Category Archives: Local and commons

Locally owned and commons controlled tools and organisations

Thunderbird as MUA for i2p mail

IMG_4317

Once I had I2P properly running, I got me a mail account from hq.postman.i2p. Accounts can send and receive mail from the normal internet. Postman’s I2P-based mail system can be accessed either via I2P’s built-in mail client (susimail) or using any mail client that supports smtp and pop3. But not all clients are suitable for that.

Not all MUAs work the same when it comes to composing and sending a mailmessage …

Advertisements

The Internet is an Ecology

Saturn and the Beehive cluster

Image by madmiked via Flickr

From an ecological perspective, flipping the power-over switch to off, the power-to-do switch to on, and building more hives for collaboration, that’s like a diaspora. A diaspora of privacy, anonymity, security, freedom of thought, freedom of speech and dignity. For and by all of us. And it doesn’t involve violence. It may require some force on occasion though.

It certainly involves receiving with care in mind, and giving with emotions.

#Anonymous #DDoS #Tools I

Cutting Tools

Image via Wikipedia

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.

Do *not* forget to protect yourself first, and to do proper reconnaissance.

Tools for cutting the Meat

#Anonymous #Anonimity #Tools I

Digging Tools

Image via Wikipedia

You might as well start by looking in the data of your machine. Did you fill in your real name and address anywhere? Remove it. And don’t keep any of your passwords on your machine. A piece of paper will do.

KeePassX is very useful if you make more identities, keeping the database on a USB stick that you take out of your machine when you walk away from it, and keep that stick in a location only known to you.

That’s for starters. Now for some stealth modes.