All #Anonymous #AntiSec #LulzSec #OWS Pages - 12160 Social Network2024-03-19T06:16:19Zhttps://12160.info/page/page/list?groupUrl=anonymous-antisec-lulzsec-ows&sort=mostRecent&feed=yes&xn_auth=noANONYMOUS HACKTIVIST SPEAKS AS HE HEADS FOR PRISONtag:12160.info,2013-11-17:2649739:Page:13598302013-11-17T17:20:45.649Ztruthhttps://12160.info/profile/adap2k
<div class="entry"><h3><a href="http://desertpeace.wordpress.com/2013/11/17/anonymous-hacktivist-speaks-as-he-heads-for-prison/"><span>ANONYMOUS HACKTIVIST SPEAKS AS HE HEADS FOR PRISON</span></a></h3>
<div class="lastUpdated">Sunday, November 17, 2013 12:12 PM</div>
<div class="feedEntryContent"><p>The acts of civil disobedience…</p>
</div>
</div>
<div xmlns="http://www.w3.org/1999/xhtml" class="entry">
<h3><a href="http://desertpeace.wordpress.com/2013/11/17/anonymous-hacktivist-speaks-as-he-heads-for-prison/"><span xml:base="http://whatreallyhappened.com/">ANONYMOUS HACKTIVIST SPEAKS AS HE HEADS FOR PRISON</span></a></h3>
<div class="lastUpdated">Sunday, November 17, 2013 12:12 PM</div>
<div xml:base="http://whatreallyhappened.com/" class="feedEntryContent">
<p xml:base="http://whatreallyhappened.com/">The acts of civil disobedience and direct action that I am being sentenced for today are in line with the principles of community and equality that have guided my life. I hacked into dozens of high profile corporations and government institutions, understanding very clearly that what I was doing was against the law, and that my actions could land me back in federal prison. But I felt that I had an obligation to use my skills to expose and confront injustice–and to bring the truth to light.</p>
<p xml:base="http://whatreallyhappened.com/">Could I have achieved the same goals through legal means? I have tried everything from voting petitions to peaceful protest and have found that those in power do not want the truth to be exposed. When we speak truth to power we are ignored at best and brutally suppressed at worst. We are confronting a power structure that does not respect its own system of checks and balances, never mind the rights of it’s own citizens or the international community.</p>
</div>
</div> 2 More Undercover Officers Revealed in #D12 Gulf Port 7 Trial - Occupy Austin | Occupy Wall Street #Anonymous #AntiSec #LulzSec #OWStag:12160.info,2012-11-17:2649739:Page:10423392012-11-17T16:22:42.568Ztruthhttps://12160.info/profile/adap2k
<p><iframe width="634" height="1141" src="http://my.firedoglake.com/kitoconnell/2012/11/16/gulfport7-more-undercovers/" frameborder="0" scrolling="yes"></iframe></p>
<p><iframe width="634" height="1141" src="http://my.firedoglake.com/kitoconnell/2012/11/16/gulfport7-more-undercovers/" frameborder="0" scrolling="yes"></iframe></p> The Global Intelligence Files - List of documents - An Unethical Record – Stratfor & the New York Timestag:12160.info,2012-08-24:2649739:Page:9688642012-08-24T22:24:52.245Ztruthhttps://12160.info/profile/adap2k
<div class="campaign"></div>
<div class="pane small"><a href="http://wikileaks.org/"></a><br></br> <br></br>
<div><b><a href="http://wikileaks.org/the-gifiles.html">The Global Intelligence Files</a></b></div>
</div>
<div style="padding: 10px 0 20px 0;"><a href="http://wikileaks.org/the-gifiles.html"><img src="http://wikileaks.org/static/gfx/gifiles.jpg"></img></a></div>
<p>On Monday February 27th, 2012, WikiLeaks began publishing <i>The Global Intelligence Files</i>, over five million e-mails from the Texas headquartered "global intelligence" company…</p>
<div class="campaign"></div>
<div class="pane small"><a href="http://wikileaks.org/"></a><br>
<br>
<div><b><a href="http://wikileaks.org/the-gifiles.html">The Global Intelligence Files</a></b></div>
</div>
<div style="padding: 10px 0 20px 0;"><a href="http://wikileaks.org/the-gifiles.html"><img src="http://wikileaks.org/static/gfx/gifiles.jpg"></a></div>
<p>On Monday February 27th, 2012, WikiLeaks began publishing <i>The Global Intelligence Files</i>, over five million e-mails from the Texas headquartered "global intelligence" company Stratfor. The e-mails date between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal's Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defence Intelligence Agency. The emails show Stratfor's web of informers, pay-off structure, payment laundering techniques and psychological methods.</p>
<h2>List of documents > Release An Unethical Record – Stratfor & the New York Times</h2>
<p>Released on 2012-08-24 05:00 GMT</p>
<p><b>Read stories about those documents at the following addresses:</b></p>
<ul>
<li><a href="http://www.nytexaminer.com/2012/08/an-unethical-record-stratfor-the-new-york-times">http://www.nytexaminer.com/2012/08/an-unethical-record-stratfor-the-new-york-times</a></li>
</ul>
<table class="cable" width="100%">
<tbody>
<tr>
<th>Email-ID</th>
<th>Subject</th>
<th>From</th>
<th>To</th>
<th>Date</th>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/12750_fw-customer-service-technical-issues-billing-history-errors-.html">12750</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/12750_fw-customer-service-technical-issues-billing-history-errors-.html">FW: [Customer Service/Technical Issues] billing history errors</a></td>
<td>john.gibbons@stratfor.com</td>
<td>oconnor@stratfor.com, cs@stratfor.com</td>
<td>2009-06</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/13155_re-stratfor-in-the-new-york-times-.html">13155</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/13155_re-stratfor-in-the-new-york-times-.html">RE: STRATFOR in The New York Times</a></td>
<td>mfriedman@stratfor.com</td>
<td>allstratfor@stratfor.com, brian.genchur@stratfor.com</td>
<td>2009-06</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/18233_fw-please-invoice-and-charge-credit-card-gartner-inc-2-995-.html">18233</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/18233_fw-please-invoice-and-charge-credit-card-gartner-inc-2-995-.html">FW: Please invoice and charge credit card Gartner Inc. $2,995</a></td>
<td>jeff.stevens@stratfor.com</td>
<td>Solomon.Foshko@stratfor.com</td>
<td>2007-05</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/84934_re-the-business-of-stratfor-.html">84934</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/84934_re-the-business-of-stratfor-.html">Re: The Business of Stratfor</a></td>
<td>victoria.allen@stratfor.com</td>
<td>analysts@stratfor.com, friedman@att.blackberry.net</td>
<td>2011-07</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/119490_-alpha-insight-mexico-thoughts-on-casino-attack-nyt-piece.html">119490</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/119490_-alpha-insight-mexico-thoughts-on-casino-attack-nyt-piece.html">[alpha] INSIGHT - Mexico - Thoughts on Casino attack, NYT piece, other notes - MX01</a></td>
<td>michael.wilson@stratfor.com</td>
<td>alpha@stratfor.com</td>
<td>2011-09</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/201031_.html">201031</a></td>
<td></td>
<td>reva.bhalla@stratfor.com</td>
<td>friedman@att.blackberry.net</td>
<td>2011-12</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/219254_re-new-york-times-.html">219254</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/219254_re-new-york-times-.html">RE: New York Times</a></td>
<td></td>
<td>mfriedman@stratfor.com, gibbons@stratfor.com, kuykendall@stratfor.com, bokhari@stratfor.com, mefriedman@att.blackberry.net</td>
<td>2009-10</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/254534_stratfor-receipt-xlsx-.html">254534</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/254534_stratfor-receipt-xlsx-.html">Stratfor Receipt.xlsx</a></td>
<td>AdamsJ@booksamillion.com</td>
<td>john.gibbons@stratfor.com, rob.bassetti@stratfor.com</td>
<td>2011-01</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/267008_.html">267008</a></td>
<td></td>
<td>gibbons@stratfor.com</td>
<td>adamsj@booksamillion.com</td>
<td>2011-01</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/271755_fw-fw-media-target-list-for-merry-pr-.html">271755</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/271755_fw-fw-media-target-list-for-merry-pr-.html">FW: FW: media target list for Merry PR</a></td>
<td></td>
<td>grant.perry@stratfor.com</td>
<td>2009-12</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/289379_invitation-to-stratfor-s-briefing-on-china-nov-3-.html">289379</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/289379_invitation-to-stratfor-s-briefing-on-china-nov-3-.html">Invitation to STRATFOR's briefing on China - Nov 3</a></td>
<td></td>
<td>meredith.friedman@stratfor.com, landler@Nytimes.com</td>
<td>2010-10</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/289583_re-george-friedman-s-weekly-geopolitical-analysis-.html">289583</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/289583_re-george-friedman-s-weekly-geopolitical-analysis-.html">RE: George Friedman's weekly geopolitical analysis</a></td>
<td></td>
<td>helenec@nytimes.com</td>
<td>2010-11</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/289986_re-new-york-times-interview-request-.html">289986</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/289986_re-new-york-times-interview-request-.html">RE: New York Times interview request</a></td>
<td></td>
<td>kyle.rhodes@stratfor.com, helenec@nytimes.com</td>
<td>2010-11</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/386775_re-tactical-us-expands-clandestine-military-activities.html">386775</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/386775_re-tactical-us-expands-clandestine-military-activities.html">Re: [TACTICAL] US Expands clandestine military activities abroad - NYT</a></td>
<td>burton@stratfor.com</td>
<td>tactical@stratfor.com</td>
<td>2010-05</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/397697_re-new-york-times-inquiry-.html">397697</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/397697_re-new-york-times-inquiry-.html">Re: new york times inquiry</a></td>
<td>burton@stratfor.com</td>
<td>kyle.rhodes@stratfor.com, noam@nytimes.com</td>
<td>2010-04</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/411681_re-client-question-carlos-slim-and-cartel-dynamics-.html">411681</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/411681_re-client-question-carlos-slim-and-cartel-dynamics-.html">Re: Client Question - Carlos Slim and Cartel Dynamics?</a></td>
<td>Anya.Alfano@stratfor.com</td>
<td>gfriedman@stratfor.com</td>
<td>2011-04</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/468513_account-maintenance-2-gartner-inc-.html">468513</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/468513_account-maintenance-2-gartner-inc-.html">Account Maintenance (#2) - Gartner Inc</a></td>
<td>henson@stratfor.com</td>
<td>witters@stratfor.com, service@stratfor.com</td>
