From his telegram
I will be releasing a torrent file that should be spread to as many people as possible. Please only use torrent if you absolutely know what you are doing. It is possible to dox yourself with torrents if you don’t correctly setup your security.
edit: Don’t stay up late waiting for this torrent, it is still being prepared and needs hours to complete.
If one person holds an important file, that person is an easy target. If a million people hold an important file, the file becomes an impenetrable shield for all.
Standing by to dl and seed
sneed? sneeze?
Download the torrent and immediately remove torrent and kill the torrent client when you're not using it.
sitting around seeding shit is how u get caught
You can seed if you are VPN'd, public Wifi etc. Bear in mind that without some seeds it will be hard to continue spreading the file.
don't use torrents without a vpn
Use vpn, seed 20 min,
Connect to diff vpn, seedy
Connect to diff vpn seedy
Rotate IPs
Basic OPSEC
Pass off to hand up to UseNet
Just a reminder, many VPNs offer Internet Kill Switch capability. If the VPN connection is broken, it halts all traffic from your computer until reconnected again. Probably a good idea for those new to VPNs. You don't want to lose your VPN connection and remain connected to the Internet, especially if you are seeding or uploading.
This. ExpressVPN does this. It isn’t a free VPN, but sometimes what you pay is what you get. It’s $50 every 6 months. I’ve been using it for over 5 years now on multiple internet providers, and never been ratted out. Although, use any VPN at your own risk, because at this point I don’t trust any tech company to be owned by non-deepstaters.
Another thing... Someone else posted to have a separate machine for torrent use.
I think one of the best reasons for this is that many of us tend to have apps, browsers, and email clients set up on our daily machines, and many of these can track you too. As an example, Chrome browser, owned by Google, tracks everything you do online, even in incognito mode. Same with most browsers and apps that are logged in. Google has already admitted that they will go through your Google Drive folder and delete information they deem to be against their policies, i.e. exactly what we are talking about.
If you download anything, save it to an external drive or SD card and remove from your device.
If your machine is connected to all these apps and browsers, and you're connected to your VPN, and these apps and browsers still work, then they are using the exact same IP connection points your machine is. I don't think you are hidden very well if that is the case.
So use a lean machine and don't log into anything on the device.
I use Dissenter Browser, which is based on Chromium (not Chrome), and I've been very happy with it. In addition to a privacy browser, it also offers a Tor privacy browser as well.
⬆️ ⬆️ ⬆️ THIS ⬆️ ⬆️ ⬆️
Excellent advice, especially for torrenting!!!
Some torrenting software also link to your network device. If the network device stops being the gateway to the internet, it kills the torrent access to the internet.
This can be considered a second failsafe.
Thanks GreatFunana. In addition to using Tor, one can use a network router that has VPN built in. They can then also use a software VPN on their machine as well. Each connected to different VPN locations. Both with Internet Kill Switch enabled. Add in a relatively secure browser like Dissenter (with ad blocking and Tor) and that should be a fairly secure setup, in addition to my comment below about not being signed into apps or software that tracks your activity.
With my VPN I can choose the country to appear to be from. I have bypassed MSM by using VPN.
Lol, thats the most basic thing to do in a VPN. It's like bragging you know how to make a car "move forwards using the gas pedal!" ;)
Be nice :)
I agree. We are trying to help people make sure they are secure, not mocking their lack of knowledge.
unfortunately, there is a lot of unintentional misinformation about tech here lately. VPNs weren't created for geo hiding, they were made for secure communications between endpoints typically router to router, the ability to choose which server to connect to and change your geo-ip was purely incidental.
Yes. But we are supposed to be on the same side here. Mocking somebody for their lack of knowledge is not the way to brew a positive community and help others out.
This sort of elitist attitude only creates hostility, and that is what the glowsticks want.
lmao
Connecting through multiple and switching is better than connecting through one and changing location.
Get IP rotation going as well.
I’m glad. Grow your vpn resources.
