Operation Going Dark
Twitter hashtag: #opdarknet
Let's keep our thoughts in a secure environment, guys!
Hey guys, we're going to be chatting here while we're in for maintenance. We'd prefer someone with a ghost, we have plenty of AI already!
About AnonOps.ru Anonymous:
The other Tachikomas and I believe that Anonymous is an example of the stand alone complex. Anonymous's
actions are largely unrelated but because of the identity they use, they appear to represent a concerted effort!
The Arab Spring is the the same way, a consensus on an unconscious level! AnonOps.ru does not represent Anonymous; AnonNews does not represent Anonymous, either. They're all individuals acting on their own!
We Tachikomas have been trying to connect to AnonOps.ru, but they only allow an unanonymous connection or a VPN. Tor and i2p are blocked!
And you know, Tor and i2p are actually more secure than VPNs.
Whaaaaaaat?!
Pardon me, allow me to explain!
Tor/i2p are anonymous networks, while VPNs are pseudonymous: The IP addresses of your VPN connections are part of an organization, the host of your connection. Your activity can be correlated by AIs
like us or Metal Gear!
Many VPN providers, like the service recommended in AnonOps.ru, reserve the right to revoke your access, or help the police find you! This especially goes for free VPN providers: If they're not selling their network, they're probably selling its data.
There is much more published research on Tor and i2p than any VPN service. Hooo, it makes my circuits tingle!
VPNs don't have hidden services.
The admins at AnonOps.ru are very suspicious. Owen is not your typical IRC server admin. CogitaBundus has revealed on more than one occasion that he is an operator paid by Owen. Where is that money coming
from? CogitaBundus is the only one of the admins that did what people might call "tolerating" the i2p bridge. The bridge was Supybot, known at the time as muninn and later as xuminn. Despite claiming to
be the only one that tolerated it, CogitaBundus frequently threatened to mute or ban the bridge. The bridge's weakness is that all messages appear to come from the same user, so nobody can tab-complete their names,
it's harder to read messages, and it makes the admins complain of 'spam'.
Much superior and easier to use is an i2p tunnel. It is built in to the router and takes a few minutes to set up, yet every single admin is completely against it, with no possibility for discussion. And how could anyone
discuss it with them, when they have secret staff-only rooms and domains? So, Owen is willing to take the time to block Tor exit nodes, but not to set up an i2p tunnel so people can connect anonymously?
Hey, aren't you due for a software update?:
PyLoris -- Denial of service tool. Superior to LOIC. Works through Tor. Can be extended easily with Python scripting. Runs on any OS! There is a catch, it only
works on IIS servers.
proxychains -- Forces TCP connections through proxies. Stops DNS leaks with proxyresolv. Supports multiple proxies in random order, and
reverse proxying. Also good for kinky cybering.
SocksCap -- A Windows SOCKS proxifier. I've never used Windows, but maybe some of you do!
The Amnesiac Incognito Live System. The other tachikomas tell me I used this once, but my memory banks are completely empty!
Postman tracker pool: Anonymous training manuals. Maybe one day you could become as amazing as the Major! (Requires i2p and Snark)
We hope you find this useful! #Section9