<td>2006-05</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/473739_re-a-letter-from-george-friedman-.html">473739</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/473739_re-a-letter-from-george-friedman-.html">Re: A letter from George Friedman</a></td>
<td>thehouse.tm@gmail.com</td>
<td>service@stratfor.com</td>
<td>2011-04</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/501124_fw-user-name-password-.html">501124</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/501124_fw-user-name-password-.html">FW: User Name, Password</a></td>
<td>pratt@stratfor.com</td>
<td>service@stratfor.com</td>
<td>2005-10</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/514663_re-account-maintenance-gartner-inc-.html">514663</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/514663_re-account-maintenance-gartner-inc-.html">RE: Account Maintenance - Gartner Inc</a></td>
<td></td>
<td>henson@stratfor.com</td>
<td>2006-05</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/555824_re-stratfor-member-service-membership-information-.html">555824</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/555824_re-stratfor-member-service-membership-information-.html">RE: Stratfor Member Service / Membership Information</a></td>
<td>Amanda.Hatten@gartner.com</td>
<td>service@stratfor.com</td>
<td>2008-10</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/577559_fw-customer-service-technical-issues-pakistan-.html">577559</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/577559_fw-customer-service-technical-issues-pakistan-.html">FW: [Customer Service/Technical Issues] Pakistan</a></td>
<td></td>
<td>brian.genchur@stratfor.com</td>
<td>2009-06</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/620711_-customer-service-technical-issues-access-to-stratofr-.html">620711</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/620711_-customer-service-technical-issues-access-to-stratofr-.html">[Customer Service/Technical Issues] Access to stratofr</a></td>
<td>bagray@nytimes.com</td>
<td>service@stratfor.com</td>
<td>2010-03</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/898587_draft-of-handbook-chapter-on-organization-.html">898587</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/898587_draft-of-handbook-chapter-on-organization-.html">Draft of Handbook Chapter on Organization</a></td>
<td>gfriedman@stratfor.com</td>
<td>analysts@stratfor.com</td>
<td>2010-08</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1125785_c-i-a-and-pakistan-work-together-but-do-so-warily-.html">1125785</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1125785_c-i-a-and-pakistan-work-together-but-do-so-warily-.html">C.I.A. and Pakistan Work Together, but Do So Warily</a></td>
<td>hooper@stratfor.com</td>
<td>analysts@stratfor.com</td>
<td>2010-02</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1196088_re-a-thought-on-open-source-practice-.html">1196088</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1196088_re-a-thought-on-open-source-practice-.html">Re: A thought on open source practice</a></td>
<td>friedman@att.blackberry.net</td>
<td>analysts@stratfor.com</td>
<td>2009-03</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1208803_-alpha-dea-on-carlos-slim-protect-sourcing-.html">1208803</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1208803_-alpha-dea-on-carlos-slim-protect-sourcing-.html">[alpha] DEA on Carlos Slim ** protect sourcing **</a></td>
<td>burton@stratfor.com</td>
<td>alpha@stratfor.com</td>
<td>2011-04</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1271821_re-the-next-100-years-george-friedman-.html">1271821</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1271821_re-the-next-100-years-george-friedman-.html">Re: THE NEXT 100 YEARS - George Friedman</a></td>
<td>friedman@att.blackberry.net</td>
<td>mfriedman@stratfor.com, gfriedman@stratfor.com, eisenstein@stratfor.com, jh@hornfischerlit.com</td>
<td>2008-12</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1304054_outline-for-george-.html">1304054</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1304054_outline-for-george-.html">Outline for George</a></td>
<td>megan.headley@stratfor.com</td>
<td>colibasanu@stratfor.com, darryl.oconnor@stratfor.com, kyle.rhodes@stratfor.com, matthew.solomon@stratfor.com, tim.duke@stratfor.com, eric.brown@stratfor.com</td>
<td>2011-12</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1316654_-marketing-pr-items-11-7-.html">1316654</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1316654_-marketing-pr-items-11-7-.html">[Marketing] PR Items 11.7</a></td>
<td>luciana.mendes@stratfor.com</td>
<td>mfriedman@stratfor.com, marketing@stratfor.com, kyle.rhodes@stratfor.com, grant.perry@stratfor.com, shea.morenz@stratfor.com, hope.massey@stratfor.com</td>
<td>2011-11</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1317065_-marketing-pr-items-11-15-.html">1317065</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1317065_-marketing-pr-items-11-15-.html">[Marketing] PR Items 11.15</a></td>
<td>kyle.rhodes@stratfor.com</td>
<td>mfriedman@stratfor.com, marketing@stratfor.com, shea.morenz@stratfor.com, hope.massey@stratfor.com, luciana.mendes@stratfor.com</td>
<td>2011-11</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1338652_cool-rts-.html">1338652</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1338652_cool-rts-.html">cool RTs</a></td>
<td>kyle.rhodes@stratfor.com</td>
<td>luciana.mendes@stratfor.com, socialmedia@stratfor.com</td>
<td>2011-10</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1344762_monday-meeting-slides-.html">1344762</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1344762_monday-meeting-slides-.html">monday meeting - slides</a></td>
<td>tim.duke@stratfor.com</td>
<td>oconnor@stratfor.com, colibasanu@stratfor.com, kyle.rhodes@stratfor.com, matthew.solomon@stratfor.com, megan.headley@stratfor.com, eric.brown@stratfor.com</td>
<td>2011-12</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1348631_george-friedman-interview-in-ny-times-article-.html">1348631</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1348631_george-friedman-interview-in-ny-times-article-.html">George Friedman interview in NY Times article</a></td>
<td>kyle.rhodes@stratfor.com</td>
<td>allstratfor@stratfor.com</td>
<td>2010-11</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1417567_re-paid-invoice-.html">1417567</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1417567_re-paid-invoice-.html">RE: Paid Invoice</a></td>
<td>Eytan.Coll@gartner.com</td>
<td>rob.bassetti@stratfor.com</td>
<td>2010-06</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1422548_fwd-booksamillion-com-credit-applicaiton-.html">1422548</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1422548_fwd-booksamillion-com-credit-applicaiton-.html">Fwd: Booksamillion Com Credit Applicaiton</a></td>
<td>gibbons@stratfor.com</td>
<td>oconnor@stratfor.com, rob.bassetti@stratfor.com</td>
<td>2011-01</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1672247_re-eurasia-eu-econ-cracks-showing-in-eu-on-economic-issues-.html">1672247</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1672247_re-eurasia-eu-econ-cracks-showing-in-eu-on-economic-issues-.html">Re: [Eurasia] EU/ECON - Cracks showing in EU on economic issues</a></td>
<td>marko.papic@stratfor.com</td>
<td>eurasia@stratfor.com, econ@stratfor.com</td>
<td>1970-01</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1691055_re-annual-forecast-2011-.html">1691055</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1691055_re-annual-forecast-2011-.html">Re: Annual Forecast 2011</a></td>
<td>alderman.liz@gmail.com</td>
<td>marko.papic@stratfor.com</td>
<td>2011-01</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1694453_re-interview-request-international-herald-tribune-.html">1694453</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1694453_re-interview-request-international-herald-tribune-.html">Re: interview request - International Herald Tribune</a></td>
<td>marko.papic@stratfor.com</td>
<td>kyle.rhodes@stratfor.com</td>
<td>2011-01</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1732382_re-nyt-on-move-towards-a-bailout-of-greece-.html">1732382</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1732382_re-nyt-on-move-towards-a-bailout-of-greece-.html">Re: NYT On Move Towards a Bailout of Greece</a></td>
<td>marko.papic@stratfor.com</td>
<td>analysts@stratfor.com, hughes@stratfor.com</td>
<td>2010-02</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1748912_re-confederation-update-.html">1748912</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1748912_re-confederation-update-.html">Re: confederation update</a></td>
<td>richmond@stratfor.com</td>
<td>marko.papic@stratfor.com</td>
<td>2010-01</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1765641_re-information-on-china-in-europe-.html">1765641</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1765641_re-information-on-china-in-europe-.html">Re: Information on China in Europe</a></td>
<td>marko.papic@stratfor.com</td>
<td>alderman.liz@gmail.com</td>
<td>2011-05</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1780740_fwd-os-eu-china-econ-eu-foreign-policy-chief-thanks-china.html">1780740</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1780740_fwd-os-eu-china-econ-eu-foreign-policy-chief-thanks-china.html">Fwd: [OS] EU/CHINA/ECON - EU foreign policy chief thanks China for support in buying bonds</a></td>
<td>marko.papic@stratfor.com</td>
<td>alderman.liz@gmail.com</td>
<td>2011-05</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1796025_europe-seeks-to-block-polish-gas-contract-.html">1796025</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1796025_europe-seeks-to-block-polish-gas-contract-.html">Europe Seeks to Block Polish Gas Contract</a></td>
<td>marko.papic@stratfor.com</td>
<td>eurasia@stratfor.com</td>
<td>2010-10</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1803489_fwd-stratfor-in-sunday-s-new-york-times-week-in-review-.html">1803489</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1803489_fwd-stratfor-in-sunday-s-new-york-times-week-in-review-.html">Fwd: STRATFOR in Sunday's New York Times - Week in Review</a></td>
<td>marko.papic@stratfor.com</td>
<td>vikrum.sequeira@gmail.com</td>
<td>1970-01</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/1822533_information-on-china-in-europe-.html">1822533</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/1822533_information-on-china-in-europe-.html">Information on China in Europe</a></td>
<td>marko.papic@stratfor.com</td>
<td>alderman.liz@gmail.com</td>
<td>2011-05</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/2232067_re-tweet-or-news-idea-.html">2232067</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/2232067_re-tweet-or-news-idea-.html">Re: Tweet or news idea?</a></td>
<td>tim.french@stratfor.com</td>
