0
0

[–] 16203931? ago 

nothing to hide, nothing to fear you dirty little kikes.

0
0

[–] 16204137? ago 

11911453

they found enough drugs in my house

I am one of you, goys!

Fuck off tbh.

0
0

[–] 17302545? ago 

bamp

0
0

[–] 16204225? ago 

Bamp

0
0

[–] 16203738? ago 

Your Environment

Tor contains weaknesses which can only be mitigated through actions in the physical world. An attacker who can view both your local Internet connection, and the connection of the site you are visiting, can use statistical analysis to correlate them.

  1. Never use Tor from home, or near home. Never work on anything sensitive enough to require Tor from home, even if you remain offline. Computers have a funny habit of liking to be connected. This also applies to anywhere you are staying temporarily, such as a hotel. Never performing these activities at home helps to ensure that they cannot be tied to those locations. (Note that this applies to people facing advanced persistent threats. Running Tor from home is reasonable and useful for others, especially people who aren't doing anything themselves but wish to help by running an exit node, relay, or bridge.

  2. Limit the amount of time you spend using Tor at any single location. While these correlation attacks do take some time, they can in theory be completed in as little as a day. And while the jackboots are very unlikely to show up the same day you fire up Tor at Starbucks, they might show up the next day. I recommend for the truly concerned to never use Tor more than 24 hours at any single physical location; after that, consider it burned and go elsewhere. This will help you even if the jackboots show up six months later; it's much easier to remember a regular customer than someone who showed up one day and never came back. This does mean you will have to travel farther afield, especially if you don't live in a large city, but it will help to preserve your ability to travel freely.

  3. When you go out to perform these activities, leave your cell phone turned on and at home.

Your Mindset

Many Tor users get caught because they made a mistake, such as posting their real E-mail address in association with their activities. You must avoid this as much as possible, and the only way to do so is with careful mental discipline.

  1. Think of your Tor activity as pseudonymous, and create in your mind a virtual identity to correspond with the activity. This virtual person does not know you and will never meet you, and wouldn't even like you if he knew you. He must be kept strictly mentally separated.

  2. If you must use public Internet services, create completely new accounts for this pseudonym. Never mix them; for instance do not browse Facebook with your real E-mail address after having used Twitter with your pseudonym's E-mail on the same computer. Wait until you get home.

  3. By the same token, never perform actions related to your pseudonymous activity via the clearnet, unless you have no other choice (e.g. to sign up for a provider who blocks Tor), and take extra precautions regarding your location when doing so.

  4. If you need to make and receive phone calls, purchase an anonymous prepaid phone for the purpose. This is difficult in some countries, but it can be done if you are creative enough. Pay cash; never use a debit or credit card to buy the phone or top-ups. Never insert its battery or turn it on if you are within 10 miles (16 km) of your home, nor use a phone from which the battery cannot be removed. Never place a SIM card previously used in one phone into another phone. Never give its number or even admit its existence to anyone who knows you by your real identity. This may need to include your family members.

0
0

[–] 16916237? ago 

what about paying with anonymous credit card? is still ok?

>>11699153

  1. If you need to make and receive phone calls, purchase an anonymous prepaid phone for the purpose. This is difficult in some countries, but it can be done if you are creative enough. Pay cash; never use a debit or credit card to buy the phone or top-ups. Never insert its battery or turn it on if you are within 10 miles (16 km) of your home, nor use a phone from which the battery cannot be removed. Never place a SIM card previously used in one phone into another phone. Never give its number or even admit its existence to anyone who knows you by your real identity. This may need to include your family members.

0
0

[–] 17480972? ago 

Some providers require that you ID yourself to purchase these cards to begin with, but if you know the provider well enough then it should be OK. However you're stupid if you think most providers aren't compromised. Also when you buy cards like this make sure to cover your face with sunglasses or similar things and avoid cameras.

0
0

[–] 16204141? ago 

Bmap

0
0

[–] 16204277? ago 

Lot of angry glowinthedarks ITT

0
0

[–] 16203807? ago 

STRIKES AND WORK INTERRUPTIONS

The strike is a model of action employed by the urban guerrilla in work centers and schools to damage the enemy by stopping work and study activities. Because it is one of the weapons most feared by the exploiters and oppressors, the enemy uses tremendous firepower and incredible violence against it. The strikers are taken to prison, suffer beatings, and many of them wind up killed.

The urban guerrilla must prepare the strike in such a way as to leave no track or clue that can identify the leaders of such an action. A strike is successful when it is organized by a small group, if it is carefully prepared in secret using the most clandestine methods. Weapons, ammunition, Molotov cocktails, homemade weapons of destruction and attack, all of these must be supplied beforehand in order to meet the enemy. So that the action can do the greatest possible amount of damage, it is a good idea to study and put into effect a sabotage plan. Strikes and study interruptions, although they are of brief duration, cause severe damage to the enemy. It is enough for them to crop up at different locations and in differing sections of the same area, disrupting daily life, occuring endlessly, one after the other, in true guerrilla fashion.

In strikes or in simple work interruptions, the urban guerrilla has recourse to the occupation or penetration of the site, or he can simply make a raid. In that case, his objective is to take captives, to capture prisoners, or to capture enemy agents and propose an exchange for arrested strikers.

In certain cases, strikes and brief work interruptions can offer an excellent opportunity for preparing ambushes or traps, whose aim is the physical destruction of the police. The basic fact is that the enemy suffers losses as well as material and moral damage, and is weakened by the action.

load more comments ▼ (207 remaining)