https://wiki.leftypol.org/index.php?title=Hacktivism&feed=atom&action=historyHacktivism - Revision history2024-03-28T22:30:11ZRevision history for this page on the wikiMediaWiki 1.39.6https://wiki.leftypol.org/index.php?title=Hacktivism&diff=11897&oldid=prevHarrystein: Undo revision 11895 by NeoStalinistCadre1976 (talk) This is a how-to page2023-06-12T21:02:29Z<p>Undo revision 11895 by <a href="/wiki/Special:Contributions/NeoStalinistCadre1976" title="Special:Contributions/NeoStalinistCadre1976">NeoStalinistCadre1976</a> (<a href="/index.php?title=User_talk:NeoStalinistCadre1976&action=edit&redlink=1" class="new" title="User talk:NeoStalinistCadre1976 (page does not exist)">talk</a>) This is a how-to page</p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 21:02, 12 June 2023</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l153">Line 153:</td>
<td colspan="2" class="diff-lineno">Line 153:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Not trying to be puritan here, but do not drink to excess or use drugs, even quasi-legal ones like marijuana. Hackers have been caught this way before. Even if the hacking charges couldn’t be proven, they got them on some unrelated drug charges because when the FBI raided their house they found weed. Part of how they flipped Sabu (aside from his kids) was that they got him on a bunch of petty crime charges like selling stolen credit cards on Facebook (idiot). This is what caused him to snitch on LulzSec. If you’re going to be a hacktivist, don’t commit other crimes involving drugs, etc. or worse, be on actual probation like Hammond (for a hacking conviction no less).</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Not trying to be puritan here, but do not drink to excess or use drugs, even quasi-legal ones like marijuana. Hackers have been caught this way before. Even if the hacking charges couldn’t be proven, they got them on some unrelated drug charges because when the FBI raided their house they found weed. Part of how they flipped Sabu (aside from his kids) was that they got him on a bunch of petty crime charges like selling stolen credit cards on Facebook (idiot). This is what caused him to snitch on LulzSec. If you’re going to be a hacktivist, don’t commit other crimes involving drugs, etc. or worse, be on actual probation like Hammond (for a hacking conviction no less).</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>====Sanitize your social media====</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>====Sanitize your social media====</div></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">It is </del>recommend <del style="font-weight: bold; text-decoration: none;">to sanitize </del>your social media. Depending on how old you are, this is a process that could take months. Go back through Gmail and find every single account with every single service or website you have ever used and try to delete them. They got the original Silk Road guy because he posted a question about the code for the Silk Road on Stack Overflow and also gave his real Gmail account on some forum (which was his real first and last name). Imagine being a bitcoin billionaire and getting owned by a Google search. Do not use any service from any tech company, especially American ones like Google/YouTube/Facebook/Twitter/Instagram/etc. without evaluating it for privacy. Handing your information over to an American tech giant is essentially the same as handing it directly to the FBI/NSA. Switch from Gmail to a more secure email provider like Tutanota or Protonmail. Tech companies usually take 3 to 18 months to delete your old data, if they ever do. Intelligence agencies like the NSA may keep stuff longer, if not forever, but there’s nothing you can do about that. Try to be a social media ghost.</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">I </ins>recommend <ins style="font-weight: bold; text-decoration: none;">sanitizing </ins>your social media. Depending on how old you are, this is a process that could take months. Go back through Gmail and find every single account with every single service or website you have ever used and try to delete them. They got the original Silk Road guy because he posted a question about the code for the Silk Road on Stack Overflow and also gave his real Gmail account on some forum (which was his real first and last name). Imagine being a bitcoin billionaire and getting owned by a Google search. Do not use any service from any tech company, especially American ones like Google/YouTube/Facebook/Twitter/Instagram/etc. without evaluating it for privacy. Handing your information over to an American tech giant is essentially the same as handing it directly to the FBI/NSA. Switch from Gmail to a more secure email provider like Tutanota or Protonmail. Tech companies usually take 3 to 18 months to delete your old data, if they ever do. Intelligence agencies like the NSA may keep stuff longer, if not forever, but there’s nothing you can do about that. Try to be a social media ghost.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==Insider Threats==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==Insider Threats==</div></td></tr>
<tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l264">Line 264:</td>