<td>burton@stratfor.com, kyle.rhodes@stratfor.com, jacob.shapiro@stratfor.com</td>
<td>2011-11</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/2795370_flash-report-invoice-chevron-latin-america-.html">2795370</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/2795370_flash-report-invoice-chevron-latin-america-.html">FLASH REPORT/INVOICE-Chevron Latin America</a></td>
<td>zucha@stratfor.com</td>
<td>kuykendall@stratfor.com, darryl.oconnor@stratfor.com, rob.bassetti@stratfor.com, holly.sparkman@stratfor.com, fernando.jaimes@stratfor.com</td>
<td>2011-02</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/2816597_invoice-from-stratfor-.html">2816597</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/2816597_invoice-from-stratfor-.html">Invoice from STRATFOR</a></td>
<td>ar@stratfor.com</td>
<td>zucha@stratfor.com, ceds@chevron.com, lyoh@chevron.com</td>
<td>2011-02</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/2824903_please-invoice-gartner-3-250-.html">2824903</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/2824903_please-invoice-gartner-3-250-.html">Please invoice Gartner $3,250</a></td>
<td>wright@stratfor.com</td>
<td>kuykendall@stratfor.com, oconnor@stratfor.com, george.friedman@stratfor.com, cs@stratfor.com, wright@stratfor.com, rob.bassetti@stratfor.com, holly.sparkman@stratfor.com, fernando.jaimes@stratfor.com</td>
<td>2011-06</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/3447461_re-mexican-mogul-slim-sees-opportunity-in-ny-times-.html">3447461</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/3447461_re-mexican-mogul-slim-sees-opportunity-in-ny-times-.html">Re: Mexican mogul Slim sees opportunity in NY Times</a></td>
<td>eisenstein@stratfor.com</td>
<td>burton@stratfor.com, exec@stratfor.com</td>
<td>2009-01</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/3513561_re-ny-times-sunday-.html">3513561</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/3513561_re-ny-times-sunday-.html">Re: NY Times Sunday</a></td>
<td>friedman@att.blackberry.net</td>
<td>mfriedman@stratfor.com, eisenstein@stratfor.com, exec@stratfor.com</td>
<td>2008-08</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/3531311_re-ny-times-sunday-.html">3531311</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/3531311_re-ny-times-sunday-.html">RE: NY Times Sunday</a></td>
<td>mfriedman@stratfor.com</td>
<td>eisenstein@stratfor.com, exec@stratfor.com</td>
<td>2008-08</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/3635756_re-ghost-purchase-.html">3635756</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/3635756_re-ghost-purchase-.html">RE: GHOST Purchase</a></td>
<td>mfriedman@stratfor.com</td>
<td>gibbons@stratfor.com, eisenstein@stratfor.com, exec@stratfor.com</td>
<td>2008-05</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/5101192_re-ny-times-contact-.html">5101192</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/5101192_re-ny-times-contact-.html">RE: NY Times contact?</a></td>
<td>Andrew.Cawthorne@reuters.com</td>
<td>mark.schroeder@stratfor.com</td>
<td>2007-08</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/5355966_thought-.html">5355966</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/5355966_thought-.html">Thought</a></td>
<td>Anya.Alfano@stratfor.com</td>
<td>burton@stratfor.com</td>
<td>2010-02</td>
</tr>
<tr>
<td><a href="http://wikileaks.org/gifiles/docs/5463685_re-chevron-.html">5463685</a></td>
<td><a href="http://wikileaks.org/gifiles/docs/5463685_re-chevron-.html">Re: Chevron</a></td>
<td>Anya.Alfano@stratfor.com</td>
<td>zucha@stratfor.com</td>
<td>2009-12</td>
</tr>
</tbody>
</table>
<p>Partners</p>
<div id="browse">
<div><a target="_blank" href="http://www.abc.com.py">ABC Color - Paraguay</a><br>
<a target="_blank" href="http://english.al-akhbar.com/">Al Akhbar - Lebanon</a><br>
<a target="_blank" href="http://almasryalyoum.com/">Al Masry Al Youm - Egypt</a><br>
<a target="_blank" href="http://www.asiasentinel.com/">Asia Sentinel - Hong Kong</a><br>
<a target="_blank" href="http://bivol.bg/">Bivol - Bulgaria</a><br>
<a target="_blank" href="http://www.cartacapital.com.br">Carta Capital - Brazil</a><br>
<a target="_blank" href="http://ciperchile.cl/">CIPER - Chile</a><br>
<a target="_blank" href="http://www.dawn.com/">Dawn Media - Pakistan</a><br>
<a target="_blank" href="http://espresso.repubblica.it/">L'Espresso - Italy</a><br>
<a target="_blank" href="http://www.repubblica.it/">La Repubblica - Italy</a><br>
<a target="_blank" href="http://www.jornada.unam.mx">La Jornada - Mexico</a><br>
<a target="_blank" href="http://www.nacion.com/">La Nacion - Costa Rica</a><br>
<a target="_blank" href="http://www.malaysia-today.net">Malaysia Today - Malaysia</a><br>
<a target="_blank" href="http://www.mcclatchydc.com/">McClatchy - United States</a><br>
<a target="_blank" href="http://nawaat.org/">Nawaat - Tunisia</a><br>
<a target="_blank" href="http://www.ndr.de/">NDR/ARD - Germany</a><br>
<a target="_blank" href="http://owni.fr/">Owni - France</a><br>
<a target="_blank" href="http://www.pagina12.com.ar/">Pagina 12 - Argentina</a><br>
<a target="_blank" href="http://theage.com.au">Philip Dorling - Fairfax media contributor - Australia</a><br>
<a target="_blank" href="http://plazapublica.com.gt/">Plaza Publica - Guatemala</a><br>
<a target="_blank" href="http://apublica.org">Publica - Brazil</a><br>
<a target="_blank" href="http://www.publico.es/">Publico.es - Spain</a><br>
<a target="_blank" href="http://www.rollingstone.com/">Rolling Stone - United States</a><br>
<a target="_blank" href="http://rusrep.ru/">Russian Reporter - Russia</a><br>
<a target="_blank" href="http://www.tanea.gr/">Ta Nea - Greece</a><br>
<a target="_blank" href="http://www.taraf.com.tr/">Taraf - Turkey</a><br>
<a target="_blank" href="http://www.thehindu.com/">The Hindu - India</a><br>
<a target="_blank" href="http://theyesmen.org/">The Yes Men - Bhopal Activists</a><br>
<a target="_blank" href="http://www.star-times.co.nz/">Sunday Star-Times - New Zealand</a></div>
<h3>Community resources</h3>
<div class="sort"><a href="http://wikileaks.org/Supporters.html">Supporters</a> <a href="https://shop.wikileaks.org/donate">Support Wikileaks</a> <a href="http://twitter.com/wikileaks">Follow us on Twitter</a> <a href="http://twitter.com/home?status=Reading%20http%3A%2F%2Fwikileaks.org%2Fgifiles">Twitter this</a> <a href="http://www.facebook.com/wikileaks">Follow us on Facebook</a></div>
<p><i>courage is contagious</i></p>
</div>
<p></p> The Fog: PDF Exploit Cleaningtag:12160.info,2012-07-10:2649739:Page:9121702012-07-10T17:38:24.885ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p>With <a href="http://lilithlela.cyberguerrilla.org/?p=1378" title="The Fog: Anomaly Detection At Multiple Scales">the fog creeping in</a>, cleaning exploits from pdf’s becomes more important, and as necessity is the mother of invention, solutions appear:</p>
<p style="text-align: center;"><a href="http://lilithlela.cyberguerrilla.org/wp-content/uploads/Clean-All-The-Things.jpg"><img alt="" class="aligncenter wp-image-1405" height="367" src="http://lilithlela.cyberguerrilla.org/wp-content/uploads/Clean-All-The-Things.jpg" title="Clean-All-The-Things" width="504"></img></a></p>
<blockquote><h3>What is PDFCleaner?</h3>
<p>PDF files are dangerous. We regularly see new Adobe…</p>
</blockquote>
<p>With <a title="The Fog: Anomaly Detection At Multiple Scales" href="http://lilithlela.cyberguerrilla.org/?p=1378">the fog creeping in</a>, cleaning exploits from pdf’s becomes more important, and as necessity is the mother of invention, solutions appear:</p>
<p style="text-align: center;"><a href="http://lilithlela.cyberguerrilla.org/wp-content/uploads/Clean-All-The-Things.jpg"><img class="aligncenter wp-image-1405" title="Clean-All-The-Things" src="http://lilithlela.cyberguerrilla.org/wp-content/uploads/Clean-All-The-Things.jpg" alt="" height="367" width="504"></a></p>
<blockquote>
<h3>What is PDFCleaner?</h3>
<p>PDF files are dangerous. We regularly see new Adobe Acrobat PDF vulnerabilities being exploited in the wild. Adobe usually takes a while to patch these flaws, and during that time, all Acrobat users are vulnerable. PDFCleaner is designed to <strong>remove unknown exploits</strong> from PDF files. After the exploit has been removed, opening the file in an unpatched PDF reader <em>should</em> be safe. Note that PDFCleaner is <strong>experimental</strong>. It is probably possible to design an exploit that would survive PDFCleaner’s removal process, so please don’t rely on it for absolute security.</p>
<h3>How Does it Work?</h3>
<p>PDFCleaner converts your PDF file to PostScript format, and then converts it back into a PDF file. The process of interpreting the PDF file, converting it to a different format, and converting that back into PDF ensures that any PDF-specific exploits are not transferred to the new PDF file. Postscript is a file format can do everything that PDF can do, so in most cases, the resulting PDF file will look exactly the same.</p>
<p>[…]</p>
</blockquote>
<p><a href="https://defuse.ca/pdfcleaner.htm" target="_blank">PDF Exploit Sanitizer and Cleaner – Remove exploits from PDF files – Defuse Cyber-Security</a></p>
<h2>Problem</h2>
<p>The problem with this online tool is that not all can see the code inside, and even when having access to the code, in my experience, hidden code can be hard to find. And if it was clean yesterday, is it clean today? Will it clean instead of make dirty? For many a trust issue, for some others, a lot of work in terms of checking.</p>
<p>Apart from that, the approach does work. It’s a known approach too. Even locked pdf’s become partly accessible when converting to postscript and back.</p>
<h2>Pdf2ps and ps2pdf</h2>
<p>The pdf2ps tool is based on <a title="http://www.ghostscript.com/" href="http://www.ghostscript.com/">Ghostscript</a>, a PostScript interpreter. It is a thin shell script wrapper around the “<a title="http://linux.die.net/man/1/gs" href="http://linux.die.net/man/1/gs">gs</a>” tool.</p>
<h3>Usage pdf2ps</h3>
<pre>
pdf2ps [options] input.pdf [output.ps]<br />
</pre>
<p><br>
If you don’t specify the output file name, the name from the input file is used.</p>
<p>The <a title="http://linux.die.net/man/1/pdf2ps" href="http://linux.die.net/man/1/pdf2ps">pdf2ps man page</a> is minimalistic, but noteworthy is the option <code>-dLanguageLevel=3</code>. Running <code>pdf2ps -h</code> also gives this info.</p>
<p>The tool is based on Ghostscript, so you can also use other options that “gs” accepts. Fonts are converted to bitmap fonts (at a pretty high resolution by default, but configurable with the <code>-r</code> option, for example <code>-r 300</code> to set the resolution to 300 dpi).</p>
<h3>Usage ps2pdf</h3>
<pre>
ps2pdf [options] input.[e]ps [output.pdf]<br />
</pre>
<p><br>
