I never really got too involved with AntiSec. I read through a lot of the dumps, but some of the methods to obtain them felt a little too heavy on the 'Tango Down.'
The timeline YAN posted is very convincing, espicially when the times of events are lined up.
If this is true though, it will become a nightmare trying anyone. Coercion, entrapment and the like will become defences for the defendants, and with the emerging case it is becoming more and more likely.
Also, Swedish government didn't take down TPB, they merely had to replace a power distribution unit. "The target of the PRQ raid has still not been confirmed but currently our sources believe it may be a smaller Swedish tracker."
Oursourcing is only a possibility
Please find sources for your other statements. I don't want to do your dirty work.
If anyone would really read the articles and not the headlines, they'd notice the fact that the relationship between Tesonet and NordVPN does not affect the NordVPN users. Large companies register their businesses in different countries all the time. Google is registered in Ireland to save on taxes while most employees work from the US. Nord is probably similar, registered in a privacy-friendly country to avoid having to give info to the US (Lithuanian? European?) government. NordVPN does not keep logs and I find it a good thing that the company wants to protect user data, hence registering it in Panama. Reference:
Articles like this one have always a highly chance to be biased or a affiliate bait. This is especially if the don't list and compare objective criteria. E.g. I really would like to know, why AirVPN isn't even mentioned.
Hide My Ass as number one is a bad joke.
Torrentfreak is a more reliable source.
Read this — it's not a new article, but it's damn good.
Do not go with HideMyAss, as they've proven that they will sell you out to the authorities.
Go with someone that doesn't keep logs.
iPredator has the shittiest speeds. I'd love to support iPredator, but it isn't worth it. StrongVPN logs everything and will terminate your account for P2P usage — I imagine those logs would come in handy to prosecutors and their corporate arms if they obtain a court order. There are lots of VPNs using 2048 bit encryption, so pick someone else.
How much are you looking to spend?
Check out for an OK comparison tool too.
>“I don’t feel any remorse for what I did,” he admitted. “I feel good about what I did.”
He made that very clear at his sentencing, which is probably why the judge gave him such a long sentence. I'm not saying he should have lied and said he felt remorse if he didn't, but his inability to STFU is making the prison system a lot of money.
>“He [Sabu] sold out his friends …"
Sabu tried to warn people, you moron. IIRC, someone even specifically warned Hammond about Sabu. Y U NO opsec?
>He said Sabu asked him for help hacking into government-run websites, affecting thousands of domain names in nearly a dozen other countries.
As Quinn Norton wrote, "They’d worked day and night without pay, using their rarefied skills trying to make a statement to power, and all the while, power had run them." I understand why Hammond refuses to accept how badly he messed up. The US government exploited him and is still exploiting him, and he let it happen. Maybe one day he'll realize that, and be sadder but wiser.
Download and install.
Run.
mIRC options->servers->add-> input server ip change port
description
password if necessary
add, ok
file->connect
choose a nick
might have to file->connect again
>Terms of Service: Do not upload images that you do not own the rights to. Do not upload images that are illegal in the USA. Do not upload files that are not legal in the country you reside in. Do not upload files that are not images. Do not upload harmful files or images.
>You must agree to the terms in order to upload to AnonImg.
As users of HideMyAss learned, it's important to read TOS carefully. Kudos on making yours short-n-sweet. I'll assume you're a U.S. company, and respond to subpoenas. So the question is, what logs do you keep? When someone uploads an image, do you store their IP address and/or image metadata, and if so, for how long?
I do not consider myself a member of anonymous, but I will answer your questions to the best of my ability.
first off, i assume you know the difference between white, black and grey hat hacking. If not, This article does a pretty good job of summarizing. Anonymous is a gray hat "organization", so while it may be wrong to punish innocents, they are doing it to gain leverage against the NJPD.
>Why is it ok to cheer for people who never forgive and never forget?
Because it means nothing will go unpunished. No matter how profusely the target can claim that they are "sorry", anonymous will still continue attacks unless their demands are met. In this case, the NJPD can release statements apologizing for the actions of their officers, and unless they release the names, anonymous plans to leak information. Again, this is gray hat.
>Why is it ok to hide behind a screen?
