We are in imminent danger of being shut down on the clearnet. Copy and paste this entire post to a text document. Multiple sites have had their domains seized and we are next on the chopping block. We need to make preparations to go to war with the entire internet right now.
8ch's onion site. When the domain goes down point the Tor browser to this address and you will be able to access the site. oxwugzccvk3dk6tj.onion
Install AdNauseam which is much like Ublock Origin and it will send false clicks to advertisers. In the settings make sure to enable 'Click Ads' and set the slider between 'sometimes' and 'always' so spam detection systems don't block you. github.com/dhowe/AdNauseam
In the event that the Samson Option goes code red (8ch.net is shut down) we will holocaust the ad revenue of the entire internet and spread chaos everywhere. This thread will be for planning. We won't go meekly into the night.
You have no idea how TOR works. How will they ban us, fag?
Jason Ward
do you have any idea what TOR is?
Noah Rodriguez
Heiled This aggression will not fucking stand
William Rivera
...
Ryan Martin
...
Asher Flores
No.
Owen Rodriguez
been saying for years we need an i2p access point to
Gabriel Nguyen
Try sucking more jewish cock, please. We don’t believe you yet.
Grayson Reed
They can shit out hollow messages of progressive tolerance they want. The Tor jews (and they ARE almost literally all jews) cannot shut down a site on Tor.
Ian Ward
you are beyond stupid
Blake Walker
Cock, mouth, harder. You know the drill.
Gavin White
The FBI operated the largest human trafficking related onion for years - likely even decades. In Digital Forensics you are literally taught about this as if it's a thing to be proud of. THE TOOL'S GREATEST LIMITATION IS THE USERS IMAGINATION
Brandon Kelly
Why are you spreading misinformation? The Tor Project can't shut us down. It's just impotent hang wringing. Tor is also free software so even if they were sabotage the network to shut us down we can fork it and so would most people use the fork.
Tor is a tool for anonymity and bypassing censorship. To add censorship to Tor defeats the entire purpose of it and makes the network less secure and more open to attack.
David Johnson
It's not, prove otherwise. You can't.
Easton King
If you knew how to read, you'd realize that they say that they hate people like us using TOR but admit they can't do anything about it. Don't talk shit about things you do not understand. How is it compromised? Go on, tell us, show us proof.
Ayden Jones
Slurp it down, yid.
Liam Richardson
...
Ryan Morales
"Give me control of a nation's money and I care not who makes the laws." t. Mayer Amshekel Bayer
Let's rephrase for modernity: "Give me control of the world's information exchange and I care not who makes the laws." t. ICANN
Liam Wilson
okay, you're an acute moron/goon/shill/disinfo-agent reported
Alexander Watson
Sage.
Juan Gomez
Yes, we all know the Tor nodes are run by the CIA niggers. That only matters for illegal content. DS is not illegal content.
Caleb Clark
They are not all run by CIA. They have some nodes and so called "knots" and if all your traffic goes through such a knot then yeah, you are exposed.
Brandon Foster
Jewgle TOR compromised and tell us what you find.
Asher Roberts
Yet.
Benjamin Wood
He is spreading disinformation to keep people from doing things that might actually help themselves. If 8ch goes off the normie web (((they))) want people to just give up.
imageboards aren't getting shutdown bc the majority of posters are weebs user. but, we should still shoah the whole fucking internet anyway
also, there's a DEFCON i saw back in 2013-14 (it wasn't very old) that said there's a way to shut down the whole internet. its possible to "incept"/mememagick the suggestion into some Holla Forumstard who might do that instead of/before an hero
Elijah Harris
A shutdown of the entire internet might be a good way to wake up lemmings but might do more harm than good.
Easton Rogers
What about ZeroNet/ZeroChan with tor? It's distributed hosting, can't be taken down.
William Hughes
This. zeronet does have potential
Matthew Smith
(((they))'ll just spin it against us like they always do, coddling the normies and sjws with oily fucking lies.
Benjamin Morris
Never claimed, implied, nor insinuated that tor was like credit - used fallacious logic to reach a conclusion that used in an argument related to the subject ICANN is doing what the red shield did to usury to the free flow of information, but this isn't new news. hence the sage Refer to the above post where the FBI operated the largest child pornography distribution onion - there was new content added daily according to LEO sources - take a digital forensics class, it's all about child pornography, how to identify sources (largely onion and shitskin), and enter it into the chain of evidence for a Future Case(tm) where it sits in a database that constantly crawls looking for images with the same hash. All that is needed is to create a point of access and find the relevant exploit and sit back and collect the thoughtcrime. The largest human trafficking rings operate with virtual impunity because they are the law. "How can we arrest someone we've been paying for the past few months or even years for a crime they were under orders to commit?"
David Hernandez
entered too soon basically tor has it's bad points but like anything it's prone to infiltration. just be smart about what you look for.
Juan Garcia
Oh you made multiple thread.
Dominic Perry
This. Neat consequence of FOSS is if you piss off the users enoughf the project just gets forked by a handful of users. The size of the project doesen't matter, (libreoffice comes to mind). There are much better things than TOR, but none remotely as accessible to a casual with an afternoon.
Yer post hurt, also the internet is only as big as you are aware, for john q 8ball & sodomy this happened about 10 years ago, for some of us it's not really possible (see above), but i'll give you there are fewer entering that class than leaving, and thats accelerating now that to a generation a home pc is an (((iPad)))
Bentley Rogers
(checked) We do it when the kikes try to crash the market then.
Christian Evans
No you are an actual shill. It's possible to find out users on tor, but you cannot shut down a Tor site.
Jonathan Kelly
sadly I don't think the site owners can nto i2p
Tor and Onion Routing are both anonymizing proxy networks, allowing people to tunnel out through their low latency mix network. The two primary differences between Tor / Onion-Routing and I2P are again related to differences in the threat model and the out-proxy design (though Tor supports hidden services as well). In addition, Tor takes the directory-based approach - providing a centralized point to manage the overall 'view' of the network, as well as gather and report statistics, as opposed to I2P's distributed network database and peer selection.
The I2P/Tor outproxy functionality does have a few substantial weaknesses against certain attackers - once the communication leaves the mixnet, global passive adversaries can more easily mount traffic analysis. In addition, the outproxies have access to the cleartext of the data transferred in both directions, and outproxies are prone to abuse, along with all of the other security issues we've come to know and love with normal Internet traffic.
However, many people don't need to worry about those situations, as they are outside their threat model. It is, also, outside I2P's (formal) functional scope (if people want to build outproxy functionality on top of an anonymous communication layer, they can). In fact, some I2P users currently take advantage of Tor to outproxy. Comparison of Tor and I2P Terminology
While Tor and I2P are similar in many ways, much of the terminology is different. Tor I2P Cell Message Client Router or Client Circuit Tunnel Directory NetDb Directory Server Floodfill Router Entry Guards Fast Peers Entry Node Inproxy Exit Node Outproxy Hidden Service Hidden Service, Eepsite or Destination Hidden Service Descriptor LeaseSet Introduction point Inbound Gateway Node Router Onion Proxy I2PTunnel Client (more or less) Onion Service Hidden Service, Eepsite or Destination Relay Router Rendezvous Point somewhat like Inbound Gateway + Outbound Endpoint Router Descriptor RouterInfo Server Router Benefits of Tor over I2P
Much bigger user base; much more visibility in the academic and hacker communities; benefits from formal studies of anonymity, resistance, and performance; has a non-anonymous, visible, university-based leader Has already solved some scaling issues I2P has yet to address Has significant funding Has more developers, including several that are funded
Carson Turner
cont.
More resistant to state-level blocking due to TLS transport layer and bridges (I2P has proposals for "full restricted routes" but these are not yet implemented) Big enough that it has had to adapt to blocking and DOS attempts Designed and optimized for exit traffic, with a large number of exit nodes Better documentation, has formal papers and specifications, better website, many more translations More efficient with memory usage Tor client nodes have very low bandwidth overhead Centralized control reduces the complexity at each node and can efficiently address Sybil attacks A core of high capacity nodes provides higher throughput and lower latency C, not Java (ewww)
Benefits of I2P over Tor
Designed and optimized for hidden services, which are much faster than in Tor Fully distributed and self organizing Peers are selected by continuously profiling and ranking performance, rather than trusting claimed capacity Floodfill peers ("directory servers") are varying and untrusted, rather than hardcoded Small enough that it hasn't been blocked or DOSed much, or at all Peer-to-peer friendly Packet switched instead of circuit switched implicit transparent load balancing of messages across multiple peers, rather than a single path resilience vs. failures by running multiple tunnels in parallel, plus rotating tunnels scale each client's connections at O(1) instead of O(N) (Alice has e.g. 2 inbound tunnels that are used by all of the peers Alice is talking with, rather than a circuit for each) Unidirectional tunnels instead of bidirectional circuits, doubling the number of nodes a peer has to compromise to get the same information. Counter-arguments and further discussion here. Protection against detecting client activity, even when an attacker is participating in the tunnel, as tunnels are used for more than simply passing end to end messages (e.g. netDb, tunnel management, tunnel testing) Tunnels in I2P are short lived, decreasing the number of samples that an attacker can use to mount an active attack with, unlike circuits in Tor, which are typically long lived. I2P APIs are designed specifically for anonymity and security, while SOCKS is designed for functionality. Essentially all peers participate in routing for others The bandwidth overhead of being a full peer is low, while in Tor, while client nodes don't require much bandwidth, they don't fully participate in the mixnet. Integrated automatic update mechanism Both TCP and UDP transports Java, not C (ewww)
Other potential benefits of I2P but not yet implemented
…and may never be implemented, so don't count on them!
Defense vs. message count analysis by garlic wrapping multiple messages Defense vs. long term intersection by adding delays at various hops (where the delays are not discernible by other hops) Various mixing strategies at the tunnel level (e.g. create a tunnel that will handle 500 messages / minute, where the endpoint will inject dummy messages if there are insufficient messages, etc) geti2p.net/en/comparison/tor
uh what? so, here's how it works, in 5 yr old memory lamen's speak. apparently there's a bunch of old hardware out there, huge servers, that if you scream at them, they scream back, just a little louder. so, what you do is spoof your ip so they think you're another one of them, then they go apeshit into a screaming match and clog up the internet backbone. dude in the DEFCON vid gave all the details.
obviously, i don't suggest doing it. this is just for scientific purposes only
Anthony Morales
OY VEY
Ryder Sanders
I use both Tor and I2P. Tor provides better anonymity and is faster. I2P also isn't user friendly. The most common point of attack is the browser and there's no I2P browser bundle. I had to manually configure the Tor browser to work with I2P. A lot of people will configure their default browser to browse I2P and that's a huge mistake. If you don't know what you're doing it's better to not use I2P.
Thomas Gutierrez
Tom Metzger's website is down to.
Cameron Adams
That settles it, no install
Isaiah Sullivan
Lists of a few books to download in case we're shutdown that will help you retaliate against the tech corps:
NOTE: Do not install it into your tor browser. It can help fingerprint you and partly deanonymize you
Bentley Phillips
Don't install it at all, lead dev is a kike
Leo Flores
I can’t because they block TOR. I guess it is because CIA and NSA know already everything so they don’t need the Jewgle honey pot.
Zachary Allen
The only difference between Tor and the normal internet is that on Tor other people can transfer cp through your machine. It's not anonymous and it relies on the normal internet to communicate, moreover it's an alphabet-run program with a bunch of (((useful idiots))) on the dev team who are rabid sjws.
Cooper Perry
Holy fuck this is the worst shilling I've seen in quite some time. Go try again in one of the other threads faggot.
How does Tor work? "Tor aims to conceal its users' identities and their online activity from surveillance and traffic analysis by separating identification and routing. It is an implementation of onion routing, which encrypts and then randomly bounces communications through a network of relays run by volunteers around the globe."
Tyler Sanders
Wrong. Packets of data may pass through a node close to you, but that's as close as TOR comes to de-anonymizing anyone.
Nolan Jenkins
They want relays to be able to blacklist certain .onion adresses and to have a preconfigured blacklist come with Tor
Juan Rogers
A) They do this by routing traffic through user's computers on the node. I.E. user A makes a request to server A, that request hops through the personal computers of user B and user C which have nothing to do with the request. B) This means if you're user B and user A downloads cp, it goes through your machine. C) This means the (((elite))) can use Tor to trade cp without being caught. D) Because while the alphabet agencies have all the exit nodes and ISP-level gateways covered (i.e. they can sync up traffic from user A to server A and see who actually made the request) there is enough deniability to protect their (((buddies))). E) While at the same time being able to pinpoint anyone they actually want to find (you.)
Ayden Stewart
Neat thing about defcon (it was good this year) is they highlight new ways of doing things, once made so massivly public the people on the other side repair these things (how's that for 5yo?)
DDoS doesen't work from your crap colo or AWS rig any more than pinging people off IRC worked with your modem. They used emerging IoT things (cheap china cameras and such), and a LOT of them globally. It made an impact, far from stopping the train. As a result john q traps-aren't-gai's new modem from his ISP now runs NAT by force, basic passwords for things, and a basic firewall that surpasses what the high school enthusiast had at home when this was reported on at defcon all those years ago. Because of the age of this issue with yer fridge and microwave's unquenchable desire for pizza it now has fallen on many ISPs to try and address this, hence one of the deeper points about internet censorship by throttling and such.
Gabriel Hughes
I2P has the same downside as FreeNet: no one uses it.
Ethan Kelly
Are you retarded or just really bad a shilling?
No one else's traffic passes though your machine unless you are a relay or exit node.
If your just a normal client then it works exactly like
TAILS and TOR browser and just clients. Your not becoming a relay unless you go and set that up separate. You have to go and set that up. Its not default.
But no one has to take my word for it. TOR is open source and well documented. There are countless papers on how it works. People can go look for themselves.
James Parker
I have 2 accounts on SF and around 1,000 posts over several years, how fucked am I?
Carson King
The research paper he linked to is long dead, but you can get the thrust of the article from his comments. Basically, high-bandwidth TOR nodes near Langley have a tendency to bounce traffic between each other. cryptogon.com/?p=624
I could believe that the devs don't actually have a backdoor in the code. Who runs the exit nodes, though? Who pays for the bandwidth?
Here's some back of the envelope math for you:
Let's assume 0.1% of Americans use TOR at all Let's also assume that TOR node operators can purchase bandwidth for about the same price as anybody else in the USA. How much bandwidth does an active user need? 1 Mbps is pretty good, but not all users are active at once. Let's say, peak usage is only 10% of all users. We're onion routing, right? So we need an entry, multiple relays and an exit node for each connection. Let's just call it 5 nodes.
So what do those monthly costs look like? 320,000users x $10/Mbps-month x 100kbps/user / 1,000kb/Mb x 5 = $1,600,000/month
Under our assumptions, that would mean $19.2M every year in operating costs, which are supposedly supported by volunteers and donations. I think everything I've assumed is fairly conservative and is certainly accurate enough to get us within an order of magnitude (which is to say, TOR probably costs 10s of millions annually to run).
How much money do you donate to the TOR foundation? None? Can you think of anybody who has? Do you know anybody who actually hosts a relay?
If you think I'm mistaken, then you should be able to make an argument supported by actual data or math to explain how TOR is paid for. $10M/yr is a tall order for a volunteer network. However, that would be a pretty small earmark for a government black budget. That explanation would also dovetail nicely with the US government's habit of getting involved with drug trafficking and very likely involvement with kiddie porn.
