Author Archive

LOIC – 174.120.238.130


tumblr –  do itt faggot.

Don’t know what LOIC or a DoS attack is?

Lurk More.

 

Remember Rules 1 & 2!!! Also Rule 17.

 

 

Smells like fresh baked Facebook Cookies – Firesheep


When logging into a website you usually start by submitting your username and password. The server then checks to see if an account matching this information exists and if so, replies back to you with a “cookie” which is used by your browser for all subsequent requests.

It’s extremely common for websites to protect your password by encrypting the initial login, but surprisingly uncommon for websites to encrypt everything else. This leaves the cookie (and the user) vulnerable. HTTP session hijacking (sometimes called “sidejacking“) is when an attacker gets a hold of a user’s cookie, allowing them to do anything the user can do on a particular website. On an open wireless network, cookies are basically shouted through the air, making these attacks extremely easy.

This is a widely known problem that has been talked about to death, yet very popular websites continue to fail at protecting their users. The only effective fix for this problem is full end-to-end encryption, known on the web as HTTPS or SSL. Facebook is constantly rolling out new “privacy” features in an endless attempt to quell the screams of unhappy users, but what’s the point when someone can just take over an account entirely? Twitter forced all third party developers to use OAuth then immediately released (and promoted) a new version of their insecure website. When it comes to user privacy, SSL is the elephant in the room.

Today at Toorcon 12 I announced the release of Firesheep, a Firefox extension designed to demonstrate just how serious this problem is.

After installing the extension you’ll see a new sidebar. Connect to any busy open wifi network and click the big “Start Capturing” button. Then wait.

As soon as anyone on the network visits an insecure website known to Firesheep, their name and photo will be displayed:

Double-click on someone, and you’re instantly logged in as them.

All of your Facebook are belong to us.

All of your Facebook are belong to us.

 

That’s it.

Firesheep is free, open source, and is available now for Mac OS X and Windows. Linux support is on the way.

Websites have a responsibility to protect the people who depend on their services. They’ve been ignoring this responsibility for too long, and it’s time for everyone to demand a more secure web. My hope is that Firesheep will help the users win.

Some are advocating using the Firefox extension Force-TLS add-on to prevent being hijacked on unsecured connections. But read the reviews first. Some people have noted some issues. Another is HTTPS Everywhere which is currently in beta. I didn’t provide a link because I believe you should wait until it hits the street in full running gear, before trying it.

The simplest way is to avoid social networking when on an unsecured connection.

The practice is known as session hijacking; if you’d like more information on how the code works, check out this post on Firesheep’s technical details.

A virtual private network (VPN) is the easiest way (other than avoiding unsecure Wi-Fi altogether) to prevent yourself from a Firesheep-powered attack.

VPNs create a private tunnel through the public network, protecting the user from any prying eyes (or packet sniffers) on his way from destination to destination online.

VPNs were used a lot during the Irani election and protests; they’re also used a lot in China and in other areas where access to the Internet is restricted.

Another group that uses VPNs frequently is corporations. Employees often need a safe way to access very private and sensitive information from a public network; VPNs provide security and access. (For more information on corporate use of VPNs, check out this HowStuffWorks article.)

The downside of using a VPN is that you may notice a drop in your connection speed. You might also have to pay for your secure Internet access.

The upside, with specific regard to Firesheep, is that you can sit elbow-to-elbow with a black hat hacker in a coffee shop and know that your data is safely encrypted.

Anon /i/e – http://anonie.tk


From D/i/g/i/tal Vom/i/t comes Anon /i/e. I have decided that rather than focusing on internet culture, the main focus of this blog will be privacy and anonymity. Though internet culture will still be a major part of Anon /i/e the majority of content will center around information found at insurgency wikis and obtaining and maintaining security and anonymity. Rather online anonymity is needed for the information you share, out of paranoia, participation in Hactivism, to cover your tracks, or facilitation of illegal activity, Anon /i/e will be a simple source of information. As a supporter of online privacy, a supporter of Anonymous Hactivism, The free share of information, Open Source software, and Anti-ACTA groups, Privacy and Anonymity is  important to me. Though I currently have not achieved total online anonymity, I will share information about the task at hand.