ps2pdf is a small command script that invokes ghostscript, selecting a special “output device” called pdfwrite. Read more <a title="http://ghostscript.com/doc/current/Ps2pdf.htm" href="http://ghostscript.com/doc/current/Ps2pdf.htm">here</a>.</p>
<p>The pdf to ps conversion can take quite some time and the resulting file can be huge, putting a burden on subsequent conversion of the file to pdf. And pdf2ps can in case aggressively crop to bounding boxes.</p>
<h2>pdftops</h2>
<p>The pdftops tool comes with <a title="http://www.foolabs.com/xpdf/" href="http://www.foolabs.com/xpdf/">Xpdf</a> or <a href="http://poppler.freedesktop.org/">Poppler</a> as part of the “poppler-utils” package. The conversion takes less time, the resulting file is smaller, and fonts are better preserved.</p>
<h3>Usage pdftops</h3>
<div>
<pre>
pdftops [options] input.pdf [output.ps]<br />
</pre></div>
<p>The <a title="http://linux.die.net/man/1/pdftops" href="http://linux.die.net/man/1/pdftops">pdftops man page</a> explains a lot of options and <code>pdftops -h</code> gives a short version.</p>
<p>pdftops provides additional options like <code>-eps</code> to generate an .eps file, <code>-f</code> and <code>-l</code> to limit the page range to convert, and options to control/change the page size: <code>-origpagesizes</code>, <code>-nocrop</code> , <code>-expand</code>, <code>-noshrink</code>.</p>
<p>The poppler-utils package provides some more interesting tools: <em>pdfinfo</em> (pdf document information extractor), <em>pdfimages</em> (pdf image extractor), <em>pdftohtml</em> (pdf to html converter), pdftotext (pdf to text converter), and pdffonts (pdf font analyzer).</p>
<p><a href="http://lilithlela.cyberguerrilla.org/?p=1401">The Fog: PDF Exploit Cleaning | Lilith Lela</a></p> Uncensored decentralized search engine YaCytag:12160.info,2012-02-26:2649739:Page:7893472012-02-26T14:20:46.277ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p style="text-align: left;"><a href="http://storage.ning.com/topology/rest/1.0/file/get/1798366110?profile=original" target="_self"><img class="align-left" src="http://storage.ning.com/topology/rest/1.0/file/get/1798366110?profile=original" width="320"></img></a></p>
<p>YaCy is an open source community based search engine written in Java with no central server indexing the results, search queries are produced using a worldwide peer to peer computer network, in the same way that torrent downloads…</p>
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p style="text-align: left;"><a target="_self" href="http://storage.ning.com/topology/rest/1.0/file/get/1798366110?profile=original"><img class="align-left" src="http://storage.ning.com/topology/rest/1.0/file/get/1798366110?profile=original" width="320"></a></p>
<p>YaCy is an open source community based search engine written in Java with no central server indexing the results, search queries are produced using a worldwide peer to peer computer network, in the same way that torrent downloads work, the <strong>quantity and quality of the results will depend on the number of peers connected at the time</strong>, on top of the search results YaCy lets you know how many peers are providing them, it can be used to search text or images. Unlike Google or Bing, where the company managing the search results is open to subpoenas and censoring links (e.g. DMCA complaint, offensive images, etc), <strong>YaCy results can not be censored</strong> as no single central authority is responsible for them and there are thousands of servers (personal computers) in multiple countries providing results, with some seed list servers including accurate p2p node information to be found in the source code.</p>
<p>You will need to download YaCy software to your computer to use it, during installation Windows default firewall will be configured to allow YaCy queries pass through, if you are using a different firewall you will have to set it up manually to allow YaCy to connect to the Internet. The search engine will be accessed in your browser clicking on YaCy’s logo or visiting <a href="http://localhost:8090/">http://localhost:8090</a> (default port can be changed), <strong>YaCy can be set up to crawl an specific website or FTP server creating your own search index</strong>, the crawling can be scheduled to as often as you like or limited to a single time to save computer resources.</p>
<p>Read more on <a href="http://anonym.to/http://www.hacker10.com/internet-anonymity/uncensored-decentralized-search-engine-yacy/" target="_blank">hacker10.com</a> | <a href="http://anonym.to/http://tmblr.co/ZeT5ixD2vT2k" target="_blank">Online demonstration</a> of YaCy | Project Home Page and Software Download: <a href="http://anonym.to/http://yacy.net/" target="_blank">yacy.net</a></p>
<h2>*** WARNING *** <a href="http://anonym.to/http://anonymissexpress.cyberguerrilla.info/?p=658" target="_blank">#Hausdurchsuchung wegen #YACY in CH | #Searchwarrant because of YaCy in #CH</a></h2> Encrypt your emailtag:12160.info,2012-02-26:2649739:Page:7895302012-02-26T14:08:13.348ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p><a href="http://storage.ning.com/topology/rest/1.0/file/get/1798365205?profile=original" target="_self"><img class="align-left" src="http://storage.ning.com/topology/rest/1.0/file/get/1798365205?profile=original" width="264"></img></a> The cake isn’t real. Even if you can get it. Cyber warfare isn’t real either, and security just a hype. Merely security software vendors and secretly security consultants trying to shock and scare everyone so they can sell their products and services.</p>
<p>Well…</p>
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p><a target="_self" href="http://storage.ning.com/topology/rest/1.0/file/get/1798365205?profile=original"><img class="align-left" src="http://storage.ning.com/topology/rest/1.0/file/get/1798365205?profile=original" width="264"></a>The cake isn’t real. Even if you can get it. Cyber warfare isn’t real either, and security just a hype. Merely security software vendors and secretly security consultants trying to shock and scare everyone so they can sell their products and services.</p>
<p>Well yes, on occasion that is true. But what about banks, big corporations and their hand puppets, governments? Governments and military have long developed intelligence activities with an eye on foreign threats (states) and terrorists (people). And yes, with recent developments that may mean you. Have you worn a tent lately? Or assembled peacefully at an occupy or portshutdown to express your disgust with the war-work-machine?</p>
<p>Okay, and it’s not just the US. If you DO NOT want to make it easy for the <a rel="nofollow" href="http://anonym.to/http://wikileaks.org/The-Spyfiles-The-Map.html" target="_blank">darn arrogating and appropriating snoopers</a>, an ancient strategy is encryption of data, like email content. They will be able to see who sends to whom but not what (unless they are also using keyloggers).</p>
<p>In case you are a terrorist (yes, even babies can be foreign agents in disguise, or worse, terrorists wearing pink tents), governments and military of course want to be able to read your email (and all your other data for that matter). For they saw that one coming a long time ago too. Many countries have passed laws to maintain law-enforcement and national-security capabilities through regulation of cryptography.</p>
<blockquote>
<p>Bert-Jaap Koops:<br>
<a rel="nofollow" href="http://anonym.to/http://rechten.uvt.nl/koops/cryptolaw/cls-sum.htm" target="_self">This survey</a> gives an overview of the current (<em>July 2010, next update December 2011</em>) state of affairs, with entries per country on import/export controls, domestic laws, developments to restrict cryptography, and developments favoring crypto use. For more <strong>background</strong> on the crypto policy dilemma, see my <a rel="nofollow" href="http://anonym.to/http://rechten.uvt.nl/koops/THESIS/thesis.htm" target="_blank">Ph.D. thesis</a> <em>The Crypto Controversy</em> or my <a rel="nofollow" href="http://anonym.to/http://rechten.uvt.nl/koops/jenc8bjk.htm" target="_blank">JENC8 conference presentation</a>.</p>
</blockquote>
<h2>Mail clients</h2>
<p>Not all mailclients work the same when it comes to composing and sending a mail message, thus exposing more or less information to the SMTP server. It is preferred to not create sensitive data in the first place. And this is where different mailclients work differently.</p>
<p><a rel="nofollow" href="http://anonym.to/http://www.claws-mail.org/" target="_blank">Sylpheed Claw</a> does well in that regard, and so does <a rel="nofollow" href="http://anonym.to/https://www.mozilla.org/en-US/thunderbird/all.html" target="_blank">Thunderbird</a>.</p>
<p>Sylpheed Claw exposes <em>version number</em> and <em>platform of the operating system</em> (i686-linux-gnu/win32) and creates a <em>message ID</em> containing a local <em>timestamp</em> and the sender’s <em>mail address</em>. You can and should configure Sylpheed to change its behaviour to not sending a <em>message id</em> header at all. Also, by default Sylpheed uses the locally configured <em>hostname as HELO string</em>. This setting can be changed too. As a bonus Sylpheed can be configured to not create a <em>Date headerline</em>which is helpful for not exposing your local timezone. <strong>Claws Mail includes PGP functionality.</strong></p>
<p>Thunderbird exposes <em>software release</em> and <em>OS</em> in the <em>X-Mailer: header</em> and creates a <em>message ID</em> with a <em><strong>random</strong> stamp</em> and the <em>sender domain</em> – this is not critical. <em>HELO host-name</em> is your sender-domain. For now, this is acceptable. Consider using Thunderbird along with <a rel="nofollow" href="http://anonym.to/http://gpg4win.org/download.html" target="_blank">Gpg4win</a> (windows) or <a rel="nofollow" href="http://anonym.to/https://addons.mozilla.org/en-us/thunderbird/addon/enigmail/" target="_blank">Enigmail</a> (linux) to <strong>add PGP functionality</strong>.</p> Encrypted Filesystems: TrueCrypttag:12160.info,2012-02-26:2649739:Page:7893432012-02-26T13:37:23.895ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p>Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux</p>
<p>Main Features:</p>
<ul type="disc">
<li>Creates a virtual encrypted disk within a file and mounts it as a real disk.</li>
<li>Encrypts an entire partition or storage device such as USB flash drive or hard drive.</li>
<li>Encrypts a partition or drive where Windows is installed (…</li>
</ul>
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p>Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux</p>
<p>Main Features:</p>
<ul type="disc">
<li>Creates a virtual encrypted disk within a file and mounts it as a real disk.</li>
<li>Encrypts an entire partition or storage device such as USB flash drive or hard drive.</li>