Jack Garcia
not much more than before, they didn't take the servers to arrest everyone who posted there, you're merely still on the naughty list but now that you're silenced, you're fucked with a ball-gag
Henry Perry
Hit reply prematurely. What I meant to say: Which is the whole purpose of the TOR network.
Ryan Morgan
There is nothing routed through your computer in default configuration.
You can choose to become a entry, middle, or exit router. The last one is not recommended.
Choosing to be a middle man/router does in fact improve your anonymity, because it is no longer easy to distinguish between the traffic originating from your computer and that encrypted trafic routed through your computer.
No it doesn’t, in default configuration.
>C) This means the (((elite))) can use Tor to trade cp without being caught.
No this means you are either a retard or a shill on a disinformation campaign.
>D) Because while the alphabet agencies have all the exit nodes and ISP-level gateways covered (i.e. they can sync up traffic from user A to server A and see who actually made the request) there is enough deniability to protect their (((buddies))).
No they cant “sync”, because they don’t have all nodes under control and not all countries are going to collaborate with them (Russia)
The (((buddies))) of three letter agencies need no stinking TOR for Pizza, they can have the real thing on their private Caribbean island.
Ryan Jenkins
...
Jayden Morris
>The (((buddies))) of three letter agencies need no stinking TOR for Pizza, they can have the real thing on their private Caribbean island.
This lol. Why the fuck would they go on TOR when they already have the top (((intelligence))) agencies protecting them.
Blake Cox
...
Jaxson Jones
No, like with guns and bombs, my little kike shill
Angel Watson
Fuck off shill. I posted this in the other thread, so I'll post it here to. Don't use Tor, use IPFS. Anons are working on a distributed imageboard, impossible to take down. >>>Holla Forums785171
Ryan Cox
That's the point. All you tell people to do is post, and never actually do anything real
Alexander Allen
MODS
Christopher Ramirez
Kali Linux is an old meme.
What you want to do is learn exploit development in C and a scripting language like Python, Ruby or Perl. Then you want to learn web development and JS and XSS. How networking works and network administration - unix, linux and windows and SMB, CIFS, NFS , firewalls, routers and managed switches. Then databases like SQL and NoSQL, DB2 and P/L. Then you want to learn debugging and reverse engineering. You'll pick up other stuff as you learn like the Metasploit framework. Without a solid foundation of knowledge and programming skills you'll never be able to break into anything except low hanging fruit. And our enemies aren't low hanging fruit.
If your ambitions are deploying IRC bot scripts on outdated hardware that nobody cares about enough to secure then go ahead and keep doing what you're doing. None of this is easy you need tons of background knowledge or you aren't going to know how to tackle problems or what to look for. You need to essentially be a jack of all trades and a master of a few things.
The Shellcoder's Handbook is useful, a bit outdated, though but everything is outdated when it comes to this kind of thing.
Adam Bell
You are a retard mate.
Nathan Baker
The numbers are there, just not the realization of what's necessary to actually secure the existence of our people. Soon that epiphany will occur, then courage and resolve take over.
Cooper Campbell
sure thing mr. fbi, can we use chemical weapons too?
Hunter Young
...
Luis Clark
Eventually we will have to activate the day of the rope, but we need more soldiers. We have the numbers, now we need a way to give them our stand alone complex. Our memes need to reach our soldiers out there
Zachary Jackson
Thanks for """uniting the right""" and giving a face and image to the vague boogie man the (((media))) kept making up.
Now we're losing websites and 8ch is under threat.
Owen Price
Here
Luis James
I know what you're saying user, but I believe this was an inevitability
Aaron Sanchez
Who's Jewing who?
Carson Rogers
I hope they do it. This board has millions of posts now. All the well armed neets will finally have an excuse to come out of their basements with their /k/ gear and probably light up quite a few normies in rage. Cops will probably have no idea what to do when they see a bunch of 130lbs white nazis wearing full body armor running around shooting anyone with a SNAP card.
Luke Young
Jews aren't a people known for their mercy. Surrender and trying to appease them or seeming non threatening only makes them want to destroy us more. Weakness makes them more aggressive.
Elijah Barnes
nah
Jacob Morris
if you own a country you get offered literally millions in bribe money just so the CIA can do their shit and let the US control you. that "they live" part about bribery is looking pretty real today. probably explains a lot of unexplained rich people in congress and in the senate. just follow their orders and you'll become a millionaire.
Evan Jenkins
Comey and the Clinton Foundation?
Zachary Robinson
they're jewing anyone who goes against their narrative. this is a deliberate pushback to accelerate their victory. this is no mistake or coincidence. you've seen how already jewgle has began an even more extensive censorship campaign. now they're moving to destroy the websites we use.
they see us finally as a threat. we're reaching critical mass. so the jews are going to strike at our telecommunications to stifle conversation.
what should we do in response?
Mason Morales
Well, I'm playing DGSE and AISO off each other for the pizza ring in Vancouver. You?
Easton Nguyen
Not what I was asking/ I was questioning everyone who was pro-tor or anti-tor in this thread
Aaron Martin
PROMISED CHAN WHEN?
Daniel Thomas
…in the U.S. you have "Marsh v. Alabama" a Supreme Court decision which held that a private organization cannot suppress public speech simply because it owns the public thoroughfares and meeting places in which public speech must take place
a online forum argued…. So too does this apply to the corporations which own important parts of the Internet's infrastructure. It is not their right to suppress speech, even or especially on their private networks.
freedom of speech means nothing if it does not come with freedom from consequences
Brody Cruz
If what you're saying is true that is a huge precedence that could be the basis of a very big legal case against Facebook, Youtube, and the like.
Bentley Perry
Fucking hell TOR is slow as dogshit
Jayden Walker
I've been saying for years that the websites that have banned me owe me damages for emotional suffering and and all kinds of losses.
A class action lawsuit would be nice and we need to seek damages not simply access.
Anthony Ortiz
>[email protected] Theyre fucking retards, they just have a fuckton of political clout.
Colton Rogers
That's because its bouncing your data packets across the globe, including through people who are hosting nodes under pretty slow connection speeds.
Jeremiah Bell
soros revolution
Easton Perez
Come join us on 0/pol/, we need more members in our ranks; our numbers make the site literally indestructible. 8ch is nice but we all know what's coming.
Hunter Lopez
When we collectively realize we're being fucked in the ass by a judeo-masonic pig farmer that has done the exact same thing to nips who inhabit the predecessor to all western image board cultures, 2ch, and that we must be some serious retards to let it happen to us.
Bentley Gomez
I personally know individuals who run very high traffic exit nodes. Tor is not compromised like the shills want you to believe. For it to be compromised, all entrance and exit nodes would need to be controlled by our enemies, which is objectively not the case.
All of this censorship has me wanting to start running my own Tor exit node. I think I'm going to get a business ISP account spin one up soon. Others anons should consider doing this as well.
Juan Diaz
t.CIAnigger
Jacob Ortiz
Until they take it off of (((TOR))) too. If it all goes tits up, the only real Samson option is white jihad. Most towns have a Synagogue. Gas+Motor Oil+ Candlewax+ Glass bottle= Fun?
Mason Sullivan
DID IT JUST HAPPEN?
Cameron Lee
Cianiggers get necked on DOTR STILL WAITING FOR MY JOB OFFER YOU FAGGOT kek
Robert Roberts
Meant for
Camden Mitchell
Faggots like this aren't even trying, remember, they're pony loving sissy bitches.
Christian Martin
Why doesn't someone just setup an alternative DNS root that's dedicated to free speech?
Sebastian Myers
You don't know what you're talking about, yet again.
The police can set up honeypots all they want. The police can unmask Tor users and services all they want using Javascript, bust down doors, crack skulls and extract people to CIA black sites. It has nothing to do with the power that Tor developers hold, which they don't, over the Tor network. They cannot remove a hidden service like Google/GoDaddy can lock a domain name it holds for a client.
Leo James
Why would (((anyone))) do that? Go on the internet and tell lies?
Cameron Walker
Are you fucking kidding me? You are the shills, trying to scare anons away from using Tor. You have absolutely no proof that Tor is "compromised". All evidence indicates otherwise. Cite one example of a Tor user being arrested for thoughtcrime; I know of none whatsoever.
Do you understand how Tor works? The only way to identify a user would be traffic analysis over a long period of time, which would require controlling both the entrance and exit node that the user is using. Considering that you can change Tor circuits with the click of a button in the Tor browser, you could change circuits for every post if you wanted to (actually, I do this).
You can run your own Tor node and/or exit node if you want to. I have done it. I have friends who run high traffic exit nodes. There are people all over the world who run exit nodes because they believe in a free Internet.
I absolutely demand proofs that Tor is compromised, otherwise I implore other anons reading this to regard these posters as kike shills. Tor works and that is why they want to scare you away from it.
Charles Rogers
I want you to explain to me right now, step by step, how my identity is compromised by using Tor. Right now, explain it to all of the anons reading how Tor is compromised by describing how this very post is traceable to myself.
Do it right now.
For the sake of argument, let's say that I specifically chose an exit node I know is controlled by a verified friendly party.
Oliver Robinson
You joker you , you know they are watching you right now , right?
Kevin Evans
Most fast Exit Nodes are owned by the NSA / CIA / FBI, you stupid nigger, which means they can analyze exiting traffic.
Jordan Sanders
So they've taken down Anglin's fuck shack and stormfront? Does anyone have a comprehensive list?
John Roberts
What if the attacker controls not Tor entrance/exit nodes but just a big number of important normal gateways in the Internet? This what he can match connections by time and track you using statistical analysis. Again - without compromising Tor nodes.
Ethan Perez
I always chuckle whenever I see the 'TOR is compromised' meme. Even in the recent big bust that the FBI did of a pedo site they were barely able to get anyone, and those that they did get were because of their own poor opsec.
And even if TOR were compromised it's not going to be any more compromised than this site already is on the clearnet, literally every packet into and out of this place is already intercepted by third parties. And we aren't moving the site to TOR in order to be anonymous, we are doing it because the site won't be taken down there. which means that this argument over TOR is pointless
By the way, have you ever seen a rotten onion in real life? Notice that all you have to do is peel back the rotten layer to make the onion sparkly fresh again.
no more replies to anti-TOR shills use this thread for planning, not for giving shills (you)'s
Elijah Peterson
DON'T INSTALL AD NAUSEAM
Kayden Taylor
Sold me.
Carson White
It's too early for me to call this out as being 'anti-adnauseum shilling' but it certainly looks that way. If it works the way it states on the box then I can see why they would hate it. It might even be our most valuable tool. But like I said, too early to tell.
Josiah Ortiz
From the horses mouth Freudian slip much kike? 14:10 seconds in.
Liam Bailey
Prove a negative? You are the one claiming it is compromised, the burden of proof in fact lies on you. I replied to your claims asking for proof that it is compromised, the claim that you made, indicating I have seen none that indicates it is.
Go ahead, detail step by step how my identity is compromised by using Tor right now. Demonstrate it for everyone here. If you cannot, you are clearly spinning bullshit FUD and can FUCK OFF.
You mean the way that your ISP is watching you by raw dogging your connection to 8ch.net, or the way your VPN is watching you by associating all of your browsing with your personal credit card data?
Leo Young
You now have two posters calling you an idiot.
The assholes who the FBI nabbed on Tor for their CP bullshit were compromised with a specific file that was spread within their community. That helped the FBI find out where the server was located, which they then seized and kept online for an additional two weeks before making hundreds of arrests. Note that they kept the server online in spite of a judge's order not to.
So Tor wasn't compromised so much as exploited. Long story short, don't download dll files from anonymous fucking people on the internet.
Colton Clark
Be very careful with zeronet. I smell a trap.
Jason Cooper
Put it this way.. a condom might not protect you always if you use it, but i certainly wouldn't fuck a whore without one.
Mason Richardson
Not the same user but
Why would a mod delete their posts? (((Suspicious)))
Benjamin Davis
I go an shitpost on half/o/ for a week and now Holla Forums is burning? I read that Explaination thread and I still don't entirely understand what the fuck is happening. Where do we go if 8/pol/ dies? I've seen how Holla Forums will always, always, always assemble somewhere and take it over.
John Brown
This is in fact the case. The NSA mirrors all Internet traffic to their servers at the fibre-optic backbone level of the Internet.
But do they arrest people using this data? As far as I know, they do not. Not yet. They mostly use that data for simulations/feeding AI machine learning. I'm much more concerned about hiding my online activities from my ISP, and local and federal government.
Consider that taking someone to court over something like (((hate speech))) harvested in that manner would reveal to the whole world the power of their surveillance. They won't show their hand for something so innocuous.
Ethan Cox
You know how i know you're a shill? The fact you use that image and not the rest of the article.
Dominic Diaz
Good advice, I also suggest everyone to download the zeronet client pre-emptively and see if it connects to the board probably. A weird client it is but it works for me so far. The next few weeks are going to be hectic as hell. On to weird, digital victory we go.
Josiah Smith
...
Kevin Jackson
Nearly all digital encryption methods also started out in government labs. Oh no I guess we'd all better uninstall everything digital ever made because the NSA might have installed a backdoor on math.
Hiding your ID you're a shill.
Justin Gonzalez
Tor played the machiavellian card. They know the situation is VERY dire and the two faced puppeteers are trying to crush the criticism.
Jayden Richardson
Such as this one, obviously flawed example. Almost all =/= all. Go back to your safespace Mr.Agent.
Brandon Nguyen
...
Colton Clark
A bit weird, but they were clearly FUD shills making wild claims with zero proof whatsoever while calling everyone else kikes. Typical shill behavior.
Let's compare the options retard:
Jeremiah Clark
Enough with the filters
Blake Adams
Okay so now that I did his work and you're calling me a shill provide me some solid evidence it isn't.
Aiden Evans
NIC collisions on a massive scale?
Josiah Reyes
>
James Gonzalez
>not using a (((prepaid card))) and spending the extra money for a foreign VPN
Jayden Campbell
Irrelevant sophistry to an obvious analogy. Who's us? Hmmm.
Why bother arresting people who are "anonymous" and not known to the public when they just could kill (under mysterious consequences, possible suicide, etc) them?
Dominic Richardson
We're living in a bizarre world where they are coming down on us 100x harder than on literal kiddie porn. Jesus fucking Christ.
All we want is for White people to be left alone in our own countries.
Carter Wood
Remember the soviets? Remember the mass murders of political opponents? Stop being a blind fool. Depends if they have tech capabilities. ×%+=£+¥×₩₩=_÷%%[email protected]^@^#*$;:/#&'
Do that every post then. :^)
Chase Adams
They may not delete us there for now, do you really think they won't cooperate with the kikes, besides containing us into even more less influential corners of the internet.
Lincoln Thomas
What? You did NOTHING to prove Tor is compromised. Write us a post describing step by step how my identity is compromised by posting this via Tor. We're waiting.
You are asking me to prove a negative, after I asked you to provide evidence for a claimed positive ("compromised"). Shut the FUCK up or provide evidence that Tor is compromised.
What the hell does this even mean? That you use none of the above and just rawdog your ISP IP to 8ch.net? If that's the case, why the fuck are you even part of this conversation? KYS.
Your opinion is discarded faggot. You didn't even coherently reply to anything I wrote.
Everything this user wrote is good practice. Though I would also add:
wewlad
Where?
Maybe it's already happening. Who knows? If you aren't offering ideas for how to avoid your "omniscient invincible opponent" scenario, then maybe you should fuck off?