<td colspan="2" class="diff-lineno">Line 264:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*'''Party van:''' combine the wardriving strategies and Wi-Fi dongle/cantenna strategies. Instead of the stationary squat, you use a van, minivan, cargo van or RV. Check out one of those tutorials on YouTube on how to make the van comfy with a couch and seats and a table inside or something to put a laptop computer on. Drive around from Wi-Fi spot to Wi-Fi spot, like a hacking road trip. Maybe put a curtain or sheet in the back so when someone gets out of the van to go take a piss at Starbucks everyone in the parking lot doesn’t see 2, 3 or 4+ maniacal hackers typing away on their computers in the back of a van. If you use an RV you can probably find a version of the Wi-Fi extender specifically for RVs.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*'''Party van:''' combine the wardriving strategies and Wi-Fi dongle/cantenna strategies. Instead of the stationary squat, you use a van, minivan, cargo van or RV. Check out one of those tutorials on YouTube on how to make the van comfy with a couch and seats and a table inside or something to put a laptop computer on. Drive around from Wi-Fi spot to Wi-Fi spot, like a hacking road trip. Maybe put a curtain or sheet in the back so when someone gets out of the van to go take a piss at Starbucks everyone in the parking lot doesn’t see 2, 3 or 4+ maniacal hackers typing away on their computers in the back of a van. If you use an RV you can probably find a version of the Wi-Fi extender specifically for RVs.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*'''Iceman:''' rent out a hotel/motel room across from a business and hack into their Wi-Fi (or use it if open). Again, if a bunch of hacks are found coming from places that suspiciously correlated with hotel rooms your rented, it doesn’t take a genius to put two and two together. This is also an extremely expensive option. But assuming you only screw up once it could be okay. Obviously, don’t use the hotel’s Wi-Fi where you have to authenticate with your room key or something because that links back to you.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*'''Iceman:''' rent out a hotel/motel room across from a business and hack into their Wi-Fi (or use it if open). Again, if a bunch of hacks are found coming from places that suspiciously correlated with hotel rooms your rented, it doesn’t take a genius to put two and two together. This is also an extremely expensive option. But assuming you only screw up once it could be okay. Obviously, don’t use the hotel’s Wi-Fi where you have to authenticate with your room key or something because that links back to you.</div></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>*'''From home:''' if you really need to break rule #5 for some reason, at least don’t use your home internet that your real life home address, billing information, and credit card information are attached to via your ISP. Hack your neighbor’s Wi-Fi or something. If a fed Tor expert or someone shows up they can eventually determine that the Tor traffic is coming from your apartment using a directional antenna. At least the presence of other users will slow down the process slightly. <del style="font-weight: bold; text-decoration: none;">It could be supposed that </del>if there are multiple open Wi-Fi networks in the area you could alternately use each one. Again all of these networks are around your home/apartment so eventually they’ll figure it out.</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>*'''From home:''' if you really need to break rule #5 for some reason, at least don’t use your home internet that your real life home address, billing information, and credit card information are attached to via your ISP. Hack your neighbor’s Wi-Fi or something. If a fed Tor expert or someone shows up they can eventually determine that the Tor traffic is coming from your apartment using a directional antenna. At least the presence of other users will slow down the process slightly. <ins style="font-weight: bold; text-decoration: none;">I suppose </ins>if there are multiple open Wi-Fi networks in the area you could alternately use each one. Again all of these networks are around your home/apartment so eventually they’ll figure it out.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>These are just some ideas, and of course there are others. All of these strategies rely on giving you one free pass for messing up with Tor. If your IP repeatedly gets owned there none of these strategies will save you in the long run, unless you want to live like a fugitive permanently. Always confirm and double check that you are routing all traffic through Tor before you do anything else! All it takes is one screwup, one day, and they have your IP address!</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>These are just some ideas, and of course there are others. All of these strategies rely on giving you one free pass for messing up with Tor. If your IP repeatedly gets owned there none of these strategies will save you in the long run, unless you want to live like a fugitive permanently. Always confirm and double check that you are routing all traffic through Tor before you do anything else! All it takes is one screwup, one day, and they have your IP address!</div></td></tr>
</table>Harrysteinhttps://wiki.leftypol.org/index.php?title=Hacktivism&diff=11895&oldid=prevNeoStalinistCadre1976: Removed unencyclopedic usage of "I." Is this an article or essay?2023-06-08T18:45:29Z<p>Removed unencyclopedic usage of "I." Is this an article or essay?</p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 18:45, 8 June 2023</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l153">Line 153:</td>
