The Self-Fulfilling Prophesy of Calling an Anti-Fascist A Terrorist….

The other month our proud commander in chief made a public announcement declaring all Anti-Fascists terrorist, while pleading with other world leaders to come together and help him both condemn and crack down against these ‘dangerous’ people – people like myself. At the time, the first thing I remember saying in response to that was if my Government is actually going to call me a terrorist for fighting fascism, authoritarianism and Nazi’s, then you better damn well sure believe I’d at least do something to earn that sort of title/reputation. In that spirit I release this article, perhaps the single biggest guide to Anarchy you will ever find or see in one place.

** NOTE: To browse through the pdf’s (below) hover your mouse over the document and notice the up and down arrows to the lower left of the document, these will help you flip through them. You can also view the documents before you download them by clicking on the download link **

The Original Anarchists Cookbook:

Download: https://roguemedia.co/wp-content/uploads/2019/05/Anarchist_Cookbook.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/05/Anarchist_Cookbook.pdf”]

 

Recipes for Disaster – an Anarchists Cookbook:

Download: https://roguemedia.co/wp-content/uploads/2019/05/crimethinc.recipes.for_.disaster.an_.anarchist.cookbook.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/05/crimethinc.recipes.for_.disaster.an_.anarchist.cookbook.pdf” title=”crimethinc.recipes.for.disaster.an.anarchist.cookbook”]

 

The Book of Dirty Tricks (CIA):

Download: https://roguemedia.co/wp-content/uploads/2019/11/Anarchist-Cookbook-CIA-Book-of-Dirty-Tricks.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/Anarchist-Cookbook-CIA-Book-of-Dirty-Tricks.pdf”]

 

The Anti-Fascists Handbook:

Download: https://roguemedia.co/wp-content/uploads/2019/11/Antifa-The-Anti-Fascist-Handbook.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/Antifa-The-Anti-Fascist-Handbook.pdf” title=”Antifa, The Anti-Fascist Handbook”]

 

The Terrorists Handbook:

Download: https://roguemedia.co/wp-content/uploads/2019/11/The_Terrorist_Handbook.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/The_Terrorist_Handbook.pdf”]

 

The Assassins Survival Guide:

Download: https://roguemedia.co/wp-content/uploads/2019/11/How-to-kill-Spy-Other-Survival-Skills.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/How-to-kill-Spy-Other-Survival-Skills.pdf”]

 

Improvised Sabotage Devices (CIA):

Download: https://roguemedia.co/wp-content/uploads/2019/11/CIA-improvisoidut-tekniikat.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/CIA-improvisoidut-tekniikat.pdf”]

 

Bombs You Can Make In The Kitchen:

Download: https://roguemedia.co/wp-content/uploads/2019/11/Kitchen_Improvised_Fertilizer.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/Kitchen_Improvised_Fertilizer.pdf”]

 

Middle East Bomb Making:

Download: https://roguemedia.co/wp-content/uploads/2019/11/Terrorist_Bomb.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/Terrorist_Bomb.pdf”]

 

Improvised Land Mines:

Download: https://roguemedia.co/wp-content/uploads/2019/11/Land_Mine.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/Land_Mine.pdf”]

 

Do It Yourself, Sub-Machine Gunning:

Download: https://roguemedia.co/wp-content/uploads/2019/11/A_Do-It-Yourself_Submachine_Gun__Its_Ho_-_Gerard_Metral.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/A_Do-It-Yourself_Submachine_Gun__Its_Ho_-_Gerard_Metral.pdf”]

 

Homemade Guns & Ammo:

Download: https://roguemedia.co/wp-content/uploads/2019/11/Homemade-Guns-Homemade-Ammo.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/Homemade-Guns-Homemade-Ammo.pdf” title=”Homemade Guns & Homemade Ammo”]

 

Car Jacking Tutorials (DarkNet): http://www.wdsxj2ukzyjtkg6agjtnclhz2aoasxa3vgwtqgjkdgfp7pod37jw6bad.onion/section.php?page=files/carjackingfiles

Only in a world this stupid, corrupt and ignorant can those those with knowledge fighting against fascism be considered “Terrorists.” You are the reason why we all say “fuck society.” My regards to Mr. Trump……..

Anonymous Italia Promotes Million Mask March & Fights for Climate w/ Hack/Leak of 5 Institutions Across Italy

Just this evening, November 3rd 2019, my Anti-Fascist friends over at “CyberGuerrilla Anonymous Nexus” and “Anonymous Italia” announced a massive round of hacks and leaks targeting agriculture companies and organizations not doing their part to help fight back against climate change not just in their county, Italy, but all around the world as well. Despite most of their leaks stemming in conjunction with “Operation Green Rights” (#OpGreenRights), this time, Anonymous Italia actually released the data to celebrate this years upcoming Million Mask March (MMM) – helping to raise more awareness ahead of it on November 5th.

Message from the Hackers

Hello Italians, this press release is from Anonymous Italy.

Today we have decided to make ourselves known to those institutions of our country, which should be the first to inform us and fight against our farmers and artisans against climate change, by starting to use different methods of more organic farming without preservatives and/or products harmful to both the environment, the flora and fauna of our country.

But not only this! The whole world is now aware of the environmental problem of our planet, demonstrations of millions of people have been held and are held to try to sensitize our Governments whom ignore the imminent danger here, instead interested only in profit and their own well-being, never interested to what according to them is a problem only for the people.

Studies done by great scientists easily found online have made it clear, we are killing our planet and little or nothing is being done to curb this genocide of nature and man. The posted data reveal the very little or even lack of security in the infrastructure of our country, and once again our privacy is not taken into account at all. Sabatoged to use a simple encryption of passwords, or even more simply not informed against using passwords like the ones you can see below.

But don’t worry !!
We are the terrorists, criminals, outlaws !!

We are Anonymous
We are Legion
We do not Forgive
We do not Forget
Expect Us!

All Leaked Data:

Target: hxxp: confagricolturapiemonte.com
About: The Regional Federation of Farmers of Piedmont is the territorial branch of Confagricoltura (the General Confederation of Italian Agriculture), the oldest agricultural organization in Italy whose origin dates back to 1895.
Dump: Admin password in the clear
Raw Leak: https://privatebin.net/?2ebaae23a34ee559#BXKWvMvWK37qyvXjmmiwT8NwUBTQapcvpciq94CnCTze

Target: hxxp://codima.info
About:CO.DI.MA. CONDIFESA Mantova-Cremon – the Agricultural defense consortium. Agricultural insurance with public contributions.
Dump: 800+ subscribers, emails, clear passwords. Hacked and Defaced
Raw Leak: https://privatebin.net/?ef3316378ab3345f#E9kg9mHwbyebdUFwuJgGwEK7M3oQy3URBBHXu6wQsPDV

Target: hxxp://periti-industriali.rieti.it
About: Industrial experts, L’INI-PEC is a portal created and managed by info Rooms and is divided into two sections called ‘Business Section’ and ‘Professional Section’ respectively.
Dump: users, emails, clear passwords
Raw Leak: https://privatebin.net/?4160f625ff10bc8a#EU4wVXZE2iBjEF2jUvWbZnpdPaCqGapzCTCWeKvhjrwm

Target: hxxp://agrotecnicipiemonte.it
About: Colleges of Agricultural Technicians and Agricultural Technicians Graduates of Piedmont and Valle d’Aosta
Dump: admin, users, clear passwords
Raw Leak: https://privatebin.net/?47382f87beb8b8b2#HC3ZPf4eUuNNtfZ4Aoj4hSYRafVjg7XcjwJKbZ2fF4ot

Target: hxxp://agrotecnicicuneo.it
About: Provincial College of Agricultural Technicians and Agricultural Technicians Graduates of Cuneo
Dump: users, emails, clear passwords
Raw Leak: https://privatebin.net/?90f17654fd13550c#Dhd6GqyStJCuhAsULLVxvBofi8mXjzD9Vo83VL6beohX

Target: hxxp://ebiter.fvg.it
About: Ebiter (tourism trade services fvg)- Bilateral trade and tourism agency Friuli
Dump: users, passwords
Raw Leak: https://privatebin.net/?48d5bb255bee8fe8#DQ5VmB1w4CKqaiSHU725b6uREncWZa66Jv5m68vVCCBA

#OpChile – Anonymous Chile Hacks Carabineros Troops, Chilean Police Forces, Leaks Data Online

A group of hackers affiliated with the AnonOps IRC going by the name of “Anonymous Chile” has claimed responsibility for a large string of hacks targeting Chile’s national uniformed police forces – otherwise known as the “Carabineros.” Exposed in the leaks provided below is information such as officers names, user names and passwords, RUT, sex, addresses, ranks and the police stations they work at, as well as instructions for others to compromise Chilean data entry interfaces.

The hacks/leaks themselves are being carried out in conjunction with “Operation Chile” (#OpChile) and “”Operation Chile Desperato” (#OpChileDesperato), as well as with the Marcha Mas Grande De Chile” – supporting protesters actively being repressed by Chilean police forces and their Government. It should be noted that the group is not finished yet, and promises more leaks will soon be on the way – the longer these demonstrations continue in the streets. More importantly, the group has already had their social media accounts taken down and the location of some of the files removed – which is why I am hosting their files here – in case their index gets taken down too. Should any more leaks be published over the coming days, I will make sure to provide updates here for Rogue Media – stay tuned!

