WELCOME
Edit: Ifinity never ever is dead, what good news.
As a result I am unlocking every thread there.
Welcome to /netplus/ the board for discussing networks and networking protocols/software, including but not limited to; tor, i2p, retroshare, GNUnet, freenet, hyperboria/cjdns, syndie, meshnets and whatever else. This includes discussion, general information, information on how to get involved and link sharing. Discussion can related to the technologies themselves, how they work, what they are intended to do, what their uses and weaknesses are, the services hosted on them, communities and culture.
If you have a technology/network/community you would like to introduce to the board it would be appreciated if you write a short paragraph or two describing what it is and provide links to guide and documentation .
Please refer to the rules before posting. http://oxwugzccvk3dk6tj.onion/netplus/rules.html
Board log
http://oxwugzccvk3dk6tj.onion/log.php?board=netplus
As the original board owner hasn't logged in for about 15 weeks the board showed up as claimable.
Thanks original board owner for creating this board.
Things to do;
Remove that Brown pill crap. Done
I've updated the css, all thanks go to Cyberlife [http://jinteki.industries/] for hosting and Gbert0 the creator of the sweet looking theme which I have borrowed.
Update the link to the rules list as it is using the older link.
Enable board log. Done
If anyone wishes to make any changes to the rules/settings, ask away.
tor
This thread is for general information on tor, what it is and how to get started with the tor browser bundle.
>how do I into tor?
You can start using tor within couple minuets if you like.
1. Download the tor browser bundle from the tor project website here https://www.torproject.org/download/download-easy.html.en
2. extract the archive
3. click the 'start-tor-browser' shortcut
4. optionally you may want to change the noscript add-on to block all scripts by default and allow them on a site to site basis when necessary
5. browse the Internet in privacy
6. see the tor LINKS thread for links to hidden service 'onion' sites that are only accessible over tor
What is tor? tor is a low latency, onion routing network intended to facilitate anonymous and censorship resistant communication with a focus on facilitating access to the 'regular' Internet in a way that shields your identity from the destination server as well as shielding your destination from your isp/someone listening on the wire. Tor also has a 'hidden service' capability that provides anonymity for both the user and the server. tor is a free software project and as such you are welcome to review, redistribute, contribute and fork the source code.
How does tor work?
For a basic overview in simple term I recommend you read the overview on the tor project website https://www.torproject.org/about/overview.html.en
what can tor do for me?
- tor can provide a level of network level anonymity when you communicate over the Internet
- if you are someone who 'has nothing to hide' but feels like hiding anyway then tor is for you. tor is one of the best things going if you want to avoid passive, bulk, corporate and government surveillance. Just use the tor browser bundle for your everyday web browsing, reading the news, shitposting on 8chan, shitposing in irc, shitposting in the comment section of news websites etc.
- if you are someone who has something specific to hide then tor could be an excellent tool in helping you achieve this but you will need to access what it is you are trying to hide, who you are trying to hide it from, what their capabilities are and what tor can do to help you achieve this. If your anonymity is a matter of life and death then you need to do your own research and seek expert advice, unfortunately there is no point and click tool that exists to guarantee you 100% anonymity 100% of the time.
what can tor not do?
- tor can not protect your identity if you tell people your name. So do not log into any accounts that can be associated with you, (if you want to be anonymous that session) do not tell people your name, do not post your post code on 8chan, do not post pictures of your dick in which you can see your face in the mirror
- tor does not encrypt your traffic end to end when using 'clear web' websites, so if you use a website that does not use TLS then your traffic will be encrypted while it passes though the network but not once it reaches the exit node where the last layer of tor encryption is peeled off, at this point you are in the same situation as when you use the website directly, if the website/service does not support encryption or if you do not use it then anyone listening on the wire can see what you are doing, this includes the exit node.
- tor can not protect you if you run malicious code on your computer, this includes viruses and malware , as well as malicious javascript and browser/javascript exploits. Whonix does provide a level of protection against de-anonymization in the event you get fucked this way, see WHONIX_LINK_HERE.
- tor can not make you smarter, don't be retarded.
- Is tor broken?
No. there are theoretical attacks that exist, these are well documented and well understood, please refer to the tor project website and documentation regarding the limitations of low latency anonymity networks.
Links for more info about tor.
https://www.torproject.org/docs/faq.html.en
https://www.torproject.org/about/overview.html.en
https://www.torproject.org/docs/documentation.html.en
https://github.com/TheTorProject
https://svn.torproject.org/svn/projects/design-paper/tor-design.pdf
Volknet
Not sure if I ever made a thread here before about /volknet/, but I thought it was relevant.
It takes a different approach to Internet privacy than just strictly a technological one, or of building yet another darknet.
The Internet in general would be more anonymous & private if we all just started using the darknet en masse. But of course we don't. All the most popular websites are on the clearnet, so that's where everyone goes. And because that's where most everyone goes, that's where web developers and content creators focus their efforts. They go where the traffic is rather than producing quality content for the darknet. So…places like i2p and onionland have a kind of self-fulfilling isolation to them.
