Your IP:
_____/\\\\\\\\\\\_______________________________________________________________ ___/\\\/////////\\\_____________________________________________________________ __\//\\\______\///______________________________________________________________ ___\////\\\__________/\\/\\\\\\_______/\\\\\\\\___/\\____/\\___/\\__/\\\\\\\\\\_ ______\////\\\______\/\\\////\\\____/\\\/////\\\_\/\\\__/\\\\_/\\\_\/\\\//////__ _________\////\\\___\/\\\__\//\\\__/\\\\\\\\\\\__\//\\\/\\\\\/\\\__\/\\\\\\\\\\_ __/\\\______\//\\\__\/\\\___\/\\\_\//\\///////____\//\\\\\/\\\\\___\////////\\\_ _\///\\\\\\\\\\\/___\/\\\___\/\\\__\//\\\\\\\\\\___\//\\\\//\\\_____/\\\\\\\\\\_ ___\///////////_____\///____\///____\//////////_____\///__\///_____\//////////__ =========================[ Internet Trench Warfare ]========================== Despite the intrusion of massive surveillance programs like PRISM and DCSNet as well as the potential threat of weak to mid-tier encryption equating to no encryption because of things like Bullrun, it's still the case that you may find personal privacy on the internet a priority, or further that since the state is allowed to see everyone's personal information, that everyone else should be allowed to see the same information, meaning offensive measures as well as defensive measures are necessary. Well this is a good starting point for your future of being put on a government watch list because below are a bunch of various tools for "educational" implimentation of fuckery. Norse's live feed is linked here for the full view. For more information on internet rights, visit the Electronic Frontier Foundation. Good to know about DNSSEC root key split and about secret sharing in general. Demystify hacking, show how it is easy and banal. :: Defense :: Be secure, use chkrootkit and an IDS like Snort/Samhain. Be anonymous, use Tor/I2P, SMAC, and don't use a VPN unless it's Cryptostorm. Be unbruted with a strong random password generator all done client-side. Be average, remove your browser fingerprint(s) to make you harder to identify. Be obfuscated, encrypt with VeraCrypt and use stego like OpenPuff/f5stego. Be independant, use Bitcoin/Zcash and our guide. Be untrackable, use Blackphone/Librem and Silent Pocket. Be hardened steel, use Abloy locks for physical security. :: Offense :: Be NSA, become a ghost in the wires by using Tails/TENS. Be CIA, and do advanced data analysis and mining by using Maltego. Be FBI, do background checks, use Whitepages/411/Pipl/Spokeo and their photos/IP. Be a vigilante, use a Stingray device or learn to war drive/Skyjack. Be a pen tester with Nmap/Nikto/Wireshark/Metasploit and Hydra/Medusa. Be a skiddie, use Dangerous Kitten's hack pack, or web dox tools. Be multipresent, use a RAT like DarkComet (and the Removal Tool) or Sub7. Be Bosnian Bill, learn how to pick all kinds of locks. Be a dick, kill laptops at will by simply pluging in the USB Killer. Be PMC, get a millitary-grade briefcase EMP bomb. :: Misc :: Be a programmer, motherfucker, or at least learn shell scripting. Be faceless, share website logins with BugMeNot/Login2/fakeaccount. Be a cracker, GUID Generator for serial numbers or software. Be e-rich, with valid credit card numbers and a new identity or phone #. Be innawoods with a dailies kit, car pack, and long-term go-bag.