATURE
. This gets sent for verification on the DIKM enabled server.
This is a gross simplification, but the basic principals are all there and gives you a good basic understanding of the rationale.
*This isn't quite true. It's impossible to map an arbitrarily large set of inputs to some finite set. This means there are collisions, but these are well studied and security experts can determine how 'collision proof' a hash function is. This is one of the reasons why we use open source, well studied, battle tested cryptographic functions to ensure accidental collision would be similar to winning the 100 million lotto game 100 times in a row. Further reading: https://en.wikipedia.org/wiki/Collision_resistance
EDIT: This gives a more layman foundation of public-private key encryption with fun historical context: http://www.makeuseof.com/tag/encryption-care/
Mark Curtis and Craig Murray have been roundly attacked for their defence of Assange as well as their skeptical analysis of the Skripal affair and other 'Russian interference', I wonder why. 🤔
This one strikes me as odd. A lot of youtube videos being referenced. From what I can tell the videos are turkish in language and a couple are just text videos. I'd be curious to see the videos translated.
from https://wikileaks.org/wiki/WikiLeaks:Tor
"the original .onion link for browsing Wikileaks is currently unavailable; however, if you have installed Tor and are redirecting all of your browsing through the Tor network, you can still browse the normal WikiLeaks site with a high degree of anonymity (but not end-to-end encryption). The secure .onion address provided here and on the submissions page should still work, in any case."
I wouldn't bother. You aren't committing a crime, and aren't likely to be latched onto as a scapegoat or anything.
Here's wikileaks traffic, you can see the jump from when things started happening. http://www.alexa.com/siteinfo/wikileaks.org
You aren't alone in searching.
> it's kind of superfluous to put the OS on it, don't you think?
Not at, in fact its common practice, and makes your data/evidence easier to destroy.
There are rules in place for some that prevent them from accessing Wikileaks. I do not believe it would be a crime for them to read wikileaks but they could lose security clearance or their job (which is dependent on security clearance).
If someone were in this role, friends could download this and put it on a USB drive. https://tails.boum.org/
The person you would give this to would never use it because if they did then their activities would be masked and no one would ever know if they accessed this material.
Want to see something interesting? http://arstechnica.com/tech-policy/2015/10/i-showed-leaked-nsa-slides-at-purdue-so-feds-demanded-the-video-be-destroyed/
I had a friend involved in that.
If you use a VPN your ISP has no clue what websites you visit. If you have a router with a network level VPN, all of the devices on your network use it and they have no idea what websites you use.
Proton has a strict no logging policy, so they don’t keep records of what websites you visit
https://protonvpn.com/support/no-logs-vpn/
The WEF has no jurisdictional authority over country or people, they are a think tank. Do they have an agenda, absolutely, and personally I don’t think I agree with anything they think is a good idea, that said they can’t make anyone do anything.
Why are you posting non Wikileaks content in a Wikileaks subreddit, this has nothing to do with Wikileaks or any prominent members of Wikileaks.
Here's something even more nuts. The DNC paid AWS $550,899.07 in January 2017. Crowdstrike is still getting paid too, even though they allegedly just came in for the hacking incident.
People think the DNC had a poorly configured ME Server because of the metadata. But MES runs in AWS too.
The DNC also has an it consultant for its network. Massive amount of outsourcing. Lots of hands on the data. Not to mention Irman Awan, who had DWS' log in info.
https://aws.amazon.com/solutions/case-studies/democratic-national-committee/
What say you to the possibility that the DNC servers weren't actually hacked, but rather it might have been AWS Cloud? Check the Crowdstrike website:
zcash is a cryptocurrency - here's a link showing all the crypto exchanges that offer it. https://coinmarketcap.com/currencies/zcash/#markets
It helps if you already have bitcoin to trade. if you don't know what i'm talking about just say so and I will go into further detail
> Just because your favorites political Team has been targeted doesn't mean the organization changed their mission. The spotlight is simply on them because that's what was leaked to Wikileaks.
I didn't vote for clinton.
>In January 2011, the Kremlin issued Mr. Assange a visa, and one Russian official suggested that he deserved the Nobel Peace Prize. Then, in April 2012, with WikiLeaks’ funding drying up — under American pressure, Visa and MasterCard had stopped accepting donations — Russia Today began broadcasting a show called “The World Tomorrow” with Mr. Assange as the host.
https://www.nytimes.com/2016/09/01/world/europe/wikileaks-julian-assange-russia.html
That's just one small quote from a large article among many articles about Assange's strange drift towards Russia. Make up your own mind. He literally worked for the Kremlin. Assange's credibility is 0 at the moment.
Bitchute mirror thanks to /u/qoloku
In the future please just post the tweet as the title.
Add any comments or observations such as "Uhhhhh guys, those are UN helmets @ 8:40" in the comment section, not the title.
> archive.org
Thanks.
28,882 emails from Hillary Clinton's private server
OP is a searchable archive for 30,322 emails & email attachments
So you're saying it is unlikely that "an authorized S3 team member using an established playbook" was able to accidentally enter "one of the inputs to the command... incorrectly" removing "a larger set of servers... than intended" <em>as Amazon stated</em>?
Good article. These characters aren't mentioned:
June 14, 2018: https://edition.cnn.com/2018/06/13/politics/banks-wigmore-russian-ambassador-meetings/index.html
> London (CNN) Two British political operatives were in regular contact with the Russian ambassador in London while they campaigned for, and met with, Donald Trump in the United States in 2016, a review of emails and social media posts shows.
> Arron Banks and Andy Wigmore were prominent figures in the 2016 campaign for the United Kingdom to leave the European Union.
