On 09/12/2016 04:47 PM, NewTroll wrote:
u doxn juan or what!
Hurry it up.
We be doxxin' YOU newtroll @sigaint.org You B chillin wit Cloudflare checkin yo tormail: Registrant Org See PrivacyGuardian.org was found in ~553,517 other domains Dates Created on 2014-05-23 - Expires on 2017-05-23 - Updated on 2016-07-29 IP Address 104.28.0.41 - 308 other sites hosted on this server IP Location United States - Arizona - Phoenix - Cloudflare Inc. ASN United States AS13335 CLOUDFLARENET - CloudFlare, Inc., US (registered Jul 14, 2010) Domain Status Registered And Active Website Whois History 421 records have been archived since 2014-05-23 IP History 11 changes on 8 unique IP addresses over 2 years Hosting History 2 changes on 3 unique name servers over 2 years Whois Server whois.pir.org Website Website Title None given. Whois Record ( last updated on 2016-09-12 ) Domain Name: SIGAINT.ORG Domain ID: D172671718-LROR WHOIS Server: Referral URL: www.namesilo.com Updated Date: 2016-07-29T17:26:10Z Creation Date: 2014-05-23T00:50:32Z Registry Expiry Date: 2017-05-23T00:50:32Z Sponsoring Registrar: Namesilo, LLC Sponsoring Registrar IANA ID: 1479 Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited Registrant ID: NS-D21661C60B115 Registrant Name: Domain Administrator Registrant Organization: See PrivacyGuardian.org Registrant Street: 1928 E. Highland Ave. Ste F104 Registrant Street: PMB# 255 Registrant City: Phoenix Registrant State/Province: AZ Registrant Postal Code: 85016 Registrant Country: US Registrant Phone: +1.3478717726 Registrant Phone Ext: Registrant Fax: Registrant Fax Ext: Registrant Email: pw-86320243617ea919f2d79eaf64a29504@privacyguardian.org Admin ID: NS-D21661C60B115 Admin Name: Domain Administrator Admin Organization: See PrivacyGuardian.org Admin Street: 1928 E. Highland Ave. Ste F104 Admin Street: PMB# 255 Admin City: Phoenix Admin State/Province: AZ Admin Postal Code: 85016 Admin Country: US Admin Phone: +1.3478717726 Admin Phone Ext: Admin Fax: Admin Fax Ext: Admin Email: pw-86320243617ea919f2d79eaf64a29504@privacyguardian.org Tech ID: NS-D21661C60B115 Tech Name: Domain Administrator Tech Organization: See PrivacyGuardian.org Tech Street: 1928 E. Highland Ave. Ste F104 Tech Street: PMB# 255 Tech City: Phoenix Tech State/Province: AZ Tech Postal Code: 85016 Tech Country: US Tech Phone: +1.3478717726 Tech Phone Ext: Tech Fax: Tech Fax Ext: Tech Email: pw-86320243617ea919f2d79eaf64a29504@privacyguardian.org Name Server: CARL.NS.CLOUDFLARE.COM Name Server: LUCY.NS.CLOUDFLARE.COM DNSSEC: unsigned For more information on Whois status codes, please visit https://icann.org/epp
On 09/12/2016 08:44 PM, Razer wrote:
On 09/12/2016 04:47 PM, NewTroll wrote:
u doxn juan or what!
Hurry it up.
We be doxxin' YOU newtroll @sigaint.org
You B chillin wit Cloudflare checkin yo tormail:
Why you hatin' on Sigaint? Sigaint's actual mailservers are all hidden services. The clearnet website and mail gateways use CloudFlare as DDoS protection. Even DDoS services use CloudFlare, bro ;)
Registrant Org See PrivacyGuardian.org was found in ~553,517 other domains
Dates Created on 2014-05-23 - Expires on 2017-05-23 - Updated on 2016-07-29
IP Address 104.28.0.41 - 308 other sites hosted on this server
IP Location United States - Arizona - Phoenix - Cloudflare Inc.
ASN United States AS13335 CLOUDFLARENET - CloudFlare, Inc., US (registered Jul 14, 2010) Domain Status Registered And Active Website Whois History 421 records have been archived since 2014-05-23
IP History 11 changes on 8 unique IP addresses over 2 years
Hosting History 2 changes on 3 unique name servers over 2 years
Whois Server whois.pir.org Website Website Title None given.
Whois Record ( last updated on 2016-09-12 ) Domain Name: SIGAINT.ORG Domain ID: D172671718-LROR WHOIS Server: Referral URL: www.namesilo.com Updated Date: 2016-07-29T17:26:10Z Creation Date: 2014-05-23T00:50:32Z Registry Expiry Date: 2017-05-23T00:50:32Z Sponsoring Registrar: Namesilo, LLC Sponsoring Registrar IANA ID: 1479 Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited Registrant ID: NS-D21661C60B115 Registrant Name: Domain Administrator Registrant Organization: See PrivacyGuardian.org Registrant Street: 1928 E. Highland Ave. Ste F104 Registrant Street: PMB# 255 Registrant City: Phoenix Registrant State/Province: AZ Registrant Postal Code: 85016 Registrant Country: US Registrant Phone: +1.3478717726 Registrant Phone Ext: Registrant Fax: Registrant Fax Ext: Registrant Email: pw-86320243617ea919f2d79eaf64a29504@privacyguardian.org Admin ID: NS-D21661C60B115 Admin Name: Domain Administrator Admin Organization: See PrivacyGuardian.org Admin Street: 1928 E. Highland Ave. Ste F104 Admin Street: PMB# 255 Admin City: Phoenix Admin State/Province: AZ Admin Postal Code: 85016 Admin Country: US Admin Phone: +1.3478717726 Admin Phone Ext: Admin Fax: Admin Fax Ext: Admin Email: pw-86320243617ea919f2d79eaf64a29504@privacyguardian.org Tech ID: NS-D21661C60B115 Tech Name: Domain Administrator Tech Organization: See PrivacyGuardian.org Tech Street: 1928 E. Highland Ave. Ste F104 Tech Street: PMB# 255 Tech City: Phoenix Tech State/Province: AZ Tech Postal Code: 85016 Tech Country: US Tech Phone: +1.3478717726 Tech Phone Ext: Tech Fax: Tech Fax Ext: Tech Email: pw-86320243617ea919f2d79eaf64a29504@privacyguardian.org Name Server: CARL.NS.CLOUDFLARE.COM Name Server: LUCY.NS.CLOUDFLARE.COM DNSSEC: unsigned
For more information on Whois status codes, please visit https://icann.org/epp
On 09/12/2016 08:16 PM, Mirimir wrote:
On 09/12/2016 08:44 PM, Razer wrote:
On 09/12/2016 04:47 PM, NewTroll wrote:
u doxn juan or what!
Hurry it up.
We be doxxin' YOU newtroll @sigaint.org
You B chillin wit Cloudflare checkin yo tormail:
Why you hatin' on Sigaint?
Sigaint's actual mailservers are all hidden services. The clearnet website and mail gateways use CloudFlare as DDoS protection. Even DDoS services use CloudFlare, bro ;)
ROTF! With a sunshiney rainbowy logo how COULD they be working for the fedz. http://exiledonline.com/isucker-big-brother-internet-culture/ House testimony on their ISIS Chat room honeypots: http://docs.house.gov/meetings/FA/FA18/20150127/102855/HHRG-114-FA18-Transcr...
Registrant Org See PrivacyGuardian.org was found in ~553,517 other domains
Dates Created on 2014-05-23 - Expires on 2017-05-23 - Updated on 2016-07-29
IP Address 104.28.0.41 - 308 other sites hosted on this server
IP Location United States - Arizona - Phoenix - Cloudflare Inc.
ASN United States AS13335 CLOUDFLARENET - CloudFlare, Inc., US (registered Jul 14, 2010) Domain Status Registered And Active Website Whois History 421 records have been archived since 2014-05-23
IP History 11 changes on 8 unique IP addresses over 2 years
Hosting History 2 changes on 3 unique name servers over 2 years
Whois Server whois.pir.org Website Website Title None given.
Whois Record ( last updated on 2016-09-12 ) Domain Name: SIGAINT.ORG Domain ID: D172671718-LROR WHOIS Server: Referral URL: www.namesilo.com Updated Date: 2016-07-29T17:26:10Z Creation Date: 2014-05-23T00:50:32Z Registry Expiry Date: 2017-05-23T00:50:32Z Sponsoring Registrar: Namesilo, LLC Sponsoring Registrar IANA ID: 1479 Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited Registrant ID: NS-D21661C60B115 Registrant Name: Domain Administrator Registrant Organization: See PrivacyGuardian.org Registrant Street: 1928 E. Highland Ave. Ste F104 Registrant Street: PMB# 255 Registrant City: Phoenix Registrant State/Province: AZ Registrant Postal Code: 85016 Registrant Country: US Registrant Phone: +1.3478717726 Registrant Phone Ext: Registrant Fax: Registrant Fax Ext: Registrant Email: pw-86320243617ea919f2d79eaf64a29504@privacyguardian.org Admin ID: NS-D21661C60B115 Admin Name: Domain Administrator Admin Organization: See PrivacyGuardian.org Admin Street: 1928 E. Highland Ave. Ste F104 Admin Street: PMB# 255 Admin City: Phoenix Admin State/Province: AZ Admin Postal Code: 85016 Admin Country: US Admin Phone: +1.3478717726 Admin Phone Ext: Admin Fax: Admin Fax Ext: Admin Email: pw-86320243617ea919f2d79eaf64a29504@privacyguardian.org Tech ID: NS-D21661C60B115 Tech Name: Domain Administrator Tech Organization: See PrivacyGuardian.org Tech Street: 1928 E. Highland Ave. Ste F104 Tech Street: PMB# 255 Tech City: Phoenix Tech State/Province: AZ Tech Postal Code: 85016 Tech Country: US Tech Phone: +1.3478717726 Tech Phone Ext: Tech Fax: Tech Fax Ext: Tech Email: pw-86320243617ea919f2d79eaf64a29504@privacyguardian.org Name Server: CARL.NS.CLOUDFLARE.COM Name Server: LUCY.NS.CLOUDFLARE.COM DNSSEC: unsigned
For more information on Whois status codes, please visit https://icann.org/epp
On 09/12/2016 09:57 PM, Razer wrote:
On 09/12/2016 08:16 PM, Mirimir wrote:
On 09/12/2016 08:44 PM, Razer wrote:
On 09/12/2016 04:47 PM, NewTroll wrote:
u doxn juan or what!
Hurry it up.
We be doxxin' YOU newtroll @sigaint.org
You B chillin wit Cloudflare checkin yo tormail:
Why you hatin' on Sigaint?
Sigaint's actual mailservers are all hidden services. The clearnet website and mail gateways use CloudFlare as DDoS protection. Even DDoS services use CloudFlare, bro ;)
ROTF! With a sunshiney rainbowy logo how COULD they be working for the fedz.
http://exiledonline.com/isucker-big-brother-internet-culture/
House testimony on their ISIS Chat room honeypots: http://docs.house.gov/meetings/FA/FA18/20150127/102855/HHRG-114-FA18-Transcr...
That says nothing about Sigaint, just CloudFlare. And Sigaint just uses CloudFlare for clearnet gateways, not for any core shit. Everything on clearnet is intercepted, anyway. So who the fuck cares that CloudFlare is proxying?
Registrant Org See PrivacyGuardian.org was found in ~553,517 other domains
Dates Created on 2014-05-23 - Expires on 2017-05-23 - Updated on 2016-07-29
IP Address 104.28.0.41 - 308 other sites hosted on this server
IP Location United States - Arizona - Phoenix - Cloudflare Inc.
ASN United States AS13335 CLOUDFLARENET - CloudFlare, Inc., US (registered Jul 14, 2010) Domain Status Registered And Active Website Whois History 421 records have been archived since 2014-05-23
IP History 11 changes on 8 unique IP addresses over 2 years
Hosting History 2 changes on 3 unique name servers over 2 years
Whois Server whois.pir.org Website Website Title None given.
