Your IP:
_____/\\\\\\\\\\\_______________________________________________________________ ___/\\\/////////\\\_____________________________________________________________ __\//\\\______\///______________________________________________________________ ___\////\\\__________/\\/\\\\\\_______/\\\\\\\\___/\\____/\\___/\\__/\\\\\\\\\\_ ______\////\\\______\/\\\////\\\____/\\\/////\\\_\/\\\__/\\\\_/\\\_\/\\\//////__ _________\////\\\___\/\\\__\//\\\__/\\\\\\\\\\\__\//\\\/\\\\\/\\\__\/\\\\\\\\\\_ __/\\\______\//\\\__\/\\\___\/\\\_\//\\///////____\//\\\\\/\\\\\___\////////\\\_ _\///\\\\\\\\\\\/___\/\\\___\/\\\__\//\\\\\\\\\\___\//\\\\//\\\_____/\\\\\\\\\\_ ___\///////////_____\///____\///____\//////////_____\///__\///_____\//////////__ =========================[ Internet Trench Warfare ]========================== Despite the intrusion of massive surveillance programs like PRISM and DCSNet as well as the potential threat of weak to mid-tier encryption equating to no encryption because of things like Bullrun, it's still the case that you may find personal privacy on the internet a priority, or further that since the state is allowed to see everyone's personal information, that everyone else should be allowed to see the same information, meaning offensive measures as well as defensive measures are necessary. Well this is a good starting point for your future of being put on a government watch list, because below are a bunch of various tools for "educational" implimentation of fuckery. Norse's live feed is linked here for the full view. For more information on internet rights, visit the Electronic Frontier Foundation. Good to know about DNSSEC root key split and about secret sharing in general. :: Defense :: Be secure, use Comodo/ESET and an IDS like Snort/Samhain. Be anonymous, use I2P/Tor, K-MAC/SMAC, and don't use a VPN unless it's Cryptostorm. Be average, remove your browser fingerprint(s) to make you harder to identify. Be obfuscated, encrypt with VeraCrypt and use stego like OpenPuff/G-Mask. Be independant, use a cryptocurrency like Bitcoin and our guide. Be untrackable, use Pinger or Blackphone/Librem and FawkesBox/Off Pocket. :: Offense :: Be NSA, become untraceable by using Tails/TENS. Be a vigilante, use a Stingray device or learn to war drive/Skyjack. Be a pen tester with Wireshark/Metasploit/SmartSniff and Brutus/WebBrowserPassview. Be FBI, do background checks, use pipl/spokeo and their phone #/photos/IP. Be a skiddie, use Dangerous Kitten's hack pack, or web dox tools. Be multipresent, use a RAT like DarkComet (and the Removal Tool) or Sub7. Be Bosnian Bill, learn how to pick all kinds of locks. You can now kill laptops at will by simply pluging in the USB Killer. Be PMC, get a millitary-grade briefcase EMP bomb. :: Misc :: Strong Random Password Generator all done client-side for security. GUID Generator for serial numbers or software. Be a programmer, motherfucker, or at least learn HTML. Be faceless, share website logins with BugMeNot/Login2/fakeaccount. Be e-rich, with valid credit card numbers and a new identity or phone #. Mini dailies kit (go-bag-esk) for urban environments. Car survival backpack, doubles if you want to live innawoods for a day or two. 20 lb. basic go-bag, this is the bare minimum if you need to bounce innawoods. A full-on go-bag, with all the essentials and extras for long-term survival.