<td colspan="2" class="diff-lineno">Line 153:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Not trying to be puritan here, but do not drink to excess or use drugs, even quasi-legal ones like marijuana. Hackers have been caught this way before. Even if the hacking charges couldn’t be proven, they got them on some unrelated drug charges because when the FBI raided their house they found weed. Part of how they flipped Sabu (aside from his kids) was that they got him on a bunch of petty crime charges like selling stolen credit cards on Facebook (idiot). This is what caused him to snitch on LulzSec. If you’re going to be a hacktivist, don’t commit other crimes involving drugs, etc. or worse, be on actual probation like Hammond (for a hacking conviction no less).</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Not trying to be puritan here, but do not drink to excess or use drugs, even quasi-legal ones like marijuana. Hackers have been caught this way before. Even if the hacking charges couldn’t be proven, they got them on some unrelated drug charges because when the FBI raided their house they found weed. Part of how they flipped Sabu (aside from his kids) was that they got him on a bunch of petty crime charges like selling stolen credit cards on Facebook (idiot). This is what caused him to snitch on LulzSec. If you’re going to be a hacktivist, don’t commit other crimes involving drugs, etc. or worse, be on actual probation like Hammond (for a hacking conviction no less).</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>====Sanitize your social media====</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>====Sanitize your social media====</div></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">I </del>recommend <del style="font-weight: bold; text-decoration: none;">sanitizing </del>your social media. Depending on how old you are, this is a process that could take months. Go back through Gmail and find every single account with every single service or website you have ever used and try to delete them. They got the original Silk Road guy because he posted a question about the code for the Silk Road on Stack Overflow and also gave his real Gmail account on some forum (which was his real first and last name). Imagine being a bitcoin billionaire and getting owned by a Google search. Do not use any service from any tech company, especially American ones like Google/YouTube/Facebook/Twitter/Instagram/etc. without evaluating it for privacy. Handing your information over to an American tech giant is essentially the same as handing it directly to the FBI/NSA. Switch from Gmail to a more secure email provider like Tutanota or Protonmail. Tech companies usually take 3 to 18 months to delete your old data, if they ever do. Intelligence agencies like the NSA may keep stuff longer, if not forever, but there’s nothing you can do about that. Try to be a social media ghost.</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">It is </ins>recommend <ins style="font-weight: bold; text-decoration: none;">to sanitize </ins>your social media. Depending on how old you are, this is a process that could take months. Go back through Gmail and find every single account with every single service or website you have ever used and try to delete them. They got the original Silk Road guy because he posted a question about the code for the Silk Road on Stack Overflow and also gave his real Gmail account on some forum (which was his real first and last name). Imagine being a bitcoin billionaire and getting owned by a Google search. Do not use any service from any tech company, especially American ones like Google/YouTube/Facebook/Twitter/Instagram/etc. without evaluating it for privacy. Handing your information over to an American tech giant is essentially the same as handing it directly to the FBI/NSA. Switch from Gmail to a more secure email provider like Tutanota or Protonmail. Tech companies usually take 3 to 18 months to delete your old data, if they ever do. Intelligence agencies like the NSA may keep stuff longer, if not forever, but there’s nothing you can do about that. Try to be a social media ghost.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==Insider Threats==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==Insider Threats==</div></td></tr>
<tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l264">Line 264:</td>
<td colspan="2" class="diff-lineno">Line 264:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*'''Party van:''' combine the wardriving strategies and Wi-Fi dongle/cantenna strategies. Instead of the stationary squat, you use a van, minivan, cargo van or RV. Check out one of those tutorials on YouTube on how to make the van comfy with a couch and seats and a table inside or something to put a laptop computer on. Drive around from Wi-Fi spot to Wi-Fi spot, like a hacking road trip. Maybe put a curtain or sheet in the back so when someone gets out of the van to go take a piss at Starbucks everyone in the parking lot doesn’t see 2, 3 or 4+ maniacal hackers typing away on their computers in the back of a van. If you use an RV you can probably find a version of the Wi-Fi extender specifically for RVs.