Here is a free vpn.
https://vanwa.tech/free-openvpn-service
It’s simple. Install OpenVPN and load up the config - you can even vpn within a vpn and tunnel
Thanks for the link, do you know if it works on linux and if not do you know any free VPN for linux ?
As a rule of thumb - anything works on linux.
OpenVPN should be installed by default in most linux distros.
You can literally usually just do this:
That should launch it.
Now to confirm it’s working it’s super easy.
That will show you what IP you are masquerading as.
Now one main thing I will advise is to also, within linux, edit /etc/resolv.conf and manually set your DNS to use someone else than your ISP default ( linux will populate this file with whatever the router tells it to, usually, unless you have DHCP turned off and manually handle this all.
That should backup whatever you have in resolv right now and replace it.
If you use your ISP for DNS they will actually passively keep track of those requests and even intercept them in some cases to capture information about usage.
AT&T for example does this and then sells the data from your resolution requests to 3rd parties who analyze that usage to build a personal metadata profile for you ( given they also know your account data ). Custom tailoring that data is big $$$$
Hi, thanks a lot for you effort, I truly appreciate your help here.
I'm truly just a user, don't know how to code and make things happen with the termianl in linux, anyway I did what you said and I just don't know if it worked,
it created a folder (which is empty) and then said there were no file or folder of that type, that was step 1.
after step 2 I got an IP back.
looks like it did not work did it ?
Yes
Thanks for the share!
With my pencil I can write letters. Duh.
I've been using the same VPN server for about 4 years, seeding games, movies, etc. and never had an issue.
Your ISP can't see the traffic, and a good VPN keeps no logs, so if you and 100 other people are connected to that same server 24/7, there's no way of proving who is doing what.
Whereas, they do generally log who is connected and when, and shitty VPNs also save how much data is transmitted.
So if they really wanted to track you, and they subpoena your VPN host, they can see you connected to X, Y, Z during these times and transmitted this much data. That's a lot worse that being connected to X for weeks/months at time transmitting massive amounts that can't be traced to individual locations.
The key term was “Good VPN”.
NordVPN is a good vpn to many and they were knocked over, kept logs they said they didn’t, and those were exposed to a non-disclosed state actor - all while Nord kept their mouths shut and refused to disclose for months as they didn’t know how long they had been knocked over & that reality broke their entire business model.
If you want to explore there are quite a few free VPNs. VanwaTech that acts as the CDN for 8Kun provides a free VPN.
Edit: also do not use any VPNs in Europe. GDPR requires them to log
NordVPN had a single server that was compromised due to the people running the farm leaving on a remote access system that Nord wasn't even aware of, let alone was responsible for. Read more here.
They have an intact warrant canary: https://nordvpn.com/security-efforts/
They also have passed multiple third-parties' no-log audits to confirm that they don't keep any logs.
So unless you have some evidence of this state actor getting logs (that aren't kept?), I'll have to disregard your post.
As with anything "free," if you aren't paying for it, you are the product.
I work for a high level employer.
Nord never told the truth.
I hope some folks in the field can back me up on containment protocols via PR.
I personally call it the NDA Container
Edit: Nord -> Tesonet:
TorGuard Residential VPN NordVPN CloudVPN ProtonVPN VyprVPN Hotspot Shield UltraVPN ZenMate TunnelBear PrivateVPN
I implore you to look deeper at this as there are quite a few indications. Du Sprechst Asus Deautsche gekannst?
https://www.kuketz-blog.de/android-nordvpn-uebermittelt-e-mail-adresse-an-tracking-anbieter/
Can prob translate that. Essentially Tesonet is involved in HFT and also providing services. Nord does fun things like include 3rdParty software unabated within their own apps and Infrastructure. This is a huge no no. It’s asking for risk.
In regards to the state actors:
What I can tell you is that CVE-2017-12542 was used.
In my circles this was a big deal as we were not used to seeing an ARM firmware spoopy.
https://www.synacktiv.com/en/publications/rce-vulnerability-in-hp-ilo.html
So again NordVPN claimed a web interface was “left open” by a DC Contractor and “one” host was affected.