Leak Location: https://pacos.rebelside.pw/pacoleaks/

Leak Backups 11/02/2019:

25 de Octubre 2019:

https://pacos.rebelside.pw/pacoleaks/funcionarios.zip | Bases de datos con Nombres, RUT, Sexo, Zona, Prefectura, Comisaría de TODOS los Pacos de Chile (1.7MB)

https://pacos.rebelside.pw/pacoleaks/instructivos.zip | Instructivos de uso de plataforma de Documentación electrónica (DOE) (6.7MB)

26 de Octubre 2019:

https://pacos.rebelside.pw/pacoleaks/informativo.html | INFORMATIVO #1 ACERCA DEL HACKEO A CARABINEROS DE CHILE

https://pacos.rebelside.pw/pacoleaks/codigofuente.tar.gz | Código fuente plataforma de Documentación Electrónica (DOE) de Carabineros (12MB)

https://pacos.rebelside.pw/pacoleaks/dump_intranet.txt | Dump de cuentas de acceso al intranet DOE (1.02MB)

https://pacos.rebelside.pw/pacoleaks/grabaciones-walkie-talkie.zip | Algunas grabaciones de comunicaciones radiales de Carabineros (se viene más) (0.53M)

27 de Octubre 2019:

https://pacos.rebelside.pw/pacoleaks/informativo-2.html | INFORMATIVO #2 ¿EL FINAL? NO LO CREEMOS

https://pacos.rebelside.pw/pacoleaks/msg.zip | Algunos mensajes desencriptados intercambiados en la plataforma DOE (140KB)

https://pacos.rebelside.pw/pacoleaks/adjuntos-10-2019-10k.tar.gz | 10K de archivos adjuntados a los mensajes (3.11GB) Checksum de archivos

https://pacos.rebelside.pw/pacoleaks/check.txt | Checksum MD5 y SHA1 de archivos (ultima actualizacion: 29/10)

01 de Noviembre 2019:

https://pacoleaks.rebelside.pw/pacoleaks/informativo-3.html |

INFORMATIVO #3 MADE IN CHILE: https://pacos.rebelside.pw/pacoleaks/Adjunt09.zip | 20K de archivos adjuntados a mensajes (6GB)

 

CgAn – Rogue Media: Introductory Guide To DarkNet’s

The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide. It is a network of networks that consists of private, public, academic, business, and government networks.

The 3 Layers of The Internet:

ClearNet. The “World Wide Web,Surface Web, ClearNet or simply referred to as the Web. Quite simply, the Surface Web refers to the portion of the internet only accessible by standard search engines – such as Yahoo, Bing and Google. While Google search results may feel endless at times and while you might think of them as being quite large in size, in reality, the Surface Web only consists of roughly 7% of the combined browse-able/accessible internet. Typically, it’s used for Email, Fax, File sharing, File transfer, Games, Instant messaging, Podcasts, Voice over IP, Searches, Streaming – etc.

Deep Web. The “Deep Web,” invisible web, or hidden web are parts of the World Wide Web whose contents aren’t indexed by standard search engines – for any reason. Rather, the content is hidden behind HTML forms, Javascript and custom code to protect it from the public eye. Generally speaking, the Deep Web is host to roughly 92% of anything which can be found on the internet. Typically, the Deep Web consists of information such as web archives, scholarly articles/resources and network databases such as cloud servers. While this isn’t the case 100% of the time, you usually also need a 3rd party software system, such as the “Tor Browser,” in order to access at least some of its content as well.

To describe how it works, think about all of the web pages you can visit on your bank accounts homepage or email account. While all of those sites, links, addresses and emails technically exist on the internet, and while you can still search Google for Bank of America‘s website, this doesn’t mean you can search Google for the web pages associated with each Bank of America’s customers accounts. Nor can you search Google to find everyone elses emails hosted on Gmail – get it? Those web archives still exist on the internet all the same as their homepages, but are not indexed on the Surface Web to be publicly available – which is why we say they exist on the Deep Web, below the normal surface layer of the internet.

DarkNet. While the Deep Web is in reference to any site that cannot be accessed through traditional search engines, the “DarkNet” or “Dark Web” is a small portion of the Deep Web that has been intentionally hidden to hide in plain site, and is completely inaccessible via standard browsers and search methods. The DarkNet is by far the smallest layer of the Internet, estimated to consist of less than 40,000 websites in total – less than 1% of the browse-able internet.

Not only will you need to install a special type of software to access a DarkNet website, but the URL Address associated with it will almost certainly be encrypted with a randomized sequence of numbers and letters – literally making it impossible to find or type in by accident. Instead, you must know exactly what this sequence is – usually from someone else who already knows or has it. Even then, once there, you will also most likely need to enter a custom password in order to enter – making it virtually impossible to browse any DarkNet webpage without the proper permission.

As explained by CyberGuerrilla, DarkNet websites don’t rely on the IP/DNS system (typing mysite.org in a web browser will take you to an IP address like 10.11.12.13). Darknet websites are accessible only through networks such as Tor “The Onion Router” and I2PInvisible Internet Project” and their respective software. Identities and locations of DarkNet users stay anonymous and cannot be tracked due to the layered encryption system. The DarkNet encryption technology routes users’ data through a large number of intermediate servers, which protects the users’ identity and guarantees anonymity. Due to the high level of encryption, websites are not able to track geo-location and IP of their users, and users are not able to get this information about the host; communication between DarkNet users is highly encrypted allowing users to talk, blog, and share files confidentially.

The DarkNet is also used for illegal activity such as illegal trade, forums, and media exchange, making it a prime target for Law Enforcement Agencies around the world. The 2 main DarkNet‘s networks are TOR (The Onion Router) and I2P ( Invisible Internet Project). While Tor focuses on providing anonymous access to the Internet, I2P specializes on allowing “anonymous” hosting of websites called “Eepsites.

Active Darknets worth mentioning:

Freenet is a peer-to-peer platform for censorship-resistant communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship
GNUnet another peer-to-peer network that offers users full link encryption.

Decentralized network 42 (not for anonymity but research purposes)

Syndie is software used to publish distributed forums over the anonymous networks of I2P, Tor and Freenet.

Riffle is a client-server Darknet system that provides secure anonymity and minimal bandwidth

Tor Browser and Tor-accessible sites are widely used among the Darknet users and can be identified by the domain (.onion). Servers configured to receive inbound connections only through Tor are called hidden services. Rather than revealing a server’s IP address (and thus its network location), a hidden service is accessed through its onion address,

The TOR Network works by bouncing your communications around a distributed network of relays (nodes) run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

Tor passes your traffic through at least 3 different servers before sending it on to the destination. Encrypting your packets and bouncing them around the Internet isn’t cost less. All that extra work means that browsing the Web via Tor feels sluggish compared to using a conventional browser. Tor is not meant to completely solve the issue of anonymity on the web and is not designed to completely erase tracks but instead to reduce the likelihood for sites to trace actions and data back to the user. Users are also warned to use https versions of websites, not to use Tor over Tor, not to torrent with Tor, not to enable browser plugins, not to open documents downloaded through Tor while online, and to use safe bridges. Also, Bittorrent over Tor is not anonymous.

References:

https://en.wikipedia.org/wiki/Internet
https://en.wikipedia.org/wiki/Dark_web
https://en.wikipedia.org/wiki/I2P
https://en.wikipedia.org/wiki/Tor_(anonymity_network)

Software:

The FreeNet Project: https://freenetproject.org/pages/download.html
The Tor Project: https://www.torproject.org/
I2P: https://geti2p.net/en/download

Projects Using TOR:

Tor Browser: https://www.torproject.org/projects/torbrowser.html.en – comes with a pre-configured web browser to protect your anonymity, and is self-contained (portable)

TAILS Operating System (Linux): https://tails.boum.org/about/index.en.html – Tails is a live system that aims to preserve your privacy and anonymity

Whonix Operating Systems (Linux): https://www.whonix.org/ – Whonix is a Debian GNU/Linux based security-focused Linux distribution. It aims to provide privacy, security and anonymity on the internet

Orbot (Tor for Android OS’s): https://guardianproject.info/apps/orbot/

Warnings:

Some links may be disturbing and dangerous to visit.

To avoid be tracked or watched online, I strongly recommend you to run a VPN service on the system that you access. VPN will give you a double layer protection against the unknown.

** DISCLAIMER: BEFORE YOU ACCESS THESE LINKS YOU SHOULD UNDERSTAND THAT SOME CONTENT PROVIDED ON THESE DEEP WEB LINKS MIGHT BE DISTURBING, UNPLEASANT OR FRAUDULENT. VISIT THEM AT YOUR OWN RISK. WE RECOMMEND TO USE THOSE DEEP WEB LINKS ONLY FOR RESEARCHING PURPOSES! WE ARE NOT RESPONSIBLE FOR ANY DAMAGE CAUSED BY YOUR ACTIONS! **

Some Popular TOR .onion Sites:

http://hss3uro2hsxfogfq.onion/ (notEvil search engine)
http://xmh57jrzrnw6insl.onion/ (TORCH search engine)
http://uhwikih256ynt57t.onion/wiki/index.php/Main_Page (Uncensored Hidden Wiki onion link)
http://answerstedhctbek.onion/ (uncensored General-subject Q&A forum)
http://torvps7kzis5ujfz.onion/ (VPSSHell .onion hosting)
http://grrmailb3fxpjbwm.onion/ (TorGuerrillaMail – Disposable Temporary E-Mail Address)
https://protonirockerxow.onion/ (Fully encrypted email hosted in Switzerland offering free accounts)

Clearnet HTTPS signup & JavaScript! Must pay or verify via previously existing email or SMS to get an account

http://nzh3fv6jc6jskki3.onion/ – Riseup provides online communication tools for people and groups working on liberatory social change
http://tetatl6umgbmtv27.onion/ (Tor Chat roulette style service)
http://6dvj6v5imhny3anf.onion/ (CyberGuerrilla leAkboX)
http://76qugh5bey5gum7l.onion/status.xsl (Deep Web Radio)
http://deepdot35wvmeyd5.onion (DeepDotWeb -Surfacing the News)
http://grams7enufi7jmdl.onion (Search Grams)
http://kpynyvym6xqi7wz2.onion main.paraZite (Anarchy files and Underground)
http://valhallaxmn3fydu.onion (Valhalla Market)
http://silkkitiehdg5mug.onion (Silkkitie Market)
http://lchudifyeqm4ldjj.onion (Dream Market Dark Web Market)