Whois Record ( last updated on 2016-09-12 ) Domain Name: SIGAINT.ORG Domain ID: D172671718-LROR WHOIS Server: Referral URL: www.namesilo.com Updated Date: 2016-07-29T17:26:10Z Creation Date: 2014-05-23T00:50:32Z Registry Expiry Date: 2017-05-23T00:50:32Z Sponsoring Registrar: Namesilo, LLC Sponsoring Registrar IANA ID: 1479 Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited Registrant ID: NS-D21661C60B115 Registrant Name: Domain Administrator Registrant Organization: See PrivacyGuardian.org Registrant Street: 1928 E. Highland Ave. Ste F104 Registrant Street: PMB# 255 Registrant City: Phoenix Registrant State/Province: AZ Registrant Postal Code: 85016 Registrant Country: US Registrant Phone: +1.3478717726 Registrant Phone Ext: Registrant Fax: Registrant Fax Ext: Registrant Email: pw-86320243617ea919f2d79eaf64a29504@privacyguardian.org Admin ID: NS-D21661C60B115 Admin Name: Domain Administrator Admin Organization: See PrivacyGuardian.org Admin Street: 1928 E. Highland Ave. Ste F104 Admin Street: PMB# 255 Admin City: Phoenix Admin State/Province: AZ Admin Postal Code: 85016 Admin Country: US Admin Phone: +1.3478717726 Admin Phone Ext: Admin Fax: Admin Fax Ext: Admin Email: pw-86320243617ea919f2d79eaf64a29504@privacyguardian.org Tech ID: NS-D21661C60B115 Tech Name: Domain Administrator Tech Organization: See PrivacyGuardian.org Tech Street: 1928 E. Highland Ave. Ste F104 Tech Street: PMB# 255 Tech City: Phoenix Tech State/Province: AZ Tech Postal Code: 85016 Tech Country: US Tech Phone: +1.3478717726 Tech Phone Ext: Tech Fax: Tech Fax Ext: Tech Email: pw-86320243617ea919f2d79eaf64a29504@privacyguardian.org Name Server: CARL.NS.CLOUDFLARE.COM Name Server: LUCY.NS.CLOUDFLARE.COM DNSSEC: unsigned
For more information on Whois status codes, please visit https://icann.org/epp
Dude - you don't even wanna flirt with cloudflare -------- Original Message -------- On Sep 12, 2016, 9:09 PM, Mirimir wrote: On 09/12/2016 09:57 PM, Razer wrote:
On 09/12/2016 08:16 PM, Mirimir wrote:
On 09/12/2016 08:44 PM, Razer wrote:
On 09/12/2016 04:47 PM, NewTroll wrote:
u doxn juan or what!
Hurry it up.
We be doxxin' YOU newtroll @sigaint.org
You B chillin wit Cloudflare checkin yo tormail:
Why you hatin' on Sigaint?
Sigaint's actual mailservers are all hidden services. The clearnet website and mail gateways use CloudFlare as DDoS protection. Even DDoS services use CloudFlare, bro ;)
ROTF! With a sunshiney rainbowy logo how COULD they be working for the fedz.
http://exiledonline.com/isucker-big-brother-internet-culture/
House testimony on their ISIS Chat room honeypots: http://docs.house.gov/meetings/FA/FA18/20150127/102855/HHRG-114-FA18-Transcr...
That says nothing about Sigaint, just CloudFlare. And Sigaint just uses CloudFlare for clearnet gateways, not for any core shit. Everything on clearnet is intercepted, anyway. So who the fuck cares that CloudFlare is proxying?
Registrant Org See PrivacyGuardian.org was found in ~553,517 other domains
Dates Created on 2014-05-23 - Expires on 2017-05-23 - Updated on 2016-07-29
IP Address 104.28.0.41 - 308 other sites hosted on this server
IP Location United States - Arizona - Phoenix - Cloudflare Inc.
ASN United States AS13335 CLOUDFLARENET - CloudFlare, Inc., US (registered Jul 14, 2010) Domain Status Registered And Active Website Whois History 421 records have been archived since 2014-05-23
IP History 11 changes on 8 unique IP addresses over 2 years
Hosting History 2 changes on 3 unique name servers over 2 years
Whois Server whois.pir.org Website Website Title None given.
Whois Record ( last updated on 2016-09-12 ) Domain Name: SIGAINT.ORG Domain ID: D172671718-LROR WHOIS Server: Referral URL: www.namesilo.com Updated Date: 2016-07-29T17:26:10Z Creation Date: 2014-05-23T00:50:32Z Registry Expiry Date: 2017-05-23T00:50:32Z Sponsoring Registrar: Namesilo, LLC Sponsoring Registrar IANA ID: 1479 Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited Registrant ID: NS-D21661C60B115 Registrant Name: Domain Administrator Registrant Organization: See PrivacyGuardian.org Registrant Street: 1928 E. Highland Ave. Ste F104 Registrant Street: PMB# 255 Registrant City: Phoenix Registrant State/Province: AZ Registrant Postal Code: 85016 Registrant Country: US Registrant Phone: +1.3478717726 Registrant Phone Ext: Registrant Fax: Registrant Fax Ext: Registrant Email: pw-86320243617ea919f2d79eaf64a29504@privacyguardian.org Admin ID: NS-D21661C60B115 Admin Name: Domain Administrator Admin Organization: See PrivacyGuardian.org Admin Street: 1928 E. Highland Ave. Ste F104 Admin Street: PMB# 255 Admin City: Phoenix Admin State/Province: AZ Admin Postal Code: 85016 Admin Country: US Admin Phone: +1.3478717726 Admin Phone Ext: Admin Fax: Admin Fax Ext: Admin Email: pw-86320243617ea919f2d79eaf64a29504@privacyguardian.org Tech ID: NS-D21661C60B115 Tech Name: Domain Administrator Tech Organization: See PrivacyGuardian.org Tech Street: 1928 E. Highland Ave. Ste F104 Tech Street: PMB# 255 Tech City: Phoenix Tech State/Province: AZ Tech Postal Code: 85016 Tech Country: US Tech Phone: +1.3478717726 Tech Phone Ext: Tech Fax: Tech Fax Ext: Tech Email: pw-86320243617ea919f2d79eaf64a29504@privacyguardian.org Name Server: CARL.NS.CLOUDFLARE.COM Name Server: LUCY.NS.CLOUDFLARE.COM DNSSEC: unsigned
For more information on Whois status codes, please visit https://icann.org/epp
On 09/12/2016 10:24 PM, rooty wrote:
Dude - you don't even wanna flirt with cloudflare
Dude, their mailservers are all onion services. CloudFlare is just for their fucking website.
-------- Original Message -------- On Sep 12, 2016, 9:09 PM, Mirimir wrote: On 09/12/2016 09:57 PM, Razer wrote:
On 09/12/2016 08:16 PM, Mirimir wrote:
On 09/12/2016 08:44 PM, Razer wrote:
On 09/12/2016 04:47 PM, NewTroll wrote:
u doxn juan or what!
Hurry it up.
We be doxxin' YOU newtroll @sigaint.org
You B chillin wit Cloudflare checkin yo tormail:
Why you hatin' on Sigaint?
Sigaint's actual mailservers are all hidden services. The clearnet website and mail gateways use CloudFlare as DDoS protection. Even DDoS services use CloudFlare, bro ;)
ROTF! With a sunshiney rainbowy logo how COULD they be working for the fedz.
http://exiledonline.com/isucker-big-brother-internet-culture/
House testimony on their ISIS Chat room honeypots: http://docs.house.gov/meetings/FA/FA18/20150127/102855/HHRG-114-FA18-Transcr...
That says nothing about Sigaint, just CloudFlare. And Sigaint just uses CloudFlare for clearnet gateways, not for any core shit. Everything on clearnet is intercepted, anyway. So who the fuck cares that CloudFlare is proxying?
Registrant Org See PrivacyGuardian.org was found in ~553,517 other domains
Dates Created on 2014-05-23 - Expires on 2017-05-23 - Updated on 2016-07-29
IP Address 104.28.0.41 - 308 other sites hosted on this server
IP Location United States - Arizona - Phoenix - Cloudflare Inc.
ASN United States AS13335 CLOUDFLARENET - CloudFlare, Inc., US (registered Jul 14, 2010) Domain Status Registered And Active Website Whois History 421 records have been archived since 2014-05-23
IP History 11 changes on 8 unique IP addresses over 2 years
Hosting History 2 changes on 3 unique name servers over 2 years
Whois Server whois.pir.org Website Website Title None given.
Whois Record ( last updated on 2016-09-12 ) Domain Name: SIGAINT.ORG Domain ID: D172671718-LROR WHOIS Server: Referral URL: www.namesilo.com Updated Date: 2016-07-29T17:26:10Z Creation Date: 2014-05-23T00:50:32Z Registry Expiry Date: 2017-05-23T00:50:32Z Sponsoring Registrar: Namesilo, LLC Sponsoring Registrar IANA ID: 1479 Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited Registrant ID: NS-D21661C60B115 Registrant Name: Domain Administrator Registrant Organization: See PrivacyGuardian.org Registrant Street: 1928 E. Highland Ave. Ste F104 Registrant Street: PMB# 255 Registrant City: Phoenix Registrant State/Province: AZ Registrant Postal Code: 85016 Registrant Country: US Registrant Phone: +1.3478717726 Registrant Phone Ext: Registrant Fax: Registrant Fax Ext: Registrant Email: pw-86320243617ea919f2d79eaf64a29504@privacyguardian.org Admin ID: NS-D21661C60B115 Admin Name: Domain Administrator Admin Organization: See PrivacyGuardian.org Admin Street: 1928 E. Highland Ave. Ste F104 Admin Street: PMB# 255 Admin City: Phoenix Admin State/Province: AZ Admin Postal Code: 85016 Admin Country: US Admin Phone: +1.3478717726 Admin Phone Ext: Admin Fax: Admin Fax Ext: Admin Email: pw-86320243617ea919f2d79eaf64a29504@privacyguardian.org Tech ID: NS-D21661C60B115 Tech Name: Domain Administrator Tech Organization: See PrivacyGuardian.org Tech Street: 1928 E. Highland Ave. Ste F104 Tech Street: PMB# 255 Tech City: Phoenix Tech State/Province: AZ Tech Postal Code: 85016 Tech Country: US Tech Phone: +1.3478717726 Tech Phone Ext: Tech Fax: Tech Fax Ext: Tech Email: pw-86320243617ea919f2d79eaf64a29504@privacyguardian.org Name Server: CARL.NS.CLOUDFLARE.COM Name Server: LUCY.NS.CLOUDFLARE.COM DNSSEC: unsigned
For more information on Whois status codes, please visit https://icann.org/epp
On Mon, 12 Sep 2016 20:57:20 -0700 Razer <rayzer@riseup.net> wrote:
On 09/12/2016 08:16 PM, Mirimir wrote:
On 09/12/2016 08:44 PM, Razer wrote:
On 09/12/2016 04:47 PM, NewTroll wrote:
u doxn juan or what!
Hurry it up.
We be doxxin' YOU newtroll @sigaint.org
You B chillin wit Cloudflare checkin yo tormail:
Why you hatin' on Sigaint?
Sigaint's actual mailservers are all hidden services. The clearnet website and mail gateways use CloudFlare as DDoS protection. Even DDoS services use CloudFlare, bro ;)
ROTF! With a sunshiney rainbowy logo how COULD they be working for the fedz.
http://exiledonline.com/isucker-big-brother-internet-culture/
House testimony on their ISIS Chat room honeypots: http://docs.house.gov/meetings/FA/FA18/20150127/102855/HHRG-114-FA18-Transcr...
Funny thing about cloudflare is that it 'protects' people against ddos attacks that are as common as 'terrorism'.
On Mon, 12 Sep 2016 22:33:07 -0600 Mirimir <mirimir@riseup.net> wrote:
On 09/12/2016 10:09 PM, juan wrote:
<SNIP>
Funny thing about cloudflare is that it 'protects' people against ddos attacks that are as common as 'terrorism'.
Tell that to Linode ;)
What's the difference between cloudflare and linode? Both are just a bunch of datacenters and both can be ddosed. Or is the reasoning here that the whole 'decentralized' (haha) internet should be turned into a handful of organizations that control all the traffic, to save the children from ddos attacks? Ddos attacks are exactly like terrorism. Carried by the same people...at the Department of False Flags.
On 09/12/2016 11:02 PM, juan wrote:
On Mon, 12 Sep 2016 22:33:07 -0600 Mirimir <mirimir@riseup.net> wrote:
On 09/12/2016 10:09 PM, juan wrote:
<SNIP>
Funny thing about cloudflare is that it 'protects' people against ddos attacks that are as common as 'terrorism'.
Tell that to Linode ;)
What's the difference between cloudflare and linode? Both are just a bunch of datacenters and both can be ddosed.
The difference between CloudFlare and Linode is that CloudFlare is a much larger network with much better Internet connectivity and higher bandwidth. So CloudFlare can shrug off attacks that bring Linode to its knees. Google and AWS are similarly resourceful. And they cost a lot more than Linode does. Digital Ocean is probably just as vulnerable as Linode, but for some reason hasn't attracted as much attention.
Or is the reasoning here that the whole 'decentralized' (haha) internet should be turned into a handful of organizations that control all the traffic, to save the children from ddos attacks?
It's rather like sheep, wolves and shepherds, I guess :)
Ddos attacks are exactly like terrorism. Carried by the same people...at the Department of False Flags.
