The Self-Fulfilling Prophesy of Calling an Anti-Fascist A Terrorist….

The other month our proud commander in chief made a public announcement declaring all Anti-Fascists terrorist, while pleading with other world leaders to come together and help him both condemn and crack down against these ‘dangerous’ people – people like myself. At the time, the first thing I remember saying in response to that was if my Government is actually going to call me a terrorist for fighting fascism, authoritarianism and Nazi’s, then you better damn well sure believe I’d at least do something to earn that sort of title/reputation. In that spirit I release this article, perhaps the single biggest guide to Anarchy you will ever find or see in one place.

** NOTE: To browse through the pdf’s (below) hover your mouse over the document and notice the up and down arrows to the lower left of the document, these will help you flip through them. You can also view the documents before you download them by clicking on the download link **

The Original Anarchists Cookbook:

Download: https://roguemedia.co/wp-content/uploads/2019/05/Anarchist_Cookbook.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/05/Anarchist_Cookbook.pdf”]

 

Recipes for Disaster – an Anarchists Cookbook:

Download: https://roguemedia.co/wp-content/uploads/2019/05/crimethinc.recipes.for_.disaster.an_.anarchist.cookbook.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/05/crimethinc.recipes.for_.disaster.an_.anarchist.cookbook.pdf” title=”crimethinc.recipes.for.disaster.an.anarchist.cookbook”]

 

The Book of Dirty Tricks (CIA):

Download: https://roguemedia.co/wp-content/uploads/2019/11/Anarchist-Cookbook-CIA-Book-of-Dirty-Tricks.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/Anarchist-Cookbook-CIA-Book-of-Dirty-Tricks.pdf”]

 

The Anti-Fascists Handbook:

Download: https://roguemedia.co/wp-content/uploads/2019/11/Antifa-The-Anti-Fascist-Handbook.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/Antifa-The-Anti-Fascist-Handbook.pdf” title=”Antifa, The Anti-Fascist Handbook”]

 

The Terrorists Handbook:

Download: https://roguemedia.co/wp-content/uploads/2019/11/The_Terrorist_Handbook.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/The_Terrorist_Handbook.pdf”]

 

The Assassins Survival Guide:

Download: https://roguemedia.co/wp-content/uploads/2019/11/How-to-kill-Spy-Other-Survival-Skills.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/How-to-kill-Spy-Other-Survival-Skills.pdf”]

 

Improvised Sabotage Devices (CIA):

Download: https://roguemedia.co/wp-content/uploads/2019/11/CIA-improvisoidut-tekniikat.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/CIA-improvisoidut-tekniikat.pdf”]

 

Bombs You Can Make In The Kitchen:

Download: https://roguemedia.co/wp-content/uploads/2019/11/Kitchen_Improvised_Fertilizer.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/Kitchen_Improvised_Fertilizer.pdf”]

 

Middle East Bomb Making:

Download: https://roguemedia.co/wp-content/uploads/2019/11/Terrorist_Bomb.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/Terrorist_Bomb.pdf”]

 

Improvised Land Mines:

Download: https://roguemedia.co/wp-content/uploads/2019/11/Land_Mine.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/Land_Mine.pdf”]

 

Do It Yourself, Sub-Machine Gunning:

Download: https://roguemedia.co/wp-content/uploads/2019/11/A_Do-It-Yourself_Submachine_Gun__Its_Ho_-_Gerard_Metral.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/A_Do-It-Yourself_Submachine_Gun__Its_Ho_-_Gerard_Metral.pdf”]

 

Homemade Guns & Ammo:

Download: https://roguemedia.co/wp-content/uploads/2019/11/Homemade-Guns-Homemade-Ammo.pdf

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/Homemade-Guns-Homemade-Ammo.pdf” title=”Homemade Guns & Homemade Ammo”]

 

Car Jacking Tutorials (DarkNet): http://www.wdsxj2ukzyjtkg6agjtnclhz2aoasxa3vgwtqgjkdgfp7pod37jw6bad.onion/section.php?page=files/carjackingfiles

Only in a world this stupid, corrupt and ignorant can those those with knowledge fighting against fascism be considered “Terrorists.” You are the reason why we all say “fuck society.” My regards to Mr. Trump……..

Anonymous Italia Promotes Million Mask March & Fights for Climate w/ Hack/Leak of 5 Institutions Across Italy

Just this evening, November 3rd 2019, my Anti-Fascist friends over at “CyberGuerrilla Anonymous Nexus” and “Anonymous Italia” announced a massive round of hacks and leaks targeting agriculture companies and organizations not doing their part to help fight back against climate change not just in their county, Italy, but all around the world as well. Despite most of their leaks stemming in conjunction with “Operation Green Rights” (#OpGreenRights), this time, Anonymous Italia actually released the data to celebrate this years upcoming Million Mask March (MMM) – helping to raise more awareness ahead of it on November 5th.

Message from the Hackers

Hello Italians, this press release is from Anonymous Italy.

Today we have decided to make ourselves known to those institutions of our country, which should be the first to inform us and fight against our farmers and artisans against climate change, by starting to use different methods of more organic farming without preservatives and/or products harmful to both the environment, the flora and fauna of our country.

But not only this! The whole world is now aware of the environmental problem of our planet, demonstrations of millions of people have been held and are held to try to sensitize our Governments whom ignore the imminent danger here, instead interested only in profit and their own well-being, never interested to what according to them is a problem only for the people.

Studies done by great scientists easily found online have made it clear, we are killing our planet and little or nothing is being done to curb this genocide of nature and man. The posted data reveal the very little or even lack of security in the infrastructure of our country, and once again our privacy is not taken into account at all. Sabatoged to use a simple encryption of passwords, or even more simply not informed against using passwords like the ones you can see below.

But don’t worry !!
We are the terrorists, criminals, outlaws !!

We are Anonymous
We are Legion
We do not Forgive
We do not Forget
Expect Us!

All Leaked Data:

Target: hxxp: confagricolturapiemonte.com
About: The Regional Federation of Farmers of Piedmont is the territorial branch of Confagricoltura (the General Confederation of Italian Agriculture), the oldest agricultural organization in Italy whose origin dates back to 1895.
Dump: Admin password in the clear
Raw Leak: https://privatebin.net/?2ebaae23a34ee559#BXKWvMvWK37qyvXjmmiwT8NwUBTQapcvpciq94CnCTze

Target: hxxp://codima.info
About:CO.DI.MA. CONDIFESA Mantova-Cremon – the Agricultural defense consortium. Agricultural insurance with public contributions.
Dump: 800+ subscribers, emails, clear passwords. Hacked and Defaced
Raw Leak: https://privatebin.net/?ef3316378ab3345f#E9kg9mHwbyebdUFwuJgGwEK7M3oQy3URBBHXu6wQsPDV

Target: hxxp://periti-industriali.rieti.it
About: Industrial experts, L’INI-PEC is a portal created and managed by info Rooms and is divided into two sections called ‘Business Section’ and ‘Professional Section’ respectively.
Dump: users, emails, clear passwords
Raw Leak: https://privatebin.net/?4160f625ff10bc8a#EU4wVXZE2iBjEF2jUvWbZnpdPaCqGapzCTCWeKvhjrwm

Target: hxxp://agrotecnicipiemonte.it
About: Colleges of Agricultural Technicians and Agricultural Technicians Graduates of Piedmont and Valle d’Aosta
Dump: admin, users, clear passwords
Raw Leak: https://privatebin.net/?47382f87beb8b8b2#HC3ZPf4eUuNNtfZ4Aoj4hSYRafVjg7XcjwJKbZ2fF4ot

Target: hxxp://agrotecnicicuneo.it
About: Provincial College of Agricultural Technicians and Agricultural Technicians Graduates of Cuneo
Dump: users, emails, clear passwords
Raw Leak: https://privatebin.net/?90f17654fd13550c#Dhd6GqyStJCuhAsULLVxvBofi8mXjzD9Vo83VL6beohX

Target: hxxp://ebiter.fvg.it
About: Ebiter (tourism trade services fvg)- Bilateral trade and tourism agency Friuli
Dump: users, passwords
Raw Leak: https://privatebin.net/?48d5bb255bee8fe8#DQ5VmB1w4CKqaiSHU725b6uREncWZa66Jv5m68vVCCBA

CgAn – Rogue Media: Introductory Guide To DarkNet’s

The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide. It is a network of networks that consists of private, public, academic, business, and government networks.

The 3 Layers of The Internet:

ClearNet. The “World Wide Web,Surface Web, ClearNet or simply referred to as the Web. Quite simply, the Surface Web refers to the portion of the internet only accessible by standard search engines – such as Yahoo, Bing and Google. While Google search results may feel endless at times and while you might think of them as being quite large in size, in reality, the Surface Web only consists of roughly 7% of the combined browse-able/accessible internet. Typically, it’s used for Email, Fax, File sharing, File transfer, Games, Instant messaging, Podcasts, Voice over IP, Searches, Streaming – etc.

Deep Web. The “Deep Web,” invisible web, or hidden web are parts of the World Wide Web whose contents aren’t indexed by standard search engines – for any reason. Rather, the content is hidden behind HTML forms, Javascript and custom code to protect it from the public eye. Generally speaking, the Deep Web is host to roughly 92% of anything which can be found on the internet. Typically, the Deep Web consists of information such as web archives, scholarly articles/resources and network databases such as cloud servers. While this isn’t the case 100% of the time, you usually also need a 3rd party software system, such as the “Tor Browser,” in order to access at least some of its content as well.

To describe how it works, think about all of the web pages you can visit on your bank accounts homepage or email account. While all of those sites, links, addresses and emails technically exist on the internet, and while you can still search Google for Bank of America‘s website, this doesn’t mean you can search Google for the web pages associated with each Bank of America’s customers accounts. Nor can you search Google to find everyone elses emails hosted on Gmail – get it? Those web archives still exist on the internet all the same as their homepages, but are not indexed on the Surface Web to be publicly available – which is why we say they exist on the Deep Web, below the normal surface layer of the internet.

DarkNet. While the Deep Web is in reference to any site that cannot be accessed through traditional search engines, the “DarkNet” or “Dark Web” is a small portion of the Deep Web that has been intentionally hidden to hide in plain site, and is completely inaccessible via standard browsers and search methods. The DarkNet is by far the smallest layer of the Internet, estimated to consist of less than 40,000 websites in total – less than 1% of the browse-able internet.

Not only will you need to install a special type of software to access a DarkNet website, but the URL Address associated with it will almost certainly be encrypted with a randomized sequence of numbers and letters – literally making it impossible to find or type in by accident. Instead, you must know exactly what this sequence is – usually from someone else who already knows or has it. Even then, once there, you will also most likely need to enter a custom password in order to enter – making it virtually impossible to browse any DarkNet webpage without the proper permission.

As explained by CyberGuerrilla, DarkNet websites don’t rely on the IP/DNS system (typing mysite.org in a web browser will take you to an IP address like 10.11.12.13). Darknet websites are accessible only through networks such as Tor “The Onion Router” and I2PInvisible Internet Project” and their respective software. Identities and locations of DarkNet users stay anonymous and cannot be tracked due to the layered encryption system. The DarkNet encryption technology routes users’ data through a large number of intermediate servers, which protects the users’ identity and guarantees anonymity. Due to the high level of encryption, websites are not able to track geo-location and IP of their users, and users are not able to get this information about the host; communication between DarkNet users is highly encrypted allowing users to talk, blog, and share files confidentially.