Why is it not? With computers and today's technology, it is unnecessary to protest publicly, and protesting could easily land supporters in jail. Why should I go to NJ and protest, when I can sit behind a computer much more safely and show a much larger amount of people what I have to say.
Anonymous is not an organized group. Anyone can make a video claiming to be a member of anonymous and state their demands. Only the projects that people actually support ever actually accomplish anything, and if the person who made the video doesn't have the names of NJPD members, they wont get anywhere.
If there is still anything you are confused about, feel free to ask.
If you look at the french revolution, it was created by the increase in the middle class. The poor don't have the time and resources to focus on anything but their basic needs. Being an informed citizen take the luxury of a moderate standard of living in most cases. When you look at the shadow banking industry with assets of 67 trillion dollars, you know the industry that was selling and artificially inflating mortgage backed securities to make a killing off the lives of the poor, and created the credit crisis of 2008. The perpetrators of this got little to no repercussions, because they were to systemically important to our society. We instead just bailed out the banks.
given the cost of manufacture and packaging of each mask, that is at least a 5 dollar bill each siz dollar mask.
that's Time Warner, BTW
As long as you stay in their darknet, either one is likely to be fine.
Exit nodes/outproxy are where things start to suck. Clear-text internet traffic exiting a darknet is disproportionately likely to be snooped upon at best, actively modified at worst. Some nodes will attempt to downgrade your attempts at encrypted/authenticated connections down to plain-text connections.
Your setup matters a lot here. Naively mapping your entire computer's connection to go through one of those darknets is generally a bad idea. Folks tend to have various software installed on their computer that like to initiate outbound network traffic without warning. Any of them may expose some of yours credentials to hostile nodes.
My own recommendation here is to grab a live linux CD/USB download with the darknet support of your choice ( like tails for Tor, unclear if I2P has an equivalent), and boot with it into a VirtualBox VM.
>if the gov cant pin anything on you
what are the odds of that, when "prosecutors can pin arguable federal crimes on any one of us, for even the most seemingly innocuous behavior"?
>they'll just plant pizza on your computer
Ideally the defense team would include an expert who could prove when and how the content was added.
It's a convoluted case for sure. But as someone said in a prior thread, "If he was set up, it looks like he sure made it easy for them."
Everyone has been passing that TF list for a while now.
I like Ipredator lately. They had issues with only offering only PPTP a while ago. And I suspect they lost customers. Anyways, now they offer OpenVPN which is fine; but also seem to be less congested atm. They used to drop quite a bit.
On the flip, I Private Internet Access is popular because they take btc; but seem to drop quite alot. I'd advise just using disposable prepaid cc instead of choosing a subpar providor based on btc alone.
I did also want to try some icelandic vpns; i think there was one called orand and another called 1984. Mainly because iceland is sexy lately.
However - Retroshare and I2P are fucking free and you can get encrypted p2p filesharing without a VPN. I would advise everyone at least check either platform out.
/r/i2p
/r/retroshare
<strong>Rules for Radicals: A Practical Primer for Realistic Radicals</strong>
First published in 1971, Rules for Radicals is Saul Alinsky's impassioned counsel to young radicals on how to effect constructive social change and know the difference between being a realistic radical and being a rhetorical one.
Divided into ten chapters, each chapter of Rules for Radicals provides a lesson on how a community organizer can accomplish the goal of successfully uniting people into an active organization with the power to effect change on a variety of issues. Though targeted at community organization, these chapters also touch on a myriad of other issues that range from ethics, education, communication, and symbol construction to nonviolence and political philosophy.
This was the last piece of quality info I was able to find about him.
To my knowledge, that means he has been held for a year for demonstrating a HeartBleed flaw.
Everyone starts somewhere, and getting a certificate from a real university and some basic certs under your belt is much better than nothing. God knows I'm all for self-study, but challenging yourself to finish a comprehensive program is a great way to get a broad grounding in the fundamentals.
Here are two reviews some people might find relevant:
There is nothing better than TOR, but imho that's only because of its seamless, automated nature and extensive worldwide network. People forget that TOR is sponsored by, designed for, and maintained (at least to some small degree) by the U.S. Navy.
Speaking as an old BBS sysop, I know some older ubernerds who still prefer the old fashioned way of downloading some shitty proxy-related browser addon like this and manually copypasting fresh proxy numbers into it every few days (from questionable sources) using only non-transparent, anonymous proxies from countries that lack extradition treaties with the US, but that method is annoyingly complicated and not for Grandma and her AOL account or all the Little Johnny /b/tards' out there.