Concerning the blog itself, I will be playing with features of the wordpress hosting, adding and removing pages and links, experimenting with themes, considering hosting and a domain, and looking for authors. The site will grow and change. I am happy to see that over the period of time I was not posting there were still regular readers. I certianly encourage you, if you like the content provided here, or wish to use it as reference, please share this blog with online communities, IRL friends, and keep checking back for new happenings. Also, since I am poor. I am using a free redirection service. http://anonie.tk

A month post gap.


I am quite sorry about the month-long gap in my posting. I had a little issue with my ISP and their billing department. I also changed residences.  I was hoping my supposed co writer would fill in some content but I think sickness is removed from the project. I may consider looking for co-blogger from some dark corner of the internets. I am also looking into a small imageboard for DV. I experimented with IB4F and my conclusion is fuck em. It’s just a fester of furry and fail. If anyone has any information on this. I have a budget of zero, need some half decent bandwidth, the software, mods, janitors etc. Im going to work on the static pages for a little while Until something interesting pops up.  Check in.

OMG Running Bear and the Illusive v&


MSNBC has uped the annie in their fascination with Paedos. The recent report of the Pedo Bear Image has set the stage for much lulz. Costumes, decals, clothing all bear the mark of pederast sexual deviants. No pun intended. A dark humored cartoon meme has now become the mark of the beast. Its time for a little Chris Hansen/Pedobear shooping, stencils of pedo bear lurking near public places, papercraft pedobears hiding in stores. And for the love of pedobear and all that is holy:

1.) Find a Southern L.A. Street on Google Maps (Prefered near an elementary school)

2.) Call this number 805-781-4550

3.) Report Sightings of a man with a pedobear decal on his car near said street

4.) Remove your pedobear parafanelia to prevent v&

5.) ??????????

6.) Profit.

Do itt Faggot.

ACTA – Who is and what side.



Who is doing it?

This assault on your liberties has many perpetrators, all of whom must be dealt with accordingly. They are listed in brief below.

Corporations

Governments

Individuals

  • Tim Couch
  • Zensursula
  • Tim Kuik
  • Stephon Conroy (Autralian broadband minister)
  • Li Yizhong (Li Yizhong is the incumbent Minister of Industry and Information Technology of the People’s Republic of China.)

NGO’s

Software

Who is on our side?

On the bright side, there are those who stand on the side of internet freedom, net neutrality, and fair, reasonable copyright laws — and, consequentially, they are none too fond of ACTA.

Corporations

  • Google (Google can be both a friend and an enemy. They are all for net neutrality but will block search queries and will have youtube videos deleted (they own youtube).
  • EBay
  • Cherry Lane Digital
  • Lotus Development Corporation

Governments

  • Internet Freedom Preservation Act 2008 (HR 5353)
  • Reps. Ed Markey (D-Mass.) and Chip Pickering (R-Miss.)
  • Pirate Party

Individuals

  • Vinton Cerf
  • Sir Tim Berners-Lee,
  • Richard R. Wiebe
  • Richard M. Hall (Moby)

NGO’s

Cooley Godward LLP

  • EFF (Surveillance Self-Defense)
  • Intellectual Property Group at Fenwick & West LLP
  • Keker & Van Nest LLP
  • Open Source Applications Foundation (OSAF)
  • Free Software Foundation (FSF)
  • Stanford Center for Law, Science and Technology
  • Samuelson Law, Technology & Public Policy Clinic at Boalt Hall School of Law
  • UC Berkeley and an Acting Clinical Professor of Law
  • University of Miami School of Law
  • OpenNet Initiative
  • Wikileaks global defense of sources and press freedoms

Meshnet – Compliments of Partyvan.info


A Network by and for the people

MeshnetThread.png

What if there were ways for us to exist without anyone controlling the network or the websites we lurk around? What if I told you that you could use the same technology as torrenting to distribute websites irrespective of servers and that whole nonsense? What if I told you we could own the physical network?