It muct be nice to have such simple answers to everything ;)
On Mon, 12 Sep 2016 23:09:55 -0600 Mirimir <mirimir@riseup.net> wrote:
Ddos attacks are exactly like terrorism. Carried by the same people...at the Department of False Flags.
It muct be nice to have such simple answers to everything ;)
You really got me Mirimir. We should thank the US military for cloudflare too. The internet really started to work a coupl of years ago, thanks of course, to cloudflare.
On 09/12/2016 11:24 PM, juan wrote:
On Mon, 12 Sep 2016 23:09:55 -0600 Mirimir <mirimir@riseup.net> wrote:
Ddos attacks are exactly like terrorism. Carried by the same people...at the Department of False Flags.
It muct be nice to have such simple answers to everything ;)
You really got me Mirimir. We should thank the US military for cloudflare too. The internet really started to work a coupl of years ago, thanks of course, to cloudflare.
Don't get me wrong. I hate CloudFlare. It's fucking stupid to break HTTPS security as MitM in order to protect clueless against DDoS. Clever adversaries can takeover sites if their interaction with CloudFlare isn't adequately secured. And I hate having to deal with their fucking CAPTCHAs when I'm using Tor. But as much as I hate US military, I don't delude myself that they're the only assholes out there. Maybe the most resourceful assholes. And the most arrogant assholes. But far from the only ones. It's the fucking Chinese that seem to beat at every SSH server that I run :( But then you'll say that it's just americunts pretending to be Chinsese ;)
The difference is you have the chinese knocking on your front door and are blocking them whereas you are willingly giving the secrets of your browsing across multiple sites to a single organisation whose CEO has links to the US DoD (arguably more damaging and interventionist than the chinese). You will then be profiled and your future actions predicted and even influenced in order to protect the interests of the US MIC. Nope, nothing to worry about from Cloudflare at all :D My advice is: if an organsation touches Cloudflare then you shouldn't touch that organisation. On 13 September 2016 06:31:37 GMT+01:00, Mirimir <mirimir@riseup.net> wrote:
On 09/12/2016 11:24 PM, juan wrote:
On Mon, 12 Sep 2016 23:09:55 -0600 Mirimir <mirimir@riseup.net> wrote:
Ddos attacks are exactly like terrorism. Carried by the same people...at the Department of False Flags.
It muct be nice to have such simple answers to everything ;)
You really got me Mirimir. We should thank the US military for cloudflare too. The internet really started to work a coupl of years ago, thanks of course, to cloudflare.
Don't get me wrong. I hate CloudFlare. It's fucking stupid to break HTTPS security as MitM in order to protect clueless against DDoS. Clever adversaries can takeover sites if their interaction with CloudFlare isn't adequately secured. And I hate having to deal with their fucking CAPTCHAs when I'm using Tor.
But as much as I hate US military, I don't delude myself that they're the only assholes out there. Maybe the most resourceful assholes. And the most arrogant assholes. But far from the only ones. It's the fucking Chinese that seem to beat at every SSH server that I run :( But then you'll say that it's just americunts pretending to be Chinsese ;)
-- Sent from my Android device with K-9 Mail. Please excuse my brevity.
On 09/13/2016 12:18 AM, oshwm wrote:
The difference is you have the chinese knocking on your front door and are blocking them whereas you are willingly giving the secrets of your browsing across multiple sites to a single organisation whose CEO has links to the US DoD (arguably more damaging and interventionist than the chinese). You will then be profiled and your future actions predicted and even influenced in order to protect the interests of the US MIC. Nope, nothing to worry about from Cloudflare at all :D
My advice is: if an organsation touches Cloudflare then you shouldn't touch that organisation.
You're missing the fucking point! Using Sigaint for email has nothing to do with CloudFlare. You can't even hit Sigaint webmail, except as a Tor onion service. CloudFlare doesn't proxy mailserver connections. It's just their fucking website. Unless you have some actual evidence, you're just blowing smoke ;)
On 13 September 2016 06:31:37 GMT+01:00, Mirimir <mirimir@riseup.net> wrote:
On 09/12/2016 11:24 PM, juan wrote:
On Mon, 12 Sep 2016 23:09:55 -0600 Mirimir <mirimir@riseup.net> wrote:
Ddos attacks are exactly like terrorism. Carried by the same people...at the Department of False Flags.
It muct be nice to have such simple answers to everything ;)
You really got me Mirimir. We should thank the US military for cloudflare too. The internet really started to work a coupl of years ago, thanks of course, to cloudflare.
Don't get me wrong. I hate CloudFlare. It's fucking stupid to break HTTPS security as MitM in order to protect clueless against DDoS. Clever adversaries can takeover sites if their interaction with CloudFlare isn't adequately secured. And I hate having to deal with their fucking CAPTCHAs when I'm using Tor.
But as much as I hate US military, I don't delude myself that they're the only assholes out there. Maybe the most resourceful assholes. And the most arrogant assholes. But far from the only ones. It's the fucking Chinese that seem to beat at every SSH server that I run :( But then you'll say that it's just americunts pretending to be Chinsese ;)
Well obviously all I've said about Cloudflare is well documented but in terms of sigaint, its your choice but with the documented issues with Cloudflare then I would expect any org who is trying to provide protection against 'dragnet surveillance' would be morally and ethically opposed to services such as Clouflare, wouldn't you? On 13 September 2016 07:26:26 GMT+01:00, Mirimir <mirimir@riseup.net> wrote:
The difference is you have the chinese knocking on your front door and are blocking them whereas you are willingly giving the secrets of your browsing across multiple sites to a single organisation whose CEO has links to the US DoD (arguably more damaging and interventionist
On 09/13/2016 12:18 AM, oshwm wrote: than the chinese).
You will then be profiled and your future actions predicted and even influenced in order to protect the interests of the US MIC. Nope, nothing to worry about from Cloudflare at all :D
My advice is: if an organsation touches Cloudflare then you shouldn't touch that organisation.
You're missing the fucking point!
Using Sigaint for email has nothing to do with CloudFlare. You can't even hit Sigaint webmail, except as a Tor onion service. CloudFlare doesn't proxy mailserver connections. It's just their fucking website.
Unless you have some actual evidence, you're just blowing smoke ;)
On 09/12/2016 11:24 PM, juan wrote:
On Mon, 12 Sep 2016 23:09:55 -0600 Mirimir <mirimir@riseup.net> wrote:
Ddos attacks are exactly like terrorism. Carried by the same people...at the Department of False Flags.
It muct be nice to have such simple answers to everything ;)
You really got me Mirimir. We should thank the US military for cloudflare too. The internet really started to work a coupl of years ago, thanks of course, to cloudflare.
Don't get me wrong. I hate CloudFlare. It's fucking stupid to break HTTPS security as MitM in order to protect clueless against DDoS. Clever adversaries can takeover sites if their interaction with CloudFlare isn't adequately secured. And I hate having to deal with their fucking CAPTCHAs when I'm using Tor.
But as much as I hate US military, I don't delude myself that
On 13 September 2016 06:31:37 GMT+01:00, Mirimir <mirimir@riseup.net> wrote: they're
the only assholes out there. Maybe the most resourceful assholes. And the most arrogant assholes. But far from the only ones. It's the fucking Chinese that seem to beat at every SSH server that I run :( But then you'll say that it's just americunts pretending to be Chinsese ;)
-- Sent from my Android device with K-9 Mail. Please excuse my brevity.
On 09/13/2016 12:33 AM, oshwm wrote:
Well obviously all I've said about Cloudflare is well documented
Yeah, but there's nothing there about Sigaint, is there?
but in terms of sigaint, its your choice but with the documented issues with Cloudflare then I would expect any org who is trying to provide protection against 'dragnet surveillance' would be morally and ethically opposed to services such as Clouflare, wouldn't you?
You're as bad as Juan with the "morally and ethically" bit ;) It's my impression that Sigaint is pretty neutral about moral and ethical issues. Yes, they provide protection against "dragnet surveillance". But the fact that CloudFlare is insecure, and may be an NSA honeypot, is no reason for them to avoid using it for posting a warning on their gateway IP. That warning is just for clueless mail admins and LEA. Their website is <http://sigaintevyh2rzvw.onion/>.
On 13 September 2016 07:26:26 GMT+01:00, Mirimir <mirimir@riseup.net> wrote:
The difference is you have the chinese knocking on your front door and are blocking them whereas you are willingly giving the secrets of your browsing across multiple sites to a single organisation whose CEO has links to the US DoD (arguably more damaging and interventionist
On 09/13/2016 12:18 AM, oshwm wrote: than the chinese).
You will then be profiled and your future actions predicted and even influenced in order to protect the interests of the US MIC. Nope, nothing to worry about from Cloudflare at all :D
My advice is: if an organsation touches Cloudflare then you shouldn't touch that organisation.
You're missing the fucking point!
Using Sigaint for email has nothing to do with CloudFlare. You can't even hit Sigaint webmail, except as a Tor onion service. CloudFlare doesn't proxy mailserver connections. It's just their fucking website.
Unless you have some actual evidence, you're just blowing smoke ;)
On 09/12/2016 11:24 PM, juan wrote:
On Mon, 12 Sep 2016 23:09:55 -0600 Mirimir <mirimir@riseup.net> wrote:
> Ddos attacks are exactly like terrorism. Carried by the same > people...at the Department of False Flags.
It muct be nice to have such simple answers to everything ;)
You really got me Mirimir. We should thank the US military for cloudflare too. The internet really started to work a coupl of years ago, thanks of course, to cloudflare.
Don't get me wrong. I hate CloudFlare. It's fucking stupid to break HTTPS security as MitM in order to protect clueless against DDoS. Clever adversaries can takeover sites if their interaction with CloudFlare isn't adequately secured. And I hate having to deal with their fucking CAPTCHAs when I'm using Tor.
But as much as I hate US military, I don't delude myself that
On 13 September 2016 06:31:37 GMT+01:00, Mirimir <mirimir@riseup.net> wrote: they're
the only assholes out there. Maybe the most resourceful assholes. And the most arrogant assholes. But far from the only ones. It's the fucking Chinese that seem to beat at every SSH server that I run :( But then you'll say that it's just americunts pretending to be Chinsese ;)
On 09/13/2016 12:00 AM, Mirimir wrote:
But the fact that CloudFlare is insecure, and may be an NSA honeypot, is no reason for them to avoid using it...
Umn. I guess it depends on if your freedom or life depend on it. I'd tend to be.... Risk-adverse. But that's just me. Rr "The contrail is gone entirely from the sky. Pirate’s sweat lies on his skin almost as cold as ice. He takes some time lighting a cigarette. He won’t hear the thing come in. It travels faster than the speed of sound. The first news you get of it is the blast. Then, if you’re still around, you hear the sound of it coming in. What if it should hit exactly—ahh, no—for a split second you’d have to feel the very point, with the terrible mass above, strike the top of the skull..." ~Thomas Pynchon, Gravity's Rainbow
On 09/13/2016 12:33 AM, oshwm wrote:
Well obviously all I've said about Cloudflare is well documented
Yeah, but there's nothing there about Sigaint, is there?
but in terms of sigaint, its your choice but with the documented issues with Cloudflare then I would expect any org who is trying to provide protection against 'dragnet surveillance' would be morally and ethically opposed to services such as Clouflare, wouldn't you?
You're as bad as Juan with the "morally and ethically" bit ;)
It's my impression that Sigaint is pretty neutral about moral and ethical issues. Yes, they provide protection against "dragnet surveillance". But the fact that CloudFlare is insecure, and may be an NSA honeypot, is no reason for them to avoid using it for posting a warning on their gateway IP. That warning is just for clueless mail admins and LEA. Their website is <http://sigaintevyh2rzvw.onion/>.
On 13 September 2016 07:26:26 GMT+01:00, Mirimir <mirimir@riseup.net> wrote:
The difference is you have the chinese knocking on your front door and are blocking them whereas you are willingly giving the secrets of your browsing across multiple sites to a single organisation whose CEO has links to the US DoD (arguably more damaging and interventionist
On 09/13/2016 12:18 AM, oshwm wrote: than the chinese).
You will then be profiled and your future actions predicted and even influenced in order to protect the interests of the US MIC. Nope, nothing to worry about from Cloudflare at all :D
My advice is: if an organsation touches Cloudflare then you shouldn't touch that organisation.
You're missing the fucking point!
Using Sigaint for email has nothing to do with CloudFlare. You can't even hit Sigaint webmail, except as a Tor onion service. CloudFlare doesn't proxy mailserver connections. It's just their fucking website.
Unless you have some actual evidence, you're just blowing smoke ;)
On 09/12/2016 11:24 PM, juan wrote:
On Mon, 12 Sep 2016 23:09:55 -0600 Mirimir <mirimir@riseup.net> wrote:
> >> Ddos attacks are exactly like terrorism. Carried by the same >> people...at the Department of False Flags. > > It muct be nice to have such simple answers to everything ;)
You really got me Mirimir. We should thank the US military for cloudflare too. The internet really started to work a coupl of years ago, thanks of course, to cloudflare.