Yes.
http://www.ehow.com/info_7849191_defacing-money.html
From the article:
"[w]hoever mutilates, cuts, defaces, disfigures, or perforates, or unites or cements together, or does any other thing to any bank bill, draft, note, or other evidence of debt issued by any national banking association, or Federal Reserve bank, or the Federal Reserve System, with intent to render such bank bill, draft, note, or other evidence of debt unfit to be reissued, shall be fined under this title or imprisoned not more than six months, or both."
Well, I suppose it's always possible people got their shit together. After years of seeing people fuck up, maybe they actually learned something.
Their OPSEC isn't exactly what I'd call stellar, though: doing an "encrypted" live interview with the press is risky as fuck no matter what you're using, and every time they publish a tweet they're taking a risk by exposing themselves to analysis. It's like repeatedly playing chicken by sticking your head under a guillotine with a big shit-eating grin on your face because you think there's no way for the blade to drop. Why put your head on the block more than you absolutely have to? Best practices: in, out, fuck off and STFU. Either they're in the process of getting traced, or they're using government-grade tech that's better than COTS. (See also.) Depending on who's looking, that might not be enough either.
Also, have a look at the document they leaked. If anything, it actually HELPS the government by publicizing a case for why they need more funding. Nothing serious is compromised; no real secrets are revealed--the .gov could hardly find a more harmless and beneficial document to leak if they tried.
Question: why is Scribd, a commercial company based in the US, hosting a classified document instead of pulling it? Nobody thought it was worth taking down? Oh well.
hehe, trolling or no, it's all fun and games until TechCrunch and CNET pick up the story.
The Ren Fest is in Holly, MI on Dixie Highway, Here is the FB page.
The address is: 12600 Dixie Hwy Holly, Michigan
Oh, and the tag is on the Guinness Pub.
Oh shit. Never trust a free VPN service to protect you. If you aren't paying for it you are the product. It will get you around the censors, but it might also be collecting all of your account passwords.... Make sure you're using https everywhere at the very least. Using Tor over would probably be a good idea too.
Well, in HideMyAss's defense, people had no reason to assume they wouldn't turn information over to LE. They discussed this later in their blog:
>As stated in our terms of service and privacy policy our service is not to be used for illegal activity, and as a legitimate company we will cooperate with law enforcement if we receive a court order (equivalent of a subpoena in the US).
>Our VPN service and VPN services in general are not designed to be used to commit illegal activity. It is very naive to think that by paying a subscription fee to a VPN service you are free to break the law without any consequences. This includes certain hardcore privacy services which claim you will never be identified, these types of services that do not cooperate are more likely to have their entire VPN network monitored and tapped by law enforcement, thus affecting all legitimate customers.
> PRQ Inet KB Gottfrid Swartholm
PRQ are a famous virtual private network/server company who host controversial sites others wouldn't and are also a very privacy-centric vpn. I wouldn't rely on whois lookups to turn over a name of a website admin, this looks like a service that conceals the owner from the sites whois.
Journalist Quinn Norton describes the chilling effect on journalism from BB's sentence: We Should All Step Back from Security Journalism - I’ll Go First
Ah thank you for your response. It does indeed frighten me dearly. I was able to find it on google. I'll post both the techcrunch article on the matter as well as the court documentation for anyone curious.
TechCrunch's article on the striking down of the Open Internet Order
I don't see any news articles yet.
Here's an earlier article about the hack of the Sentencing Commission website.
We've had some prior discussions about OpLastResort. This is one of the more interesting ones.
Main takeaway:
[...] So-called app interception or cloud interception systems are small physical boxes that steal social media passwords, emails, Dropbox contents and more from smartphones of passers-by, all with no interaction from the target.
[...] One of Rayzone Group's products is InterApp, which, according to a company brochure, can siphon passwords, emails, previous location information, contact lists, photos, internet browsing history and technical information such as the target phone's MAC address.
The device requires “minimal training,” and “no technical skills” are necessary, the brochure continues. (The company also sells IMSI catchers, used to track mobile phones by their unique identifier; malware for computers and mobiles; and social media monitoring technology).
