We are still actively working on the spam issue.

Difference between revisions of "Cyberpunk"

From InstallGentoo Wiki
Jump to: navigation, search
(Meatspace Surveillance)
Line 7: Line 7:
  
 
== Circumventing surveillance, in Cyberspace: ==
 
== Circumventing surveillance, in Cyberspace: ==
 +
====Tor====
 +
''For a more in depth definition, see [[Tor]] and their [https://www.torproject.org/ Official Website].''
  
* [[Tor]]
+
''Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships as well as state security. Generally, it is the name of several related and interconnected projects, all centered around providing you with anonymity and privacy online. In the simplest sense, Tor is the name of a free software project that protects your privacy online by bouncing your communications around a distributed network of computers (called "relays") run by volunteers all around the world. This network of relays is called the Tor Network.''
** [https://www.torproject.org/ Official Website]
 
  
* [https://geti2p.net/en/ I2P]
+
====I2P====
 +
[https://geti2p.net/en/ ''Official Website'']
  
* [http://hyperboria.net/ Hyperboria]
+
''The name I2P is derived from Invisible Internet Project, which, in pseudo-mathematical notation, is represented as I²P. It is described on their project page that I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers, as well as the average person.
 +
No network can be perfectly anonymous. The continued goal of I2P is to make attacks more and more difficult to mount. Its anonymity will get stronger as the size of the network increases and with ongoing academic review.''
  
* The [http://www.eff.org/ Electronic Frontier Foundation] provides tools and information for the privacy-concerned individual, such as:
+
====Hyperboria====
** [http://panopticlick.eff.org/ ''Panopticlick''] - See how unique - and trackable - your browser configuration is.
 
** [http://www.eff.org/https-everywhere ''HTTPS Everywhere'']  is a browser extension that encrypts your communications with many major websites.
 
  
*
+
[http://hyperboria.net/ ''Official Website'']
 +
 
 +
''Hyperboria is a global decentralized network of "nodes" running [http://cjdns.info/ cjdns] software. The goal of Hyperboria is to provide an alternative to the internet with the principles of security, scalability and decentralization at the core. Anyone can participate in the network by locating a peer that is already connected. Their three project principles is to develop software that is open, peer to peer and as secure as possible. They accomplish this by giving everyone the ability to join by peering with someone already connected and routing packets using end-to-end encryption using ipv6 addresses through cjdns.''
 +
 
 +
====EFF====
 +
[http://www.eff.org/ ''Official Website'']
 +
 
 +
''The Electronic Frontier Foundation is an international non-profit digital rights group based in the United States. They provide funds for legal defense in court, present friend of the court briefs, defend individuals and new technologies from what it considers baseless or misdirected legal threats, work to expose government malfeasance, provide guidance to the government and courts, organize political action and mass mailings, support some new technologies which it believes preserve personal freedoms, maintain a database and web site of related news and information, monitor and challenge potential legislation that it believes would infringe on personal liberties and fair use, and solicit a list of what it considers patent abuses with intentions to defeat those that it considers without merit.''
 +
 
 +
In short and given the context of cyberspace: they fight for your freedoms.
 +
 
 +
They also provide tools and information for the privacy-concerned individual, such as:
 +
* [http://panopticlick.eff.org/ ''Panopticlick''] - See how unique - and trackable - your browser configuration is.
 +
* [http://www.eff.org/https-everywhere ''HTTPS Everywhere'']  is a browser extension that encrypts your communications with many major websites.
 +
 
 +
====OTR====
 +
* [https://otr.cypherpunks.ca/ Off-the-record messaging]
 +
 
 +
* [http://wiki.xmpp.org/web/Securing_XMPP Private XMPP (Jabber)] chat with forced encryption
 +
 
 +
* Encrypt email with [http://www.gnupg.org/documentation/guides.html GPG]
 +
 
 +
* [https://tox.im Tox]
 +
 
 +
== Still swapping dead presidents? My sides are in orbit, chummer. ==
 +
 
 +
* Maintain your sense of autonomy by using [https://en.wikipedia.org/wiki/Cryptocurrency Cryptocurrencies] and while you're at learn to distribute your data flow:
 +
** [https://www.ethereum.org/ ''Ethereum'']
 +
** [http://bitcloudproject.org/ ''Bitcloud'']
 +
** [http://maidsafe.net/ ''MaidSafe'']
 +
** [http://owncloud.org/ ''ownCloud]
 +
 +
 
