Monthly Archives: March 2011

#Anonymous #DDoS #Tools I

Cutting Tools

Image via Wikipedia

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.

Do *not* forget to protect yourself first, and to do proper reconnaissance.

Tools for cutting the Meat


#Anonymous #Anonimity #Tools I

Digging Tools

Image via Wikipedia

You might as well start by looking in the data of your machine. Did you fill in your real name and address anywhere? Remove it. And don’t keep any of your passwords on your machine. A piece of paper will do.

KeePassX is very useful if you make more identities, keeping the database on a USB stick that you take out of your machine when you walk away from it, and keep that stick in a location only known to you.

That’s for starters. Now for some stealth modes.

#Anonymous #IRC Suits

A typical clown getup

Image via Wikipedia

When you wish to enter anonymously into an anonymous IRC room, make sure you are not wearing a clown suit and a cow bell around your neck, shouting “hey hey” at the castle from the open field, well within range of the firing gallery.

Don’t be too embarrassed, most of us have Been There. Done That. Got the Suit. And this is not new. Realise you have been strutting your stuff like this on the internet unwittingly, up until now.
Here’s how to get dressed in a more anonymous suit.

#I2P does not trust parties

Screenshot of I2P router console web UI

Image via Wikipedia

I2P is an anonymising network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.

I2P is still a work in progress and it should not be relied upon for “guaranteed” anonymity at this time. It is not immune to attacks from those with unlimited resources, and may never be, due to the inherent limitations of low-latency mix networks.
Still, it provides an excellent mindset fitting predatorial universes