Brochure here.
Even if the FBI doesn't have legal access to devices like this, plenty of foreign governments, quasi-state actors and non-state actors do. If someone wanted to go fishing for interesting logins, documents and tools, doesn't it make sense to show up with a device like this at a hacker conference? I'm just saying.
Also relevant: WiFi Pineapples at Defcon.
"Big banks are going to force prices down to buy big." That's your proof? Really? Cyprus announced its plan to liquidate gold reserves five days ago, and your "Goldman has internally placed a sell on gold." statement is laughable, considering they put out a press release six days ago. Moreover, that's not even much of a surprise, Goldman's been bearish on gold since December.
How exactly is any of that proof you have any insider knowledge?
But they can't do that without giving us specifically modified versions of Tor.
Is vidalia/torbutton really that recommended anymore? The Tor Browser Bundle has taken over as the simple replacement for simple anonymous browsing, its more automated.
Downvoted because this article makes no kind of sense.
>Positive checklist (answers should be “yes”
>Do you have methods for releasing information about your idea(s) that do not involve licensing or copyright?
Copyright is inevitably involved, because under US law, works have a copyright as soon as they're created. If I build on someone else's work that was released under a Creative Commons license, or license my own work under the same, then I'm using a license to facilitate sharing. Why is this bad?
>Are you seeking permission from someone else to proceed with your idea, such as:
>a corporation-state demanding you obtain a license to assemble and protest, perform your research or distribute your work
Is the writer saying I should only do things that don't require asking permission, or that "it's easier to ask forgiveness than permission"? Because if I use someone else's work without permission in a YouTube video (for example), I'm giving the copyright owner the ability to put ads on my video, get it taken down, get my whole channel taken down (if I do this three times), or sue me and get my identity. While if I ask and receive permission, none of those things would happen. Maybe AnonyOdinn is saying it's worth the risk, but doesn't explain why.
>You need not seek permission . . . to run a business.
ORLY? I guess it depends on the type of business, but again I can't tell what point the writer is trying to make. Try opening a restaurant without the appropriate licenses and see how fast that gets shut down.
There's a lot more I could complain about, but I'm not going to spend all day on this.
TL;DR: Stupid article is stupid.
Enjoyed this series of articles from a computer security guy who gives a somewhat accurate lowdown of the technology and hacks used in the show. He's a little more lenient than some might be, but I'm willing to suspend a little bit of disbelief in exchange for Carly Chaikin looking all gothy.
Thx for warning us about VirtualBox.
Your page here pretty much told us to expect exactly what happened in that other link.
I'd say go away from your house, use tails os https://tails.boum.org/ on a cd or thumb drive. Use tor or I2P which both come installed already. Use macchanger, the command "sudo macchanger -r wlan0" without quotes will do. Don't sign in or post anything. Lurk only and if you are very paranoid, change locations every given amount of time or so.
That's the quick thing I can think of.
EDIT Also you can torrent via I2P. Make sure you use forced encryption too.
The main Jihadist forum that I mentioned is in the Philippines, outside of US jurisdiction.
Archive refuses to take down any videos that do not violate US law in the name of frozen peaches (which I commend them for).
Another prominent website ISIS uses is http://justpaste.it, a Polish website.
As I already mentioned above social media sites take down there accounts but this affects very little.
tldr: youre a dumb faggot do research
This. Use 10MinuteMail or any other temporary email services as you will not require access to this email in the future anyways (unless you forget your password...)
Well, that is unexpected. I saw many comments and evidence that one competitor is attacking NordVPN but not that much. I guess they really want Nord down. That is a little bit harsh from the competitors side, they shouldn't be that dishonest, that is damaging their brand name.
Torguard is made for internet browsing. I love the simplicity of NeoRouter just for accessing my home network and the company has there own primarily they use Forti, I have them setup with open vpn as a backup.
But are they fast? I was using Strong last year and they had good speeds, but then switched to HideMyAss since Strong keeps logs, but HMA is really expensive at ~$80/year but with a A LOT of exit IPs and good speeds.