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*'''Party van:''' combine the wardriving strategies and Wi-Fi dongle/cantenna strategies. Instead of the stationary squat, you use a van, minivan, cargo van or RV. Check out one of those tutorials on YouTube on how to make the van comfy with a couch and seats and a table inside or something to put a laptop computer on. Drive around from Wi-Fi spot to Wi-Fi spot, like a hacking road trip. Maybe put a curtain or sheet in the back so when someone gets out of the van to go take a piss at Starbucks everyone in the parking lot doesn’t see 2, 3 or 4+ maniacal hackers typing away on their computers in the back of a van. If you use an RV you can probably find a version of the Wi-Fi extender specifically for RVs.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*'''Iceman:''' rent out a hotel/motel room across from a business and hack into their Wi-Fi (or use it if open). Again, if a bunch of hacks are found coming from places that suspiciously correlated with hotel rooms your rented, it doesn’t take a genius to put two and two together. This is also an extremely expensive option. But assuming you only screw up once it could be okay. Obviously, don’t use the hotel’s Wi-Fi where you have to authenticate with your room key or something because that links back to you.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*'''Iceman:''' rent out a hotel/motel room across from a business and hack into their Wi-Fi (or use it if open). Again, if a bunch of hacks are found coming from places that suspiciously correlated with hotel rooms your rented, it doesn’t take a genius to put two and two together. This is also an extremely expensive option. But assuming you only screw up once it could be okay. Obviously, don’t use the hotel’s Wi-Fi where you have to authenticate with your room key or something because that links back to you.</div></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>*'''From home:''' if you really need to break rule #5 for some reason, at least don’t use your home internet that your real life home address, billing information, and credit card information are attached to via your ISP. Hack your neighbor’s Wi-Fi or something. If a fed Tor expert or someone shows up they can eventually determine that the Tor traffic is coming from your apartment using a directional antenna. At least the presence of other users will slow down the process slightly. <del style="font-weight: bold; text-decoration: none;">I suppose </del>if there are multiple open Wi-Fi networks in the area you could alternately use each one. Again all of these networks are around your home/apartment so eventually they’ll figure it out.</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>*'''From home:''' if you really need to break rule #5 for some reason, at least don’t use your home internet that your real life home address, billing information, and credit card information are attached to via your ISP. Hack your neighbor’s Wi-Fi or something. If a fed Tor expert or someone shows up they can eventually determine that the Tor traffic is coming from your apartment using a directional antenna. At least the presence of other users will slow down the process slightly. <ins style="font-weight: bold; text-decoration: none;">It could be supposed that </ins>if there are multiple open Wi-Fi networks in the area you could alternately use each one. Again all of these networks are around your home/apartment so eventually they’ll figure it out.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>These are just some ideas, and of course there are others. All of these strategies rely on giving you one free pass for messing up with Tor. If your IP repeatedly gets owned there none of these strategies will save you in the long run, unless you want to live like a fugitive permanently. Always confirm and double check that you are routing all traffic through Tor before you do anything else! All it takes is one screwup, one day, and they have your IP address!</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>These are just some ideas, and of course there are others. All of these strategies rely on giving you one free pass for messing up with Tor. If your IP repeatedly gets owned there none of these strategies will save you in the long run, unless you want to live like a fugitive permanently. Always confirm and double check that you are routing all traffic through Tor before you do anything else! All it takes is one screwup, one day, and they have your IP address!</div></td></tr>
</table>NeoStalinistCadre1976https://wiki.leftypol.org/index.php?title=Hacktivism&diff=11870&oldid=prevNeoStalinistCadre1976: Replaced "TOR" with "Tor." "TOR" is an incorrect rendering for the Tor network, nor is it actually an acronym.2023-06-03T14:12:09Z<p>Replaced "TOR" with "Tor." "TOR" is an incorrect rendering for the Tor network, nor is it actually an acronym.</p>
<a href="https://wiki.leftypol.org/index.php?title=Hacktivism&diff=11870&oldid=11726">Show changes</a>NeoStalinistCadre1976https://wiki.leftypol.org/index.php?title=Hacktivism&diff=11726&oldid=prevHarrystein: wl 2008 crisis2023-05-09T15:45:12Z<p>wl 2008 crisis</p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 15:45, 9 May 2023</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l1">Line 1:</td>