 +
 
 +
==== Hierarchical trust systems are fundamentally a scam. ====
 +
 
 +
>SSL root certificates, e.g., Verisgn, Comodo, Entrust -- corporations that have placed themselves the top of the pyramid, but why do you trust them, /g/?
 +
>>mfw $1500 so a corporate fatcat can vouch for your identity for a year; https://www.symantec.com/page.jsp?id=compare-ssl-certificates
 +
>>>Self sign your own certificates. https://wiki.archlinux.org/index.php/OpenSSL
 +
>DNS; ICANN has a monopoly on the domain name system, but why? So they can release stupid vanity domains like .donut and .shoes? Top fucking lel.
 +
>>EU calls for cozy ICANN relations with US to end; http://www.itworldcanada.com/post/eu-calls-for-icanns-close-relationship-with-u-s-to-end
 +
>>>Use ORSN; http://www.orsn.org/en/tech/ ; or use a distributed system like Namecoin
 +
 +
Build a meshnet, or a darknet. The only truly free networks are the ones that everyone can own a piece of.
 +
Active alt-nets:
 +
>i2p; https://geti2p.net/en/
 +
>cjdns; http://cjdns.info/
 +
>Tor; https://www.torproject.org/
 +
>OpenLibernet; http://www.openlibernet.org/
 +
>FreeNet; https://freenetproject.org/
 +
Mesh network technology:
 +
>olsrd; http://www.olsr.org/
 +
>B.A.T.M.A.N. and B.A.T.M.A.N. Advanced; http://www.open-mesh.org/projects/batman-adv/wiki
 +
>bmx6; http://bmx6.net/projects/bmx6
 +
Build your own GSM cellphone network:kk
 +
>http://openbts.org/
  
 
== Circumventing surveillance, in Meatspace: ==
 
== Circumventing surveillance, in Meatspace: ==
Line 28: Line 84:
 
* Dress like a more fashionable juggalo: http://cvdazzle.com
 
* Dress like a more fashionable juggalo: http://cvdazzle.com
 
* Grind up some cheap mylar thermal blankets, make a solution and dip your clothes in it to become invisible to thermal cameras: http://ahprojects.com/projects/stealth-wear
 
* Grind up some cheap mylar thermal blankets, make a solution and dip your clothes in it to become invisible to thermal cameras: http://ahprojects.com/projects/stealth-wear
 +
  
 
== TOR sites ==
 
== TOR sites ==

Revision as of 11:20, 23 March 2014

Cleanup.png
Cleanup.png
CLEANUP CANDIDATE
Relevant discussion may be found on the talk page. Reason: No reason specified.
Cbp.jpg

Cyberpunk is a subgenre of science fiction that is best described as "high tech and low life." The genre deals with the conflict between hackers and corrupt governments and megacorporations, in a dystopic near-future setting. Originally gaining popularity in the late 20th century, cyberpunk has stood the test of time, as our present-day world starts to move more and more in the direction of the fictional worlds in Neuromancer and Blade Runner.

On /g/, cyberpunk/hacker culture threads are created daily.

Circumventing surveillance, in Cyberspace:

Tor

For a more in depth definition, see Tor and their Official Website.

Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships as well as state security. Generally, it is the name of several related and interconnected projects, all centered around providing you with anonymity and privacy online. In the simplest sense, Tor is the name of a free software project that protects your privacy online by bouncing your communications around a distributed network of computers (called "relays") run by volunteers all around the world. This network of relays is called the Tor Network.

I2P

Official Website

The name I2P is derived from Invisible Internet Project, which, in pseudo-mathematical notation, is represented as I²P. It is described on their project page that I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers, as well as the average person. No network can be perfectly anonymous. The continued goal of I2P is to make attacks more and more difficult to mount. Its anonymity will get stronger as the size of the network increases and with ongoing academic review.

Hyperboria

Official Website

Hyperboria is a global decentralized network of "nodes" running cjdns software. The goal of Hyperboria is to provide an alternative to the internet with the principles of security, scalability and decentralization at the core. Anyone can participate in the network by locating a peer that is already connected. Their three project principles is to develop software that is open, peer to peer and as secure as possible. They accomplish this by giving everyone the ability to join by peering with someone already connected and routing packets using end-to-end encryption using ipv6 addresses through cjdns.

EFF

Official Website

The Electronic Frontier Foundation is an international non-profit digital rights group based in the United States. They provide funds for legal defense in court, present friend of the court briefs, defend individuals and new technologies from what it considers baseless or misdirected legal threats, work to expose government malfeasance, provide guidance to the government and courts, organize political action and mass mailings, support some new technologies which it believes preserve personal freedoms, maintain a database and web site of related news and information, monitor and challenge potential legislation that it believes would infringe on personal liberties and fair use, and solicit a list of what it considers patent abuses with intentions to defeat those that it considers without merit.