Some I2P:

http://direct.i2p/ (Direct Search)
http://forum.i2p (Main i2p Forum)
http://imgbi.i2p img.bi (Secure Image Hosting)
http://pastethis.i2p/ (Pastebin)
http://zerobin.i2p (ZeroBin)
http://git.repo.i2p/ (Anonymous Git Hosting)
http://freedomforum.i2p/ (Privacy Forum)
http://leakager.i2p/ (A Cat’s Mirror of Wikileak)

General Chatter Putting In Perspective:

[Mink] oh, then go go go
[Mink] right, today we are going to talk about Darnets and TOR in particoular
[Mink] *darknets
[Mink] i made few notes to read to get us started
[Mink] https://pad.riseup.net/p/r.50b7831a5a3e919781433e4819976169
[Chanlog] Title: Riseup Pad (at pad.riseup.net)
[Mink] please, wait 10 minutes before starting to ask questions
[Aspire] ok
[n1ck1] yeah
[Mink] i’ll just write few points here while you read
[Mink] the Internet is big, really big
[Mink] what we think of the internet are webpages, blogs, email, instant messaging, webradio, voip (like skype) etc
[Mink] most of those services use the tcp/ip protocol to connect the resouces together
[amoruxX] When do we start ?
[RedAcor] Already started.
[Mink] oh amoruxX , we just did
[Mink] fundamental to make the internet work is the IP/dns concept, where a number (like 176.23.98) gets translated to a name (like mysite.com) and back
[Mink] this makes these resources available to the public and available to Search Engines (like google and yahoo)
[Mink] once a new website name is registered, a IP address is assigned to it
[Mink] this is what most people call “the internet” but there is much more
[Mink] there is a part most people will never see
[Mink] it is hidden on purpose
[B[U]G] where the address is assigned by your isp Internet Provider Service , where are two ip address ( public ) and ( local ) with mask subnet and principal gateway , the public have han UDP connetion to the internet call other service and TCP have an entrance connection to localhost
[Mink] imagine big companies networks, government agencies, or really anyone that doesn’t want their site or resources been indexed by search engines
[Mink] that we will call “DARKNET” or hidden web
[Mink] sorry “deepweb”
[Mink] :”)
[Mink] deepweb/invisible/hidden, basically not available to the public
[Mink] unless you have a login/password or a very precise address
[Mink] the deepweb is the biggest part of the internet
[B[U]G] This is because it is not possible to search through a search engine because each address is generated randomly
[Mink] in the deepweb, there is a small portion that we can only see with “special software”
[Mink] that we will call “darknet”
[Mink] for today we will talk about the main Darknet networ, the TOR (onion) network
[Mink] with TOR software (like torbrowser) we can access the normal web AND the onion network
[Mink] onion sites end with .onion and use different protocols from the norm
[Mink] the TOR network anonimize both the user and the server, automatically
[Mink] as a user, your traffic will pass trough at least 3 different servers, before reaching the target site
[n1ck1] what are the names of the different protocols for me to look for later?
[B[U]G] thanks to a connection called “onion”, by most users who share the relay
[Mink] sock
[B[U]G] “cipolla”
[n1ck1] ok tks
[n1ck1] I need t reed more about socks
[Mink] all the traffic from those servers (called “nodes” or “relay nodes” is encrypted
[Mink] making using the tor network slower than normal
[Mink] surfing the web is the main use of TOR, but it can be used to send/receive mail, IRC (like i’nm doing right now) or even voip (IF YOU CAN GET A FAST CONNECTION
[Aeolus] you can voip through tor?
[Mink] yes, with a bit of luck
[Aeolus] cool, didnt know that
[Mink] TOR can be used pretty much like any other proxy
[Mink] u could plug it in Thunderbird for emails
[Mink] in Hexchat for IRC
[B[U]G] using the gpg encryption with thunderbird or claws mail for more security
[Mink] in Mozilla for ftp, etc
[n1ck1] voip + “proxuchains firefox(TOR)”
[n1ck1] three at a time, using a VPN to open the terminal with the configured proxychains and run the TOR browser??
[Arkhangel] why with torrent no, p2p
[Arkhangel] ?
[n1ck1] VPN….voip=error
[Mink] no, but you can use vpn+TOR
[Aeolus] like me
[n1ck1] why not proxychains too?
[n1ck1] tor first or VPN first?
[B[U]G] proxychains is a simple script
[Aeolus] vpn then tor
[Aeolus] for me
[B[U]G] tht filter tor
[Aeolus] others prefer elseway
[Mink] Bittorrent over Tor is not anonymous, becouse needs to aware of other seeds/leecher sharing the files
[B[U]G] you can use for launch any application
[l0t3D_] what difference does it make
[Mink] also would put too much stress on the network
[Arkhangel] Aeolus, if someone uses TOR then VPN, I dont think he can access to onion network xD
[l0t3D_] Mink how do you even Bittorrent over tor?
[Mink] so p2p with TOR: possible, but really a waste of time
[n1ck1] yeah…rsrsrs I see
[B[U]G] l0t3D_, set tor as proxy socks
[B[U]G] or http
[B[U]G] (client)
[B[U]G] or generate
[Mink] again, it’s just possible to plug TOR port in your client
[B[U]G] iptables rules
[n1ck1] VPN + TOR is the best right?
[Mink] yes n1ck1
[Arkhangel] Mink do u mean that seeders/leechers should know your real IP?
[B[U]G] the best configuration are , tor – vpn – tor ,
[Mink] but now.. the bad part
[Aeolus] Arkhangel i used to be able to do that especially with my whonix settings
[l0t3D_] so to “torrent over tor” you need to plug TOR into my bittorent client
[Aeolus] i talk about normal browsing when you want to use tor as an extra layer
[Arkhangel] Aeolus U think that the best configuration is the config shown by B[U]G XD
[l0t3D_] but if i torrent normally and TOR is running that’s okay right?
[Mink] yes Arkhangel ,serius bitorrent users should use proxies or VPNs , not TOR
[Aeolus] Arkhangel xD
[Mink] yes l0t3D_
[l0t3D_] okay
[Arkhangel] what is the bad part? Mink
[Mink] ok, let me make one more point, then u free to ask questionbs
[Mink] right, bad part is TOR is not perfect
[n1ck1] a few days ago they tracked the IP of many users
[Mink] and it’s been under scrutiny for vulnerabilies for years
[Arkhangel] I think* (I wrong to write before lol)
[Mink] “”Tor is not meant to completely solve the issue of anonymity on the web and is not designed to completely erase tracks but instead to reduce the likelihood for sites to trace actions and data back to the user””
[Mink] there are ways and attacks to “deanonimize” a small portion of TOR users
[n1ck1] how?
[B[U]G] for example
[Aeolus] like FBI running nodes
[B[U]G] a plugin
[Aeolus] 😀
[B[U]G] in browser
[B[U]G] you can deanonymize you
[Mink] ” Users are also warned to use https versions of websites, not to use Tor over Tor, not to torrent with Tor, not to enable browser plugins, not to open documents downloaded through Tor while online, and to use safe bridges.”
[Arkhangel] why?
[B[U]G] by an javascript exploit
[Arkhangel] how a plugin can do this?
[l0t3D_] Aeolus do they?
[Aeolus] yes ofc they do
[B[U]G] or you find it on an exit node,
[Arkhangel] a javascript exploit that affects the TOR software or the plugin itself?
[Mink] the NSA is known to have run TOR “nodes” , also known as a man-in-the-middle attack
[n1ck1] TOR over TOR?
[l0t3D_] Tor over Tor? Mink
[Mink] never tor-over-tor
[l0t3D_] hahaha n1ck1
[l0t3D_] how do you even TOR over TOR
[n1ck1] so far so goof rsrsrs
[Mink] that would be running 2 instances of TOR
[Arkhangel] in which manner TOR over TOR can make u not anon?
[l0t3D_] Mink tor stops you from doing that
[n1ck1] like in the real machine and the VM use TOR?
[B[U]G] sure
[Mink] it’s like an internal thing, the “relay” will just not work, 2 likely result, no traffic go trogh, or worse no encryption between the relays
[Arkhangel] lol
[n1ck1] I’m going to print this
[Mink] if you don’t like the 3 “hops” of a standard TOR connection, you can ofcourse increase it
[forceMajeure] the problem with using tor to browse is that 99 out of 100 people will deanonymize themselves by accident without ever realizing it. User error
[Arkhangel] n1ck1 this lesson will be printed later
[Arkhangel] n1ck1 u can access it on the site of cg
[B[U]G] you can use a gateway into your vm as whonix , then use a vpn on you local machine host , and reuse tor setting of your vm gateway
[Mink] ok, now, to cover my ass
[n1ck1] ok thanks Arkhangel
[Mink] WARNING: BEFORE YOU ACCESS THESE LINKS YOU SHOULD UNDERSTAND THAT SOME CONTENT PROVIDED ON THESE DEEP WEB LINKS MIGHT BE DISTURBING, UNPLEASANT OR FRAUDULENT.
[Mink] VISIT THEM AT YOUR OWN RISK.
[Arkhangel] forceMajeure how an user can realize it?
[n1ck1] ok….send please
[Mink] you can see from the list at the bottom of the pad
[Mink] there is a bit of everything
[Mink] email services, blogs, forums, chats
[forceMajeure] lets say you visit your own website, log into ANY account associated with your real identity, attack a cpu of someone you know, just little things
[Arkhangel] forceMajeure and what are the user errors that bring the user to be deanonymized?
[Aeolus] use tor to log to FB
[forceMajeure] look up
[Mink] of course all end in .onion, and using a normal browser won’t work
[Aeolus] something stupid like that
[Arkhangel] forceMajeure ah ok… this should answer to my second question
[forceMajeure] turn on js to access a site, etc.
[Arkhangel] ty
[Arkhangel] forceMajeure why if I use js to access a site, I m not anon anymore? js stores my real IP over TOR?
[Mink] remember, and this is for clearnet aswell, your browser is the single most dangerous point of failure
[forceMajeure] if the site is compromised, someone can use something like burp to insert a malicios js
[forceMajeure] they did it at defcon years ago
[forceMajeure] you should always be using noscript
[Mink] ok, questions, and please let me answer first before giving your opinion
* Aeolus agrees with Mink
[Arkhangel] forceMajeure so if I am on TOR network, if I go on a onion malicious website and I click where I have to not click, this malicious js can decrypt the routing information to get my real IP?
[Mink] yes Arkhangel
[Arkhangel] lol
[forceMajeure] ))
[n1ck1] Is it set by default to accept or reject scripts?
[Arkhangel] sorry but, at this point
[n1ck1] TOR Browser
* Aeolus thinks we all tell shit and not let Mink who knows educate us
[Arkhangel] why didnt they do a strong encryption?
[Arkhangel] that cannot be decrypted?
[Arkhangel] like
[Mink] even worse, it can inject code into your browser, activate your webcam and mic, take screen shots and much more, no kidding
[forceMajeure] true story
[Arkhangel] not inverse hash algorithms
[Arkhangel] not invertible*
[Mink] nothing to do with encryption, JS runs on your computer, not the server
[Arkhangel] Mink if I click on a js hosted on an onion website, it runs on my pc?
[B[U]G] depends
[B[U]G] you can
[Mink] not only .onion
[B[U]G] disable flash/javascript
[Aeolus] js runs client-side
[B[U]G] and disable WebRTC leak
[B[U]G] on you browser settings
[Arkhangel] good to know XD
[Arkhangel] y
[Arkhangel] I have other different questions
[Mink] ok
[Arkhangel] the onion websites store the (false) IP of each user accessing to it?
[Mink] no
[m00trix] Let’s just agree on that TOR is great. If used out of the “box” the TOR Browser will in most cases keep you safe. If you decide to disable or allow sites through the build in TOR Browser plugins, you are taking a risk that not even TOR, nor any other level of anon tools can protect you from.
[RedAcor] For webrtc settings: https://www.privacytools.io/#webrtc
[Chanlog] Title: Privacy Tools – Encryption Against Global Mass Surveillance (at www.privacytools.io)
[B[U]G] or simply edit your about:config asd
[Arkhangel] Mink, if today TOR gives me a certain IP address, tomorrow or after a month, another user of another part of the world can be assigned to that same IP?
[B[U]G] to http.refer and media.peer connection
[m00trix] Arkhangel, yes that is the hole point…
[Mink] the TOR network will not need your IP address, the danger of that comes from javascript/ajax/bad code
[B[U]G] how all – all store a log , depends if the owner delete it
[Arkhangel] m00trix why “hole point”?
[m00trix] yea
[m00trix] if 200 users on that exit node
[m00trix] with the same “ip”
[B[U]G] but the node change every time
[m00trix] you get plausible deniability
[Arkhangel] is it a problem if an IP assigned by TOR is used in the future by another user?
[m00trix] no
[m00trix] its a bonus
[Arkhangel] ah ok xD
[Mink] again, TOR will not give you an IP address, but an “identity”
[m00trix] yea Mink
[Arkhangel] Ok Mink so that “IP” address does not work on IP protocol?
[m00trix] I think he means when using the browser, it tells the exit nodes ip
[m00trix] 🙂
[Arkhangel] yes, in practice
[l0t3D_] okay so if i have scripts disabled globally but lets say i enable it only on youtube to play a video
[n1ck1] how many connections can a node make with the same IP
[Mink] yes Arkhangel , TOR architecture does not use the same IP ]DNS as normal internet
[m00trix] that IP is your source proxy IP when browsing trough the TOR browser
[m00trix] or using any service to proxy through it
[n1ck1] and how many users can be on the node at the same time?
[l0t3D_] could another malicious website use that youtube tab to attack me?
[Mink] when a new .onion site is created it doesn’t get a IP address, but a .omnion address
[n1ck1] sorry…. my mistake
[n1ck1] but a node can handle how many requests?
[n1ck1] and perform how many for another node?
[B[U]G] all it’s possible this it happens if youtube link it’s embedded in page builded ad hoc