Looks like Gottfrid Swartholm. Whois turned this up:
>Domain name:
>
>Registrant Contact:
> PRQ Inet KB
> Gottfrid Swartholm ()
>
> Fax:
> Box 1206
> Stockholm, 114 79
> SE
>
>Administrative Contact:
> PRQ Inet KB
> Gottfrid Swartholm ()
> +46.737721056
> Fax:
> Box 1206
> Stockholm, 114 79
> SE
>
>Technical Contact:
> PRQ Inet KB
> Gottfrid Swartholm ()
> +46.737721056
> Fax:
> Box 1206
> Stockholm, 114 79
> SE
>
>Status: Locked
>
>Name Servers:
>
>
>
>Creation date: 09 Nov 2012 14:23:33
>Expiration date: 09 Nov 2013 14:23:00
Please don't talk about acting against pedophilia, if you really want to act against child abuse. The difference is important, and you even seem to acknowledge it exists. There are many pedophiles who are also activists against child abuse.
There are many legal ways to act against abuse. One would be to keep the topic active in social media, and raise a point about making proper treatment available for pedophiles. Currently only few therapists understand pedophilia properly, and the problems pedophiles actually have. This is currently one of the hottest topics in child protection as it is a mostly unused opportunity.
It may be actually even dangerous for pedophiles to seek help, which is really backwards. Would you tell your therapist that you are gay if there was a risk that he would tell your parents? Let alone if you were a pedophile?
To demonstrate the current situation:
http://www.dw.de/when-society-mistakes-pedophiles-for-molesters/a-18104211
But "affect" in your sentence is a noun. The definition you quoted is for a verb. Also, ngrams.
We do have an Ausfag lurker contingent. While I may not agree with them on everything, Lorax is getting dragged thru the fucking mud for pentesting which I find objectionable. I have no quarrel with them being here.
Thanks for your reply, I'm using NordVPN that should take of the DNS issues. I was pointing to cross app tracking, should of asked clearly if Google can "take" info from Tor browser for example during transit or by targetting URL fields for scan or using Google lens/bixby vision to analyze what text is on the screen in secret .
> Topkek
What? Is that some elite speak to show how k-rad you are?
>So that proves its safe! Because you said so!
No, because Tor is about concealing your location, not encrypting your communications. Also, I'm still waiting to hear about the tracking vulnerability in exit nodes.
> http://www.cnet.com/news/nsa-tracks-google-ads-to-find-tor-users/
Still waiting to hear about a tracking vulnerability in exit nodes.
> Shill harder.
Not shilling, correcting your misstatement. You look like an ignorant ass and apparently it's willful on your part.
> And take your username as advice.
You first.
If I see a good candidate I will vote, otherwise I will simply stay home and do nothing. George Carlin had a GREAT bit on this, link here:
https://www.youtube.com/watch?v=xIraCchPDhk Garbage in, Garbage out. Maybe if more people were educated, or even if our system worked so that real change could be possible (AKA get that big money out of there) then the politicians wouldn't suck so much.
Your password has been leekend in 2013 Tumblr data breach (REF: https://haveibeenpwned.com) despite the passwords are in SHA-1 + salt, if you used easy/ID related passwords an attacker could have guessed it
But
Since they are not using a Proxy/reverse connection to your pc, for getting into your Gmail account, i think it is only a non-professional geek (maybe one of your cooworkers) that saw your password while you was typing it.
What you can do is to search what ISP owns the above IPv4 address and then just make a call asking them If they could give you some more info about the owner (or make the cops do it for you).
I'm confused, can you give me an example of a power more tyrannical than execution without oversight?
Hello, I'm a bot! The movie you linked is called Social Atmosphere: We Need an Open Source Society, here are some Trailers
It doesn't sound like he's disguising his voice. And he confesses to collaborating on the hacks. And let me guess: he's calling from his own phone or his mom's phone or something like that.
Dumb skiddie is gonna get v&. I never know whether to laugh or cry.
https://www.facebook.com/help/contact.php?show_form=delete_account
I did this, and it feels pretty good man. Facebook is basically like dealing with a telco or the phone company to try and get out of the contract or not renew the contract. You can permanently delete the account, it's just they take great pains to give you every option but that, though it's still there.
Make sure to wipe every field and delete all messages, friends etc. before deletion. Also make sure to spread this as widely as possible.
Removed as off topic. See sidebar rules:
"This subreddit is for Anonymous news and articles aggregation. It is not for the planning and execution of operations."