Don't get me wrong. I hate CloudFlare. It's fucking stupid to break HTTPS security as MitM in order to protect clueless against DDoS. Clever adversaries can takeover sites if their interaction with CloudFlare isn't adequately secured. And I hate having to deal with their fucking CAPTCHAs when I'm using Tor.
But as much as I hate US military, I don't delude myself that
On 13 September 2016 06:31:37 GMT+01:00, Mirimir <mirimir@riseup.net> wrote: they're
the only assholes out there. Maybe the most resourceful assholes. And the most arrogant assholes. But far from the only ones. It's the fucking Chinese that seem to beat at every SSH server that I run :( But then you'll say that it's just americunts pretending to be Chinsese ;)
On 09/13/2016 08:13 AM, Razer wrote:
On 09/13/2016 12:00 AM, Mirimir wrote:
But the fact that CloudFlare is insecure, and may be an NSA honeypot, is no reason for them to avoid using it...
Umn. I guess it depends on if your freedom or life depend on it. I'd tend to be.... Risk-adverse. But that's just me.
They use CloudFlare only for the website to warn LEA etc that the real mailserver is a Tor onion service, and to forget about trying to find it. CloudFlare plays no role in email handling. You're just spreading ignorant bullshit and FUD. You're being as pigheaded as Juan!
Rr
"The contrail is gone entirely from the sky. Pirate’s sweat lies on his skin almost as cold as ice. He takes some time lighting a cigarette. He won’t hear the thing come in. It travels faster than the speed of sound. The first news you get of it is the blast. Then, if you’re still around, you hear the sound of it coming in. What if it should hit exactly—ahh, no—for a split second you’d have to feel the very point, with the terrible mass above, strike the top of the skull..." ~Thomas Pynchon, Gravity's Rainbow
On 09/13/2016 12:33 AM, oshwm wrote:
Well obviously all I've said about Cloudflare is well documented
Yeah, but there's nothing there about Sigaint, is there?
but in terms of sigaint, its your choice but with the documented issues with Cloudflare then I would expect any org who is trying to provide protection against 'dragnet surveillance' would be morally and ethically opposed to services such as Clouflare, wouldn't you?
You're as bad as Juan with the "morally and ethically" bit ;)
It's my impression that Sigaint is pretty neutral about moral and ethical issues. Yes, they provide protection against "dragnet surveillance". But the fact that CloudFlare is insecure, and may be an NSA honeypot, is no reason for them to avoid using it for posting a warning on their gateway IP. That warning is just for clueless mail admins and LEA. Their website is <http://sigaintevyh2rzvw.onion/>.
On 13 September 2016 07:26:26 GMT+01:00, Mirimir <mirimir@riseup.net> wrote:
The difference is you have the chinese knocking on your front door and are blocking them whereas you are willingly giving the secrets of your browsing across multiple sites to a single organisation whose CEO has links to the US DoD (arguably more damaging and interventionist
On 09/13/2016 12:18 AM, oshwm wrote: than the chinese).
You will then be profiled and your future actions predicted and even influenced in order to protect the interests of the US MIC. Nope, nothing to worry about from Cloudflare at all :D
My advice is: if an organsation touches Cloudflare then you shouldn't touch that organisation.
You're missing the fucking point!
Using Sigaint for email has nothing to do with CloudFlare. You can't even hit Sigaint webmail, except as a Tor onion service. CloudFlare doesn't proxy mailserver connections. It's just their fucking website.
Unless you have some actual evidence, you're just blowing smoke ;)
On 09/12/2016 11:24 PM, juan wrote: > On Mon, 12 Sep 2016 23:09:55 -0600 > Mirimir <mirimir@riseup.net> wrote: > > >> >>> Ddos attacks are exactly like terrorism. Carried by the same >>> people...at the Department of False Flags. >> >> It muct be nice to have such simple answers to everything ;) > > You really got me Mirimir. We should thank the US military for > cloudflare too. The internet really started to work a coupl of > years ago, thanks of course, to cloudflare.
Don't get me wrong. I hate CloudFlare. It's fucking stupid to break HTTPS security as MitM in order to protect clueless against DDoS. Clever adversaries can takeover sites if their interaction with CloudFlare isn't adequately secured. And I hate having to deal with their fucking CAPTCHAs when I'm using Tor.
But as much as I hate US military, I don't delude myself that
On 13 September 2016 06:31:37 GMT+01:00, Mirimir <mirimir@riseup.net> wrote: they're
the only assholes out there. Maybe the most resourceful assholes. And the most arrogant assholes. But far from the only ones. It's the fucking Chinese that seem to beat at every SSH server that I run :( But then you'll say that it's just americunts pretending to be Chinsese ;)
If the website is for LEA, why does it need to be protected from DDoS? If LEA dont get the message and they waste their time looking for a well hidden onion service, who cares? On 13 September 2016 19:14:19 GMT+01:00, Mirimir <mirimir@riseup.net> wrote:
On 09/13/2016 08:13 AM, Razer wrote:
On 09/13/2016 12:00 AM, Mirimir wrote:
But the fact that CloudFlare is insecure, and may be an NSA
honeypot,
is no reason for them to avoid using it...
Umn. I guess it depends on if your freedom or life depend on it. I'd tend to be.... Risk-adverse. But that's just me.
They use CloudFlare only for the website to warn LEA etc that the real mailserver is a Tor onion service, and to forget about trying to find it. CloudFlare plays no role in email handling. You're just spreading ignorant bullshit and FUD. You're being as pigheaded as Juan!
Rr
"The contrail is gone entirely from the sky. Pirate’s sweat lies on his skin almost as cold as ice. He takes some time lighting a cigarette. He won’t hear the thing come in. It travels faster than the speed of sound. The first news you get of it is the blast. Then, if you’re still around, you hear the sound of it coming in. What if it should hit exactly—ahh, no—for a split second you’d have to feel the very point, with the terrible mass above, strike the top of the skull..." ~Thomas Pynchon, Gravity's Rainbow
On 09/13/2016 12:33 AM, oshwm wrote:
Well obviously all I've said about Cloudflare is well documented
Yeah, but there's nothing there about Sigaint, is there?
but in terms of sigaint, its your choice but with the documented issues with Cloudflare then I would expect any org who is trying to provide protection against 'dragnet surveillance' would be morally and ethically opposed to services such as Clouflare, wouldn't you?
You're as bad as Juan with the "morally and ethically" bit ;)
It's my impression that Sigaint is pretty neutral about moral and ethical issues. Yes, they provide protection against "dragnet surveillance". But the fact that CloudFlare is insecure, and may be an NSA honeypot, is no reason for them to avoid using it for posting a warning on their gateway IP. That warning is just for clueless mail admins and LEA. Their website is <http://sigaintevyh2rzvw.onion/>.
The difference is you have the chinese knocking on your front door and are blocking them whereas you are willingly giving the secrets of your browsing across multiple sites to a single organisation whose CEO has links to the US DoD (arguably more damaging and interventionist
On 09/13/2016 12:18 AM, oshwm wrote: than the chinese).
You will then be profiled and your future actions predicted and even influenced in order to protect the interests of the US MIC. Nope, nothing to worry about from Cloudflare at all :D
My advice is: if an organsation touches Cloudflare then you shouldn't touch that organisation.
You're missing the fucking point!
Using Sigaint for email has nothing to do with CloudFlare. You can't even hit Sigaint webmail, except as a Tor onion service. CloudFlare doesn't proxy mailserver connections. It's just their fucking website.
Unless you have some actual evidence, you're just blowing smoke ;)
On 13 September 2016 06:31:37 GMT+01:00, Mirimir <mirimir@riseup.net> wrote: > On 09/12/2016 11:24 PM, juan wrote: >> On Mon, 12 Sep 2016 23:09:55 -0600 >> Mirimir <mirimir@riseup.net> wrote: >> >> >>> >>>> Ddos attacks are exactly like terrorism. Carried by the same >>>> people...at the Department of False Flags. >>> >>> It muct be nice to have such simple answers to everything ;) >> >> You really got me Mirimir. We should thank the US military for >> cloudflare too. The internet really started to work a coupl of >> years ago, thanks of course, to cloudflare. > > Don't get me wrong. I hate CloudFlare. It's fucking stupid to break > HTTPS security as MitM in order to protect clueless against DDoS. > Clever > adversaries can takeover sites if their interaction with CloudFlare > isn't adequately secured. And I hate having to deal with their fucking > CAPTCHAs when I'm using Tor. > > But as much as I hate US military, I don't delude myself that they're > the only assholes out there. Maybe the most resourceful assholes. And > the most arrogant assholes. But far from the only ones. It's the > fucking > Chinese that seem to beat at every SSH server that I run :( But
On 13 September 2016 07:26:26 GMT+01:00, Mirimir <mirimir@riseup.net> wrote: then
> you'll say that it's just americunts pretending to be Chinsese ;)
-- Sent from my Android device with K-9 Mail. Please excuse my brevity.
oshwm:
If the website is for LEA, why does it need to be protected from DDoS?
As you say, but they get to collect all data by running the 'service' Rr
If LEA dont get the message and they waste their time looking for a well hidden onion service, who cares?
On 13 September 2016 19:14:19 GMT+01:00, Mirimir <mirimir@riseup.net> wrote:
On 09/13/2016 08:13 AM, Razer wrote:
On 09/13/2016 12:00 AM, Mirimir wrote:
But the fact that CloudFlare is insecure, and may be an NSA
honeypot,
is no reason for them to avoid using it...
Umn. I guess it depends on if your freedom or life depend on it. I'd tend to be.... Risk-adverse. But that's just me.
They use CloudFlare only for the website to warn LEA etc that the real mailserver is a Tor onion service, and to forget about trying to find it. CloudFlare plays no role in email handling. You're just spreading ignorant bullshit and FUD. You're being as pigheaded as Juan!
Rr
"The contrail is gone entirely from the sky. Pirate’s sweat lies on his skin almost as cold as ice. He takes some time lighting a cigarette. He won’t hear the thing come in. It travels faster than the speed of sound. The first news you get of it is the blast. Then, if you’re still around, you hear the sound of it coming in. What if it should hit exactly—ahh, no—for a split second you’d have to feel the very point, with the terrible mass above, strike the top of the skull..." ~Thomas Pynchon, Gravity's Rainbow
On 09/13/2016 12:33 AM, oshwm wrote:
Well obviously all I've said about Cloudflare is well documented
Yeah, but there's nothing there about Sigaint, is there?
but in terms of sigaint, its your choice but with the documented issues with Cloudflare then I would expect any org who is trying to provide protection against 'dragnet surveillance' would be morally and ethically opposed to services such as Clouflare, wouldn't you?
You're as bad as Juan with the "morally and ethically" bit ;)
It's my impression that Sigaint is pretty neutral about moral and ethical issues. Yes, they provide protection against "dragnet surveillance". But the fact that CloudFlare is insecure, and may be an NSA honeypot, is no reason for them to avoid using it for posting a warning on their gateway IP. That warning is just for clueless mail admins and LEA. Their website is <http://sigaintevyh2rzvw.onion/>.
On 09/13/2016 12:18 AM, oshwm wrote: > The difference is you have the chinese knocking on your front door and are blocking them whereas you are willingly giving the secrets of your browsing across multiple sites to a single organisation whose CEO has links to the US DoD (arguably more damaging and interventionist than the chinese). > You will then be profiled and your future actions predicted and even influenced in order to protect the interests of the US MIC. > Nope, nothing to worry about from Cloudflare at all :D > > My advice is: if an organsation touches Cloudflare then you shouldn't touch that organisation.
You're missing the fucking point!
Using Sigaint for email has nothing to do with CloudFlare. You can't even hit Sigaint webmail, except as a Tor onion service. CloudFlare doesn't proxy mailserver connections. It's just their fucking website.
Unless you have some actual evidence, you're just blowing smoke ;)
> On 13 September 2016 06:31:37 GMT+01:00, Mirimir <mirimir@riseup.net> wrote: >> On 09/12/2016 11:24 PM, juan wrote: >>> On Mon, 12 Sep 2016 23:09:55 -0600 >>> Mirimir <mirimir@riseup.net> wrote: >>> >>> >>>> >>>>> Ddos attacks are exactly like terrorism. Carried by the same >>>>> people...at the Department of False Flags. >>>> >>>> It muct be nice to have such simple answers to everything ;) >>> >>> You really got me Mirimir. We should thank the US military for >>> cloudflare too. The internet really started to work a coupl of >>> years ago, thanks of course, to cloudflare. >> >> Don't get me wrong. I hate CloudFlare. It's fucking stupid to break >> HTTPS security as MitM in order to protect clueless against DDoS. >> Clever >> adversaries can takeover sites if their interaction with CloudFlare >> isn't adequately secured. And I hate having to deal with their fucking >> CAPTCHAs when I'm using Tor. >> >> But as much as I hate US military, I don't delude myself that they're >> the only assholes out there. Maybe the most resourceful assholes. And >> the most arrogant assholes. But far from the only ones. It's the >> fucking >> Chinese that seem to beat at every SSH server that I run :( But
On 13 September 2016 07:26:26 GMT+01:00, Mirimir <mirimir@riseup.net> wrote: then
>> you'll say that it's just americunts pretending to be Chinsese ;) >
-- RR "You might want to ask an expert about that - I just fiddled around with mine until it worked..."