Leo Sanders
They're not going to kill you. Not directly. They'll start doing in America what the media/communist parties in Europe have been doing for decades: Dox you, and send their shabbos to attack your house and family.
It's already begun. CNN doxed a redditor and Kurt Kikenwald was giving out information on people who went to UTR. Their sole purpose in doing things like that is to see you lose your job and be physically harmed by the mob.
The only ones they directly kill are the ones in a position to compromise them: Their own inner circle.
Jonathan Martinez
So everyone knows it's Tor not TOR. Tor isn't an acronym.
Brandon Foster
The elite are trying to secure their grip on society because they're backed into a corner.
They're going all out. Plan b is blow the world up and hide in the mountains. I think those rumours are 100% accurate. Everything is pulling towards either:
Samuel Gonzalez
Nope. The video is enough, kikeling. wew lad based on what theory, the autistic FBI agent theory of positives and negatives? If anything I'm proving you're a retarded faggot hence you wouldn't know jack about securing your own personal infomraton on a navy honeypot. Here:
Jack Reed
If by mountains you mean underground bases (10 km+ underground) the size of small cities, then yes.
Nathan Morris
any validity to this post? (pick related) can we actually get a quick and dirty assembly of what's actually going on and who is involved?
Isaiah Moore
That video doesn't prove anything. What the fuck are you talking about sperglord? Why wouldn't they want to scare people away from Tor by calling it "seemingly anonymous"?
That constitutes proof of nothing.
Dominic Barnes
Why would obumer say they're speeding up the training ISIS forces in Iraq?
Logan Long
the only time "we" should be visible is when shit pops.
Nolan Gutierrez
The Jews would be making a mistake forcing us to operate out of the darknet. We can do things on the darknet that could land us in jail with near total impunity. Our job isn't really to redpill the masses. We work better in the shadows. And going full darknet would open up a slew of new tactics for us to adopt.
Anthony Perry
You really need to KYS. Your posts have become incoherent nonsense.
Brandon Walker
it's time to set up our sneakernet.
Justin Thomas
All this is very important stuff, every user should be aware. We need a separate thread about anonymity and security.
Nolan Lee
Why don't you go ahead and apply your theory of positives and negates to it, autistic agent :^)
Cooper Watson
...
Christopher Jones
any time I've ever used tor, it's always been horrendously slow.
is there any way to fix that?
also, can anybody give an answer to this picture? .>>10499865
Ethan Collins
That is what we do and how we have any power today, besides being kikes who would still keep track of us just like now as I said.
Jace Ramirez
Network security fags, please create one.
Caleb Walker
>>>/israel/ Also, it's 3 ">" you faggot. Anonymity and Holla Forums go hand in hand
Levi Wright
irrelevant if you use a hidden service .onion address
Luis Peterson
it's faster than it used to be now
Yes, ICANN doesn't seize domains, that had NOTHING to do with them and anglin is full of shit when he says that. He got banned by his registrar goydaddy
Cooper Wood
you're absolutely retarded, you don't even understand how tor works at all and you think that something that apparently "slipped" in some shitty video is proof that it's compromised. If you weren't a dumb shill you would actually have arguments, but you don't. You're just sounding more and more incoherent this is nothing but an attempt to FUD people not to use Tor, so they can be more easily identified
Ryan Perez
He got banned by godaddy. then he tried chinese and russian domain registrars, which both banned him. Then he got a registrar that was committed to free speech. Then they banned him anyway. Then he foudn another registrar that was committed to free speech. Then that one banned him too.
This is clearly coordinated. ICANN is in charge of all these domain registrars. It's the link. Jar jar is the key to all of this.
Jackson Campbell
So, how likely is it that Trump undoes what Obama did with ICANN?
Connor Robinson
100% if we meme it
Jace Cook
It can't be undone, unfortunately.
Cameron Price
Why? Can't he just force them to hand it back?
Owen Lopez
ditch ICANN and set up our own equivalent with money saved by not giving nigerians aid
James Peterson
>>not using a (((prepaid card))) and spending the extra money for a foreign VPN
Prepaid card is not safe by any means, it can easily be tracked down to you by camera footage and the card's number, since you are probably gonna buy it yourself, and they most certainly track in which store they were bought since they are activated by the cashier
You should instead buy bitcoins and then wash them using monero/zerocoin, which is MILES better than literally using the jewish banking system, and it's TRUSTLESS If you wanted to be even safer you would buy the bitcoins with a prepaid card, but that is not strictly necessary and rather expensive overall But of course nobody here knows anything about opsec
if you were actually serious at ALL about opsec or you knew shit about what you're doing you would use a virtual machine instead, with whonix on it, instead of leaking your MAC addresses everywhere VPNs are not safe by any means, foreign or not, unlike with Tor there is NOTHING stopping them from logging all your traffic. And using an obs4 bridge to hide Tor usage from an ISP is also an option
The people who are criticizing Tor in this thread know absolutely jack shit about how it works or internet security, but even if it was compromised it would be less risky than a fucking VPN where you are just trusting some guy you don't even know not to be an FBI agent
there is simply no better solution than tor at the moment, and the anons who recommend VPNs/normal internet instead of Tor are either government shills or retarded/ignorant
also this:
Elijah Smith
Only if the USA went to war with all of the worlds kikery. Or set up new infrastructure of dnsservers communicating with a new ledger meant specifically for the USA. But that is a slippery slope.
Nathaniel Ramirez
That's definitely one avenue we should be pushing. The main problem is that, since this is only a problem Stormfront and Fag Anglin's Thai Fuck Shack are dealing with, if Trump were to re-nationalize ICANN, it'd be implicit support for DS/SF, which the opposition would have a field day with.
If he cares at all, he'd probably only jump on it once more normalfag-tier places start getting shut down. Think alex jones, r/the_donald, and other libertarian/civ-cuck places. But he should know damn well that this is important to him, because he knows that the major reason he won was because of all the online grassroots support he got. If he completely fails to act, he's digging his own grave.
Kayden Thompson
implicit anyways, time to meme for alex jew's and the like to get shoahed. it will happen in time I guarantee you, jews always go overboard
Aiden Sanchez
Okay, then logically he will do something. What do you predict him doing?
Carter White
ur doin it wong Yea… but it depends on your adversary level too.
Ayden Reed
Gee, I wonder why they would want to avoid having a high profile problematic person on their service Yes, but not by ICANN, they are literally toothless when it comes to something like this They do not control the registries, they only set the general rules for the system, all the registries and registrars are private comanies ICANN is nothing but a red herring, and there are a million other more plausible explanations If you want to go the conspiracy route, well then all those registrars are probably owned by fucking jews because that's where the chances are
No, they are not "in charge" of them, that's simply not *how this works*, they are the "authority" but this is simply not the kind of thing they do or have EVER done in the past
This is literally like seeing some bullshit being spewed by the private jewish mass media and saying "It must be the FCC" it's nonsense
Hudson Bailey
Great plan, too bad it would require about ten years of daily practice.
Nathaniel Reed
Please be reminded that it won't just be our communications cut. There will be other forms of attacks that follow this. Might want to save a few addresses in those doxxing threads. :^)
Ayden Adams
No the fact that it's less risky doesn't change. In any case Tor is safer and if you want to be autistic do VPN->Tor
No, and here I can see that you are missing quite a few things 1. We talked about connecting to public wifi 2. unless you use a whonix virtual machine *like I suggested* as soon as the FBI/NSA finds another javascript or in general (if you disable js which you can't do for every site in practice) a browser exploit, and firefox (tor browser) is full of them, or as soon as you download an NSA virus from tor, it's game over, the virus runs on your PC, it sees your real IP and MAC and reports to the FBI/NSA
With whonix, even if the virus gains root level access, it can't see JACK SHIT which means you're as safe as it gets in 2017
Seriously? Tails is useless garbage
Elijah Morales
If SSL Certificates get revoked on these sites, we are fucked
Hudson Cox
Nothing will happen to Holla Forums because Holla Forums is controlled by the Jewish CIA.
Asher Bailey
>let me post on this jew-shitskin mongrel owned board on this cia monitored, (((jim))) owned site about intent to commit felonies lmao really causes one to comtemplate
Justin Bell
Foreign VPNs are not safe at all. It doesn't matter if it's a country that's outside the jurisdiction of the US and even a country that's hostile to the US. The FBI can simply bribe foreign VPN providers to log and forward your traffic to them.
Tor is the most anonymous tool we have and the faults with it are minuscule compared to the clearne which 99% of people that attack Tor are using.
Aiden Torres
That was the entire point of my post
Jose Garcia
Trump's own supporters are literally beaten in the streets and banned from multiple platforms and not a peep out of Trump about it. I wouldn't hold my breath for Trump to save us. In fact relying on Trump for anything is only going to hurt us. We have to do everything ourselves.
Jaxson Wright
What must be done is doing things ourselves, that is NOT buying into FBI CIA faggotry, like cville, violence that's for the future :^) and the like. Trump will support us in at least some way, at least indirectly
Jordan Walker
...
Daniel Jenkins
That's something I support doing. Alex Jones, Molyjew, etc all allegedly claim to be for free speech, but are silent because it's just those ebil gnatzees getting shut down.
It's not like jewtube likes them either. I say we mass flag them and get them shoah'd off youtube, so that they're in the same boat with white nationalists.
I can't make a prediction. I have no fucking clue what's going on behind the scenes of the trump administration. I'm just saying what he logically NEEDS to do if he wants to stand a chance. That doesn't mean he'll actually do what he needs to do.
Aiden Rodriguez
If that happened codekike could self sign certificates and distribute them over the tor node. For those of us still wanting to use clearnet/vpn.
Ryder Turner
Stop giving people false hope and face reality. We don't have the luxury of sitting around and hoping for Trump to save us. We have to deal with this problem ourselves.
Logan Collins
Today, my blue-pilled mom i'm slowly getting her to acknowledge the kikes though was watching 24 hours or something, which was shilling against the alt-kike implicitly gay rallies, and told me that those "antifafa" are retarded loonies. whatever trump's failings as a decent WN leader are protip: he isnt actually a WN leader at all at the least the civil disobediance he's inspired are redpilling a fuckload of moderates
Ryan Rogers
Don't forget the still have >>>/thelist/
Get some good information there.
Charles King
Fagman, I'm saying that we should be doing things to solve this issue.
Very true. Trump is not WN at all, but he is riling up all the commie faggots into looking idiotic
Chase Torres
this
Liam Watson
The brilliance of pushing of onto Tor is that all the real lists with deep information about everyone in the system can be posted and come out. When you find out mr random civil servant six doors down…. well, lives six doors down. Puts the whole context of 'untouchable federal bureaucracy' or 'faceless drone operator' in an whole new light.
I mean fuck, either he, or his best buddy whom knows him or can lead to him is just a quick jaunt down the street. Well, its a nice fucking day for a walk. Oh and look, we can now actually organize directly too because guess what is an benefit of knowing your enemy when he shows up to your little gathering of like minded friends.
Leo Young
Nigger anything is "possible" if you're just gonna use your imagination to come up with any possible exploit. VM isolation is one of the most secure technologies that exist. This is such a non-argument, you fucking shill
Even if they did have those exploits, that's exactly why you're safe faggot, they're not going to target a shitposter with this, and I never fucking claimed that you would be safe from nation-state level agents like the CIA, but you are 99.99% safe against law enforcement, because they don't have such means. If you fuck directly with the US government and they are targeting you they don't have to come up with some ridiculous VM exploit, they can just monitor the connection of every single exit and entry node they can and try to do correlation attacks on you, or trick you into revealing information in some way. If you are targeted personally by the CIA there is fuck all you can do to be 100% safe. In fact I said that above. What a kike tactic, changing the topic of the argument. I bet you're one of their shills or a kike or both.
>
Jaxson Hernandez
Not to mention that, the more people use tor the safer it is. If even half of 8/pol/ and 4/pol/'s users started using Tor, it would be much harder for them to attack us individually.
Parker Reyes
what's more likely is more than 50% of 8/pol/ users plus 10% of 4/pol/. I would not be surprised if 50% of 4/pol/ is shills n bots
Landon Sullivan
You are right, we shouldn't even reply to them, but the thing is, some posters might start believing their bullshit rhetoric. I want to at least make the situation clear to non-shills
Henry Walker
So I've been monitoring this thread and these guys just showed up. Should I start deepfrying my hard drives?
Cooper Flores
Google "systemd dns resolver bug".
Google "wannacry virus". Try harder. Computer security is fucked in every way concievable. But it can be improved.
Alexander Nelson
hide behind 7 proxies
Christopher Powell
Another meme that came true.
Gavin Cruz
t. gangstalker
Nicholas Parker
Do you think I don't know about those two exploits? The first one has exactly 0 relevance in this case, but you probably don't even know how whonix works, so you don't understand even that, as for the second, it proves the ridiculousness of your assertions. Wannacry was literally the lowest hanging fruit for (((them))), closed source software and a very hard to find old exploit, yet it got leaked and patched. Literally the worst case scenario for a user and the best one for them, and it still got patched in the end.
And you want me to believe that they have tons of exploits waiting on some of the most secure, most audited and proven open source software such as Xen? A microkernel with isolation that isn't even imaginable in a normal linux distro (which xen itself isn't in case you intend to troll me by pointing this out)? Again, you can make up any shit you can imagine, that doesn't make it an argument.
So you are finally admitting that your posts are nothing but rambling and contain nothing constructive? Good. Not gonna waste any more of my time then.
Kayden Young
>>>/gangstalked/
Anthony Wright
4chan doesn't allow posting with Tor (or vpns) so it'll be 0%.
Ethan Nelson
We are watching you
Chase Watson
I don't think you understood.
Jack Williams
Understood what?
Kevin Murphy
One of the biggest things about this that scares the hell out of me about this is that I don't understand any of the shit that's going on here. I literally just ask the nigger at walmart for whatever computer is affordable and has a decent look to it. I screencapped OP's post and made a handwritten copy of the links in it. But I couldn't argue for or against Tor because I don't know about programming, or hacking or any of that shit. I feel like if 8/pol/ goes down I'll be shipwrecked.
Andrew Carter
If endchan.xyz isn't taken down too then I'll show up there to pick up the stragglers so you might get your second chance. That said, if the internet does get shoah'd then your only choice is to head on over to a beer hall and start getting up on that soap box.
Noah Garcia
Hey, Chaim, we secured victory years ago. There is no stopping this ride.
.t- Mr Bones
Jace Davis
what part of pursue self betterment didn't you understand?
Hudson Baker
Don't worry, there has been a critical mass of whites becoming WOKE so you should have no problem with someone networking with you. Just keep your eyes out.
Wyatt Reyes
Endch, shit I had totally forgotten it. I'll write this down.
I lift, I'm doing /lit/'s Greek reading list, I run, I bike, I practice an instrument, eat healthy most of the time, don't drink sodas more than once every other week, etc. A bunch of computer jargon about programming websites never seemed important until now.
I've noticed I can be on sites far away from Holla Forums and still catch little glimpses of Holla Forumsspeek slipping through the cracks. I've actually reached a point where I'm almost surprised if someone on the internet isn't "in the know." I appreciate it, anons.
Caleb Morgan
Download the TOR browser. Add oxwugzccvk3dk6tj.onion to the Favourites in the browser.
That's it, that's all you need to worry about, don't let it feel daunting.