In legalese this means “we got exploited and we are going to hide behind host without clarifying what we mean by host ( ambiguous legal term )”
Now what was specifically interesting was a fuck ton of shills popped up when Nord disclosed and blamed this all on Dell.
It had zero to do with Dell. Why the blame?
Cuz it was a 8 year old HP exploit.
If you have your salt - State Actors AGGRESSIVELY collect exploits like heart bleed, keep them private, and use them for as long as possible.
I find it hard to believe HP either didn’t know or was cooperating. Firms the size of HP have squads of researchers locally and on contract beating the shit out of these firmwares. Higher the deployment rate the higher the audit as the risk factor is in parity.
Any sauce on ExpressVPN?
They’re actually known for not just providing a solid VPN - but being dragged into various National Court Cases where prosecutors actually seize their servers and confirm, openly, no logging & extremely secure practices.
That’s not common. I wouldn’t be worried about them. Using them as a daily driver isn’t a bad idea.
$100.00/annual seems a bit steep - with articles like https://www.expressvpn.com/internet-privacy/delete-online-accounts/ I wouldn’t mind paying it just to get solid businesses out there. I dig companies like ExpressVPN that practice good John Perry Barlow-esque educational takes.
I second y000danon and I remember Nord tripping over their own feet covering up their mess when this happened. If you are still using them, I would cease immediately and look for a new provider stat.
Sage advice. I would generally avoid USA-based ones as well, especially in this current political climate.
Agreed.
Honestly staying online these days is wild as the content is getting harder to come by in terms of quality research.
I am actually using a method that dumps data all over so my isp has to pick through shit tons of crap data ( which is also encrypted ) to see real packets of actual use. Idea is:
Maybe they can still see what I am doing? Fine. They’re going to earn it.
I have no bandwidth limit
That claim is tested exhaustively. I push ~3TB a month which half of is literally /dev/urandom piped over a socket 😂
All the data coming into the house originates on an entry path —-VLAN—-> House
Like I said they see immense amounts of data that, to them, is uniform encrypted data
to me I know what’s real and /dev/null the rest
to them? “WTF is this Jack hole doing?!” They call me and it’s “I work w a fuck ton of AutoCad. Sorreh.”
👍👍👍
I am a novice at this, what VPN is recommended. I believe I have Norton’s, any suggestions. Thank you.
I got NordVPN's 3-year plan when it was on sale at one point for like $100. Been torrenting happily with no issues on it!
Ultimately, you want to find a VPN that doesn't keep logs, and has servers outside of countries that are a part of 14-eyes (countries that spy on each other's citizens to get around laws preventing doing so, like America).
Those are: US, UK, Canada, Australia, New Zealand, Denmark, France, Holland, Norway, Germany, Belgium, Italy, Sweden, Spain
Don't use VPN servers in those countries.
Scroll up a bit and read about Nord... your opinion might change a bit
Thank you.
If you have protonmail, their vpn is good. It gets top ratings for both security and privacy.
Protonmail is compromised I believe. I think Soros has his slimy hands on Protonmail through his Open Society Foundation.
I use Tutanota instead.
I meant for email -- Tutanota for email. I don't think Tutanota have a VPN service.
Thank you.
If I am not mistaken Symantec's VPN blocks torrenting. Am I correct?
What does this accomplish in this case? (Curious.) All the IPs will likely be tracked on the torrent anyway... Couldn't this be counterproductive?
Good question.
Many network mechanisms track connection times.
Most ISPs will traffic shape and do more to long running file transfers and they tend to also audit - specifically what ports traffic is being sent over.
BitTorrent isn’t new - most of them have ways of tracking / throttling and know VPNs are involved.
Every time you connect to a swarm from a new IP these reactions in the ISP side reset.
They really don’t play whack-a-mole well so it’s nothing but benefits for you.
Years back I was in a swarm where the contents was from a hack on the Rockefeller private data collection.
Insane shit. Manuals for deep underground military bases snd more.
Lots of folks on VPNs were contacted.
But muh no logs........ ;)
Opsec ? You mean cybersec ...right .. opsec is when you don't tell the enemy your plan. Or leave crumbs around for them to find you plan... Like posting your plan on a forum..