[m00trix] Mink, still, when you use the TOR Browser, it will tell you what the exit nodes IP is when you start it. That exit node IP is also the source of the browser requests you make and the source of any program you proxy trough it
[Arkhangel] Mink in practice you are saying that, unlike normal internet where a service like a website is on the 3rd level (IP level ISO/OSI), the onion network is completely on the 7th level (application level) of the
[Mink] ok, to spend those few minutes: TOR isn’t the only darknet network
[Arkhangel] ISO/OSI?
[m00trix] okay stop
[l0t3D_] if it’s a normal youtube link i opened myself B[U]G?
[Mink] wot?
[B[U]G] depends if in source
[B[U]G] a function
[B[U]G] call
[m00trix] When you are using the TOR browser, to go on midgetporn.org or whatever. Midgetporn.org will see your source IP as the exit nodes public IP
[B[U]G] a malicious “file”
[B[U]G] or host
[m00trix] simple as that
[Aeolus] guys thanks for today info. i suppose logs will be up later so i can read again, got to go.
[Aeolus] good work Mink thx 🙂
[Mink] you welcome Aeolus
[Arkhangel] in practice m00trix your machine is overlapped on the exit node
[l0t3D_] but if there is nothing in this source but there is a malicious “file” in another tab i have opened in the same time but I have no scripts enabled?
[m00trix] fire up the TOR browser, and press the “test tor…” thingy
[forceMajeure] Is it possible for tor to assign you a new circuit while an existing connection is still established say through a python script ran through port 9050
[B[U]G] for example : [script src=”DownloadThisEvilCode.js”/] [iframe]youtube embedd[/iframe]
[Mink] Arkhangel, , you want to rephase your question?
[B[U]G] afk
[forceMajeure] thus severing the connection
[m00trix] any site that want’s to can see the visitors source IP – and with TOR browser, that source IP is the IP of the current exit node your are on.
[Arkhangel] Mink, about the https://en.wikipedia.org/wiki/OSI_model
[Chanlog] Title: OSI model – Wikipedia (at en.wikipedia.org)
[m00trix] really pretty simple
[m00trix] jesus
[Mink] yes forceMajeure , not only possible, but advisable, tor will change nodes randomly to add anonimity
[Mink] Arkhangel, i know the OSi model :/
[forceMajeure] but what happens to the connection that was established before the circuit changes
[Arkhangel] Mink, if the normal websites have associated IP
[forceMajeure] is it passed into the new connection
[Arkhangel] so the 3rd level of OSI model
[Arkhangel] the onion network, since it does not have IP, it is completely on the application level of OSI model?
[m00trix] no
[forceMajeure] I guess I could see what happens by sending newnym to 9051 I just thought of that
[Arkhangel] since it does not have IP ( i mean the onion websites)
[Mink] no Arkhangel
[m00trix] you need to not compare hosting an onion site with using the TOR browser
[Mink] lets’ amke it clear TOR and TORbrowser are 2 different things
[Arkhangel] y
[m00trix] I think Mink covered all the questions really good already
[Arkhangel] in the pad
[Mink] torbrowser connects to tor
[Arkhangel] it talks about the Freenet platform
[Mink] yes?
[Arkhangel] continue xD I was thinking u finished to answer my prev question xD
[Arkhangel] ok so torbroweser, application level, connects to TOR network
[Mink] yes, trough socks
[Arkhangel] socks is an application protocol?
[Mink] taht’s 5 i think
[Arkhangel] ah ok
[m00trix] Arkhangel, you need to unleash your mind from that OSI layer shit 😀
[Arkhangel] ahahahah
[Arkhangel] ok xD
[n1ck1] socks is a protocol right? the TOR Browser is the application?
[Arkhangel] y
[Mink] yes n1ck1 , but it’s easy to confuse “an application(like a program) and the “application layer” of the stack
[Mink] so yes
[Arkhangel] tell me when I can continue with another question
[m00trix] Arkhangel, if you fire up a VM with like parrotsec.org OS – It have a build in function that routes all traffic through TOR. There are other distros that does this as well. But any way, if you do that, you can look into how the traffic flows using the terminal – when all traffic is routed using TOR. Might give you more insight
[l0t3D_] i dont know if this is related to this lesson or not but what are Obfuscated servers?
[l0t3D_] or “obfs”
[Arkhangel] m00trix traceroute?
[forceMajeure] lsof -i -n -P
[m00trix] well for a start heh
[m00trix] and many more
[Arkhangel] ah ok
[m00trix] but it will show you the traffic flow
[Arkhangel] nice to know
[Mink] one thing i wanted to talk about, but we have no time, whonix
[Arkhangel] another doubt is: since ISP knows what I am visiting as website, if I access to an onion website, my ISP can know it?
[vivek] m00trix: you can achieve the same with almost any distro
[m00trix] and if there are like 200 others using the same exit node that you are on, for that current TOR connection – it’s all good.
[m00trix] vivek, I know
[Mink] the ISP will know you are using TOR, but not which sites you are visiting
[Arkhangel] Mink the ISP cannot know the onion address?
[m00trix] no
[vivek] Parrot one is highly unstable and my exp. Was not very good
[m00trix] And if you combine TOR with an OpenVPN on port 443 then even less
[Arkhangel] Mink it because ISP can see destination IP but onion website are not based on IP scheme? this is the reason?
[Arkhangel] or one of the reasons
[m00trix] vivek, I only have a VM with it. But yes, it’s Debian aka unstable heh
[Mink] no Arkhangel , unless the ISp is running the last TOR exit node
[Arkhangel] normally, an ISP in the clearnet precisely what can see from me? Only the IP of website that I am visiting?
[m00trix] Arkhangel, your ISP cant see what sites your are browsing trough TOR
[l0t3D_] [l0t3D_] i dont know if this is related to this lesson or not but what are Obfuscated servers?
[l0t3D_] [l0t3D_] or “obfs”
[m00trix] all your DNS lookups and what you are doing
[m00trix] if you use the ISP’s dns servers
[Mink] in clearnet, your IS know your favourite pornhub page
[Arkhangel] guys so the ISP can read only the DNS lookup table inside the router?
[m00trix] they can see all, but not https login data
[l0t3D_] lol
[Arkhangel] ah ok
[Mink] sorry l0t3D_ , obfuscated are another kinfd of “relay nodes” to help tranport info
[m00trix] Arkhangel, if you use the DNS servers provided by the ISP you have. They can see what sites you visit, the IP of the sites, what traffic you generate, they can see close to anything
[l0t3D_] obfuscated servers are used to access vpn or tor in some places like the great firewall of china?
[Arkhangel] cannot I change the DNS server where I want to go?
[Mink] yes l0t3D_ , and Iran and N korea
[l0t3D_] well i think ill be up on that list soon too
[Arkhangel] provided by other companies?
[m00trix] If you change the DNS servers on your router to some that does not log and are not your ISP’s. They loose the ability to view your DNS req
[l0t3D_] thath’s the only way i can access tor or vpn
[m00trix] next step is then, VPN and TOR
[Arkhangel] m00trix so you mean that then internet in my location does not work lol
[l0t3D_] makes the connection very f’in slow tho
[m00trix] I would advice any one to NOT use the default ISP provided DNS servers as a pure basic step
[m00trix] should be the first step you do on the router
[Mink] l0t3D_, remember for help with anonimity and privacy you can always ask in #opnewblood, we will be happy to help with that
[Arkhangel] m00trix how can we do this?
[m00trix] set WAN DNS to manual and find some good non logging DNS
[Arkhangel] do u know some non logging DNS?
[m00trix] Arkhangel, depends on what router you have
[m00trix] sure
[l0t3D_] thanks Mink
[m00trix] Also you will get arround of most censorship
[m00trix] by stat step alone
[Arkhangel] can you list some of them here?
[m00trix] gov dns blocks
[m00trix] I switch it up
[m00trix] but run
[m00trix] https://blog.uncensoreddns.org/
[l0t3D_] should i call them and ask them nicely to change my DNS? 🙂
[m00trix] some places
[Arkhangel] ty
[m00trix] just login to your router
[m00trix] and change it
[m00trix] if in doubt give me a priv
[Arkhangel] ty very much
[l0t3D_] WAN settings right?
[m00trix] yea
[m00trix] and then
[m00trix] set DNS do manual
[m00trix] not the IP 😀
[m00trix] only dns
[Arkhangel] another question: the pad talks about the freenet platform… is it a software to be installed on my computer?
[Mink] yes Arkhangel
[m00trix] l0t3D_, priv me if you need help
[Arkhangel] what is the difference between freenet platform sw and tor bundle sw?
[m00trix] If I run with my basic ISP DNS servers sites like http://1337x.to/ are blocked 🙂 a torrent site. Gov block
[Chanlog] Title: Torrent Search Engine | 1337x.to (at 1337x.to)
[n1ck1] if I change my DNS the VOIP stops working in my house
[Arkhangel] or better: if torbrowser allows me to access to the tor network, freenet and other shown platforms on pad, what do they allow me to do?
[m00trix] wut n1ck1?
[m00trix] makes no sence
[n1ck1] my ISP has a separate physical VOIP phone but connected by cable to the router
[n1ck1] minha mae é velha e não sabe usar muitas tecnologias e o telefone é similar ao antigo porém funciona como VOIP
[n1ck1] sorry
[n1ck1] my mother is old and does not know how to use many technologies and the phone is similar to the old one but it works like VOIP
[n1ck1] if I switch to any other, VOIP does not work, it has been months of technical visits, tests, and unsolvable configurations.
[RedAcor] Set DNS on your network manager.
[RedAcor] So that will not affect your router.
[RedAcor] Also you can use unbound on your system.
[RedAcor] You can check lesson 4 logs for that.
[m00trix] yes
[m00trix] thx to Mink for a great course 🙂
[RedAcor] There many different and hybrid solutions.
[RedAcor] Anyways. Mink Thanks for delicious lesson. 🙂
[Arkhangel] guys is better vpn tor vpn tor or tor vpn tor?
[Arkhangel] is better starting with vpn or tor?
[n1ck1] YES
[n1ck1] This worked …. It’s simple but I had not thought of it.
[RedAcor] Arkhangel Tor VPN Tor
[Arkhangel] why starting with tor RedAcor?
[RedAcor] Some people use VPN ] VPN ] Tor also
[RedAcor] Because it is secure than VPN. jijiji
[n1ck1] tails pendrive, VPN, TOR, break everything later and throw it in the trash lol
[Arkhangel] instead, when I connect to tor network, when I reach the exit node, the IP of my computer is in clear there?
[RedAcor] If i talk about last bug of TOR: Nah.
[l0t3D_] 2 tor?
[m00trix] Arkhangel, really depends what you are doing also 🙂
[l0t3D_] [RedAcor] Arkhangel Tor VPN Tor
[n1ck1] RedAcor thanks for the DNS tip
[RedAcor] But they fixed that issue.
[RedAcor] n1ck1 You’re welcome.
[Arkhangel] to discover some user, agency like NSA what look for?
[Arkhangel] they use only their exit node and check for all users that go in, or they can know information also about exit node that are not theirs?
[m00trix] hard to say
[m00trix] you need to stop overthinking it
[Arkhangel] im afraid to forget these questions and these doubts xD
[m00trix] I get that bro. But I can’t answer you how the FEDS, CIA or NSA track people on TOR 🙂
[m00trix] or if they even can and with what success
[Arkhangel] dont worry. I have a last question: why tor works on SOCKS and not HTTP/HTTPS protocol?
[m00trix] Arkhangel, per design I think
[Arkhangel] in the network settings, for HTTP/HTTPS I cannot use the 9050 or 9150 port to use TOR, right?
[m00trix] network settings for what?
[m00trix] program
[Arkhangel] for example if you want to use a proxy on the system of the operating system
[m00trix] what OS Arkhangel
[m00trix] You want to route all traffic out through TOR
[Arkhangel] windows or linux-based
[Arkhangel] y
[Arkhangel] in that case for HTTP/HTTPS I cannot use port 9150
[Arkhangel] right?
[Aspire] i have to go bye all and thanks for the lesson
[Arkhangel] since SOCKS and HTTP/HTTPS talk different “languages”
[m00trix] Arkhangel, are you trying to run another browser through TOR?
[m00trix] what are you trying to do, that would help heh
[Arkhangel] no
[Arkhangel] I want to use just the normal browser with no opening torbrowser
[Arkhangel] but where I can surf on tor
[m00trix] you have to have the TOR Browser running to proxy the traffic
[m00trix] unless you run a plain tor from a terminal
[Arkhangel] exactly
[Arkhangel] on windows I should run tor browser
[m00trix] and there is a reason for why the TOR browser is at is is. And have the plugins it have
[m00trix] to protect you
[m00trix] you can do what you are trying to do, but even TOR warns against it
[Arkhangel] i know that torbrowser is better for that, but just for information, if I start torbrowser and I enable a proxy that route the data to the tor network by a normal browser, it is not a connection tor over tor right?
[m00trix] when you start the TOR browser, you can tell most programs yo use 127.0.0.1:9150 as a proxy and it will proxy over TOR
[m00trix] but on Windows, the TOR Browser needs to be running
[Arkhangel] exactly, so it is simple one tor connection, is not tor over tor, right?
[Arkhangel] in case of windows I mean
[m00trix] tor over tor?
[Arkhangel] y, since it s not a good idea running tor over tor, I would like to know if, on windows, open torbrowser and proxying the other programs to 127.0.0.1:9150 is not a tor over tor
[l0t3D_] alright thanks all for the lesson i need to go
[l0t3D_] bye
[n1ck1] no
[n1ck1] not is
[Arkhangel] ok ty
[Arkhangel] Im so sorry I forced everyone to run away
[n1ck1] you only configure that program to use this network
[n1ck1] ahsuhahsauhsauhusa
[Arkhangel] ahaha
[n1ck1] but use linux
[n1ck1] windows sucks
[Arkhangel] I use Linux, but I need to have all possible information
[n1ck1] try ubunto first, it is easy
[n1ck1] yes
[n1ck1] this is right
[Arkhangel] culture is power
[n1ck1] y
[n1ck1] tks all

