Category Archives: Users

Facilitating anonymity, privacy and security in response-able and user-controlled network configurations

Be the media and mine for data of interest to you

This icon, known as the "feed icon" ...

Image via Wikipedia

Besides links exchanges between websites, subscribing to each others’ blogs, becoming members in Anonymous forums, chatrooms, participating in anonymous IRC channels, setting up paper.li, tweeted times, and gathering some data from retweeting interesting search terms, what else can we use that’s within the law for gathering ammunition (mining data) and crossing our beams in a social media kakafonia?

More bots of course!

Advertisements

Making sockpuppet music by retweeting twitter search terms

Image representing twitterfeed as depicted in ...

Image via CrunchBase

The Anonymous Sockpuppet bot only retweets original posts, does not retweet retweets, and removes your own tweets from the feed before retweeting.

This equivalent of a stick with a fizzing fuse and Acme Dynamite Company written on the side might work better than wearing wet copper armor and holding a lightning rod during a lightning storm.

It’s more interesting, and doesn’t take so long

StupidityIndexOutOfBoundsException: Physical access at a meetup

Official Ubuntu circle with wordmark. Replace ...

Image via Wikipedia

Lucky me I’m on Linux, and am totally and absolutely anonymous, private and secure. ~ Privacy, Anonymity and Security on IRC

The measures below give a reasonably secure solution in contexts when people have physical access to your Ubuntu machine, like unconferences, hackmeets, geekparties …

Disclaimer: This is not failproof. Nothing ever is. It doesn’t take much effort to pull out a LiveCD and bypass or read a password set on GRUB. Even if you do chmod it. GRUB can’t be stored on an encrypted partition. But people can only read the md5sum. And as far as I know it’s almost impossible to retain the password from a dirty md5 hash like the ones created by md5crypt (“dirty” means there are random characters inserted). If you also password protect BIOS settings and you don’t allow the machine to be booted other than via the hard disk, the combination is a reasonably secure solution. Of course, someone can steal your machine and mount the hard disk on another machine …

So Here Is How You Can Do It

Why @AskMetalGear?

I have received messages from people saying that they fear MetalGear as well as OpMetalGear.

Engaging in the challenge of raising MetalGear awareness and alertness