<li>Encrypts a partition or drive where Windows is installed (<a rel="nofollow" href="http://anonym.to/http://www.truecrypt.org/docs/?s=system-encryption">pre-boot authentication</a>).</li>
<li>Encryption is <a rel="nofollow" href="http://anonym.to/http://www.truecrypt.org/docs/">automatic, real-time (on-the-fly) and transparent</a>.</li>
<li><a rel="nofollow" href="http://anonym.to/http://www.truecrypt.org/docs/?s=parallelization">Parallelization</a> and <a rel="nofollow" href="http://anonym.to/http://www.truecrypt.org/docs/?s=pipelining">pipelining</a> allow data to be read and written as fast as if the drive was not encrypted.</li>
<li>Encryption can be <a rel="nofollow" href="http://anonym.to/http://www.truecrypt.org/docs/?s=hardware-acceleration">hardware-accelerated</a> on modern processors.</li>
<li>Provides <a rel="nofollow" href="http://anonym.to/http://www.truecrypt.org/docs/?s=plausible-deniability">plausible deniability</a>, in case an adversary forces you to reveal the password:<br>
<a rel="nofollow" href="http://anonym.to/http://www.truecrypt.org/hiddenvolume">Hidden volume</a> (steganography) and <a href="http://anonym.to/http://www.truecrypt.org/docs/?s=hidden-operating-system">hidden operating system</a>.</li>
</ul>
<p>More information about the features of TrueCrypt may be found in the <a href="http://anonym.to/http://www.truecrypt.org/docs/">documentation</a>.</p>
<p>Official website: <a rel="nofollow" href="http://anonym.to/http://www.truecrypt.org/" target="_blank">http://www.truecrypt.org/</a></p> Encrypted Filesystems: FreeOTFEtag:12160.info,2012-02-26:2649739:Page:7895232012-02-26T13:30:39.808ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p>FreeOTFE is a free, open source, "on-the-fly" transparent disk encryption program for PCs and PDAs</p>
<p>With this software, you can create one or more "virtual disks" on your PC/PDA. These disks operate exactly like a normal disk, with the exception that anything written to one of them is transparently, and securely, encrypted before being stored on your computer's hard…</p>
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p>FreeOTFE is a free, open source, "on-the-fly" transparent disk encryption program for PCs and PDAs</p>
<p>With this software, you can create one or more "virtual disks" on your PC/PDA. These disks operate exactly like a normal disk, with the exception that anything written to one of them is transparently, and securely, encrypted before being stored on your computer's hard drive.</p>
<p>Features include:</p>
<ul>
<li>Highly portable - Not only does FreeOTFE offer "portable mode", eliminating the need for it to be installed before use, it also offers FreeOTFE Explorer - a system which allows FreeOTFE volumes to be accessed not only <i>without installing any software</i>, but also on PCs where <i>no administrator rights are available</i>. This makes it ideal for use (for example) with USB flash drives, and when visiting Internet Cafés (AKA Cybercafés), where PCs are available for use, but only as a "standard" user.</li>
<li>Source code freely available</li>
<li>Easy to use; full wizard included for creating new volumes</li>
<li>Both PC and PDA versions are available; data encrypted on your PC can be read/written on your PDA, and vice versa. Supports all versions of MS Windows from Windows 2000 onwards (including Windows 7), and Windows Mobile 2003 and later (including Windows Mobile v6.5)</li>
<li>No need to install it; making it ideal for use on USB memory drives, etc</li>
<li>Support for encrypted Linux volumes (Cryptoloop "losetup", dm-crypt and LUKS)</li>
<li>Available in English, Spanish, German, Italian, French, Czech, Japanese, Croatian, Greek and Russian - with support for other language translations</li>
<li>Optional support for smartcards and security tokens</li>
<li>It's powerful: Supporting numerous hash (including SHA-512, RIPEMD-320, Tiger) and encryption algorithms (including AES, Twofish and Serpent) in several modes (CBC, LRW and XTS) - providing a much greater level of flexibility than a number of other (including commercial!) OTFE systems</li>
<li>Encrypted volumes may either be file, partition, or even disk based</li>
<li><a rel="nofollow" href="http://anonym.to/http://www.freeotfe.org/features.html">Much more!</a></li>
</ul>
<p>See the full <a rel="nofollow" href="http://anonym.to/http://www.freeotfe.org/features.html">features list</a> and <a rel="nofollow" href="http://anonym.to/http://www.freeotfe.org/screenshots_pc_main.html">screenshots</a> for more details!</p>
<p>Official site (with download links): <a rel="nofollow" href="http://anonym.to/http://www.freeotfe.org/" target="_blank">http://www.freeotfe.org/</a></p> Brightnet: Monolithtag:12160.info,2012-02-26:2649739:Page:7892612012-02-26T12:32:12.408ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p style="text-align: center;">muddying the waters of the digital copyright debate<br></br> <img class="align-center" height="79" src="http://monolith.sourceforge.net/images/logo.png" width="400"></img></p>
<p>Monolith is a simple tool that takes two arbitrary binary files (called a <i>Basis</i> file and an <i>Element</i> file) and "munges" them together to produce a <i>Mono</i> binary file (with a <b>.mono</b>extension). Monolith can also reconstruct an Element file from a Basis file…</p>
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p style="text-align: center;">muddying the waters of the digital copyright debate<br>
<img class="align-center" src="http://monolith.sourceforge.net/images/logo.png" height="79" width="400"></p>
<p>Monolith is a simple tool that takes two arbitrary binary files (called a <i>Basis</i> file and an <i>Element</i> file) and "munges" them together to produce a <i>Mono</i> binary file (with a <b>.mono</b>extension). Monolith can also reconstruct an Element file from a Basis file and a Mono file.</p>
<p>In most cases, the resulting Mono file will not be statistically related to either file. If you compare the Mono file to the Element file, the Mono file will contain none of the information present in the Element file. In other words, the Mono file by itself tells you nothing at all about the data in the Element file. Only when combined with the Basis file will the Mono file provide information about the Element file.</p>
<p>Monolith can be used for exploring the boundaries of digital copyright, and the rest of this website is devoted to such an exploration. The core questions: What happens when we use Monolith to munge copyrighted files? What is the copyright status of the resulting .mono file?</p>
<p>These questions are considered in the Official website (includes download links): <a rel="nofollow" href="http://anonym.to/http://monolith.sourceforge.net/" target="_blank">http://monolith.sourceforge.net/</a></p>
<h3>Note</h3>
<p><em>Monolith was developed on a lark. It is a philosophical experiment, a curiosity, and perhaps even a hare-brained scheme. In any case, Monolith is meant to stir debate: a perfect, flawless system would not stir debate very well, would it? Monolith exists comfortably in a world of logical gymnastics. The real world of copyright does not operate in a logical fashion. Thus, a word of warning: if you apply Monolith in the real world, your legal mileage may vary.</em></p>
<p><em>Plus see <a href="http://12160.info/group/anonymous-antisec-lulzsec-ows/page/brightnet-off-system" target="_self">note on OFF System</a><br></em></p> Brightnet: OFF Systemtag:12160.info,2012-02-26:2649739:Page:7892602012-02-26T12:25:55.272ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p>The Owner Free Filing System (OFF System) is a peer-to-peer distributed file system through which all shared files are represented by randomized data blocks. The system is referred to as a brightnet to contrast its method of operation with that of private file sharing systems known as darknets.</p>
<p>On August 14 2006, CaptainMorgan posted a letter of "closing" addressed to the…</p>
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p>The Owner Free Filing System (OFF System) is a peer-to-peer distributed file system through which all shared files are represented by randomized data blocks. The system is referred to as a brightnet to contrast its method of operation with that of private file sharing systems known as darknets.</p>
<p>On August 14 2006, CaptainMorgan posted a letter of "closing" addressed to the "Copyright Industry Associations of America", such as the <a rel="nofollow" href="http://anonym.to/https://en.wikipedia.org/wiki/RIAA" title="RIAA">RIAA</a> and <a rel="nofollow" href="http://anonym.to/https://en.wikipedia.org/wiki/MPAA" title="MPAA">MPAA</a>, stating that they have created <i>OFF</i> with the purpose of ending "all of your problems with consumer copyright infringement."</p>
<p>The OFF System for content storage and retrieval, lets you store all digital content and allows only the people authorized to use it to do so. It is the proof of concept for 'bright nets' and will allow anyone to securely share digital data legally.</p>
<p>More on: <a rel="nofollow" href="http://anonym.to/http://anonymous-p2p.org/off_system.html" target="_blank">http://anonymous-p2p.org/off_system.html</a></p>
<p>Download: <a rel="nofollow" href="http://anonym.to/http://sourceforge.net/projects/offsystem/" target="_blank">http://sourceforge.net/projects/offsystem/</a></p>
<h2>Notes from the I2P forums</h2>
<p><em>Let’s say the riaa (or mpaa) wants to bust you. They starts a new node, find the url of a copyrighted content, and download it. They take note of all the blocks they receive, needed to build back the file. Then start monitoring your request. If you request one of those blocks, you have 50% probability that you are downloading the copyrighted content. (the other 50% is if you’re downloading something else that uses that block for xor). If you request two blocks you’ve 66%, and so on. But even in the point of downloading a copyrighted OFF-Url, the node of the RIAA could accouse all the IP adresses, it gets ANY block from.</em></p>