The DarkNet is also used for illegal activity such as illegal trade, forums, and media exchange, making it a prime target for Law Enforcement Agencies around the world. The 2 main DarkNet‘s networks are TOR (The Onion Router) and I2P ( Invisible Internet Project). While Tor focuses on providing anonymous access to the Internet, I2P specializes on allowing “anonymous” hosting of websites called “Eepsites.

Active Darknets worth mentioning:

Freenet is a peer-to-peer platform for censorship-resistant communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web without fear of censorship
GNUnet another peer-to-peer network that offers users full link encryption.

Decentralized network 42 (not for anonymity but research purposes)

Syndie is software used to publish distributed forums over the anonymous networks of I2P, Tor and Freenet.

Riffle is a client-server Darknet system that provides secure anonymity and minimal bandwidth

Tor Browser and Tor-accessible sites are widely used among the Darknet users and can be identified by the domain (.onion). Servers configured to receive inbound connections only through Tor are called hidden services. Rather than revealing a server’s IP address (and thus its network location), a hidden service is accessed through its onion address,

The TOR Network works by bouncing your communications around a distributed network of relays (nodes) run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

Tor passes your traffic through at least 3 different servers before sending it on to the destination. Encrypting your packets and bouncing them around the Internet isn’t cost less. All that extra work means that browsing the Web via Tor feels sluggish compared to using a conventional browser. Tor is not meant to completely solve the issue of anonymity on the web and is not designed to completely erase tracks but instead to reduce the likelihood for sites to trace actions and data back to the user. Users are also warned to use https versions of websites, not to use Tor over Tor, not to torrent with Tor, not to enable browser plugins, not to open documents downloaded through Tor while online, and to use safe bridges. Also, Bittorrent over Tor is not anonymous.

References:

https://en.wikipedia.org/wiki/Internet
https://en.wikipedia.org/wiki/Dark_web
https://en.wikipedia.org/wiki/I2P
https://en.wikipedia.org/wiki/Tor_(anonymity_network)

Software:

The FreeNet Project: https://freenetproject.org/pages/download.html
The Tor Project: https://www.torproject.org/
I2P: https://geti2p.net/en/download

Projects Using TOR:

Tor Browser: https://www.torproject.org/projects/torbrowser.html.en – comes with a pre-configured web browser to protect your anonymity, and is self-contained (portable)

TAILS Operating System (Linux): https://tails.boum.org/about/index.en.html – Tails is a live system that aims to preserve your privacy and anonymity

Whonix Operating Systems (Linux): https://www.whonix.org/ – Whonix is a Debian GNU/Linux based security-focused Linux distribution. It aims to provide privacy, security and anonymity on the internet

Orbot (Tor for Android OS’s): https://guardianproject.info/apps/orbot/

Warnings:

Some links may be disturbing and dangerous to visit.

To avoid be tracked or watched online, I strongly recommend you to run a VPN service on the system that you access. VPN will give you a double layer protection against the unknown.

** DISCLAIMER: BEFORE YOU ACCESS THESE LINKS YOU SHOULD UNDERSTAND THAT SOME CONTENT PROVIDED ON THESE DEEP WEB LINKS MIGHT BE DISTURBING, UNPLEASANT OR FRAUDULENT. VISIT THEM AT YOUR OWN RISK. WE RECOMMEND TO USE THOSE DEEP WEB LINKS ONLY FOR RESEARCHING PURPOSES! WE ARE NOT RESPONSIBLE FOR ANY DAMAGE CAUSED BY YOUR ACTIONS! **

Some Popular TOR .onion Sites:

http://hss3uro2hsxfogfq.onion/ (notEvil search engine)
http://xmh57jrzrnw6insl.onion/ (TORCH search engine)
http://uhwikih256ynt57t.onion/wiki/index.php/Main_Page (Uncensored Hidden Wiki onion link)
http://answerstedhctbek.onion/ (uncensored General-subject Q&A forum)
http://torvps7kzis5ujfz.onion/ (VPSSHell .onion hosting)
http://grrmailb3fxpjbwm.onion/ (TorGuerrillaMail – Disposable Temporary E-Mail Address)
https://protonirockerxow.onion/ (Fully encrypted email hosted in Switzerland offering free accounts)

Clearnet HTTPS signup & JavaScript! Must pay or verify via previously existing email or SMS to get an account

http://nzh3fv6jc6jskki3.onion/ – Riseup provides online communication tools for people and groups working on liberatory social change
http://tetatl6umgbmtv27.onion/ (Tor Chat roulette style service)
http://6dvj6v5imhny3anf.onion/ (CyberGuerrilla leAkboX)
http://76qugh5bey5gum7l.onion/status.xsl (Deep Web Radio)
http://deepdot35wvmeyd5.onion (DeepDotWeb -Surfacing the News)
http://grams7enufi7jmdl.onion (Search Grams)
http://kpynyvym6xqi7wz2.onion main.paraZite (Anarchy files and Underground)
http://valhallaxmn3fydu.onion (Valhalla Market)
http://silkkitiehdg5mug.onion (Silkkitie Market)
http://lchudifyeqm4ldjj.onion (Dream Market Dark Web Market)

Some I2P:

http://direct.i2p/ (Direct Search)
http://forum.i2p (Main i2p Forum)
http://imgbi.i2p img.bi (Secure Image Hosting)
http://pastethis.i2p/ (Pastebin)
http://zerobin.i2p (ZeroBin)
http://git.repo.i2p/ (Anonymous Git Hosting)
http://freedomforum.i2p/ (Privacy Forum)
http://leakager.i2p/ (A Cat’s Mirror of Wikileak)

General Chatter Putting In Perspective:

[Mink] oh, then go go go
[Mink] right, today we are going to talk about Darnets and TOR in particoular
[Mink] *darknets
[Mink] i made few notes to read to get us started
[Mink] https://pad.riseup.net/p/r.50b7831a5a3e919781433e4819976169
[Chanlog] Title: Riseup Pad (at pad.riseup.net)
[Mink] please, wait 10 minutes before starting to ask questions
[Aspire] ok
[n1ck1] yeah
[Mink] i’ll just write few points here while you read
[Mink] the Internet is big, really big
[Mink] what we think of the internet are webpages, blogs, email, instant messaging, webradio, voip (like skype) etc
[Mink] most of those services use the tcp/ip protocol to connect the resouces together
[amoruxX] When do we start ?
[RedAcor] Already started.
[Mink] oh amoruxX , we just did
[Mink] fundamental to make the internet work is the IP/dns concept, where a number (like 176.23.98) gets translated to a name (like mysite.com) and back
[Mink] this makes these resources available to the public and available to Search Engines (like google and yahoo)
[Mink] once a new website name is registered, a IP address is assigned to it
[Mink] this is what most people call “the internet” but there is much more
[Mink] there is a part most people will never see
[Mink] it is hidden on purpose
[B[U]G] where the address is assigned by your isp Internet Provider Service , where are two ip address ( public ) and ( local ) with mask subnet and principal gateway , the public have han UDP connetion to the internet call other service and TCP have an entrance connection to localhost
[Mink] imagine big companies networks, government agencies, or really anyone that doesn’t want their site or resources been indexed by search engines
[Mink] that we will call “DARKNET” or hidden web
[Mink] sorry “deepweb”
[Mink] :”)
[Mink] deepweb/invisible/hidden, basically not available to the public
[Mink] unless you have a login/password or a very precise address
[Mink] the deepweb is the biggest part of the internet
[B[U]G] This is because it is not possible to search through a search engine because each address is generated randomly
[Mink] in the deepweb, there is a small portion that we can only see with “special software”
[Mink] that we will call “darknet”
[Mink] for today we will talk about the main Darknet networ, the TOR (onion) network
[Mink] with TOR software (like torbrowser) we can access the normal web AND the onion network
[Mink] onion sites end with .onion and use different protocols from the norm
[Mink] the TOR network anonimize both the user and the server, automatically
[Mink] as a user, your traffic will pass trough at least 3 different servers, before reaching the target site
[n1ck1] what are the names of the different protocols for me to look for later?
[B[U]G] thanks to a connection called “onion”, by most users who share the relay
[Mink] sock
[B[U]G] “cipolla”
[n1ck1] ok tks
[n1ck1] I need t reed more about socks
[Mink] all the traffic from those servers (called “nodes” or “relay nodes” is encrypted
[Mink] making using the tor network slower than normal
[Mink] surfing the web is the main use of TOR, but it can be used to send/receive mail, IRC (like i’nm doing right now) or even voip (IF YOU CAN GET A FAST CONNECTION
[Aeolus] you can voip through tor?
[Mink] yes, with a bit of luck
[Aeolus] cool, didnt know that
[Mink] TOR can be used pretty much like any other proxy
[Mink] u could plug it in Thunderbird for emails
[Mink] in Hexchat for IRC
[B[U]G] using the gpg encryption with thunderbird or claws mail for more security
[Mink] in Mozilla for ftp, etc
[n1ck1] voip + “proxuchains firefox(TOR)”
[n1ck1] three at a time, using a VPN to open the terminal with the configured proxychains and run the TOR browser??
[Arkhangel] why with torrent no, p2p
[Arkhangel] ?
[n1ck1] VPN….voip=error
[Mink] no, but you can use vpn+TOR
[Aeolus] like me
[n1ck1] why not proxychains too?
[n1ck1] tor first or VPN first?
[B[U]G] proxychains is a simple script
[Aeolus] vpn then tor
[Aeolus] for me
[B[U]G] tht filter tor
[Aeolus] others prefer elseway
[Mink] Bittorrent over Tor is not anonymous, becouse needs to aware of other seeds/leecher sharing the files
[B[U]G] you can use for launch any application
[l0t3D_] what difference does it make
[Mink] also would put too much stress on the network
[Arkhangel] Aeolus, if someone uses TOR then VPN, I dont think he can access to onion network xD
[l0t3D_] Mink how do you even Bittorrent over tor?
[Mink] so p2p with TOR: possible, but really a waste of time
[n1ck1] yeah…rsrsrs I see
[B[U]G] l0t3D_, set tor as proxy socks
[B[U]G] or http
[B[U]G] (client)
[B[U]G] or generate
[Mink] again, it’s just possible to plug TOR port in your client
[B[U]G] iptables rules
[n1ck1] VPN + TOR is the best right?
[Mink] yes n1ck1
[Arkhangel] Mink do u mean that seeders/leechers should know your real IP?
[B[U]G] the best configuration are , tor – vpn – tor ,
[Mink] but now.. the bad part
[Aeolus] Arkhangel i used to be able to do that especially with my whonix settings
[l0t3D_] so to “torrent over tor” you need to plug TOR into my bittorent client
[Aeolus] i talk about normal browsing when you want to use tor as an extra layer
[Arkhangel] Aeolus U think that the best configuration is the config shown by B[U]G XD
[l0t3D_] but if i torrent normally and TOR is running that’s okay right?
[Mink] yes Arkhangel ,serius bitorrent users should use proxies or VPNs , not TOR
[Aeolus] Arkhangel xD
[Mink] yes l0t3D_
[l0t3D_] okay
[Arkhangel] what is the bad part? Mink
[Mink] ok, let me make one more point, then u free to ask questionbs
[Mink] right, bad part is TOR is not perfect
[n1ck1] a few days ago they tracked the IP of many users
[Mink] and it’s been under scrutiny for vulnerabilies for years
[Arkhangel] I think* (I wrong to write before lol)
[Mink] “”Tor is not meant to completely solve the issue of anonymity on the web and is not designed to completely erase tracks but instead to reduce the likelihood for sites to trace actions and data back to the user””
[Mink] there are ways and attacks to “deanonimize” a small portion of TOR users
[n1ck1] how?
[B[U]G] for example
[Aeolus] like FBI running nodes
[B[U]G] a plugin
[Aeolus] 😀
[B[U]G] in browser
[B[U]G] you can deanonymize you
[Mink] ” Users are also warned to use https versions of websites, not to use Tor over Tor, not to torrent with Tor, not to enable browser plugins, not to open documents downloaded through Tor while online, and to use safe bridges.”
[Arkhangel] why?
[B[U]G] by an javascript exploit
[Arkhangel] how a plugin can do this?
[l0t3D_] Aeolus do they?
[Aeolus] yes ofc they do
[B[U]G] or you find it on an exit node,
[Arkhangel] a javascript exploit that affects the TOR software or the plugin itself?
[Mink] the NSA is known to have run TOR “nodes” , also known as a man-in-the-middle attack
[n1ck1] TOR over TOR?
[l0t3D_] Tor over Tor? Mink
[Mink] never tor-over-tor
[l0t3D_] hahaha n1ck1
[l0t3D_] how do you even TOR over TOR
[n1ck1] so far so goof rsrsrs
[Mink] that would be running 2 instances of TOR
[Arkhangel] in which manner TOR over TOR can make u not anon?
[l0t3D_] Mink tor stops you from doing that
[n1ck1] like in the real machine and the VM use TOR?
[B[U]G] sure
[Mink] it’s like an internal thing, the “relay” will just not work, 2 likely result, no traffic go trogh, or worse no encryption between the relays
[Arkhangel] lol
[n1ck1] I’m going to print this
[Mink] if you don’t like the 3 “hops” of a standard TOR connection, you can ofcourse increase it
[forceMajeure] the problem with using tor to browse is that 99 out of 100 people will deanonymize themselves by accident without ever realizing it. User error
[Arkhangel] n1ck1 this lesson will be printed later
[Arkhangel] n1ck1 u can access it on the site of cg
[B[U]G] you can use a gateway into your vm as whonix , then use a vpn on you local machine host , and reuse tor setting of your vm gateway
[Mink] ok, now, to cover my ass
[n1ck1] ok thanks Arkhangel
[Mink] WARNING: BEFORE YOU ACCESS THESE LINKS YOU SHOULD UNDERSTAND THAT SOME CONTENT PROVIDED ON THESE DEEP WEB LINKS MIGHT BE DISTURBING, UNPLEASANT OR FRAUDULENT.
[Mink] VISIT THEM AT YOUR OWN RISK.
[Arkhangel] forceMajeure how an user can realize it?
[n1ck1] ok….send please
[Mink] you can see from the list at the bottom of the pad
[Mink] there is a bit of everything
[Mink] email services, blogs, forums, chats
[forceMajeure] lets say you visit your own website, log into ANY account associated with your real identity, attack a cpu of someone you know, just little things
[Arkhangel] forceMajeure and what are the user errors that bring the user to be deanonymized?
[Aeolus] use tor to log to FB
[forceMajeure] look up
[Mink] of course all end in .onion, and using a normal browser won’t work
[Aeolus] something stupid like that
[Arkhangel] forceMajeure ah ok… this should answer to my second question
[forceMajeure] turn on js to access a site, etc.
[Arkhangel] ty
[Arkhangel] forceMajeure why if I use js to access a site, I m not anon anymore? js stores my real IP over TOR?
[Mink] remember, and this is for clearnet aswell, your browser is the single most dangerous point of failure
[forceMajeure] if the site is compromised, someone can use something like burp to insert a malicios js
[forceMajeure] they did it at defcon years ago
[forceMajeure] you should always be using noscript
[Mink] ok, questions, and please let me answer first before giving your opinion
* Aeolus agrees with Mink
[Arkhangel] forceMajeure so if I am on TOR network, if I go on a onion malicious website and I click where I have to not click, this malicious js can decrypt the routing information to get my real IP?
[Mink] yes Arkhangel
[Arkhangel] lol
[forceMajeure] ))
[n1ck1] Is it set by default to accept or reject scripts?
[Arkhangel] sorry but, at this point
[n1ck1] TOR Browser
* Aeolus thinks we all tell shit and not let Mink who knows educate us
[Arkhangel] why didnt they do a strong encryption?
[Arkhangel] that cannot be decrypted?
[Arkhangel] like
[Mink] even worse, it can inject code into your browser, activate your webcam and mic, take screen shots and much more, no kidding
[forceMajeure] true story
[Arkhangel] not inverse hash algorithms
[Arkhangel] not invertible*
[Mink] nothing to do with encryption, JS runs on your computer, not the server
[Arkhangel] Mink if I click on a js hosted on an onion website, it runs on my pc?
[B[U]G] depends
[B[U]G] you can
[Mink] not only .onion
[B[U]G] disable flash/javascript
[Aeolus] js runs client-side
[B[U]G] and disable WebRTC leak
[B[U]G] on you browser settings
[Arkhangel] good to know XD
[Arkhangel] y
[Arkhangel] I have other different questions
[Mink] ok
[Arkhangel] the onion websites store the (false) IP of each user accessing to it?
[Mink] no
[m00trix] Let’s just agree on that TOR is great. If used out of the “box” the TOR Browser will in most cases keep you safe. If you decide to disable or allow sites through the build in TOR Browser plugins, you are taking a risk that not even TOR, nor any other level of anon tools can protect you from.
[RedAcor] For webrtc settings: https://www.privacytools.io/#webrtc
[Chanlog] Title: Privacy Tools – Encryption Against Global Mass Surveillance (at www.privacytools.io)
[B[U]G] or simply edit your about:config asd
[Arkhangel] Mink, if today TOR gives me a certain IP address, tomorrow or after a month, another user of another part of the world can be assigned to that same IP?
[B[U]G] to http.refer and media.peer connection
[m00trix] Arkhangel, yes that is the hole point…
[Mink] the TOR network will not need your IP address, the danger of that comes from javascript/ajax/bad code
[B[U]G] how all – all store a log , depends if the owner delete it
[Arkhangel] m00trix why “hole point”?
[m00trix] yea
[m00trix] if 200 users on that exit node
[m00trix] with the same “ip”
[B[U]G] but the node change every time
[m00trix] you get plausible deniability
[Arkhangel] is it a problem if an IP assigned by TOR is used in the future by another user?
[m00trix] no
[m00trix] its a bonus
[Arkhangel] ah ok xD
[Mink] again, TOR will not give you an IP address, but an “identity”
[m00trix] yea Mink
[Arkhangel] Ok Mink so that “IP” address does not work on IP protocol?
[m00trix] I think he means when using the browser, it tells the exit nodes ip
[m00trix] 🙂
[Arkhangel] yes, in practice
[l0t3D_] okay so if i have scripts disabled globally but lets say i enable it only on youtube to play a video
[n1ck1] how many connections can a node make with the same IP
[Mink] yes Arkhangel , TOR architecture does not use the same IP ]DNS as normal internet
[m00trix] that IP is your source proxy IP when browsing trough the TOR browser
[m00trix] or using any service to proxy through it
[n1ck1] and how many users can be on the node at the same time?
[l0t3D_] could another malicious website use that youtube tab to attack me?
[Mink] when a new .onion site is created it doesn’t get a IP address, but a .omnion address
[n1ck1] sorry…. my mistake
[n1ck1] but a node can handle how many requests?
[n1ck1] and perform how many for another node?
[B[U]G] all it’s possible this it happens if youtube link it’s embedded in page builded ad hoc
[m00trix] Mink, still, when you use the TOR Browser, it will tell you what the exit nodes IP is when you start it. That exit node IP is also the source of the browser requests you make and the source of any program you proxy trough it