CYBERSEC is a fag term for the self important.
Any aspect of any endeavor involved OPSEC and situational awareness.
From CYBERSEC referencing shills to not doxing via linguistics anywhere on the net.
Thinking there is a physical person doing an audit on you is more light-sided naive thinking - machine learning has been bagging and tagging everything that could be fed into it for years now.
Why Ron would suggest Torrents comes off as a good bit desperate to me.
Anyone thinking about this need to understand you won’t see the contents of the swarm until you see the contents of the swarm - that payload could be anything.
Reminder Israel runs Telegram and could any time fake an account message just as any Social can.
Check my account I'm not a shill. I was a military crypto linguist. Just a stickler for words the comment was meant to be in gest.
Fair enough :)
I can see being a linguist showing far more command over semantics in your mind than I practice lol.
Better communicating is always a good thing.
Say you're from the media if you get caught
https://www.youtube.com/watch?v=TRBppdC1h_Y
That clip never gets old
It's only illegal if you get caught
Use a seedbox.
but tellingeveryone that u will spread it is also a good way to Arkansas
Code monkey knows what he's doing. He knows his shit
I think he's pretty protected, tbh
Yep, I do think he was a part of the plan from the beginning or became part of it otherwise how would Q have known 8chan would be down for exactly 93 days in post 3525. We didn't know what that meant at the time but after, of course, the anons were all over the 93 days dark for 8chan.
Isn't he in Japan? Sounds safer than anywhere in America tbh.
Dont be downing people for zero shit reasons. True patriot!
Right on
more going on than one realizes .../!
Fluid situations require patience and flexibility. Art of war. Zen and maturity. Chess moves. Dig?
Like Kamala and STDs?
Webtorrent + Tor. https://instant.io
Imagining VPN are safe is beyond naive.
I hope its a bit better than his 1:16 min video from yesterday lol
He said that is 1% of the total he has.
so get ready for the other 100 minutes
128 minutes to be precise. ;)
Mafs hard
I will wait until the more tech savvy do the VPN/seed shit so they can post it here. I don't have the patience to go thru all that.
So, you tech geeks got some work to do to keep the rest of us up to speed.
I don’t see why I should be worried about a dox. I’ll download and seed until I’m at least 1:1 ratio.
Use public wifi hotspots or (proper!) VPNs to protect yourselves, folks..
When torrenting your IP is essentially 100% revealed.
A proper VPN?
Yes. I meant setup properly to make sure you have a complete tunnel, ideally with a killswitch or through a dedicated router.
Also, a VPN company that is trustworthy to not bend right over for someone like say crooked Merrick Garland. (Should not be located in USA or Europe ideally. Difficult to advise with this issue.)
Complete tunnel with a killswitch or a dedicated router?
I can put together PCs and do some pretty basic troubleshooting but that's about it.
It's not as complicated as you think... a custom VPN router with DD-WRT or Tomato.
OpenVPN killswitch info: https://privatevpnsupportguy.github.io/Setup%20manual%20kill%20switch%20for%20OpenVPN%20GUI%20on%20Windows.html
Techlore - TOP 5 BEST VPNs of 2021 For MAXIMUM Privacy!
https://www.youtube.com/watch?v=cK4MQv-OwyM
Techlore VPN Reviews
https://www.youtube.com/playlist?list=PL3KeV6Ui_4CYTOvbZrElePOSJZAUlx2Yr
Techlore VPN Guides & News
https://www.youtube.com/playlist?list=PL3KeV6Ui_4CaIhE8k4-plxS1-H9Cy3Qng
They are only as safe as well as the VPN provider protects your anonymity and logs (or doesn't log), etc.
From an IT technical standpoint they are pretty fantastic and when operated correctly are quite secure.
Just an FYI, for an everyday person browsing GA.win and just normal internet usage it really isn't very necessary IMHO. Most people want them when they are trying to be anonymous like downloading copyrighted stuff, whistle-blowing (like Ron), torrenting, 4chan/8kun, etc., etc.