In short and given the context of cyberspace: they fight for your freedoms.

They also provide tools and information for the privacy-concerned individual, such as:

  • Panopticlick - See how unique - and trackable - your browser configuration is.
  • HTTPS Everywhere is a browser extension that encrypts your communications with many major websites.

OTR

  • Encrypt email with GPG

Still swapping dead presidents? My sides are in orbit, chummer.


Hierarchical trust systems are fundamentally a scam.

>SSL root certificates, e.g., Verisgn, Comodo, Entrust -- corporations that have placed themselves the top of the pyramid, but why do you trust them, /g/? >>mfw $1500 so a corporate fatcat can vouch for your identity for a year; https://www.symantec.com/page.jsp?id=compare-ssl-certificates >>>Self sign your own certificates. https://wiki.archlinux.org/index.php/OpenSSL >DNS; ICANN has a monopoly on the domain name system, but why? So they can release stupid vanity domains like .donut and .shoes? Top fucking lel. >>EU calls for cozy ICANN relations with US to end; http://www.itworldcanada.com/post/eu-calls-for-icanns-close-relationship-with-u-s-to-end >>>Use ORSN; http://www.orsn.org/en/tech/ ; or use a distributed system like Namecoin

Build a meshnet, or a darknet. The only truly free networks are the ones that everyone can own a piece of. Active alt-nets: >i2p; https://geti2p.net/en/ >cjdns; http://cjdns.info/ >Tor; https://www.torproject.org/ >OpenLibernet; http://www.openlibernet.org/ >FreeNet; https://freenetproject.org/ Mesh network technology: >olsrd; http://www.olsr.org/ >B.A.T.M.A.N. and B.A.T.M.A.N. Advanced; http://www.open-mesh.org/projects/batman-adv/wiki >bmx6; http://bmx6.net/projects/bmx6 Build your own GSM cellphone network:kk >http://openbts.org/

Circumventing surveillance, in Meatspace:

Circumvent meatspace surveillance by:


TOR sites

Torchan - Started December 2011. Reincarnation of Torchan, the most famous *chan to exist in .onionland. Used to have heavy CP: http://zw3crggtadila2sg.onion/imageboard/

RundaChan - Started December 2011. New chan. Helpful to newbies: http://vkfwaglwnbi6vl7s.onion/

Bobby's Board - Started December 2011. New chan. Low uptime: http://uzz3h4ruguwza4fr.onion/imgboard/b/

Anonchan - Started November 2011. Went viral. Over 1000 posts in first month - http://od6j46sy5zg7aqze.onion/

Hidden Image Site - Moderated for CP: http://wyxwerboi3awzy23.onion/

Boards: Mostly SnapBBS. Normal forums

Networking: Social networking. Torbook - Facebook for Tor. Has a public square for discussions: http://ajqaivfxtqy3fdlr.onion/torbook/ Questions and Answers - A cool truth game: http://ajqaivfxtqy3fdlr.onion/qa/index.php

Email/Messaging: Communication.

TorPM - Tor private messaging: http://4eiruntyxxbgfv7o.onion/pm/ Tor Mail - Email services. *@tormail.net: http://jhiwjjlqpyawmpjx.onion/

Hax: Hacking, etc.

Hashparty - Cracking site: http://3terbsb5mmmdyhse.onion/

HackBB - Forums for hacking, hosts some content: http://clsvtzwzdgzkjda7.onion/

OnionWarez - Warez forum, kind of dead: http://dts563ge5y7c2ika.onion/

Weird and Wonderful Old Stuff - Collection of old DOS and wIN software :D: http://xqz3u5drneuzhaeo.onion/users/dosbox2/

Cellular Surveillance

For your smartphone.

Custom ROMs

Note: don't use gapps.

App Stores

Search Engines

Note: decentralized alternatives to search engines like YaCy are shit at the moment.

Maps

XPosed Modules

Use the XPosed Framework with the XPrivacy Module.

Miscellaneous

  • Spoof your MAC address constantly.
  • Create or obtain a faraday cage in the form of a phone case in order to block WiFi signals entirely. Example: https://offpocket.com/

Due to the distinct lack of physical WiFi togglers in mobile hardware, these are currently our only options from being tracked by corporations when out in meatspace.

Learning to Program

Thread Copypasta

If there isn't an existing cyberpunk thread on /g/, please start a new one with the following copypasta: http://pastebin.com/GMxykDSm