[Arkhangel] Mink in practice you are saying that, unlike normal internet where a service like a website is on the 3rd level (IP level ISO/OSI), the onion network is completely on the 7th level (application level) of the
[Mink] ok, to spend those few minutes: TOR isn’t the only darknet network
[Arkhangel] ISO/OSI?
[m00trix] okay stop
[l0t3D_] if it’s a normal youtube link i opened myself B[U]G?
[Mink] wot?
[B[U]G] depends if in source
[B[U]G] a function
[B[U]G] call
[m00trix] When you are using the TOR browser, to go on midgetporn.org or whatever. Midgetporn.org will see your source IP as the exit nodes public IP
[B[U]G] a malicious “file”
[B[U]G] or host
[m00trix] simple as that
[Aeolus] guys thanks for today info. i suppose logs will be up later so i can read again, got to go.
[Aeolus] good work Mink thx 🙂
[Mink] you welcome Aeolus
[Arkhangel] in practice m00trix your machine is overlapped on the exit node
[l0t3D_] but if there is nothing in this source but there is a malicious “file” in another tab i have opened in the same time but I have no scripts enabled?
[m00trix] fire up the TOR browser, and press the “test tor…” thingy
[forceMajeure] Is it possible for tor to assign you a new circuit while an existing connection is still established say through a python script ran through port 9050
[B[U]G] for example : [script src=”DownloadThisEvilCode.js”/] [iframe]youtube embedd[/iframe]
[Mink] Arkhangel, , you want to rephase your question?
[B[U]G] afk
[forceMajeure] thus severing the connection
[m00trix] any site that want’s to can see the visitors source IP – and with TOR browser, that source IP is the IP of the current exit node your are on.
[Arkhangel] Mink, about the https://en.wikipedia.org/wiki/OSI_model
[Chanlog] Title: OSI model – Wikipedia (at en.wikipedia.org)
[m00trix] really pretty simple
[m00trix] jesus
[Mink] yes forceMajeure , not only possible, but advisable, tor will change nodes randomly to add anonimity
[Mink] Arkhangel, i know the OSi model :/
[forceMajeure] but what happens to the connection that was established before the circuit changes
[Arkhangel] Mink, if the normal websites have associated IP
[forceMajeure] is it passed into the new connection
[Arkhangel] so the 3rd level of OSI model
[Arkhangel] the onion network, since it does not have IP, it is completely on the application level of OSI model?
[m00trix] no
[forceMajeure] I guess I could see what happens by sending newnym to 9051 I just thought of that
[Arkhangel] since it does not have IP ( i mean the onion websites)
[Mink] no Arkhangel
[m00trix] you need to not compare hosting an onion site with using the TOR browser
[Mink] lets’ amke it clear TOR and TORbrowser are 2 different things
[Arkhangel] y
[m00trix] I think Mink covered all the questions really good already
[Arkhangel] in the pad
[Mink] torbrowser connects to tor
[Arkhangel] it talks about the Freenet platform
[Mink] yes?
[Arkhangel] continue xD I was thinking u finished to answer my prev question xD
[Arkhangel] ok so torbroweser, application level, connects to TOR network
[Mink] yes, trough socks
[Arkhangel] socks is an application protocol?
[Mink] taht’s 5 i think
[Arkhangel] ah ok
[m00trix] Arkhangel, you need to unleash your mind from that OSI layer shit 😀
[Arkhangel] ahahahah
[Arkhangel] ok xD
[n1ck1] socks is a protocol right? the TOR Browser is the application?
[Arkhangel] y
[Mink] yes n1ck1 , but it’s easy to confuse “an application(like a program) and the “application layer” of the stack
[Mink] so yes
[Arkhangel] tell me when I can continue with another question
[m00trix] Arkhangel, if you fire up a VM with like parrotsec.org OS – It have a build in function that routes all traffic through TOR. There are other distros that does this as well. But any way, if you do that, you can look into how the traffic flows using the terminal – when all traffic is routed using TOR. Might give you more insight
[l0t3D_] i dont know if this is related to this lesson or not but what are Obfuscated servers?
[l0t3D_] or “obfs”
[Arkhangel] m00trix traceroute?
[forceMajeure] lsof -i -n -P
[m00trix] well for a start heh
[m00trix] and many more
[Arkhangel] ah ok
[m00trix] but it will show you the traffic flow
[Arkhangel] nice to know
[Mink] one thing i wanted to talk about, but we have no time, whonix
[Arkhangel] another doubt is: since ISP knows what I am visiting as website, if I access to an onion website, my ISP can know it?
[vivek] m00trix: you can achieve the same with almost any distro
[m00trix] and if there are like 200 others using the same exit node that you are on, for that current TOR connection – it’s all good.
[m00trix] vivek, I know
[Mink] the ISP will know you are using TOR, but not which sites you are visiting
[Arkhangel] Mink the ISP cannot know the onion address?
[m00trix] no
[vivek] Parrot one is highly unstable and my exp. Was not very good
[m00trix] And if you combine TOR with an OpenVPN on port 443 then even less
[Arkhangel] Mink it because ISP can see destination IP but onion website are not based on IP scheme? this is the reason?
[Arkhangel] or one of the reasons
[m00trix] vivek, I only have a VM with it. But yes, it’s Debian aka unstable heh
[Mink] no Arkhangel , unless the ISp is running the last TOR exit node
[Arkhangel] normally, an ISP in the clearnet precisely what can see from me? Only the IP of website that I am visiting?
[m00trix] Arkhangel, your ISP cant see what sites your are browsing trough TOR
[l0t3D_] [l0t3D_] i dont know if this is related to this lesson or not but what are Obfuscated servers?
[l0t3D_] [l0t3D_] or “obfs”
[m00trix] all your DNS lookups and what you are doing
[m00trix] if you use the ISP’s dns servers
[Mink] in clearnet, your IS know your favourite pornhub page
[Arkhangel] guys so the ISP can read only the DNS lookup table inside the router?
[m00trix] they can see all, but not https login data
[l0t3D_] lol
[Arkhangel] ah ok
[Mink] sorry l0t3D_ , obfuscated are another kinfd of “relay nodes” to help tranport info
[m00trix] Arkhangel, if you use the DNS servers provided by the ISP you have. They can see what sites you visit, the IP of the sites, what traffic you generate, they can see close to anything
[l0t3D_] obfuscated servers are used to access vpn or tor in some places like the great firewall of china?
[Arkhangel] cannot I change the DNS server where I want to go?
[Mink] yes l0t3D_ , and Iran and N korea
[l0t3D_] well i think ill be up on that list soon too
[Arkhangel] provided by other companies?
[m00trix] If you change the DNS servers on your router to some that does not log and are not your ISP’s. They loose the ability to view your DNS req
[l0t3D_] thath’s the only way i can access tor or vpn
[m00trix] next step is then, VPN and TOR
[Arkhangel] m00trix so you mean that then internet in my location does not work lol
[l0t3D_] makes the connection very f’in slow tho
[m00trix] I would advice any one to NOT use the default ISP provided DNS servers as a pure basic step
[m00trix] should be the first step you do on the router
[Mink] l0t3D_, remember for help with anonimity and privacy you can always ask in #opnewblood, we will be happy to help with that
[Arkhangel] m00trix how can we do this?
[m00trix] set WAN DNS to manual and find some good non logging DNS
[Arkhangel] do u know some non logging DNS?
[m00trix] Arkhangel, depends on what router you have
[m00trix] sure
[l0t3D_] thanks Mink
[m00trix] Also you will get arround of most censorship
[m00trix] by stat step alone
[Arkhangel] can you list some of them here?
[m00trix] gov dns blocks
[m00trix] I switch it up
[m00trix] but run
[m00trix] https://blog.uncensoreddns.org/
[l0t3D_] should i call them and ask them nicely to change my DNS? 🙂
[m00trix] some places
[Arkhangel] ty
[m00trix] just login to your router
[m00trix] and change it
[m00trix] if in doubt give me a priv
[Arkhangel] ty very much
[l0t3D_] WAN settings right?
[m00trix] yea
[m00trix] and then
[m00trix] set DNS do manual
[m00trix] not the IP 😀
[m00trix] only dns
[Arkhangel] another question: the pad talks about the freenet platform… is it a software to be installed on my computer?
[Mink] yes Arkhangel
[m00trix] l0t3D_, priv me if you need help
[Arkhangel] what is the difference between freenet platform sw and tor bundle sw?
[m00trix] If I run with my basic ISP DNS servers sites like http://1337x.to/ are blocked 🙂 a torrent site. Gov block
[Chanlog] Title: Torrent Search Engine | 1337x.to (at 1337x.to)
[n1ck1] if I change my DNS the VOIP stops working in my house
[Arkhangel] or better: if torbrowser allows me to access to the tor network, freenet and other shown platforms on pad, what do they allow me to do?
[m00trix] wut n1ck1?
[m00trix] makes no sence
[n1ck1] my ISP has a separate physical VOIP phone but connected by cable to the router
[n1ck1] minha mae é velha e não sabe usar muitas tecnologias e o telefone é similar ao antigo porém funciona como VOIP
[n1ck1] sorry
[n1ck1] my mother is old and does not know how to use many technologies and the phone is similar to the old one but it works like VOIP
[n1ck1] if I switch to any other, VOIP does not work, it has been months of technical visits, tests, and unsolvable configurations.
[RedAcor] Set DNS on your network manager.
[RedAcor] So that will not affect your router.
[RedAcor] Also you can use unbound on your system.
[RedAcor] You can check lesson 4 logs for that.
[m00trix] yes
[m00trix] thx to Mink for a great course 🙂
[RedAcor] There many different and hybrid solutions.
[RedAcor] Anyways. Mink Thanks for delicious lesson. 🙂
[Arkhangel] guys is better vpn tor vpn tor or tor vpn tor?
[Arkhangel] is better starting with vpn or tor?
[n1ck1] YES
[n1ck1] This worked …. It’s simple but I had not thought of it.
[RedAcor] Arkhangel Tor VPN Tor
[Arkhangel] why starting with tor RedAcor?
[RedAcor] Some people use VPN ] VPN ] Tor also
[RedAcor] Because it is secure than VPN. jijiji
[n1ck1] tails pendrive, VPN, TOR, break everything later and throw it in the trash lol
[Arkhangel] instead, when I connect to tor network, when I reach the exit node, the IP of my computer is in clear there?
[RedAcor] If i talk about last bug of TOR: Nah.
[l0t3D_] 2 tor?
[m00trix] Arkhangel, really depends what you are doing also 🙂
[l0t3D_] [RedAcor] Arkhangel Tor VPN Tor
[n1ck1] RedAcor thanks for the DNS tip
[RedAcor] But they fixed that issue.
[RedAcor] n1ck1 You’re welcome.
[Arkhangel] to discover some user, agency like NSA what look for?
[Arkhangel] they use only their exit node and check for all users that go in, or they can know information also about exit node that are not theirs?
[m00trix] hard to say
[m00trix] you need to stop overthinking it
[Arkhangel] im afraid to forget these questions and these doubts xD
[m00trix] I get that bro. But I can’t answer you how the FEDS, CIA or NSA track people on TOR 🙂
[m00trix] or if they even can and with what success
[Arkhangel] dont worry. I have a last question: why tor works on SOCKS and not HTTP/HTTPS protocol?
[m00trix] Arkhangel, per design I think
[Arkhangel] in the network settings, for HTTP/HTTPS I cannot use the 9050 or 9150 port to use TOR, right?
[m00trix] network settings for what?
[m00trix] program
[Arkhangel] for example if you want to use a proxy on the system of the operating system
[m00trix] what OS Arkhangel
[m00trix] You want to route all traffic out through TOR
[Arkhangel] windows or linux-based
[Arkhangel] y
[Arkhangel] in that case for HTTP/HTTPS I cannot use port 9150
[Arkhangel] right?
[Aspire] i have to go bye all and thanks for the lesson
[Arkhangel] since SOCKS and HTTP/HTTPS talk different “languages”
[m00trix] Arkhangel, are you trying to run another browser through TOR?
[m00trix] what are you trying to do, that would help heh
[Arkhangel] no
[Arkhangel] I want to use just the normal browser with no opening torbrowser
[Arkhangel] but where I can surf on tor
[m00trix] you have to have the TOR Browser running to proxy the traffic
[m00trix] unless you run a plain tor from a terminal
[Arkhangel] exactly
[Arkhangel] on windows I should run tor browser
[m00trix] and there is a reason for why the TOR browser is at is is. And have the plugins it have
[m00trix] to protect you
[m00trix] you can do what you are trying to do, but even TOR warns against it
[Arkhangel] i know that torbrowser is better for that, but just for information, if I start torbrowser and I enable a proxy that route the data to the tor network by a normal browser, it is not a connection tor over tor right?
[m00trix] when you start the TOR browser, you can tell most programs yo use 127.0.0.1:9150 as a proxy and it will proxy over TOR
[m00trix] but on Windows, the TOR Browser needs to be running
[Arkhangel] exactly, so it is simple one tor connection, is not tor over tor, right?
[Arkhangel] in case of windows I mean
[m00trix] tor over tor?
[Arkhangel] y, since it s not a good idea running tor over tor, I would like to know if, on windows, open torbrowser and proxying the other programs to 127.0.0.1:9150 is not a tor over tor
[l0t3D_] alright thanks all for the lesson i need to go
[l0t3D_] bye
[n1ck1] no
[n1ck1] not is
[Arkhangel] ok ty
[Arkhangel] Im so sorry I forced everyone to run away
[n1ck1] you only configure that program to use this network
[n1ck1] ahsuhahsauhsauhusa
[Arkhangel] ahaha
[n1ck1] but use linux
[n1ck1] windows sucks
[Arkhangel] I use Linux, but I need to have all possible information
[n1ck1] try ubunto first, it is easy
[n1ck1] yes
[n1ck1] this is right
[Arkhangel] culture is power
[n1ck1] y
[n1ck1] tks all