As far as a good VPN to recommend I am sorry I really do not know. Perhaps someone else here can chime in there!
Same and I need an electrician, handyman and geek
Is peerblock sufficient?
Likely not!
Why not?
I recall advice from years ago regarding movie torrents that peerblock did nothing to stop RIAA etc. from monitoring torrents. Peerblock is no substitute for a VPN mate.
and how can you figure out which VPNS are not globalist pawns?
Let's say that they all are. How badly do you think they want to reveal their hand?
Techlore - TOP 5 BEST VPNs of 2021 For MAXIMUM Privacy!
https://www.youtube.com/watch?v=cK4MQv-OwyM
Techlore VPN Reviews
https://www.youtube.com/playlist?list=PL3KeV6Ui_4CYTOvbZrElePOSJZAUlx2Yr
Techlore VPN Guides & News
https://www.youtube.com/playlist?list=PL3KeV6Ui_4CaIhE8k4-plxS1-H9Cy3Qng
Very hard
This is the problem.
You can always try to daisy-chain them I suppose?
No
I'm a computertard so I'll leave this technical stuff to those who know what they are doing.
If someone with a secure VPN is brave enough: DL torrent, rename, upload and seed newly named copy, wash, rinse, repeat. Send to others via email for them to do the same.
Without a checksum / PGP Signature how do you know it's the same file?
I guess you don't? Got a better plan to spread it without it getting shutdown as soon as uploaded?
The torrent will be hard/impossible to remove once shared. Ron should have created a PGP key long ago so people could verify what's coming from him is from him.
For anyone that want to dowload this but don't know how to be 100% secure.
Buy a cheap laptop or tablet and pay with CASH ONLY(alternative being importing a ditto cheap Chinese(I know...) one paying with a cash creditcard), install bittorrent on it and go on a public open WiFi outside of view of surveillance cameras and download it that way(to a ditto purchased USB-stick/Memory card) ....
(NEVER TURN THIS MACHINE ON AT HOME AS HARDWARE IDENTIFIERS WILL DOX YOU BY TYING IT TO YOUR LOCATION/ADDRESS)
Sometimes there is a hard solution to a soft(ware) problem...
It's good but there's a lot of things people who aren't tech savvy, will need to learn like not maximizing the browser window or any window inside Tails as it will reveal information about the monitor you are using.
It's so powerful, you just have to be careful using it as one misstep will reveal everything about you.
Tails is excellent.
MAC address can typically only be seen by the hotspot location
If you turn it on at home and it tries to connect to your wi-fi when you do I can pretty much guarantee that your wifi hardware has at some point been associated with your identity and that this will associate that new device with that wifi, using it afterwards on a public/open wifi is likely to make the same association available(to whomever may be in a position to see/find/use such things).
Also MAC address isn't the only hardware identifier in any given device, just the one publicly advertised/known...
If it is easy to hedge ones bets, why wouldn't one do that when one doesn't know with absolute certainty that one can stay anonymous, all it takes is 1 time and then it's too late...
Keep the device in a faraday bag until you're away from home.
Avatar checks out
https://www.youtube.com/watch?v=0rAHrHd2lcw ;)
Unless it's a cellphone keeping it powered down and never turning it on is likely to be sufficient for a laptop and probably for a wifi only tablet as well
If I were the original uploader of something that could get me killed I would do this and also use a YAGi antenna to connect to the public wifi at a greater range and guaranteed to be outside of ANY cameras even close to the hotspot and I would use TOR as well, that would be proportionate to the risk and action, but overkill for being one of many downloading something.
Feds own all TOR exit nodes though, no?
Aren't many hosted by volunteers?
Well put!
I'm not disagreeing there. Better safe than sorry.
Or just unplug/disconnect from the wifi at home. If you have another laptop or computer around that you're not using and they're not connected to your home network, then use that computer.
Do not ever connect that computer to the network if you are browsing the files and if you need to use that computer on the network after you're done, format the HDD that's hosting the OS really good, maybe 7 times if you're using a HDD, but once if you are using a SSD (SSD doesn't retain file information after deletion) or just take the HDD out and replace it with a new HDD/SSD.