Verifying PGP Signing Signatures, Security Settings, and NoScript configurations are out of scope for someone of your understanding, but as you wade in, that'll be stuff you can worry about later, it's not a prerequisite. 8ch works fine without Javascript, so there's no need to work with unblocking elements in NoScript; just follow the on-screen instructions when making a post (you'll be required to copy and paste the CAPTCHA url into a new tab, complete it, then head back and re-make your post).
Ask questions, I'm sure we're all more than happy to help fellow Whites.
Charles Jackson
This is the most important part user. Just don't reek of dirty 13 year old newfaggotry, and you'll get the help you need. You should know though
You know, I had actually installed Tor on a comp I had a while back. I didn't really know what I was doing, and it wouldn't let me use youtube or anything like that, so I ditched it.
Hudson Barnes
Bet you tried to connect to youtube in it with youtube.com. Rookie mistake, but you've learned
Andrew Peterson
youtube.onion?
Easton Ross
nope. The onion link is some random string of numbers and letters, if the website even offers an onion. example, 8ch onion link: oxwugzccvk3dk6tj.onion/
Isaiah Miller
Reminder that you can add .link at the end of an .onion address to browse it without Tor
Don't bother using it for youtube. The plethora of scripts they require makes TOR pointless (you'd probably have to just whitelist all objects, potentially outing yourself with any of the scripts that run). You could likely pipe youtube-dl with a system-wide TOR setting though, but again, out of scope - you should be worried about making sure to stay in contact with 8ch and whatnot, not trying to watch youtube anonymously.
William Hall
The hole in my reasoning was that I would have to use Tor for everything. So I would get the Tor browser, use it for Holla Forums, then switch back to chrome for my regular shit.
Aiden Williams
Well enough. Using jewtube for usual shit is fine if you have to. Try using GNU IceCat though, simply because it's better than chrome, and is basically firefox without jewishness. On all OSes too
Christian Long
Or use pic related.
Sebastian Adams
Top kek, is that a fork of Furfag Moon that isn't shit? If so then great
Julian Williams
No it is just a picture I found mocking it.
Chase Perry
damn. Stupid furfaggot moon
Andrew Gonzalez
Is pale meme anygood though? I have heard it is pic related and that furfags use it. Anything technically horrifying about it versus icecat?
Thomas Williams
it's a shittier fork of firefox made by fox ass sniffers , and it has no webm support. Icecat is 100x better
Easton Ramirez
8ch is compromised and now are trying to herd everyone on tor before nuking the site in order to have an excuse to call Holla Forums users and white nationalists pedophiles. For the kikes will label tor as a program strictly for spreading and sharing cp. And once we're all using tor they will use a guilt by association tactic to smear us with the damning insult of being called a group of pedos.
Not too mention tor was broken a year ago so it isn't safe at all.
The only logical option coming up for us is RWDS and having small local crews across our nations who meet up regularly and share information who then in turn use a closed loop system that communicates with connected squads.
The internet is no longer anonymous and it is becoming more dangerous than real life. Through the formation of RWDS squads we can legally combat train and educate ourselves and VETTED, and I repeat, VETTED recruits.
And then we can use the internet as normies or as saboteurs with concentrated attacks against the cultural marxist kikes who wish to destroy our history, our culture, our people, our nations, and our future.
That is what should happen. Not this fucking iamkikey sponsored honeypot.
Mason Wright
Dubs of truth.
Aaron Morris
As has been the case for stalwart, self-guided men through the ages. be the solution you need.
Sure, Furry Moon is a very solid true fork of Firefox. A great beauty of Pale Meme is that it hasn't been FF for more than a decade, and therefore entirely missed the POZZ train. I've been using it as my daily driver on Linux Mint for more than three years now. Highly recommend it.
Nice fear mongering. Like we can control what the MSM says about us. Even Facebook has a .onion service.
It literally never was.
John Reed
y u no webm
Ayden Mitchell
Nothing stopping us for finally doing what needs to be done.
Elijah Martin
...
Ethan Williams
>>>/cuteboys/ >>>/loli/ You were saying? Fuck off cianigger you don't speak for Holla Forums. Holla Forums is a board of peace.
Logan Cruz
AGAIN: Proofs or KYS you fucking KIKE.
You just described the entire Internet. You are literally shitposting on a board that regularly has CP posted to it. If you're too much of a pussy to use anonymous technology because you fear being "guilty by association" I recommend you join the alt-lite and find a nice asian wife to settle down with.
Why would I argue against it? Go ahead and figure out the logistics of that for us, CIAnigger. No on is stopping you.
Yep, nothing. Go right ahead. Let us know.
John Ward
Instead put links to new hosting platforms. Otherwise SJW will mass report anything on that list.
Carter White
Why use normie web anymore anyway. Let them wonder where all their enemies went while we enjoy a new golden age of normie phoneless internet
Jeremiah Torres
I'm actually pretty paranoid about being deanonymized via writing style. I saw someone dox someone just by going off specific term they used. Pretty scary stuff
Carter Jackson
vary your writing styles user
Liam Flores
You can try imitating others. Increase your amount of lulz with just a few keystrokes.
Dominic Martinez
0chan needs an option to not download images by default, like ZeroMe does. That would make it safe. Though I have mine set to always tor, as should all of you, first thing when you install it. It's good technology and very user-friendly as a bonus, but that's a risk with any sort of decentralized system (which is also the only way you will ever have a censor-proof internet).
Benjamin Green
Imitation won't work well, but a few subtle variances will work very well. I'm the same person as in , and I should sound a bit different. Really, it's just varying your grammar + slight touches in vocabulary.
Michael Price
ZERONET TURNS YOUR COMPUTER INTO A PROXY FOR ANYONE TO USE TO GET TO ZERONET
You will find your IP blocked because you have done this.
Until Zeronet is 100% over Tor fuck it.
Brandon Clark
That is, your IP will be put on various block lists, depending on what sites/services you use.
Elijah Turner
This isn't true. By default, the proxy server only runs when configured to do so. Yes, it does run on a port it opens on localhost, but if you don't have a firewall, you're fucked anyway, you can also firewall that port off in your OS to only allow connections from localhost. The real risk in zeronet is that any content on websites you visit is mirrored on your machine for other zeronet users to access. Most of the default Zeronet apps (which you can clone and run your own instance of with two clicks if the default instance is cancerous, I think one of the devs is a tranny) do not download images by default for this reason. 0chan does, just a warning.
Also, Tor support is now baked into the client, activated by default. The default is to accept connections from both Tor users and clearnet users, but you can (and should) easily change it to use Tor exclusively.
It's not a perfect piece of software, but it's really good for how early it is, completely usable for our needs.
Sebastian Carter
I can only imagine the shitfest it would be if everyone got doxxed at the sametime.
HAHAHAHAHAHA
You'd have walking talking redpills IRL with nothing much to lose everywhere.
Lincoln Howard
Trve, but it would be kinda shitty for anons that aren't full NEET.
Elijah Wood
CIAnigger : the post.
Kevin Williams
Good point.
Isaac Jackson
I am in tor
Alexander Hall
Nice technological knowledge you fucking mong. The letter agencies themselves use TOR tunnels for hacking.
Christian Reyes
You faggots said that about DS and the rest. Why did they take them down? Oh, maybe because they were not?
WTF do pigs need serious radar like that for… drone detection?
Anyone interested to start a Scalar EM global communication research collab on /tok/ or new onion/I2P network? We can literally replace their (((internet))) with this if viable.
Charles Evans
So can I just use Tor or is there something I need to do to avoid getting doxxed or v&?
Austin Peterson
You are as anonymous as yourself. Avoid logging in to personal accounts or revealing information about you that would lead back to you. Tor is a thousand times better at keeping you anonymous than you yourself. Humans are the weakest link.
Alexander Foster
tor is built into operating systems tails and qubes, both can be booted from a stick. having a realdeal VPN cant hurt either.
Logan Murphy
This is the month we become internet deathstar, destroyer of kikes and their advertising sheckels.
I bet they're very worried now as we are pre-empting the shoah. And I wonder if they'll realize it's safer to leave us alone than kick the puffball of doomspores.
Robert Bennett
We are Internet Death Star confirmed. Related, 3d memes are upon us!
Joshua Sanchez
TRIP OF TRUTH
I like going big when I get going, but I'm a computer nooby. Perhaps you can give me some pointers, but, if one wished to maximize their shekel busting on big G with AdNauseum, what would be the best way to scale it with only one machine? Is it possible to perhaps use a macro to click a list of links over and over again so you leave a machine running 24/7 and it just eats thru the shekels like a challenger thru a crowd of communists?
Jace Morales
damn it. fixed.
Justin Turner
KEK, don't take me wrong but when I saw the inverted pic it reminded me of pic related :D
Xavier Russell
don't use both at the same time or it's useless
Hunter Ward
This place really is 8gag now.
Jace Jenkins
Sorry for fagging up of the place, I like acting like a spurdo retard from time to time. Have a ebin turbo drug fueled commie killing story time pic.
Liam Richardson
What is the good VPN?
Justin Diaz
Almost gave me a heart attack there user. Needs to be more obvious.
Easton Young
Follow what 31b5ff said user, be more obvious with your spurdo. Try :DDDDDDDDDDDDDDDDDD rather than :D
It's funny because if you have a good VPN you don't really want to just say it on the sites you use. It's better to ask for lists of bad VPN and then do some research on your own
Lucas Sullivan
...
Carson Watson
Thank
Thank for the information.
I am new to VPN and I never thought that one day I would have to use it. Is it possible that I can make my own VPN? For a silly example, I just dump the server in Papua New Guinea and use it as a VPN over there and remote controlling the servers. Yes I am that paranoid.
Robert Campbell
dubs confirm you have succeeded
Austin Smith
I heard Jim allowed tor uploading again. If he did Hotpockets disabled it on this board.
Daniel Sullivan
What's wrong with Tails?
Anthony Jones
Tails has some bloat (e.g. the default DE is Gnome 3) which makes it run slower on older hardware and also has a lot of pre-installed nonsense on it like the Electrum Bitcoin Wallet. The most important issue it has is it has Systemd as an init (which is a whole heep of debate, issues, philosophical discussion and "Not-a-bug" attitudes). Heads is a promising alternative, made by the same people who are currently developing Devuan, the Systemd-free Debian Distribution. It still is in beta but in addition to removing Systemd, it has a minimalist attitude, using LXDE as its default distribution, and not having unneeded software such as Electrum.
Yes you can make your own VPN. That's what I do. All you need to do is buy a VPS. They're really cheap. You can find many VPS services for around $5 a month and cheaper. Then you look up a guide on how to set up a VPN.
Alternatively instead of setting up a VPN you can set up a SSH tunnel. I use a SSH tunnel instead of a VPN myself. I know quite a bit of good VPS providers but I'm not going to mention them. I'll mention Digital Ocean because it's so large. If you search around you can find better deals or a VPS service you can purchase with bitcoin.
Jaxson Brown
REMINDER THAT THE ONLY PROVEN ATTACK POINTS THROUGH TOR TO BREACH ANONYMITY ARE USING JAVASCRIPT ATTACKS
NOT ONLY SHOULD YOU CHANGE YOUR SECURITY SETTING TO THE HIGHEST POSSIBLE, YOU SHOULD ALSO FIDDLE WITH THE SETTINGS OF NOSCRIPT AND DISABLE JAVASCRIPT IN about:config CHOOSING TO SELECTIVELY TURN IT BACK ON
NEVER USE JAVASCRIPT UNLESS YOU NEED TO, IT IS A CANCER NEVER MEANT TO BE TURNING COMPLETE
– Holla Forums
Connor Collins
Can I get verification of the Tor GPG key?
0x4E2C6E8793298290
Liam Lee
The rest of your comment is good advice, but this part is historically inaccurate. Brendan Eich originally meant javascript (not yet named that) to be a dialect of scheme. It was always going to be very Turing complete.
Joshua Thomas
Can confirm. You should sign that key with your own. Are you new to GPG? Also, heads up guys who are trying to also remain anonymous from CIAniggers and NSAJews: If you're using Windows you're already fucked.
Robert Davis
You can also attack it through flash, pdf and even wma/wmv as well as other office document files like .docx
Camden Martinez
I would vote to re-elect obama
Alexander Roberts
But only Nairobian pedophiles would be stupid enough to use those things while on Tor.
Xavier Brown
No, UDP requests. Some DNS servers will do it still, but DNS requests are usually small enough to fit in a single packet unless you do a "zone transfer" aka asking a DNS for all of their subdomains for a given domain. Most DNS servers refuse zxfr except from authorized hosts.
Around the same time people were doing it with NTP (network time protocol, used to make sure all of your servers were synced to the same time) but those have since been changed to default reject all requests not from localhost.
TCP packets include your address, you can spoof it but a lot of the routers between you and the target will drop spoofed packets. UDP does not.
Justin Rogers
JavaScript was created in 10 days and it's an inconsistent garbage.
Justin Wood
Pardon the ignorance, but pls explain: if you only allow text to show and you don't click any links or pics, then you're good, right?
Or do you mean having programs that deal with those kinds of files being open at the same time as the tor browser?
Thanks in advance.
Josiah Kelly
Yes. If you don't download fucked .pdfs etcetera and open them, you're good. If you use TOR and click links that's fine too. Just don't download garbage. Use a grounded VM (preferably with no direct connection to your home network) with TOR and then you can have fun opening dumb shit.
Jaxson James
If you have flash enabled you could get got, if you let windows media player run (using tor on ie or dling wma/wmv content) you could get got. Or if you open a pdf or other office document content either with plugins in the browser or by downloading them you could get got.
I don't think tails is at risk of any of this, but if your running it on windows even with the tor browser be aware that there are some risks with these types of content.
Mason Rodriguez
Keep in mind that this only protects your isp from snooping. It doesn't protect your anonymity or stop feds from finding you. Feds can just look at who is connecting to the server and deduce who it is. (This is assuming that your billing information doesn't lead right to you in which case it is even easier).
Also don't do retarded things like reenabling webrtc or disable dns requests through tor.
The downloaded files thing is quite easy to fall for. You do your tor browsing, you download a pdf of a book to read later. Now let's say you open the pdf and you don't have your pdf reader set to send it's web traffic through tor. This would easily compromise you. Any file that can make it's reader make an arbitrary request over the internet is dangerous and must be run through tor.
Imagine a simple example. Let's say you downloaded a executable file off of tor. The bad guy sets up a server so that whenever it runs it sends them your ip address. If you aren't careful and route that traffic through tor, your anonymity will get pwned. Stuff like tails for example drops all nontor traffic so that you aren't at risk for that kind of attack.
Isaac Perez
That's not true. Timing attacks also work if you own a certain percentage of the entrance and exit nodes. If a connection is only transferring the same amount of data you are looking for as it passes through the network you can single it out. Make background noise to obfuscate what it is you're doing.
That is a satellite dish. WTF would radar do at street level?
Xavier Cox
PDFs, Microsoft Word Documents, and some image viewers can execute Javascript which is used to then track people. They know it was downloaded off tor, they then get a list of people who opened the malicious file, and then they know who visited what site. Not all viewers can run Javascript (or other code) from files such as PDF, images, and Microsoft Word documents but it is a good rule of thumb to not open those things while using Tor. Images are a bit of an exception since this is an Image Board and images would load whether or not you open them anyway. What you really need to be cautious of, 100% is non-image files downloaded from Tor.