How and Why To Re-Rout DNS Through Your Computer or Phone

In a few of my previous tutorials I briefly touch on DNS re-routing, but never really get into it in full details, so I figured why not here today? Before moving forward, learning to re-route your DNS is important because it is a means of protecting your personal data, devices, network connectivity and internet traffic away from the spying or prying eyes of your Internet Service Provider (ISP), Government and any other interested 3rd parties, such as advertisers or even hackers. As for how DNS works or how switching it effects your internet connectivity, I think the short video below is the best demonstration. It explains how DNS re-routing configures your computer or phone to connect through a DNS server first, in order to connect to a website second – instead of connecting to a server owned by your ISP to connect to that same website, get it?

While there are number of ways to re-route your DNS and different services providers to choose from, for the purposes of this article, I consider the following to be the worlds best “Top 3” – Cloudflare DNS, IBM Quad 9 and Google’s Public DNS. As you can read below, each of which have their own unique benefits.

Cloudflare DNS:

Ipv4: 1.1.1.1
Ipv6: 1.0.0.1
Ipv6: 2606:4700:4700::1111
Ipv6: 2606:4700:4700::1001

Cloudflare DNS is my personal DNS provider of choice, installed on both my computer and phone. As for why I choose them, this is because Cloudflare DNS anonymizes IP Addresses, deletes logs daily and doesn’t mine any user data. Additionally, Cloudlfare DNS also offers security features not available in many other public DNS service providers, such as “Query Name Minimization” – which diminishes privacy leakage by sending minimal query names to authoritative DNS servers when connecting to websites.

Learn More – Cloudflare DNS: https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/

IBM Quad 9:

Ipv4: 9.9.9.9
Ipv4: 149.112.112.112
Ipv6: 2620:fe::fe
Ipv6: 2620:fe::9

IBM Quad 9. Whereas Cloudflare may be more beneficial for activists and researchers, IBM Quad 9 on the other hand is probably of more benefit to your average home owner, parent or business owner. This is because Quad 9 routes your internet connections through DNS servers that actively blacklist known malicious websites, as well as websites which have previously been compromised by data breaches. In addition to this, Quad 9 servers also protect your internet’s incoming/outgoing connections as a means of preventing any of your devices from being caught up in a botnet. Quite simply, this means that while on Quad 9 servers, you never have to worry about any of your devices being hijacked or caught up in any sort of DDoS or crypto-mining campaigns, even smart devices connected to the “Internet of Things” (IoT).

Learn More – IBM Quad9: https://www.quad9.net/

Google Public DNS:

Ipv4: 8.8.8.8
Ipv4: 8.8.4.4
Ipv6: 2001:4860:4860::8888
Ipv6: 2001:4860:4860::8844

Google Public DNS servers on the other hand are ideal for people in countries such as Ethiopia, Sudan, Turkey, Syria, North Korea and the like which are all known to have restricted, censored, shut down and/or sealed off access to certain portions of their national internet in the past. In fact, as you can see via the picture provided below, activists affiliated with Anonymous Cyber Guerrilla have literally spray painted Google’s 8.8.8.8 DNS in public places in times of National crises as a means of raising awareness and alerting citizens how to bypass local internet restrictions imposed by their Government – opening people back up to the global world-wide-web. In addition to bypassing regional internet restrictions, compared to ISP’s in some 3rd world regions, switching to Google DNS servers might actually help improve or speed up your load time/internet connection.

Learn More – Google Public DNS: https://developers.google.com/speed/public-dns/

No photo description available.

 

How To Switch DNS On Windows?

1.) Go to the start menu and type in “Settings,” press enter and then select “Network & Internet” options

No photo description available.

 

2.) Click on “Change Adapter Options

Image may contain: text

 

3.) Select the “Internet Connection” your are using then click on the “Properties” button when it pops up

No photo description available.

 

4.) Scroll through and individually select/click on “Internet Protocol Version IPv4” and “Internet Protocol Version IPv6” then press the “Properties” button again

No photo description available.

 

5.) Select “Use The Following DNS Server Address” and manually enter in your DNS service provider of choice – see IPv4 and IPv6 Addresses above – then press “OK

No photo description available.

 

That’s it, really. Generally speaking, the setup should be the same on your Apple PC just as well. It’s also important to note that you can actually do a mix-match of the addresses listed above. For example, you can use Cloudflare for IPv4, but then choose IBM for IPv6 – vice versa – and your internet connection will not be broken. Just so you are aware, while IPv2 usually signifies the country of origin or device where you are coming from, but most all devices on the world-wide-web these days connect to websites via IPv4 connections, making IPv4 the most important settings to modify.

How To Switch DNS On Phone?

Changing or re-routing the DNS settings on your phone can either be incredibly complicated or incredibly simple, depending on your level of skill/expertise. However, far and away the easiest means to go about accomplishing this is by installing a 3rd party App – either by going to your App, Apple or Google Play store(s). Simply just type in “Change DNS” to your search settings, press enter, and this should open up a whole host of options to choose from. Simply choose the one that you feel is best for you and enter in the Addresses listed above.

If You are A Little More Advanced…

OpenNIC Project. For those of you whom may be unfamiliar, “OpenNIC (also referred to as the OpenNIC Project) is a user owned and controlled top-level Network Information Center offering a non-national alternative to traditional Top-Level Domain (TLD) registries; such as ICANN. Instead, OpenNIC only operates namespaces and namespaces the OpenNIC has peering agreements with.

In other words, they are open DNS addresses, servers and proxies not indexed by global internet agencies or their Governments. Stay classy mi amigos 😉

Learn More -OpenNIC Project: https://www.opennic.org/

See Also – CyberGuerrilla Internet Censorship Care Package: https://www.cyberguerrilla.org/blog/anti-censorship-carepackage/

CyberGuerrilla – Anonymous Gearing up for Operation Targeting Turkey Over Syrian Invasion

While I personally may be in favor of the Turkish invasion of Afrin and Rojava, it is not my job to care about which side is doing what when writing the news, I just report whats actively going on out there. But, getting into the hacktivist scene myself lately, I can not help but notice a ton of international outcry over what Turkey is presently doing in Syria and around their borders. I’m not talking about new reporters, politicians or anyone like that here, I’m specifically talking about some of the larger hacking networks the world over.

For example, over the course of just 1 week there were three different posting to CyberGuerrilla Anonymous Nexus (CgAn) indicating that operations against Turkey will soon be underway, and CgAn is not know to just f*ck around – so to speak. These postings, by the way, included a message from people inside Turkey, a posting from the United States and a posting from France – indicating a large scale effort is soon underway. It should also be noted that their operations are not entirely cyber and not entirely Black-Hat either, rather the groups are using whatever platforms they have to share the message about the Kurdish people and what is happening to them. In solidarity with them, I too share their messages here today with my audience.

Message from Kurds……..

Greeting citizens of the world

The Kurdish people who destroyed jihadist ISIS are now bombed by the Turkish State, the chief supporter of ISIS.
Unfortunately, we read the news of the deaths of many elderly women and children.
This is very sadly.
we shouldn’t stay silent more and not be part of this crime of humanity.
it is time to be sound to that scream echoing to stop this genocide.
Kurdish people should not be sacrificed to the dirty alliance of terrorist Trump and terrorist Erdogan.
All Anonymous members and all hacktivist groups should take action against that genocide.

Biji Berxwedana Rojava Biji Rojava

Message from Anonymous France…….

#OPSafeKurde #AnonymousFrance

Le collectif Anonymous ces lancé dans opération #OpsafeKurde à la suite que les force Turques ont traversé la frontière Syrienne.
Le collectif Anonymous France s’engage de manière indéterminé dans le conflit afin de permettre la paix entre les deux nations.

Et pour éviter toutes nouvelles guerre qui pourrait meurtrie des familles Turques, Kurdes, Syrienne.

Nous sommes légion
Nous pardonnons pas
Nous n’oublions pas
Attendez vous à nous

Message from BlackRat (CgAn)…..

Greeting Brothers and Sisters,

All those wars! All that devastation! All those victims, blood and reaction’s fury! Who is to blame? Who stands behind those who threw the burning torch into the keg of gunpowder? Who had long desired these wars and prepared them? The ruling classes! With their cronyism and kleptocracy, their bureaucracy and ideology, their police and spies calling us criminals. The governments and imperialist cliques, together with their press, tell you that the war(s) must be continued in order to destroy terrorism. Do not be deceived! Terrorism can only be eliminated by peace itself, and the task of bringing it down is posed in every country. Your governments and your press also tell you that the war’s must be continued so that it can be the last war on… This too is a deception. Never has a war put an end to war or terrorism. On the contrary, each war awakens the lust for revenge. Violence begets violence. Thus, after each sacrifice, your tormentors will demand new ones. Nor do the ruling pacifist zealots offer an escape from this vicious circle.

There is only one way to prevent future wars, namely for the Brothers, Sisters to conquer political power and abolish capitalist property. Enduring peace can only be achieved by victorious empowerment of the people.

A revolution not only to free the Kurdish population in Syria, but also the Middle East from the centuries of colonialism, oppression and dictatorships. And it has been an internationalist Revolution, because many internationalists joined this revolution, on the front line against the Islamic State and the Turkish fascism, we helped in hospitals, planted trees and worked to build up a democratic, ecological society, based on the liberation of women. And many revolutionaries joined the struggle all over the world, because the revolution in Syria has shown to all of us, that another world is not just theoretically possible, but it’s actually being built up in everyday life.

Social injustice and class rule are even more apparent in war than in peacetime. In peace, the capitalist system robs workers of the joys of life; in war(s) it robs them of everything, including life itself. And let us be done with devastation. It is you, the people, who will bear the burden of these heaps of ruins today and in the future. The hundreds of billions in cash thrown into the maw of the god of war are unavailable for maintaining the people’s well-being, for cultural purposes, and for social reform that could ease your lot, promote popular education, and alleviate poverty.

And tomorrow new and heavy taxes will be laid on your stooped shoulders. So let us end the squandering of your labor, your money, and your life’s energy. Rise up in struggle for an immediate peace with no annexations! Use every means possible to bring a rapid end to the human slaughter! Take up the slogan: For an immediate armistice! Rise up in struggle, peoples suffering ruin and murder! Take courage! Bear in mind that you are the majority and, when you so desire, you can assume power. Let the governments know that hate against war’s is growing in every country and with it, the desire for social retribution. This is bringing closer the hour of peace among the peoples.

Down with the War’s!
No Masters No Slaves!
Long live Liberty!
Long live Peace, immediate peace, without annexations!
Long live the Revolution!

At the time of this article, October 20th 2019, according to Amnesty International, “at least 218 civilians have been killed in Syria, including 18 children, since the offensive began” – something Turkey denies. If you want to learn more or hear first hand eyewitness accounts about Turkeys current offensive, you’re invited to read more here: https://www.amnesty.org/en/latest/news/2019/10/syria-damning-evidence-of-war-crimes-and-other-violations-by-turkish-forces-and-their-allies/

 

The Highlights: Fallout & Damage from #OpCatalonia2019

For those of you whom might not have been aware, massive protests and demonstrations took place all throughout Spain today, October 14th 2019, in protest for the failed annexation of Catalonia in December 2017, in support of all the political prisoners whom continue to be incarcerated from it at the hands of the Spanish Government ever since and those whom will continue to be imprisoned for it in the future, as well as to renew Nationalistic spirits/ambitions to make Catalonia an independent state once again in the future. While most of the protests were political based and non-violent, this does not mean there wasn’t any violence – from both police and/or protestors alike.

Additionally, as I was writing this article, it was just announced that members of the Catalonia independence leaders were just sentenced to 13 years in prison for encouraging people to take to the streets in protest today – essentially being sentenced in wake of some of the carnage that ultimately took place as a result of their encouragement.