Taking a page out of Kevin Mitnick's privacy book lol
?
Lol in one of his books, he was talking about exactly what you were saying. Have someone go in the store to buy a burner phone with cash then give that burner phone to you and you, of course, tip them for their time and all.
Never use the burner phone at home, only when you're out and about and many more. Kevin Mitnick went into details on how to be "invisible" so it sounded like you were just copying and pasting what he said, but clearly that was meant as a joke.
I wonder if this has to do with his whistleblower or something else election related. Or something else all together.
His telegram has been poppin off lately.
What has he been saying?
he has been talking about the whistleblower mostly
Have a look:
https://t.me/s/codemonkeyz
Hmmm, it would need to be a really large video chunk considering “it is still being prepared and needs hours to complete”
I think something else... like a big data dump (encrypted or otherwise) or some pcaps or something
Popcorn popped and µTorrent ready? 😉
This is the other 99% of whistleblower video taken on election day.
For those like me who are unfamiliar with torrents, I'm sure we can read all about what the documents contain here on great awakening. It isn't smart for the torrent ignorant to be involved with this. You definitely do want want any black hats to find out your info. I saw someone doxxed in real time on 8 chan when Q was posting there.
For those patriots who are familiar with the process and will share, I'd like to thank you in advance.
And here I was, hoping to get some work done today. Instead I will keep coming to this board...
Several torrent program got in build security measures pretty easy to use
However I stopped all protection the day after the election and went public. I have hid for so many years but now I dont care.
I truly believe in order to fight evil you have to stand up and look it in the eye and say you are not afraid. And this is what I have done and its pretty easy to find me in real life and so be it.
So give me this torrent file ill put it with all the other "suicide" files I already got!
FYI: Screen cap from another thread:
https://media.greatawakening.win/post/4P2LHrzu.png
DL it and spread.
VPN? They don't work. The NSA slices through VPNs like a hot knife through butter.
IT professional standing by to seed this securely in multiple locations.
Why is doxing even an issue over a single file?
Ask Seth Rich that question...
Ready for his drop to be “do you want privacy on the internet? Try Nord VPN with my discount code!”
Or CP is on it.
I got caught downloading episodes of bar rescue and they cancelled my internet lol I did not have a VPN but I do now.
Copying (probably) someone's idea is the biggest form of appreciation,it is nice having confirmed somebody is observing us a bit,and 4 CmZ - thx !
Indeed you would need VPN or put yourself on some risk (if you are in USA) to seed (but after releasing previous one it was already desperate measure for desperate looking situation) unless there are 100+ seeds at least.
For anyone who would be pissed off about taking risk of getting caught: If you are not using VPN/tor and you were sharing it you would be caught anyway if anybody would care. If you fear or are not already prepared on deep state "guests" I advise you to leave or better PREPARE YOURSELF FOR THE GOD SAKE !
Bad thing: Previous video allowed us to achieve only 20 on its peak. It is not too good if we gonna do it again - with VPNs or not. I was hoping few hundreds active anons helping NOT such petty result... Advice of CmZ about SEEDBOX is already CRUCIAL.
However we don't know are that again drills or real time to do the job. So better it is worth something,or CodemonkeyZ shall ask some IT person about perfect solution for making delivery. Starting part would be indeed critical if we would get critical material,thing is without comm channel being secured enough we surely would fail.GA is observed, CodemonkeyZ channel probably too. But we are important here or not, our part shall be somehow done and done good enough anyway.
We are in this together, WWG1WGA you know so I expect from you (yes,YOU person reading this) taking part ! And probably not only me,we are observed you know...
Small advice if it is documentary: Personally I would cut big file to pieces. After all pieces would be delivered to enough persons assemble or use as is.