<td colspan="2" class="diff-lineno">Line 1:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==Introduction==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==Introduction==</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>{{quote|Man's dearest possession is life. It is given to him but once, and he must live it so as to feel no torturing regrets for wasted years, never know the burning shame of a mean and petty past; so live that, dying, he might say: all my life, all my strength were given to the finest cause in all the world the fight for the Liberation of Mankind|Nikolai Ostrovsky|“How the Steel Was Tempered”}}</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>{{quote|Man's dearest possession is life. It is given to him but once, and he must live it so as to feel no torturing regrets for wasted years, never know the burning shame of a mean and petty past; so live that, dying, he might say: all my life, all my strength were given to the finest cause in all the world the fight for the Liberation of Mankind|Nikolai Ostrovsky|“How the Steel Was Tempered”}}</div></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>The world in the 21st century is dominated by an increasingly moribund and irrational economic system which values profit over people and the environment. The dot-com bubble of the early 2000s, the financial crisis of 2008 and the crisis of the early 2020s have shown that the global capitalist system is unable to deal with the social and environmental antagonisms of our times. In such times, there has been an increased interest in bringing about an equitable and green post-capitalism – a higher mode of political economy.</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>The world in the 21st century is dominated by an increasingly moribund and irrational economic system which values profit over people and the environment. The dot-com bubble of the early 2000s, the <ins style="font-weight: bold; text-decoration: none;">[[</ins>financial crisis of 2008<ins style="font-weight: bold; text-decoration: none;">]] </ins>and the crisis of the early 2020s have shown that the global capitalist system is unable to deal with the social and environmental antagonisms of our times. In such times, there has been an increased interest in bringing about an equitable and green post-capitalism – a higher mode of political economy.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>In this situation, the most important issue is the question of how these aims will be practically achieved. While any solution will likely involve a diverse array of tactics and the participation of the masses, there is one form of direct action that has often been neglected by the left: that of "hacktivism".</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>In this situation, the most important issue is the question of how these aims will be practically achieved. While any solution will likely involve a diverse array of tactics and the participation of the masses, there is one form of direct action that has often been neglected by the left: that of "hacktivism".</div></td></tr>
</table>Harrysteinhttps://wiki.leftypol.org/index.php?title=Hacktivism&diff=10871&oldid=prevNeoStalinistCadre1976: /* Don’t buy stuff off the dark web, or sell stuff on the dark web */ The claims made are weasel words, extreme oversimplifications, and otherwise completely unsourced.2023-04-17T04:16:20Z<p><span dir="auto"><span class="autocomment">Don’t buy stuff off the dark web, or sell stuff on the dark web: </span> The claims made are weasel words, extreme oversimplifications, and otherwise completely unsourced.</span></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 04:16, 17 April 2023</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l149">Line 149:</td>
<td colspan="2" class="diff-lineno">Line 149:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Again, there are a lot of hackers who understand this but don’t practice it. Smash it with a sledgehammer, microwave the SD card on wax paper "Mr. Robot" style (or flush it down the toilet if you’re really in a hurry), take it out to the back yard and pour kerosene on it and light it on fire, just make sure that the physical hardware is 100%, irreparably, physically, destroyed. You can’t do digital forensics on an ash pile. Do this proactively (which is why the SD card is a good idea, unless you are loaded with cash to keep destroying full hard drives), by the time the FBI is bursting in your door, it will be too late. Most people know when they are about to get got, and if you have a random cast of "village people"-looking folks hanging out around your apartment (undercover agents) you should probably start thinking about flushing that SD card. This is a problem with a lot of hackers, they don’t have the common sense that any two bit meth addict has to get rid of the evidence, and not to "shit where you eat". This won’t help you completely because if they know where you live then that probably means they have your IP address, and enough evidence on network forensics + chat logs alone even without your hard drive, but that’s no reason to make it easy. Also your computer could have additional logs and evidence to identify and incriminate your comrades, so that's a good enough reason to secure it, even if you are screwed personally.