All these concerns are primarily only applicable if the site you're using has been compromised by an LEO, such as that 3 month long sting where the FBI seized a CP server, ran it for another 3 months, and then arrested everyone involved. Never open PDFs anyway, the code they can execute can be much more than simple tracking. Can give you viruses if you are not careful, of course UNIX (aka GNU/Linux) doesn't have a real issue with wildly-running code like Windows does, since Windows has a tendency to run literally everything it comes across.
Ayden Gomez
No, I'm just paranoid about getting MITM'd when reading the Tor website telling me what their key is. I wouldn't put it past the NSA to create a completely fallacious parallel web of trust.
When did their key stop being 886DDD89?
Brendan Eich was working on scheme scripting in browsers. Netscape hired him then told him to make it look like Java instead of Lisp, because Java was the new hotness and they wanted to sleaze off that brand. Eich then spent the 10 days they gave him bastardizing the syntax of his browser-scheme (that's why javascript has shit like bastard lexical scoping, first class functions, closures, etc. It's not a good language, but you can tell it was written by somebody originally trying to write a scheme dialect). The result was "Mocha" (get it, because "java" is coffee, and "mocha" is a coffee drink? Ahaha so clever. Tech puns remind me that suicide exists.)
Adrian Carter
Thanks for the (you)s friends.
Ok, so this really made me start some mental processes.
Is the ultra ebin way to protect one self to use a linux live cd, connect via vpn to a vps and then use a virtualization on the vps? Is that just silly, or am I onto something?
Also, when you rent a vps, does it come with an anti-virus or do you have to buy that crap?
Thanks in advance.
Lucas Wilson
They have "radar" systems tuned to track bodies inside houses. Though I doubt they'd bother using it unless they were going to SWAT you… what useful information could they gleen from "yup, he's still sitting in front of his computer…"?
Sebastian Ross
I think that expired. Check keyservers for a signed key. Looking at the key you gave me, which I also saw via the Tor website, it lists 5 UIDs older than this discussion (a good thing, all expired too, a good thing) and the most recent UID has 160 signatures. I say this is a good key or else the creator of your MITM attack has 160 fake PGP accounts and has signed this key 160 times (unlikely)
Isaac Flores
THAT MAN AS BEEN JACKING OFF FOR 14 HOURS, SOMEBODY STOP HIM!
Thomas Bailey
If you're using a VPS, you're using communist loonix on it. If you want to scan files against virus signature DBs on linux, AFAIK your option is ClamAV.
John Reed
Ok, I just took the shortcut that ends up taking longer to get to the destination. Just checked key 886DDD89, and that's a different key also used by tor. This key is used to officially sign the .deb (Debian Package Installer) files, while the other key we're talking about is the primary key used to sign source tarballs. They're two keys for two different things, a common practice. No MITM.
Julian Hill
Thanks fam.
Joshua Watson
if they shutdown Holla Forums dont be surprised if you hear some sort of attack going on at silicon valley spoiler how will i ever shitpost on Holla Forums
Alexander Jackson
This meme needs to die. Richard M. Stallman, founder of the GNU Project, got dimenta a few years ago and became an aging communist. Read "The Cathedral and the Bazzar" by Eric S. Raymond and you'll learn why FLOSS, at worst, is Anarcho-Capitalist in nature
Carter Howard
jesus christ I didnt know it worked that way. Its a good thing I didnt log in to anything. They cant tell where the info is going though right? So as long as I dont enter any identifying information they wont know who is sending it?
Matthew Butler
Thanks for the input m8. But I see vpss with windowns os available to choose from, can I get my vps infected if I open a virus? And if so, can the virus leap into my physical machine? And if so, will I be safe if I'm using a linux live cd on my physical machine and have my HD disconnected (can it fuck up my firmware or some crazy shiiiiiiiiiiiet like that)?
Thanks in advance.
Adam Gutierrez
It's just bantz, but ESR has never had the same political ideology as RMS.
Liam Reyes
I don't know if this is possible TET, but if it is we need to petition Jim and Codemonkey to do this, add the .onion to the Let's Encrypt cert.
Originally you couldn't add .onion to TLS Certs due to it being a pseudo-domain. You could still TLS to a .onion but it required having to manually confirm the fingerprint each time. I heard sometime in early 2016 that the Tor Project was trying to get their pseudo-domain officially "Reserved" by ICCANN (meaning that ICCANN can't make a .onion, and it will always belong to Tor) which meant they could add .onion to the TLS Certs. Any of my Holla Forums friends know if this followed through? If it did, we really need to make that work.
Ethan Parker
well fug
Jonathan Jackson
Don't use Zionism OS.
Oliver Morris
I know its shit, but I have software I need to use that only runs on that crap…
Fugging benis.
Aiden Phillips
Don't use windows for anything you fool. And only use your VPS to pass connections through. While it's possible to pwn a linux computer, the less you're actually doing with it the better. Run the bare minimum on it to give yourself as small an attack surface as possible.
As for your other questions, you're probably a low-value target so you probably won't see anything truly exotic deployed against you. Stuxnet hit the Iranian nuclear engineers with several zero-days. That's an extraordinary circumstance though. IIRC the last time Tor users got pwnd by the government it was using a known firefox exploit because they were all using a version of the Tor browser that didn't have the most recent firefox security patches.
Christopher Green
Not on your VPS you don't.
Jose Parker
You say that, sure. But ive been using noscript for a few days now and 95% of the internet is broken without it.
About the only thing that is usable is simple text information pages like wikipedia, and even then you cant sort information or jump to topics etc.
Aaron Torres
No, you only think you have software that runs on Windows with no good alternatives or forks.
I once knew a guy in IRC who didn't want to switch to GNU/Linux because he liked VLC. This was one of his legitimate concerns.
You need to realize that there's probably alternatives and forks for all your bullshit, and Windows is an inferior system inside and out, regardless of your opinion of UNIX.
Also Windows has had the NSA Key since Windows NT 3.1, Windows has phoned home since XP, Windows has had backdoors since (at least) 7, and Windows has been a tool of the NSA to see how much unwarranted surveillance can be pushed onto the normie before the snapping point since Windows 10.
What he really needs to understand is that he's not going to be using photoshop or autocad or steam on his VPS. He's not even going to be using a web browser on his VPS. He seems to have some fundamental misunderstandings about how a VPS should be used if he thinks he needs to run windows on it. If he doesn't correct those misunderstandings, he'll end up using his VPS with GNOME/ubuntu with X-forwarding or some other stupid shit.
The TAILS live cd is built around tor and keeping you anonymous while using it. Using a VPN in conjunction with tor is arguably better or worse (there's mixed opinions). Your first connection into the tor network is technically like a vpn except that it isn't the same each time, nor do you own it. these are just buzzwords to me Unless you are enterprise you typically don't need it. If you don't have many services open it is rare that you will even need to get security updates. When you do need to install updates you just run one command and it installs everything for you.
If you are browsing the clearnet and are using an https link the exit node just sees encrypted traffic. If you are using a hidden service (.onion link) there is no exit node and only the hidden service will see the unencrypted data. Your data is only in cleartext if you are browsing over http.
1. Your VPN can't get infected directly from a virus. 2. Stop using windows altogether 3. A VPN is only like a tunnel that internet traffic goes through, it does not run anything. 4. You are never safe, but yes. Running an operating without persistent storage closes off persistent infection vectors.
Yes .onion is reserved (I think it is at a state where you can not register a gTLD for .onion)
Modern web is shit and developers have been abusing the power of javascript. Idealy javascript should just add stuff like animations and other small things. It shouldn't be used for creating whole applications or whatever.
VLC has run on GNU/Linux for years lol.
Julian Lopez
PIA is good, but they are based in the united states which means big brother may be watching. Supposedly they are logless and no more compliant than they need to be to stay alive. They shut down their russians servers because putin was being a faggot about VPNs.
NordVPN has a good track record rights wise, but they are slow as fuck and go down a lot tech wise.
You can get a year subscription to PIA for 40 dollars if you catch them on sale. Look it up on slickdeals.
Aiden Jackson
The internet was broken before you used NoScript. The recent millennial (((web dev))) trend has to make web pages with basic text that have over 8GB of non-needed resources, cat webms as a background image, and pages that render text using Rust. It's the equivalent to if you were reading something semi-serious, like say… a technical about how to fix the inside of your TV, the entire thing is decorated in pink glitter, and at the end of the book is a mirror with text on it that says "…and now you!"
HTML was designed to emulate paper, and HTTP was designed to transfer HTML reliably. Perhaps I'm too much of a purist, but no one with sense argues that this bloat is a good thing. Once upon a time you could use the W3 without Javascript AND EVEN IMAGES. It's not noscript breaking your internet experience, it's modern web design.
Austin Gomez
An exploit can execute on a thumbnail load with Windows because the system is interacting with the file. You don't even have to open it yourself. If you're using Windows don't download anything off Tor except images to be safe.
PDF exploits exist and they're out there. But they're not a reliable attack. It's a big hail mary because there is so much PDF viewing software out there and a PDF exploit is only going to work on a particular PDF viewing software and a specific version of it at that. If you leave a PDF exploit out there and 1000 people pick it up it might work on 1 out of 1000. Or optimistically 1 out of 100.
When it comes to all exploits they will only work on specific software and specific versions of that software. A 0day on Firefox ESR for Windows is incredibly valuable because it's so commonly used and it's what the Tor browser uses.
Juan Perry
When is the last time a jpg/png/etc exploit has been heard of?
Thanks for the (you)s again friends. Yes, I'm obviously not thinking right about this. So, let me try to understand again:
says:
I was thinking the process of using the VPS would be: 1- connect to VPS; 2- use browser on the VPS so if anything happened the physical machine would not be affected.
Based on what you said, I'm being an idiot because that is not a purpose of using the VPS, so is it to use the VPS as a VPN? If that is that case, why not using a VPN directly?
Thanks in advance again, its great to have you guys explaining this shit to me.
James Morales
As long as im linking stuff, try >>>/poltech/. Its all the techno pessimism paranoid tinfoil hat stuff you can shake a fist at. Its pretty slow but there are some good resources.
Joseph Ward
Nigger, what? There's no graphical interface with most VPSs out there. Unless you're talking about using fucking W3M to browse the web good luck.
If you want to use a VPS you need some familiarity with unix command line.
Christian Parker
IIRC PIA actually were asked to hand over logs for some trial to like the FBI or something and they couldn't because they didn't collect logs. Just because they didn't collect them back then doesn't guarantee they always won't collect logs. (Especially when they are inside of five eyes)
There is a reason why they are called documents.
I don't know about other libraries and stuff. libpng had CVE-2014-9495 a while back which allowed arbitrary code to be ran and had CVSS score of 10. cvedetails.com/cve/CVE-2014-9495/ A lot of the vulnerabilities that are found are small, but there are a lot more that are discovered than you might think.
Almost no one uses a browser on a VPS. I would recommend using a third party VPN. If you get a VPS for yourself and use it as a VPN, all it does is hide data from your ISP. It does NOT give you true anonymity. You will be anonymous to servers which you connect to. If someone gets your IP though and works with a LEA or through your hosting company they can trace it back to you since you are the only one using the machine.
Thomas Wright
A VPS is a remote shell account. You're obviously new to advanced computer concepts. Try this out for a few days
This is a "loan shell" which is like a Baby's First VPS. You're missing features in a VPS, such as root access, and you can't make a website (or use some other services) without giving SDF money. I also recommend going to your local thrift store, going through their book section, and seeing if they have any books about UNIX by a popular publisher called "O'Reilly and Associates". If they have books from the Desktop Reference series, that's a must. Even if it's for System V and BSD 4 it'll still help you.
Leo Smith
Did the fbi jail them?
Connor Adams
I am shocked….SHOCKED at the amount of fucking IGNORANCE in these threads….
Absolutely shocked….. First of all, DO NOT USE THE TOR BROWSER.
USE TAILS. For the LOVE of FUCK, TOR BROWSER is COMPROMISED.
You need to install tails to an external Flash Drive, plug the flash drive into your computer, and run TAILS from there.
If you have been using Tor Broswer by itself, you are FUCKED. They know already know you are.
Evan Gutierrez
Tails has tor browser built in through…
Leo Evans
This is fud, and it's funny because he's not using a Tor connection himself (meaning he's not on tails), but yes, Tails gives you more anonymity than just the Tor browser because it literally is a tor wrapper to a tor wrapper to a tor browser. But heed my warning,
Connor Martin
Secondly, VPN don't work.
They are also compromised. VPN's don't guarantee your privacy. Many, many dark net users were busted because they used VPNs, and the VPNs gave up their IP addresses to Police Agencies/FBI/NSA
If you're capable of following directions you can set up a VPN even if you know nothing right now. If not then you'll need to buy VPN service.
Jaxon Cooper
Yes. There was other evidence which lead to his imprisonment, but they were not able to get the logs which there was a subpoena for.
Thomas Barnes
This is in case they bring down all the chans.
I don't need to go into the Dark Net now, why would I use TAILS?
Justin Thompson
Sorry, my bad. In my reply I failed to mention that their Desktop Reference books are a part of the "In a Nutshell" series, which are very good books. Even if the copyright date is 1985 you're still getting good reference for UNIX
Landon Martin
Because first came censorship, then comes the Stalinistic purges, user. Have you not read The Turner Diaries, nor 1984?
Joseph Harris
Hope you guys have gotten over your irrational fear of real life groups and either gotten a group of dedicated anons in local areas together or have decided to join an existing group. Free speech won't last for long on the internet. It's up to you guys to make your posts reality.
Mason Campbell
To anyone that doesn't know much. Don't listen to people spreading paranoia about Tor. They are spreading misinformation.
If you use the 8ch onion service you'll have double encryption end to end. Encryption for 8ch itself over SSL and Tor encryption on top of that. Not one node is going to be able to view the contents of the data you're sending and receiving from the 8ch onion.
Whatever problems Tor may or may not have your anonymity is infinitely better over Tor than it is over the clearnet where you have no anonymity.
If you're paranoid then don't go exploring the Tor network. Just stay on the 8ch onion.
Matthew Kelly
Good job faggot, you are going to get a lot of people exposed when it's time to go underground.
Isaac Green
Tor is the most paranoid tool you could possibly use to communicate with the internet. If Tor isn't anonymous enough for you then what the fuck are you even doing on the internet?
I imagine most people attacking Tor are running Chrome on Windows 10.
Tyler Anderson
Why would someone go onto the internet and lie? Holla Forums's onion service does not use SSL. SSL is pointless since you already have the layers of encryption which TOR provides.
Charles Thomas
You're right. I just checked and the onion service isn't using SSL.
Blake King
Yes, why so quiet about cjdns? City anons can fire up physical relays and start their own intranet, totally uncontrollable. Some user with ability to get a long-range comm can connect this fraction to others, and others can chain it this way until there's a big enough network of users.
Henry Thomas
So, translated to something like:
I literally can't imagine something more perverted and satanic than what's going on @ Podesta's place..
Jackson Hill
Forgive me if I misunderstand, but isn't this pointless? After reading the project goals page it just looks like the normal internet except all the packets are encrypted. If we are just worried about the web, stuff like https handles that.
Jace Anderson
CJDNS is a peer to peer network that can work over the regular ISPs but its primary design is to use ad-hoc connections to build a distributed network of computer-to-computer. A similar project is Netsukuku. Holla Forums was attempting to make one like this, IIRC called "AutiNet" ad was billed for a "National Meshnet for Holla Forums and Holla Forums, but the guy trying to develop the protocol jumped out of it due to lack of interest.
