Re: Why cryptome sold web logs to their paying customers?
Normally I'd give you the benefit of the doubt, John, but the last time in this discussion you said something was disinfo it was the logs.
Date: Sun, 11 Oct 2015 20:21:24 -0400 From: John Young <jya@pipeline.com> To: cypherpunks@cpunks.org Subject: Re: ***SPAM*** Re: Why cryptome sold web logs to their paying customers? Message-ID: <E1ZlQqs-0004zf-Hg@elasmtp-masked.atl.sa.earthlink.net> Content-Type: text/plain; charset="us-ascii"; format=flowed
At 08:03 PM 10/11/2015, you wrote:
The Netsol support pages are disinfo? bullshit
They are indeed that. Requests languor unanswered. Nowadays standard business practice, off-shore no longer reliable either. Just don't respond. Get bought out by Web.com and slowly disappear after handing over decades of user data for exploitation. The Apple future, or maybe present if hobnobbing with US and CN leaders give a clue.
On 10/11/15, Michael Best <themikebest@gmail.com> wrote:
Normally I'd give you the benefit of the doubt, John, but the last time in this discussion you said something was disinfo it was the logs.
i have hated network solutions since '98. you're free to buy their services, if you'd like to confirm first person. :) all of us are wondering what will finally be the straw too far for John...
Lots of rabble rousing. Nobody willing to take deb&jyas place on the chopping block. If you can do it better, get to it. Travis On Sun, Oct 11, 2015, 9:05 PM coderman <coderman@gmail.com> wrote:
On 10/11/15, Michael Best <themikebest@gmail.com> wrote:
Normally I'd give you the benefit of the doubt, John, but the last time in this discussion you said something was disinfo it was the logs.
i have hated network solutions since '98.
you're free to buy their services, if you'd like to confirm first person. :)
all of us are wondering what will finally be the straw too far for John...
Is it my turn? Where's the line? On Sun, Oct 11, 2015 at 9:11 PM, Travis Biehn <tbiehn@gmail.com> wrote:
Lots of rabble rousing. Nobody willing to take deb&jyas place on the chopping block.
If you can do it better, get to it.
Travis
On Sun, Oct 11, 2015, 9:05 PM coderman <coderman@gmail.com> wrote:
On 10/11/15, Michael Best <themikebest@gmail.com> wrote:
Normally I'd give you the benefit of the doubt, John, but the last time in this discussion you said something was disinfo it was the logs.
i have hated network solutions since '98.
you're free to buy their services, if you'd like to confirm first person. :)
all of us are wondering what will finally be the straw too far for John...
Ok, then I won't second guess why put up with it - I've avoided traditional web hosts because of all the headaches I had a few years ago. Maxed out on bandwidth, database calls, memory usage, etc. Only started aharing my archives online again when I decided to use archive.org and neocities. On Sun, Oct 11, 2015 at 9:01 PM, coderman <coderman@gmail.com> wrote:
On 10/11/15, Michael Best <themikebest@gmail.com> wrote:
Normally I'd give you the benefit of the doubt, John, but the last time in this discussion you said something was disinfo it was the logs.
i have hated network solutions since '98.
you're free to buy their services, if you'd like to confirm first person. :)
all of us are wondering what will finally be the straw too far for John...
You can start by re-posting the leaked traffic logs... (Editorial discretion is frowned upon amongst the idealists.) Maybe set up an onion, host on i2p, freenet (hehehe), ethereum, the blockchain, torrents. Spread it far and wide, set up a PKI, set up a WOT, keep it all offline. If you're a real masochist you'll host the docs on some crazy 'website' with no indirection protecting you from legal/illegal/TLA action. Keep the info off the dark web, off the deep web and in the search indexes. Warrant canary (which won't work), encryption (you won't be safe) and signatures (secrets will be stolen.) If you think you can survive as well as JYA, Deb & fare better than Assange, go for it. Be prepared. It doesn't pay very well. You'd have to be crazy to do this. -Travis On Sun, Oct 11, 2015 at 9:16 PM, Michael Best <themikebest@gmail.com> wrote:
Ok, then I won't second guess why put up with it - I've avoided traditional web hosts because of all the headaches I had a few years ago. Maxed out on bandwidth, database calls, memory usage, etc. Only started aharing my archives online again when I decided to use archive.org and neocities.