How and Why To Re-Rout DNS Through Your Computer or Phone

In a few of my previous tutorials I briefly touch on DNS re-routing, but never really get into it in full details, so I figured why not here today? Before moving forward, learning to re-route your DNS is important because it is a means of protecting your personal data, devices, network connectivity and internet traffic away from the spying or prying eyes of your Internet Service Provider (ISP), Government and any other interested 3rd parties, such as advertisers or even hackers. As for how DNS works or how switching it effects your internet connectivity, I think the short video below is the best demonstration. It explains how DNS re-routing configures your computer or phone to connect through a DNS server first, in order to connect to a website second – instead of connecting to a server owned by your ISP to connect to that same website, get it?

While there are number of ways to re-route your DNS and different services providers to choose from, for the purposes of this article, I consider the following to be the worlds best “Top 3” – Cloudflare DNS, IBM Quad 9 and Google’s Public DNS. As you can read below, each of which have their own unique benefits.

Cloudflare DNS:

Ipv4: 1.1.1.1
Ipv6: 1.0.0.1
Ipv6: 2606:4700:4700::1111
Ipv6: 2606:4700:4700::1001

Cloudflare DNS is my personal DNS provider of choice, installed on both my computer and phone. As for why I choose them, this is because Cloudflare DNS anonymizes IP Addresses, deletes logs daily and doesn’t mine any user data. Additionally, Cloudlfare DNS also offers security features not available in many other public DNS service providers, such as “Query Name Minimization” – which diminishes privacy leakage by sending minimal query names to authoritative DNS servers when connecting to websites.