No content, no traffic. No traffic, no content. And most of the general population just keeps on using the regular, insecure Internet.
/volknet/ is a proposal on how to get out of this bind and to jump-start a migration to the darknet.
We don't need to try and convince bloggers, artists, vloggers, etc to set up a presence on i2p or freenet or any other place. Instead, we just don't give them a choice.
If you happen to have a favorite website, blog, wiki, whatever, just outright scrape the content from these websites and then clone them onto the darknet yourself. It doesn't even need to be a full website, it could be the works of your favorite Deviant Artists, or the channels of your favorite Youtube personalities.
Quality content creators are hard to come by, but ANYONE can copy and pirate and rip stuff. Anons are always posting stuff they found on the Internet anyway, so why not take it a step further and build something with it? Then you wouldn't need to leave i2p in order to visit your favorite blog or news website. Just go and visit the cloned eepsite.
And if the content creators don't like it, well TUFF! If someone cloned their website, the only thing they can do about it is set up their own "legitimate" version of their website on the same darknet. Either way, the darknet gets an infusion of quality content which draws more traffic which draws more content creators.
Which darknets? Any and all of them. Take whatever websites you've scraped and mirror them across Tor, i2p, Freenet, Maidsafe, etc. When new and better darknets become available, just copy your content over to those. I've collectively called this "volknet". We leverage the social momentum of the Internet and use it to build our own.
Retroshare V0.6 Certificate Swap
Watch the getting start video for setup instructions. http://a.pomf.se/exmviw.webm
Post your certificate here and add other people's. Remember that both parties need to add each other's not just your their's.
Add you certificate to the /netplus/ chatserver here udgdahofbq52bzxk.onion it will instantly add you and give you instant access to a set of chatrooms. Remember the chatserver will not replay traffic for you so you will need to add some people to your friends list if you want to share and download files.
Ricochet ID Swap
Ricochet is as instant messenger that uses Tor hidden services as identities.
Post your ID and desired display name ITT, and optionally include your interests.
Info:
https://github.com/ricochet-im/ricochet/blob/master/doc/design.md
https://github.com/ricochet-im/ricochet/blob/master/doc/protocol.md
Download:
https://ricochet.im/releases/1.1.0/
Whirlpool Hashes:
6edada572f755f3f456bf5fd543b3035fde6a30f771f990ff3d70bbb2446acb2b52123769f028b41c122f051d5a52f78a174fcdabcfbf5b6db580a1231b49182 Ricochet-1.1.0.dmg
701991c9bb338e0a9253a764b9c12e604b1a029639e30205711d5e66a588226fba7fb7ec692a7676d3b128d868e27e876e845f5c5b7f06bb91f44b4ea8fabe0d Ricochet-1.1.0.dmg.asc
36eefbebc6a087af063a94e286c5ad9083f316a92098b6998585c134534b93cb97769d47e2ea9078ba8575606e21211291804e7b0c9e7d42f339cd55c2998abc Ricochet-1.1.0.exe
1ba1d4913064b09f12fe8fb5ca2afc5b57c9115acc92ba0caa1965c8b50a59ea360eaa4e906d51e36cb2daec0b7a919f9752a73c8c37b5593682a11cc3e03ad6 Ricochet-1.1.0.exe.asc
eb2087a6165cc01f2fb1e004a02fdf1cbb2d690ebd40e2d653ba4b5f95101d435889dcd0a25c4aa0b30787748d6bd6356db051c700ca72601d2c43e208debdb2 ricochet-1.1.0-src.tar.bz2
066647fe6f99fb0dc0d05b20beb4075c780145ce036f56964dac649cd41e4623d5e097f8a03fc4756df6595a3f14d774e28c972a851cbfedc847c61161351489 ricochet-1.1.0-src.tar.bz2.asc
2900b78e431ce7858d049e45d3e75e2de8aa3341a695f42ded071615073a15546ceb352a2dc6069e8ae2cdc4033d103c14537bbae087f2a2653216d329110373 ricochet-1.1.0-static-i686.tar.bz2
e08768f22372f607077500069d75cf1d30691d355aee74a03070f11daf437c49134e11527a3b5cbba43db15b1c4aa6eea280d7ed36a127f6fe64366bc38ee567 ricochet-1.1.0-static-i686.tar.bz2.asc
942a67c654e90118fcf562cca74e49fb1174094e62fa1ae464ab7194ad5d57c151ffdc18400985b3c5279ad8c11908419c23ba1129fffab12f027d613ee437f0 ricochet-1.1.0-static-x86_64.tar.bz2
2dc24733667c0d8e72cb44ecea290d6b3a98469c338145559f75683ac746b5aabae065d9c466d1db024801eaf9035ea72048f1c046b3fe7e393af090f0f9aaf0 ricochet-1.1.0-static-x86_64.tar.bz2.asc
ricochet:4qhky7bkfwt4ei3n
celi
er
>Louis C.K. walks on stage
>"Good evening ladies and gentlemen…you're in for quite the show tonight"
>*applause*
>"Before we go any further…let us turn off these lights, these damned inventions of the white devil. Let us return to out natural state,BLACKness"
>Lights are turned off, but bonfires are being lit on stage and in the audience.