Tor onion service
so swine-pig regular reader
stop abusing ppl an urself juan mr usa troll dont wanna dox the speech in onion u do so have lotsa oinky love juan, for people and ms. piggies everywhere oh and zeeeeeeeeeeeeennnnaaaaaaaaaaannnnnnnnnnnnnnnn u putin cock spooge droolin spacewasting alphasupportin follower u, go join a hippy movement or soemthin
ignorant bullshit pigheaded You're full of shit, bro. But it's goooood shit.
pigshit be upon u all shitposters headz, bullshit on tor inc sjw hoes, and methane in me tanks niggas
On 09/12/2016 11:26 PM, Mirimir wrote:
On 09/13/2016 12:18 AM, oshwm wrote:
The difference is you have the chinese knocking on your front door and are blocking them whereas you are willingly giving the secrets of your browsing across multiple sites to a single organisation whose CEO has links to the US DoD (arguably more damaging and interventionist than the chinese). You will then be profiled and your future actions predicted and even influenced in order to protect the interests of the US MIC. Nope, nothing to worry about from Cloudflare at all :D
My advice is: if an organsation touches Cloudflare then you shouldn't touch that organisation.
You're missing the fucking point!
Using Sigaint for email has nothing to do with CloudFlare. You can't even hit Sigaint webmail, except as a Tor onion service. CloudFlare doesn't proxy mailserver connections. It's just their fucking website.
Unless you have some actual evidence, you're just blowing smoke ;)
What if I told you... They might direct you to the fed's exit nodes. Further, you have no control whatsoever over the routing of emails sent from SigAint. As far as blowing smoke, they don't let you smoke in Federal prisons anymore. As was rehashed in the Tor discussions over and over and over again, would you depend in it (Tor or 'TorFlare') if your freedom or life depended on it? I always said 'Tor gives you the time to send your shit and gtfo of the wireless cafe and that's about it'. If it's 'TorFlare', they'll catch you 'on the way out the door'. Rr "You hide. They seek" ~Proverbs for Paranoids, Thomas Pynchon, Gravity's Rainbow Available in full @ Google Books: https://books.google.com/books/about/Gravity_s_Rainbow.html?id=GGPm4I3BbxAC&printsec=frontcover&source=kp_read_button&hl=en#v=onepage&q&f=false
On 13 September 2016 06:31:37 GMT+01:00, Mirimir <mirimir@riseup.net> wrote:
On 09/12/2016 11:24 PM, juan wrote:
On Mon, 12 Sep 2016 23:09:55 -0600 Mirimir <mirimir@riseup.net> wrote:
Ddos attacks are exactly like terrorism. Carried by the same people...at the Department of False Flags.
It muct be nice to have such simple answers to everything ;)
You really got me Mirimir. We should thank the US military for cloudflare too. The internet really started to work a coupl of years ago, thanks of course, to cloudflare.
Don't get me wrong. I hate CloudFlare. It's fucking stupid to break HTTPS security as MitM in order to protect clueless against DDoS. Clever adversaries can takeover sites if their interaction with CloudFlare isn't adequately secured. And I hate having to deal with their fucking CAPTCHAs when I'm using Tor.
But as much as I hate US military, I don't delude myself that they're the only assholes out there. Maybe the most resourceful assholes. And the most arrogant assholes. But far from the only ones. It's the fucking Chinese that seem to beat at every SSH server that I run :( But then you'll say that it's just americunts pretending to be Chinsese ;)
On 09/13/2016 08:00 AM, Razer wrote:
On 09/12/2016 11:26 PM, Mirimir wrote:
On 09/13/2016 12:18 AM, oshwm wrote:
The difference is you have the chinese knocking on your front door and are blocking them whereas you are willingly giving the secrets of your browsing across multiple sites to a single organisation whose CEO has links to the US DoD (arguably more damaging and interventionist than the chinese). You will then be profiled and your future actions predicted and even influenced in order to protect the interests of the US MIC. Nope, nothing to worry about from Cloudflare at all :D
My advice is: if an organsation touches Cloudflare then you shouldn't touch that organisation.
You're missing the fucking point!
Using Sigaint for email has nothing to do with CloudFlare. You can't even hit Sigaint webmail, except as a Tor onion service. CloudFlare doesn't proxy mailserver connections. It's just their fucking website.
Unless you have some actual evidence, you're just blowing smoke ;)
What if I told you... They might direct you to the fed's exit nodes.
Dude, you're just bullshitting. There are no exit nodes in onion service connections. There are two Tor circuits, one specified and built by the user, and the other specified and built by the onion service, and they meet at the rendezvous point. Who do you think is influencing that, and how? Are you accusing Sigaint of being compromised, or just ragging on them because they use CloulFlare? In order for Sigaint to exchange messages with clearnet mailservers, they must have gateways. And those gateways are obviously points of attack. But I pretty fucking sure that Sigaint uses transport security with clearnet mailservers. And everything ought to be GnuPG encrypted, so I don't particularly care how mail from Sigaint gets routed out in clearnet. Important stuff should never leave onionland, anyway :)
Further, you have no control whatsoever over the routing of emails sent from SigAint.
It doesn't matter much.
As far as blowing smoke, they don't let you smoke in Federal prisons anymore. As was rehashed in the Tor discussions over and over and over again, would you depend in it (Tor or 'TorFlare') if your freedom or life depended on it? I always said 'Tor gives you the time to send your shit and gtfo of the wireless cafe and that's about it'. If it's 'TorFlare', they'll catch you 'on the way out the door'.
You're full of shit, bro.
Rr "You hide. They seek" ~Proverbs for Paranoids, Thomas Pynchon, Gravity's Rainbow
Available in full @ Google Books: https://books.google.com/books/about/Gravity_s_Rainbow.html?id=GGPm4I3BbxAC&printsec=frontcover&source=kp_read_button&hl=en#v=onepage&q&f=false
On 13 September 2016 06:31:37 GMT+01:00, Mirimir <mirimir@riseup.net> wrote:
On 09/12/2016 11:24 PM, juan wrote:
On Mon, 12 Sep 2016 23:09:55 -0600 Mirimir <mirimir@riseup.net> wrote:
> Ddos attacks are exactly like terrorism. Carried by the same > people...at the Department of False Flags.
It muct be nice to have such simple answers to everything ;)
You really got me Mirimir. We should thank the US military for cloudflare too. The internet really started to work a coupl of years ago, thanks of course, to cloudflare.
Don't get me wrong. I hate CloudFlare. It's fucking stupid to break HTTPS security as MitM in order to protect clueless against DDoS. Clever adversaries can takeover sites if their interaction with CloudFlare isn't adequately secured. And I hate having to deal with their fucking CAPTCHAs when I'm using Tor.
But as much as I hate US military, I don't delude myself that they're the only assholes out there. Maybe the most resourceful assholes. And the most arrogant assholes. But far from the only ones. It's the fucking Chinese that seem to beat at every SSH server that I run :( But then you'll say that it's just americunts pretending to be Chinsese ;)
On 09/13/2016 08:53 AM, Mirimir wrote:
On 09/13/2016 08:00 AM, Razer wrote:
On 09/12/2016 11:26 PM, Mirimir wrote:
On 09/13/2016 12:18 AM, oshwm wrote:
The difference is you have the chinese knocking on your front door and are blocking them whereas you are willingly giving the secrets of your browsing across multiple sites to a single organisation whose CEO has links to the US DoD (arguably more damaging and interventionist than the chinese). You will then be profiled and your future actions predicted and even influenced in order to protect the interests of the US MIC. Nope, nothing to worry about from Cloudflare at all :D
My advice is: if an organsation touches Cloudflare then you shouldn't touch that organisation.
You're missing the fucking point!
Using Sigaint for email has nothing to do with CloudFlare. You can't even hit Sigaint webmail, except as a Tor onion service. CloudFlare doesn't proxy mailserver connections. It's just their fucking website.
Unless you have some actual evidence, you're just blowing smoke ;)
What if I told you... They might direct you to the fed's exit nodes.
Dude, you're just bullshitting. There are no exit nodes in onion service connections. There are two Tor circuits, one specified and built by the user, and the other specified and built by the onion service, and they meet at the rendezvous point. Who do you think is influencing that, and how? Are you accusing Sigaint of being compromised, or just ragging on them because they use CloulFlare?
In order for Sigaint to exchange messages with clearnet mailservers, they must have gateways. And those gateways are obviously points of attack. But I pretty fucking sure that Sigaint uses transport security with clearnet mailservers. And everything ought to be GnuPG encrypted, so I don't particularly care how mail from Sigaint gets routed out in clearnet. Important stuff should never leave onionland, anyway :)
...and some journalist or NoDAPL activist knows this right? I'm going to say it again. Tor is barely passable if you're going to risk your freedom or life. Throw cloudflare anywhere in that mix and it's no longer even passable. I'd trust twitter DM before I'd trust Cloudflare. At least they demand a court order and resist orders they think are bogus. Cloudflare... HAve they ever publicly stated any info regarding court orders? I'm not seeing it. But you never know it until you're in prison or dead, and you'd STILL never find out about it. In court discovery motions the prosecutor would claim their source is DHS-affiliated and to name it would cause problems catching terrorists or some other bullshit, and a judge WILL buy that. Why not just let the DHS handle your tormail for you? That's what you're doing, and yes I am ABSOLUTELY ragging on Cloudflare and the scumbucket who operates it. He's the feds BFF and has been for a long time and I WOULD NEVER trust any secure communications to his company. Rr Ps. Don't trust anybody if YOUR life and freedom depend on it.
Further, you have no control whatsoever over the routing of emails sent from SigAint.
It doesn't matter much.
As far as blowing smoke, they don't let you smoke in Federal prisons anymore. As was rehashed in the Tor discussions over and over and over again, would you depend in it (Tor or 'TorFlare') if your freedom or life depended on it? I always said 'Tor gives you the time to send your shit and gtfo of the wireless cafe and that's about it'. If it's 'TorFlare', they'll catch you 'on the way out the door'.
You're full of shit, bro.
Rr "You hide. They seek" ~Proverbs for Paranoids, Thomas Pynchon, Gravity's Rainbow
Available in full @ Google Books: https://books.google.com/books/about/Gravity_s_Rainbow.html?id=GGPm4I3BbxAC&printsec=frontcover&source=kp_read_button&hl=en#v=onepage&q&f=false
On 13 September 2016 06:31:37 GMT+01:00, Mirimir <mirimir@riseup.net> wrote:
On 09/12/2016 11:24 PM, juan wrote:
On Mon, 12 Sep 2016 23:09:55 -0600 Mirimir <mirimir@riseup.net> wrote:
> >> Ddos attacks are exactly like terrorism. Carried by the same >> people...at the Department of False Flags. > > It muct be nice to have such simple answers to everything ;)
You really got me Mirimir. We should thank the US military for cloudflare too. The internet really started to work a coupl of years ago, thanks of course, to cloudflare.
Don't get me wrong. I hate CloudFlare. It's fucking stupid to break HTTPS security as MitM in order to protect clueless against DDoS. Clever adversaries can takeover sites if their interaction with CloudFlare isn't adequately secured. And I hate having to deal with their fucking CAPTCHAs when I'm using Tor.
But as much as I hate US military, I don't delude myself that they're the only assholes out there. Maybe the most resourceful assholes. And the most arrogant assholes. But far from the only ones. It's the fucking Chinese that seem to beat at every SSH server that I run :( But then you'll say that it's just americunts pretending to be Chinsese ;)
On 09/13/2016 10:22 AM, Razer wrote:
On 09/13/2016 08:53 AM, Mirimir wrote:
On 09/13/2016 08:00 AM, Razer wrote:
On 09/12/2016 11:26 PM, Mirimir wrote:
On 09/13/2016 12:18 AM, oshwm wrote:
The difference is you have the chinese knocking on your front door and are blocking them whereas you are willingly giving the secrets of your browsing across multiple sites to a single organisation whose CEO has links to the US DoD (arguably more damaging and interventionist than the chinese). You will then be profiled and your future actions predicted and even influenced in order to protect the interests of the US MIC. Nope, nothing to worry about from Cloudflare at all :D
My advice is: if an organsation touches Cloudflare then you shouldn't touch that organisation.