On Sun, Oct 11, 2015 at 9:01 PM, coderman <coderman@gmail.com> wrote:
On 10/11/15, Michael Best <themikebest@gmail.com> wrote:
Normally I'd give you the benefit of the doubt, John, but the last time in this discussion you said something was disinfo it was the logs.
i have hated network solutions since '98.
you're free to buy their services, if you'd like to confirm first person. :)
all of us are wondering what will finally be the straw too far for John...
-- Twitter <https://twitter.com/tbiehn> | LinkedIn <http://www.linkedin.com/in/travisbiehn> | GitHub <http://github.com/tbiehn> | TravisBiehn.com <http://www.travisbiehn.com> | Google Plus <https://plus.google.com/+TravisBiehn>
http://cdn.meme.am/instances/500x/46177132.jpg On Sun, Oct 11, 2015 at 9:32 PM, Travis Biehn <tbiehn@gmail.com> wrote:
You can start by re-posting the leaked traffic logs... (Editorial discretion is frowned upon amongst the idealists.)
Maybe set up an onion, host on i2p, freenet (hehehe), ethereum, the blockchain, torrents. Spread it far and wide, set up a PKI, set up a WOT, keep it all offline.
If you're a real masochist you'll host the docs on some crazy 'website' with no indirection protecting you from legal/illegal/TLA action. Keep the info off the dark web, off the deep web and in the search indexes.
Warrant canary (which won't work), encryption (you won't be safe) and signatures (secrets will be stolen.)
If you think you can survive as well as JYA, Deb & fare better than Assange, go for it. Be prepared.
It doesn't pay very well. You'd have to be crazy to do this.
-Travis
On Sun, Oct 11, 2015 at 9:16 PM, Michael Best <themikebest@gmail.com> wrote:
Ok, then I won't second guess why put up with it - I've avoided traditional web hosts because of all the headaches I had a few years ago. Maxed out on bandwidth, database calls, memory usage, etc. Only started aharing my archives online again when I decided to use archive.org and neocities.
On Sun, Oct 11, 2015 at 9:01 PM, coderman <coderman@gmail.com> wrote:
On 10/11/15, Michael Best <themikebest@gmail.com> wrote:
Normally I'd give you the benefit of the doubt, John, but the last time in this discussion you said something was disinfo it was the logs.
i have hated network solutions since '98.
you're free to buy their services, if you'd like to confirm first person. :)
all of us are wondering what will finally be the straw too far for John...
-- Twitter <https://twitter.com/tbiehn> | LinkedIn <http://www.linkedin.com/in/travisbiehn> | GitHub <http://github.com/tbiehn> | TravisBiehn.com <http://www.travisbiehn.com> | Google Plus <https://plus.google.com/+TravisBiehn>
On Mon, Oct 12, 2015, at 12:32 PM, Travis Biehn wrote:
You can start by re-posting the leaked traffic logs... (Editorial discretion is frowned upon amongst the idealists.)
Maybe set up an onion, host on i2p, freenet (hehehe), ethereum, the blockchain, torrents. Spread it far and wide, set up a PKI, set up a WOT, keep it all offline.
If you're a real masochist you'll host the docs on some crazy 'website' with no indirection protecting you from legal/illegal/TLA action. Keep the info off the dark web, off the deep web and in the search indexes.
Warrant canary (which won't work), encryption (you won't be safe) and signatures (secrets will be stolen.)
If you think you can survive as well as JYA, Deb & fare better than Assange, go for it. Be prepared.
It doesn't pay very well. You'd have to be crazy to do this.