>Meanwhile, Louis has stripped naked, and a huge cauldron is being brought on stage.
>All the blacks in the theatre start chanting "CUCK CUCK CUCK" slowly growing louder.
>"In this cauldron is a sacred Nubian concoction made from the semen carefully extracted from vaginas of wives who have been bred by black bucks. It symbolizes the conquering of the white race.
>Louis lowers his pale, naked body slowly into the cauldron of semen. He rubs himself sensually, and his tiny white dick gets more and more erect.
>"CUCK CUCK CUCK CUCK" the chanting continues to roar on.
>Louis begins moaning and masturbating violently. Some white people in the audience are shocked, but when they try to leave they find the doors locked.
>Louis moans come out in a gasping sputter as his hands are a blur in his slimy crotch.
>Right as Louis reaches his climax, a black buck thrusts a huge horn resembling a BBC in front of Louis face. Louis puts it to his lips and….
>BRRRROOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO!
>The sound of Louis orgasm echoes around the chamber, competing with the deafening chant of "CUCK CUCK CUCK"
>Zulu warriors emerge from the shadows of the theatre,killing all the white males in the audience with spears. The white women blush with anticipation as they are dragged towards the stage, where dozens of black bucks await with massive, throbbing erections.
>At this point Louis is being spitroasted between the girths of two massive black men.
>He pulls his mouth off of one of the mans cocks and grabs the mic. Panting, he says:
>LADIES AND GENTLEMEN,WELCOME TO THE INTERRACIAL BREEDING GROUNDS!sfer
Privacy
Hey, I'm doing some research and trying to emphasize that Internet privacy-related guides are on the rise. Besides http://paranoidsbible.tumblr.com/library are there similar guides or groups?
Copy/Paste way to uninstall Microsoft's Spy updates.
Below is the list of "updates" that delivered by Windows Update as "telemetry and customer experience improvements". If you don't want upgrade to Win10 or send your "telemetry" to MS - remove them and do not install again.
Microsoft claims this is "telemetry" and customer experience blah-blah-blah. Well I call this simple - spyware.
https://support.microsoft.com/en-us/kb/3021917 - "Performance tracker update"
https://support.microsoft.com/en-us/kb/3035583 - "Get Windows 10 App" (delivers ready to use UAC backdoor as bonus)
https://support.microsoft.com/en-us/kb/2990214 - "Upgrade to Windows 10"
https://support.microsoft.com/en-us/kb/3044374 - "Upgrade to Windows 10"
https://support.microsoft.com/en-us/kb/2952664 - "Compatibility update for upgrading Windows 7"
https://support.microsoft.com/en-us/kb/3022345 - "Customer experience and diagnostic telemetry"
https://support.microsoft.com/en-us/kb/3068708 - "Customer experience and diagnostic telemetry"
https://support.microsoft.com/en-us/kb/3080149 - "Customer experience and diagnostic telemetry"
https://support.microsoft.com/en-us/kb/3075249 - "Telemetry points to consent.exe" !!!WARNING!!! this update add spyware functionality to UAC
COPY/PASTE script below the line into you command shell/command line (cmd.exe). To disable the evil spying services spread by Microsoft.
============================================================================================================
HORNET
Found this:
http://www.theregister.co.uk/2015/07/24/hornet_highspeed_onion_routing_at_the_network_layer/
details of the protocol: http://arxiv.org/pdf/1507.05724v1.pdf
code (java =/ ):
https://github.com/penberg/hornet
I haven't test it yet. Share more sources, details, links, experiences, pros, cons about HORNET.
Internet providers
So I though I'd ask here instead of the other boards because you guys know what you're talking about unlike others.
Who provides good internet in america, specifically oregon for a decent price
How bad is cable internet? I'm thinking of getting xfinity internet, but I've heard some bad stories about cable internet and specifically about xfinity. Should I just get dsl internet with 12mbps? Or cable internet with 25 mbps?
Is it consistent at all?
Windows 10 - All Secret Folders!
Windows 10 - All Secret Folders!