Truthfully, I think the Russian angle is a contingency plan.
I think the primary election was hacked. Something wasn't right, there was plenty of evidence that the results weren't right, and it's not like Clinton and the DNC have been shining examples of ethics and stewardship of the law lately.
If it were to be found out that the primary election was hacked, that's pretty horrific and would summarily end careers to say the least. So guess who gets the blame? There's a reason - I think - why Clinton is setting herself into an adversarial position with Putin.
There has to be a contingency plan after all, you don't go and do something like that without setting up a fall guy or two.
I am pretty sure it's all in the source, but you can't realistically scan and check every single attachments of millions of emails.. but look at this for example, there must've been some basic process: https://wikileaks.org/gifiles/attach/46/46655_Discover%20Card%20-%20Secure%20Form.html
Law #1 of the 10 Immutable Laws of Security If a bad guy can persuade you to run his program on your computer, it's not your computer anymore
You can hack a CCTV today by going to https://www.shodan.io/ and searching for unsecured webcams.
(I wouldn't recommend logging into any that are password protected, even if it's the default password.)
True, that would be the one good thing to come from it. Though given how the justice system works....I wouldn't be surprised if something magically prevented even that from happening. All of the Anti-Russian neocons remain in control of every facet of government, with exception to the executive branch (though neoconservatives have been inching their way into his admin ever since) and we've seen how much obstruction there has been against Trump carrying out any detente with Russia (the latest bipartisan sanctions for example, Trump even said they were "clearly unconstitutional" https://tinyurl.com/y75srmcq). Now imagine what kind of monkey wrench a statement from Seymour Hersh discrediting the ENTIRE NARRATIVE of the establishment(Dem/Repug) would be to the system. Russian hacking = fake; Russian+Trump Collusion = fake; C.I.A American Disinformation = TRUE; Both parties+Intelligence community+The Main Stream fucking "News" Media LYING to our faces.... = https://tinyurl.com/lw7cfxr
I'm not so sure that people should jump to conclusions that Google are censoring, his Twitter account has laid dormant for years and he's only started using again as of about 3 weeks ago. Maybe it's because of that?
After reading some more info on this, I too think it's not the password to insurance.aes256, as krappie stated. It's some other file.
The file was found by Der Freitag. "editor Steffen Kraft claims to have found online a “password protected csv file” containing a 1.73GB cache of entirely unredacted diplomatic cables, originating from Wikileaks...But the document found by Der Freitag are not the official Wikileaks files, which have been partly redacted to remove the names of vulnerable sources. Rather it contained thousands of unredacted pages, with ‘named or otherwise identifiable “informers” and “suspected intelligence agents,” from Israel, Jordan, Iran and Afghanistan." (source)
Unless I'm missing something huge, I've got to say that's the dumbest thing I've read in a long while. They've taken a company about which there is news almost daily (or actually all companies controlled by Investor AB), combined it with the news about Assange about whom there is news almost daily, and found 4 instances where the dates sort of coincide. This isn't statistically interesting, in fact if this is all, the events seem to coincide less than what you'd expect by chance. You can pick any large corporation and find a similar "link".
> The connections and alignments between Sony Pictures Entertainment and the US Democratic Party are detailed through the archives, including SPE's CEO Lynton attending dinner with President Obama at Martha's Vineyard and Sony employees being part of fundraising dinners for the Democratic Party. There are emails setting up a collective within the corporation to get around the 5,000 USD limit on corporate campaign donations to give 50,000 USD to get the Democratic New York Governor Andrew Cuomo elected as "Thanks to Governor Cuomo, we have a great production incentive environment in NY and a strong piracy advocate that’s actually done more than talk about our problems."
From the original WikiLeaks article https://wikileaks.org/sony/press/
You might say "they just had a dinner"... but let's be honest.
Israel Defense Force uses human shields: https://wikileaks.org/plusd/cables/09TELAVIV1694_a.html#efmAn8Axu
"Israeli officials have confirmed to Embassy officials on multiple occasions that they intend to keep the Gazan economy functioning at the lowest level possible consistent with avoiding a humanitarian crisis." https://wikileaks.org/plusd/cables/08TELAVIV2447_a.html#efmAgIAja
Here's another video, which never made TV news.
https://wikileaks.org/gifiles/docs/29/292315_good-explosions-and-good-music-.html
Maybe there is not only a #ISISmediaBlackout, but a #USAirforceBlackout as well.
If you want absolute privacy then cryptostorm is probably one of the best out there. iOS I would regard as compromised though. Depending on how sensitive this story is it may be advisable to not even have that phone on you when you meet with people. Same for android devices. Get a phone you can take the battery out of.
It's totally legal. In fact, it was developed by the US Naval Research Laboratory. It allows anonymous internet traffic to bounce around the globe to conceal the source. It's not only what makes Wikileaks run, its what allows Chinese people to read foreign newspapers and people who live in dictatorships to get information to the outside world. You can learn how to set up a relay here.
So it looks like FB is using a passive aggressive censoring - restricting the visibility of posts that don't fit its pro -Clinton agenda, while promoting those that do. Hard to prove or track. Time for a truly transparent and Democratic alternative to Facebook. What are folk's experiences of MeWe? https://mewe.com/
"What's the connection between NASDAQ OMX and Assange? From what I can tell, this is a protest against an expansion of the board of the company that owns NASDAQ. Throwing Assange's name on top of this seems like a silly way to gain conspiracy theorist PR for a completely unrelated cause." This is not the case at ALL!!! Get informed on the details your lacking. Read link...learn...