Or you can be like TheCthulhu and run your own data centre with good lawyers. Alfie -- Alfie John alfiej@fastmail.fm
C'mon gang - I know we all want to spin up a W3C or IETF standard to support offline signed web-assets. Then we can -definitively- say that the person producing a torrent file has the same private key as the site operator. -Travis On Sun, Oct 11, 2015 at 9:53 PM, Alfie John <alfiej@fastmail.fm> wrote:
On Mon, Oct 12, 2015, at 12:32 PM, Travis Biehn wrote:
You can start by re-posting the leaked traffic logs... (Editorial discretion is frowned upon amongst the idealists.)
Maybe set up an onion, host on i2p, freenet (hehehe), ethereum, the blockchain, torrents. Spread it far and wide, set up a PKI, set up a WOT, keep it all offline.
If you're a real masochist you'll host the docs on some crazy 'website' with no indirection protecting you from legal/illegal/TLA action. Keep the info off the dark web, off the deep web and in the search indexes.
Warrant canary (which won't work), encryption (you won't be safe) and signatures (secrets will be stolen.)
If you think you can survive as well as JYA, Deb & fare better than Assange, go for it. Be prepared.
It doesn't pay very well. You'd have to be crazy to do this.
Or you can be like TheCthulhu and run your own data centre with good lawyers.
Alfie
-- Alfie John alfiej@fastmail.fm
-- Twitter <https://twitter.com/tbiehn> | LinkedIn <http://www.linkedin.com/in/travisbiehn> | GitHub <http://github.com/tbiehn> | TravisBiehn.com <http://www.travisbiehn.com> | Google Plus <https://plus.google.com/+TravisBiehn>
On 10/11/2015 06:16 PM, Michael Best wrote:
Only started aharing my archives online again when I decided to use archive.org <http://archive.org> and neocities.
So, let me see if I understand this correctly (and I feel like I've asked this before in another way). What you claim to be doing is starting an archive of dox you 'found' in the wild, (but no one seems to know exactly knows how they went wild) from a specific site, Cryptome, without the site owner's permission, at IA? I'm sorely tempted to send a note to IA about this and see what they think about people propagating potentially purloined material on their site. RR
Just found http://comptutor.me/2015/04/03/bulletproof-offshore-hosting-and-servers/ Has anyone on the list had any experience with any of these "Anonymous, Bulletproof, and Offshore Hosting Providers"? Obviously 'bulletproof' is marketing hype, but... This is a list of Anonymous, Bulletproof, and Offshore Hosting Providers.
Links marked with an asterisk are hosts that accept Bitcoin. The list is in no particular order.
https://www.orangewebsite.com *
http://www.advania.com <http://www.advania.com/datacentres/>
https://www.greenqloud.com <https://www.greenqloud.com/computeqloud/>
https://www.panamaserver.com *
http://www.offshoreracks.com *
http://www.2X4.ru <http://www.2x4.ru/>
http://www.tomtel.ru <http://www.tomtel.ru/enterprise/hosting.html>
http://hosting.tel.ru <http://hosting.tel.ru/dedicated-server/>
http://infiumhost.com <http://infiumhost.com/en/>
http://renter.ru <http://renter.ru/rent.html>
http://ispserver.com <http://ispserver.com/en/>
https://randservers.com <https://randservers.com/en/> *
https://incloudibly.net <https://incloudibly.net/en/> *
https://www.nine.ch <https://www.nine.ch/en/>
http://ukrdc.net <http://ukrdc.net/en/>
http://unit-is.com <http://unit-is.com/en/>
http://uniteddc.net.ua <http://uniteddc.net.ua/en>
http://rx-name.ua <http://rx-name.ua/server>
http://www.server.ua <http://www.server.ua/dedicated>
http://www.colocall.net <http://www.colocall.net/en/>
https://goodnet.com.ua <https://goodnet.com.ua/en/>
http://www.besthosting.ua <http://www.besthosting.ua/en/>
https://www.ukrnames.com <https://www.ukrnames.com/eng/>
https://itldc.com <https://itldc.com/en/>
http://www.kriweb.com <http://www.kriweb.com/servisler.html>
http://cinipac.com <http://cinipac.com/en> *
http://www.prq.se <http://www.prq.se/?p=services&intl=1> *