Action Center.{BB64F8A7-BEE7-4E1A-AB8D-7D8273F7FDB6}
Backup and Restore.{B98A2BEA-7D42-4558-8BD1-832F41BAC6FD}
Credential Manager.{1206F5F1-0569-412C-8FEC-3204630DFB70}
Devices and Printers.{A8A91A66-3A7D-4424-8D24-04E180695C7A}
Display.{C555438B-3C23-4769-A71F-B6D3D9B6053A}
HomeGroup.{67CA7650-96E6-4FDD-BB43-A8E774F73A57}
Notification Area Icons.{05d7b0f4-2121-4eff-bf6b-ed3f69b894d9}
Recovery.{9FE63AFD-59CF-4419-9775-ABCC3849F861}
RemoteApp and Desktop Connections.{241D7C96-F8BF-4F85-B01F-E2B043341A4B}
Speech Recognition.{58E3C745-D971-4081-9034-86E34B30836A}
Troubleshooting.{C58C4893-3BE0-4B45-ABB5-A63E4B8C8651}
Administrative Tools.{D20EA4E1-3957-11d2-A40B-0C5020524153}
All Tasks (Control Panel).{ED7BA470-8E54-465E-825C-99712043E01C}
AutoPlay.{9C60DE1E-E5FC-40f4-A487-460851A8D915}
BitLocker Drive Encryption.{D9EF8727-CAC2-4e60-809E-86F80A666C91}
Computer Folder.{20D04FE0-3AEA-1069-A2D8-08002B30309D}
Default Programs.{17cd9488-1228-4b2f-88ce-4298e93e0966}
Ease of Access Center.{D555645E-D4F8-4c29-A827-D93C859C4F2A}
Font Settings.{93412589-74D4-4E4E-AD0E-E0CB621440FD}
Get Programs.{15eae92e-f17a-4431-9f28-805e482dafd4}
Manage Wireless Networks.{1FA9085F-25A2-489B-85D4-86326EEDCD87}
Network and Sharing Center.{8E908FC9-BECC-40f6-915B-F4CA0E70D03D}
Network Connections.{7007ACC7-3202-11D1-AAD2-00805FC1270E}
Network Folder.{208D2C60-3AEA-1069-A2D7-08002B30309D}
Parental Controls.{96AE8D84-A250-4520-95A5-A47A7E3C548B}
Personalization.{ED834ED6-4B5A-4bfe-8F11-A626DCB6A921}
Power Options.{025A5937-A6BE-4686-A844-36FE4BEC8B6D}
Programs and Features.{7b81be6a-ce2b-4676-a29e-eb907a5126c5}
Sync Center.{9C73F5E5-7AE7-4E32-A8E8-8D23B85255BF}
System.{BB06C0E4-D293-4f75-8A90-CB05B6477EEE}
User Accounts.{60632754-c523-4b62-b45c-4172da012619}
Windows Firewall.{4026492F-2F69-46B8-B9BF-5654FC07E423}
GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}
whatsapp spying
hey anons my friend know a way to spy on anyone by only his number He didn't want to tell me the whole secret to me but told me he uses Spyware script autoresponder by sending a sms to the victim with a kind of code and Then he will have the access to go get the whatsapp database and coby it and but it in bluestacks and it works
Infographics for Newbies
Hi, for someone who is a complete newbie to all of this, do you have any info graphics or simple guides on how to get started with general internet security, how to easily get proxies running, what you can/can't do on Tor (how does one for example handle downloads and torrents) ect?
Thanks in advance, and it's great this board exist!
ASHLEY MADISON CHEATERS LIST
ASHLEY MADISON CHEATERS LIST
Here it is, the complete list of Ashley Madison adulterers, which will provide many, MANY years of hometown FUN, FUN, FUN, discerning the local philanderers!!! DOWNLOAD NOW!!!
AMCL.zip 847.6 MB
https://mega.nz/#!5pB3QZJD!oIaWujqkqAiOqtvRPzgu6Oh6y4c6-4qor_J-qaUfPGg
THIS ONE IS CREEPY: PROOF WINDOWS 10 IS CLANDESTINE BEYOND ALL DOUBT
THIS ONE IS CREEPY: PROOF WINDOWS 10 IS CLANDESTINE BEYOND ALL DOUBT:
Anonymous wrote:
I did test with the telemetry websites you listed (see below), I blocked them in my firewall, as an outgoing rule for each one. I could not go online after that!! I unblocked them again, and tried blocking one by one, no matter what, even with only one of them blocked, I could not connect to the internet!:
df.telemetry.microsoft.com
reports.wes.df.telemetry.microsoft.com
cs1.wpc.v0cdn.net
vortex-sandbox.data.microsoft.com
pre.footprintpredict.com
oca.telemetry.microsoft.com
oca.telemetry.microsoft.com.nsatc.net
vortex-sandbox.data.microsoft.com
pre.footprintpredict.com
i1.services.social.microsoft.com
i1.services.social.microsoft.com.nsatc.net
telemetry.appex.bing.net
telemetry.urs.microsoft.com
cs1.wpc.v0cdn.net
statsfe1.ws.microsoft.com
vortex.data.microsoft.com
vortex-win.data.microsoft.com
telecommand.telemetry.microsoft.com
telecommand.telemetry.microsoft.com.nsatc.net
oca.telemetry.microsoft.com
oca.telemetry.microsoft.com.nsatc.net
sqm.telemetry.microsoft.com
sqm.telemetry.microsoft.com.nsatc.net
My response: You don't have to hit any address first to then hit a web site, The above is not possible absent a sabotaged operating system.