Learn More – Cloudflare DNS: https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/

IBM Quad 9:

Ipv4: 9.9.9.9
Ipv4: 149.112.112.112
Ipv6: 2620:fe::fe
Ipv6: 2620:fe::9

IBM Quad 9. Whereas Cloudflare may be more beneficial for activists and researchers, IBM Quad 9 on the other hand is probably of more benefit to your average home owner, parent or business owner. This is because Quad 9 routes your internet connections through DNS servers that actively blacklist known malicious websites, as well as websites which have previously been compromised by data breaches. In addition to this, Quad 9 servers also protect your internet’s incoming/outgoing connections as a means of preventing any of your devices from being caught up in a botnet. Quite simply, this means that while on Quad 9 servers, you never have to worry about any of your devices being hijacked or caught up in any sort of DDoS or crypto-mining campaigns, even smart devices connected to the “Internet of Things” (IoT).

Learn More – IBM Quad9: https://www.quad9.net/

Google Public DNS:

Ipv4: 8.8.8.8
Ipv4: 8.8.4.4
Ipv6: 2001:4860:4860::8888
Ipv6: 2001:4860:4860::8844

Google Public DNS servers on the other hand are ideal for people in countries such as Ethiopia, Sudan, Turkey, Syria, North Korea and the like which are all known to have restricted, censored, shut down and/or sealed off access to certain portions of their national internet in the past. In fact, as you can see via the picture provided below, activists affiliated with Anonymous Cyber Guerrilla have literally spray painted Google’s 8.8.8.8 DNS in public places in times of National crises as a means of raising awareness and alerting citizens how to bypass local internet restrictions imposed by their Government – opening people back up to the global world-wide-web. In addition to bypassing regional internet restrictions, compared to ISP’s in some 3rd world regions, switching to Google DNS servers might actually help improve or speed up your load time/internet connection.

Learn More – Google Public DNS: https://developers.google.com/speed/public-dns/

No photo description available.

 

How To Switch DNS On Windows?

1.) Go to the start menu and type in “Settings,” press enter and then select “Network & Internet” options

No photo description available.

 

2.) Click on “Change Adapter Options

Image may contain: text

 

3.) Select the “Internet Connection” your are using then click on the “Properties” button when it pops up

No photo description available.

 

4.) Scroll through and individually select/click on “Internet Protocol Version IPv4” and “Internet Protocol Version IPv6” then press the “Properties” button again

No photo description available.

 

5.) Select “Use The Following DNS Server Address” and manually enter in your DNS service provider of choice – see IPv4 and IPv6 Addresses above – then press “OK

No photo description available.

 

That’s it, really. Generally speaking, the setup should be the same on your Apple PC just as well. It’s also important to note that you can actually do a mix-match of the addresses listed above. For example, you can use Cloudflare for IPv4, but then choose IBM for IPv6 – vice versa – and your internet connection will not be broken. Just so you are aware, while IPv2 usually signifies the country of origin or device where you are coming from, but most all devices on the world-wide-web these days connect to websites via IPv4 connections, making IPv4 the most important settings to modify.

How To Switch DNS On Phone?

Changing or re-routing the DNS settings on your phone can either be incredibly complicated or incredibly simple, depending on your level of skill/expertise. However, far and away the easiest means to go about accomplishing this is by installing a 3rd party App – either by going to your App, Apple or Google Play store(s). Simply just type in “Change DNS” to your search settings, press enter, and this should open up a whole host of options to choose from. Simply choose the one that you feel is best for you and enter in the Addresses listed above.

If You are A Little More Advanced…

OpenNIC Project. For those of you whom may be unfamiliar, “OpenNIC (also referred to as the OpenNIC Project) is a user owned and controlled top-level Network Information Center offering a non-national alternative to traditional Top-Level Domain (TLD) registries; such as ICANN. Instead, OpenNIC only operates namespaces and namespaces the OpenNIC has peering agreements with.

In other words, they are open DNS addresses, servers and proxies not indexed by global internet agencies or their Governments. Stay classy mi amigos 😉

Learn More -OpenNIC Project: https://www.opennic.org/

See Also – CyberGuerrilla Internet Censorship Care Package: https://www.cyberguerrilla.org/blog/anti-censorship-carepackage/

My Interview w/ Project Hacktivism (Europe)

It may have been a couple months in the making, but earlier this month I finally agreed to an interview with a European based group of researchers known as “Project Hacktivism,” seeking to learn more about the underground world of hackers, who they are (so to speak), what motivates them, why it continues and why it all exists in the first place. Led by a man going by the name of Marco Romagna, I was submitted a series of questions that I will share the the viewing public here today as a sneak peak before the final research is published, produced or presented.

Here’s what I was sent, and how I replied…..

These are the first questions. Based on your answer I would be happy to ask more. If you can’t answer because it is too private, just let me know. Reading some of your blogs, I noticed you have been highly involved with Anonymous, likely not only as an observer. Therefore, my questions for you are…

1.) First, do you have hacking skills yourself, or are you passionate for technology but not a computer hacker.

Answer:I am not a computer hacker, but I am passionate about learning and view the internet as the greatest library on planet Earth, so I used to spend as much time as possible on it learning. Hacking culture always fascinated me so I began to research it and the more I researched it the more I found myself within it. I was never a hacker, but people seemed to gravitate to me because I have a high IQ and hackers tend to be some of the smartest people in the world actually, and the people who want to affiliate with them are always seeking to learn more about the world in general. I think you will find that some of the deepest corners of the hacking world are also some of the most intellectual corners of the world these days, all full of people whom spend nearly full time hours reading, learning, consuming new information. Couple this with different perspectives from different, cultures, religions, countries, etc, people wind up learning so much from one another – making it addictive.

2.) Have you directly been involved with Anonymous and hacktivism more in general (meaning: participating in active operations)? If so, what did (does) motivate you?

Answer:I have been directly involved in many Anonymous operations all around the world, led many myself, invented many myself, wrote transcripts for others, drafted press releases, made pictures – etc. What motivates me is what motivates everyone; being the change you wish to see in the world. Everyone in this world has different interests, goals or concerns. So people act on this individualism. Whether it be pedophiles, racists, animal abusers, terrorists, you name it, there is always going to be someone out there looking to fight back against it. So this is how people build their different Ops, based on what they want to fight for – which is always relative to the individual.

Hackers are some of the poorest, most oppressed people in this world that you will ever meet – believe me. In real life they have nothing, no possessions, no social power or political influence, often times social outcasts from their own schools or societies, geeks or losers, come from abusive families, lower class – etc. Just people who are accustomed to live without. So this is why they fight so hard online, because the internet levels out the playing field. With the right amount of knowledge, even the biggest of bums in the material world can be a God online. So this is why people fight, why they are willing to steal or pirate so much information/data from people online, because in real life they have nothing and this serves as their motivation to do whatever they can however they can.

What motivates us? It also works, meaning we get results. Look at operation Sudan in 2018 – 2019. We literally changed the course of African history. I started it with a few others from a homeless shelter computer lab in NYC, and helped a revolution in Africa. Just think about that. Anonymous was once one of Time Magazines top 100 people at one time, I have helped INTERPOL and the FBI make dozens of arrests internationally worldwide, been given lines to Air Force Intelligence in Yemen, all because Anonymous operations and online activism. You CAN change the world from a key board, and Anonymous knows this. You just have to work hard enough for it, so this is what many try to do.

3.) Hacktivism is a complex term: could you provide a definition of it and what ‘being a hacktivist’ mean?

Answer:I think my answer to #2 answers your question here.

4.) The golden age of hacktivism was probably the period 2010-2016. Do you think we are witnessing its decline? If so, what are the reasons behind it?

Answer:Well it all started with the FBI crackdowns which hit Anonymous very hard prior to 2015. Then we built up again and got mixed in with the whole Russian propagandist and fake news fiasco, so US Congress, Google, Facebook, and the President of the United States literally all teamed up to fight us, because no one knew who we were or what our true motivations were. As a ghostwriter, The Washington Post, Google and Facebook cited my work and the work I sourced to other websites as Russian Propaganda through the prop or not list and nearly all were banned offline/censored. Meanwhile, in real life, I had 3 verified pages on Facebook, 4 inclusions into Google News index and was an American conservative. But that doesn’t matter to them, anyone whom was Anonymous at the time was the enemy – automatically. The 2016 US Presidential election changed the course of history, including for hacktivism. All of our top platforms, pages and websites were essentially attacked and banned offline. Then, when the money stopped flowing in, the platforms shutdown, stopped running and people scattered. By 2017 everything was remnants of the year beforehand and there were no more central points of contacts for random or new people to find us. Anonymous HQ was the biggest Anonymous forum and webchat in the world in 2015-2016, sometimes thousands of people on at a time – millions of views/reads daily. After what Google and Facebook did to us, it was destroyed.

Getting back into hacktivism in 2018/2019 what I am finding is that the death of hacktivism is relative to geography. Meaning in the USA and Europe where it flourished during its Golden Age as you say, it is dead in the USA and Europe now. But on the other hand hacktivism is exploding in the Middle East, Africa, South America and South East Asia. These are also some of the least advanced countries/territories in the world in terms of cyber security, which is a direct correlation to the rise of hacktivism there I think.

For question number 4 I also think you need to look at the age of the people behind the movement. Many were inspired by movies like the Matrix and V for Vendetta. Maybe these people were teenagers or in their early 20s when these movies and these movements came out. The Matrix is 20 years old at this point. If you were 13 then, you are 33 now. If you were 20, you are 40 now. So the older people get the less time they have to play online or do things online because of adult life. Indubitably, this has also led to the death of the movement – the people originally behind it just got too old to keep playing games online and became remedial wage earners like the rest of society and it just kind of fell off.

** EDITORS NOTE: For the record, it might sound like I am saying Anonymous is dead, but I do not believe this at all, that was just the direction the question took me in that case. **

 

CyberGuerrilla – Anonymous Gearing up for Operation Targeting Turkey Over Syrian Invasion

While I personally may be in favor of the Turkish invasion of Afrin and Rojava, it is not my job to care about which side is doing what when writing the news, I just report whats actively going on out there. But, getting into the hacktivist scene myself lately, I can not help but notice a ton of international outcry over what Turkey is presently doing in Syria and around their borders. I’m not talking about new reporters, politicians or anyone like that here, I’m specifically talking about some of the larger hacking networks the world over.