However, what most of the main stream media did not cover about today’s protest were the events which took place online. While they may not get the popular headlines like those on the ground, this does not mean they were ineffective, went unnoticed or did not have an effect. For example, below you can find more about “Operation Catalonia” (#OpCatalionia2019), what it is all about, who was victimized by today’s attacks, as well as what hackers have done in support of this movement for the better part of the last year and a half or so – shout out to Anonymous Espana!

Learn More – #OpCatalonia: https://roguemedia.co/tag/opcatalonia/
Follow #OpCatalonia2019: https://twitter.com/search?q=%23OpCatalonia2019&src=typeahead_click&f=live

Largely lead by Anonymous CyberGuerrilla (#CgAn) and splinter groups operating under their jurisdiction this year, different Spanish-based political parties, politicians, universities, pubic businesses and more were targeted by today’s attack. Below is a confirmed list of the full run down from today’s events…..

DDoS Attacked

hxxp://hacienda.gob.es
hxxp://patrimoniodelestado.minhafp.es
hxxp://minhap.gob.es
hxxp://minhap.es hxxp://mjusticia.gob.es

Information Drop

Target: Centro nacional de inteligencia
Mails Leak: https://anonfile.com/G0zat481n1/cni_txt

Target: Congreso
Mails Leak: https://anonfile.com/K2z4ta8bn5/congreso.es_txt

Target: Correo gob
Mails Leak: https://anonfile.com/O2z9tc83nf/correo.gob.es_txt

Target: Min de defensa
Mails Leak: https://anonfile.com/M7zbta89nd/mde_txt

Target: Poder Judicial
Mails Leak: https://anonfile.com/L4zdt686nb/poderjudicial.es_txt

Target: vox
Mails Leak: https://anonfile.com/Qczftf86nb/voxmail_txt

Haxxed

Target: hxxp://ctas.es (Hacked)
Leak: https://anonfile.com/b608td88n7/www.ctas.es_rar

Target: hxxp://ctfc.cat/ (Hacked)
Leak: https://anonfile.com/p00eta84n9/www.ctfc.cat_rar

Target: hxxp://edimodul.es/ (Hacked)
Leak: https://anonfile.com/U7z5tc8en5/www.edimodul.es_rar

Target: hxxp://ilsa.es/ (Hacked)
Leak: https://anonfile.com/Yez2tc87n9/www.ilsa.es_rar

Target: hxxp://mmb.es/
Leak: https://anonfile.com/c900tb87na/www.mrsoft.es_rar

Target: hxxp://mrsoft.es/
Leak: https://anonfile.com/c900tb87na/www.mrsoft.es_rar

Target: hxxp://anticosa.es/
Leak: https://anonfile.com/t20ate88nf/www.panticosa.es_rar

Target: hxxp://segypr
Leak: https://anonfile.com/A402t982n5/www.segypro.es_rar

Target: hxxp://spainweather.es/
Leak: https://anonfile.com/y30at889nc/www.spainweather.es_rar

Target: hxxp://movilidadgranada.es/
Leak: https://anonfile.com/ac09t48dne/www.movilidadgranada.es_rar

Target: (Psoe de Burgos) hxxp://psoeburgos.es/
Leak: https://anonfile.com/s82ct18en7/www.psoeburgos.es_rar

Target: (PartidoPopular de Puertolumbreras) hxxp://pp-puertolumbreras.es/
Leak: https://anonfile.com/q11ctd8en5/www.pp-puertolumbreras.es_rar

Target: (Diputacion de Granada) hxxp://dipgra.es/
Leak: https://anonfile.com/j814t187ne/www.dipgra.es_rar

Target: (Portal de la Dirección General del Catastro) hxxp://catastro.minhap.gob.es/
Leak: https://anonfile.com/Razft18fnf/www.catastro.minhap.gob.es_rar

The ‘Rosenburg Files’ Tell The Tale of Why Anti-Fascist (Anti-Nazi) Servers Were Seized by German Ministry of Justice

So, I’m not trying to turn this next article into some masterpiece or spread any disinformation, but what I received in response to a recent legal request in Germany was certainly interesting. For those of you whom might not be aware, a couple weeks ago my anti-virus software would not let me connect to a website I visit nearly everyday – https://cyberguerrilla.org/. As a result, I reached out to some of my fellow “comrades” working there are received the following message:

Local Court Bamberg seized our hard drives from CyberGuerrilla Autonomous Nexus without notifying us or giving any reason. If someone in Germany could help us it would be appreciated we need reason why they seized our hard drives.

Local Court Bamberg for IP 88.99.141.214
File number: 1 Gs 2117/19 (710 AR 178/19)
Link: http://justiz.bayern.de/gerichte-und-b

Not asking for money but maybe you can find a lawyer (collective) in Germany to represent us (free of charge) to ask information on why our hard drives where seized on Friday 19 July. Basically only trying to figure out, that is why we started from scratch because court has all data concerning password hashes, key’s, certs, etc.

– With revolutionary greetings, General Secretary, Central Committee of the Meowist Party of the Soviet CyberGuerrilla Autonomous Nexus

International CyberGuerrillA Column

Well, it took me a couple days, but I decided to take on the task myself and proceeded to send out multiple messages to Germany Ministry of Justice in Bavaria where the files were seized. When that didn’t work, I then proceeded to try and reach out to Germany’s Federal Intelligence Service – Bundesamt fur Verfassungsschutz – because I’ve worked with them several times in the past with much success. However, even they too denied any comments on the matter. Researching everything a bit further, I found that same error message posted by the webmaster of https://cyberguerrilla.info/ dated 2017. So, was it a mistake from my contact, did the webmaster date the material wrong, or did history repeat itself? Probably the first.

Interestingly enough though, the only thing I did get from all my exchanges was the document provided below. What makes it so interesting is that it’s a document which tells the tale of how World War II era members of Hitlers ruling Nazi Party were not only given Amnesty for their crimes after the War, but were then hired after the fact to serve in Germany’s Federal Ministry of Justice in the decades following the end of the War. As the report even eludes to, as of the mid 1970’s, more than 90 senior level members of the Federal Ministry of Justice, former members of the Nazi political party, were still serving office.

The document also tells the tale of Germany’s history of Nazi influence on the countries justice system. Once again, which was still occurring well into the 1970’s. Indubitably, these footprints or influences/impacts still exist to this very day. The document was published in reference to something called the “Rosenburg Project” – that’s the correct spelling. What’s interesting about that is the fact that you can search the Rosenburg Project on Google and absolutely nothing pops up, which means this information isn’t exactly mainstream or readily available – which is why I’m publishing it here today.

Lastly, tying everything together now, and this is just a guess, I think the reason why I was provided this exact information was for me to fill in the gaps? What I mean to say is that CyberGuerrilla is perhaps the single most visible and powerful Anti-Fascist platform in the world right now – at least on the internet anyways. As I’ve also previously explained, Anti-Fascisist’s are Anti-Nazi through and through, which is the whole reason why the Anti-Fascists movement even emerged in the first place during the years leading up to and through World War II – because of Nazism and peoples/countries allegiances to its ideology.

So, as I maintain, I think I was given this information to read between the lines – so to speak. Germany is seizing these peoples servers, Donald Trump is leading a movement to classify Anti-Nazi’s terrorists, and all around the world actual Nazi’s are the ones committing acts of terror – especially recently here inside the US, probably because of our, at best, Nazi-sympathizing President. Make no mistake, Nazism is alive and well in all corners of the world and has remained so ever since the end of the War – as the Rosenberg Files chronicle. As I’ve also already stated, the War is already here – choose your side wisely mi amigos.

Download Rosenburg Files Research Report: https://roguemedia.co/wp-content/uploads/2019/08/Akte_Rosenburg_EN_Geschichtsband_1.pdf

Browse Full 46 Page Document:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/08/Akte_Rosenburg_EN_Geschichtsband_1.pdf”]

The War Is Here: Anti-Fascism Coming Under Siege Globally Since The Start of July

Just when I try and take a step back away from the digital world of online activism, ironically, the whole system appears to have begun collapsing in on itself in a fit of anarchy. Setting this article up, I am a self-described political conservative and a self-admitted Anti-Fascist and Anarchist, whom has been entrenched within the digital world of hackers for the better part of the last 5 years now. Therefore, literally everything which has happened over the course of the last 3 weeks has not only impacted my life, but has also effected the lives of some of my fellow “comrades” just as well. But before we gets into a the combined events of the last 3 weeks, you have to understand how we all arrived here in the first place.

How Anonymous Accidentally Created The Alt-Right

The story begins with a ten month long hacking operation known as #OpKKK, concluding in October 2015, during which hackers from all around the world infiltrated, hacked, recorded and exposed hundreds of Neo-Nazi/KKK affiliated websites, social groups, forums and physical locations around the United States. Believe it or not, some of the biggest names exposed in the data release were none other than Michael Pence, then Governor in Indiana and Daniel Coats, then Senator of Indiana. You may have heard of them lately? Considering that, under Donald Trumps command, Mike Pence has now become Vice President and Dan Coats the acting Director of National Security?

Oh, and I almost forgot, remember when Donald Trumps father was arrested at a KKK rally in New York City? But I’m sure that’s all just a coincidence, right? 😏

Lean More – 2015 #OpKKK: https://anonhq.com/?s=%22OpKKK%22

While those events are ancient history to some, what I really want to talk about here is what happened after unveiling KKK identities and databases. For example, remember all of the hype surrounding White Nationalists and the so called alt-right in 2016 – directly in the weeks/months leading up to the 2016 Presidential election? Well, it almost pains me to say, but the fact of the matter is that the rise of the alt-right and extremist political right online started in 2016 and came as a direct result of the hacking spree against the Neo-Nazi party and KKK in the fall of 2015. It was absolutely cause and effect, one event created the other.

As it were, not only were several United States Senators, Mayors and Governors questioned as a result of Anonymous’ investigation, but news of #OpKKK generated headlines globally – from even the most fringe of sources….

As you can imagine, the Nazi’s didn’t exactly take to kindly to the release of their databases and vowed to exact their revenge against Anonymous by any means possible – pun intended. As fate would have it, considering that Anonymous had been publicly advertising the release date of their findings for weeks in advance, in the days immediately before the actual release of KKK data, a number of fake leaks were posted online by people pretending to be Anonymous, simply just to cause confusion and make people doubt the legitimacy of the real leaks to come. But this was just the start.

Later, over the weeks/months following the conclusion of #OpKKK, a number of Neo-Nazi’s and Klan members attempted to infiltrate Anonymous circles to gather information about us, where we gathered, how we communicated, as well as to expose us wherever/however they could – essentially doing the same to us as we had done to them. It’s what happened after this that has gone on to become perhaps the single largest regret of my career.

The weird thing about the situation was that, over time, Nazi members and sympathizers realized that Anonymous hackers and activists were actually kind of smart and knowledgeable, specifically in that they can be extremely visible and active online, without anyone actually being able to track/trace them, or expose their identities.What I mean to say is that rather than expose Anonymous members, which was essentially impossible to do given our cyber security knowledge, Nazi and Klan members instead just kind of sat in on our chatroom and took all the information Anonymous shared with one another to serve/advance their own agenda’s.