Whonix
What is Whonix?
Whonix is a GNU/linux disto intended to allow you to communicate over the Internet anonymously using tor. The benefit of Whonix over using the tor browser bundle alone is that Whonix forces ALL your traffic over the tor network and does not allow connections that bypass tor. This has the benefit of being able to use programs other then the web browser (irc, IM, jitsi, etc.) without having to worry about DNS leaks, proxy compliance and other connection leaks that could potentially compromise your anonymity, this also provides a level of protection from certain types malware attacks from revealing your identity by ensuring that any malware could only connect out via tor.
Whonix is distributed as two virtual machine (virutalbox) images, a 'Gateway' and a 'Workstation'. The workstation build is configured to route all traffic to the gateway where tor runs, this means that even if an attacker gains access to run code on your workstaiton through malware, a browser exploit or other method, there is still no way for them to disable tor or change your firewall settings to allow a direct connection to the Internet that could revel your identity.
Whonix provides stream isolation, meaning that different applications use different tor circuits to prevent identity correlation. See https://www.whonix.org/wiki/Stream_Isolationc for more info on stream isolation and a list of what applications are preconfigured to use it and how to enable it on others including one's you install yourself. You can connect multiple Workstations to the gateway for complete isolation.
The official Whonix build is distributed as two Debian based VirutalBox images ,KVM setup instructions can be found here https://www.whonix.org/wiki/KVM , for a QubesOS based solution see https://www.whonix.org/wiki/Qubes
Whonix Links:
https://www.whonix.org/wiki/ - Great Resource for general tor info
RETROSHARE
Retroshare is a free software, completely decentralized, secure and (optionally with v0.6 + tor) completely anonymous 'friend2friend' network and application. Features include, messaging, filesharing (between only specific or all friends openly and publicly anonymously), forums, irc style chat and more through the use of plugins. Retroshare is a friend2friend network meaning you only ever connect directly to the people in you friends list and may connect to your friend's friends and so on through anonymous tunnels. Retroshare utilizes opnPGP and openSSL for authentication and encryption. Version 0.6 which is incompatible with version 0.5 introduces many new features including the ability to create multiple 'sub identities' so that you can create multiple identities for use in forums and chat without having to create a new account. Versions 0.6 also has support for tor which can work in two ways, by using tor only to connect to other people running tor hidden node while allowing 'clearnet' connections to yourself, or by running in hidden mode yourself so that people in your friends connect to you using your tor hidden service address instead of you ip address, this is the recommenced mode of operation for people who want to remain anonymous from people in their friends list.
JOIN OUR RETROSHARE+TOR COMMUNITY
Watch the getting started video https://d.maxfile.ro/nkygkxmwmh.webm
or
http://udgdahofbq52bzxk.onion/img/how_to.webm
Join the /netplus/ chatserver http://udgdahofbq52bzxk.onion/
And swap your certificate here >>6
See also the v0.5 certificate swap thread here >>8
Paranoid Anons /Tech/ Guide V.2 for my friends at /netplus/
I'm passing this on to /netplus/ because I don't want you to be left out and uninformed.
Dumping massive /tech/ guide and redpill
Warning:
following these instructions may severely break your computer and firefox and may ruin your privacy and your entire life.
do any of these things at your own risk.
I am not responsible for anything bad that happens to you.
Some of these things DO mess up your ability to use 8chan and screw up the way the site functions so pick and choose carefully, use saves/different profiles or something.
This may void your warranty.
Ask a professional and the mozilla team before doing anything.
You have been warned.
first open about:config
to protect against SSLv3 exploit you can use the mozilla addon "SSL version control"
or set security.tls.version.min = 1 in about:config for Mozilla Firefox.
To restore change the value back to the security.tls.version.min = 0. That's it.
In Mozilla Thunderbird you can set it also in about:config, which You can find in: Tools → Options → Advanced → General → Config Editor.
Always use a firefox fork that gets regular good security updates. never use a main distribution. the underdogs are your friends.
remember to explore "about:permissions" as well.
(search these so they come up)
network.http.pipelining TRUE
network.http.pipelining.ssl TRUE
network.http.proxy.pipelining TRUE
network.http.max-persistent-connections-per-proxy Right click, select modify, set it to 8-10
network.http.max-persistent-connections-per-server set it to 8-10 too
network.http.max-connections-per-server set it to 16
network.http.pipelining.maxrequests also set to be 8
network.http.redirection-limit Set to 3
network.dns.disableIPv6 Set to true
network.http.fast-fallback-to-IPv4 Set to false
dom.popup_maximum set to 3
network.prefetch-next FALSE (disables prefetching)
network.dns.disablePrefetch TRUE (extra layer of telling fox to not prefetch)
(REMEMBER TO USE A FORK OF FIREFOX! main firefox is SJW NAZI BOTNET GOOGLE NOW!)