For example, over the course of just 1 week there were three different posting to CyberGuerrilla Anonymous Nexus (CgAn) indicating that operations against Turkey will soon be underway, and CgAn is not know to just f*ck around – so to speak. These postings, by the way, included a message from people inside Turkey, a posting from the United States and a posting from France – indicating a large scale effort is soon underway. It should also be noted that their operations are not entirely cyber and not entirely Black-Hat either, rather the groups are using whatever platforms they have to share the message about the Kurdish people and what is happening to them. In solidarity with them, I too share their messages here today with my audience.

Message from Kurds……..

Greeting citizens of the world

The Kurdish people who destroyed jihadist ISIS are now bombed by the Turkish State, the chief supporter of ISIS.
Unfortunately, we read the news of the deaths of many elderly women and children.
This is very sadly.
we shouldn’t stay silent more and not be part of this crime of humanity.
it is time to be sound to that scream echoing to stop this genocide.
Kurdish people should not be sacrificed to the dirty alliance of terrorist Trump and terrorist Erdogan.
All Anonymous members and all hacktivist groups should take action against that genocide.

Biji Berxwedana Rojava Biji Rojava

Message from Anonymous France…….

#OPSafeKurde #AnonymousFrance

Le collectif Anonymous ces lancé dans opération #OpsafeKurde à la suite que les force Turques ont traversé la frontière Syrienne.
Le collectif Anonymous France s’engage de manière indéterminé dans le conflit afin de permettre la paix entre les deux nations.

Et pour éviter toutes nouvelles guerre qui pourrait meurtrie des familles Turques, Kurdes, Syrienne.

Nous sommes légion
Nous pardonnons pas
Nous n’oublions pas
Attendez vous à nous

Message from BlackRat (CgAn)…..

Greeting Brothers and Sisters,

All those wars! All that devastation! All those victims, blood and reaction’s fury! Who is to blame? Who stands behind those who threw the burning torch into the keg of gunpowder? Who had long desired these wars and prepared them? The ruling classes! With their cronyism and kleptocracy, their bureaucracy and ideology, their police and spies calling us criminals. The governments and imperialist cliques, together with their press, tell you that the war(s) must be continued in order to destroy terrorism. Do not be deceived! Terrorism can only be eliminated by peace itself, and the task of bringing it down is posed in every country. Your governments and your press also tell you that the war’s must be continued so that it can be the last war on… This too is a deception. Never has a war put an end to war or terrorism. On the contrary, each war awakens the lust for revenge. Violence begets violence. Thus, after each sacrifice, your tormentors will demand new ones. Nor do the ruling pacifist zealots offer an escape from this vicious circle.

There is only one way to prevent future wars, namely for the Brothers, Sisters to conquer political power and abolish capitalist property. Enduring peace can only be achieved by victorious empowerment of the people.

A revolution not only to free the Kurdish population in Syria, but also the Middle East from the centuries of colonialism, oppression and dictatorships. And it has been an internationalist Revolution, because many internationalists joined this revolution, on the front line against the Islamic State and the Turkish fascism, we helped in hospitals, planted trees and worked to build up a democratic, ecological society, based on the liberation of women. And many revolutionaries joined the struggle all over the world, because the revolution in Syria has shown to all of us, that another world is not just theoretically possible, but it’s actually being built up in everyday life.

Social injustice and class rule are even more apparent in war than in peacetime. In peace, the capitalist system robs workers of the joys of life; in war(s) it robs them of everything, including life itself. And let us be done with devastation. It is you, the people, who will bear the burden of these heaps of ruins today and in the future. The hundreds of billions in cash thrown into the maw of the god of war are unavailable for maintaining the people’s well-being, for cultural purposes, and for social reform that could ease your lot, promote popular education, and alleviate poverty.

And tomorrow new and heavy taxes will be laid on your stooped shoulders. So let us end the squandering of your labor, your money, and your life’s energy. Rise up in struggle for an immediate peace with no annexations! Use every means possible to bring a rapid end to the human slaughter! Take up the slogan: For an immediate armistice! Rise up in struggle, peoples suffering ruin and murder! Take courage! Bear in mind that you are the majority and, when you so desire, you can assume power. Let the governments know that hate against war’s is growing in every country and with it, the desire for social retribution. This is bringing closer the hour of peace among the peoples.

Down with the War’s!
No Masters No Slaves!
Long live Liberty!
Long live Peace, immediate peace, without annexations!
Long live the Revolution!

At the time of this article, October 20th 2019, according to Amnesty International, “at least 218 civilians have been killed in Syria, including 18 children, since the offensive began” – something Turkey denies. If you want to learn more or hear first hand eyewitness accounts about Turkeys current offensive, you’re invited to read more here: https://www.amnesty.org/en/latest/news/2019/10/syria-damning-evidence-of-war-crimes-and-other-violations-by-turkish-forces-and-their-allies/

 

Join Rogue Media Labs New Online Chatroom

Earlier this year I managed to create a fairly large and successful online chatroom through the Discord service, but abruptly closed its doors for reasons I can not entirely understand/explain myself. Regardless, now that I have changed my website and begun writing again, I figure now is the perfect time to re-launch that platform and begin inviting everyone in once again.

Please note that it will take some time to build again and put all of the proper resources together, which might take a little longer now that I work full time offline. This includes stuff like security tutorials, nerd resources and weaponry, things like this. None the less, it will get there and I invite anyone interested to join in and watch/participate as we continue to build. If you don’t have Discord for your phone or PC yet, you should install this first, then click on the link. But you will still be able to join in the chat with your browser too, by clicking on the link below – though it will be as temporary as long as your browser window stays open, which is why I recommend to download first.

Chat Invitation – Click To Join: https://discord.gg/b3hmKYU

Anonymous Hacker Known As XeljomundoX Arrested by Spanish Authorities – Faces 11 Years

Unfortunately, upon logging back online this evening I was met with a bit of bad news. This would be the news that the Anon known as “XeljomundoX,” one of the primary leaders of #OpCatalonia2019, was arrested for their alleged role in advertising and encouraging not just the Catalonian protests which took place this week, but also for their role in encouraging cyber attacks against the Spanish Government with a video shared to social media this past Monday.

As was first reported to me by Anonymous News this afternoon, roughly 5 hours ago, “The former hacktivist arrested again #Anonymous @YourAnonXelj. He was also arrested for cyber attacks on 1-O and they ask him for 11 years in jail. Now accused of spreading a video of which he is not part of the attacks.” On top of that, as was reported by the Spanish news paper El Confidencial today “One of the ‘hackers’ linked to the one known as #OpCatalonia2019, a series of cyberattacks launched this week in protest of the ‘procés’ ruling, has been arrested this morning by the National Police at his home in Tarragona. He is accused of alleged crime of computer damage for being behind a video announcing the cyberattack campaign that occurred as of Monday.

In case you had not seen it or were curious, here is the video he was arrested for………

This is also the second time XeljomudoX has been arrested. They were previously arrested by Spanish authorities earlier this calendar year, in January 2019, following their participation in various international hacking campaigns. Most notably, the hacks and leaks associated with the original #OpCatalonia which took place throughout 2017 and the months/years to follow.

For example, other members of Anonymous put out a video this evening in support of XeljomudoX, stolen video footage detailing the search of Xel’s home and seizure of his computer and social accounts from this past March – lulz……..

Additionally, in protest/support of XeljomundoX myself, I sent a private message to his previously seized Twitter account with my DoB, SSN, home phone number and address, telling Spanish National PoliceArrest me you cowards. I will post the video every single day until he is free. Want to arrest someone for a video, now I know the Spanish Government is desperate. Then you wonder why all these people despise and protest you. DO you actually have pride for Spain? Has any country in the world fallen off any more significantly than Spain the last 600 years? You used to own part of the USA, Central America and South America. Now what are you? A shell of your former shelf, lost all your territory, lost your glory. Now your just a single nation with a failing economy, at the bottom end of the EU. What would you even do without the international bailouts? It’s pathetic. Now you try to stop on anyone who speaks negatively of your country? That’s fucking sad. Ask your boy Mussolini how well Fascist approaches worked for him. You will fall, and it’s because of your own actions. Spend half the effort looking into a mirror that you do trying to squash free speech. This is why you are cowards, and why I would love to speak my piece in your shithole country.

Not unexpectedly, at the time of this article I have not received a response from Spanish authorities, and have no further update on Xel’s situation. Stay tuned.

If you’d like to learn more about this weeks cyber campaign, you can read more here:  https://roguemedia.co/2019/10/15/the-highlights-fallout-damage-from-opcatalonia2019/

Jeremy Hammond Held In Contempt of Court, Joins Chelsea Manning In Protest for Assange

Eastern District of Virginia – Imprisoned Anarchist hacker Jeremy Hammond was ruled in contempt of court today by U.S. District Court Judge Anthony Trenga for refusing to testify in front of a federal grand jury sitting in the Eastern District of Virginia (EDVA).

Hammond was recently transferred from the Federal Correctional Institution in Memphis, Tennessee to the EDVA. Due to the secrecy of jury proceedings, it is unknown what the federal grand jury is investigating or why they are seeking testimony from Hammond.

At the same time, informed observers widely suspect this is the same grand jury investigating WikiLeaks, its founder Julian Assange, and its previous sources. Judge Trenga, who ruled on today’s court hearings, has also presided over the grand jury proceedings of Chelsea Manning, a different WikiLeaks source, also held in contempt for refusing to testify in front of a grand jury. Manning continues to be detained for refusing to testify.

Being held in contempt for refusing to testify in front of a grand jury is not a criminal charge. As noted by a previous Unicorn Riot report, typically grand juries are used to investigate crimes, sit for approximately eighteen months on the findings, and then recommend charges which are filed under seal.