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Again, there are a lot of hackers who understand this but don’t practice it. Smash it with a sledgehammer, microwave the SD card on wax paper "Mr. Robot" style (or flush it down the toilet if you’re really in a hurry), take it out to the back yard and pour kerosene on it and light it on fire, just make sure that the physical hardware is 100%, irreparably, physically, destroyed. You can’t do digital forensics on an ash pile. Do this proactively (which is why the SD card is a good idea, unless you are loaded with cash to keep destroying full hard drives), by the time the FBI is bursting in your door, it will be too late. Most people know when they are about to get got, and if you have a random cast of "village people"-looking folks hanging out around your apartment (undercover agents) you should probably start thinking about flushing that SD card. This is a problem with a lot of hackers, they don’t have the common sense that any two bit meth addict has to get rid of the evidence, and not to "shit where you eat". This won’t help you completely because if they know where you live then that probably means they have your IP address, and enough evidence on network forensics + chat logs alone even without your hard drive, but that’s no reason to make it easy. Also your computer could have additional logs and evidence to identify and incriminate your comrades, so that's a good enough reason to secure it, even if you are screwed personally.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>====Don’t buy stuff off the dark web, or sell stuff on the dark web====</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>====Don’t buy stuff off the dark web, or sell stuff on the dark web====</div></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Half of all dark web marketplaces are fed honeypots being used to entrap people. In order to buy stuff off the dark web, you need to give them your name/address so they can mail the items to you, and when they get caught they hand over the database to the feds. Sometimes the FBI operates it for months after, collecting as much user data as possible. This is how they got Marcus “MalwareTech” Hutchins, because he sold malware on AlphaBay which was later seized by the FBI<del style="font-weight: bold; text-decoration: none;">. DO NOT BUY OR SELL STUFF OFF DARK WEB CRYPTO MARKETS. THEY ARE OPERATED BY CRIMINALS WHO WILL 100% RAT YOU OUT IF AND WHEN THEY GET CAUGHT</del>.</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Half<ins style="font-weight: bold; text-decoration: none;">{{Citation needed}} </ins>of all dark web marketplaces are fed honeypots being used to entrap people. In order to buy stuff off the dark web, you need to give them your name/address so they can mail the items to you, and when they get caught they hand over the database to the feds.<ins style="font-weight: bold; text-decoration: none;">{{Citation needed}} </ins>Sometimes the FBI operates it for months after, collecting as much user data as possible.<ins style="font-weight: bold; text-decoration: none;">{{Citation needed}} </ins>This is how they got Marcus “MalwareTech” Hutchins, because he sold malware on AlphaBay which was later seized by the FBI. </div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>====One crime at a time====</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>====One crime at a time====</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Not trying to be puritan here, but do not drink to excess or use drugs, even quasi-legal ones like marijuana. Hackers have been caught this way before. Even if the hacking charges couldn’t be proven, they got them on some unrelated drug charges because when the FBI raided their house they found weed. Part of how they flipped Sabu (aside from his kids) was that they got him on a bunch of petty crime charges like selling stolen credit cards on Facebook (idiot). This is what caused him to snitch on LulzSec. If you’re going to be a hacktivist, don’t commit other crimes involving drugs, etc. or worse, be on actual probation like Hammond (for a hacking conviction no less).</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Not trying to be puritan here, but do not drink to excess or use drugs, even quasi-legal ones like marijuana. Hackers have been caught this way before. Even if the hacking charges couldn’t be proven, they got them on some unrelated drug charges because when the FBI raided their house they found weed. Part of how they flipped Sabu (aside from his kids) was that they got him on a bunch of petty crime charges like selling stolen credit cards on Facebook (idiot). This is what caused him to snitch on LulzSec. If you’re going to be a hacktivist, don’t commit other crimes involving drugs, etc. or worse, be on actual probation like Hammond (for a hacking conviction no less).</div></td></tr>
<tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l435">Line 435:</td>
<td colspan="2" class="diff-lineno">Line 435:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==References==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==References==</div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;"><references /></ins></div></td></tr>
</table>NeoStalinistCadre1976https://wiki.leftypol.org/index.php?title=Hacktivism&diff=1482&oldid=prevNonmakina: 1 revision imported2022-08-07T22:34:51Z<p>1 revision imported</p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<tr class="diff-title" lang="en">
<td colspan="1" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="1" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 22:34, 7 August 2022</td>
</tr><tr><td colspan="2" class="diff-notice" lang="en"><div class="mw-diff-empty">(No difference)</div>
</td></tr></table>Nonmakinahttps://wiki.leftypol.org/index.php?title=Hacktivism&diff=1481&oldid=prev92.22.52.194: /* 6. Lack of Technicality and Amateurism */ Spelling. Punctuation.2021-12-08T00:39:03Z<p><span dir="auto"><span class="autocomment">6. Lack of Technicality and Amateurism: </span> Spelling. Punctuation.</span></p>
<a href="https://wiki.leftypol.org/index.php?title=Hacktivism&diff=1481">Show changes</a>92.22.52.194