This is ultimately the genesis of why/how the alt-right formed, and why White Nationalists/supremacists were able to grow their platforms/agenda’s so large to start 2016 – because they learned how to do it from the minds of some of the Internet’s best and brightest; Anonymous hackers. As someone who was an administrator over the single largest Anonymous chatroom in the world between 2015 and 2016, and whom made all of my cyber security tutorials free and open source to anyone whom came there with us, I’m perhaps more guilty than anyone else for all of this having happened, and witnessed it all myself in live time. It was only years later that I realized how reckless I used to be back then.

The Online War Against Anti-Fascism Has Begun

With that aside for a moment, lets start with why I am even writing this article here in the first place, which would be Donald Trumps full endorsement last night, July 27th 2019, of declaring all Anti-Fascists (ANTIFA) living here inside the United States a “Domestic Terrorist” organization. This statement is, of course, made even more ironic given the fact that one of Anonymous’ single largest ongoing operations the last two years has been something known as “Operation Domestic Terrorism” (#OpDomesticTerrorism) – exclusively targeting Neo-Nazi’s, ultra far-right Nationalists and white supremacists online. So then, what are the chances Donald Trump calls Anti-Fascists Domestic Terrorists for trying to fight actual domestic terrorists – whom happen to represent some of his most devout followers?

Now that you know that, what does that say or tell you about President Donald Trump and who his allies are? Next, I want you to think about what Anti-Fascists even are in the first place, which is Anti-Nazi’s, Anti-Fascism (arrests/incarceration, Wars, Authoritarianism in Government, against racism, sexism and nationalism). Knowing this, what purpose are Ted Cruz, Bill Cassidy and Donald Trump trying to serve here? Protecting Nazi’s, white supremacists and racists, whilst punishing people trying to stand up against injustice and authoritarianism? In what way do they think this to be good campaign strategy? Vote for us, we got the backs of Nazi’s! Cool story bro, let me know how well that works out for you.

The War Has Already Begun

Unfortunately, it was not just Trump’s declaration last night. One of the more fucked up things I’ve just discovered was that 6 of the 8 original Nazi dox lists have been scrubbed offline, off Pastebin within the last 2 months prior to this article – since being publicly available dating back to September 2015! Think that is any coincidence? Before you arrive at your own conclusion, have a look at the following evidence.

The other day I noticed hxxp://cyberguerrilla.org/ was taken offline and inaccessible, so I reached out to some of its developers for further information. Apparently, all of CgAn’s servers had been seized in Germany by the Bavarian Ministry of Justice. Here’s what they sent to me:

Local Court Bamberg seized our hard drives from CyberGuerrilla Autonomous Nexus without notifying us or giving any reason. If someone in Germany could help us it would be appreciated we need reason why they seized our hard drives.

Local Court Bamberg for IP 88.99.141.214
File number: 1 Gs 2117/19 (710 AR 178/19)
Link: http://justiz.bayern.de/gerichte-und-b

Not asking for money but maybe you can find a lawyer (collective) in Germany to represent us (free of charge) to ask information on why our hard drives where seized on Friday 19 July. Basically only trying to figure out, that is why we started from scratch because court has all data concerning password hashes, key’s, certs, etc.

– With revolutionary greetings, General Secretary, Central Committee of the Meowist Party of the Soviet CyberGuerrilla Autonomous Nexus

International CyberGuerrillA Column

Keep in mind this latest incident took place less than two weeks after the American based company known as Twitter also began censoring and banning #CgAn and its supporters online. For example, I wrote this on July 9th 2019.

This next bit is not about Anonymous, necessarily, but rather about some of my fellow “comrades” working over at CyberGuerrilla Anonymous Nexus (CgAn). For those of you whom might not be aware, CyberGuerrilla has always been home to some of the undergrounds best hackers and cyber security practitioners for quite some time now, and I have ties to them going back to “Operation Africa” (#OpAfrica) back in 2015. Outside of being hackers though, CgAn are also some of the worlds most outspoken Anarchists, Communists and Anti-Fascists – comprising of one of the most globally diverse underground communities you will ever find.

With that out of the way, earlier this year one of CyberGuerrilla‘s biggest accounts “International CyberGuerrilla Column A” was shut down by Twitter – active with over 61,000 followers at the time of their closing. It also wasn’t an isolated incident either, and Twitter has made it a point to specifically take on CyberGuerrilla online. In fact, at one point just a few months ago, Twitter actually began censoring and deleting all hashtags with “CgAn” in it, making it harder for anyone online to see or follow them, or read any of the material they create. This is why researchers/activists such as myself have been going out of our way to make as many #CgAn‘s as possible – just to keep them indexed and show support.

Even more recently than that, Twitter has also begun cracking down on several other large and prominent accounts within the CgAn community – as you can see via the Tweets provided below.

Getting back to the story at hand, CyberGuerrilla has been attempting to fight back against Twitter for closing their accounts – all legally too. For example, despite Twitter claiming that their account was closed for breaking the terms of Twitters rules and conditions, Doemela is fighting back against Twitters decision. Below you can find a transcript of their appeal to Twitter, learn more about the case, find a link to their information/blog posting about it, as well as the location to their new Twitter account – should you feel compelled to follow them again. 😉

Doemela’s Appeal To Twitter:

Hello Twitter,

I noticed that my account is suspended. I have read all terms and
conditions on your support page but cannot see any reason why I may have
been suspended. I’ve certainly taken every step to ensure that my
account is not breaking any rules.

I’ve been suspended several times, and the reason supplied to me is
always ‘it was done in error’. I kindly explain I don’t feel I am
violating any of Twitters’ rules, and politely request examples of me
doing this. There is also no one I know of that reported this account
for violation of Twitter’s Rules. I’m a keen user of Twitter, and if you
could please let me know why I was suspended then I will ensure I will
take whatever steps necessary so that it does not happen again.

This at the very least would be helpful, so I may learn what is
acceptable and adjust my behaviour accordingly. I think the bigger issue
is however; I’m not in violation of your terms. It seems to me your
‘report abuse’ function is being abused in order to silence dissenting
voices or genuine civil criticism. Abuse and harassment are both awful
and incredibly serious things. I applaud and support Twitters’
commitment to penalizing those who feel it’s acceptable to engage in
such a deplorable way.

However, your system is flawed. I appreciate you have far too many users
for it to be anything but automated, but it is currently punishing users
that are using your services legitimately, for discussion, challenging
ideas, and promoting worthy causes and dialogue.

All I ask is that you please review my case by putting actual human eyes
on the tweet examples provided to you, as I believe examples are
mandatory when making these reports. When doing so, please ask yourself
whether these constitute ‘abuse’ in any meaningful sense and whether
it’s more likely your reporting function is being exploited to silence
genuine, but undesired criticism by the same individual, or individuals.

In your worthy commitment to providing a report function for genuine
abuse, it appears you have overlooked the possibility of that function
actually becoming abused as a tool to constantly silence legitimate
voices. What measures can you suggest preventing this function from
becoming an actual tool of harassment? It appears I am a casualty.

Thank you! Look forward to really hearing back from you.

Needless to say though, their Twitter account is almost certainly never going to be restored again.

The Real World War Against Anti-Fascism Has Also Begun

Taking all of this information into consideration, on July 21st 2019 Senators and Ted Cruz (R-TX) and Bill Cassidy (R-LA) have now also taken it a step further by officially introducing a new piece of legislation designed to label all Anti-Fascists (ANTIFA) as the worlds newest terror group. It was only a week after this, on July 28th 2019, that Donald Trump made international headlines after stating it’s time to start considering ANTIFA a major terror organization – giving a full endorsement to Senator Cruz’s bill.

According to the bill itself, US Senate “calls for the groups and organizations across the country who act under the banner of Antifa to be designated as domestic terrorist organizations.” You can read through the 3 piece copy of the legislation provided via the pdf below.

Full Copy of Legislation:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/07/KAT19105.pdf”]

Wrapping Things Up

I find this bill to be completely misguided and dangerous and no, that’s not just because I’m one of the people Donald Trumps is trying to turn into a terrorist. I mean, if you take a group of regular extremists and then call them terrorists, honestly, what do you think is going to happen? It’s only going to make them lash out even more aggressively. For example, I know I wouldn’t stand for being labeled a terrorist by my own Government without doing something to earn the title – so I’d earn it then, and I know I wouldn’t be alone.

Also, how the hell can Cruz, Cassidy and Trump justify waging a new War on Terrorism – this time on their own soil against their own people/citizens? Keeping in mind all of the countries other Wars right now, two of which we are losing (Syria & Afghanistan), waging a new War here in America sounds pretty extreme/fascists – at least if you ask me. On every level, it is PR move or political gesture that will only set these politicians up for failure, which I why I think their legislation has no possibility of ever passing Congress or landing on the Presidents table – especially given that Democrats own the House.

Besides, I seem to remember a time when there was a call to petition Anonymous as a terrorist organization back in 2014 I believe. However, this too was thrown out – just as it should for Anti-Fascists.

Regardless though, as all the evidence contained within this article is witness to, War isn’t just on the horizon, it is already underway and from Russia, to the US, to Germany, Governments all around the world have already fired their opening shots. How the internet or international community in general responds to them or retaliates remains to be seen, but it is clear Hackers, Anarchists, Anti-Fascists and Communists are all firmly in the worlds cross-hairs.

CyberGuerrilla Anonymous Nexus (CgAn) Begins Fighting Back After Twitter Censorship

So, this is an article I was going to write about maybe 2-3 months ago, but never got around to it for some reason. But, for those of you whom might not have been aware, over the course of the last 9 months or so Twitter has been active in an international crack down against Anonymous, Anarchists and Antifa members alike. In fact, in October 2018 I wrote an article about Twitters mini-purge of Anonymous accounts after the fall of several high profile accounts – going as far as to personally ask Twitter if they had longer term plans to crackdown on all hacktivists on their service in the future?

Learn More – Twitters Mini-Purge of Anonymous: https://roguemedia.co/2018/10/27/twitter-begins-purge-of-anonymous-accounts/

With that established, this article is not about Anonymous, necessarily, but rather about some of my fellow “comrades” working over at CyberGuerrilla Anonymous Nexus (CgAn). For those of you whom might not be aware, CyberGuerrilla has been home to the undergrounds best hackers and cyber security practitioners for quite some time, and I have ties to them going back to “Operations Africa” (#OpAfrica) in 2015.

With that out of the way, earlier this year one of the CyberGuerrilla‘s biggest accounts “International CyberGuerrilla Column A” was shut down by Twitter – once active with I believe over 61,000 followers at the time of their closing if I remember right. It also wasn’t an isolated incident either, and Twitter has made it a point to specifically take on CyberGuerrilla online. In fact, at one point just a few months ago, Twitter began censoring and deleting all hashtags with “CgAn” in it, making it harder for anyone online to see or follow them, or read any of the material they post online. This is why researchers/activists such as myself have been going our of my way to make as many #CgAn‘s as possible – just to keep them indexed.

Even more recently than that, Twitter has also begun cracking down on several other large and prominent accounts within the CgAn community – as you can see via the Tweets provided below.

Getting back to the story at hand, CyberGuerrilla has been attempting to fight back against Twitter for closing their accounts – all legally too. For example, despite Twitter claiming that their account was closed for breaking the terms of Twitters rules and conditions, Doemela is fighting back against Twitters decision. Below you can find a transcript of their appeal to Twitter, learn more about the case, find a link to their information/blog posting about it, as well as the location to their new Twitter account – should you feel compelled to follow them again. 😉

Doemela’s Appeal To Twitter:

Hello Twitter,

I noticed that my account is suspended. I have read all terms and
conditions on your support page but cannot see any reason why I may have
been suspended. I’ve certainly taken every step to ensure that my
account is not breaking any rules.