"No posts related to individual agendas or personal targets. Posts promoting a witch hunt will be deleted and users banned at discretion."
"Keep your posts nominally relevant to Anonymous or Anon-culture. Irrelevant posts may be deleted at discretion."
If you were a crime victim, tell law enforcement. If someone's breaking Telegram's rules, tell Telegram. Anonymous is not your personal army.
I wouldn't call Biella neutral. It often sounds like she's trying to be flattering, maybe because she wants to stay on good terms with her sources.
It's hard to tell who's "anti-Anon" too. There's one very active anon that I'm pretty sure is undercover LE, but he's genuinely helpful and doesn't try to entrap anyone as far as I can tell -- would you call him pro- or anti-Anon? How about when the FBI let Hammond deface Stratfor and use the FBI's server to exfiltrate Stratfor's emails (which then wound up on Wikileaks, which no one seems clear on how it happened since the FBI was supposedly monitoring everything and providing the server) -- was the FBI pro- or anti-Anon here? I'm convinced that Sabu was playing both sides, so maybe he could be the whole panel all by himself. That would be awesome if you could somehow get him. Maybe try writing to his attorney? Her contact information should be listed on the court papers.
>a very fine line between hacktivism, cyberbullying and cyberterrorism
It gets finer all the time, which is partly the government's fault. "I told them that the constant infiltration had introduced an element of violence to Anonymous that wasn't there before." If you get a Canadian government person on the panel, ask how they feel about the US government making Anonymous more violent.
You can also check out synapse matrix: https://matrix.org/docs/projects/server/synapse/
They allow you to run your own private server with very similar features to discord and has great features for anonymity
I wasn't referring to this article specifically, more that this article is an example of the many, the sum total of which comprise the "media shitting their collective (proverbial) pants". If you were hoping for scat, I'm sorry to disappoint.
https://pay.reddit.com - surf redit with https. www.reddit.com does not support https, modz have been prevaricating for years. just a workaround that works fine. and yeah, it's a coo sub, sticky needz updating but discussed this tonight.. /u/erktheerk will be updating it all next week..
Removed because this has nothing to do with Anonymous. Also, you're an idiot.
According to this:
>The penalty in 2014 is calculated one of 2 ways. You’ll pay whichever of these amounts is higher:
>1% of your yearly household income. The maximum penalty is the national average yearly premium for a bronze plan.
>$95 per person for the year ($47.50 per child under 18). The maximum penalty per family using this method is $285.
>The fee increases every year. In 2015 it’s 2% of income or $325 per person. In 2016 and later years it’s 2.5% of income or $695 per person. After that it is adjusted for inflation.
How did you (or "the lady" you didn't identify) get "5 years of paid taxes" (whatever that means)? The reason for the penalty is because why should other people have to pay for your healthcare if you don't have coverage?
I could name more ways you're an idiot, but I'd rather not get into it. Please just go away.
>it's about using ridicule as a weapon
Ah! Well, you're in the wrong place if you want to argue against lulz as a technique. If the US government is going to use weapons, I prefer lulz to the kinetic ones. If you want to complain about Sony being too close to the government, how about you look through their emails, find something juicy, and write an article?
Tor is software that provides the closest thing you're going to get to anonymity on the internet. You can get it here
...and here's a tutorial for using it.
More or less it provides multiple levels of proxies(not 7, but close!) and encrypts the information. The end result is that people cannot tell where the web request originated, and only the computer at the end of the chain can tell what page was requested(but they don't know who it's for).
It also opens up the wide world of .onion domains, which are like .com or .net domains, but are anonymous(built on Tor technology) and can't be confiscated.
Since he just spammed your sub with his real account I see no harm in giving you this.
His flair is literally "Goon for Hire" lol.
> Yeah it was a college desktop computer
For such computers - yes they can monitor anything. Including https traffic.
For that matter any malicious hacker that had physical access can probably monitor anything too (by installing a root kit, or a physical hack to the keyboard connected to it, etc). Don't type any credit cards or other sensitive thing into such computers.
> I'm not sure if they are able to monitor activity on personal laptops and phones connected to the same wifi network.
From your own computer they can monitor all unencrypted traffic to and from such machines, but can not monitor any end-to-end encrypted traffic on such machines (like tor).