Camden Green
Mullvad Takes bitcoin/cash anonymously and have great support system.
Even if they turned server records over, it would be very hard to get you if you used a proxy.
Ayden Flores
Radar can measure your fucking heartbeat and stress levels at 100m+ away. It can detect people crawling through bush/brush at a few km it can be used to illuminate pic related (ragemaster) and return information or a complete image of output of airgapped PCs. It can also be used to remotely power bugs which do not have a battery source, thus are passive to RF-tier bug detection machines unless directly illuminated by radar signal.
Basically if that's there, they are doing sneaky as fuck shit around your area.
Michael Peterson
The vols are compromised, so it is EXTREMELY suspicious.
Justin Long
The only onion with legit SSL out there is the kikebook's one.
Landon Bailey
Why can't whites make their own platform?
Hudson Harris
The entire concept of a Facebook .onion is contradictory. I don't get why the Normies like King Jew Zucker. I didn't have a facebook account until 2014 and I deleted it in 2015. Why are normalfags such fucking retards.
Aaron Thomas
Because the second they do they'll get a knock on the door by the alphabets telling them to open their rectums.
Brandon Brooks
It's literally just for people in countries that block facebook. They don't care a single bit about the anonymization factor.
Jackson Evans
If this site goes down, it shozld be a sign to everyone that you need to get fucking prepared for war. Real war. Good post, and thank you OP
Leo Lopez
If this site goes down, it should be a sign to everyone that you need to get fucking prepared for war. Real war. Good post, and thank you OP
John Cook
Forgive me for being the village retard, but who exactly is shutting us down this time, and why? I know it's fucking jews, but which ones? Are we getting the same thing as Fag Anglin's Thai Fuck Shack? Did jim do something?
Anthony Thomas
No one has done anything yet. This is all preparation, expecting to be taken down, preparing for it.
Asher Davis
It's not particular person or entity. It's the whole Jew system coming down on us.
Jayden Jones
Pretty much. ICANN, which is controlled by (((UN))) thanks to king nigger. He didn't shut it down.
I think it is important to get in good physical shape (DO IT) and star looking to irl groups. Obviously not some blood & honour shit but you know what I mean. Movements.
Jacob Myers
FUCKING GET OUT HAPPENINGKIKES
Xavier Stewart
>>>/cuckchan/ here >>>Holla Forums is the king also check out >>>/poltech/
I think it is important to get in good physical shape (DO IT) and star looking to irl groups. Obviously not some blood & honour shit but you know what I mean. Movements.
Jaxson Sullivan
You can watch webm with it so not sure where you are getting that info. On linux though, but doubt that's the difference.
Aaron Watson
If this site goes down, it should be a sign to everyone that you need to get fucking prepared for war. Real war. Good post, and thank you OP
To Anons it is important to get in good physical shape (DO IT) and star looking to irl groups. Obviously not some blood & honour shit but you know what I mean. Movements.
Luke Taylor
Exit nodes are not the point at all. Exit nodes aren't why we would use it. They're a shit use for tor anyway. We only want to use a hidden service which has never been defeated even for silk road. They busted the silk road guy because he was posting shit on forums with a username associated with his real name like a fukn retard.
Carson Martin
What's going to happen with imageposting if we go full tor anyway? Are we just not going to have images anymore?
Henry Adams
...
Christian Stewart
Anglin is saying they're going to shut down Holla Forums
Won't work, people will be too pissed at the fact the internet is being censored in general. This in turn will prompt an underground resistance style response. In such a drastic situation, highest priority will be securing new lines of communication and form a robust logistics network. The aim being to sabotage or downright eliminate the censorship efforts in every way possible.
Bentley Reed
You are the same type of person who says, "but they will just shut down bitcoin." Learn how this shit works first, before spewing diarrhea from your Internet terminal of choice, retard.
Kayden Ortiz
Disinformation shill reported.
Xavier Reed
Why?
Jackson Davis
So, is Tails alone better than Tor alone?
Julian Reed
Alright REAL TALK: If this happens do what OP and hotpocket said, You also need to get fit. Funs will be a nett positive. It is hard for me to say which movement you join stateside, make sure they are 110% legit. In Vaterland, look to ultra groups.
Leo Hughes
My guess is (((they))) aim is use the distrust in Spencer being unaffected last to fuel mass D&C campaigns to disorganize people. In theory they could also leave this place untouched as well to play into such D&C efforts while avoiding the massive backlash of taking it down. In that case, one of the worst shillstorms in Holla Forums's history will hit this place soon.
Joseph Brooks
>My guess is (((they))) aim is use the distrust in Spencer being unaffected last to fuel mass D&C campaigns to disorganize people. In theory they could also leave this place untouched as well to play into such D&C efforts while avoiding the massive backlash of taking it down. In that case, one of the worst shillstorms in Holla Forums's history will hit this place soon.
You are of course, perfectly right. If this happens do what OP and hotpocket said, You also need to get fit. Funs will be a nett positive. It is hard for me to say which movement you join stateside, make sure they are 110% legit, look to those proven in the street. In Europe, look to ultra groups.
▶Anonymous
Nicholas Davis
The 10% is partially activated.
Jason Lee
Nobody should trust Spencer anyway, anyone who trusts or associates with that man should be distrusted as much as he is.
I wonder if that study spooked the kike.
Mason Reyes
That happens to many people, though most are not aware. It is a locator, to pin down and confirm the shitposter is you user. We anons speak of DOTR - do you not think they do they same, but for us? This has happened to me also today after posting on steganography
Joshua Cooper
I'm not trying to be a big dick swinging super Aryan here but other than it being annoying I don't give a fuck about being "exposed", I'm not running for pope, and don't work in a office hive anymore. I always assumed cia niggers knew who I was but I don't do anything illegal so who cares.
Ryan Perez
Just finished setting up TAILS with persistence, while also creating a separate untraceable email. Feelsgoodman.
Aiden Hall
Hi CIAnigger.
Robert Richardson
How far do you think we are from
Isaiah Cook
You are completely right as well. No need to fear being labeled bad names when the are trying to kill you.
PSA, probably shills will try to make it dissapear asap but remember this: If this site goes down, it should be a sign to everyone that you need to get fucking prepared for war. Real war. Good post, and thank you OP To shills: rebelsiren.wordpress.com/category/trolls-shills-cyberbullies-sock-puppets-psyops/ You should know that there is no way you can in any capacity stop what is coming. Da Goyim Know To Anons it is important to get in good physical shape (DO IT) and star looking to irl groups. Obviously not some blood & honour shit but you know what I mean. Movements. do what OP and hotpocket said, You also need to get fit. Funs will be a nett positive. It is hard for me to say which movement you join stateside, make sure they are 110% legit, look to those proven in the street. In Europe, look to ultra groups. Support your American brothers as they have supported us ▶Anonymous
Noah Martinez
See this is what I mean. TAILS. Bought in cash old laptop in another state while in disguise. Made sure to use evasive driving until late I abandoned my car, hide it innawoods and hiked 16miles to the jambalaya flea market where I bought my hardware. Legally changed my name to Classified Unknown (cuz it sounds kewl back to front or vice versa). Only use open wifi while in a white workman type white van, to connect and never in the same place twice. Associate with no real people ever cuz, well, they are all alphabet kikes, duh. All of this so I can tell oven jokes and post the darkest of memes. Totally protected… until my whiteness is seen and I'm STILL PUBLICLY CALLED A NAZI!
Grayson Lopez
Low energy, start looking for another job
HIGH ENERGY No need to fear being labeled bad names when the are trying to kill you. PSA, probably shills will try to make it dissapear asap but remember this: If this site goes down, it should be a sign to everyone that you need to get fucking prepared for war. Real war. Good post, and thank you OP To shills: rebelsiren.wordpress.com/category/trolls-shills-cyberbullies-sock-puppets-psyops/ You should know that there is no way you can in any capacity stop what is coming. Da Goyim Know To Anons it is important to get in good physical shape (DO IT) and star looking to irl groups. Obviously not some blood & honour shit but you know what I mean. Movements. do what OP and hotpocket said, You also need to get fit. Funs will be a nett positive. It is hard for me to say which movement you join stateside, make sure they are 110% legit, look to those proven in the street. In Europe, look to ultra groups. Support your American brothers as they have supported us ▶Anonymous
Sebastian Reed
Is this some sort of bot, or is this user really repeating themselves several times over for no good reason
Joseph Young
I'm on the IOP niggas. Any who live out this way will know 17 to the IOP, right there by the HT, that's me. Sorry, for accidentally rapping. Facepalm*
Jack Morales
Saved, and thanks OP.
Jonathan Carter
If we don't have IRL groups we will be helpless should shit really go down. You hear people yap about CIVIL WAR!!! but for whom good sirs do I point my black powder* weapons toward. *I actually have only BP funs. Double felony arrests. Feelsbadman.jpg
Honestly though we need ham radios and a network. Imagine powers out; the grid is taken down strategically in hard to repair points and or stations are bombed/under sniper supression. Roads are baracaded by God knows who, checking people for - race, religion? Who knows. Point is we can't move a few miles without running into renegade "authorities" but are they cops, and if so are they on our side? BLMs will try to Reginald deny, and white they can stop. Crooked cops will be confiscating funs and or robbing. When katrina hit NOLA the cops were 50% enemies. We can not trust anyone… Which is why we need a few IRL groups. But the Jews keep us scared with bullshit. Like I said I'm in SC, near charleston, but I'll just be one more herded head of cattle unless I know a few people. So will the rest of you.
Leo Clark
That's Trump's entire strategy. If he were to go full WN Hitler 2.0 it would trigger a war with Europe, not to mention a catastrophic (((market crash))) that would cripple the US. OTOH, if he continues to play it stupid while provoking the (((left wing))) into continually doing crazier and crazier things, eventually the public will get wise because the "solution" (Soros-backed initiatives) is worse than the "problem" (WN groups, etc.). Right now there is a massive perception issue with being WN, Nazi, or anything like that due to overwhelming (((history))) that students are exposed to in public schools. It's not fully successful, but it conditions a sufficiently large number of mundanes into irrationally hating anything to do with white pride that it's a serious impediment.
Trump did us a massive favour by moving the Overton window rightward; however, we still have the problem of public (((conditioning))) that must be addressed. We can't fix it easily, because feeding the unwilling red pills is, at best, time consuming; at worst, it's impossible or actively gets us blacklisted one one fashion or another from possible resources. Trump's solution to that seems to be to play "stupid moderate" without excessively appeasing the liberals, so they continue their apeshit delusional tantrums when confronted with a guy who is… not really doing much. To anyone who isn't an invested (((foe))), that makes our enemies look crazy, and makes us look moderate in comparison. You'll notice that while there have been some tantrums, there wasn't widespread chaos when a sitting president named both sides in a conflict between WNs and, well, anyone else. Imagine what would have happened if something like that occurred during the Obama years. The amount of public manipulation Trump is doing on our behalf can't be overstated, but it's too subtle for most people to see it.
The only reason I can is because it's what I'd do in his position.
Nathaniel Morgan
>OTOH, if he continues to play it stupid while provoking the (((left wing))) into continually doing crazier and crazier things, eventually the public will get wise because the "solution" (Soros-backed initiatives) is worse than the "problem" (WN groups, etc.). >Right now there is a massive perception issue with being WN, Nazi, or anything like that due to overwhelming (((history))) that students are exposed to in public schools. It's not fully successful, but it conditions a sufficiently large number of mundanes into irrationally hating anything to do with white pride that it's a serious impediment.
Jayden Myers
Spoof your Mac you gigantic retard
Colton Martin
Why do you have to bring your Trump autism into this thread? There's 6 million other threads about Trump.
Luke Morris
Because we have an influx of newfags who will be reading this shit. But fair point.
Matthew Taylor
YOU STUPID FUCKING NIGGERS.
TOR IS A HONEYPOT.
WE NEED AN I2P SITE. I2P IS THE SAFEST DARKNET AT THIS TIME.
Sebastian Perez
My adnauseam's been sitting at zero since yesterday. I've probably done something wrong somewhere but i can't figure out what. Am i retarded?
Gavin Phillips
And here's another CIAnigger. Will you give proofs, or you'll simply namecall me like you always do, Moishe?
Jackson Hill
Are you using it in private browsing mode? Do a Google search for anything and if it still says 0 then you've done something wrong.
James Hughes
Agreed.
Adam Torres
Holla Forums will never go down.
Austin Russell
what proof would you be satisfied with? there's been several good theories posted. you aren't going to have some document that says "these people are guilty" from the government, so what would it take to convince you. demanding proof over and over is what jews do.
Colton Fisher
Were they actually tested? Was anyone acually deanonymized by something other than a browser exploit or an OPSEC fuckup? No, so fuck right off, ((( (1) ))).
Jack Sanders
If somebody claiming to be a communist assassinated Spencer, that would do a lot of good.
Alive, Spencer is a subversive, a liability. Dead, he'd just be a martyr.
Landon Baker
...
Brandon Robinson
(((weev))) says Tor nodes are banding together to block TDS. The only thing this means is slower speeds to access the site. They're actually making the network weaker and opening themselves up for criminal liability to stop hate speech which is hilarious if this is true.
Criminal defenses for Tor nodes are if they're ever raided by police would be to assert that they have no control over what services the people that access their nodes use. It would be difficult for a node operator to explain legally how they're able to block racism but they can't block illegal trafficking and cp.
If this is all true this would be the first case of large scale censorship in the Tor network. A network which was built explicitly for anti censorship.
>Andrew Auernheimer · @(((weev)))
Luis Carter
not answering the question and trying to discredit people off petty details is also what jews do. what proof would you be satisfied with? the fvey document above mentions that deanonymization has been done without the two things you claim are necessary. clearly that isn't enough for you. what is?
Julian Butler
>(((weev))) says Tor nodes are banding together to block TDS. They aren't, (((weev))) is lying. Somebody asked the Tor project to add code that would facilitate blocking TDS and the Tor project told them to fuck off for a number of reasons.
(((weev))) is a jewish federal informant who's playing a role. STOP BELIEVING HIM.
Brayden Bell
TOR was created by the US Navy, funded by the CIA, and has one hardcoded server it calls in to find peers. If that server is ever taken offline, the entire TOR network of computers is kil.
I2P has none of these flaws, unlike TOR, I2P is truly decentralised and can still operate if the I2P project servers go offline.
PS: You're still a filthy kike. (thought you'd not be called out on that?)
Nathaniel Flores
Specifically, (((weev)))'s angle right now is obviously to push TDS further and further out of reach. That's why he tried to use GoDaddy, he knew they'd take the domain. And that's why he's now taking advantage of general ignorance surrounding that Tor issue tracker post (which most people never read past the title) to push TDS onto a platform even more obscure than Tor.
(((weev))) IS A KIKE YOU FUCKING IDIOTS. HOW MANY TIMES MUST IT BE SAID?
Josiah Thompson
I2P doesn't have it's own browser so I'm worried a lot of people are going to get compromised by something stupid like a script or something just because they don't know better. There's a lot of stuff I like about it though like the built in filesharing and messaging etc. Last time I used it a few years ago though most of the hidden sites I tried to load didn't even work and the ones that did were so slow it made tor look like a racecar. I hope it has gotten better.
Anthony Howard
Link these posts, then. So far I didn't see any documents about confirmed deanonymization, only shit about hardware packet sniffers/injectors (they see already encrypted traffic, gl hf) and VGA cable implants (use a laptop and check your cables). Sweetie, it's you who didn't answer my question in the first place.
