0
0

[–] 16204131? ago 

<search engines

Don't use duck duck go. Use searx or qwant.

<Don't use tor at home

There's no reason not to. I always have a couple tor socks up along with it's DNS server which my local resolver uses. Each socks proxy uses a different route so I try and have different programs use different routes.

<Don't use tor for a long time

I'd rather just keep that open the whole time. If I'm doing something sensitive, I usually sandwich it in between some traffic by just some regular activity.

To avoid correlation attacks avoid applications with a continuous connection. IRC is pretty nasty. Most clients even log everyone's connect and disconnect time. If they see users on different IRC servers all disconnect at the same time continuously then they might find an identity which may not be as anonymous as you would like.

<how to rob banks

RWDSs are not niggers.

0
0

[–] 16204158? ago 

Obligatory Reminder: If They Take out Internet we Take out Power Grid

0
0

[–] 16204161? ago 

and if they take out power we take out internet!

0
0

[–] 16204135? ago 

Here’s the current external archive.

http://archive.fo/wjOs6

Bumping the most important bread. Godspeed brothers.

0
0

[–] 16203757? ago 

good bread

0
0

[–] 16203864? ago 

my bad wrong link

>>>/pdfs/9096

>>>/pdfs/9096

now to highlight anons ITT:

>>11699242

>>11699403

11699435

>>11699469

>>11699507

>>11699548

0
0

[–] 16203865? ago 

Posts are in image.

0
0

[–] 16204065? ago 

Well, first of all, this site is (((controlled))).

0
0

[–] 16203893? ago 

If OP is FBI why would he post this shit as text on clearnet thus helping everybody out? Thanks OP. Disregard kikes, learn OPSEC.

Mega bamp

0
0

[–] 16203895? ago 

If OP is FBI why would he post this shit as text on clearnet thus helping everybody out? Thanks OP. Disregard kikes, learn OPSEC.

plants are good. hemlock is a plant. consuming hemlock is good.

This is why cuckchanners are our retarded cousins. Lurk moar newfag

0
0

[–] 16203900? ago 

and yet you fail to point out any misinfo whatsoever (there is none, these are all guides written by irl revolutionaries and serve as a good training and idea basin for any aspiring freedom fighters/cell leaders).

Peruse it and take away whatever you like, all this is copied from existing material written to screw the glows. Most of it from a Commie perspective but you should study your enemy as they study you.

0
0

[–] 16203897? ago 

our

(1)

Found the spook

0
0

[–] 16203753? ago 

What you'll learn here…

This article teaches you how to check for surveillance before you meet with a clandestine contact. You'll learn a protocol that will beat security services like the FBI, BATF, DEA, and others. The method is particularly effective against standard police surveillance. It also works against the so-called inspection teams of the IRS.

Tradecraft origins. The method described in this article was originally devised in 1943-1944 by countersurveillance expert Anthony Blunt for Britain's MI.5. Unfortunately for the British, Blunt was a deep-cover agent for the KGB.

Six years later, Blunt taught the protocol to his new KGB controller, Yuri Modin. Together they perfected the technique as it is known today. They successfully thwarted MI.5 surveillance for three years, sometimes even meeting daily to exchange information and top secret documents. In effect, Blunt was using his inside knowledge of MI.5's surveillance techniques to beat them at their own game.

Proliferation. This countersurveillance method has since been adopted by Israel's Mossad, Germany's BND, Russia's KGB (now the SVR), the American CIA, and many others. The protocol is taught by intelligence agencies to their controllers - these are the intelligence officers who manage and meet with deep cover agents in foreign countries. The method is also being used today by resistance movements and urban guerrilla groups.

When this countersurveillance protocol is methodically applied, it is extremely difficult for a security service to breach your security.

Step-by-step instructions…

Here's a hypothetical situation. Assume that you and I wish to meet clandestinely. We wish to ensure that our meeting is not observed by a surveillance team.

You and I have previously agreed upon a place, date, and time. In addition, we are familiar with each other's appearance - we can recognize each other on sight.

0
0

[–] 17675691? ago 

DO NOT USE CHROME

==DO NOT USE FIREFOX=

ONLY TRUST PALEMOON

load more comments ▼ (79 remaining)