<p>The Rebuild of the File is done locally on your machine. Then they’d have to monitor YOUR side of the network, which means they will have to either break in to your computer or sniff your connection somewhere between your house and your ISP. Even if they do that, one block is not a 50% probability, one block can belong to 100s of files, there is no way to tell. Even if you get ALL of the blocks needed for a file it doesn’t mean that you actually retrieved (press “Save” to your hard disc) that file. Maybe you retrieved another file that was “target-stored” with that file (one file in another), or all the file’s blocks just happened to be in the inserters block-cache when (s)he inserted another file and all of that file’s blocks were used as randomizers. So you can insert a copyright-free Linux Distribution into a block of a copyrighted movie. But if you then download the Linux-Distribution with the OFF-Link and need one mixed-in block of the copyrighted movie - what is the problem to download a Linux Distro with a randomized and XOR-ed Block of another file, no one can refer to (because it is XOR-ed)? For the tracking of the Postmans it is nearly the same: the Riaa can download the copyrighted Media and accuse all IP adresses, it gets blocks from. But what would then be the accusation? To transfer the media to the riaa-node, which is random data? You see, the MEANING is the essential thing for random data, and this is the OFF-Link. The riaa can only accuse the ones, which gave the RIAA the OFF-Link. And if the RIAA itself is uploading a copyrighted media as a honeytrap, they need to download the OFF-Link itself to them. But of course the conclusion is then, that no one should download the OFF-Links of the RIAA. You are safe in downloading here again, but overgiving the OFF-Link might be risky, but does the Riaa know, what you do with the link? as there are good chances, that you do nothing with it. There is no relationship between all… in any case.</p>
<p><strong>The URLs are the weak point of the system, but this is designed to be fixed with turtle hopping.</strong></p>
<p><em>Unfortunately, even if you choose to relay, but hide your OFF-Url-Link-URLs, it is conceivable that some wily lawyer would misinterpret this as causation and single you out for attack. If they seized your machine then your collection of URLs would be exposed as potential evidence to a jury that didn’t understand any of this.For that reason, that searching OFF-Url-Links in the OFF-System is not anonymous, we discuss the development of a search system sperated from the OFFSYSTEM (e.g. by turtle hopping searches in a friend-to-friend network).</em></p>
<p><strong>Anyway, don't trust OFF (nor any of its descendants <a href="http://12160.info/group/anonymous-antisec-lulzsec-ows/page/brightnet-monolith" target="_self">Monolith</a>, OFFLOAD and <a href="http://anonym.to/http://sourceforge.net/projects/blocksnet/" target="_blank">Blocksnet</a>) YET for anonymity of data. Experimentation is fine tho.</strong></p> Darknet: I2Ptag:12160.info,2012-02-26:2649739:Page:7891152012-02-26T11:36:54.432ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p>I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.</p>
<p>Many applications are available that interface with I2P, including mail, peer-peer, IRC chat, and others.</p>
<p>The I2P…</p>
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p>I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.</p>
<p>Many applications are available that interface with I2P, including mail, peer-peer, IRC chat, and others.</p>
<p>The I2P project was formed in 2003 to support the efforts of those trying to build a more free society by offering a not censorable, anonymous, and secure communication system. I2P is a development effort producing a low latency, fully distributed, autonomous, scalable, anonymous, resilient, and secure network. The goal is to operate successfully in hostile environments - even when an organization with substantial financial or political resources attacks it. All aspects of the network are open source and available without cost, as this should both assure the people using it that the software does what it claims, as well as enable others to contribute and improve upon it to defeat aggressive attempts to stifle free speech.</p>
<p>Anonymity is not a boolean - we are not trying to make something "perfectly anonymous", but instead are working at making attacks more and more expensive to mount. I2P is a low latency mix network, and there are limits to the anonymity offered by such a system, but the applications on top of I2P, such as <a rel="nofollow" href="http://anonym.to/http://syndie.i2p2.de/" target="_blank">Syndie</a>, I2P mail, and I2PSnark extend it to offer both additional functionality and protection.</p>
<p>I2P is still a work in progress. It should not be relied upon for "guaranteed" anonymity at this time, due to the relatively small size of the network and the lack of extensive academic review. It is not immune to attacks from those with unlimited resources, and may never be, due to the inherent limitations of low-latency mix networks.</p>
<p>I2P works by routing traffic through other peers, as shown in the following picture. All traffic is encrypted end-to-end. For more information about how I2P works, see the <a rel="nofollow" href="http://anonym.to/http://www.i2p2.de/how_intro" target="_blank">Introduction</a>.</p>
<p>Official website: <a rel="nofollow" href="http://anonym.to/http://www.i2p2.de/" target="_blank">http://www.i2p2.de/</a></p>
<h3>eepSite</h3>
<p>An eepSite is a webserver who's true identity is hidden by the mixnet structure of I2P. For practical purposes, it works just as a normal site or a freesite. You build it locally with your favorite HTML authoring tool, then register it in your address book by which it becomes accessible for those that are in your book.</p>
<p>Official website: <a rel="nofollow" href="http://anonym.to/http://www.eepsite.com/" target="_blank">http://www.eepsite.com/</a></p>
<h3>Messaging</h3>
<p>The network itself is strictly message based (ala IP), but there is a library available to allow reliable streaming communication on top of it (ala TCP). All communication is end to end encrypted (in total there are four layers of encryption used when sending a message), and even the end points ("destinations") are cryptographic identifiers (essentially a pair of public keys). Thus I2P is a network that sits on top of another network (in this case, it sits on top of the internet) and can deliver a message anonymously and securely to another location.</p>
<p>Many applications are already available: See description of i2ptunnel: <a rel="nofollow" href="http://anonym.to/http://www.i2p2.de/i2ptunnel" target="_blank">http://www.i2p2.de/i2ptunnel</a></p> Darknet: Freenettag:12160.info,2012-02-26:2649739:Page:7891142012-02-26T11:35:28.471ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p>Freenet is a decentralized, censorship-resistant distributed data store originally designed by Ian Clarke. Freenet aims to provide freedom of speech through a peer-to-peer network with strong protection of anonymity. Freenet works by pooling the contributed bandwidth and storage space of member computers to allow users to anonymously publish or retrieve various kinds…</p>
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p>Freenet is a decentralized, censorship-resistant distributed data store originally designed by Ian Clarke. Freenet aims to provide freedom of speech through a peer-to-peer network with strong protection of anonymity. Freenet works by pooling the contributed bandwidth and storage space of member computers to allow users to anonymously publish or retrieve various kinds of information. From a user's perspective, it can be thought of as simply a large storage device.</p>
<p>Official website: <a rel="nofollow" href="http://anonym.to/http://freenetproject.org/" target="_blank">http://freenetproject.org/</a></p>
<h3>Freesite</h3>
<p>A freesite is a web page on Freenet. It usually consists of a collection of files in a single <a rel="nofollow" href="http://anonym.to/http://new-wiki.freenetproject.org/Manifest" target="_blank">manifest</a>, and therefore accessible from the same key. USKs are most commonly used, to allow for updates, but any key type is possible. The simplest way to create a freesite is probably to build it using your favorite HTML authoring tool, and then upload it using <a rel="nofollow" href="http://anonym.to/http://new-wiki.freenetproject.org/JSite" target="_blank"> jSite</a>. Linking to freesites can be done using an <a rel="nofollow" href="http://anonym.to/http://new-wiki.freenetproject.org/Activelink" target="_blank">Activelink</a>.</p>
<h3>Messaging</h3>
<p>Frost is a message board system for Freenet. You can create private or public boards, upload/download files, and send encrypted messages.</p>
<p>Official website: <a rel="nofollow" href="http://anonym.to/http://jtcfrost.sourceforge.net/" target="_blank">http://jtcfrost.sourceforge.net/</a></p>
<p>How to run frost: Either run the frost.bar or frost.sh (bat for windows, sh for *nix) or run the jar via java:</p>
<pre>
<code>java -jar frost.jar</code> <br />
</pre> How To Bypass Internet Censorshiptag:12160.info,2012-02-26:2649739:Page:7893332012-02-26T10:05:58.985ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p><a href="http://storage.ning.com/topology/rest/1.0/file/get/1798365555?profile=original" target="_self"><img class="align-left" src="http://storage.ning.com/topology/rest/1.0/file/get/1798365555?profile=original" width="200"></img></a> Because we believe that Internet censorship is not only against the basic purpose of the Internet, which is to let people communicate what they want to with the people they want to communicate with, but also fundamentally against the universal right to freedom of…</p>
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p><a target="_self" href="http://storage.ning.com/topology/rest/1.0/file/get/1798365555?profile=original"><img class="align-left" src="http://storage.ning.com/topology/rest/1.0/file/get/1798365555?profile=original" width="200"></a>Because we believe that Internet censorship is not only against the basic purpose of the Internet, which is to let people communicate what they want to with the people they want to communicate with, but also fundamentally against the universal right to freedom of opinion and expression [which] includes freedom to hold opinions without interference and to seek, receive, and impart information and ideas through any media and regardless of frontiers (UDHR, Article 19), we offer you here “How to bypass Internet Censorship”.</p>
<blockquote>
<p>This book will not only help you find your way in the diversity of tools and techniques that allow you to defeat Internet censorship, but will also tell you more about how censorship works behind the curtains. You will also learn about the risks that may be linked to the use of such tools, and help you evaluate and mitigate them thanks to encryption or anonymization techniques.</p>
</blockquote>
<p><a title="https://www.howtobypassinternetcensorship.org/" href="https://www.howtobypassinternetcensorship.org/" rel="nofollow" target="_blank">Read more and see the clips</a>…</p>
<p><a href="https://www.howtobypassinternetcensorship.org/files/bypass-internet-censorship-quickstart.pdf">Get your feet wet with the lightweight Quickstart PDF</a></p>