You're missing the fucking point!
Using Sigaint for email has nothing to do with CloudFlare. You can't even hit Sigaint webmail, except as a Tor onion service. CloudFlare doesn't proxy mailserver connections. It's just their fucking website.
Unless you have some actual evidence, you're just blowing smoke ;)
What if I told you... They might direct you to the fed's exit nodes.
Dude, you're just bullshitting. There are no exit nodes in onion service connections. There are two Tor circuits, one specified and built by the user, and the other specified and built by the onion service, and they meet at the rendezvous point. Who do you think is influencing that, and how? Are you accusing Sigaint of being compromised, or just ragging on them because they use CloulFlare?
In order for Sigaint to exchange messages with clearnet mailservers, they must have gateways. And those gateways are obviously points of attack. But I pretty fucking sure that Sigaint uses transport security with clearnet mailservers. And everything ought to be GnuPG encrypted, so I don't particularly care how mail from Sigaint gets routed out in clearnet. Important stuff should never leave onionland, anyway :)
...and some journalist or NoDAPL activist knows this right?
They fucking ought to!
I'm going to say it again. Tor is barely passable if you're going to risk your freedom or life. Throw cloudflare anywhere in that mix and it's no longer even passable. I'd trust twitter DM before I'd trust Cloudflare. At least they demand a court order and resist orders they think are bogus. Cloudflare... HAve they ever publicly stated any info regarding court orders? I'm not seeing it.
Forget about CloudFlare. They don't play any substantive role in Sigaint. You're just making one of those emotional arguments, based on nothing but superficial associations and scare tactics. Without any substantial understanding of the situation. Can't you do better?
But you never know it until you're in prison or dead, and you'd STILL never find out about it. In court discovery motions the prosecutor would claim their source is DHS-affiliated and to name it would cause problems catching terrorists or some other bullshit, and a judge WILL buy that.
But dude, that's all about CloudFlare. Nothing to do with Sigaint.
Why not just let the DHS handle your tormail for you? That's what you're doing, and yes I am ABSOLUTELY ragging on Cloudflare and the scumbucket who operates it. He's the feds BFF and has been for a long time and I WOULD NEVER trust any secure communications to his company.
So rag on CloudFlare all you want. Just stop spreading ignorant FUD about Sigaint!
Rr
Ps. Don't trust anybody if YOUR life and freedom depend on it.
Further, you have no control whatsoever over the routing of emails sent from SigAint.
It doesn't matter much.
As far as blowing smoke, they don't let you smoke in Federal prisons anymore. As was rehashed in the Tor discussions over and over and over again, would you depend in it (Tor or 'TorFlare') if your freedom or life depended on it? I always said 'Tor gives you the time to send your shit and gtfo of the wireless cafe and that's about it'. If it's 'TorFlare', they'll catch you 'on the way out the door'.
You're full of shit, bro.
Rr "You hide. They seek" ~Proverbs for Paranoids, Thomas Pynchon, Gravity's Rainbow
Available in full @ Google Books: https://books.google.com/books/about/Gravity_s_Rainbow.html?id=GGPm4I3BbxAC&printsec=frontcover&source=kp_read_button&hl=en#v=onepage&q&f=false
On 13 September 2016 06:31:37 GMT+01:00, Mirimir <mirimir@riseup.net> wrote:
On 09/12/2016 11:24 PM, juan wrote: > On Mon, 12 Sep 2016 23:09:55 -0600 > Mirimir <mirimir@riseup.net> wrote: > > >> >>> Ddos attacks are exactly like terrorism. Carried by the same >>> people...at the Department of False Flags. >> >> It muct be nice to have such simple answers to everything ;) > > You really got me Mirimir. We should thank the US military for > cloudflare too. The internet really started to work a coupl of > years ago, thanks of course, to cloudflare.
Don't get me wrong. I hate CloudFlare. It's fucking stupid to break HTTPS security as MitM in order to protect clueless against DDoS. Clever adversaries can takeover sites if their interaction with CloudFlare isn't adequately secured. And I hate having to deal with their fucking CAPTCHAs when I'm using Tor.
But as much as I hate US military, I don't delude myself that they're the only assholes out there. Maybe the most resourceful assholes. And the most arrogant assholes. But far from the only ones. It's the fucking Chinese that seem to beat at every SSH server that I run :( But then you'll say that it's just americunts pretending to be Chinsese ;)
You seem very emotionally attached to sigaint. As for your comments earlier with regards to morals and ethics, if you provide an anti surveillance service then you'd expect a trustworthy service to take a very anti-surveillance stance and refuse to deal with corps that are part of the surveillance machine. It is the very basis of who sigaint is and yet they seem happy to be associated with Cloudflare, raises questions in my mind about who they really work for or how much they care about those they are supposed to serve. On 13 September 2016 19:09:16 GMT+01:00, Mirimir <mirimir@riseup.net> wrote:
On 09/13/2016 10:22 AM, Razer wrote:
On 09/13/2016 08:53 AM, Mirimir wrote:
On 09/13/2016 08:00 AM, Razer wrote:
On 09/12/2016 11:26 PM, Mirimir wrote:
On 09/13/2016 12:18 AM, oshwm wrote:
The difference is you have the chinese knocking on your front
You will then be profiled and your future actions predicted and even influenced in order to protect the interests of the US MIC. Nope, nothing to worry about from Cloudflare at all :D
My advice is: if an organsation touches Cloudflare then you shouldn't touch that organisation.
You're missing the fucking point!
Using Sigaint for email has nothing to do with CloudFlare. You can't even hit Sigaint webmail, except as a Tor onion service. CloudFlare doesn't proxy mailserver connections. It's just their fucking website.
Unless you have some actual evidence, you're just blowing smoke ;)
What if I told you... They might direct you to the fed's exit nodes.
Dude, you're just bullshitting. There are no exit nodes in onion service connections. There are two Tor circuits, one specified and built by
user, and the other specified and built by the onion service, and
door and are blocking them whereas you are willingly giving the secrets of your browsing across multiple sites to a single organisation whose CEO has links to the US DoD (arguably more damaging and interventionist than the chinese). the they
meet at the rendezvous point. Who do you think is influencing that, and how? Are you accusing Sigaint of being compromised, or just ragging on them because they use CloulFlare?
In order for Sigaint to exchange messages with clearnet mailservers, they must have gateways. And those gateways are obviously points of attack. But I pretty fucking sure that Sigaint uses transport security with clearnet mailservers. And everything ought to be GnuPG encrypted, so I don't particularly care how mail from Sigaint gets routed out in clearnet. Important stuff should never leave onionland, anyway :)
...and some journalist or NoDAPL activist knows this right?
They fucking ought to!
I'm going to say it again. Tor is barely passable if you're going to risk your freedom or life. Throw cloudflare anywhere in that mix and it's no longer even passable. I'd trust twitter DM before I'd trust Cloudflare. At least they demand a court order and resist orders they think are bogus. Cloudflare... HAve they ever publicly stated any info regarding court orders? I'm not seeing it.
Forget about CloudFlare. They don't play any substantive role in Sigaint. You're just making one of those emotional arguments, based on nothing but superficial associations and scare tactics. Without any substantial understanding of the situation. Can't you do better?
But you never know it until you're in prison or dead, and you'd STILL never find out about it. In court discovery motions the prosecutor would claim their source is DHS-affiliated and to name it would cause problems catching terrorists or some other bullshit, and a judge WILL buy that.
But dude, that's all about CloudFlare. Nothing to do with Sigaint.
Why not just let the DHS handle your tormail for you? That's what you're doing, and yes I am ABSOLUTELY ragging on Cloudflare and the scumbucket who operates it. He's the feds BFF and has been for a long time and I WOULD NEVER trust any secure communications to his company.
So rag on CloudFlare all you want. Just stop spreading ignorant FUD about Sigaint!
Rr
Ps. Don't trust anybody if YOUR life and freedom depend on it.
Further, you have no control whatsoever over the routing of emails
from SigAint.
It doesn't matter much.
As far as blowing smoke, they don't let you smoke in Federal
anymore. As was rehashed in the Tor discussions over and over and over again, would you depend in it (Tor or 'TorFlare') if your freedom or life depended on it? I always said 'Tor gives you the time to send your shit and gtfo of the wireless cafe and that's about it'. If it's 'TorFlare', they'll catch you 'on the way out the door'.
You're full of shit, bro.
Rr "You hide. They seek" ~Proverbs for Paranoids, Thomas Pynchon, Gravity's Rainbow
Available in full @ Google Books:
On 13 September 2016 06:31:37 GMT+01:00, Mirimir
<mirimir@riseup.net> wrote:
> On 09/12/2016 11:24 PM, juan wrote: >> On Mon, 12 Sep 2016 23:09:55 -0600 >> Mirimir <mirimir@riseup.net> wrote: >> >> >>> >>>> Ddos attacks are exactly like terrorism. Carried by the same >>>> people...at the Department of False Flags. >>> >>> It muct be nice to have such simple answers to everything ;) >> >> You really got me Mirimir. We should thank the US military for >> cloudflare too. The internet really started to work a coupl of >> years ago, thanks of course, to cloudflare. > > Don't get me wrong. I hate CloudFlare. It's fucking stupid to break > HTTPS security as MitM in order to protect clueless against DDoS. > Clever > adversaries can takeover sites if their interaction with CloudFlare > isn't adequately secured. And I hate having to deal with their fucking > CAPTCHAs when I'm using Tor. > > But as much as I hate US military, I don't delude myself that
> the only assholes out there. Maybe the most resourceful assholes. And > the most arrogant assholes. But far from the only ones. It's the > fucking > Chinese that seem to beat at every SSH server that I run :( But
sent prisons they're then
> you'll say that it's just americunts pretending to be Chinsese ;)
-- Sent from my Android device with K-9 Mail. Please excuse my brevity.
On Tue, Sep 13, 2016 at 2:26 PM, oshwm <oshwm@openmailbox.org> wrote:
As for your comments earlier with regards to morals and ethics, if you provide an anti surveillance service then you'd expect a trustworthy service to take a very anti-surveillance stance and refuse to deal with corps that are part of the surveillance machine. It is the very basis of who sigaint is and yet they seem happy to be associated with Cloudflare, raises questions in my mind about who they really work for or how much they care about those they are supposed to serve.
This. Sigaint *chose* to put up CF, which is weird as above. You could also roast them on offering webmail too. But as usual, that's just the surface level in this game. Also note cypherpunk Lackey was employed by cloudflare. In addition to CIA guy mentioned earlier. More realistically, if donations aren't covering attack bandwidth, hoster is getting pissed, and it's a lame clearnet static infopage, I'd probably CF the fucker too. CF's friends already tap it in other ways so no loss there.
One could also find it weird no one's filed or won a contact argument with registry PIR / Afilias / ICANN / etc. Etiher because it's pointless to file and takedown the front, or someone's protecting them. Why worry about the game, when you can play it ;)
On 09/13/2016 05:40 PM, grarpamp wrote:
On Tue, Sep 13, 2016 at 2:26 PM, oshwm <oshwm@openmailbox.org> wrote:
As for your comments earlier with regards to morals and ethics, if you provide an anti surveillance service then you'd expect a trustworthy service to take a very anti-surveillance stance and refuse to deal with corps that are part of the surveillance machine. It is the very basis of who sigaint is and yet they seem happy to be associated with Cloudflare, raises questions in my mind about who they really work for or how much they care about those they are supposed to serve.
This. Sigaint *chose* to put up CF, which is weird as above. You could also roast them on offering webmail too. But as usual, that's just the surface level in this game. Also note cypherpunk Lackey was employed by cloudflare. In addition to CIA guy mentioned earlier.
It is strange that they're using CloudFlare for their "Sigaint ain't here, it's at http://sigaintevyh2rzvw.onion/" page. I strongly suspect that they did that because 1) if the page wasn't protected against DDoS, it wouldn't be reachable, and 2) it would have cost a lot more to host, and 3) they didn't want to setup their own anti-DDoS protection, which would have cost a fuckload more.
More realistically, if donations aren't covering attack bandwidth, hoster is getting pissed, and it's a lame clearnet static infopage, I'd probably CF the fucker too. CF's friends already tap it in other ways so no loss there.
Yes! Just about the only coherent response to this subthread! Maybe they are spending too much of their (likely considerable) onion web portal ad income on weed, whiskey, blow and hoes :) But just look at headers for messages from <timmay@sigaint.org>. It goes from sigaintevyh2rzvw.onion [127.0.0.1] to mx2.sigaint.org [62.113.238.120] using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits). Then it hits mail.pglaf.org [65.50.255.19]. And mx2.sigaint.org isn't hosted by CloudFlare, but rather by QHoster, in Germany. Qhoster does have their website behind CloudFlare, I admit. But I suspect that it's a challenge for Sigaint to host it's clearnet gateway, and so they take what they can get. So anyway, I'm not greatly worried. As I said, Sigaint is most secure within onionland. And they peer with several other mailservers there. But they're one of the few with a reliable clearnet gateway, which is useful when you need it.