icecat/palemoon/seamonkey/iceweasel/ are FORKS! don't use google chrome or other junk browsers!
disable google geolocation and reporting:
dwhelper.social-share.service.google.enabled FALSE
dwhelper.social-share.service.google_buzz.enabled FALSE
geo.enabled FALSE
geo.wifi.logging.enabled FALSE
geo.wifi.uri (delete the value)
browser.safebrowsing.appRepURL (delete the value)
browser.safebrowsing.debug FALSE
browser.safebrowsing.enabled FALSE
browser.safebrowsing.gethashURL (delete the value)
browser.safebrowsing.malware.enabled FALSE
browser.safebrowsing.malware.reportURL (delete the value)
browser.safebrowsing.reportURL (delete the value)
browser.safebrowsing.updateURL (delete the value)
services.sync.prefs.sync.browser.safebrowsing.enabled FALSE
services.sync.prefs.sync.browser.safebrowsing.malware.enabled FALSE
(take a break here and read how to fix the internet for everyone)
- install TOR software on EVERY router, complete unfiltered
- force EVERYONE to use PGP, no exceptions
- forbid non open source software in essential parts of using the internet (webbrowser, mail client…)
- build a company which is only there for pen-testing, if something is found, they have to call/mail the website owner and inform him
- build a company which is completly transparent, the only thing they do is build network hardware, everyone has the right to look into their files/production processes to verify there are no backdoors in the hardware
- same for computer manufacturers
- ISPs are forbidden to give "middle traffic speed", but they have to give you a minimum traffic speed for every time
(break is done, keep on going!)
media.peerconnection.enabled FALSE
browser.search.suggest.enabled DISABLE IT
Turn off the new tab page, and makes it about:blank:
browser.newtab.url => about:blank
Turn off file virus-scan after download:
browser.download.manager.scanWhenDone => false
freenet?
found this cool program says it's different than tor… just wanted to know if it's "more secure" it's also open source (java)
Link to project https://freenetproject.org/
meshnet general
mng - mesh networking general
.- _ _ -.
/ / \ \
( ( (` (-o-) `) ) )
\ \_ ` -+- ` _/ /
`- -+- -`
I
/|\
/\|/\
/|-V-|\
_/-\/_\/-\_
/ mng \
catch-all for mesh network hardware and protocol discussion, and perhaps some info about services that aren't covered in other threads
bring questions and we'll try to answer them as best we can
>>intro<<
http://www.fastcompany.com/3044686/mesh-networks-and-the-local-internet-movement
>> news <<
Cubans build private mesh network: https://archive.is/CbTUb
Mesh networking coming to Bluetooth LE: http://www.v3.co.uk/v3-uk/news/2396896/bluetooth-to-get-mesh-networking-capability-for-the-internet-of-things1
>> topics <<
protocols
-> olsrd, batman-adv, ham-net, 802.11s
decentralized services
-> hyperboria, namecoin, diaspora, tahoe-lafs, forban
hardware
-> custom rigs, ubiquiti products, tv whitespace gear, mesh potato
-> low-cost/low-power: ESP8266, zigbee, etc
implementations
-> project byzantium, dd-wrt hacking, broadband-hamnet, meshlocals
>> diy <<
make your own wifi throwie: https://youtu.be/fQM-GHY6VJ8
THIS ONE IS CREEPY: PROOF WINDOWS 10 IS CLANDESTINE BEYOND ALL DOUBT
THIS ONE IS CREEPY: PROOF WINDOWS 10 IS CLANDESTINE BEYOND ALL DOUBT:
Anonymous wrote:
I did test with the telemetry websites you listed (see below), I blocked them in my firewall, as an outgoing rule for each one. I could not go online after that!! I unblocked them again, and tried blocking one by one, no matter what, even with only one of them blocked, I could not connect to the internet!:
df.telemetry.microsoft.com
reports.wes.df.telemetry.microsoft.com
cs1.wpc.v0cdn.net
vortex-sandbox.data.microsoft.com
pre.footprintpredict.com
oca.telemetry.microsoft.com
oca.telemetry.microsoft.com.nsatc.net
vortex-sandbox.data.microsoft.com
pre.footprintpredict.com
i1.services.social.microsoft.com
i1.services.social.microsoft.com.nsatc.net
telemetry.appex.bing.net
telemetry.urs.microsoft.com
cs1.wpc.v0cdn.net
statsfe1.ws.microsoft.com
vortex.data.microsoft.com
vortex-win.data.microsoft.com
telecommand.telemetry.microsoft.com
telecommand.telemetry.microsoft.com.nsatc.net
oca.telemetry.microsoft.com
oca.telemetry.microsoft.com.nsatc.net
sqm.telemetry.microsoft.com
sqm.telemetry.microsoft.com.nsatc.net
My response: You don't have to hit any address first to then hit a web site, The above is not possible absent a sabotaged operating system.
