Here’s the current external archive.
my bad wrong link
now to highlight anons ITT:
11699435
and yet you fail to point out any misinfo whatsoever (there is none, these are all guides written by irl revolutionaries and serve as a good training and idea basin for any aspiring freedom fighters/cell leaders).
Peruse it and take away whatever you like, all this is copied from existing material written to screw the glows. Most of it from a Commie perspective but you should study your enemy as they study you.
What you'll learn here…
This article teaches you how to check for surveillance before you meet with a clandestine contact. You'll learn a protocol that will beat security services like the FBI, BATF, DEA, and others. The method is particularly effective against standard police surveillance. It also works against the so-called inspection teams of the IRS.
Tradecraft origins. The method described in this article was originally devised in 1943-1944 by countersurveillance expert Anthony Blunt for Britain's MI.5. Unfortunately for the British, Blunt was a deep-cover agent for the KGB.
Six years later, Blunt taught the protocol to his new KGB controller, Yuri Modin. Together they perfected the technique as it is known today. They successfully thwarted MI.5 surveillance for three years, sometimes even meeting daily to exchange information and top secret documents. In effect, Blunt was using his inside knowledge of MI.5's surveillance techniques to beat them at their own game.
Proliferation. This countersurveillance method has since been adopted by Israel's Mossad, Germany's BND, Russia's KGB (now the SVR), the American CIA, and many others. The protocol is taught by intelligence agencies to their controllers - these are the intelligence officers who manage and meet with deep cover agents in foreign countries. The method is also being used today by resistance movements and urban guerrilla groups.
When this countersurveillance protocol is methodically applied, it is extremely difficult for a security service to breach your security.
Step-by-step instructions…
Here's a hypothetical situation. Assume that you and I wish to meet clandestinely. We wish to ensure that our meeting is not observed by a surveillance team.
You and I have previously agreed upon a place, date, and time. In addition, we are familiar with each other's appearance - we can recognize each other on sight.
[–] 16204131? ago
<search engines
Don't use duck duck go. Use searx or qwant.
<Don't use tor at home
There's no reason not to. I always have a couple tor socks up along with it's DNS server which my local resolver uses. Each socks proxy uses a different route so I try and have different programs use different routes.
<Don't use tor for a long time
I'd rather just keep that open the whole time. If I'm doing something sensitive, I usually sandwich it in between some traffic by just some regular activity.
To avoid correlation attacks avoid applications with a continuous connection. IRC is pretty nasty. Most clients even log everyone's connect and disconnect time. If they see users on different IRC servers all disconnect at the same time continuously then they might find an identity which may not be as anonymous as you would like.
<how to rob banks
RWDSs are not niggers.