Re: [cryptome] TheCthulhu / CthulhuSec to Cryptome
Just call it "TheCthulhu Archive," or something other than Cryptome, then good to go. Make many archives, many are being made, many more needed. All start by and are sustained by thieving, like Wayback's, Google's, WikiLeak's, Snowden's, Manning's, CIA's, NSA's, In-Q-Tel's, LoC's, Cryptome's. Mirrors, torrents, copies, siphoning, are tampering, rip-offs, fake goods. A long tradition of that banditry. Note the offerings of this list, most of the Internet, all of education, religion, law, the media. "Respected repository of information," oh my, what a false honor presaging a spit in eye. A dual hat locution worthy of ever-duplicitous cryptology. Claims of authenticity, anonymity, updates, are pickpocketing, shysterism, verily spy trade, inevitable tampering, cheating, deceiving. , NSA's, At 09:53 PM 12/20/2015, you wrote:
On 12/21/15, Shelley <shelley@misanthropia.org> wrote:
Cryptome is, or was for a very long time, a respected repository of information. It'd be perfectly understandable if you're ready to hang it up, just please do it soon before you run it off the rails. Please pass it
git (bare repo)
with hidden server (tor, i2p) mirrors
would enable distributed, anonymous, incremental, updates to the repository to be published easily
Just call it "TheCthulhu Archive," or something other than Cryptome, then good to go.
That seems silly. No one's going to confuse it with the original, which is why you don't need to rename the files you post on your site. You don't need to call them "Cryptome's Nicholas Merrill v. FBI NSL History/Fee Request" and it's obviously TheCthulhu. Unlike the WikiLeaks mirror it doesn't even look like Cryptome.
A dual hat locution worthy of ever-duplicitous cryptology.
What? --Mike
On Dec 21, 2015, at 12:06 AM, John Young <jya@pipeline.com> wrote:
Just call it "TheCthulhu Archive," or something other than Cryptome, then good to go.
Make many archives, many are being made, many more needed. All start by and are sustained by thieving, like Wayback's, Google's, WikiLeak's, Snowden's, Manning's, CIA's, NSA's, In-Q-Tel's, LoC's, Cryptome's.
Mirrors, torrents, copies, siphoning, are tampering, rip-offs, fake goods. A long tradition of that banditry. Note the offerings of this list, most of the Internet, all of education, religion, law, the media.
"Respected repository of information," oh my, what a false honor presaging a spit in eye. A dual hat locution worthy of ever-duplicitous cryptology.
Claims of authenticity, anonymity, updates, are pickpocketing, shysterism, verily spy trade, inevitable tampering, cheating, deceiving.
, NSA's, At 09:53 PM 12/20/2015, you wrote:
On 12/21/15, Shelley <shelley@misanthropia.org> wrote:
Cryptome is, or was for a very long time, a respected repository of information. It'd be perfectly understandable if you're ready to hang it up, just please do it soon before you run it off the rails. Please pass it
git (bare repo)
with hidden server (tor, i2p) mirrors
would enable distributed, anonymous, incremental, updates to the repository to be published easily
On 12/21/15, Michael Best <themikebest@gmail.com> wrote:
Just call it "TheCthulhu Archive," or something other than Cryptome, then good to go.
That seems silly. No one's going to confuse it with the original,
Rubbish. And you've especially highlighted one of John's points - you name your mirror "cryptome" and you're a) showing severe disrespect, b) deceiving others who don't know, c) violating the goodwill associated with Cryptome and John. I just wish such things were so obvious they did not need to be spelled out.
which is why you don't need to rename the files you post on your site.
WTF?! Do you hear what you're saying?
You don't need to call them "Cryptome's Nicholas Merrill v. FBI NSL History/Fee Request" and it's obviously TheCthulhu. Unlike the WikiLeaks mirror it doesn't even look like Cryptome.
John, thank you for your previous email reminding us there are higher standards we just might wish to hold ourselves to, and your genuine acceptance of others as they are - it's so easy to be otherwise blinded. I'm sure my true colours show as much as Michael and others too, and it's embarrassing how often I get picked up off the floor and dusted off. Perhaps wikileaks ought have just posted a hash sum file to "ensure verity". John, you evidently have great strength of resolve and fortitude of spirit, since what it must have taken to start and keep Cryptome going "pre-wikileaks" - wikileaks created some submission secrecy, clandestine facility, making it feel easier to leak, less stressful at leak time (notwithstanding little improvement in real protection of big leakers like Manning, so could be called deceiving in that sense). Your courage in doing what you saw must be done, in public, in spite of lack of 'privacy', in spite of exposure. So many today use a nom/ nim and think they're being secretive or elite, 'publicly discussing freedom and liberty from the State', but hiding from who? The 5 eyes, 9 eyes, 100 eyes get their target in general. Benefits? Common sense aint so common.
A dual hat locution worthy of ever-duplicitous cryptology.
What?
You had to read the prior sentence. It's nothing much really, just patting someone condescendingly on the head as a prelude to gently inserting a knife. That sort of genre. Unless I'm wildly off base... John, my regards and respect, Zenaan
On Mon, Dec 21, 2015 at 5:02 PM, Zenaan Harkness <zen@freedbms.net> wrote:
Perhaps wikileaks ought have just posted a hash sum file to "ensure verity".
WL has done for various bits. Part of which is most everything under sha1 torrents via https.
John... regardless of whther you adopt automata friendly and takedown resistant distribution and hosting methods.... just publish and sign the hashes and include them in your distro alredy, it's not hard. If for nothing else but to detect bitrot in transit and on media over future eons. find <path> -type f -print0 | xargs -0 sha256 > <path>/chashes_yyyymmdd.txt or http://md5deep.sourceforge.net/ https://github.com/jessek/hashdeep/releases/download/v4.4/md5deep-4.4.zip hashdeep -r <path> > <path>/chashes_yyyymmdd.txt gpg -a -b <path>/chashes_yyyymmdd.txt These will crypto chain themselves together in <path> with each iteration. Certainly you and any underlings, consultants, and spooks can handle this. No need for discourse. Thanks.
On Mon, Dec 21, 2015, at 05:00 PM, grarpamp wrote:
Don't use Sourceforge: http://www.infoworld.com/article/2929732/open-source-software/sourceforge-co... Alfie -- Alfie John alfiej@fastmail.fm
participants (5)
-
Alfie John
-
grarpamp
-
John Young
-
Michael Best
-
Zenaan Harkness