PGP ENCRYPTION MADE EASY
OpenPGP (Pretty Good Privacy) is a set of standards and protocols for encrypting and signing messages using private and public keys. PGP is the most popular method of encrypting email messages. There are multiple PGP implementations both free and proprietary, I will be discussing GPG (GNU Privacy Guard).
PGP works by generating two associated keys, a private key that you keep to yourself, this is used to sign messages and to decrypt messages that other people have encrypted for you using your public key which you distribute, using your public key people can encrypt message that can then only be decrypted using your private key and they can also use your public key to verify messages that have been signed with your private key.
For more information about PGP, GPG and Public-key cryptography see the following links.
http://www.openpgp.org/about_openpgp/
https://www.gnupg.org/documentation/index.html
https://en.wikipedia.org/wiki/Pretty_Good_Privacy
https://en.wikipedia.org/wiki/Public-key_cryptography
The following guide is for people using GNU/Linux and I will be using the seahorse frontend, KDE users will prefer KGPG. Windows users can use gpg4win http://www.gpg4win.org/
Mac users can probably do something to but it would likely involves penises, and not in the good way.
Onion (aka. tor hidden service) Links
This thread is for sharing tor hidden service (.onion) links. Please post links in the format:
name – URL – Description
Do NOT post links to material that is illegal in the United States.
Check to see if a link is already posted before posting.
When the thread fills up I will aggregate everything somewhere before renewing it
TOP LINKS
Clear Web Search Engines
Duckduckgo – 3g2upl4pq6kufc4m.onion – this is ddg's hidden service address. Site is the same as duckduckgo.com
searx from La Quadrature du Net – 3g2upl4pq6kufc4m.onion – searx is a free software 'meta' search engine that proxies your searches and provies results from multiple popular search engines, this instance is hosted by La Quadrature du Net
searx from anon - 7jwxg5rakyfvikpi.onion – same as above, the admin does not provide any details about themselves
Hidden Service Search Engines
grams – grams7enufi7jmdl.onion – searches many different market/auction sites at once
Not Evil – hss3uro2hsxfogfq.onion – a hidden service search engine
Image Boards
8chan – fullchan4jtta4sx.onion – dank memes
overchan – 2nq3v6fnrwp72nao.onion – links to overchan nodes including tor hidden service sites and eeepsites (i2p)
Email and Chat (Remember to always use pgp and OTR to encrypt your communications)
tormail – jmcz7xp2kszu6vba.onion – email provider with .onion servers. You get two addresses attached to your account, a @tormail.net and a @mailshow34bxmjmd.onion
sigaint – sigaintevyh2rzvw.onion – same as above
torbox – torbox3uiot6wchz.onion – torbox is a tor only mail service that will route mail addressed only to other tobox users and a select number of other tor routable email providers listed here torbox3uiot6wchz.onion/relay-en.php
'Wikis' directories and lists
AYB wiki - allyour4nert7pkh.onion:88/wiki/index.php?title=Main_Page – wiki formated site with many hidden serivec links.
PrivateFox Bookmarks – pfoxkj3p65uyc5pe.onion/bookmarks.htm – a list of the sites that are included bookmarked with the PrivateFox FF profile.
Windows 10 BUSTED, AND IT IS CREEPY
Windows 10 BUSTED, AND IT IS CREEPY
Yeah, I guess HILLARY'S E-MAILS PROVED THE NSA AS A SOURCE IS NOT GOOD ENOUGH, because using them can land you in jail. THE NEW CONSULTEE IS (PROBABLY) MICROSOFT, why have your goons infiltrate an old outdated battleship like the NSA when that can backfire?
Why does Microsoft have a right to ALL text I type, the first 35 megabytes of video from a web cam every time it is turned on, and everything that gets picked up by the microphone? Ha, they don't BECAUSE I DO NOT USE THEIR PRODUCTS, if you have not woken up yet and still do, here is what now happens:
All text typed on the keyboard is stored in temporary files, and sent (once per 30 mins) to:
oca.telemetry.microsoft.com.nsatc.net
pre.footprintpredict.com
reports.wes.df.telemetry.microsoft.com
This will allow Microsoft and the greater Jewish community to have a way to steal every joke, every poem, every intellectual endeavor you ever create and have it copyrighted before you even stop typing.
i2p
The Invisible Internet project (I2p) is a low latency 'garlic routing' network intended to provide anonymous and censorship resistant communication between users of the network. Unlike tor, i2p is not intended to facilitate access to the 'clear net' and, although this is possible through use of an 'outproxy' bridge to the internet, tor is more suited to this use. Popular uses for i2p include anonymous websites, irc chat, 'email' style messaging, bittorrent and other p2p file sharing.
You can find a list of supported applications here https://geti2p.net/en/docs/applications/supported#decentralized-file-storage
To get started with i2p download the installation package from https://geti2p.net/en/download and follow the instructions on that page to to up and running.
A quick and dirty getting started might look like.