Adam Peterson
Totaly offtopic But is the scene in OP's thumbnail an actor or from actual ww2 footage
Justin Ortiz
any browser can be made to work with i2p but you should use a dedicated browser with noscript+ublock+umatrix the reason why it runs slow is because you need to up the bandwidth its allowed to use and let it integrate into the network for several hours, once integrated the next time you turn it on the faster it works however the longer you go without integration the longer it takes to work
if you're trying to access the clear web you can set up i2p to use the i2p network for eepsites and tor as an outproxy for the clear web or .onion access
Parker Fisher
This works on the classic router, I was talking about the i2pd (the i2p version which doesn't use java) - it's advised to use privoxy for this functionality. Still, thx.
Guys why can't we do what they are doing in Greece?
When shit started heating up in Greece back around 2010, the government immediately cracked down on Internet access to try and curb the organization of the protestors, and they responded by creating a ghetto wifi network.
I know we're spread out over a huge area, but why can't we investigate the long term viability of us doing something like this?
i'm not really too knowledgeable on IT stuff, so maybe there's an obvious reason this wouldn't work and it's going over my head. Just a thought, though.
I know we're spread out over a massive area and us personally networking together would be hard. But if we can draw in a few strategic "normie" groups on the common battle cry of internet freedom, we might be able to use them to saturate wifi nodes enough across geographic space that we end up with something we can work with.
Jack Wilson
It probably will happen, but they have to start cracking down on normalfag shit as well. I don't think it will happen until then. We need the co operation of the larger population to want a meshnet because it's the only way to fileshare or whatever the fuck. But hey, when has a jew ever NOT gone too far?
Anthony Sullivan
Maybe we could set up Holla Forums outposts on normie websites.
I know that banning, censorship, shill infiltration etc etc would be a massive issue.
But if we're talking about Holla Forums facing an existential threat, we could possibly chest-burster hibernate inside of a normie website somewhere that is too big and popular for them to kill outright.
This kind of thing happens a lot in China where massive dissident communities develop and lurk in plain view of the state censors and conceal their actions by evolving a complex series of speech patterns, verbal ques, and double entendre type of symbolism.
Zachary White
This is something I've been thinking a lot about but haven't had the time to fully research. Mesh nets would work well within cities or even suburbs with larger antennas and more power. But connecting say LA to Vegas will be a bit harder. You might easily be able to get a few thousand people in each city to setup fairly quickly but it takes a lot more money and effort and time to setup links between major cities. So while you might have 10k in each city there will be a bottleneck of information between cities.
Everything about having a completely 'off the grid' net is technically feasible you just run into problems of cost and legal issues over long distance communications regulations from the FCC. Its been years since I took the ham licensing exam but IIRC you cannot use encryption over the ham bands anyway so you're stuck with consumer-tier equipment and the amplifying power the FCC will allow. And if there are no regulations now it only takes two seconds for the FCC to come out with a 1w max amplification regulation on consumer wifi devices.
Hunter Bell
You basically described T_D.
I think this process will happen organically as we continue to be deplatformed. Holla Forums shall live in your heart, wherever you go.
Noah Rivera
This would deserve it's own thread but I'm lazy : On the 3 of August, the French government passed a law that criminalizes "hate speech" in private conversations. "non-public defamation" is what they call the "crime". Let that sink in. And of course nobody is talking about it.
Caleb Turner
what are the chances that he doesn't even know that you can access TDS on the clearnet by adding .link at the end of the onion link. why don't they tell this to their readers instead of playing the martyrs?
Daniel Peterson
i would reply to all anons in this thread if i knew how, im sure a way exists. do not argue with jews, do not engage them. they are parasitic in nature. they will never admit to a lie on pain of death. work together. btw, those files that compress more bytes than they say when you click them, and when someone opens them they basically holocost your computer would be a great internet molotov cocktail. senators comps, idk just an idea which is what this thread was for.
Rules 3 and 10 are: racism and behaviour outside T_D, yet if you see the posts history, the account was never racist toward anyone. Although, it does expose the anti-white racism of alt-left. And uses the alt-left violent communist revolution to come to smoothly slide into PizzaGate.
Reminder that when uploading an image after the fall, you need to remove all the metadata from it. Taking a photograph with a (((Cell Phone))) usually results in a geotag, but other EXIF datacanbe used to track you. For example, you think "I have a good reaction image to this!" You web search "Kyle Brofloskey Snickering". You find one site that has a png of this. However, the specific site is a CIA operation (e.g. Vice) and in their metadata they've added some nonsensical EXIF strings such as "Comma=Good, James=Cameron". This gibberish is to disarm you. This is so they can know where you got the image. This really only works if you're using clearnet. Good tool to remove (and examine) EXIF data a in images is MAT, made by the same people as tails.
Also, don't switch between Clearnet and Tor. If you pasted a link to this thread, and then decided to open it to make sure you entered the correct link, you've just proved it's you to any LEOs lurking because you opened the link within 5 to 10 seconds after a tor poster opened the link! If you open links, highly recommended to also open them in the tor browser. But don't casually open links either. If you were to be dumb and open facebook while also having this site open (both in tor), that's a connection.
Additional tips: click the "New Identity" button periodically. This returns Tor to a fresh state, making it harder to track you. Heed my previous warning about Javascript in this thread. Don't be dumb.
Easton Roberts
I think I was too vague there. What I meant was that the gibberish is disarming because it doesn't look like much to an anylizer. It's strange and doesn't appear to have important information. However, they can simply look through the EXIF data of images on their monitored sites and grep it for their jibberish. Then they simply need to look through the NSA Spynet to find out who posted the image. This really only works on Clearnet. If you uploaded the image off Tor (which is not allowed rn) and you got the image off clearnet, still Doxxing. If you got both of of tor, meh. It's still a good rule of thumb to remove the metadata from all images you have, especially photographs, since Geotag metadata is a thing, especially if its your own photographs.
Kevin Brown
What everyone needs to know: These actions are last death squirms of a dying globalist (((machine))) who has lost complete control over propaganda and media to keep people brainwashed with white guilt into their own death. A new era has begun on 21/8/17 This is our time. RISE
Samuel Walker
Question why don't we fuck their ad revenue regardless of wether or not they shut us down?
Saying we will fuck their revenue if they do X just gives them time to prepare. Once their defenses are in place they will proceed to shut us down.
Owen Howard
Testing tor
Evan Murphy
it said i can't upload files. that needs to be changed in case the domain goes down.
Christian King
You can make archives of websites using the Teleport tool. I have been doing that for years, and you still can do that too to save websites sontents that are soon to be on the censorship choppingblock.
I would like to give an honorable mention to BitMessage here too. Unfortunately, it's easy to spam, but if Proof-Of-Work was configurable at the "Address Generation" level and it took a sufficient amount of time to generate (e.g. 1 Hour), shills could be blacklisted quickly. There was talk of a platform similar to this a while ago. I'll see if I can find it and will post here if I do.
Robert Moore
There is a very good reason why www.8ch.pl/ is GONE already. We could very well be NEXT.
If you all out there haven't been making personal archives over the years as contingency plans for this inevitable eventuality of hard core internet censorship………… well hope is still not lost, get a new hard drive and GET BUSY!!!
8ch.pl is still up. Go to ht tps://8ch.pl/boards.html Also, explain what your mega is.
Jeremiah Rivera
SMOLOKO.COM IMAGES.pdf
Tyler Wood
Google banned ad nauseam from the add-on store from chrome. What other credentials do they need? If google hates them, and hates them way more than all the other ad blockers, then they must be good.
Joseph Anderson
I recently made some archives of sites that I figured will soon be on the chopping block (mods please don't ban me).
Good work, user. But you shouldn't trust archive.is. They've taken stuff down before.
If you're using a unix based system, you can download a copy of the entire website onto your hard disk using something like wget --recursive --no-clobber --page-requisites --html-extension --convert-links --domains $arg1 --no-parent $arg1 where arg1 is the url of the site you want to download.
Neat. You can download the whole archive using wget -r --reject "index.html*" -np -e robots=off https'':''//murdercube.com/files
Jace Phillips
And now, a brief explanation on why the left is so getting so desperate to kick off a civil war in the USA:
Why is the left going absolutely insane about one unfortunate woman in Charlottesville?
Why is Nancy Pelosi pushing to formally censure the president for his simple, commonsensical, and decidedly uncontroversial rebuke of all the bad actors involved?
Why is the media pushing this story 24/7 while Russia got dropped like a hot potato?
Why are the MSM and most of the Democratic Party egging on Antifa?
Why did a Missouri State Senator openly state on Facebook that she wishes for an assassination of Trump?
Why are web hosting services kicking alt-right websites off their servers? Why are conservatives on Patreon and YouTube getting both demonized and demonetized? Why is the First Amendment being targeted BECAUSE OF ONE NEO-NAZI ASSHOLE?
But the even more important question is:
Why now?
Because the Deep State are scared absolutely shitless and they are emptying the last chambers of their political revolver.
They know what awaits them in the future. They need to bring about 1984 soon or lose power forevermore.
Or worse. They fear the awakening populace."
Levi Evans
Thanks, I just use the Teleport tool to download whole websites on my PC.
A LOT of spooks have read the writing on the wall and have retired out of the Alphabets and went to hide in the Ozarks and NC because they know the Big Purge is coming, and they don't want to be caught up in it after the raging internal civil war in the U.S. gov't has been won with a clear winner.
Jonathan Long
how does this work?
t. uneducated user
Blake Perry
Now take this into account: Antifa is the paramilitary arm of the Democratic Party. Dems have nothing to lose. They are cornered. They are fighting for their own lives right now, because they know their biggest wrench in the cog, Trump, knows all the dirt they've been up to, from the corruption to the human trafficking rings. And they know Trump knows because he taunted them in what regards the human trafficking they take part in (aka: PizzaGate), and they know that he knows of the relation between Clinton Foundation and the human trafficking of children from Haiti. Don't believe me? Fair enough, I can prove it, watch this video, starting at the 14:39 mark to 14:51: youtu.be/JOUFsCS7xYE?t=14m39s
“Hillary famously said it takes a village. Which is interesting, because in Haiti she’s taken a number of them” Trump had suddenly excluded Epstein from his social circle over a decade ago without explanation and then in his famous Al Smith roast speech following the third presidential debate he’d made that odd quip about Hillary. If you have done any research on the PizzaGate case you know that confirms that Trump knows for a fact what we also ended up finding out about. Trump. Knows. Therefore, he must fall for the Democrats to be safe. Democrats need Trump to fall, or they all get exposed not only for the massive cases of corruption, but most importantly, for the high profile rings of human trafficking and pedophilia amongst the highest of highest world elites. Ex-president Obama, Hillary and Bill, both Podesta brothers, Epstein, James Alefantis (which, via a investigative work of an user on infinite chan, we came to know is a Rothschild, which suddenly explained all the jewish paid shills trying to take down PizzaGate).
There is a unix program called wget that is used to download files from the internet. It comes with most all? linux distributions. If you are running linux you can open a terminal window, navigate to the folder where you want to store the website and then run the code.
For example, if you wanted to download holocaustdeprogrammingcourse.com, you would run wget --recursive --no-clobber --page-requisites --html-extension --convert-links --domains holocaustdeprogrammingcourse.com --no-parent holocaustdeprogrammingcourse.com The different commands after the word "wget" instruct the program wget on how to to this. For example, –recursive tells wget that it has to download the site recursively.
If you are new to linux, there is another program you should look up called youtube-dl which you can use to mass download youtube channels and playlists.
Bentley Flores
Can confirm, I was in a lecture by a CIA operative.
Parker Taylor
The U.S. Government internal civil war is simply between ardent satanists and lukewarm Patriots. Guess which side wins? Better move your tail to Canada if and when the slow coup takeover is complete and people are being rounded up to be sent to the FEMA Camps. They are that desperate to have their political enemies eliminated!
I tried but couldn't make an archive for (((Daily))) (((Stormer))) (((dot))) lol
Owen Campbell
Why would I want Google, to get money when I block their ads?
From your own explanation…
Google’s refunds amount to only a fraction of the cost of the ads served to invalid traffic,
Samuel Gray
Fug.
THERE AS TO BE A WAY FOR THE FUCKING PEDOS TO GET GOT BY TRUMP.
How do you think shit is going to go down?
Jackson Johnson
If some user out there would please make an archive of these videos, it would be much apprecieated! "They" want this Youtuber truther site gone too, as the site owner was wrongly accused of by the Left of being a Russian operative.
This is a very scary thing to know about, when you get the real intel about what is really going on from a few sites on the 'Net. I'm not sure how it will play out, as Brennan has publicly threatened Trump with assassination. All I can say is Keep Your Powder Dry, and pray real hard, it is that serious.
Austin Sullivan
That's why we need to create our own VPN but the problem is I don't want my server to be based in my country and we need someone to take care of the servers in somewhere that government or other leechs can't reach.
Jayden Roberts
Don't you think the best way to do this shit is:
1st- We self-improve, we sort ourselves out as much as possible each and every day, by striving to become stronger physically, mentally and financially each and every day. It doesn't matter at what level you start, start TODAY;
2nd- We fight the cold war against leftists and traitors by waging defensive and offensive memetic and deplatforming war on the enemy, online and AFK;
3rd- We prepare for SHTF in case the traitors and enemies of the West successfully kick it off and we have to deal with a hot war. —–
I think that the more people we can red pill before it all starts going down the better.
Parker Smith
If Trump doesn't get the evil pedophiles and Adrenochrome makers, the public definitely will!!!
Aaron Flores
Where is that?
Isaiah Harris
What about the Governmental Agencies? The public better be ready to know how to deal with the fire power and tech they have available to them! FUG!
Samuel Roberts
I definitely don't want any man's blood on my hands, and a guilty conscience alongside with a hot war, but we all have been working overtime educating and distributing Red Pills as best as we can. But I definitely have contingency plans in case the Left ends up with a 'Hard Kill Win' against us all. We all should have contingency plans if life in America turns into a bloody civil/guerrilla war. But do our best to prevent the U.S. Civil War the Elitists want so badly.
Bentley Rogers
At least I am in Australia so there's nothing to worry about, right…?
Aaron Edwards
(((Tor))) is actively censoring Fag Anglin's Thai Fuck Shack. Anyone who thinks the world's largest cp bazaar isn't a kike system is a fool.
it's a mountainous region in Missouri and Arkansas, full of springs and caves and patches of hidden land for farming.
The Feds are not all powerful, but the Army is a formidable force to have to deal with if it shuts down your city and institutes Martial Law. The Federal agencies have been feverishly working overtime on this eventuality, and they are to be envied as to their massive preparations, DUMBs, political reeducation plans, sterilization vaccines and foods, mind control technologies, and many other preparations prepared for against the public. But they are not invincible, as the Army and Marines got their asses kicked in Iraq and Somalia by the ragtag public there. But they were definitely subdues by Force Multiplication firepower and even by the deployment of some highly top secret super weapons. Never underestimate the enemy, but do prepare if we find ourselves in a hot civil war.
If the jews didn't exist then we wouldn't be in this mess that the lovely traitors created for us! Purge them.
Luis Martinez
You have the potential of an Indonesian Army invasion to consider about happening in the future.