http://www.portlane.com <http://www.portlane.com/en>
https://www.pin.se <https://www.pin.se/en/>
http://www.internetsolutions.hk
http://tele-asia.net <http://tele-asia.net/eng/>
http://www.pndc.ir <http://www.pndc.ir/index.htm>
http://ouriran.com <http://ouriran.com/dedicated_iran.cfm>
http://www.afranet.com <http://www.afranet.com/DataCenter/Index.aspx>
http://www.parsonline.com <http://www.parsonline.com/old/fa/services/datacenter>
https://www.anonymoushosting.in *
https://www.vpsbg.eu <https://www.vpsbg.eu/en/> *
https://vinahost.vn <https://vinahost.vn/index.php?language=English>
http://www.pavietnam.net <http://www.pavietnam.net/en/>
http://www.curacaowebhosting.com
http://www.nsc.ba <http://www.nsc.ba/internet/hosting/>
http://dis.telecom.kz <http://dis.telecom.kz/page/hosting>
http://www.idhost.kz <http://www.idhost.kz/en/home/>
https://grandhost.cc <https://grandhost.cc/en/>
http://hosting.tongacable.net/home/
https://www.thnic.co.th <https://www.thnic.co.th/en/thHost/>
http://www.proen.co.th <http://www.proen.co.th/home?lang=en>
Keep in mind that all of these hosts have different rules, are all over the globe with different laws, and are ideal for different things. Some don’t care about DMCA, some don’t care about bulk e-mail or spam, some host botnets (whether knowingly or unknowingly), some specialize in hosting gambling or porn, some let you sign up anonymously, some are just free speech hosts. They have different speeds, connectivity, prices, policies, services, etc. Do your homework and pick the right one for you.
Iceland, Switzerland, Eastern Europe, and Russia currently seem to be the most popular options for offshore hosting at the moment. Parts of Asia like Hong Kong, South/Central America, and the Caribbean have always been popular offshore locations as well. Asian and South/Central American hosts are typically pretty safe options, but their connectivity and infrastructure is usually lacking which leads to slower speeds, higher latency, and higher prices. I predict the next popular offshore location will be the middle east and possibly parts of Africa. Their only downfall at the moment is high prices and limited connectivity. The Netherlands and Sweden used to be safe havens, but people are leaving those places due to recent crackdowns. These companies were found by doing a whois on known site’s domains and then doing a whois on the IP produced. Some sites are hiding their IP’s behind CloudFlare, but even then we can find them by plugging the domain intohttp://www.crimeflare.com/cfs.html
On Sun, Oct 11, 2015 at 10:27 PM, Michael Best <themikebest@gmail.com> wrote:
Any chance you'll look for a new ISP, John?
On Sun, Oct 11, 2015 at 9:01 PM, coderman <coderman@gmail.com> wrote:
all of us are wondering what will finally be the straw too far for John...
On Mon, 12 Oct 2015 05:20:10 -0700, Michael Best <themikebest@gmail.com> wrote:
Just found http://comptutor.me/2015/04/03/bulletproof-offshore-hosting-and-servers/
Has anyone on the list had any experience with any of these "Anonymous, Bulletproof, and Offshore Hosting Providers"? Obviously 'bulletproof' is marketing hype, but...
This is a list of Anonymous, Bulletproof, and Offshore Hosting Providers.
Links marked with an asterisk are hosts that accept Bitcoin. The list is in no particular order.
https://www.orangewebsite.com *
https://www.1984hosting.com A few years ago I used 1984hosting.com shared hosting for a year and change.
They are committed to using free software throughout, for example their web panel used ispCP if I remember correctly, and their support was competent and responsive. I've heard that their VPS offering is the better product offering but at a $25/mo starting price, I decided that to look elsewhere for a personal micro-VPS to run a very light duty mail,web dns server etc. I believe that Orangewebsite resells 1984.is infrastructure services.
participants (6)
-
Alfie John
-
coderman
-
Michael Best
-
Razer
-
Seth
-
Travis Biehn