Anyway in some clients like linux one called transmission you have files lists. Some of you can also use proxy servers to download it but if there will be too many people you will kill your proxy what would be really terrible.
https://www.vpnuniversity.com/bittorrent/torrent-proxy-guide
https://www.downloadprivacy.com/vpn-vs-proxy-for-anonymous-bittorrent
Power of torrent use is result of "security of obscurity" (bad practice,but still can work) at the beginning of the process. After downloading new torrents can be created (same risk,other torrent).
Aaaaand we are again at the same thing: SECURE COORDINATION CHANNEL we STILL NOT have.
Have I again remind all of you Q post 4509 ?
Your suggestion for a low cost, high performance and reliable VPN? Please and thank you...
Techlore - TOP 5 BEST VPNs of 2021 For MAXIMUM Privacy!
https://www.youtube.com/watch?v=cK4MQv-OwyM
Techlore VPN Reviews
https://www.youtube.com/playlist?list=PL3KeV6Ui_4CYTOvbZrElePOSJZAUlx2Yr
Techlore VPN Guides & News
https://www.youtube.com/playlist?list=PL3KeV6Ui_4CaIhE8k4-plxS1-H9Cy3Qng
ready
JUST DO.IT ALREADY
Hmm no file size? 🤔
Question about VPN. If I get VPN and log into my bank account, is there a way VPN servers can intercept my log in information and have my bank password?
Techlore - TOP 5 BEST VPNs of 2021 For MAXIMUM Privacy!
https://www.youtube.com/watch?v=cK4MQv-OwyM
Techlore VPN Reviews
https://www.youtube.com/playlist?list=PL3KeV6Ui_4CYTOvbZrElePOSJZAUlx2Yr
Techlore VPN Guides & News
https://www.youtube.com/playlist?list=PL3KeV6Ui_4CaIhE8k4-plxS1-H9Cy3Qng
can anyone recommend a torrenting service? I've been out of the loop for a while, and last time i used a dl service it was piratebay and utorrent. I tried piratebay and utorrent and having issues i never had before.
thanks!
Techlore - TOP 5 BEST VPNs of 2021 For MAXIMUM Privacy!
https://www.youtube.com/watch?v=cK4MQv-OwyM
Techlore VPN Reviews
https://www.youtube.com/playlist?list=PL3KeV6Ui_4CYTOvbZrElePOSJZAUlx2Yr
Techlore VPN Guides & News
https://www.youtube.com/playlist?list=PL3KeV6Ui_4CaIhE8k4-plxS1-H9Cy3Qng
Now I wish I.would have learned more about torrents. I have the ability to download and I use PIA VPN. But I'm not comfortable with the security process.
Sounds like dm switch being activated before dead
I have my VPN ready, which runs through another VPN.
Does anybody have secure torrenting software? Haven't torrented in years.
Don't use BitTorrent, it has been compromised.
https://torrentfreak.com/hackers-use-software-cracks-and-bittorrent-client-to-steal-cryptocurrency-210414/
so about that drop...
I’m not really sure what all the secrecy is for. Why exactly do I need to be worried about just downloading this thing?
Unless he’s admitting that whatever he’s releasing contains material that is illegal to download, then I’m just going to download it. Regular-wise. There’s nothing illegal about downloading a file.
Is he trying to suggest that if I download this file, the Deep State is going to hunt me down? Because I’m not really worried about that, personally.
But if he’s suggesting that this file is going to contain illegal material and that’s why he’s being tricky about this… well, download at your own risk, because it’s unlikely that such a file will be easy to navigate safely regardless of what precautions you take.
could be size limitations. If it's 30 gigs of video's from a whistleblower you can't exactly upload them all to youtube without losing every account.
What makes you think it's illegal? If you have a file that will expose a sitting president or someone who will do anything to prevent that file(s) from being leaked, would it be considered illegal if that meant it will save America from collapsing?
Let's say I have some information on you that you're a pedophile serial rapist and what I have is valid, i.e. voice recordings, pictures, videos and such. You have your ways of getting a hold of the information I have in my hands, even if it will involve getting me killed, would you go the distance to prevent it from being leaked? Also, this would mean, to you, it's "illegal" because it concerns you and you don't want people to find out who you really are, but to me and for the sake of the children you've been abusing, it's not illegal cuz I'd be saving the children from being sexually abused by you ever again as you'd be put in prison for the rest of your life.