On Tue, 13 Sep 2016 19:50:44 -0600 Mirimir <mirimir@riseup.net> wrote:
And mx2.sigaint.org isn't hosted by CloudFlare, but rather by QHoster, in Germany. Qhoster does have their website behind CloudFlare, I admit.
uh oh
But I suspect that it's a challenge for Sigaint to host it's clearnet gateway, and so they take what they can get.
typical evasive bullshit
So anyway, I'm not greatly worried. As I said, Sigaint is most secure within onionland.
more bullshit
And they peer with several other mailservers there. But they're one of the few with a reliable clearnet gateway,
a cloudflare 'protected' gateway?
which is useful when you need it.
On Tue, Sep 13, 2016 at 11:31:12PM -0300, juan wrote:
On Tue, 13 Sep 2016 19:50:44 -0600 Mirimir <mirimir@riseup.net> wrote:
And mx2.sigaint.org isn't hosted by CloudFlare, but rather by QHoster, in Germany. Qhoster does have their website behind CloudFlare, I admit.
uh oh
But I suspect that it's a challenge for Sigaint to host it's clearnet gateway, and so they take what they can get.
typical evasive bullshit
So anyway, I'm not greatly worried. As I said, Sigaint is most secure within onionland.
more bullshit
And they peer with several other mailservers there. But they're one of the few with a reliable clearnet gateway,
a cloudflare 'protected' gateway?
which is useful when you need it.
So, you're a waywards CIA troll tasked with having to pre-empt (catch, best as possible) the next Snowden or Manning. NSA's honeypot Tor collects most wanna be run of your mill leakers, only thing is they need person to person comms to get up to speed / hints / connections with drop boxes etc. They need (or are likely to use) email of some form. How besst to create a sexy honey pot smtpd with plausidly deniably attractive properties, to maximise end point correlation capability and pre-emption possibilities. Conversely, were some hippy freedom loving daisies ill save the world implement her smtpd daisy garden bed, what would her best practices be? IOW, can we state a set of presumed best practices by which we can 'judge' the flower pots? some random thoughts: - public not private, human ownership/ attribution - verifiers ("yeah I know him") - canary statements - "owner" "controller" "all employees" - use of no known CIA/NSA/USA etc assets (e.g. CloudFlare) - admittedly, avoiding Tor might be a challenge for a while at least - obvious technical foundations (e.g. no user keys stored on server) - ?
On 09/13/2016 11:09 AM, Mirimir wrote:
On 09/13/2016 10:22 AM, Razer wrote:
On 09/13/2016 08:53 AM, Mirimir wrote:
On 09/13/2016 08:00 AM, Razer wrote:
On 09/12/2016 11:26 PM, Mirimir wrote:
On 09/13/2016 12:18 AM, oshwm wrote:
The difference is you have the chinese knocking on your front door and are blocking them whereas you are willingly giving the secrets of your browsing across multiple sites to a single organisation whose CEO has links to the US DoD (arguably more damaging and interventionist than the chinese). You will then be profiled and your future actions predicted and even influenced in order to protect the interests of the US MIC. Nope, nothing to worry about from Cloudflare at all :D
My advice is: if an organsation touches Cloudflare then you shouldn't touch that organisation.
You're missing the fucking point!
Using Sigaint for email has nothing to do with CloudFlare. You can't even hit Sigaint webmail, except as a Tor onion service. CloudFlare doesn't proxy mailserver connections. It's just their fucking website.
Unless you have some actual evidence, you're just blowing smoke ;)
What if I told you... They might direct you to the fed's exit nodes.
Dude, you're just bullshitting. There are no exit nodes in onion service connections. There are two Tor circuits, one specified and built by the user, and the other specified and built by the onion service, and they meet at the rendezvous point. Who do you think is influencing that, and how? Are you accusing Sigaint of being compromised, or just ragging on them because they use CloulFlare?
In order for Sigaint to exchange messages with clearnet mailservers, they must have gateways. And those gateways are obviously points of attack. But I pretty fucking sure that Sigaint uses transport security with clearnet mailservers. And everything ought to be GnuPG encrypted, so I don't particularly care how mail from Sigaint gets routed out in clearnet. Important stuff should never leave onionland, anyway :)
...and some journalist or NoDAPL activist knows this right?
They fucking ought to!
Well that'as a nice self-centered POV. But you're setting the bar sort of high for someone who might be a little non-technical, has never read the NON-EXISTENT man on PerSec-CyberSec, and just discovered something the nation or world needs to know. Like you're Hillary's doctor and you want to tell the world her pneumonia is really final stage AIDS or something. Is that doctor supposed to bone up on his cybersec first?
I'm going to say it again. Tor is barely passable if you're going to risk your freedom or life. Throw cloudflare anywhere in that mix and it's no longer even passable. I'd trust twitter DM before I'd trust Cloudflare. At least they demand a court order and resist orders they think are bogus. Cloudflare... HAve they ever publicly stated any info regarding court orders? I'm not seeing it.
Forget about CloudFlare. They don't play any substantive role in Sigaint. You're just making one of those emotional arguments, based on nothing but superficial associations and scare tactics. Without any substantial understanding of the situation. Can't you do better?
Should I forget about the DHS too? And the NSA too?
But you never know it until you're in prison or dead, and you'd STILL never find out about it. In court discovery motions the prosecutor would claim their source is DHS-affiliated and to name it would cause problems catching terrorists or some other bullshit, and a judge WILL buy that.
But dude, that's all about CloudFlare. Nothing to do with Sigaint.
As far as information available CLOUDFLARE OWNS SIGAINT! http://whois.domaintools.com/sigaint.org IP Address 104.28.0.41 - 307 other sites hosted on this server IP Location United States - Arizona - Phoenix - Cloudflare Inc. ASN United States AS13335 CLOUDFLARENET - CloudFlare, Inc., US (registered Jul 14, 2010) Domain Status Registered And Active Website Unless you can produce the actual registered owner of the site (and vet THEM too) the ONLY SAFE ASSUMPTION considering the whole of Sigaint is hosted ON Cloudflare servers is the site, the domain name, all of it, is owned by them. You're really really casual with other people's security know? Me? Not so much.
Why not just let the DHS handle your tormail for you? That's what you're doing, and yes I am ABSOLUTELY ragging on Cloudflare and the scumbucket who operates it. He's the feds BFF and has been for a long time and I WOULD NEVER trust any secure communications to his company.
So rag on CloudFlare all you want. Just stop spreading ignorant FUD about Sigaint!
Rr
Ps. Don't trust anybody if YOUR life and freedom depend on it.
Further, you have no control whatsoever over the routing of emails sent from SigAint.
It doesn't matter much.
As far as blowing smoke, they don't let you smoke in Federal prisons anymore. As was rehashed in the Tor discussions over and over and over again, would you depend in it (Tor or 'TorFlare') if your freedom or life depended on it? I always said 'Tor gives you the time to send your shit and gtfo of the wireless cafe and that's about it'. If it's 'TorFlare', they'll catch you 'on the way out the door'.
You're full of shit, bro.
But it's goooood shit.
Rr "You hide. They seek" ~Proverbs for Paranoids, Thomas Pynchon, Gravity's Rainbow
Available in full @ Google Books: https://books.google.com/books/about/Gravity_s_Rainbow.html?id=GGPm4I3BbxAC&printsec=frontcover&source=kp_read_button&hl=en#v=onepage&q&f=false
On 13 September 2016 06:31:37 GMT+01:00, Mirimir <mirimir@riseup.net> wrote: > On 09/12/2016 11:24 PM, juan wrote: >> On Mon, 12 Sep 2016 23:09:55 -0600 >> Mirimir <mirimir@riseup.net> wrote: >> >> >>> >>>> Ddos attacks are exactly like terrorism. Carried by the same >>>> people...at the Department of False Flags. >>> >>> It muct be nice to have such simple answers to everything ;) >> >> You really got me Mirimir. We should thank the US military for >> cloudflare too. The internet really started to work a coupl of >> years ago, thanks of course, to cloudflare. > > Don't get me wrong. I hate CloudFlare. It's fucking stupid to break > HTTPS security as MitM in order to protect clueless against DDoS. > Clever > adversaries can takeover sites if their interaction with CloudFlare > isn't adequately secured. And I hate having to deal with their fucking > CAPTCHAs when I'm using Tor. > > But as much as I hate US military, I don't delude myself that they're > the only assholes out there. Maybe the most resourceful assholes. And > the most arrogant assholes. But far from the only ones. It's the > fucking > Chinese that seem to beat at every SSH server that I run :( But then > you'll say that it's just americunts pretending to be Chinsese ;)
On Tue, Sep 13, 2016 at 2:32 PM, Razer <rayzer@riseup.net> wrote:
you're Hillary's doctor and you want to tell the world her pneumonia is really final stage AIDS
That would be an acceptable outcome, actually quite desireable. Care to wager on it?
On Tue, 13 Sep 2016 09:53:03 -0600 Mirimir <mirimir@riseup.net> wrote:
In order for Sigaint to exchange messages with clearnet mailservers, they must have gateways. And those gateways are obviously points of attack.
and the gateways are 'behind' cloudflare?
On 09/12/2016 10:31 PM, Mirimir wrote:
But then you'll say that it's just americunts pretending to be Chinsese
Your servers? Yes. Without intending any disrespect, WTF would the China want with your servers? Rr
On 09/12/2016 11:24 PM, juan wrote:
On Mon, 12 Sep 2016 23:09:55 -0600 Mirimir <mirimir@riseup.net> wrote:
Ddos attacks are exactly like terrorism. Carried by the same people...at the Department of False Flags.
It muct be nice to have such simple answers to everything ;)
You really got me Mirimir. We should thank the US military for cloudflare too. The internet really started to work a coupl of years ago, thanks of course, to cloudflare.
Don't get me wrong. I hate CloudFlare. It's fucking stupid to break HTTPS security as MitM in order to protect clueless against DDoS. Clever adversaries can takeover sites if their interaction with CloudFlare isn't adequately secured. And I hate having to deal with their fucking CAPTCHAs when I'm using Tor.
But as much as I hate US military, I don't delude myself that they're the only assholes out there. Maybe the most resourceful assholes. And the most arrogant assholes. But far from the only ones. It's the fucking Chinese that seem to beat at every SSH server that I run :( But then you'll say that it's just americunts pretending to be Chinsese ;)
On Mon, 12 Sep 2016 23:31:37 -0600 Mirimir <mirimir@riseup.net> wrote:
It's the fucking Chinese that seem to beat at every SSH server that I run :(
Go figure. So it just so happens that oceania is at war with eastasia? Or was it eurasia? And it also just so happens that schneie (who you said is a 'good guy'?) is parroting war propaganda about china?
But then you'll say that it's just americunts pretending to be Chinsese ;)
And you can't prove that's not the case?
On 09/15/2016 02:35 PM, juan wrote:
On Mon, 12 Sep 2016 23:31:37 -0600 Mirimir <mirimir@riseup.net> wrote:
It's the fucking Chinese that seem to beat at every SSH server that I run :(
Go figure. So it just so happens that oceania is at war with eastasia? Or was it eurasia?
All war, all the time :(
And it also just so happens that schneie (who you said is a 'good guy'?) is parroting war propaganda about china?
I made that comment before reading Schneier's piece. Is he a "good guy"? I have no clue. He's quite clever, for sure. Maybe he works for TLAs, and thinks it good. How would we know?
But then you'll say that it's just americunts pretending to be Chinsese ;)
And you can't prove that's not the case?
Nope, I can't. I just do whois on the IPs. Maybe whois is faked. Or maybe they're just leased anonymously.
On Thu, 15 Sep 2016 20:59:22 -0600 Mirimir <mirimir@riseup.net> wrote:
And it also just so happens that schneie (who you said is a 'good guy'?) is parroting war propaganda about china?
I made that comment before reading Schneier's piece. Is he a "good guy"? I have no clue. He's quite clever, for sure. Maybe he works for TLAs, and thinks it good. How would we know?
schneier is now a high ranking member of the tor mafia, that means he is a US military contractor. So he works for P - as Pentagon. M as in Military. It's also painfully obvious that schneier is a US proaganda bot. The articles in his blog are textbook examples of US terrorism. "we need more government to protect the internet" "israeli nazi 'security' wall is great" that kind of crass thing. Finally, my point was that your comment about china was oddly in sync with schneier's propaganda. just for fun, search, cloudflare site:schneier.com Is there anything interesting?
But then you'll say that it's just americunts pretending to be Chinsese ;)
And you can't prove that's not the case?