<p><em>How To Bypass Internet Censorship is licensed under a <a href="http://creativecommons.org/licenses/by/3.0/" rel="nofollow" target="_blank">Creative Commons Attribution 3.0 Unported License</a>.<br>
Based on a <a href="http://en.flossmanuals.net/booki/ch004_introduction/" rel="nofollow" target="_blank">booksprint</a> work at <a href="http://booki.flossmanuals.net/" rel="nofollow" target="_blank">booki.flossmanuals.net</a></em></p>
<h2>Browser Add Ons</h2>
<ul>
<li><a title="https://addons.mozilla.org/en-US/firefox/addon/desopa/" href="https://addons.mozilla.org/en-US/firefox/addon/desopa/">De SOPA</a> – Firefox</li>
<li><a title="https://addons.mozilla.org/en-US/firefox/addon/mafiaafire-piratebay-dancing/?src=search" href="https://addons.mozilla.org/en-US/firefox/addon/mafiaafire-piratebay-dancing/?src=search">MAFIAA Piratebay dancing</a> – Firefox</li>
</ul>
<p> </p>
<h2>List of Free Proxy Services</h2>
<ul>
<li><a title="http://proxpn.com" href="http://proxpn.com/">http://proxpn.com</a></li>
<li><a title="http://psiphon.ca" href="http://psiphon.ca/">http://psiphon.ca</a> – open source effort</li>
<li><a title="http://ultrasurf.us" href="http://ultrasurf.us/">http://ultrasurf.us</a></li>
<li><a title="http://www.sabzproxy.com" href="http://www.sabzproxy.com/">http://www.sabzproxy.com</a></li>
<li><a title="http://www.4shared.com/file/hLTGgfhn/Simurgh_proxy.html" href="http://www.4shared.com/file/hLTGgfhn/Simurgh_proxy.html">http://www.4shared.com/file/hLTGgfhn/Simurgh_proxy.html</a></li>
<li><a title="https://alkasir.com" href="https://alkasir.com/">https://alkasir.com</a> – open source effort</li>
<li><a title="http://www.dit-inc.us/freegate" href="http://www.dit-inc.us/freegate">http://www.dit-inc.us/freegate</a> – DynaWeb, DIT’s P2P-like proxy network system</li>
<li><a title="http://anonymous-proxy-servers.net/en/jondo.html" href="http://anonymous-proxy-servers.net/en/jondo.html">http://anonymous-proxy-servers.net/en/jondo.html</a></li>
<li><a title="https://www.your-freedom.net" href="https://www.your-freedom.net/">https://www.your-freedom.net</a></li>
<li><a title="http://www.download25.com/install/hide-my-ip.html" href="http://www.download25.com/install/hide-my-ip.html">http://www.download25.com/install/hide-my-ip.html</a></li>
</ul>
<p> </p>
<h2>Tor</h2>
<ul>
<li><a title="https://www.torproject.org/download/download-easy.html.en" href="https://www.torproject.org/download/download-easy.html.en">Tor Browser Bundle for Windows, Mac, 64-Bit Mac, Linux, 64-Bit Linux</a></li>
<li><a title="http://www.cypherpunk.at/onioncat/" href="http://www.cypherpunk.at/onioncat/">OnionCat</a> – creates a transparent IP layer on top of Tor’s hidden services. It transmits any kind of IP-based data transparently through the Tor network on a location hidden basis. You can think of it as a point-to-multipoint VPN between hidden services.</li>
</ul>
<p> </p>
<h2>List of Free VPN Services</h2>
<ul>
<li><a title="https://www.vpnreactor.com" href="https://www.vpnreactor.com/">https://www.vpnreactor.com</a> – <strong>30 MINUTE TIME LIMIT</strong> per vpn connection. You will need to WAIT 30 minutes & manually reestablish your VPN connection</li>
<li><a title="http://www.bestfreevpn.com" href="http://www.bestfreevpn.com/">http://www.bestfreevpn.com</a> – requires a new password every day, is regularly offline</li>
<li><a title="http://hotspotshield.com" href="http://hotspotshield.com/">http://hotspotshield.com</a> – PC and the Mac, including Windows 7 and Snow Leopard</li>
</ul>
<p>We won’t deny to you: Free VPNs are available online, but we strongly recommend you do not go this route. They could be logging your IP address or browsing information and selling it to advertising companies, and are inherently more likely to bend easily and immedietly under any kind of legal pressure. Before you use a Free VPN you might as well look in the Security Handbook for other options you could take to anonymize yourself.</p>
<h2>List of paid VPN Services</h2>
<p>Following is a list of some trusted VPN providers. You gain trust by paying money for the account, but be sure to ask around for options on trusted ones. A VPN is a Internet Connection that tunnels through your ISP and masks your real IP address. Keep in mind you can pay for these with pre-paid Credit Cards from your local convenience store, ukash, or use a new service called Bitcoin, or another way to translate your money onto the internet (do a google search for “Bitcoin” for more info).</p>
<ul>
<li><a href="http://www.swissvpn.net/">http://www.swissvpn.net</a> – 6 CHF/month, reliable</li>
<li><a href="http://perfect-privacy.com/">http://perfect-privacy.com</a></li>
<li><a href="https://www.ipredator.se/">https://www.ipredator.se</a></li>
<li><a href="http://www.anonine.se/">http://www.anonine.se</a> – The service have been started its for 49 SEK permonth</li>
<li><a href="https://www.vpntunnel.se/">https://www.vpntunnel.se</a> – €5/month. Can pay with ukash so completely anon.</li>
<li><a href="http://www.relakks.com/">http://www.relakks.com</a></li>
<li><a href="http://www.steganos.com/">http://www.steganos.com</a></li>
<li><a href="http://www.bananavpn.net/">http://www.bananavpn.net</a> > logs IPs</li>
<li><a href="http://www.strongvpn.com/">http://www.strongvpn.com</a> > logs IPs</li>
<li><a href="http://www.secureix.com/">http://www.secureix.com</a></li>
<li><a href="http://www.secretsline.com/">http://www.secretsline.com</a></li>
<li><a href="http://www.findnot.com/">http://www.findnot.com</a></li>
<li><a href="http://www.trackbuster.com/">http://www.trackbuster.com</a></li>
<li><a href="http://www.vpngates.com/">http://www.vpngates.com</a></li>
<li><a href="http://www.perfect-privacy.com/">http://www.perfect-privacy.com</a></li>
<li><a href="http://www.trilightzone.org/">http://www.trilightzone.org</a></li>
<li><a href="http://www.vpnaccounts.com/">http://www.vpnaccounts.com</a></li>
<li><a href="http://www.securstar.de/">http://www.securstar.de</a></li>
<li><a href="http://www.witopia.net/">http://www.witopia.net</a></li>
<li><a href="http://www.tiggerswelt.net/">http://www.tiggerswelt.net</a></li>
<li><a href="http://www.xerobank.com/">http://www.xerobank.com</a> > logs IPs</li>
</ul>
<p> </p>
<h2>WordPress Plugin</h2>
<ul>
<li><a title="https://all4xs.net/press-release/" href="https://all4xs.net/press-release/">RePress</a> – in development: it broke my site <img src="http://anonymissexpress.cyberguerrilla.info/wp-includes/images/smilies/icon_wink.gif" alt=";)" class="wp-smiley"></li>
</ul> HANDBOOK FOR BLOGGERS AND CYBER-DISSIDENTStag:12160.info,2012-02-26:2649739:Page:7891092012-02-26T10:02:28.369ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p><a href="http://storage.ning.com/topology/rest/1.0/file/get/1798365598?profile=original" target="_self"><img class="align-left" src="http://storage.ning.com/topology/rest/1.0/file/get/1798365598?profile=original" width="221"></img></a> Bloggers cause anxiety. Governments are wary of these men and women, who are posting news, without being professional journalists. Worse, bloggers sometimes raise sensitive issues which the media, now known as “traditional”, do not dare cover. Blogs have in some…</p>
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p><a target="_self" href="http://storage.ning.com/topology/rest/1.0/file/get/1798365598?profile=original"><img class="align-left" src="http://storage.ning.com/topology/rest/1.0/file/get/1798365598?profile=original" width="221"></a>Bloggers cause anxiety. Governments are wary of these men and women, who are posting news, without being professional journalists. Worse, bloggers sometimes raise sensitive issues which the media, now known as “traditional”, do not dare cover. Blogs have in some countries become a source of news in their own right.</p>
<blockquote class="tr_bq">
<p>Nearly 120,000 blogs are created every day. Certainly the blogosphere is not just adorned by gems of courage and truth. It is also often the source of confusion and dis-information and not all bloggers have the souls of reporters. That is why this handbook contains advice on creating and updating a blog, with no other ambition than that of free expression. For others it will be a struggle to draw attention to a particular issue. The first concern therefore is to make a publication visible (see the Jotman article). This hand-book also suggests ploys to get your blog well referenced online (see the Olivier Andrieu article) as well as “editorial” recommendations (Get your blog to stand out, by Mark Glazer).</p>
</blockquote>
<p>Let’s acknowledge that blogs are a fantastic tool for freedom of expression. They have unloosed the tongues of ordinary citizens. People who were until now only consumers of news have become players in a new form of journalism, a “grassroots” journalism, as expressed by Dan Gillmor (Grassroots journalism — see the chapter What ethics should bloggers have?), that is “by the people for the people”. Blogs are more or less controllable for those who want to keep them under surveillance. Governments that are most up to do date with new technology use the most sophisticated filtering or blocking techniques, preventing them from appearing on the Web at all. But bloggers don’t just sit back and let it happen. The essential question becomes how to blog in complete safety. With a normal IP address, a blogger can be tracked down and arrested. Anonymity allows them to keep their freedom (See “How to blog anonymously).</p>
<p>In countries where censorship holds sway, blogs are sometimes the only source of news. During the events in Burma in the autumn of 2007, pitting monks and the people against the military junta, bloggers were the main source of news for foreign journalists. Their video footage made it possible to gauge the scale of the protests and what demonstrators’ demands were. For more than two months, marches were held in the streets, then a massive crackdown was launched against opponents that only the Burmese were able to show, so hard did it become for the few foreign journalists who managed to enter the country to get back out with their footage. And bloggers could not get the footage out without getting round online censorship imposed by the government.</p>
<p>This handbook seeks to help every blogger to fill in the “black holes” In news. The second part is devoted to techniques which can thwart filtering technology (Choosey our method to get round censorship by Nart Villeneuve). With a little good sense and persistence and above all finding the technique best suited to the situation, every blogger should be capable of shaking off censorship.</p>
<p><em>Clothilde Le Coz</em><br>
Head of the Internet Freedom desk</p>
<p><em>Note Anonymiss Express: Handbook contains</em></p>
<p><em>46 HOW TO BLOG ANONYMOUSLY WITH WORDPRESS AND TOR by Ethan Zuckerman<br>
54 TECHNICAL WAYS TO GET ROUND CENSORSHIP by Nart Villeneuve<br>