Note that they might be able to monitor https traffic if they have a https mtim proxy installed on their network - though if you're careful you should be able to detect it as your browser may warn you about the fake certificate such proxies give you for gmail.com .
Check out some of the underground pre-Anon. Alot of it is scattered but you'll find the ANON mentality in it.
Jeremy Hammond is too unique to be a good example for whatever point you're trying to make. "A couple anons told me they always felt like Jeremy . . . was looking to get caught."
Gabriella Coleman is an anthropologist who wrote a 500+ page book about Anonymous and "what [they] did over the years".
Barrett Brown has been vocal about Anonymous, writing and providing interviews for years.
Your ignorance is not our problem.
This world isn't as mysterious as you may think.
Grow up and read, idiot.
ProtonVPN had an official response on reddit here Tesonet signing keys for their Android apps.
A couple simple things;
More advanced;
If you are going to spend money on a VPN go with NordVPN. its only $69 a year and pretty much the best one out there.
You can also use NordVPN on your smartphone. Which if you are not using a VPN on your phone you need too. I don't even trust my cell provider anymore with as shitty as stuff has gotten.
And why would you trust CyberGhost.
It's very likely (reasons below) it's partnered with Intel agencies who also have access (through warrants, court orders, national security letters, etc) with most major ISPs in the world that'll happily correlate your traffic with the IP you use to connect to CyberGhost.
Here's my reason I think most "private internet access" VPNs are partnered with Intel agencies:
Based on that logic --- if there aren't at least 200 "private internet access" VPNs that are run by some country or another's intel agency, those guys aren't really doing their jobs. And where it's hosted, or where the shell company is registered doesn't matter --- any of those agencies is competent enough that they can register a business and rent a server in whatever country they want.
(Edit: notice how much CyberGhost's website uses a lot of Javascript. If they really wanted the customers they say they want, they'd make their site more disabled-javascript-friendly)
After you've booted TAILS/Tor, tunnel through a VPN like Kproxy and you'll eliminate most of the BS.
Short of paying for a "no logs" VPN like Mullvad in cash, it's the next best thing you can do to put another layer between your real info and the internet. (There's a lot to be said for compartmenting your internet use across multiple cheap laptops and only using TAILS/Tor on a system that's never been powered up at your physical address, but that's another issue.)
If I were you, I'd be more worried about HUMINT attacks from determined assholes gleaning personal info from that big fat juicy eight-year posting history of yours. You're especially vulnerable if you have a profile on LinkedIn: the more nuggets you've dropped about your specific academic and work interests, the easier it will be to find you across multiple forums. You'd be surprised at where unique keyphrase searches can get you.
I move to plusnet (phone+fibre) last year after some problems with Virgin Media and BT (slow speeds and connection problems).
In my area they provide the service through BT Openreach, so I'm using an BT connection without the speed throttling and "porn" filter, I have a better support and its cheaper than BT :P
I play games with a VPN and my ping is no higher than 40ms to Steam/CS:GO servers. Just don't use VPN services like BTGuard, they are bad for gaming. You can buy a VPS (I use DigitalOcean, 5 dollars/month, Netherlands) and install OpenVPN-AS. Also, don't use US or Canada servers because your ping will be 3 ou 4 times higher than normal.
>Google's records show that he accessed the compromised accounts 146 times through a VPN called Perfect Privacy
heh. I guess that confirms it. Private VPN is not anonymous. Also, cannot trust any centrally controlled service.
Interesting.
Pros: Original video! I like that! Though the siren in the beginning was kind of annoying. Would have been preety well done otherwise.
Cons: Yet another government target. Why do they always go for the governments head on? I understand trying to attack the problem "head on" but this tactic is just silly. Have none of them read "The Art of War"? All this will do is piss off everyone who is undecided by disrupting the economic flow for everyone. That will turn the tide against what they think is "anonymous".
No that is painfully obvious. Concerning just digital activism it is best effective against governmental entities. The tl;dr of that is if you want to protest the government the most effective way to organize is via social media. That says nothing to the effect of how well it works.
You really should read The Art of War. I'm serious.
Heh. TIL. There's no connection AFAIK. Actually the Anon Commander X sucks at opsec, let alone invisibility.
>Apparently people concerned with the environment are terrorists now too? At least according to them
Yep. This is a good book, if you want more on the topic.