I’ve been suspended several times, and the reason supplied to me is
always ‘it was done in error’. I kindly explain I don’t feel I am
violating any of Twitters’ rules, and politely request examples of me
doing this. There is also no one I know of that reported this account
for violation of Twitter’s Rules. I’m a keen user of Twitter, and if you
could please let me know why I was suspended then I will ensure I will
take whatever steps necessary so that it does not happen again.

This at the very least would be helpful, so I may learn what is
acceptable and adjust my behaviour accordingly. I think the bigger issue
is however; I’m not in violation of your terms. It seems to me your
‘report abuse’ function is being abused in order to silence dissenting
voices or genuine civil criticism. Abuse and harassment are both awful
and incredibly serious things. I applaud and support Twitters’
commitment to penalizing those who feel it’s acceptable to engage in
such a deplorable way.

However, your system is flawed. I appreciate you have far too many users
for it to be anything but automated, but it is currently punishing users
that are using your services legitimately, for discussion, challenging
ideas, and promoting worthy causes and dialogue.

All I ask is that you please review my case by putting actual human eyes
on the tweet examples provided to you, as I believe examples are
mandatory when making these reports. When doing so, please ask yourself
whether these constitute ‘abuse’ in any meaningful sense and whether
it’s more likely your reporting function is being exploited to silence
genuine, but undesired criticism by the same individual, or individuals.

In your worthy commitment to providing a report function for genuine
abuse, it appears you have overlooked the possibility of that function
actually becoming abused as a tool to constantly silence legitimate
voices. What measures can you suggest preventing this function from
becoming an actual tool of harassment? It appears I am a casualty.

Thank you! Look forward to really hearing back from you. 

Anonymous & CyberGuerrilla (CgAn) Announce Formation of #OpLove

Checking back in with some of my comrades today, I managed to come across an interesting posting on the International Column A CyberGuerrilla forums complete with a full description of a newly launched operation going by the name of “Operation Love” (#OpLove). The message of the operation is simple; stop the hate which is infecting all of our societies. Stop consuming popular media and news networks which distort your reality and make you live in a bubble of fear, hate and distrust. Stop blindly supporting Cops and Marines and Military personnel – the USA has the highest incarceration rate of any country in the world, including North Korea, Iran, Russia, anyone, and the US military kills more people than any standing army in the world invades foreign countries just to kill people, topple their governments and plunder resources for economic. The US military is not ‘the good guys’ no matter how much you’ve been programmed to believe this since birth.

Quite frankly, you are all living in a bubble designed and funded to distract you from the true realities of this world and your own Governments. #OpLove is simple, really, start taking a stand for what’s right and decent in this world. Stand up for your beliefs just as hard as the Nazi’s and hate-filled others do. Be the change you wish to see in the world. If you want a more peaceful society, want to see less hate, less death and less misery, then start spreading love and peace however you can – it has nothing to do with being a hippie, it’s just about being a good/decent person and standing up for what is right.

Original Press Release: https://www.cyberguerrilla.org/blog/anonymous-operation-love/

Full #OpLove Press Release:

Greetings World,

We never would have been able to reach out to you without the internet, so many of us are still fighting for what we believe to be the truth and show humanity the wool that has been pulled over their eyes – instead of perpetuating lies that we’ve all been conditioned to believe. The very governments we unquestionably obey consistently lie to us and use their narrative to control a corporate run society. This is no conspiracy, because you can see it happening in real time, everyday/everywhere. Your servitude has led you to become anxious and depression, slaves to big pharmaceutical companies and as a result, we now the greatest political divide in modern history. The media you consume also influences you, contorting your own reality into a false and comfortable narrative. The human race has lost its way. Deep down when Anonymous first emerged from the internet, we knew we had to wake the planet up – but before that could happen we all had to grow, understand and evolve.

Through our journey we have seen many things, but the one thing that really hurts us the most is how society freely you gives itself up to all of the negative aspects of this world. You offer your hands up to be cuffed by the government as Fox News, CNN, MSNBC and all of the other political propaganda machines confuse and befuddle your true potential and trust. You’ve been crucified again and again by feeding into the greatest of lies of this generation. We came from the bleakest of places, trolling for lulz, testing our strength until we hit vital nerves. The pain we’ve inflicted upon governments, corporations and banks was real. The streets erupted with anger as the Occupy Movement was born – only to fail. It was set up to fail from the beginning. Too many questions were asked as the people became wiser. Dissent was introduced and the movement was disbanded. Everyone went their own way, followed their own paths.

It wasn’t until later that we understood what we really did. We truly did wake the planet up. We used to question if we did any good, which is still highly up for debate. We always understood that humanity was one, and we would profess it in our memes and videos. “Divided by zero,” and universal oneness was a prevailing theme – we just really never understood exactly how profound it would be, especially now. Humanity is very divided right now. Right versus Left, and your governments still don’t care about your needs as a people. You fuel them constantly with your division. If you ever decided to stand together, peacefully and show how powerful you all are, you could change the entire world overnight – but you don’t stand together. You fight; you war amongst yourselves and wait for the next distraction. You’re addicted to your own slavery. This may sound harsh, but it’s true.

You see, only a few of us who banded together showed you that we are not as powerless as you think, we showed you that anyone can truly have an impact – but you did not listen. It’s why so many of us walked away, disappointed, frustrated. Change is still in the air. There is an immense shift in human consciousness. Some understand the path of love, empathy and compassion, while others obey blindly and point fingers at other humans for problems their very government has created. Some watch the news and repeat what they hear verbatim, while others make up their own minds by following the empathy they have for all things. What side are you on? Will you contribute to all of the negativity being pushed at you, helping to usher in more depression and anxiety to the world, or will you turn your back on this vampiric system and hold each other’s hands and walk away with us to create a better world for our children?

The government, the banks, the news media will continue to try to convince you that there is nothing more to life but obedience in a toxic society. We say no more, it’s time for all of us to be adults now instead of children. Walk with us to form a better world. A world of peace, one of love and one of compassion. Ever desire less one can see the mystery itself; with desires one can only see the manifestations of ego. Seeing the mystery is the doorway to all understanding.

We are Anonymous
We are Divided by None
We are all One
We do not forget
Expect change.

#OpPulizia: Anonymous Italia – CyberGuerrilla Release Leaks of Italian Union of State Police Workers, 4 Other National Organizations

Earlier today, May 21st 2019, “Anonymous Italia” and CyberGuerrilla announced hacks, leaks and defacement’s of 5 websites across Europe. More specifically named in the hacks/leaks were the Italian Union of State Police Workers, National Union of Arma Carabinieri, Civici Carabinieri Lugano, an international firearms company, as well as the Core Civil Protection of Rome. Not only were each of the websites featured below defaced, but hackers also too the occasion to leak and/or mirror the databases of 3 of the sites as well.

Target: hxxps://silpcgil.it/
Data Dump: https://privatebin.net/?8463587040fe842f#iZK0WdwcyAOoRej/sBBqPX8Q7GrTpvbPZhohKdogEXQ=

Target: hxxp://unionecarabinieri.cc/
Data Dump: https://privatebin.net/?f9eaa0a58489ad7d#kyCyXIV7vJyX1C2GTKTn+viYK+d84dqj5mWsEHa9tos=

Target: hxxps:/civicicarabinieri.ch/
Data Dump: https://privatebin.net/?219e8481c7c2f791#lQgQMmYRIx9qRm73puzSxgiT4YHY5cgAE02Q8wTogoM=

Defaced: hxxp://carabinieri-unione.it/
Defaced: hxxp://carabinieri.tv/

In a message attached to the hacks, CyberGuerrilla stated:

Hello people,

Today we publish a bit of information snatched from our beloved champions of justice, mindless slaves, for no other reason that they only obey their masters!

The same people who say they should protect us, and instead take advantage of their uniform to kill, to uphold their positions for their own corrupt practices. Unfortunately, they are always on the wrong side, loading up on students, old women, helpless women as if they were animals to slaughter.

Oops, our mistake! The ones who should protect us are the lawyers – right? Poor things, we blocked his PEC and went to let off some steam on the blog of Anon Italia’s friends. We have read the delusional comments, interesting, not even good enough to make us chuckle.

Who says we were wrong to ‘attack lawyers’? That we should instead attack the banks, and other absurd amenities. Do you believe that we do not know the employment situation of both lawyers and the Dis-Order forces – the police?

We are only twelve years old from the Middle Ages, and if we have been here for so long, it means that we will continue to be there forever. 🙂

Do you believe you have ever done something to combat this situation?

Some of you have made really interesting comments, but do you believe that we have not succeeded?

We create moment of chaos, made so that you may have no idea who we are, or who you are dealing with. Follow us, comment on our articles, follow our Twitter, you will find us the next time the newspapers write about us.

We are Anonymous.
We are Legion.
We do not Forgive.
We do not Forget.
Expect Us.

Review: White Unveils New Tool for Reporting Social Media Account Closures

While I’m far from the first to report of it unveiling, I don’t really give a fuck – so I am writing this review here today. But, last night I decided to test out Donald Trumps newly unveiled tool/creation – an official web page launched by the White House designed solely to report the “unfair” closing of social media accounts While Trump is doing his best to sell this as an anti-censorship endeavor, indubitably, this move was designed to show support for the alt-right, White Nationalists, White Supremacists and neo-Nazi’s – essentially, the foremost outspoken groups in favor of our Commander In Chief.

If you need any proof of this, look no further than the fact that, starting just about two weeks ago, Facebook began blocking “White Nationalists.” This also adds to a very serious crackdown on conspiracy theorists and outspoken members of the alt-right over recent months/years, such as Alex Jones and Milo Yiannopoulos – just to name a few. However, what I think most people are missing, or deliberately ignoring, is the fact that this crackdown is not only just effecting racists and extremists on the political right. Believe it or not, the crackdown have also effected many of my fellow “Comrades” working for on behalf of both Anonymous and CyberGuerrilla. For example, over the course of the last month alone, Twitter has closed the accounts of LulzSec Kurdistan, Pinoy LulzSec, International CyberGuerrilla A Column, and has even begun scrubbing the hashtag #CgAn offline as much as possible.

To this effect, I decided to investigate Donald Trumps new tool by reporting the closing of @CgAn_Doemela – a loose collection of CyberGuerrilla activists with over 21,000 followers which was inexplicably closed by Twitter just a couple weeks ago. For those of you whom haven’t used or investigated the tool for yourselves, I was actually quite surprised. I say this because the vast majority of information asked by the White House is about yourself, who you are, where you live, what social demographics do you belong to – et cetera. In fact, out of maybe 13 questions, only 2 of them are about the social accounts you are reporting closed in the first place 🤔.

Needless to say, while my actions were sincere, they were also kind of a troll – just to see what the White House was up to and to investigate whether or not they care about the closing of accounts of activists on the extreme political left, in addition to those on the extreme political right? I suppose we will have to wait to find out and see. In the mean time, if you haven’t tried to tool for yourself, you can access the White House’s page below.

White House Reporting Tool: https://wh.gov/techbias