Out with Telcoms, in with Mesh

No more AT&T, Comcast, or their likes controlling our interwebs. There exists a technology called mesh (802.11s wireless) which makes it possible. We can use the technology to make our power and communications autonomous, anonymous, ubiquitous, and free-to-access.

Mesh vs Fiber Optics

Right now, mesh can’t beat fiber optics with its 5gbps speed. However, an opportunistic multiple input multiple output mesh network can get 100mbps over the air with around a 90% bandwidth efficiency over multiple hops with the ability to reconfigure each device in response to a downed node in under 50ms (a ping good enough for even shootan gaymes). Each mesh device in the network adds redundancy to the network making it more resilient to failure. More importantly, mesh can be deployed anywhere and everywhere for very little cost.

Mix and Match Technologies

You can combine this technology with solar panels to make a distributed network of electric power. Google is on it with mesh and the Smartgrid. http://www.youtube.com/watch?v=09dhjDcaT7g

You can combine this technology with VOIP to make a true distributed telephony network.

You can combine this technology with P2P software and grid computing to make a distributed processing network.

You can combine this technology with P2P/P4P/DDNS to make a distributed website hosting network.

You combine all that with open source software, firmware, and hardware, we can expect amazing advancements in just about everything we do.

Slowly but Surely

Anon, I am asking you to champion this idea. To share this information with people you think might be able to do something about it. Only a very small portion of us need to develop the technology for all of us to be able to benefit from it. The trick here is to start using the technology. If you use linux or mac and you have wireless, you already have the power to contribute to the mesh network. Get yourself one of these devices; you won’t regret it.

I figure at $20 per device we could build a network of 50 million of these devices in less than 5 years. It took the internet 4 years to reach 50 million people. iPods took 3 years. Facebook took 2 years. At first, this network won’t be much. Maybe, you, your friends, and your neighbor sharing bandwidth wirelessly while still wired into your normal ISP, but the more people who join your network, the better your network becomes until one day the network becomes the Internet.

Most of the work has already been done. For some of us. we have already begun the process, but it is far from a united front.

Imagine the possibilities, anon? One unified net owned by the people, built by the people, for the people.

9gridchan.org started by the technolo/g/y board here – created a decentralized network using obscure software as and edn-run around restrictions on internet use, etc. Hasn’t blown up to many users but it’s been going on for 6-9 months now.

Paper folding Weaboos may be on to something.


There is a 4chan board I have payed very little attention to, but when doing a google image search I have discovered that some of the paper folding weaboos may hold certian skills needed for potential lulz. Sure anybody with even the mildest case of aspergers syndrome can sit and fold tiny pieces of paper for hours. As with many things where the real magic lies is where and how this is used. Ceiling cat pasted on ceilings in public places. The 4chan party van outside of paedophiles registered in your area. Confusing little figurines posted in common places around town. Be original. Want more info on Papercraft? Lurk More.

http://papercraft.wikidot.com/papercraft

Pawning Lulz


So for the last several weeks an epic trolling of Gold and Silver Pawn has taken place. Yes, the pawn shop from Pawnstars. The General Idea is to call, get their attention and ask for battletoads. Resulting in Epic Rage by Rick, Profanity filled fits from chumlee, being transfered to Las Vegas Metro PD, Hangups, cursings, and fucking LULZ! However I believe the trolling has become trite, a little old asking for battletoads. How can Anonymous be featured on the show? I think it would be epic if the Internet Haet Machine trolled these poor chaps into saying things we command them on their show. Things to make them look like fools, like paedophiles, crooks, and just plain fucking ignorant. Admit that Anonymous now controls their business even. This must be accomplished without breaking Rules 1 & 2. Without Them unknowingly breaking Rules 1 & 2. Of corse, we are always from ebaum’s world.

Lets put our collective assholes together and think of how this could be done. For Great Justice.

Has Warriorfrogs?

Operation Doctors Orders – In Case of Surgeon Break Glass.


I saw it with my own two eyes. “The Surgeon is Back”

The Surgeon Must Die

If this shit starts again, We must get the Spammers DOX

Doxing, IRL Trolling, Ruin Life Tactics. The works. If you do not know, LURK MORE!