71 ENSURING YOUR E-MAIL IS TRULY PRIVATE by Ludovic Pierrat<br>
75 THE 2008 GOLDEN SCISSORS OF CYBER-CENSORSHIP by Clothilde Le Coz</em></p>
<p><a href="http://www.mediafire.com/?fjvjs5v9dj147yj">Download The HandBook from mediafire</a>or read it on or download it from scribd</p>
<p><a title="View Bloggers & Cyber Dissidents' Handbook on Scribd" href="http://www.scribd.com/doc/49765660/Bloggers-Cyber-Dissidents-Handbook" style="margin: 12px auto 6px auto; font-family: Helvetica,Arial,Sans-serif; font-style: normal; font-variant: normal; font-weight: normal; font-size: 14px; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none; display: block; text-decoration: underline;">Bloggers & Cyber Dissidents' Handbook</a><object id="doc_95505" style="outline: medium none;" width="100%" height="600" classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" name="doc_95505"><param name="wmode" value="opaque">
<param name="allowFullScreen" value="false">
<param name="allowScriptAccess" value="never">
<param name="FlashVars" value="document_id=49765660&access_key=key-23shkgq5zkkho5560mb4&page=1&viewMode=list">
<param name="src" value="http://d1.scribdassets.com/ScribdViewer.swf">
<param name="allowscriptaccess" value="never">
<param name="allowfullscreen" value="false">
<param name="flashvars" value="document_id=49765660&access_key=key-23shkgq5zkkho5560mb4&page=1&viewMode=list">
<embed wmode="opaque" id="doc_95505" style="outline: medium none;" width="100%" height="600" type="application/x-shockwave-flash" src="http://d1.scribdassets.com/ScribdViewer.swf" allowscriptaccess="never" allowfullscreen="false" flashvars="document_id=49765660&access_key=key-23shkgq5zkkho5560mb4&page=1&viewMode=list" name="doc_95505" bgcolor="#FFFFFF"></object></p> The Net Delusion: The Dark Side of Internet Freedomtag:12160.info,2012-02-26:2649739:Page:7893322012-02-26T09:57:57.434ZAnonymiss Expresshttps://12160.info/profile/AnonymissExpress
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p><a href="http://storage.ning.com/topology/rest/1.0/file/get/1798366556?profile=original" target="_self"><img class="align-left" src="http://storage.ning.com/topology/rest/1.0/file/get/1798366556?profile=original" width="227"></img></a></p>
<h2>Web and Circus; The Internet isn’t necessarily freedom’s friend.</h2>
<p>Allnutt, Luke. “Web and Circus; The Internet isn’t necessarily freedom’s friend.” <em>The Weekly Standard</em>, 21 Feb. 2011</p>
<p>Review of “The Net Delusion: The Dark Side of…</p>
<p style="text-align: center;"><strong><em>Note: Links on this page use the anonym.to service.</em></strong></p>
<p><a target="_self" href="http://storage.ning.com/topology/rest/1.0/file/get/1798366556?profile=original"><img class="align-left" src="http://storage.ning.com/topology/rest/1.0/file/get/1798366556?profile=original" width="227"></a></p>
<h2>Web and Circus; The Internet isn’t necessarily freedom’s friend.</h2>
<p>Allnutt, Luke. “Web and Circus; The Internet isn’t necessarily freedom’s friend.” <em>The Weekly Standard</em>, 21 Feb. 2011</p>
<p>Review of “The Net Delusion: The Dark Side of Internet Freedom, by Evgeny Morozov”, PublicAffairs, 432 pp., $27.95, scribd version below</p>
<p>It’s easy to fall into the trap of seeing authoritarian regimes as somnolent beasts: sluggish, reactive, andat times ridiculous, with their fetish for uniforms and propaganda. More often than not, however, the opposite is true. One of the themes running through Evgeny Morozov’s The Net Delusion is that it is dynamism and willingness to change rather than stagnation that allows authoritarian regimes to survive.</p>
<p>That ability to adapt is seen clearly in the way repressive regimes have dealt with the Internet. Early Internet theorists, often with their 1960s libertarian ideals, thought the web would eventually make nation-states obsolete and bring people-powered democracy to the world. Their Internet was cosmopolitan and liberal; they were using it for good and they expected the world to do the same. And it wasn’t just the left. Many on the right, buoyed by America’s role in helping bring down the BerlinWall, saw the Internet as a tool of democracy promotion. Blogging was the new samizdat: Tear down that firewall! In the summer of 2009, the initial breathless coverage in the West about the role of socialmedia in Iran’s “Twitter Revolution” was the apex of that hubris, which cut across political divisions.</p>
<p>But rather than paving the path to freedom, Morozov, a blogger and journalist originally from Belarus, argues that authoritarian regimes haven’t just managed to tame the Internet but have used it to bolster their regimes. For every anecdote of how the Internet or digital media have helped activists working inrepressive regimes, as we have seen in Tunisia and Egypt, there is a sinister flip side. Hundreds of thousands of Colombians used Facebook to organize protests against FARC rebels in 2008, but governments can also use social-networking sites to infiltrate activists’ networks. The Iranian webspace is full of blogs, but they aren’t all written by modern-day Vaclav Havels; some are the work of hard-lineclerics or members of the brutal Basij militia. While activists can use cell-phone cameras to film ballotbox-stuffing and spread the videos through social-networking sites, their governments can also reap the benefits of digitization. These days surveillance is easier and cheaper, and more people can be spied on than ever before.</p>
<p>Where there is censorship, it is getting more sophisticated. Morozov points out that censorship in the future could work much like behavioral advertising: tracking our paths on the web in order to build upcomplex personality profiles. Browsing could become highly personalized. An impressionable young Iranian student with a taste for underground hip-hop might be kept away from international newswebsites, but a commodities trader might be given access, as her work could suffer without it. And rather than shrinking in fear at the power of social media and blogging, repressive governments are embracing it. In China there is a cyber-army of 280,000 pro-government propagandists known as the “50 cent party,” who are paid to comment on articles and in web forums. Twitter isn’t just the domain of Silicon Valley super-users but also Hugo Chavez, who has more than a million followers.</p>
<p>Sometimes the weapons used by the authorities are subtler still. Morozov writes that “while we thought the Internet might give us a generation of ‘digital renegades,’ it may have given us a generation of ‘digital captives,’ who know how to find comfort online, whatever the political realities of the physical world.” Thus in Vietnam, web users can’t access Amnesty International reports, but they can view as much pornography as they want. In authoritarian Belarus, Internet service providers “run their own servers full of illegal movies and music” available for free. The government looks the other way. If the kids have ripped versions of the latest Hollywood releases they are less likely to take to the streets, or so the logic goes. With the exception of basket cases such as North Korea, authoritarian regimes can end up looking more like Huxley’s Brave New World than Orwell’s 1984, where instead of sustaining themselves through sadism and lies they rely on cheap entertainment for the masses.</p>
<p>For all The Net Delusion’s sound logic, the problem (as the author admits) is, “The Internet does matter, but we simply don’t know how it matters.” Given the age of the Internet, we are still in the land of conjecture. A recent report by the U.S. Institute of Peace, “Blogs and Bullets: New Media in Contentious Politics,” had the same conclusion: “The sobering answer is that, fundamentally, no one knows. To this point, little research has sought to estimate the causal effects of new media in a methodologically rigorous fashion, or to gather the rich data needed to establish causal influence.” We simply don’t know yet if a grass-roots democracy movement will grow out of an illegal file-sharing forum, or whether “liking” a cause on Facebook could actually detract from offline campaigning.</p>
<p>For policymakers, this is a worthy and nuanced take on the value of the United States promoting an Internet freedom agenda. Morozov takes the wind out of the sails of the alliance of geeks and wonks who “endow the Internet with nearly magical qualities; for them, it’s the ultimate cheat sheet that could help the West finally defeat its authoritarian adversaries.” And while the author admits he used to be “intoxicated with cyber-utopianism,” he does not write with the phony fervor and fundamentalism of the reborn. Nor does he argue that, because the Internet can be used by both aid workers and al Qaeda, the United States should retreat into isolationism or abandon promoting Internet freedom. Rather, he advocates a policy of “cyber-realism” where, instead of fetishizing the Internet, we see it as “an ally in achieving specific policy objectives.”</p>
<p>As the Internet is treated less like a dark art by those in power, and as our understanding of its benefits and limitations grows, that “cyber-realist” perspective is likely to prevail.</p>
<p><em>Luke Allnutt is editor in chief of <a title="http://www.rferl.org/" href="http://www.rferl.org/">Radio Free Europe/Radio Liberty’s</a> English website.</em></p>
<p><a title="View eBook the Net Delusion on Scribd" href="http://www.scribd.com/doc/53583339/eBook-the-Net-Delusion" style="margin: 12px auto 6px auto; font-family: Helvetica,Arial,Sans-serif; font-style: normal; font-variant: normal; font-weight: normal; font-size: 14px; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none; display: block; text-decoration: underline;">eBook the Net Delusion</a><object id="doc_46507" style="outline: medium none;" width="100%" height="600" classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" name="doc_46507"><param name="wmode" value="opaque">
<param name="allowFullScreen" value="false">
<param name="allowScriptAccess" value="never">
<param name="FlashVars" value="document_id=53583339&access_key=key-1p322aihv7ziwzoazclu&page=1&viewMode=list">
<param name="src" value="http://d1.scribdassets.com/ScribdViewer.swf">
<param name="allowscriptaccess" value="never">
<param name="allowfullscreen" value="false">
<param name="flashvars" value="document_id=53583339&access_key=key-1p322aihv7ziwzoazclu&page=1&viewMode=list">
<embed wmode="opaque" id="doc_46507" style="outline: medium none;" width="100%" height="600" type="application/x-shockwave-flash" src="http://d1.scribdassets.com/ScribdViewer.swf" allowscriptaccess="never" allowfullscreen="false" flashvars="document_id=53583339&access_key=key-1p322aihv7ziwzoazclu&page=1&viewMode=list" name="doc_46507" bgcolor="#FFFFFF"></object></p>