Adam Johnson
If you can't see that all over the West they all doing the same shit they are doing in US you've been asleep. They're going all in. The PizzaGate is all over the globe, Spain, UK, Portugal, USA, Haiti, who knows where else…
As terrible as this is to say, civil wars all over the West are just a matter of time. They're cornered, they won't be exposed, the mob would lynch them, and their all over the world. I can see it in other countries MSM and political landscapes. The playbook is always the same, always. FUGGGGGGGGGG. Guess we are living in interesting times indeed, time to prepare for the Apocalypse.
Caleb Morales
I am not worried about that because there are more than 1 million aussies armed in secret but politicans should be worried thought as they have screwed them over too many times so it is safe to say that they will be purged by the angry aussies. Mfw the aussie democracy will die during my lifetime.
Well fug, at least the global multi-civil wars start instead of WWIII. I wish Ice Age come now instead 2030.
Robert Bennett
oh im sorry i dont use linux
I'm rather uneducated tech-wise, thank you for that info anyway
Wyatt Torres
according to the oath of of the president, he is supposed to carry out the constitution and protect it from all its enemies
if he can't get current feds to deal with said people and kikes, based on the precedent of privateer/mercenary pirates he can give legal sanction for the killing of these people
also, he would be allowed to organize said group under him as a private legion, which means he could get everyone from former alphabet to mercenary to polack to join in on bashing these kikes' heads in
i doubt it'll happen though
Evan Thompson
Oh yes, and there is that too, the Maunder minimum by 2032. KEK, life will always find a way to get you killed I guess :DDDDDDDDDDDDDDD
Ethan Stewart
Problem is that…… it is NFL season!!! Everyone, even the militias are still too chicken out there to (((Handle))) (((Their))) (((Business))).
Brandon Wilson
Seems like you are really reaching with that one. How long are you going to support this orange faggot? Trump fucked us. He told us exactly what he thought we wanted to hear.
Thats why he kept flipflopping nonstop: he was just trying random phrases to see if voters would go for it. Thats why he suggested punishment for women who get abortions, then changed his tune as soon as he realized it was unpopular.
Ill believe this horseshit when it actually starts happening, not before.
Austin Bennett
Oh yea! You forgot the supervolocane is going to go off anytime. The glassy smoke will cut billions people's lungs like the papers and darken the sky that will last for a hundred years.
Joshua Jones
Really causes one's raspberries to rotate
Dylan Rivera
THIS.
AVOID ANYTHING that has JAVASCRIPT.
ZERONET is a HONEY POT.
Juan Butler
keep an eye on Holla Forums
either me or fellow operatives will post what we did last week
we even got a local paper to write about our "racism"
Jeremiah Perry
Like I say, it's NFL season. Who will fire the first shot?
The Big Red Pill I need to involuntarily cram down your throat, is unfortunately Trump is from the same Swampmonster stock that we were all expecting to save us. Prepare for more big disappointments in the future.
Ryan Roberts
KEK, I didn't knew that Yellowstone was such a trololololol volcano of doom.
Samuel Robinson
in my town, my network dropped pizzagate and holohoax on the first day of college
Ryder Sanders
Pardon the retardation, but what is pic related?
Dylan Mitchell
So the feds can't shut it down? My country is large so it's not a problem for everyone to have their farms except the city people.
Ryder Parker
You notice the Trump address contacts section on the top lefthand corner of the pic? That is from Jeffrey Epstein's "Address Book."
Some areas of the country are more suitable for guerrilla warfare and survival if and when the takeover of the Federal Government is complete.
Camden Anderson
I hope whoever take over fed governments are bad goys!
Good work, keep redpillin' them mate.
Ian Bell
If they are going to shut our websites down, we should take the fight to their websites and basically just raid them with red pills. They are getting away with it because they are on the offensive now. Trump has simmered down in his attacks on the media. We need to put them on the defense again by causing chaos on their own leftist websites. Shitpost comment sections, concern troll as antifa and push them over the edge, etc. I'm sure you guys can come up with something better.
Robert Richardson
can someone answer this for dumbfag me?
Liam Johnson
The many years we were asleep thinking that the government was working in our best interest is over. Monday morning has arrived, and it is cold and raining hard outside.
distribute truth in its many forms. I pass out free downloads. A bunch of the files and more are collected together here in these 2 links:
Is using TOR and AdNauseuam at the same time a-okay? Also testing to see my 0's.
Elijah Hall
I've had good success for archiving with firefox's built in tools (save page as, Web Page, Complete). Firefox also has the screenshot –fullpage command which you can use to take a snapshot of the whole webpage and save it as an image. There is a bug with the fullpage screenshot thing because it can't make screenshots that are more than 16k pixels tall (probably effects width too).
Nathaniel Clark
The CIA controls the TOR exit nodes. In my misguided opinion, you are better off using a public computer like at a hotel, being sure to no social media logins, for anonymity.
Eli Bennett
I kind of don't get the point of this thread. Of course TOR is compromised. Almost all computers are, whenever on software or hardware level. Did you already forget about UEFI and CPU-Backdoors?
If they shut it down, it's down for good. I'm not larping here, this just common sense at this point.
Leo Turner
there is an easy way around 8ch going offline. just remember the telepathic address in the astral and meet there
Grayson Martin
into the oven with you dont let the door hit you on the way in never mind the hising sound
Christopher Roberts
I know he had social connections to him but consider this:
Now take this into account: Antifa is the paramilitary arm of the Democratic Party. Dems have nothing to lose. They are cornered. They are fighting for their own lives right now, because they know their biggest wrench in the cog, Trump, knows all the dirt they've been up to, from the corruption to the human trafficking rings. And they know Trump knows because he taunted them in what regards the human trafficking they take part in (aka: PizzaGate), and they know that he knows of the relation between Clinton Foundation and the human trafficking of children from Haiti. Don't believe me? Fair enough, I can prove it, watch this video, starting at the 14:39 mark to 14:51: youtu.be/JOUFsCS7xYE?t=14m39s
“Hillary famously said it takes a village. Which is interesting, because in Haiti she’s taken a number of them” Trump had suddenly excluded Epstein from his social circle over a decade ago without explanation and then in his famous Al Smith roast speech following the third presidential debate he’d made that odd quip about Hillary. If you have done any research on the PizzaGate case you know that confirms that Trump knows for a fact what we also ended up finding out about. Trump. Knows. Therefore, he must fall for the Democrats to be safe. Democrats need Trump to fall, or they all get exposed not only for the massive cases of corruption, but most importantly, for the high profile rings of human trafficking and pedophilia amongst the highest of highest world elites. Ex-president Obama, Hillary and Bill, both Podesta brothers, Epstein, James Alefantis (which, via a investigative work of an user on infinite chan, we came to know is a Rothschild, which suddenly explained all the jewish paid shills trying to take down PizzaGate).
I don't see that pic as a reason to give up on Trump yet.
Lucas Nguyen
so kekd right now my diamond dick cut right through my jeanz
Mason Hughes
Manually configuring I2P for the tor browser is no longer an option, at least not with the sandboxed version which is the only one I will touch. I was previously using foxyproxy, but that seems to be broken on the latest versions.
Nicholas Carter
Surely they're keeping from him from hearing about it?
Josiah Martin
The clue is in the "Hotpockets edit" Every post in this thread of the last 24 hrs warning against jew tricks has been deleted. In case you aint worked it out all Holla Forums has done over the course of the last 2 years is herd the goy into the exact path the zionist kikes have been telling us to.
This is why detailed posts explaining how Tor is compromised and some of the other kike traps have been removed.
Try and trick the censors here maybe by singing the praises of zionist freemason puppet Trump and they might miss your sound warning against Tor
Tyler Williams
...
Jeremiah Smith
on windows you can download standalone version of wget and drop it to system32, and it'll work the same way, look for "wget windows". Or you can install Cygwin which has a lot of unix utilities like that available for install, and it includes real fuckin' Bash shell.
.onion traffic doesn't meet exit nodes.
Also I'm on Libreboot, your argument is invalid.
I am autistic enough to monitor this thread for a bit less than 12 hours, and no posts with "holy fuck it's actually compromised" shit even appeared, let alone got removed. Every CIAnigger talking shit about Tor chickened out when asked for deanonymization proofs.
Gavin Rodriguez
While I'm not against opsec, relying on VMs and thinking you're 100% safe isn't smart
Michael Howard
Yes, since Tails alone INCLUDES Tor. If you do some digging on different Linux distros you can find more specialized distros which come with Tor and various other privacy features. The main thing to look for is amnesiac operating systems which can be loaded off thumb drives.
Parker Lopez
I'm curious. Does libreboot remove intel's management engine (ME)? I've seen ME Cleaner (github.com/corna/me_cleaner) which "deletes" it.
I think you are confused. Libreboot has nothing to do with VMs.
Dominic Carter
Similar principle. Thinking an OS of any kind has any bearing on firmware level backdoors is a little silly.
Levi Rogers
while it seems to remove Intel ME, the mentally ill project leader, the wierd code changes and the lack of actual updates makes it more then suspicious. I'd keep my hands off it, in fact I don't use it. If anything I'd go straight with coreboot with removed blobs but of course they don't provide binaries.
Nathan Roberts
okay you ebin haxor, whatever you say :^]]
Brody Jenkins
OH LOOK. EVERY SINGLE THING I SAID WAS CORRECT. HOW ABOUT THAT, YOU COCKSUCKING FAGGOT YIDS.
TOR IS COMPROMISED AND WILL DELETE ANYTHING THEY DON’T LIKE. TOR IS COMPROMISED AND WILL DELETE ANYTHING THEY DON’T LIKE. TOR IS COMPROMISED AND WILL DELETE ANYTHING THEY DON’T LIKE.
Logan Allen
Oh Snap.
From what I gather, >I2p is the only actual true P2P solution and the one you hear least about for some (((strange reason))) I use retroshare but it won't work for gazillion Holla Forumsacks. It's true p2p and has never been a problem as long as you let it run so it can always synch.
Anything centralised = kiked/pozzed or will be. True p2p/I2p is the only way we should go. Hotpocket needs to update that shit.
Bentley Butler
sounds good in theory but it's not useful at all practice. First of the compromised computers everywhere aren't suitable as they do more harm than good. Second, Internet Provider usually limit upload bandwitdh in most countries, making p2p awfully slow even more if it's encrypted. Third, Deep Packet Inspection, it's old shit but still a thing. Even when you magically get access to a non compromised computer, all you send and recieve can be intercepted and manipulated. Fourth, try watch some anime online when bandwith is full with p2p traffic. Fifth, doing any kind of Internetservice (Server, TOR proxy, Bittorrent) is at this point like begging to get your home raided and all your stuff taken. Sixth, this isn't exactly a point but I just wanted to say I've been telling about this shit for years and nobody listened or sneered at my comments. Everything I tried to make things better or get somehow help have been laughed at, hindered, or haven been simply ignored by pretty much everyone. So it's basically a big fat >TOLD YOU SO!
Eli Smith
Please stop fucking recommending tor. I already knew that the only alternatives right now were going to be i2p and Freenet since Zeronet is a fucking JS death trap.
Anthony Long
Purpose of the thread is to provide alternative methods of keeping community communication, if you think i2p is a good bet then post some information about it for those less technical can get set up with it. Otherwise shut up.
Jacob Smith
We already had discussions on Holla Forums and Holla Forums when the Nigger Commie King gave it away to ICANN. Nobody can think of anything besides i2p, freenet and encrypted clearnet ipfs. We're basically waiting for a better solution when we don't have the time. Please, contribute.
Alright, answer these questions then: 1. What's a good browser to use with i2p, because it looks like it needs to be configured manually. What I'm seeing is if you don't properly configure it, it's dangerous to use anyway. 2. What is a good bunker on i2p to utilize at the moment? Doe one exist? If not what is the best way to create one? 3. Is i2p safe? Has anyone been able to test it or at least find examples of the effectiveness?
Leo Bailey
What do you think "waiting for a better solution when we don't have the time" means? Nobody's bothered making retard-proof browser combos because they're not directly funded by the government. Given that, can you think of a solution besides throwing darts and seeing what sticks? Tor is a fucking joke if they could have always capped bandwidth to sites to the point that they're dead.
Noah Ortiz
How would you even do this? The only way I can think of doing this is by having the entry guards running a custom version of tor which checks against the DS old ip address (the one behind cloudflare). If it were possible to limit a specific hidden service's bandwith, then it would also be possible to get the ip address of any hidden service.
Isaac Diaz
Keep in mind our only source for this shit is ((((((weev)))))) so it's probably utter bullshit to scare people away from tor and a usable alternative.
Andrew Cook
The Jew fears the WhitePowerPC.
Grayson Reed
I guess unironically PPC and even old SPARC are more or less usable. Depending on board and Software used. Still wouldn't touch a Siemens/Fujitsu build, though. A (very) few ARM based solution can also be used.
John Foster
It's no coincidence PPC was driven off the home market. Which ARM would you consider most likely not having any secondary processors (Corporate management solutions) ?
It's also no coincidence that Israeli contractors are hired by primarily the United States to prevent hacking of it's infrastructure.
Asher Mitchell
I always thought that (((weev))) would just lock Fag Anglin out of his Thai Fuck Shack and replace the home page with a picture of goatse when he got bored with it. This is a little more elaborate than expected.
Eli Parker
Difficult. Certainly no new ARM. I guess the known ones like Beagleboard and certain Allwinner A20 Boards.
The Problem is, even though the some Allwinner A20 Boards can be used including graphic accerlation (for ARM usually only headless is "safe"), no long ago the widely used SUNXI source tree was found backdoored. It should be fixed now however this does open some questions. In any case, whatever will be used MUST be source audited by people that have the capabilities and we must be able to trust them.
Landon Ramirez
Link please, was it the chinks? (For people who don't know most Raspberry Pi alternatives that are not extra costly are all sunxi)
Anthony Thomas
Can only trust half of what (((weev))) says. The .onion loads just fine. Now they are trying to be TO EXTREME FOR TOR.
Josiah Clark
You can get a privileged escalation (to root) from any user by doing: echo rootmydevice > /proc/sunxi_debug/sunxi_debug (Note that an executable could exploit this vulnerability in order to start running code as root (in which they can install their malware / a backdoor which can be accessed over the network).
Gabriel Perry
>(((weev))) yells TOR is blocking him Now I know why he has ((()))
Angel King
...
Kevin Gonzalez
Reminder to use FireJail Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces and seccomp-bpf. It allows a process and all its descendants to have their own private view of the globally shared kernel resources, such as the network stack, process table, mount table. To start the sandbox, prefix your command with “firejail”: "firejail firefox"
There's no setup involved. Just install FireJail and optionally (recommended) run "sudo firecfg". This allows the user to sandbox programs automatically by clicking on desktop manager menus, desktop launchers, and files in file manager.
wowo thats SO LEEE FUNNY XDDDDDDDDDD epic reddit my dude
Andrew Williams
They won't do shit They can't do shit
All these triggered SJW leaches at the TOR foundation can now go to work everyday knowing their organization is helping evil nazi's.
Jonathan Cooper
It's actually a really good name. Catchy as fuck. Anglin, if you're smart, you'll snatch up faganglinsthaifuckshack.al and fatfs.al right now.
Thomas Taylor
They did do that to the Fag Anglin's Thai Fuck Shack If we can trust (((weev))).
James Morris
Bump for necessity
Eli Hill
typical
Chase Perez
(checked). Next time they are going to say that Hitler had laz0rs of DOOM!1!1!! to kill the jews. Like, the laz0rs turned jews into ashes by burning them at 5000 C. Forget about the gas showers and the small crematoria ovens, this is the real deal… fucking kikes.