Nope, I can't. I just do whois on the IPs. Maybe whois is faked. Or maybe they're just leased anonymously.
On 09/16/2016 12:22 AM, juan wrote:
On Thu, 15 Sep 2016 20:59:22 -0600 Mirimir <mirimir@riseup.net> wrote:
And it also just so happens that schneie (who you said is a 'good guy'?) is parroting war propaganda about china?
I made that comment before reading Schneier's piece. Is he a "good guy"? I have no clue. He's quite clever, for sure. Maybe he works for TLAs, and thinks it good. How would we know?
schneier is now a high ranking member of the tor mafia, that means he is a US military contractor. So he works for P - as Pentagon. M as in Military.
It's also painfully obvious that schneier is a US proaganda bot. The articles in his blog are textbook examples of US terrorism. "we need more government to protect the internet" "israeli nazi 'security' wall is great" that kind of crass thing.
Finally, my point was that your comment about china was oddly in sync with schneier's propaganda.
just for fun, search, cloudflare site:schneier.com
Is there anything interesting?
He does seem pretty OK with CloudFlare :( I'm disappointed.
But then you'll say that it's just americunts pretending to be Chinsese ;)
And you can't prove that's not the case?
Nope, I can't. I just do whois on the IPs. Maybe whois is faked. Or maybe they're just leased anonymously.
On 09/15/2016 11:32 PM, Mirimir wrote:
On 09/16/2016 12:22 AM, juan wrote:
On Thu, 15 Sep 2016 20:59:22 -0600 Mirimir <mirimir@riseup.net> wrote:
And it also just so happens that schneie (who you said is a 'good guy'?) is parroting war propaganda about china?
I made that comment before reading Schneier's piece. Is he a "good guy"? I have no clue. He's quite clever, for sure. Maybe he works for TLAs, and thinks it good. How would we know?
schneier is now a high ranking member of the tor mafia, that means he is a US military contractor. So he works for P - as Pentagon. M as in Military.
It's also painfully obvious that schneier is a US proaganda bot. The articles in his blog are textbook examples of US terrorism. "we need more government to protect the internet" "israeli nazi 'security' wall is great" that kind of crass thing.
Finally, my point was that your comment about china was oddly in sync with schneier's propaganda.
just for fun, search, cloudflare site:schneier.com
Is there anything interesting?
He does seem pretty OK with CloudFlare :( I'm disappointed.
They offer free protection to small sites. That means hot-button activists, and that's what scares the crap out of me. If they want to tell the CIA all about DemocracyNow! I could give a fuck (less of a fuck anyway). But when I see them as intermediaries connecting to NoDAPL sites, FergusonAction blogs, BB's post-bust ProjectPM (Their CEO wouldn't admit it but I extrapolated from a short rather hostile 'interview' Yasha Levine arranged on Twitter that the owner of the server, not BB's people, oked that) I see an organization literally seeking documentation on local activists with no resources to protect themselves legally from federal persecution. Rr
But then you'll say that it's just americunts pretending to be Chinsese ;)
And you can't prove that's not the case?
Nope, I can't. I just do whois on the IPs. Maybe whois is faked. Or maybe they're just leased anonymously.
But then you'll say that it's just americunts pretending to be Chinsese ;)
And you can't prove that's not the case?
Nope, I can't. I just do whois on the IPs. Maybe whois is faked. Or maybe they're just leased anonymously.
I've seen more boxes in China that were *very* poorly secured than not (could be selection bias of course) so it's just as likely they're compromised boxes. In fact in the majority of cases it's probably more likely - China's a good place to originate from if your aim is to make it difficult for anyone in the Western World to trace a connection back to your real location - at least by legal methods. -- Ben Tasker https://www.bentasker.co.uk
On 09/16/2016 03:55 AM, Ben Tasker wrote:
But then you'll say that it's just americunts pretending to be Chinsese ;)
And you can't prove that's not the case?
Nope, I can't. I just do whois on the IPs. Maybe whois is faked. Or maybe they're just leased anonymously.
I've seen more boxes in China that were *very* poorly secured than not (could be selection bias of course) so it's just as likely they're compromised boxes. In fact in the majority of cases it's probably more likely - China's a good place to originate from if your aim is to make it difficult for anyone in the Western World to trace a connection back to your real location - at least by legal methods.
Or maybe they've been compromised, and _then_ leased anonymously ;) I've seen ads for "bulletproof" servers in China that make me wonder.
On 09/16/2016 02:55 AM, Ben Tasker wrote:
But then you'll say that it's just americunts pretending to be Chinsese ;)
And you can't prove that's not the case?
Nope, I can't. I just do whois on the IPs. Maybe whois is faked. Or maybe they're just leased anonymously.
I've seen more boxes in China that were /very/ poorly secured than not (could be selection bias of course) so it's just as likely they're compromised boxes. In fact in the majority of cases it's probably more likely - China's a good place to originate from if your aim is to make it difficult for anyone in the Western World to trace a connection back to your real location - at least by legal methods.
-- Ben Tasker https://www.bentasker.co.uk
When HideMyAss was still providing lists of free open proxies China was alway on that list, and lots of them. Rr
On Sep 16, 2016, at 11:17 AM, Razer <rayzer@riseup.net> wrote:
On 09/16/2016 02:55 AM, Ben Tasker wrote:
But then you'll say that it's just americunts pretending to be Chinsese ;)
And you can't prove that's not the case?
Nope, I can't. I just do whois on the IPs. Maybe whois is faked. Or maybe they're just leased anonymously.
I've seen more boxes in China that were /very/ poorly secured than not (could be selection bias of course) so it's just as likely they're compromised boxes. In fact in the majority of cases it's probably more likely - China's a good place to originate from if your aim is to make it difficult for anyone in the Western World to trace a connection back to your real location - at least by legal methods.
-- Ben Tasker https://www.bentasker.co.uk
When HideMyAss was still providing lists of free open proxies China was alway on that list, and lots of them.
Rr
My badhosts table (generated by fail2ban -> pf, listening on a few services, most bans are from ssh probes) is currently like 75% hosts out of South Brisbane, Australia. The rest are from all over - about 10% China, some Russia, Europe, America.... weird distribution. Lots of 222.0.0.0/8. John
On Fri, Sep 16, 2016 at 5:55 AM, Ben Tasker <ben@bentasker.co.uk> wrote:
I've seen more boxes in China that were very poorly secured than not
China's a good place to originate from if your aim is to make it difficult for anyone in the Western World to trace a connection back to your real location - at least by legal methods.
The NSA GPA likes to think it's operating legally, and due to secrecy and secret orders and cover and spin and expendables, powers don't give a fuck if it's not. If whitehat CERT like teams can track stuff on the surface, you can bet govt can do it in the deep. For all we know, all these China / Russia attacks are the NSA / CIA or simply US political parties and corporates cracking these boxes through nine proxies and taking a whack back at their opponents in the US. It's all a game, play on.
On 09/16/2016 11:56 AM, grarpamp wrote:
For all we know, all these China / Russia attacks are the NSA / CIA or simply US political parties and corporates cracking these boxes through nine proxies and taking a whack back at their opponents in the US.
This is my take. It makes the nation with the zombie computers look like a worthwhile enemy. Hence Russia is being bandied about and the no-proof-whatsoever bad guy. I want to add a lot of the spying Snowden exposed was INDUSTRIAL/INSTITUTIONAL. Imagine the advantage you would have if you had a hook on Germany's economy by playing with insider info on their markets? I say the info is being passed of to that conglomerate of corps dedicated to keeping the Internet as 'associates' of the US government, clean (I don't remember it's official name) and the whole thing about 'russian attacks' is a ruse to hide the fact the NSA is 'bouncing' off Chinese or Russian or... computers. Stealing US biz dox, and giving the dataz to their corporate bffs to profit from. Just like a mafia. Because corporatist governments ARE mafias. That's my flier, and I'm sticking to it. :> Rr
On Fri, Sep 16, 2016 at 5:55 AM, Ben Tasker <ben@bentasker.co.uk> wrote:
I've seen more boxes in China that were very poorly secured than not
China's a good place to originate from if your aim is to make it difficult for anyone in the Western World to trace a connection back to your real location - at least by legal methods.
The NSA GPA likes to think it's operating legally, and due to secrecy and secret orders and cover and spin and expendables, powers don't give a fuck if it's not. If whitehat CERT like teams can track stuff on the surface, you can bet govt can do it in the deep.
For all we know, all these China / Russia attacks are the NSA / CIA or simply US political parties and corporates cracking these boxes through nine proxies and taking a whack back at their opponents in the US.
It's all a game, play on.
On 09/16/2016 06:28 PM, Razer wrote:
On 09/16/2016 11:56 AM, grarpamp wrote:
For all we know, all these China / Russia attacks are the NSA / CIA or simply US political parties and corporates cracking these boxes through nine proxies and taking a whack back at their opponents in the US.
This is my take. It makes the nation with the zombie computers look like a worthwhile enemy. Hence Russia is being bandied about and the no-proof-whatsoever bad guy.
I want to add a lot of the spying Snowden exposed was INDUSTRIAL/INSTITUTIONAL. Imagine the advantage you would have if you had a hook on Germany's economy by playing with insider info on their markets?
I say the info is being passed of to that conglomerate of corps dedicated to keeping the Internet as 'associates' of the US government, clean (I don't remember it's official name) and the whole thing about 'russian attacks' is a ruse to hide the fact the NSA is 'bouncing' off Chinese or Russian or... computers. Stealing US biz dox, and giving the dataz to their corporate bffs to profit from. Just like a mafia. Because corporatist governments ARE mafias.
So I'm with you on that. But also consider that _all_ governments are mafias. But not entirely unified. There are families, allegiances, conflicts, etc. etc. And that includes China and Russia. For them all, ideology is just bullshit for the lower levels, and for the masses. And further, maybe some of those mafias have families and allegiances that span multiple countries. Some perhaps run corporations for cover. By default, I assume that everything we get from public sources is bullshit and propaganda. Maybe some of the leaks are real, but even that's hard to know.
That's my flier, and I'm sticking to it. :>
Rr
On Fri, Sep 16, 2016 at 5:55 AM, Ben Tasker <ben@bentasker.co.uk> wrote:
I've seen more boxes in China that were very poorly secured than not
China's a good place to originate from if your aim is to make it difficult for anyone in the Western World to trace a connection back to your real location - at least by legal methods.
The NSA GPA likes to think it's operating legally, and due to secrecy and secret orders and cover and spin and expendables, powers don't give a fuck if it's not. If whitehat CERT like teams can track stuff on the surface, you can bet govt can do it in the deep.
For all we know, all these China / Russia attacks are the NSA / CIA or simply US political parties and corporates cracking these boxes through nine proxies and taking a whack back at their opponents in the US.
It's all a game, play on.
On 09/12/2016 09:33 PM, Mirimir wrote:
On 09/12/2016 10:09 PM, juan wrote:
<SNIP>
Funny thing about cloudflare is that it 'protects' people against ddos attacks that are as common as 'terrorism'.
Tell that to Linode ;)
After protommail was attacked they didn't buy Cloudflare's services There ARE other ways to deal, and other companies NOT DIRECTLY AFFILIATED WITH THE DHS, to do biz with. You know what they say about phone apps... There's no such thing as a free one. Ur dataz is the payment. So to with the popular low-cost 'protector-of-all-things-internet', Cloudflare. Rr
On 09/12/2016 09:09 PM, juan wrote:
On Mon, 12 Sep 2016 20:57:20 -0700 Razer <rayzer@riseup.net> wrote:
On 09/12/2016 08:16 PM, Mirimir wrote:
On 09/12/2016 08:44 PM, Razer wrote:
On 09/12/2016 04:47 PM, NewTroll wrote:
u doxn juan or what!
Hurry it up.
We be doxxin' YOU newtroll @sigaint.org
You B chillin wit Cloudflare checkin yo tormail:
Why you hatin' on Sigaint?
Sigaint's actual mailservers are all hidden services. The clearnet website and mail gateways use CloudFlare as DDoS protection. Even DDoS services use CloudFlare, bro ;)
ROTF! With a sunshiney rainbowy logo how COULD they be working for the fedz.
http://exiledonline.com/isucker-big-brother-internet-culture/
House testimony on their ISIS Chat room honeypots: http://docs.house.gov/meetings/FA/FA18/20150127/102855/HHRG-114-FA18-Transcr...
Funny thing about cloudflare is that it 'protects' people against ddos attacks that are as common as 'terrorism'.
Good cover though. Everyone believes that's their main revenue source.
participants (11)
-
Ben Tasker
-
Cypher Piggie
-
grarpamp
-
John Newman
-
juan
-
Mirimir
-
NewTroll
-
oshwm
-
Razer
-
rooty
-
Zenaan Harkness