1. Download i2p from here https://geti2p.net/en/download and installation
2. Start i2p using “i2prouter start” in a terminal
3. In your browser head over to the router console at http://127.0.0.1:7765 and make sure everything is working, forward ports if necessary and adjust the bandwidth setting
4. Configure your browser proxy setting to point at the router “ http = 127.0.0.1:4444” https = “127.0.0.1:4445”
5. You can now browse eepsites
6. You can find some basic links on the router console page. At the very least you probably want to install noscript (before changing the proxy settings) or disable javascript altogether
For more info about i2p see
Newbie needs some help
I don't know where to start. I am not tech savvy, but I want to learn more about the differences between networks, torrents, ect.
Also, is TOR safe? I thought some hackers managed to break into TOR months ago. And I thought the NSA is trying to crack TOR (ex: Egotistical Giraffe)?
Also, what are the pros/cons for i2p and TOR and how do they compare?
Personal clouds
Hi /netplus/, NSA here. It seems that much of this board is dedicated to anonymity and encryption tools which enable oneself to be a passive consumer of the wide variety of pre-filtered content available on this and several other websites. It seems to me that your cause would be much better served by informing people how they might create and share fresh content amongst themselves. Naturally, this will require them to be able to host non-anonymous, non-encrypted websites which anyone can access (much like the site you're reading now), as anyone who is accustomed to reading secure sites would be using said sites right now instead of this one.
With this in mind, this thread is for general discussion of services which one can host on their own residential network.
Bitmessage.org
"Bitmessage is a P2P communications protocol used to send encrypted messages to another person or to many subscribers. It is decentralized and trustless, meaning that you need-not inherently trust any entities like root certificate authorities. It uses strong authentication which means that the sender of a message cannot be spoofed, and it aims to hide "non-content" data, like the sender and receiver of messages, from passive eavesdroppers like those running warrantless wiretapping programs."
What do you think? Is it really as anonymous and secure as they claim? Does it have any future?
I created a chan with the name /netplus/ so that you can try it out: BM-2cX2yLSqZ5yVsN3y9XNr97sHFgTNcqW7WH
VPN
VPN (Virtual Private Network) is a term for a range of technologies that allow you tunnel private network (LAN) connections over another network (eg, the Internet). This allows you to communicate with machines over the Internet as if they were on your local network.
Popular VPN technologies include;
PPTP ← broken
Ipsec
OpenVPN
A popular use for VPNs is the use of “VPN service providers”, these are companies that (for a fee) allow you to tunnel all or some of your usual Internet traffic though them by use of a VPN. This allows you to shift the trust you give to your local ISP to another ISP (VPN provider) of your choice. Reasons someone might find this useful is if their own ISP engages in logging or data retention or if they cooperate with requests from “rights holders” to provide the names of “copyright infringers”. The use of VPN services with shared ips might also help you to obscure your identity from advertisers and trackers. VPN service providers should not be considered a viable way to achieve anonymity from organizations such as the NSA/CCHQ/CSS/DSD/BND or FBI/INTERPOL. Even if a provider is able to stand up to such an adversary both legally and technically there is still nothing stopping them from simply monitoring the upstream provider and correlating the traffic going in to the traffic going out over the single hop, this is trivial. There is also evidence that cryptographic attacks exist, though the technical details are lacking or absent, seems one of their most popular methods is to simply 'go around' by stealing keys and other indirect methods.
When choosing a VPN service provider the most important things to look at (aside from price, b/w and datacaps) are;
The privacy policy: this will lay out what information they keep about you and how they can use it.
The Location: Depending on the location, both where the business is based and where the servers are physically located, certain laws and regulations may apply to what data they are required to log, for example many countries have mandatory data retention laws that require isps to log everything and keep it for a certain length of time. Other countries such as the United States have no mandatory data retention law (?do they now have this, or is that just for phone calls?) but a court can require a specific isp to start logging in secrete regardless of what is stated in the privacy policy.
When choosing a provider make sure they use OpenVPN and do not use their custom clients, these are usually closed source and entirely pointless, just use the free software OpenVPN client software https://openvpn.net/index.php/access-server/docs/admin-guides-sp-859543150/howto-connect-client-configuration.html
There are various 'lists' floating around of 'the best' or 'the most private' providers, I don't know how much it costs to get on one of these lists but it's probably not a lot, I will not make any recommendations (unless someone wants to pay me too :^) ) on providers myself, any of the big name providers should offer decant speeds and will prevent threatening letters from 'rights holders' turning up in the post.
A popular alternative to using a VPN service provider is to rent a VPS (virtual private server) or similar hosting and configure that as a proxy (using OpenVPN or socks5 or similar). The same theme applies here, read the privacy policy of the hosting provider and understand the limitations. Using a dedicated server (or VPS) to proxy your traffic in this way will differ in effect to using a VPN service provider in that you will not be using a shared ip addresses, so it may be more easy to correlate your various communications to one person (you). This may also help in some way to avoid mass collection/correlation of your traffic because you will not be a known VPS provider therefore perhaps less of a target.