Activity

  • DownunderET posted an update 7 years, 1 month ago

    ZERO HEDGE is down, now this could be just a technical issue. But there maybe foul play here, taking down web sites is nothing new, but you have to wonder about these wombats who take down web sites, (think Catherine Austin Fitts here)but wait there’s more, the question is, who gives the orders to take down web sites.

    • Firstly forget about the above post, I was totally wrong in my judgement. UPDATE, Wow, RT is now talking about Zero Hedge and the video of the New Zealand shooting.

    • Use VPN and Zero Hedge will work again. This censorship madness is spreading like a plague.

      • and maybe using the Tor browser is another good idea.

        • No it isnt. TOR isnt what you think and its one huge honeytrap.. TOR was broken by NSA years ago and they let people think that it reamins anonymous to keep them in a false sense of security. Found out whilst investigating CP – FBI ran child pron servers in order to log the IP’s of everyone logging on to DL CP. Broke TOR into little pieces..

          • It’s safe on Linux. 100% sure. You can even sandbox it, so it runs separated from the system. You can also run it directly from the USB stick, and it don’t leave any marks on your system. Linux is open source, so this is well documented and audited. Now, I never ran Tor on Windows so I really don’t know, but if I understood it right, you can also sandbox it on Windows.

            • FBI software cracks encryption wall
              ‘Magic Lantern’ part of new ‘Enhanced Carnivore Project’
              20/11/2001
              http://www.nbcnews.com/id/3341694/ns/technology_and_science-security/t/fbi-software-cracks-encryption-wall/

              Magic Lantern is one of a series of enhancements currently being developed for the FBI’s Carnivore project, the source said, under the umbrella project name of Cyber Knight.

              FBI Is Building a ‘Magic Lantern’
              https://www.washingtonpost.com/archive/politics/2001/11/23/fbi-is-building-a-magic-lantern/ca972123-83a8-46d8-b95c-c2edafda0fea/?noredirect=on&utm_term=.fea02744d3c3
              November 23, 2001

              “If they are using this kind of program, it would be a highly effective way to bypass any encryption problems,” said James E. Gordon, who heads the information technology practice for Pinkerton Consulting and Investigations Inc. “Once they have the keys to the kingdom, they have complete access to anything that individual is doing.”

            • Fast forward a bit….

              https://www.wired.com/2007/07/fbi-spyware/
              FBI’s Secret Spyware Tracks Down Teen Who Made Bomb Threats
              18/07/2007

              In an affidavit seeking a search warrant to use the software, filed last month in U.S. District Court in the Western District of Washington, FBI agent Norman Sanders describes the software as a “computer and internet protocol address verifier,” or CIPAV.
              The full capabilities of the FBI’s “computer and internet protocol address verifier” are closely guarded secrets, but here’s some of the data the malware collects from a computer immediately after infiltrating it, according to a bureau affidavit acquired by Wired News.

              • IP address
              • MAC address of ethernet cards
              • A list of open TCP and UDP ports
              • A list of running programs
              • The operating system type, version and serial number
              • The default internet browser and version
              • The registered user of the operating system, and registered company name, if any
              • The current logged-in user name
              • The last visited URL

              and some more…..TOR gets TORpedoed for Pedo’s by what appears to be.. a fully working FBI completely devoid of morals….

              https://www.wired.com/2013/08/freedom-hosting/
              Feds Are Suspects in New Malware That Attacks Tor Anonymity
              05/08/2013

            • Largest facilitator of child porn on planet’ must wait month for FBI case
              August 15 2013
              https://www.independent.ie/irish-news/courts/largest-facilitator-of-child-porn-on-planet-must-wait-month-for-fbicase-29501879.html

              Eric Eoin Marques (28), dressed in a grey tracksuit top and jeans, appeared before the President of the High Court Mr Justice Nicholas Kearns.
              The alleged charges relate to images on a large number of websites described as being extremely violent, graphic and depicting the rape and torture of pre-pubescent children.
              —> https://en.wikipedia.org/wiki/Freedom_Hosting

            • —> https://www.irishtimes.com/news/crime-and-law/courts/court-dismisses-appeal-against-extradition-to-us-on-child-porn-charges-1.3534691

              (Here’s where the grey areas start to appear….not catching vile reprehensible excuses of human beings.. but the method used to catch them..)

              https://www.wired.com/2014/08/operation-torpedo/
              Visit the Wrong Website, and the FBI Could End Up in Your Computer
              05/08/2014

              On August 1, 2013, some savvy Tor users began noticing that the Freedom Hosting sites were serving a hidden “iframe”—a kind of website within a website. The iframe contained Javascript code that used a Firefox vulnerability to execute instructions on the victim’s computer. The code specifically targeted the version of Firefox used in the Tor Browser Bundle—the easiest way to use Tor.
              The FBI’s use of malware is not new. The bureau calls the method an NIT, for “network investigative technique,” and the FBI has been using it since at least 2002 in cases ranging from computer hacking to bomb threats, child porn to extortion. Depending on the deployment, an NIT can be a bulky full-featured backdoor program that gives the government access to your files, location, web history and webcam for a month at a time, or a slim, fleeting wisp of code that sends the FBI your computer’s name and address, and then evaporates.
              What’s changed is the way the FBI uses its malware capability, deploying it as a driftnet instead of a fishing line. And the shift is a direct response to Tor, the powerful anonymity system endorsed by Edward Snowden and the State Department alike.

            • (Read that last sentence again….one more time….)