Do you honestly think you will be safe sitting at home, looking at the file(s) from the luxury of your computer, exposing your online information for them to track back to you at your home and get you. They probably will arrest you but most likely they will kill you for having that important information that they don't want the public to know. If you think it's no biggie then do it without any security measures in place. Don't get upset when they blast your door open, grab you from your computer and haul you away in a paddy wagon, cuz this one's on you.
I mean just look at Seth Rich and the other 65 people arkancided by Clinton and I know you will say that's BS, but seriously, look at the connection between Killary Clinton and the 60+ people who have died because they said they had some kind of information that will expose the Clintons. 1 or 2 may just be what it is -- a legit suicide or a murder, but 60 something? That's a damn a lot of people to be found "dead" after saying they have incriminating information on Killary.
I don't take the threat of that particularly seriously. I have downloaded countless files over the years I've been hanging out with you guys that I was warned would get me killed.
Still kicking. All I've gotten is a few viruses. Not even a call from the FBI.
At the end of the day, you don't stop info at the receivers. You stop it at the source.
Which makes the fact that CM is releasing this apparently dangerous info under his own (widely-known) name perplexing. And the fact that he's taking so long to release it perplexing. And a lot of this perplexing.
People with dangerous info that can get them killed tend to release it as soon as possible so that killing them is no longer considered a viable way of stopping the leak.
If CM really has something that dangerous, he's giving the Cabal a LONG time to take him down. It isn't exactly hard to find this guy.
Some people are worried about deep state bad actors. Nobody believed that what happened on the 6th would lead them to being locked up illegally, but here we are. These are dark times we are living in, a great reset is happening, and people believe everything is going back to normal while also believe an event similar to the "Night of Long Knives" can't happen here.
So if people are concerned for their safety by watching a video that will DEFINITELY be kept tabs on by bad actors, I'd say we help them protect themselves and their families by giving them peace of mind at the least.
I guess, but it's not like the Deep State really needs to use this video to figure out who people are. They can literally just look and see who is refusing to wear a mask when it's mandated. They can see who is getting fired from their jobs for refusing to be vaccinated. They can just go to a Trump rally.
Cybersecurity is a good thing and all, but I'd be FAR more concerned with being outed by seeding this thing than merely downloading it.
Think of it like child porn. LE generally doesn't have the time and energy to hunt down people who download it and instead focus on people who are DISTRIBUTING it. If they happen to catch you with it, you're fucked, but limited resources are going to prioritize where they do the most good, which means the source.
Same with classified info. The government will be very irritated if you go to Wikileaks, but they aren't coming after you unless you start distributing classified info yourself.
If bad actors want to track you down, making yourself a distributor by seeding this thing is far more risky than downloading it. Peer networks aren't "secure" because they effectively prevent your identity. They just make sure that so many people are culpable that the chances of you personally get arrested are pretty low.
Which doesn't help if you're trying to avoid being identified.
Ok, you are correct on these points. Correct on all of them.
However, that is no excuse for you leaving yourself as a low hanging fruit. I'm not leaving my wallet out on the hood of my car in an empty parking lot in the middle of no where because I don't think anybody will be around to steal it.
Nobody on January 6th did anything outright illegal beyond trespassing. This is a slap on the wrist crime, yet they are sitting in solitary confinement right now. The government is looking to make examples of people for being lax on their personal security.
Chatting here probably puts me on the bottom of the list. However, if the government goes full dystopian and wins, when they start clearing that list out I'll eventually make it to the top of it.
So I say its best to keep yourself as protected as possible. No, there is no reason to setup a shack in the middle of death valley and recycle your water to survive, but its no reason to leave your doors unlocked either.
That's perfectly fair. But again, if you're looking to keep yourself from being a target, then the last thing you want to do is add your computer to the network distributing this thing. Downloading it directly and not becoming part of the distribution network would be enormously safer.
Deepstate gunna do a backtrace on you for getting damaging info on them. You need a backtrace buster.