Hammond pleaded guilty in 2013 to hacking a defense contractor named Stratfor as part of the Anonymous-linked hacking crew known as LulzSec. It is unclear what, if anything, the EDVA federal grand jury is investigating but based on his Anarchist principles Hammond has refused to testify in any capacity. Attorneys for Hammond have attempted to raise to Judge Trenga that Hammond would not testify and holding him in contempt would not compel his testimony.

It is a common defense strategy in grand jury resistance, known as Grumbles motion, to raise that holding a grand jury resistor any further will not compel their testimony. Previous resistors have been held for over 250 days. Judge Trenga dismissed that motion in his ruling earlier today. In a statement uploaded to the internet, his solidarity network stated,

Given the secrecy of grand jury proceedings, we don’t know the nature or scope of the grand jury’s investigation. However, our assumption is that this is the same grand jury that Chelsea Manning is currently being incarcerated for refusing to testify before.” – Hammond Support Network

As noted by the solidarity network, Hammond was due for release in December of this year. Now he will be held in civil contempt, meaning his federal criminal sentence will be suspended, which may mean spending as long as an additional 18 months in jail for the contempt charge.

Hammond has already lost access to a federal program known as Residential Drug Abuse Program (RDAP) which would have reduced his criminal sentence by 9 months.

A reporter for Unicorn Riot was asked present in the Courthouse and was removed by the bailiff because the proceedings were “sealed by the grand jury.” The bailiff briefly allowed in three federal agents stated that they were with the Federal Bureau of Investigations. After a brief conference with the Department of Justice lawyers present, the agents where also removed.

After an approximately 30 minute conference, Judge Trenga opened the court and rule to hold Hammond in civil contempt. The three FBI agents sat in on the court proceedings but did not speak. Judge Trenga stated, “On September 12th, Hammond appeared in front of the grand jury and refused to answer seven questions.” Judge Trenga also stated that today, Hammond was asked again to testify. “The grand jury convened today and Hammond has refused to testify in front of the grand jury.” Trenga also stated that “it is the basic obligation of a citizen to appear in front of a grand jury and testify.”

It is unclear how long the court will hold Hammond in contempt, only stated he will be confined until “such time he purges or the end of the life of the grand jury.” Practically speaking, this means the court could hold him for eighteen months, the length of the grand jury, or until he agrees to testify.

Following the Judge’s ruling, he asked for a sidebar with the four Department of Justice lawyers. During this time, the court projected white noise to prevent eavesdropping. Asked by the defense if the sidebar would be made available to the defense, Trenga responded “No.

[ Editorial Note: We have updated the statement on behalf of the Hammond Solidarity Network ] 


This article was originally published by Unicorn Riot on October 10th 2019. It was republished, with permission, under a CC BY-NC-SA 3.0 US Creative Common License

The Highlights: Fallout & Damage from #OpCatalonia2019

For those of you whom might not have been aware, massive protests and demonstrations took place all throughout Spain today, October 14th 2019, in protest for the failed annexation of Catalonia in December 2017, in support of all the political prisoners whom continue to be incarcerated from it at the hands of the Spanish Government ever since and those whom will continue to be imprisoned for it in the future, as well as to renew Nationalistic spirits/ambitions to make Catalonia an independent state once again in the future. While most of the protests were political based and non-violent, this does not mean there wasn’t any violence – from both police and/or protestors alike.

Additionally, as I was writing this article, it was just announced that members of the Catalonia independence leaders were just sentenced to 13 years in prison for encouraging people to take to the streets in protest today – essentially being sentenced in wake of some of the carnage that ultimately took place as a result of their encouragement.

However, what most of the main stream media did not cover about today’s protest were the events which took place online. While they may not get the popular headlines like those on the ground, this does not mean they were ineffective, went unnoticed or did not have an effect. For example, below you can find more about “Operation Catalonia” (#OpCatalionia2019), what it is all about, who was victimized by today’s attacks, as well as what hackers have done in support of this movement for the better part of the last year and a half or so – shout out to Anonymous Espana!

Learn More – #OpCatalonia: https://roguemedia.co/tag/opcatalonia/
Follow #OpCatalonia2019: https://twitter.com/search?q=%23OpCatalonia2019&src=typeahead_click&f=live

Largely lead by Anonymous CyberGuerrilla (#CgAn) and splinter groups operating under their jurisdiction this year, different Spanish-based political parties, politicians, universities, pubic businesses and more were targeted by today’s attack. Below is a confirmed list of the full run down from today’s events…..

DDoS Attacked

hxxp://hacienda.gob.es
hxxp://patrimoniodelestado.minhafp.es
hxxp://minhap.gob.es
hxxp://minhap.es hxxp://mjusticia.gob.es

Information Drop

Target: Centro nacional de inteligencia
Mails Leak: https://anonfile.com/G0zat481n1/cni_txt

Target: Congreso
Mails Leak: https://anonfile.com/K2z4ta8bn5/congreso.es_txt

Target: Correo gob
Mails Leak: https://anonfile.com/O2z9tc83nf/correo.gob.es_txt

Target: Min de defensa
Mails Leak: https://anonfile.com/M7zbta89nd/mde_txt

Target: Poder Judicial
Mails Leak: https://anonfile.com/L4zdt686nb/poderjudicial.es_txt

Target: vox
Mails Leak: https://anonfile.com/Qczftf86nb/voxmail_txt

Haxxed

Target: hxxp://ctas.es (Hacked)
Leak: https://anonfile.com/b608td88n7/www.ctas.es_rar

Target: hxxp://ctfc.cat/ (Hacked)
Leak: https://anonfile.com/p00eta84n9/www.ctfc.cat_rar

Target: hxxp://edimodul.es/ (Hacked)
Leak: https://anonfile.com/U7z5tc8en5/www.edimodul.es_rar

Target: hxxp://ilsa.es/ (Hacked)
Leak: https://anonfile.com/Yez2tc87n9/www.ilsa.es_rar

Target: hxxp://mmb.es/
Leak: https://anonfile.com/c900tb87na/www.mrsoft.es_rar

Target: hxxp://mrsoft.es/
Leak: https://anonfile.com/c900tb87na/www.mrsoft.es_rar

Target: hxxp://anticosa.es/
Leak: https://anonfile.com/t20ate88nf/www.panticosa.es_rar

Target: hxxp://segypr
Leak: https://anonfile.com/A402t982n5/www.segypro.es_rar

Target: hxxp://spainweather.es/
Leak: https://anonfile.com/y30at889nc/www.spainweather.es_rar

Target: hxxp://movilidadgranada.es/
Leak: https://anonfile.com/ac09t48dne/www.movilidadgranada.es_rar

Target: (Psoe de Burgos) hxxp://psoeburgos.es/
Leak: https://anonfile.com/s82ct18en7/www.psoeburgos.es_rar

Target: (PartidoPopular de Puertolumbreras) hxxp://pp-puertolumbreras.es/
Leak: https://anonfile.com/q11ctd8en5/www.pp-puertolumbreras.es_rar

Target: (Diputacion de Granada) hxxp://dipgra.es/
Leak: https://anonfile.com/j814t187ne/www.dipgra.es_rar

Target: (Portal de la Dirección General del Catastro) hxxp://catastro.minhap.gob.es/
Leak: https://anonfile.com/Razft18fnf/www.catastro.minhap.gob.es_rar

Infos, Date & Times – Million Mask March 2019

Admittedly, over the course of the last several years the global phenomenon known as the “Million Mask March” has slowly lost a little bit of steam in main stream society, many thanks to all those hard workers at the National Crime Centre of London and the FBI of the United States for that! But as I take a look around the hacking scene again in the fall of 2019 I can already see something is new, something is different, and can already feel a heightened sense of fervor surround this years March – November 5th 2019.

It’s hard to say what is fueling it, but what we do know is that this years movement will largely be led by many countries we wouldn’t normally have expected over previous years, such as the Sudan in Africa, Ecuador and Brasil in South America, and Hong Kong in the far East – where fervor appears to be at its highest. Talking to different members online, there are already extensive protests already lined up for the 5th there – which will surely be a sight to see.

Learn More – Million Mask March 2019: https://www.cyberguerrilla.org/blog/the-anonymous-million-mask-march-2019-will-be-bigger-than-ever/

Browsing through the list for myself, I can not help but notice that there are no events planned for New York City this year though – which is something I should have expected. Granted last November 5th it was raining and in the mid 30’s (Fahrenheit) when I showed up at the MMM 2018 on Wall Street, I was disappointed to learn that I was literally the only one present that day – aside from all the guard rails and police, that is. Perhaps it is the natural course of things, but even though the Million Mask March may be dying in some of the more legacy places around the world you might have expect it, such as New York City, it is in turn now growing in other regions you might not have never found it before. Either way, anyone and everyone interested should do what they can to support the movement and next months march, even if it means just making some flyers/signs and pinning them up around where ever you happen to live.

** EDITORS NOTE: New York City was officially added to protests list 10/14 **

Many activists are already hard at work and have just released a preliminary list of confirmed events/marches taking place on November 5th 2019, and are inviting anyone who reads to come and join them. Please note that these lists will continue to be updated and will grow over the following days and weeks, as more events are confirmed from all around the world. If you are interested in learning more about the group, march or movement itself, we have also put together a list of websites and chatroom’s for your resources – all are welcome to join/explore. You can learn more about MMM 2019, the people hosting them and the people organizing them via the links provided below – enjoy!

Pastebin Infos: https://pastebin.com/S5y7kyqS
Website Backup: http://millionmaskmarchlocations.com/
Discord Server/Chat: https://discordapp.com/invite/QARrBcA
Follow #MMM2019 on Twitter: https://twitter.com/search?q=%23MMM2019&src=typeahead_click
Follow #MillionMaskMarch on Twitter:
https://twitter.com/search?q=%23MillionMaskMarch&src=typed_query